google-identity-access_context_manager-v1 0.4.0 → 0.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7b4375b6ac8b79380b9bc8b7ee7ff9fdd0a2c5050dde43613a636fe5443c54ef
4
- data.tar.gz: 1e28d91d9656fe1690b9d4e48b07b6bb222ea337a15e8c4b9c187c74bf06a666
3
+ metadata.gz: 5b54dee92b5e57145f13c00ed64e92f5c9db806c9d291e2ce12176ada6fd2ed7
4
+ data.tar.gz: 6c29ac9bceb99e59064f4659cbd398faa27dad0dd6c72c354726a3fbff7ee2e2
5
5
  SHA512:
6
- metadata.gz: 6e9338a69481679217d8454a5c6f964705fc3a2081aa7d3d7a15667c1cfdec0c10f28ee25fab9d71ff182f9c9fdbb280e24fd222a88ed8e34123dad8b878ca49
7
- data.tar.gz: 8d527b22638d53be3a37a9e6c1500f179c8ce1c38cf1a849cc30857c0b68824cb7b9cdd65b4d72e20000f0b7f883da080c03026d5d20713ba83b07c048f99ea3
6
+ metadata.gz: 6ff72e2dfba6a3e7a680736f0d1c12f59aa85cc328c75cda626f81d38f4e7e96e985e340ae3e5c8f05be13516418e1ac809aa4f037ee1aeea16f0ea056740e9e
7
+ data.tar.gz: fc42327f6c95246f0621dc860d5d621a13a5aeffa77b69cb147517f0eb6ad3e72638e7f160d4a3db3cef791d90a2c1abe2feaf393f0183bc3946722edf14a156
data/README.md CHANGED
@@ -47,7 +47,7 @@ for general usage information.
47
47
 
48
48
  To enable logging for this library, set the logger for the underlying [gRPC](https://github.com/grpc/grpc/tree/master/src/ruby) library.
49
49
  The logger that you set may be a Ruby stdlib [`Logger`](https://ruby-doc.org/current/stdlibs/logger/Logger.html) as shown below,
50
- or a [`Google::Cloud::Logging::Logger`](https://googleapis.dev/ruby/google-cloud-logging/latest)
50
+ or a [`Google::Cloud::Logging::Logger`](https://cloud.google.com/ruby/docs/reference/google-cloud-logging/latest)
51
51
  that will write logs to [Cloud Logging](https://cloud.google.com/logging/). See [grpc/logconfig.rb](https://github.com/grpc/grpc/blob/master/src/ruby/lib/grpc/logconfig.rb)
52
52
  and the gRPC [spec_helper.rb](https://github.com/grpc/grpc/blob/master/src/ruby/spec/spec_helper.rb) for additional information.
53
53
 
@@ -135,7 +135,7 @@ module Google
135
135
  credentials = @config.credentials
136
136
  # Use self-signed JWT if the endpoint is unchanged from default,
137
137
  # but only if the default endpoint does not have a region prefix.
138
- enable_self_signed_jwt = @config.endpoint == Client.configure.endpoint &&
138
+ enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
139
139
  !@config.endpoint.split(".").first.include?("-")
140
140
  credentials ||= Credentials.default scope: @config.scope,
141
141
  enable_self_signed_jwt: enable_self_signed_jwt
@@ -2895,9 +2895,9 @@ module Google
2895
2895
  # * (`String`) The path to a service account key file in JSON format
2896
2896
  # * (`Hash`) A service account key as a Hash
2897
2897
  # * (`Google::Auth::Credentials`) A googleauth credentials object
2898
- # (see the [googleauth docs](https://googleapis.dev/ruby/googleauth/latest/index.html))
2898
+ # (see the [googleauth docs](https://rubydoc.info/gems/googleauth/Google/Auth/Credentials))
2899
2899
  # * (`Signet::OAuth2::Client`) A signet oauth2 client object
2900
- # (see the [signet docs](https://googleapis.dev/ruby/signet/latest/Signet/OAuth2/Client.html))
2900
+ # (see the [signet docs](https://rubydoc.info/gems/signet/Signet/OAuth2/Client))
2901
2901
  # * (`GRPC::Core::Channel`) a gRPC channel with included credentials
2902
2902
  # * (`GRPC::Core::ChannelCredentials`) a gRPC credentails object
2903
2903
  # * (`nil`) indicating no credentials
@@ -2939,7 +2939,9 @@ module Google
2939
2939
  class Configuration
2940
2940
  extend ::Gapic::Config
2941
2941
 
2942
- config_attr :endpoint, "accesscontextmanager.googleapis.com", ::String
2942
+ DEFAULT_ENDPOINT = "accesscontextmanager.googleapis.com"
2943
+
2944
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
2943
2945
  config_attr :credentials, nil do |value|
2944
2946
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
2945
2947
  allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
@@ -620,9 +620,9 @@ module Google
620
620
  # * (`String`) The path to a service account key file in JSON format
621
621
  # * (`Hash`) A service account key as a Hash
622
622
  # * (`Google::Auth::Credentials`) A googleauth credentials object
623
- # (see the [googleauth docs](https://googleapis.dev/ruby/googleauth/latest/index.html))
623
+ # (see the [googleauth docs](https://rubydoc.info/gems/googleauth/Google/Auth/Credentials))
624
624
  # * (`Signet::OAuth2::Client`) A signet oauth2 client object
625
- # (see the [signet docs](https://googleapis.dev/ruby/signet/latest/Signet/OAuth2/Client.html))
625
+ # (see the [signet docs](https://rubydoc.info/gems/signet/Signet/OAuth2/Client))
626
626
  # * (`GRPC::Core::Channel`) a gRPC channel with included credentials
627
627
  # * (`GRPC::Core::ChannelCredentials`) a gRPC credentails object
628
628
  # * (`nil`) indicating no credentials
@@ -664,7 +664,9 @@ module Google
664
664
  class Configuration
665
665
  extend ::Gapic::Config
666
666
 
667
- config_attr :endpoint, "accesscontextmanager.googleapis.com", ::String
667
+ DEFAULT_ENDPOINT = "accesscontextmanager.googleapis.com"
668
+
669
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
668
670
  config_attr :credentials, nil do |value|
669
671
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
670
672
  allowed += [::GRPC::Core::Channel, ::GRPC::Core::ChannelCredentials] if defined? ::GRPC
@@ -131,7 +131,7 @@ module Google
131
131
  credentials = @config.credentials
132
132
  # Use self-signed JWT if the endpoint is unchanged from default,
133
133
  # but only if the default endpoint does not have a region prefix.
134
- enable_self_signed_jwt = @config.endpoint == Client.configure.endpoint &&
134
+ enable_self_signed_jwt = @config.endpoint == Configuration::DEFAULT_ENDPOINT &&
135
135
  !@config.endpoint.split(".").first.include?("-")
136
136
  credentials ||= Credentials.default scope: @config.scope,
137
137
  enable_self_signed_jwt: enable_self_signed_jwt
@@ -2183,9 +2183,9 @@ module Google
2183
2183
  # * (`String`) The path to a service account key file in JSON format
2184
2184
  # * (`Hash`) A service account key as a Hash
2185
2185
  # * (`Google::Auth::Credentials`) A googleauth credentials object
2186
- # (see the [googleauth docs](https://googleapis.dev/ruby/googleauth/latest/index.html))
2186
+ # (see the [googleauth docs](https://rubydoc.info/gems/googleauth/Google/Auth/Credentials))
2187
2187
  # * (`Signet::OAuth2::Client`) A signet oauth2 client object
2188
- # (see the [signet docs](https://googleapis.dev/ruby/signet/latest/Signet/OAuth2/Client.html))
2188
+ # (see the [signet docs](https://rubydoc.info/gems/signet/Signet/OAuth2/Client))
2189
2189
  # * (`nil`) indicating no credentials
2190
2190
  # @return [::Object]
2191
2191
  # @!attribute [rw] scope
@@ -2218,7 +2218,9 @@ module Google
2218
2218
  class Configuration
2219
2219
  extend ::Gapic::Config
2220
2220
 
2221
- config_attr :endpoint, "accesscontextmanager.googleapis.com", ::String
2221
+ DEFAULT_ENDPOINT = "accesscontextmanager.googleapis.com"
2222
+
2223
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
2222
2224
  config_attr :credentials, nil do |value|
2223
2225
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
2224
2226
  allowed.any? { |klass| klass === value }
@@ -411,9 +411,9 @@ module Google
411
411
  # * (`String`) The path to a service account key file in JSON format
412
412
  # * (`Hash`) A service account key as a Hash
413
413
  # * (`Google::Auth::Credentials`) A googleauth credentials object
414
- # (see the [googleauth docs](https://googleapis.dev/ruby/googleauth/latest/index.html))
414
+ # (see the [googleauth docs](https://rubydoc.info/gems/googleauth/Google/Auth/Credentials))
415
415
  # * (`Signet::OAuth2::Client`) A signet oauth2 client object
416
- # (see the [signet docs](https://googleapis.dev/ruby/signet/latest/Signet/OAuth2/Client.html))
416
+ # (see the [signet docs](https://rubydoc.info/gems/signet/Signet/OAuth2/Client))
417
417
  # * (`nil`) indicating no credentials
418
418
  # @return [::Object]
419
419
  # @!attribute [rw] scope
@@ -446,7 +446,9 @@ module Google
446
446
  class Configuration
447
447
  extend ::Gapic::Config
448
448
 
449
- config_attr :endpoint, "accesscontextmanager.googleapis.com", ::String
449
+ DEFAULT_ENDPOINT = "accesscontextmanager.googleapis.com"
450
+
451
+ config_attr :endpoint, DEFAULT_ENDPOINT, ::String
450
452
  config_attr :credentials, nil do |value|
451
453
  allowed = [::String, ::Hash, ::Proc, ::Symbol, ::Google::Auth::Credentials, ::Signet::OAuth2::Client, nil]
452
454
  allowed.any? { |klass| klass === value }
@@ -567,7 +569,7 @@ module Google
567
569
 
568
570
  verb, uri, query_string_params, body = OperationsServiceStub.transcode_list_operations_request request_pb
569
571
  query_string_params = if query_string_params.any?
570
- query_string_params.to_h { |p| p.split("=", 2) }
572
+ query_string_params.to_h { |p| p.split "=", 2 }
571
573
  else
572
574
  {}
573
575
  end
@@ -605,7 +607,7 @@ module Google
605
607
 
606
608
  verb, uri, query_string_params, body = OperationsServiceStub.transcode_get_operation_request request_pb
607
609
  query_string_params = if query_string_params.any?
608
- query_string_params.to_h { |p| p.split("=", 2) }
610
+ query_string_params.to_h { |p| p.split "=", 2 }
609
611
  else
610
612
  {}
611
613
  end
@@ -643,7 +645,7 @@ module Google
643
645
 
644
646
  verb, uri, query_string_params, body = OperationsServiceStub.transcode_delete_operation_request request_pb
645
647
  query_string_params = if query_string_params.any?
646
- query_string_params.to_h { |p| p.split("=", 2) }
648
+ query_string_params.to_h { |p| p.split "=", 2 }
647
649
  else
648
650
  {}
649
651
  end
@@ -681,7 +683,7 @@ module Google
681
683
 
682
684
  verb, uri, query_string_params, body = OperationsServiceStub.transcode_cancel_operation_request request_pb
683
685
  query_string_params = if query_string_params.any?
684
- query_string_params.to_h { |p| p.split("=", 2) }
686
+ query_string_params.to_h { |p| p.split "=", 2 }
685
687
  else
686
688
  {}
687
689
  end
@@ -59,7 +59,7 @@ module Google
59
59
 
60
60
  verb, uri, query_string_params, body = ServiceStub.transcode_list_access_policies_request request_pb
61
61
  query_string_params = if query_string_params.any?
62
- query_string_params.to_h { |p| p.split("=", 2) }
62
+ query_string_params.to_h { |p| p.split "=", 2 }
63
63
  else
64
64
  {}
65
65
  end
@@ -97,7 +97,7 @@ module Google
97
97
 
98
98
  verb, uri, query_string_params, body = ServiceStub.transcode_get_access_policy_request request_pb
99
99
  query_string_params = if query_string_params.any?
100
- query_string_params.to_h { |p| p.split("=", 2) }
100
+ query_string_params.to_h { |p| p.split "=", 2 }
101
101
  else
102
102
  {}
103
103
  end
@@ -135,7 +135,7 @@ module Google
135
135
 
136
136
  verb, uri, query_string_params, body = ServiceStub.transcode_create_access_policy_request request_pb
137
137
  query_string_params = if query_string_params.any?
138
- query_string_params.to_h { |p| p.split("=", 2) }
138
+ query_string_params.to_h { |p| p.split "=", 2 }
139
139
  else
140
140
  {}
141
141
  end
@@ -173,7 +173,7 @@ module Google
173
173
 
174
174
  verb, uri, query_string_params, body = ServiceStub.transcode_update_access_policy_request request_pb
175
175
  query_string_params = if query_string_params.any?
176
- query_string_params.to_h { |p| p.split("=", 2) }
176
+ query_string_params.to_h { |p| p.split "=", 2 }
177
177
  else
178
178
  {}
179
179
  end
@@ -211,7 +211,7 @@ module Google
211
211
 
212
212
  verb, uri, query_string_params, body = ServiceStub.transcode_delete_access_policy_request request_pb
213
213
  query_string_params = if query_string_params.any?
214
- query_string_params.to_h { |p| p.split("=", 2) }
214
+ query_string_params.to_h { |p| p.split "=", 2 }
215
215
  else
216
216
  {}
217
217
  end
@@ -249,7 +249,7 @@ module Google
249
249
 
250
250
  verb, uri, query_string_params, body = ServiceStub.transcode_list_access_levels_request request_pb
251
251
  query_string_params = if query_string_params.any?
252
- query_string_params.to_h { |p| p.split("=", 2) }
252
+ query_string_params.to_h { |p| p.split "=", 2 }
253
253
  else
254
254
  {}
255
255
  end
@@ -287,7 +287,7 @@ module Google
287
287
 
288
288
  verb, uri, query_string_params, body = ServiceStub.transcode_get_access_level_request request_pb
289
289
  query_string_params = if query_string_params.any?
290
- query_string_params.to_h { |p| p.split("=", 2) }
290
+ query_string_params.to_h { |p| p.split "=", 2 }
291
291
  else
292
292
  {}
293
293
  end
@@ -325,7 +325,7 @@ module Google
325
325
 
326
326
  verb, uri, query_string_params, body = ServiceStub.transcode_create_access_level_request request_pb
327
327
  query_string_params = if query_string_params.any?
328
- query_string_params.to_h { |p| p.split("=", 2) }
328
+ query_string_params.to_h { |p| p.split "=", 2 }
329
329
  else
330
330
  {}
331
331
  end
@@ -363,7 +363,7 @@ module Google
363
363
 
364
364
  verb, uri, query_string_params, body = ServiceStub.transcode_update_access_level_request request_pb
365
365
  query_string_params = if query_string_params.any?
366
- query_string_params.to_h { |p| p.split("=", 2) }
366
+ query_string_params.to_h { |p| p.split "=", 2 }
367
367
  else
368
368
  {}
369
369
  end
@@ -401,7 +401,7 @@ module Google
401
401
 
402
402
  verb, uri, query_string_params, body = ServiceStub.transcode_delete_access_level_request request_pb
403
403
  query_string_params = if query_string_params.any?
404
- query_string_params.to_h { |p| p.split("=", 2) }
404
+ query_string_params.to_h { |p| p.split "=", 2 }
405
405
  else
406
406
  {}
407
407
  end
@@ -439,7 +439,7 @@ module Google
439
439
 
440
440
  verb, uri, query_string_params, body = ServiceStub.transcode_replace_access_levels_request request_pb
441
441
  query_string_params = if query_string_params.any?
442
- query_string_params.to_h { |p| p.split("=", 2) }
442
+ query_string_params.to_h { |p| p.split "=", 2 }
443
443
  else
444
444
  {}
445
445
  end
@@ -477,7 +477,7 @@ module Google
477
477
 
478
478
  verb, uri, query_string_params, body = ServiceStub.transcode_list_service_perimeters_request request_pb
479
479
  query_string_params = if query_string_params.any?
480
- query_string_params.to_h { |p| p.split("=", 2) }
480
+ query_string_params.to_h { |p| p.split "=", 2 }
481
481
  else
482
482
  {}
483
483
  end
@@ -515,7 +515,7 @@ module Google
515
515
 
516
516
  verb, uri, query_string_params, body = ServiceStub.transcode_get_service_perimeter_request request_pb
517
517
  query_string_params = if query_string_params.any?
518
- query_string_params.to_h { |p| p.split("=", 2) }
518
+ query_string_params.to_h { |p| p.split "=", 2 }
519
519
  else
520
520
  {}
521
521
  end
@@ -553,7 +553,7 @@ module Google
553
553
 
554
554
  verb, uri, query_string_params, body = ServiceStub.transcode_create_service_perimeter_request request_pb
555
555
  query_string_params = if query_string_params.any?
556
- query_string_params.to_h { |p| p.split("=", 2) }
556
+ query_string_params.to_h { |p| p.split "=", 2 }
557
557
  else
558
558
  {}
559
559
  end
@@ -591,7 +591,7 @@ module Google
591
591
 
592
592
  verb, uri, query_string_params, body = ServiceStub.transcode_update_service_perimeter_request request_pb
593
593
  query_string_params = if query_string_params.any?
594
- query_string_params.to_h { |p| p.split("=", 2) }
594
+ query_string_params.to_h { |p| p.split "=", 2 }
595
595
  else
596
596
  {}
597
597
  end
@@ -629,7 +629,7 @@ module Google
629
629
 
630
630
  verb, uri, query_string_params, body = ServiceStub.transcode_delete_service_perimeter_request request_pb
631
631
  query_string_params = if query_string_params.any?
632
- query_string_params.to_h { |p| p.split("=", 2) }
632
+ query_string_params.to_h { |p| p.split "=", 2 }
633
633
  else
634
634
  {}
635
635
  end
@@ -667,7 +667,7 @@ module Google
667
667
 
668
668
  verb, uri, query_string_params, body = ServiceStub.transcode_replace_service_perimeters_request request_pb
669
669
  query_string_params = if query_string_params.any?
670
- query_string_params.to_h { |p| p.split("=", 2) }
670
+ query_string_params.to_h { |p| p.split "=", 2 }
671
671
  else
672
672
  {}
673
673
  end
@@ -705,7 +705,7 @@ module Google
705
705
 
706
706
  verb, uri, query_string_params, body = ServiceStub.transcode_commit_service_perimeters_request request_pb
707
707
  query_string_params = if query_string_params.any?
708
- query_string_params.to_h { |p| p.split("=", 2) }
708
+ query_string_params.to_h { |p| p.split "=", 2 }
709
709
  else
710
710
  {}
711
711
  end
@@ -743,7 +743,7 @@ module Google
743
743
 
744
744
  verb, uri, query_string_params, body = ServiceStub.transcode_list_gcp_user_access_bindings_request request_pb
745
745
  query_string_params = if query_string_params.any?
746
- query_string_params.to_h { |p| p.split("=", 2) }
746
+ query_string_params.to_h { |p| p.split "=", 2 }
747
747
  else
748
748
  {}
749
749
  end
@@ -781,7 +781,7 @@ module Google
781
781
 
782
782
  verb, uri, query_string_params, body = ServiceStub.transcode_get_gcp_user_access_binding_request request_pb
783
783
  query_string_params = if query_string_params.any?
784
- query_string_params.to_h { |p| p.split("=", 2) }
784
+ query_string_params.to_h { |p| p.split "=", 2 }
785
785
  else
786
786
  {}
787
787
  end
@@ -819,7 +819,7 @@ module Google
819
819
 
820
820
  verb, uri, query_string_params, body = ServiceStub.transcode_create_gcp_user_access_binding_request request_pb
821
821
  query_string_params = if query_string_params.any?
822
- query_string_params.to_h { |p| p.split("=", 2) }
822
+ query_string_params.to_h { |p| p.split "=", 2 }
823
823
  else
824
824
  {}
825
825
  end
@@ -857,7 +857,7 @@ module Google
857
857
 
858
858
  verb, uri, query_string_params, body = ServiceStub.transcode_update_gcp_user_access_binding_request request_pb
859
859
  query_string_params = if query_string_params.any?
860
- query_string_params.to_h { |p| p.split("=", 2) }
860
+ query_string_params.to_h { |p| p.split "=", 2 }
861
861
  else
862
862
  {}
863
863
  end
@@ -895,7 +895,7 @@ module Google
895
895
 
896
896
  verb, uri, query_string_params, body = ServiceStub.transcode_delete_gcp_user_access_binding_request request_pb
897
897
  query_string_params = if query_string_params.any?
898
- query_string_params.to_h { |p| p.split("=", 2) }
898
+ query_string_params.to_h { |p| p.split "=", 2 }
899
899
  else
900
900
  {}
901
901
  end
@@ -933,7 +933,7 @@ module Google
933
933
 
934
934
  verb, uri, query_string_params, body = ServiceStub.transcode_set_iam_policy_request request_pb
935
935
  query_string_params = if query_string_params.any?
936
- query_string_params.to_h { |p| p.split("=", 2) }
936
+ query_string_params.to_h { |p| p.split "=", 2 }
937
937
  else
938
938
  {}
939
939
  end
@@ -971,7 +971,7 @@ module Google
971
971
 
972
972
  verb, uri, query_string_params, body = ServiceStub.transcode_get_iam_policy_request request_pb
973
973
  query_string_params = if query_string_params.any?
974
- query_string_params.to_h { |p| p.split("=", 2) }
974
+ query_string_params.to_h { |p| p.split "=", 2 }
975
975
  else
976
976
  {}
977
977
  end
@@ -1009,7 +1009,7 @@ module Google
1009
1009
 
1010
1010
  verb, uri, query_string_params, body = ServiceStub.transcode_test_iam_permissions_request request_pb
1011
1011
  query_string_params = if query_string_params.any?
1012
- query_string_params.to_h { |p| p.split("=", 2) }
1012
+ query_string_params.to_h { |p| p.split "=", 2 }
1013
1013
  else
1014
1014
  {}
1015
1015
  end
@@ -21,7 +21,7 @@ module Google
21
21
  module Identity
22
22
  module AccessContextManager
23
23
  module V1
24
- VERSION = "0.4.0"
24
+ VERSION = "0.5.1"
25
25
  end
26
26
  end
27
27
  end
@@ -1,32 +1,34 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/identity/accesscontextmanager/type/device_resources.proto
3
4
 
4
5
  require 'google/protobuf'
5
6
 
6
- Google::Protobuf::DescriptorPool.generated_pool.build do
7
- add_file("google/identity/accesscontextmanager/type/device_resources.proto", :syntax => :proto3) do
8
- add_enum "google.identity.accesscontextmanager.type.DeviceEncryptionStatus" do
9
- value :ENCRYPTION_UNSPECIFIED, 0
10
- value :ENCRYPTION_UNSUPPORTED, 1
11
- value :UNENCRYPTED, 2
12
- value :ENCRYPTED, 3
13
- end
14
- add_enum "google.identity.accesscontextmanager.type.OsType" do
15
- value :OS_UNSPECIFIED, 0
16
- value :DESKTOP_MAC, 1
17
- value :DESKTOP_WINDOWS, 2
18
- value :DESKTOP_LINUX, 3
19
- value :DESKTOP_CHROME_OS, 6
20
- value :ANDROID, 4
21
- value :IOS, 5
22
- end
23
- add_enum "google.identity.accesscontextmanager.type.DeviceManagementLevel" do
24
- value :MANAGEMENT_UNSPECIFIED, 0
25
- value :NONE, 1
26
- value :BASIC, 2
27
- value :COMPLETE, 3
7
+
8
+ descriptor_data = "\n@google/identity/accesscontextmanager/type/device_resources.proto\x12)google.identity.accesscontextmanager.type*p\n\x16\x44\x65viceEncryptionStatus\x12\x1a\n\x16\x45NCRYPTION_UNSPECIFIED\x10\x00\x12\x1a\n\x16\x45NCRYPTION_UNSUPPORTED\x10\x01\x12\x0f\n\x0bUNENCRYPTED\x10\x02\x12\r\n\tENCRYPTED\x10\x03*\x82\x01\n\x06OsType\x12\x12\n\x0eOS_UNSPECIFIED\x10\x00\x12\x0f\n\x0b\x44\x45SKTOP_MAC\x10\x01\x12\x13\n\x0f\x44\x45SKTOP_WINDOWS\x10\x02\x12\x11\n\rDESKTOP_LINUX\x10\x03\x12\x15\n\x11\x44\x45SKTOP_CHROME_OS\x10\x06\x12\x0b\n\x07\x41NDROID\x10\x04\x12\x07\n\x03IOS\x10\x05*V\n\x15\x44\x65viceManagementLevel\x12\x1a\n\x16MANAGEMENT_UNSPECIFIED\x10\x00\x12\x08\n\x04NONE\x10\x01\x12\t\n\x05\x42\x41SIC\x10\x02\x12\x0c\n\x08\x43OMPLETE\x10\x03\x42\x8d\x02\n-com.google.identity.accesscontextmanager.typeB\tTypeProtoP\x01ZHgoogle.golang.org/genproto/googleapis/identity/accesscontextmanager/type\xaa\x02)Google.Identity.AccessContextManager.Type\xca\x02)Google\\Identity\\AccessContextManager\\Type\xea\x02,Google::Identity::AccessContextManager::Typeb\x06proto3"
9
+
10
+ pool = Google::Protobuf::DescriptorPool.generated_pool
11
+
12
+ begin
13
+ pool.add_serialized_file(descriptor_data)
14
+ rescue TypeError => e
15
+ # Compatibility code: will be removed in the next major version.
16
+ require 'google/protobuf/descriptor_pb'
17
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
18
+ parsed.clear_dependency
19
+ serialized = parsed.class.encode(parsed)
20
+ file = pool.add_serialized_file(serialized)
21
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
22
+ imports = [
23
+ ]
24
+ imports.each do |type_name, expected_filename|
25
+ import_file = pool.lookup(type_name).file_descriptor
26
+ if import_file.name != expected_filename
27
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
28
28
  end
29
29
  end
30
+ warn "Each proto file must use a consistent fully-qualified name."
31
+ warn "This will become an error in the next major version."
30
32
  end
31
33
 
32
34
  module Google
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/identity/accesscontextmanager/v1/access_context_manager.proto
3
4
 
@@ -16,131 +17,36 @@ require 'google/identity/accesscontextmanager/v1/service_perimeter_pb'
16
17
  require 'google/longrunning/operations_pb'
17
18
  require 'google/protobuf/field_mask_pb'
18
19
 
19
- Google::Protobuf::DescriptorPool.generated_pool.build do
20
- add_file("google/identity/accesscontextmanager/v1/access_context_manager.proto", :syntax => :proto3) do
21
- add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest" do
22
- optional :parent, :string, 1
23
- optional :page_size, :int32, 2
24
- optional :page_token, :string, 3
25
- end
26
- add_message "google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse" do
27
- repeated :access_policies, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
28
- optional :next_page_token, :string, 2
29
- end
30
- add_message "google.identity.accesscontextmanager.v1.GetAccessPolicyRequest" do
31
- optional :name, :string, 1
32
- end
33
- add_message "google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest" do
34
- optional :policy, :message, 1, "google.identity.accesscontextmanager.v1.AccessPolicy"
35
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
36
- end
37
- add_message "google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest" do
38
- optional :name, :string, 1
39
- end
40
- add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsRequest" do
41
- optional :parent, :string, 1
42
- optional :page_size, :int32, 2
43
- optional :page_token, :string, 3
44
- optional :access_level_format, :enum, 4, "google.identity.accesscontextmanager.v1.LevelFormat"
45
- end
46
- add_message "google.identity.accesscontextmanager.v1.ListAccessLevelsResponse" do
47
- repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
48
- optional :next_page_token, :string, 2
49
- end
50
- add_message "google.identity.accesscontextmanager.v1.GetAccessLevelRequest" do
51
- optional :name, :string, 1
52
- optional :access_level_format, :enum, 2, "google.identity.accesscontextmanager.v1.LevelFormat"
53
- end
54
- add_message "google.identity.accesscontextmanager.v1.CreateAccessLevelRequest" do
55
- optional :parent, :string, 1
56
- optional :access_level, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
57
- end
58
- add_message "google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest" do
59
- optional :access_level, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
60
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
61
- end
62
- add_message "google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest" do
63
- optional :name, :string, 1
64
- end
65
- add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest" do
66
- optional :parent, :string, 1
67
- repeated :access_levels, :message, 2, "google.identity.accesscontextmanager.v1.AccessLevel"
68
- optional :etag, :string, 4
69
- end
70
- add_message "google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse" do
71
- repeated :access_levels, :message, 1, "google.identity.accesscontextmanager.v1.AccessLevel"
72
- end
73
- add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersRequest" do
74
- optional :parent, :string, 1
75
- optional :page_size, :int32, 2
76
- optional :page_token, :string, 3
77
- end
78
- add_message "google.identity.accesscontextmanager.v1.ListServicePerimetersResponse" do
79
- repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
80
- optional :next_page_token, :string, 2
81
- end
82
- add_message "google.identity.accesscontextmanager.v1.GetServicePerimeterRequest" do
83
- optional :name, :string, 1
84
- end
85
- add_message "google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest" do
86
- optional :parent, :string, 1
87
- optional :service_perimeter, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
88
- end
89
- add_message "google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest" do
90
- optional :service_perimeter, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
91
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
92
- end
93
- add_message "google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest" do
94
- optional :name, :string, 1
95
- end
96
- add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest" do
97
- optional :parent, :string, 1
98
- repeated :service_perimeters, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeter"
99
- optional :etag, :string, 3
100
- end
101
- add_message "google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse" do
102
- repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
103
- end
104
- add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest" do
105
- optional :parent, :string, 1
106
- optional :etag, :string, 2
107
- end
108
- add_message "google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse" do
109
- repeated :service_perimeters, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeter"
110
- end
111
- add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest" do
112
- optional :parent, :string, 1
113
- optional :page_size, :int32, 2
114
- optional :page_token, :string, 3
115
- end
116
- add_message "google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse" do
117
- repeated :gcp_user_access_bindings, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
118
- optional :next_page_token, :string, 2
119
- end
120
- add_message "google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest" do
121
- optional :name, :string, 1
122
- end
123
- add_message "google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest" do
124
- optional :parent, :string, 1
125
- optional :gcp_user_access_binding, :message, 2, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
126
- end
127
- add_message "google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest" do
128
- optional :gcp_user_access_binding, :message, 1, "google.identity.accesscontextmanager.v1.GcpUserAccessBinding"
129
- optional :update_mask, :message, 2, "google.protobuf.FieldMask"
130
- end
131
- add_message "google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest" do
132
- optional :name, :string, 1
133
- end
134
- add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata" do
135
- end
136
- add_message "google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata" do
137
- end
138
- add_enum "google.identity.accesscontextmanager.v1.LevelFormat" do
139
- value :LEVEL_FORMAT_UNSPECIFIED, 0
140
- value :AS_DEFINED, 1
141
- value :CEL, 2
20
+
21
+ descriptor_data = "\nDgoogle/identity/accesscontextmanager/v1/access_context_manager.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a:google/identity/accesscontextmanager/v1/access_level.proto\x1a;google/identity/accesscontextmanager/v1/access_policy.proto\x1a\x45google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto\x1a?google/identity/accesscontextmanager/v1/service_perimeter.proto\x1a#google/longrunning/operations.proto\x1a google/protobuf/field_mask.proto\"\x8c\x01\n\x19ListAccessPoliciesRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\"\x85\x01\n\x1aListAccessPoliciesResponse\x12N\n\x0f\x61\x63\x63\x65ss_policies\x18\x01 \x03(\x0b\x32\x35.google.identity.accesscontextmanager.v1.AccessPolicy\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"`\n\x16GetAccessPolicyRequest\x12\x46\n\x04name\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0accesscontextmanager.googleapis.com/AccessPolicy\"\x9d\x01\n\x19UpdateAccessPolicyRequest\x12J\n\x06policy\x18\x01 \x01(\x0b\x32\x35.google.identity.accesscontextmanager.v1.AccessPolicyB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"c\n\x19\x44\x65leteAccessPolicyRequest\x12\x46\n\x04name\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0accesscontextmanager.googleapis.com/AccessPolicy\"\xdc\x01\n\x17ListAccessLevelsRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\x12Q\n\x13\x61\x63\x63\x65ss_level_format\x18\x04 \x01(\x0e\x32\x34.google.identity.accesscontextmanager.v1.LevelFormat\"\x80\x01\n\x18ListAccessLevelsResponse\x12K\n\raccess_levels\x18\x01 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevel\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"\xb1\x01\n\x15GetAccessLevelRequest\x12\x45\n\x04name\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel\x12Q\n\x13\x61\x63\x63\x65ss_level_format\x18\x02 \x01(\x0e\x32\x34.google.identity.accesscontextmanager.v1.LevelFormat\"\xb4\x01\n\x18\x43reateAccessLevelRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12O\n\x0c\x61\x63\x63\x65ss_level\x18\x02 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\"\xa1\x01\n\x18UpdateAccessLevelRequest\x12O\n\x0c\x61\x63\x63\x65ss_level\x18\x01 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"a\n\x18\x44\x65leteAccessLevelRequest\x12\x45\n\x04name\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel\"\xc5\x01\n\x1aReplaceAccessLevelsRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12P\n\raccess_levels\x18\x02 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\x12\x0c\n\x04\x65tag\x18\x04 \x01(\t\"j\n\x1bReplaceAccessLevelsResponse\x12K\n\raccess_levels\x18\x01 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevel\"\x93\x01\n\x1cListServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\"\x8f\x01\n\x1dListServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"h\n\x1aGetServicePerimeterRequest\x12J\n\x04name\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\n4accesscontextmanager.googleapis.com/ServicePerimeter\"\xc8\x01\n\x1d\x43reateServicePerimeterRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12Y\n\x11service_perimeter\x18\x02 \x01(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\"\xb0\x01\n\x1dUpdateServicePerimeterRequest\x12Y\n\x11service_perimeter\x18\x01 \x01(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"k\n\x1d\x44\x65leteServicePerimeterRequest\x12J\n\x04name\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\n4accesscontextmanager.googleapis.com/ServicePerimeter\"\xd9\x01\n\x1fReplaceServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12Z\n\x12service_perimeters\x18\x02 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\x12\x0c\n\x04\x65tag\x18\x03 \x01(\t\"y\n ReplaceServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter\"|\n\x1e\x43ommitServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12\x0c\n\x04\x65tag\x18\x02 \x01(\t\"x\n\x1f\x43ommitServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter\"\x9d\x01\n ListGcpUserAccessBindingsRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01\"\x9d\x01\n!ListGcpUserAccessBindingsResponse\x12_\n\x18gcp_user_access_bindings\x18\x01 \x03(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBinding\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t\"p\n\x1eGetGcpUserAccessBindingRequest\x12N\n\x04name\x18\x01 \x01(\tB@\xe0\x41\x02\xfa\x41:\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding\"\xd2\x01\n!CreateGcpUserAccessBindingRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x63\n\x17gcp_user_access_binding\x18\x02 \x01(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBindingB\x03\xe0\x41\x02\"\xbe\x01\n!UpdateGcpUserAccessBindingRequest\x12\x63\n\x17gcp_user_access_binding\x18\x01 \x01(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBindingB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02\"s\n!DeleteGcpUserAccessBindingRequest\x12N\n\x04name\x18\x01 \x01(\tB@\xe0\x41\x02\xfa\x41:\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding\"\'\n%GcpUserAccessBindingOperationMetadata\"\'\n%AccessContextManagerOperationMetadata*D\n\x0bLevelFormat\x12\x1c\n\x18LEVEL_FORMAT_UNSPECIFIED\x10\x00\x12\x0e\n\nAS_DEFINED\x10\x01\x12\x07\n\x03\x43\x45L\x10\x02\x32\xf1\x32\n\x14\x41\x63\x63\x65ssContextManager\x12\xb9\x01\n\x12ListAccessPolicies\x12\x42.google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest\x1a\x43.google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse\"\x1a\x82\xd3\xe4\x93\x02\x14\x12\x12/v1/accessPolicies\x12\xb5\x01\n\x0fGetAccessPolicy\x12?.google.identity.accesscontextmanager.v1.GetAccessPolicyRequest\x1a\x35.google.identity.accesscontextmanager.v1.AccessPolicy\"*\x82\xd3\xe4\x93\x02\x1d\x12\x1b/v1/{name=accessPolicies/*}\xda\x41\x04name\x12\xc1\x01\n\x12\x43reateAccessPolicy\x12\x35.google.identity.accesscontextmanager.v1.AccessPolicy\x1a\x1d.google.longrunning.Operation\"U\x82\xd3\xe4\x93\x02\x17\"\x12/v1/accessPolicies:\x01*\xca\x41\x35\n\x0c\x41\x63\x63\x65ssPolicy\x12%AccessContextManagerOperationMetadata\x12\xf8\x01\n\x12UpdateAccessPolicy\x12\x42.google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest\x1a\x1d.google.longrunning.Operation\"\x7f\x82\xd3\xe4\x93\x02,2\"/v1/{policy.name=accessPolicies/*}:\x06policy\xda\x41\x12policy,update_mask\xca\x41\x35\n\x0c\x41\x63\x63\x65ssPolicy\x12%AccessContextManagerOperationMetadata\x12\xe4\x01\n\x12\x44\x65leteAccessPolicy\x12\x42.google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest\x1a\x1d.google.longrunning.Operation\"k\x82\xd3\xe4\x93\x02\x1d*\x1b/v1/{name=accessPolicies/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\x12\xd4\x01\n\x10ListAccessLevels\x12@.google.identity.accesscontextmanager.v1.ListAccessLevelsRequest\x1a\x41.google.identity.accesscontextmanager.v1.ListAccessLevelsResponse\";\x82\xd3\xe4\x93\x02,\x12*/v1/{parent=accessPolicies/*}/accessLevels\xda\x41\x06parent\x12\xc1\x01\n\x0eGetAccessLevel\x12>.google.identity.accesscontextmanager.v1.GetAccessLevelRequest\x1a\x34.google.identity.accesscontextmanager.v1.AccessLevel\"9\x82\xd3\xe4\x93\x02,\x12*/v1/{name=accessPolicies/*/accessLevels/*}\xda\x41\x04name\x12\x85\x02\n\x11\x43reateAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.CreateAccessLevelRequest\x1a\x1d.google.longrunning.Operation\"\x8d\x01\x82\xd3\xe4\x93\x02:\"*/v1/{parent=accessPolicies/*}/accessLevels:\x0c\x61\x63\x63\x65ss_level\xda\x41\x13parent,access_level\xca\x41\x34\n\x0b\x41\x63\x63\x65ssLevel\x12%AccessContextManagerOperationMetadata\x12\x97\x02\n\x11UpdateAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest\x1a\x1d.google.longrunning.Operation\"\x9f\x01\x82\xd3\xe4\x93\x02G27/v1/{access_level.name=accessPolicies/*/accessLevels/*}:\x0c\x61\x63\x63\x65ss_level\xda\x41\x18\x61\x63\x63\x65ss_level,update_mask\xca\x41\x34\n\x0b\x41\x63\x63\x65ssLevel\x12%AccessContextManagerOperationMetadata\x12\xf1\x01\n\x11\x44\x65leteAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest\x1a\x1d.google.longrunning.Operation\"z\x82\xd3\xe4\x93\x02,**/v1/{name=accessPolicies/*/accessLevels/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\x12\x83\x02\n\x13ReplaceAccessLevels\x12\x43.google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest\x1a\x1d.google.longrunning.Operation\"\x87\x01\x82\xd3\xe4\x93\x02:\"5/v1/{parent=accessPolicies/*}/accessLevels:replaceAll:\x01*\xca\x41\x44\n\x1bReplaceAccessLevelsResponse\x12%AccessContextManagerOperationMetadata\x12\xe8\x01\n\x15ListServicePerimeters\x12\x45.google.identity.accesscontextmanager.v1.ListServicePerimetersRequest\x1a\x46.google.identity.accesscontextmanager.v1.ListServicePerimetersResponse\"@\x82\xd3\xe4\x93\x02\x31\x12//v1/{parent=accessPolicies/*}/servicePerimeters\xda\x41\x06parent\x12\xd5\x01\n\x13GetServicePerimeter\x12\x43.google.identity.accesscontextmanager.v1.GetServicePerimeterRequest\x1a\x39.google.identity.accesscontextmanager.v1.ServicePerimeter\">\x82\xd3\xe4\x93\x02\x31\x12//v1/{name=accessPolicies/*/servicePerimeters/*}\xda\x41\x04name\x12\xa3\x02\n\x16\x43reateServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest\x1a\x1d.google.longrunning.Operation\"\xa1\x01\x82\xd3\xe4\x93\x02\x44\"//v1/{parent=accessPolicies/*}/servicePerimeters:\x11service_perimeter\xda\x41\x18parent,service_perimeter\xca\x41\x39\n\x10ServicePerimeter\x12%AccessContextManagerOperationMetadata\x12\xba\x02\n\x16UpdateServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest\x1a\x1d.google.longrunning.Operation\"\xb8\x01\x82\xd3\xe4\x93\x02V2A/v1/{service_perimeter.name=accessPolicies/*/servicePerimeters/*}:\x11service_perimeter\xda\x41\x1dservice_perimeter,update_mask\xca\x41\x39\n\x10ServicePerimeter\x12%AccessContextManagerOperationMetadata\x12\x80\x02\n\x16\x44\x65leteServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest\x1a\x1d.google.longrunning.Operation\"\x7f\x82\xd3\xe4\x93\x02\x31*//v1/{name=accessPolicies/*/servicePerimeters/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\x12\x97\x02\n\x18ReplaceServicePerimeters\x12H.google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest\x1a\x1d.google.longrunning.Operation\"\x91\x01\x82\xd3\xe4\x93\x02?\":/v1/{parent=accessPolicies/*}/servicePerimeters:replaceAll:\x01*\xca\x41I\n ReplaceServicePerimetersResponse\x12%AccessContextManagerOperationMetadata\x12\x90\x02\n\x17\x43ommitServicePerimeters\x12G.google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest\x1a\x1d.google.longrunning.Operation\"\x8c\x01\x82\xd3\xe4\x93\x02;\"6/v1/{parent=accessPolicies/*}/servicePerimeters:commit:\x01*\xca\x41H\n\x1f\x43ommitServicePerimetersResponse\x12%AccessContextManagerOperationMetadata\x12\xf7\x01\n\x19ListGcpUserAccessBindings\x12I.google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest\x1aJ.google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse\"C\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{parent=organizations/*}/gcpUserAccessBindings\xda\x41\x06parent\x12\xe4\x01\n\x17GetGcpUserAccessBinding\x12G.google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest\x1a=.google.identity.accesscontextmanager.v1.GcpUserAccessBinding\"A\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{name=organizations/*/gcpUserAccessBindings/*}\xda\x41\x04name\x12\xbe\x02\n\x1a\x43reateGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation\"\xb4\x01\x82\xd3\xe4\x93\x02M\"2/v1/{parent=organizations/*}/gcpUserAccessBindings:\x17gcp_user_access_binding\xda\x41\x1eparent,gcp_user_access_binding\xca\x41=\n\x14GcpUserAccessBinding\x12%GcpUserAccessBindingOperationMetadata\x12\xdb\x02\n\x1aUpdateGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation\"\xd1\x01\x82\xd3\xe4\x93\x02\x65\x32J/v1/{gcp_user_access_binding.name=organizations/*/gcpUserAccessBindings/*}:\x17gcp_user_access_binding\xda\x41#gcp_user_access_binding,update_mask\xca\x41=\n\x14GcpUserAccessBinding\x12%GcpUserAccessBindingOperationMetadata\x12\x8c\x02\n\x1a\x44\x65leteGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation\"\x82\x01\x82\xd3\xe4\x93\x02\x34*2/v1/{name=organizations/*/gcpUserAccessBindings/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%GcpUserAccessBindingOperationMetadata\x12\x82\x01\n\x0cSetIamPolicy\x12\".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"7\x82\xd3\xe4\x93\x02\x31\",/v1/{resource=accessPolicies/*}:setIamPolicy:\x01*\x12\x82\x01\n\x0cGetIamPolicy\x12\".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy\"7\x82\xd3\xe4\x93\x02\x31\",/v1/{resource=accessPolicies/*}:getIamPolicy:\x01*\x12\xbf\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse\"\xd3\x01\x82\xd3\xe4\x93\x02\xcc\x01\"2/v1/{resource=accessPolicies/*}:testIamPermissions:\x01*ZF\"A/v1/{resource=accessPolicies/*/accessLevels/*}:testIamPermissions:\x01*ZK\"F/v1/{resource=accessPolicies/*/servicePerimeters/*}:testIamPermissions:\x01*\x1aW\xca\x41#accesscontextmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xb0\x02\n+com.google.identity.accesscontextmanager.v1B\x19\x41\x63\x63\x65ssContextManagerProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3"
22
+
23
+ pool = Google::Protobuf::DescriptorPool.generated_pool
24
+
25
+ begin
26
+ pool.add_serialized_file(descriptor_data)
27
+ rescue TypeError => e
28
+ # Compatibility code: will be removed in the next major version.
29
+ require 'google/protobuf/descriptor_pb'
30
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
31
+ parsed.clear_dependency
32
+ serialized = parsed.class.encode(parsed)
33
+ file = pool.add_serialized_file(serialized)
34
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
35
+ imports = [
36
+ ["google.identity.accesscontextmanager.v1.AccessPolicy", "google/identity/accesscontextmanager/v1/access_policy.proto"],
37
+ ["google.protobuf.FieldMask", "google/protobuf/field_mask.proto"],
38
+ ["google.identity.accesscontextmanager.v1.AccessLevel", "google/identity/accesscontextmanager/v1/access_level.proto"],
39
+ ["google.identity.accesscontextmanager.v1.ServicePerimeter", "google/identity/accesscontextmanager/v1/service_perimeter.proto"],
40
+ ["google.identity.accesscontextmanager.v1.GcpUserAccessBinding", "google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto"],
41
+ ]
42
+ imports.each do |type_name, expected_filename|
43
+ import_file = pool.lookup(type_name).file_descriptor
44
+ if import_file.name != expected_filename
45
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
142
46
  end
143
47
  end
48
+ warn "Each proto file must use a consistent fully-qualified name."
49
+ warn "This will become an error in the next major version."
144
50
  end
145
51
 
146
52
  module Google
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/identity/accesscontextmanager/v1/access_level.proto
3
4
 
@@ -8,52 +9,33 @@ require 'google/identity/accesscontextmanager/type/device_resources_pb'
8
9
  require 'google/protobuf/timestamp_pb'
9
10
  require 'google/type/expr_pb'
10
11
 
11
- Google::Protobuf::DescriptorPool.generated_pool.build do
12
- add_file("google/identity/accesscontextmanager/v1/access_level.proto", :syntax => :proto3) do
13
- add_message "google.identity.accesscontextmanager.v1.AccessLevel" do
14
- optional :name, :string, 1
15
- optional :title, :string, 2
16
- optional :description, :string, 3
17
- optional :create_time, :message, 6, "google.protobuf.Timestamp"
18
- optional :update_time, :message, 7, "google.protobuf.Timestamp"
19
- oneof :level do
20
- optional :basic, :message, 4, "google.identity.accesscontextmanager.v1.BasicLevel"
21
- optional :custom, :message, 5, "google.identity.accesscontextmanager.v1.CustomLevel"
22
- end
23
- end
24
- add_message "google.identity.accesscontextmanager.v1.BasicLevel" do
25
- repeated :conditions, :message, 1, "google.identity.accesscontextmanager.v1.Condition"
26
- optional :combining_function, :enum, 2, "google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction"
27
- end
28
- add_enum "google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction" do
29
- value :AND, 0
30
- value :OR, 1
31
- end
32
- add_message "google.identity.accesscontextmanager.v1.Condition" do
33
- repeated :ip_subnetworks, :string, 1
34
- optional :device_policy, :message, 2, "google.identity.accesscontextmanager.v1.DevicePolicy"
35
- repeated :required_access_levels, :string, 3
36
- optional :negate, :bool, 5
37
- repeated :members, :string, 6
38
- repeated :regions, :string, 7
39
- end
40
- add_message "google.identity.accesscontextmanager.v1.CustomLevel" do
41
- optional :expr, :message, 1, "google.type.Expr"
42
- end
43
- add_message "google.identity.accesscontextmanager.v1.DevicePolicy" do
44
- optional :require_screenlock, :bool, 1
45
- repeated :allowed_encryption_statuses, :enum, 2, "google.identity.accesscontextmanager.type.DeviceEncryptionStatus"
46
- repeated :os_constraints, :message, 3, "google.identity.accesscontextmanager.v1.OsConstraint"
47
- repeated :allowed_device_management_levels, :enum, 6, "google.identity.accesscontextmanager.type.DeviceManagementLevel"
48
- optional :require_admin_approval, :bool, 7
49
- optional :require_corp_owned, :bool, 8
50
- end
51
- add_message "google.identity.accesscontextmanager.v1.OsConstraint" do
52
- optional :os_type, :enum, 1, "google.identity.accesscontextmanager.type.OsType"
53
- optional :minimum_version, :string, 2
54
- optional :require_verified_chrome_os, :bool, 3
12
+
13
+ descriptor_data = "\n:google/identity/accesscontextmanager/v1/access_level.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x19google/api/resource.proto\x1a@google/identity/accesscontextmanager/type/device_resources.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x16google/type/expr.proto\"\xaa\x03\n\x0b\x41\x63\x63\x65ssLevel\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\r\n\x05title\x18\x02 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x03 \x01(\t\x12\x44\n\x05\x62\x61sic\x18\x04 \x01(\x0b\x32\x33.google.identity.accesscontextmanager.v1.BasicLevelH\x00\x12\x46\n\x06\x63ustom\x18\x05 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.CustomLevelH\x00\x12/\n\x0b\x63reate_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp:p\xea\x41m\n/accesscontextmanager.googleapis.com/AccessLevel\x12:accessPolicies/{access_policy}/accessLevels/{access_level}B\x07\n\x05level\"\xef\x01\n\nBasicLevel\x12\x46\n\nconditions\x18\x01 \x03(\x0b\x32\x32.google.identity.accesscontextmanager.v1.Condition\x12j\n\x12\x63ombining_function\x18\x02 \x01(\x0e\x32N.google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction\"-\n\x1a\x43onditionCombiningFunction\x12\x07\n\x03\x41ND\x10\x00\x12\x06\n\x02OR\x10\x01\"\xc3\x01\n\tCondition\x12\x16\n\x0eip_subnetworks\x18\x01 \x03(\t\x12L\n\rdevice_policy\x18\x02 \x01(\x0b\x32\x35.google.identity.accesscontextmanager.v1.DevicePolicy\x12\x1e\n\x16required_access_levels\x18\x03 \x03(\t\x12\x0e\n\x06negate\x18\x05 \x01(\x08\x12\x0f\n\x07members\x18\x06 \x03(\t\x12\x0f\n\x07regions\x18\x07 \x03(\t\".\n\x0b\x43ustomLevel\x12\x1f\n\x04\x65xpr\x18\x01 \x01(\x0b\x32\x11.google.type.Expr\"\x89\x03\n\x0c\x44\x65vicePolicy\x12\x1a\n\x12require_screenlock\x18\x01 \x01(\x08\x12\x66\n\x1b\x61llowed_encryption_statuses\x18\x02 \x03(\x0e\x32\x41.google.identity.accesscontextmanager.type.DeviceEncryptionStatus\x12M\n\x0eos_constraints\x18\x03 \x03(\x0b\x32\x35.google.identity.accesscontextmanager.v1.OsConstraint\x12j\n allowed_device_management_levels\x18\x06 \x03(\x0e\x32@.google.identity.accesscontextmanager.type.DeviceManagementLevel\x12\x1e\n\x16require_admin_approval\x18\x07 \x01(\x08\x12\x1a\n\x12require_corp_owned\x18\x08 \x01(\x08\"\x8f\x01\n\x0cOsConstraint\x12\x42\n\x07os_type\x18\x01 \x01(\x0e\x32\x31.google.identity.accesscontextmanager.type.OsType\x12\x17\n\x0fminimum_version\x18\x02 \x01(\t\x12\"\n\x1arequire_verified_chrome_os\x18\x03 \x01(\x08\x42\xa7\x02\n+com.google.identity.accesscontextmanager.v1B\x10\x41\x63\x63\x65ssLevelProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3"
14
+
15
+ pool = Google::Protobuf::DescriptorPool.generated_pool
16
+
17
+ begin
18
+ pool.add_serialized_file(descriptor_data)
19
+ rescue TypeError => e
20
+ # Compatibility code: will be removed in the next major version.
21
+ require 'google/protobuf/descriptor_pb'
22
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
23
+ parsed.clear_dependency
24
+ serialized = parsed.class.encode(parsed)
25
+ file = pool.add_serialized_file(serialized)
26
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
27
+ imports = [
28
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
29
+ ["google.type.Expr", "google/type/expr.proto"],
30
+ ]
31
+ imports.each do |type_name, expected_filename|
32
+ import_file = pool.lookup(type_name).file_descriptor
33
+ if import_file.name != expected_filename
34
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
55
35
  end
56
36
  end
37
+ warn "Each proto file must use a consistent fully-qualified name."
38
+ warn "This will become an error in the next major version."
57
39
  end
58
40
 
59
41
  module Google
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/identity/accesscontextmanager/v1/access_policy.proto
3
4
 
@@ -6,18 +7,32 @@ require 'google/protobuf'
6
7
  require 'google/api/resource_pb'
7
8
  require 'google/protobuf/timestamp_pb'
8
9
 
9
- Google::Protobuf::DescriptorPool.generated_pool.build do
10
- add_file("google/identity/accesscontextmanager/v1/access_policy.proto", :syntax => :proto3) do
11
- add_message "google.identity.accesscontextmanager.v1.AccessPolicy" do
12
- optional :name, :string, 1
13
- optional :parent, :string, 2
14
- optional :title, :string, 3
15
- repeated :scopes, :string, 7
16
- optional :create_time, :message, 4, "google.protobuf.Timestamp"
17
- optional :update_time, :message, 5, "google.protobuf.Timestamp"
18
- optional :etag, :string, 6
10
+
11
+ descriptor_data = "\n;google/identity/accesscontextmanager/v1/access_policy.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\x92\x02\n\x0c\x41\x63\x63\x65ssPolicy\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x0e\n\x06parent\x18\x02 \x01(\t\x12\r\n\x05title\x18\x03 \x01(\t\x12\x0e\n\x06scopes\x18\x07 \x03(\t\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x0c\n\x04\x65tag\x18\x06 \x01(\t:U\xea\x41R\n0accesscontextmanager.googleapis.com/AccessPolicy\x12\x1e\x61\x63\x63\x65ssPolicies/{access_policy}B\xa2\x02\n+com.google.identity.accesscontextmanager.v1B\x0bPolicyProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3"
12
+
13
+ pool = Google::Protobuf::DescriptorPool.generated_pool
14
+
15
+ begin
16
+ pool.add_serialized_file(descriptor_data)
17
+ rescue TypeError => e
18
+ # Compatibility code: will be removed in the next major version.
19
+ require 'google/protobuf/descriptor_pb'
20
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
21
+ parsed.clear_dependency
22
+ serialized = parsed.class.encode(parsed)
23
+ file = pool.add_serialized_file(serialized)
24
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
25
+ imports = [
26
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
27
+ ]
28
+ imports.each do |type_name, expected_filename|
29
+ import_file = pool.lookup(type_name).file_descriptor
30
+ if import_file.name != expected_filename
31
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
19
32
  end
20
33
  end
34
+ warn "Each proto file must use a consistent fully-qualified name."
35
+ warn "This will become an error in the next major version."
21
36
  end
22
37
 
23
38
  module Google
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto
3
4
 
@@ -6,14 +7,31 @@ require 'google/protobuf'
6
7
  require 'google/api/field_behavior_pb'
7
8
  require 'google/api/resource_pb'
8
9
 
9
- Google::Protobuf::DescriptorPool.generated_pool.build do
10
- add_file("google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto", :syntax => :proto3) do
11
- add_message "google.identity.accesscontextmanager.v1.GcpUserAccessBinding" do
12
- optional :name, :string, 1
13
- optional :group_key, :string, 2
14
- repeated :access_levels, :string, 3
10
+
11
+ descriptor_data = "\nEgoogle/identity/accesscontextmanager/v1/gcp_user_access_binding.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\"\xa3\x02\n\x14GcpUserAccessBinding\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x05\x12\x19\n\tgroup_key\x18\x02 \x01(\tB\x06\xe0\x41\x02\xe0\x41\x05\x12N\n\raccess_levels\x18\x03 \x03(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel:\x8c\x01\xea\x41\x88\x01\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding\x12Lorganizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}B\xb0\x02\n+com.google.identity.accesscontextmanager.v1B\x19GcpUserAccessBindingProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3"
12
+
13
+ pool = Google::Protobuf::DescriptorPool.generated_pool
14
+
15
+ begin
16
+ pool.add_serialized_file(descriptor_data)
17
+ rescue TypeError => e
18
+ # Compatibility code: will be removed in the next major version.
19
+ require 'google/protobuf/descriptor_pb'
20
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
21
+ parsed.clear_dependency
22
+ serialized = parsed.class.encode(parsed)
23
+ file = pool.add_serialized_file(serialized)
24
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
25
+ imports = [
26
+ ]
27
+ imports.each do |type_name, expected_filename|
28
+ import_file = pool.lookup(type_name).file_descriptor
29
+ if import_file.name != expected_filename
30
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
15
31
  end
16
32
  end
33
+ warn "Each proto file must use a consistent fully-qualified name."
34
+ warn "This will become an error in the next major version."
17
35
  end
18
36
 
19
37
  module Google
@@ -1,3 +1,4 @@
1
+ # frozen_string_literal: true
1
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
2
3
  # source: google/identity/accesscontextmanager/v1/service_perimeter.proto
3
4
 
@@ -6,84 +7,32 @@ require 'google/protobuf'
6
7
  require 'google/api/resource_pb'
7
8
  require 'google/protobuf/timestamp_pb'
8
9
 
9
- Google::Protobuf::DescriptorPool.generated_pool.build do
10
- add_file("google/identity/accesscontextmanager/v1/service_perimeter.proto", :syntax => :proto3) do
11
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeter" do
12
- optional :name, :string, 1
13
- optional :title, :string, 2
14
- optional :description, :string, 3
15
- optional :create_time, :message, 4, "google.protobuf.Timestamp"
16
- optional :update_time, :message, 5, "google.protobuf.Timestamp"
17
- optional :perimeter_type, :enum, 6, "google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType"
18
- optional :status, :message, 7, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig"
19
- optional :spec, :message, 8, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig"
20
- optional :use_explicit_dry_run_spec, :bool, 9
21
- end
22
- add_enum "google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType" do
23
- value :PERIMETER_TYPE_REGULAR, 0
24
- value :PERIMETER_TYPE_BRIDGE, 1
25
- end
26
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig" do
27
- repeated :resources, :string, 1
28
- repeated :access_levels, :string, 2
29
- repeated :restricted_services, :string, 4
30
- optional :vpc_accessible_services, :message, 10, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices"
31
- repeated :ingress_policies, :message, 8, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy"
32
- repeated :egress_policies, :message, 9, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy"
33
- end
34
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices" do
35
- optional :enable_restriction, :bool, 1
36
- repeated :allowed_services, :string, 2
37
- end
38
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector" do
39
- oneof :kind do
40
- optional :method, :string, 1
41
- optional :permission, :string, 2
42
- end
43
- end
44
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation" do
45
- optional :service_name, :string, 1
46
- repeated :method_selectors, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector"
47
- end
48
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource" do
49
- oneof :source do
50
- optional :access_level, :string, 1
51
- optional :resource, :string, 2
52
- end
53
- end
54
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom" do
55
- repeated :sources, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource"
56
- repeated :identities, :string, 2
57
- optional :identity_type, :enum, 3, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType"
58
- end
59
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo" do
60
- repeated :operations, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation"
61
- repeated :resources, :string, 2
62
- end
63
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy" do
64
- optional :ingress_from, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom"
65
- optional :ingress_to, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo"
66
- end
67
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom" do
68
- repeated :identities, :string, 1
69
- optional :identity_type, :enum, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType"
70
- end
71
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo" do
72
- repeated :resources, :string, 1
73
- repeated :operations, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation"
74
- repeated :external_resources, :string, 3
75
- end
76
- add_message "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy" do
77
- optional :egress_from, :message, 1, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom"
78
- optional :egress_to, :message, 2, "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo"
79
- end
80
- add_enum "google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType" do
81
- value :IDENTITY_TYPE_UNSPECIFIED, 0
82
- value :ANY_IDENTITY, 1
83
- value :ANY_USER_ACCOUNT, 2
84
- value :ANY_SERVICE_ACCOUNT, 3
10
+
11
+ descriptor_data = "\n?google/identity/accesscontextmanager/v1/service_perimeter.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\x93\x05\n\x10ServicePerimeter\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\r\n\x05title\x18\x02 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x03 \x01(\t\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12_\n\x0eperimeter_type\x18\x06 \x01(\x0e\x32G.google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType\x12O\n\x06status\x18\x07 \x01(\x0b\x32?.google.identity.accesscontextmanager.v1.ServicePerimeterConfig\x12M\n\x04spec\x18\x08 \x01(\x0b\x32?.google.identity.accesscontextmanager.v1.ServicePerimeterConfig\x12!\n\x19use_explicit_dry_run_spec\x18\t \x01(\x08\"F\n\rPerimeterType\x12\x1a\n\x16PERIMETER_TYPE_REGULAR\x10\x00\x12\x19\n\x15PERIMETER_TYPE_BRIDGE\x10\x01:\x7f\xea\x41|\n4accesscontextmanager.googleapis.com/ServicePerimeter\x12\x44\x61\x63\x63\x65ssPolicies/{access_policy}/servicePerimeters/{service_perimeter}\"\xb5\x0f\n\x16ServicePerimeterConfig\x12\x11\n\tresources\x18\x01 \x03(\t\x12\x15\n\raccess_levels\x18\x02 \x03(\t\x12\x1b\n\x13restricted_services\x18\x04 \x03(\t\x12v\n\x17vpc_accessible_services\x18\n \x01(\x0b\x32U.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices\x12g\n\x10ingress_policies\x18\x08 \x03(\x0b\x32M.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy\x12\x65\n\x0f\x65gress_policies\x18\t \x03(\x0b\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\x1aM\n\x15VpcAccessibleServices\x12\x1a\n\x12\x65nable_restriction\x18\x01 \x01(\x08\x12\x18\n\x10\x61llowed_services\x18\x02 \x03(\t\x1a@\n\x0eMethodSelector\x12\x10\n\x06method\x18\x01 \x01(\tH\x00\x12\x14\n\npermission\x18\x02 \x01(\tH\x00\x42\x06\n\x04kind\x1a\x8e\x01\n\x0c\x41piOperation\x12\x14\n\x0cservice_name\x18\x01 \x01(\t\x12h\n\x10method_selectors\x18\x02 \x03(\x0b\x32N.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector\x1a\x45\n\rIngressSource\x12\x16\n\x0c\x61\x63\x63\x65ss_level\x18\x01 \x01(\tH\x00\x12\x12\n\x08resource\x18\x02 \x01(\tH\x00\x42\x08\n\x06source\x1a\xe6\x01\n\x0bIngressFrom\x12^\n\x07sources\x18\x01 \x03(\x0b\x32M.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource\x12\x12\n\nidentities\x18\x02 \x03(\t\x12\x63\n\ridentity_type\x18\x03 \x01(\x0e\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType\x1a\x80\x01\n\tIngressTo\x12`\n\noperations\x18\x01 \x03(\x0b\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\x12\x11\n\tresources\x18\x02 \x03(\t\x1a\xd1\x01\n\rIngressPolicy\x12\x61\n\x0cingress_from\x18\x01 \x01(\x0b\x32K.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom\x12]\n\ningress_to\x18\x02 \x01(\x0b\x32I.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo\x1a\x85\x01\n\nEgressFrom\x12\x12\n\nidentities\x18\x01 \x03(\t\x12\x63\n\ridentity_type\x18\x02 \x01(\x0e\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType\x1a\x9b\x01\n\x08\x45gressTo\x12\x11\n\tresources\x18\x01 \x03(\t\x12`\n\noperations\x18\x02 \x03(\x0b\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\x12\x1a\n\x12\x65xternal_resources\x18\x03 \x03(\t\x1a\xcc\x01\n\x0c\x45gressPolicy\x12_\n\x0b\x65gress_from\x18\x01 \x01(\x0b\x32J.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom\x12[\n\tegress_to\x18\x02 \x01(\x0b\x32H.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo\"n\n\x0cIdentityType\x12\x1d\n\x19IDENTITY_TYPE_UNSPECIFIED\x10\x00\x12\x10\n\x0c\x41NY_IDENTITY\x10\x01\x12\x14\n\x10\x41NY_USER_ACCOUNT\x10\x02\x12\x17\n\x13\x41NY_SERVICE_ACCOUNT\x10\x03\x42\xac\x02\n+com.google.identity.accesscontextmanager.v1B\x15ServicePerimeterProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3"
12
+
13
+ pool = Google::Protobuf::DescriptorPool.generated_pool
14
+
15
+ begin
16
+ pool.add_serialized_file(descriptor_data)
17
+ rescue TypeError => e
18
+ # Compatibility code: will be removed in the next major version.
19
+ require 'google/protobuf/descriptor_pb'
20
+ parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
21
+ parsed.clear_dependency
22
+ serialized = parsed.class.encode(parsed)
23
+ file = pool.add_serialized_file(serialized)
24
+ warn "Warning: Protobuf detected an import path issue while loading generated file #{__FILE__}"
25
+ imports = [
26
+ ["google.protobuf.Timestamp", "google/protobuf/timestamp.proto"],
27
+ ]
28
+ imports.each do |type_name, expected_filename|
29
+ import_file = pool.lookup(type_name).file_descriptor
30
+ if import_file.name != expected_filename
31
+ warn "- #{file.name} imports #{expected_filename}, but that import was loaded as #{import_file.name}"
85
32
  end
86
33
  end
34
+ warn "Each proto file must use a consistent fully-qualified name."
35
+ warn "This will become an error in the next major version."
87
36
  end
88
37
 
89
38
  module Google
@@ -35,7 +35,9 @@ module Google
35
35
  # Details about how and where to publish client libraries.
36
36
  # @!attribute [rw] version
37
37
  # @return [::String]
38
- # Version of the API to apply these settings to.
38
+ # Version of the API to apply these settings to. This is the full protobuf
39
+ # package for the API, ending in the version element.
40
+ # Examples: "google.cloud.speech.v1" and "google.spanner.admin.database.v1".
39
41
  # @!attribute [rw] launch_stage
40
42
  # @return [::Google::Api::LaunchStage]
41
43
  # Launch stage of this version of the API.
@@ -81,7 +83,7 @@ module Google
81
83
  # long-running operation pattern.
82
84
  # @!attribute [rw] new_issue_uri
83
85
  # @return [::String]
84
- # Link to a place that API users can report issues. Example:
86
+ # Link to a *public* URI where users can report issues. Example:
85
87
  # https://issuetracker.google.com/issues/new?component=190865&template=1161103
86
88
  # @!attribute [rw] documentation_uri
87
89
  # @return [::String]
@@ -111,6 +113,10 @@ module Google
111
113
  # Client library settings. If the same version string appears multiple
112
114
  # times in this list, then the last one wins. Settings from earlier
113
115
  # settings with the same version string are discarded.
116
+ # @!attribute [rw] proto_reference_documentation_uri
117
+ # @return [::String]
118
+ # Optional link to proto reference documentation. Example:
119
+ # https://cloud.google.com/pubsub/lite/docs/reference/rpc
114
120
  class Publishing
115
121
  include ::Google::Protobuf::MessageExts
116
122
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -203,9 +209,57 @@ module Google
203
209
  # @!attribute [rw] common
204
210
  # @return [::Google::Api::CommonLanguageSettings]
205
211
  # Some settings.
212
+ # @!attribute [rw] renamed_services
213
+ # @return [::Google::Protobuf::Map{::String => ::String}]
214
+ # Map from original service names to renamed versions.
215
+ # This is used when the default generated types
216
+ # would cause a naming conflict. (Neither name is
217
+ # fully-qualified.)
218
+ # Example: Subscriber to SubscriberServiceApi.
219
+ # @!attribute [rw] renamed_resources
220
+ # @return [::Google::Protobuf::Map{::String => ::String}]
221
+ # Map from full resource types to the effective short name
222
+ # for the resource. This is used when otherwise resource
223
+ # named from different services would cause naming collisions.
224
+ # Example entry:
225
+ # "datalabeling.googleapis.com/Dataset": "DataLabelingDataset"
226
+ # @!attribute [rw] ignored_resources
227
+ # @return [::Array<::String>]
228
+ # List of full resource types to ignore during generation.
229
+ # This is typically used for API-specific Location resources,
230
+ # which should be handled by the generator as if they were actually
231
+ # the common Location resources.
232
+ # Example entry: "documentai.googleapis.com/Location"
233
+ # @!attribute [rw] forced_namespace_aliases
234
+ # @return [::Array<::String>]
235
+ # Namespaces which must be aliased in snippets due to
236
+ # a known (but non-generator-predictable) naming collision
237
+ # @!attribute [rw] handwritten_signatures
238
+ # @return [::Array<::String>]
239
+ # Method signatures (in the form "service.method(signature)")
240
+ # which are provided separately, so shouldn't be generated.
241
+ # Snippets *calling* these methods are still generated, however.
206
242
  class DotnetSettings
207
243
  include ::Google::Protobuf::MessageExts
208
244
  extend ::Google::Protobuf::MessageExts::ClassMethods
245
+
246
+ # @!attribute [rw] key
247
+ # @return [::String]
248
+ # @!attribute [rw] value
249
+ # @return [::String]
250
+ class RenamedServicesEntry
251
+ include ::Google::Protobuf::MessageExts
252
+ extend ::Google::Protobuf::MessageExts::ClassMethods
253
+ end
254
+
255
+ # @!attribute [rw] key
256
+ # @return [::String]
257
+ # @!attribute [rw] value
258
+ # @return [::String]
259
+ class RenamedResourcesEntry
260
+ include ::Google::Protobuf::MessageExts
261
+ extend ::Google::Protobuf::MessageExts::ClassMethods
262
+ end
209
263
  end
210
264
 
211
265
  # Settings for Ruby client libraries.
@@ -240,8 +294,8 @@ module Google
240
294
  # Example of a YAML configuration::
241
295
  #
242
296
  # publishing:
243
- # method_behavior:
244
- # - selector: CreateAdDomain
297
+ # method_settings:
298
+ # - selector: google.cloud.speech.v2.Speech.BatchRecognize
245
299
  # long_running:
246
300
  # initial_poll_delay:
247
301
  # seconds: 60 # 1 minute
@@ -299,6 +353,15 @@ module Google
299
353
 
300
354
  # Street View Org.
301
355
  STREET_VIEW = 4
356
+
357
+ # Shopping Org.
358
+ SHOPPING = 5
359
+
360
+ # Geo Org.
361
+ GEO = 6
362
+
363
+ # Generative AI - https://developers.generativeai.google
364
+ GENERATIVE_AI = 7
302
365
  end
303
366
 
304
367
  # To where should client libraries be published?
@@ -35,7 +35,8 @@ module Google
35
35
  # only if the expression evaluates to `true`. A condition can add constraints
36
36
  # based on attributes of the request, the resource, or both. To learn which
37
37
  # resources support conditions in their IAM policies, see the
38
- # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
38
+ # [IAM
39
+ # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
39
40
  #
40
41
  # **JSON example:**
41
42
  #
@@ -58,7 +59,8 @@ module Google
58
59
  # "condition": {
59
60
  # "title": "expirable access",
60
61
  # "description": "Does not grant access after Sep 2020",
61
- # "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')",
62
+ # "expression": "request.time <
63
+ # timestamp('2020-10-01T00:00:00.000Z')",
62
64
  # }
63
65
  # }
64
66
  # ],
@@ -112,7 +114,8 @@ module Google
112
114
  # specify any valid version or leave the field unset.
113
115
  #
114
116
  # To learn which resources support conditions in their IAM policies, see the
115
- # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
117
+ # [IAM
118
+ # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
116
119
  # @!attribute [rw] bindings
117
120
  # @return [::Array<::Google::Iam::V1::Binding>]
118
121
  # Associates a list of `members`, or principals, with a `role`. Optionally,
@@ -305,7 +308,8 @@ module Google
305
308
  # @return [::Array<::String>]
306
309
  # Specifies the identities that do not cause logging for this type of
307
310
  # permission.
308
- # Follows the same format of {::Google::Iam::V1::Binding#members Binding.members}.
311
+ # Follows the same format of
312
+ # {::Google::Iam::V1::Binding#members Binding.members}.
309
313
  class AuditLogConfig
310
314
  include ::Google::Protobuf::MessageExts
311
315
  extend ::Google::Protobuf::MessageExts::ClassMethods
@@ -43,8 +43,12 @@ module Google
43
43
  # if (any.is(Foo.class)) {
44
44
  # foo = any.unpack(Foo.class);
45
45
  # }
46
+ # // or ...
47
+ # if (any.isSameTypeAs(Foo.getDefaultInstance())) {
48
+ # foo = any.unpack(Foo.getDefaultInstance());
49
+ # }
46
50
  #
47
- # Example 3: Pack and unpack a message in Python.
51
+ # Example 3: Pack and unpack a message in Python.
48
52
  #
49
53
  # foo = Foo(...)
50
54
  # any = Any()
@@ -54,7 +58,7 @@ module Google
54
58
  # any.Unpack(foo)
55
59
  # ...
56
60
  #
57
- # Example 4: Pack and unpack a message in Go
61
+ # Example 4: Pack and unpack a message in Go
58
62
  #
59
63
  # foo := &pb.Foo{...}
60
64
  # any, err := anypb.New(foo)
@@ -73,9 +77,8 @@ module Google
73
77
  # in the type URL, for example "foo.bar.com/x/y.z" will yield type
74
78
  # name "y.z".
75
79
  #
76
- #
77
80
  # JSON
78
- #
81
+ # ====
79
82
  # The JSON representation of an `Any` value uses the regular
80
83
  # representation of the deserialized, embedded message, with an
81
84
  # additional field `@type` which contains the type URL. Example:
@@ -69,7 +69,6 @@ module Google
69
69
  # Timestamp timestamp = Timestamp.newBuilder().setSeconds(millis / 1000)
70
70
  # .setNanos((int) ((millis % 1000) * 1000000)).build();
71
71
  #
72
- #
73
72
  # Example 5: Compute Timestamp from Java `Instant.now()`.
74
73
  #
75
74
  # Instant now = Instant.now();
@@ -78,7 +77,6 @@ module Google
78
77
  # Timestamp.newBuilder().setSeconds(now.getEpochSecond())
79
78
  # .setNanos(now.getNano()).build();
80
79
  #
81
- #
82
80
  # Example 6: Compute Timestamp from current time in Python.
83
81
  #
84
82
  # timestamp = Timestamp()
@@ -108,7 +106,7 @@ module Google
108
106
  # [`strftime`](https://docs.python.org/2/library/time.html#time.strftime) with
109
107
  # the time format spec '%Y-%m-%dT%H:%M:%S.%fZ'. Likewise, in Java, one can use
110
108
  # the Joda Time's [`ISODateTimeFormat.dateTime()`](
111
- # http://www.joda.org/joda-time/apidocs/org/joda/time/format/ISODateTimeFormat.html#dateTime%2D%2D
109
+ # http://joda-time.sourceforge.net/apidocs/org/joda/time/format/ISODateTimeFormat.html#dateTime()
112
110
  # ) to obtain a formatter capable of generating timestamps in this format.
113
111
  # @!attribute [rw] seconds
114
112
  # @return [::Integer]
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-identity-access_context_manager-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.0
4
+ version: 0.5.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-03-08 00:00:00.000000000 Z
11
+ date: 2023-06-06 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: gapic-common
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: 0.18.0
19
+ version: 0.19.1
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: 0.18.0
29
+ version: 0.19.1
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a