@maxim_mazurok/gapi.client.cloudasset-v1p1beta1 0.0.20231111 → 0.0.20231208

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/index.d.ts CHANGED
@@ -9,938 +9,478 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://cloudasset.googleapis.com/$discovery/rest?version=v1p1beta1
12
- // Revision: 20231111
12
+ // Revision: 20231208
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
16
16
  declare namespace gapi.client {
17
- /** Load Cloud Asset API v1p1beta1 */
18
- function load(urlOrObject: "https://cloudasset.googleapis.com/$discovery/rest?version=v1p1beta1"): Promise<void>;
19
- /** @deprecated Please load APIs with discovery documents. */
20
- function load(name: "cloudasset", version: "v1p1beta1"): Promise<void>;
21
- /** @deprecated Please load APIs with discovery documents. */
22
- function load(name: "cloudasset", version: "v1p1beta1", callback: () => any): void;
17
+ /** Load Cloud Asset API v1p1beta1 */
18
+ function load(
19
+ urlOrObject: 'https://cloudasset.googleapis.com/$discovery/rest?version=v1p1beta1'
20
+ ): Promise<void>;
21
+ /** @deprecated Please load APIs with discovery documents. */
22
+ function load(name: 'cloudasset', version: 'v1p1beta1'): Promise<void>;
23
+ /** @deprecated Please load APIs with discovery documents. */
24
+ function load(
25
+ name: 'cloudasset',
26
+ version: 'v1p1beta1',
27
+ callback: () => any
28
+ ): void;
23
29
 
24
- namespace cloudasset {
25
- interface AnalyzeIamPolicyLongrunningMetadata {
26
- /** Output only. The time the operation was created. */
27
- createTime?:
28
- string;
29
- }
30
- // tslint:disable-next-line:no-empty-interface
31
- interface AnalyzeIamPolicyLongrunningResponse {
32
- }
33
- interface AuditConfig {
34
- /** The configuration for logging of each type of permission. */
35
- auditLogConfigs?:
36
- AuditLogConfig[];
37
- /**
38
- * Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all
39
- * services.
40
- */
41
- service?:
42
- string;
43
- }
44
- interface AuditLogConfig {
45
- /** Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members. */
46
- exemptedMembers?:
47
- string[];
48
- /** The log type that this config enables. */
49
- logType?:
50
- string;
51
- }
52
- interface Binding {
53
- /**
54
- * The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`,
55
- * then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which
56
- * resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
57
- */
58
- condition?:
59
- Expr;
60
- /**
61
- * Specifies the principals requesting access for a Google Cloud resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on
62
- * the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service
63
- * account. Does not include identities that come from external identity providers (IdPs) through identity federation. * `user:{emailid}`: An email address that represents a specific
64
- * Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a Google service account. For example,
65
- * `my-other-app@appspot.gserviceaccount.com`. * `serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]`: An identifier for a [Kubernetes service
66
- * account](https://cloud.google.com/kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-project.svc.id.goog[my-namespace/my-kubernetes-sa]`. *
67
- * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `domain:{domain}`: The G Suite domain (primary) that represents all the
68
- * users of that domain. For example, `google.com` or `example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has
69
- * been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains
70
- * the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently
71
- * deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and
72
- * the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that
73
- * has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group
74
- * retains the role in the binding.
75
- */
76
- members?:
77
- string[];
78
- /** Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. */
79
- role?:
80
- string;
81
- }
82
- interface Explanation {
83
- /**
84
- * The map from roles to their included permission matching the permission query (e.g. containing `policy.role.permissions:`). Example role string: "roles/compute.instanceAdmin". The
85
- * roles can also be found in the returned `policy` bindings. Note that the map is populated only if requesting with a permission query.
86
- */
87
- matchedPermissions?:
88
- { [P in string]: Permissions };
89
- }
90
- interface Expr {
91
- /** Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI. */
92
- description?:
93
- string;
94
- /** Textual representation of an expression in Common Expression Language syntax. */
95
- expression?:
96
- string;
97
- /** Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file. */
98
- location?:
99
- string;
100
- /** Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression. */
101
- title?:
102
- string;
103
- }
104
- interface GoogleCloudAssetV1p7beta1Asset {
105
- /** Please also refer to the [access level user guide](https://cloud.google.com/access-context-manager/docs/overview#access-levels). */
106
- accessLevel?:
107
- GoogleIdentityAccesscontextmanagerV1AccessLevel;
108
- /** Please also refer to the [access policy user guide](https://cloud.google.com/access-context-manager/docs/overview#access-policies). */
109
- accessPolicy?:
110
- GoogleIdentityAccesscontextmanagerV1AccessPolicy;
111
- /**
112
- * The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of
113
- * relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path
114
- * starts from the asset itself. Example: `["projects/123456789", "folders/5432", "organizations/1234"]`
115
- */
116
- ancestors?:
117
- string[];
118
- /** The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types) for more information. */
119
- assetType?:
120
- string;
121
- /**
122
- * A representation of the IAM policy set on a Google Cloud resource. There can be a maximum of one IAM policy set on any given resource. In addition, IAM policies inherit their
123
- * granted access scope from any policies set on parent resources in the resource hierarchy. Therefore, the effectively policy is the union of both the policy set on this resource and
124
- * each policy set on all of the resource's ancestry resource levels in the hierarchy. See [this topic](https://cloud.google.com/iam/help/allow-policies/inheritance) for more
125
- * information.
126
- */
127
- iamPolicy?:
128
- Policy;
129
- /**
130
- * The full name of the asset. Example: `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1` See [Resource
131
- * names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information.
132
- */
133
- name?:
134
- string;
135
- /**
136
- * A representation of an [organization policy](https://cloud.google.com/resource-manager/docs/organization-policy/overview#organization_policy). There can be more than one
137
- * organization policy with different constraints set on a given resource.
138
- */
139
- orgPolicy?:
140
- GoogleCloudOrgpolicyV1Policy[];
141
- /** The related assets of the asset of one relationship type. One asset only represents one type of relationship. */
142
- relatedAssets?:
143
- GoogleCloudAssetV1p7beta1RelatedAssets;
144
- /** A representation of the resource. */
145
- resource?:
146
- GoogleCloudAssetV1p7beta1Resource;
147
- /** Please also refer to the [service perimeter user guide](https://cloud.google.com/vpc-service-controls/docs/overview). */
148
- servicePerimeter?:
149
- GoogleIdentityAccesscontextmanagerV1ServicePerimeter;
150
- /** The last update timestamp of an asset. update_time is updated when create/update/delete operation is performed. */
151
- updateTime?:
152
- string;
153
- }
154
- interface GoogleCloudAssetV1p7beta1RelatedAsset {
155
- /**
156
- * The ancestors of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative
157
- * resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. Example: `["projects/123456789", "folders/5432", "organizations/1234"]`
158
- */
159
- ancestors?:
160
- string[];
161
- /**
162
- * The full name of the asset. Example: `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1` See [Resource
163
- * names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information.
164
- */
165
- asset?:
166
- string;
167
- /** The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types) for more information. */
168
- assetType?:
169
- string;
170
- }
171
- interface GoogleCloudAssetV1p7beta1RelatedAssets {
172
- /** The peer resources of the relationship. */
173
- assets?:
174
- GoogleCloudAssetV1p7beta1RelatedAsset[];
175
- /** The detailed relation attributes. */
176
- relationshipAttributes?:
177
- GoogleCloudAssetV1p7beta1RelationshipAttributes;
178
- }
179
- interface GoogleCloudAssetV1p7beta1RelationshipAttributes {
180
- /** The detail of the relationship, e.g. `contains`, `attaches` */
181
- action?:
182
- string;
183
- /** The source asset type. Example: `compute.googleapis.com/Instance` */
184
- sourceResourceType?:
185
- string;
186
- /** The target asset type. Example: `compute.googleapis.com/Disk` */
187
- targetResourceType?:
188
- string;
189
- /** The unique identifier of the relationship type. Example: `INSTANCE_TO_INSTANCEGROUP` */
190
- type?:
191
- string;
192
- }
193
- interface GoogleCloudAssetV1p7beta1Resource {
194
- /** The content of the resource, in which some sensitive fields are removed and may not be present. */
195
- data?:
196
- { [P in string]: any };
197
- /**
198
- * The URL of the discovery document containing the resource's JSON schema. Example: `https://www.googleapis.com/discovery/v1/apis/compute/v1/rest` This value is unspecified for
199
- * resources that do not have an API based on a discovery document, such as Cloud Bigtable.
200
- */
201
- discoveryDocumentUri?:
202
- string;
203
- /**
204
- * The JSON schema name listed in the discovery document. Example: `Project` This value is unspecified for resources that do not have an API based on a discovery document, such as
205
- * Cloud Bigtable.
206
- */
207
- discoveryName?:
208
- string;
209
- /** The location of the resource in Google Cloud, such as its zone and region. For more information, see https://cloud.google.com/about/locations/. */
210
- location?:
211
- string;
212
- /**
213
- * The full name of the immediate parent of this resource. See [Resource Names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information. For Google
214
- * Cloud assets, this value is the parent resource defined in the [IAM policy hierarchy](https://cloud.google.com/iam/docs/overview#policy_hierarchy). Example:
215
- * `//cloudresourcemanager.googleapis.com/projects/my_project_123` For third-party assets, this field may be set differently.
216
- */
217
- parent?:
218
- string;
219
- /**
220
- * The REST URL for accessing the resource. An HTTP `GET` request using this URL returns the resource itself. Example:
221
- * `https://cloudresourcemanager.googleapis.com/v1/projects/my-project-123` This value is unspecified for resources without a REST API.
222
- */
223
- resourceUrl?:
224
- string;
225
- /** The API version. Example: `v1` */
226
- version?:
227
- string;
228
- }
229
- interface GoogleCloudOrgpolicyV1BooleanPolicy {
230
- /**
231
- * If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. Suppose you have a `Constraint` `constraints/compute.disableSerialPortAccess` with
232
- * `constraint_default` set to `ALLOW`. A `Policy` for that `Constraint` exhibits the following behavior: - If the `Policy` at this resource has enforced set to `false`, serial port
233
- * connection attempts will be allowed. - If the `Policy` at this resource has enforced set to `true`, serial port connection attempts will be refused. - If the `Policy` at this
234
- * resource is `RestoreDefault`, serial port connection attempts will be allowed. - If no `Policy` is set at this resource or anywhere higher in the resource hierarchy, serial port
235
- * connection attempts will be allowed. - If no `Policy` is set at this resource, but one exists higher in the resource hierarchy, the behavior is as if the`Policy` were set at this
236
- * resource. The following examples demonstrate the different possible layerings: Example 1 (nearest `Constraint` wins): `organizations/foo` has a `Policy` with: {enforced: false}
237
- * `projects/bar` has no `Policy` set. The constraint at `projects/bar` and `organizations/foo` will not be enforced. Example 2 (enforcement gets replaced): `organizations/foo` has a
238
- * `Policy` with: {enforced: false} `projects/bar` has a `Policy` with: {enforced: true} The constraint at `organizations/foo` is not enforced. The constraint at `projects/bar` is
239
- * enforced. Example 3 (RestoreDefault): `organizations/foo` has a `Policy` with: {enforced: true} `projects/bar` has a `Policy` with: {RestoreDefault: {}} The constraint at
240
- * `organizations/foo` is enforced. The constraint at `projects/bar` is not enforced, because `constraint_default` for the `Constraint` is `ALLOW`.
241
- */
242
- enforced?:
243
- boolean;
244
- }
245
- interface GoogleCloudOrgpolicyV1ListPolicy {
246
- /** List of values allowed at this resource. Can only be set if `all_values` is set to `ALL_VALUES_UNSPECIFIED`. */
247
- allowedValues?:
248
- string[];
249
- /** The policy all_values state. */
250
- allValues?:
251
- string;
252
- /** List of values denied at this resource. Can only be set if `all_values` is set to `ALL_VALUES_UNSPECIFIED`. */
253
- deniedValues?:
254
- string[];
255
- /**
256
- * Determines the inheritance behavior for this `Policy`. By default, a `ListPolicy` set at a resource supersedes any `Policy` set anywhere up the resource hierarchy. However, if
257
- * `inherit_from_parent` is set to `true`, then the values from the effective `Policy` of the parent resource are inherited, meaning the values set in this `Policy` are added to the
258
- * values inherited up the hierarchy. Setting `Policy` hierarchies that inherit both allowed values and denied values isn't recommended in most circumstances to keep the configuration
259
- * simple and understandable. However, it is possible to set a `Policy` with `allowed_values` set that inherits a `Policy` with `denied_values` set. In this case, the values that are
260
- * allowed must be in `allowed_values` and not present in `denied_values`. For example, suppose you have a `Constraint` `constraints/serviceuser.services`, which has a
261
- * `constraint_type` of `list_constraint`, and with `constraint_default` set to `ALLOW`. Suppose that at the Organization level, a `Policy` is applied that restricts the allowed API
262
- * activations to {`E1`, `E2`}. Then, if a `Policy` is applied to a project below the Organization that has `inherit_from_parent` set to `false` and field all_values set to DENY, then
263
- * an attempt to activate any API will be denied. The following examples demonstrate different possible layerings for `projects/bar` parented by `organizations/foo`: Example 1 (no
264
- * inherited values): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values:"E2"} `projects/bar` has `inherit_from_parent` `false` and values:
265
- * {allowed_values: "E3" allowed_values: "E4"} The accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `E3`, and `E4`. Example 2 (inherited
266
- * values): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values:"E2"} `projects/bar` has a `Policy` with values: {value: "E3" value: "E4"
267
- * inherit_from_parent: true} The accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`. Example 3 (inheriting
268
- * both allowed and denied values): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values: "E2"} `projects/bar` has a `Policy` with: {denied_values:
269
- * "E1"} The accepted values at `organizations/foo` are `E1`, `E2`. The value accepted at `projects/bar` is `E2`. Example 4 (RestoreDefault): `organizations/foo` has a `Policy` with
270
- * values: {allowed_values: "E1" allowed_values:"E2"} `projects/bar` has a `Policy` with values: {RestoreDefault: {}} The accepted values at `organizations/foo` are `E1`, `E2`. The
271
- * accepted values at `projects/bar` are either all or none depending on the value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 5 (no policy inherits parent
272
- * policy): `organizations/foo` has no `Policy` set. `projects/bar` has no `Policy` set. The accepted values at both levels are either all or none depending on the value of
273
- * `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 6 (ListConstraint allowing all): `organizations/foo` has a `Policy` with values: {allowed_values: "E1"
274
- * allowed_values: "E2"} `projects/bar` has a `Policy` with: {all: ALLOW} The accepted values at `organizations/foo` are `E1`, E2`. Any value is accepted at `projects/bar`. Example 7
275
- * (ListConstraint allowing none): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values: "E2"} `projects/bar` has a `Policy` with: {all: DENY} The
276
- * accepted values at `organizations/foo` are `E1`, E2`. No value is accepted at `projects/bar`. Example 10 (allowed and denied subtrees of Resource Manager hierarchy): Given the
277
- * following resource hierarchy O1->{F1, F2}; F1->{P1}; F2->{P2, P3}, `organizations/foo` has a `Policy` with values: {allowed_values: "under:organizations/O1"} `projects/bar` has a
278
- * `Policy` with: {allowed_values: "under:projects/P3"} {denied_values: "under:folders/F2"} The accepted values at `organizations/foo` are `organizations/O1`, `folders/F1`,
279
- * `folders/F2`, `projects/P1`, `projects/P2`, `projects/P3`. The accepted values at `projects/bar` are `organizations/O1`, `folders/F1`, `projects/P1`.
280
- */
281
- inheritFromParent?:
282
- boolean;
283
- /**
284
- * Optional. The Google Cloud Console will try to default to a configuration that matches the value specified in this `Policy`. If `suggested_value` is not set, it will inherit the
285
- * value specified higher in the hierarchy, unless `inherit_from_parent` is `false`.
286
- */
287
- suggestedValue?:
288
- string;
289
- }
290
- interface GoogleCloudOrgpolicyV1Policy {
291
- /** For boolean `Constraints`, whether to enforce the `Constraint` or not. */
292
- booleanPolicy?:
293
- GoogleCloudOrgpolicyV1BooleanPolicy;
294
- /**
295
- * The name of the `Constraint` the `Policy` is configuring, for example, `constraints/serviceuser.services`. A [list of available
296
- * constraints](/resource-manager/docs/organization-policy/org-policy-constraints) is available. Immutable after creation.
297
- */
298
- constraint?:
299
- string;
300
- /**
301
- * An opaque tag indicating the current version of the `Policy`, used for concurrency control. When the `Policy` is returned from either a `GetPolicy` or a `ListOrgPolicy` request,
302
- * this `etag` indicates the version of the current `Policy` to use when executing a read-modify-write loop. When the `Policy` is returned from a `GetEffectivePolicy` request, the
303
- * `etag` will be unset. When the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value that was returned from a `GetOrgPolicy` request as part of a read-modify-write loop
304
- * for concurrency control. Not setting the `etag`in a `SetOrgPolicy` request will result in an unconditional write of the `Policy`.
305
- */
306
- etag?:
307
- string;
308
- /** List of values either allowed or disallowed. */
309
- listPolicy?:
310
- GoogleCloudOrgpolicyV1ListPolicy;
311
- /** Restores the default behavior of the constraint; independent of `Constraint` type. */
312
- restoreDefault?:
313
- any;
314
- /**
315
- * The time stamp the `Policy` was previously updated. This is set by the server, not specified by the caller, and represents the last time a call to `SetOrgPolicy` was made for that
316
- * `Policy`. Any value set by the client will be ignored.
317
- */
318
- updateTime?:
319
- string;
320
- /** Version of the `Policy`. Default version is 0; */
321
- version?:
322
- number;
323
- }
324
- // tslint:disable-next-line:no-empty-interface
325
- interface GoogleCloudOrgpolicyV1RestoreDefault {
326
- }
327
- interface GoogleIdentityAccesscontextmanagerV1AccessLevel {
328
- /** A `BasicLevel` composed of `Conditions`. */
329
- basic?:
330
- GoogleIdentityAccesscontextmanagerV1BasicLevel;
331
- /** A `CustomLevel` written in the Common Expression Language. */
332
- custom?:
333
- GoogleIdentityAccesscontextmanagerV1CustomLevel;
334
- /** Description of the `AccessLevel` and its use. Does not affect behavior. */
335
- description?:
336
- string;
337
- /**
338
- * Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by
339
- * alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
340
- */
341
- name?:
342
- string;
343
- /** Human readable title. Must be unique within the Policy. */
344
- title?:
345
- string;
346
- }
347
- interface GoogleIdentityAccesscontextmanagerV1AccessPolicy {
348
- /**
349
- * Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if
350
- * and only if their etags are identical. Clients should not expect this to be in any specific format.
351
- */
352
- etag?:
353
- string;
354
- /** Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}` */
355
- name?:
356
- string;
357
- /** Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}` */
358
- parent?:
359
- string;
360
- /**
361
- * The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=["folders/123"]`
362
- * has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within
363
- * policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided,
364
- * then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of
365
- * `folders/{folder_number}` or `projects/{project_number}`
366
- */
367
- scopes?:
368
- string[];
369
- /** Required. Human readable title. Does not affect behavior. */
370
- title?:
371
- string;
372
- }
373
- interface GoogleIdentityAccesscontextmanagerV1ApiOperation {
374
- /**
375
- * API methods or permissions to allow. Method or permission must belong to the service specified by `service_name` field. A single MethodSelector entry with `*` specified for the
376
- * `method` field will allow all methods AND permissions for the service specified in `service_name`.
377
- */
378
- methodSelectors?:
379
- GoogleIdentityAccesscontextmanagerV1MethodSelector[];
380
- /**
381
- * The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with `service_name` field set to `*` will allow all methods
382
- * AND permissions for all services.
383
- */
384
- serviceName?:
385
- string;
386
- }
387
- interface GoogleIdentityAccesscontextmanagerV1BasicLevel {
388
- /**
389
- * How the `conditions` list should be combined to determine if a request is granted this `AccessLevel`. If AND is used, each `Condition` in `conditions` must be satisfied for the
390
- * `AccessLevel` to be applied. If OR is used, at least one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be applied. Default behavior is AND.
391
- */
392
- combiningFunction?:
393
- string;
394
- /** Required. A list of requirements for the `AccessLevel` to be granted. */
395
- conditions?:
396
- GoogleIdentityAccesscontextmanagerV1Condition[];
397
- }
398
- interface GoogleIdentityAccesscontextmanagerV1Condition {
399
- /** Device specific restrictions, all restrictions must hold for the Condition to be true. If not specified, all devices are allowed. */
400
- devicePolicy?:
401
- GoogleIdentityAccesscontextmanagerV1DevicePolicy;
402
- /**
403
- * CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host
404
- * bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly, for IPv6, "2001:db8::/32" is accepted whereas
405
- * "2001:db8::1/32" is not. The originating IP of a request must be in one of the listed subnets in order for this Condition to be true. If empty, all IP addresses are allowed.
406
- */
407
- ipSubnetworks?:
408
- string[];
409
- /**
410
- * The request must be made by one of the provided user or service accounts. Groups are not supported. Syntax: `user:{emailid}` `serviceAccount:{emailid}` If not specified, a request
411
- * may come from any user.
412
- */
413
- members?:
414
- string[];
415
- /**
416
- * Whether to negate the Condition. If true, the Condition becomes a NAND over its non-empty fields. Any non-empty field criteria evaluating to false will result in the Condition to be
417
- * satisfied. Defaults to false.
418
- */
419
- negate?:
420
- boolean;
421
- /** The request must originate from one of the provided countries/regions. Must be valid ISO 3166-1 alpha-2 codes. */
422
- regions?:
423
- string[];
424
- /**
425
- * A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must
426
- * be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
427
- */
428
- requiredAccessLevels?:
429
- string[];
430
- /** The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`. */
431
- vpcNetworkSources?:
432
- GoogleIdentityAccesscontextmanagerV1VpcNetworkSource[];
433
- }
434
- interface GoogleIdentityAccesscontextmanagerV1CustomLevel {
435
- /** Required. A Cloud CEL expression evaluating to a boolean. */
436
- expr?:
437
- Expr;
438
- }
439
- interface GoogleIdentityAccesscontextmanagerV1DevicePolicy {
440
- /** Allowed device management levels, an empty list allows all management levels. */
441
- allowedDeviceManagementLevels?:
442
- string[];
443
- /** Allowed encryptions statuses, an empty list allows all statuses. */
444
- allowedEncryptionStatuses?:
445
- string[];
446
- /** Allowed OS versions, an empty list allows all types and all versions. */
447
- osConstraints?:
448
- GoogleIdentityAccesscontextmanagerV1OsConstraint[];
449
- /** Whether the device needs to be approved by the customer admin. */
450
- requireAdminApproval?:
451
- boolean;
452
- /** Whether the device needs to be corp owned. */
453
- requireCorpOwned?:
454
- boolean;
455
- /** Whether or not screenlock is required for the DevicePolicy to be true. Defaults to `false`. */
456
- requireScreenlock?:
457
- boolean;
458
- }
459
- interface GoogleIdentityAccesscontextmanagerV1EgressFrom {
460
- /**
461
- * A list of identities that are allowed access through this [EgressPolicy]. Should be in the format of email address. The email address should represent individual user or service
462
- * account only.
463
- */
464
- identities?:
465
- string[];
466
- /** Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access. */
467
- identityType?:
468
- string;
469
- /** Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`. */
470
- sourceRestriction?:
471
- string;
472
- /** Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`. */
473
- sources?:
474
- GoogleIdentityAccesscontextmanagerV1EgressSource[];
475
- }
476
- interface GoogleIdentityAccesscontextmanagerV1EgressPolicy {
477
- /** Defines conditions on the source of a request causing this EgressPolicy to apply. */
478
- egressFrom?:
479
- GoogleIdentityAccesscontextmanagerV1EgressFrom;
480
- /** Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. */
481
- egressTo?:
482
- GoogleIdentityAccesscontextmanagerV1EgressTo;
483
- }
484
- interface GoogleIdentityAccesscontextmanagerV1EgressSource {
485
- /**
486
- * An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same
487
- * policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be
488
- * accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for
489
- * `access_level`, then all EgressSources will be allowed.
490
- */
491
- accessLevel?:
492
- string;
493
- }
494
- interface GoogleIdentityAccesscontextmanagerV1EgressTo {
495
- /**
496
- * A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage,
497
- * the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path).
498
- * Currently '*' is not allowed.
499
- */
500
- externalResources?:
501
- string[];
502
- /** A list of ApiOperations allowed to be performed by the sources specified in the corresponding EgressFrom. A request matches if it uses an operation/service in this list. */
503
- operations?:
504
- GoogleIdentityAccesscontextmanagerV1ApiOperation[];
505
- /**
506
- * A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it
507
- * contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
508
- */
509
- resources?:
510
- string[];
511
- }
512
- interface GoogleIdentityAccesscontextmanagerV1IngressFrom {
513
- /**
514
- * A list of identities that are allowed access through this ingress policy. Should be in the format of email address. The email address should represent individual user or service
515
- * account only.
516
- */
517
- identities?:
518
- string[];
519
- /** Specifies the type of identities that are allowed access from outside the perimeter. If left unspecified, then members of `identities` field will be allowed access. */
520
- identityType?:
521
- string;
522
- /** Sources that this IngressPolicy authorizes access from. */
523
- sources?:
524
- GoogleIdentityAccesscontextmanagerV1IngressSource[];
525
- }
526
- interface GoogleIdentityAccesscontextmanagerV1IngressPolicy {
527
- /** Defines the conditions on the source of a request causing this IngressPolicy to apply. */
528
- ingressFrom?:
529
- GoogleIdentityAccesscontextmanagerV1IngressFrom;
530
- /** Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply. */
531
- ingressTo?:
532
- GoogleIdentityAccesscontextmanagerV1IngressTo;
533
- }
534
- interface GoogleIdentityAccesscontextmanagerV1IngressSource {
535
- /**
536
- * An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed from the internet. AccessLevels listed must be in the same policy as this
537
- * ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed, resources within the perimeter can only be accessed via Google Cloud
538
- * calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources
539
- * will be allowed.
540
- */
541
- accessLevel?:
542
- string;
543
- /**
544
- * A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects and VPCs are
545
- * allowed. Project format: `projects/{project_number}` VPC network format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`. The project may be in any Google
546
- * Cloud organization, not just the organization that the perimeter is defined in. `*` is not allowed, the case of allowing all Google Cloud resources only is not supported.
547
- */
548
- resource?:
549
- string;
550
- }
551
- interface GoogleIdentityAccesscontextmanagerV1IngressTo {
552
- /** A list of ApiOperations allowed to be performed by the sources specified in corresponding IngressFrom in this ServicePerimeter. */
553
- operations?:
554
- GoogleIdentityAccesscontextmanagerV1ApiOperation[];
555
- /**
556
- * A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding
557
- * IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
558
- */
559
- resources?:
560
- string[];
561
- }
562
- interface GoogleIdentityAccesscontextmanagerV1MethodSelector {
563
- /**
564
- * Value for `method` should be a valid method name for the corresponding `service_name` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are
565
- * allowed.
566
- */
567
- method?:
568
- string;
569
- /** Value for `permission` should be a valid Cloud IAM permission for the corresponding `service_name` in ApiOperation. */
570
- permission?:
571
- string;
572
- }
573
- interface GoogleIdentityAccesscontextmanagerV1OsConstraint {
574
- /** The minimum allowed OS version. If not set, any version of this OS satisfies the constraint. Format: `"major.minor.patch"`. Examples: `"10.5.301"`, `"9.2.1"`. */
575
- minimumVersion?:
576
- string;
577
- /** Required. The allowed OS type. */
578
- osType?:
579
- string;
580
- /**
581
- * Only allows requests from devices with a verified Chrome OS. Verifications includes requirements that the device is enterprise-managed, conformant to domain policies, and the caller
582
- * has permission to call the API targeted by the request.
583
- */
584
- requireVerifiedChromeOs?:
585
- boolean;
586
- }
587
- interface GoogleIdentityAccesscontextmanagerV1ServicePerimeter {
588
- /** Description of the `ServicePerimeter` and its use. Does not affect behavior. */
589
- description?:
590
- string;
591
- /**
592
- * Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter,
593
- * followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.
594
- */
595
- name?:
596
- string;
597
- /**
598
- * Perimeter type indicator. A single project or VPC network is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a
599
- * included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty.
600
- */
601
- perimeterType?:
602
- string;
603
- /**
604
- * Proposed (or dry run) ServicePerimeter configuration. This configuration allows to specify and test ServicePerimeter configuration without enforcing actual access restrictions. Only
605
- * allowed to be set when the "use_explicit_dry_run_spec" flag is set.
606
- */
607
- spec?:
608
- GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig;
609
- /** Current ServicePerimeter configuration. Specifies sets of resources, restricted services and access levels that determine perimeter content and boundaries. */
610
- status?:
611
- GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig;
612
- /** Human readable title. Must be unique within the Policy. */
613
- title?:
614
- string;
615
- /**
616
- * Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists for all Service Perimeters, and that spec is identical to the status for those Service Perimeters. When
617
- * this flag is set, it inhibits the generation of the implicit spec, thereby allowing the user to explicitly provide a configuration ("spec") to use in a dry-run version of the
618
- * Service Perimeter. This allows the user to test changes to the enforced config ("status") without actually enforcing them. This testing is done through analyzing the differences
619
- * between currently enforced and suggested restrictions. use_explicit_dry_run_spec must bet set to True if any of the fields in the spec are set to non-default values.
620
- */
621
- useExplicitDryRunSpec?:
622
- boolean;
623
- }
624
- interface GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig {
625
- /**
626
- * A list of `AccessLevel` resource names that allow resources within the `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed must be in the same policy as this
627
- * `ServicePerimeter`. Referencing a nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are listed, resources within the perimeter can only be accessed via Google
628
- * Cloud calls with request origins within the perimeter. Example: `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. For Service Perimeter Bridge, must be empty.
629
- */
630
- accessLevels?:
631
- string[];
632
- /**
633
- * List of EgressPolicies to apply to the perimeter. A perimeter may have multiple EgressPolicies, each of which is evaluated separately. Access is granted if any EgressPolicy grants
634
- * it. Must be empty for a perimeter bridge.
635
- */
636
- egressPolicies?:
637
- GoogleIdentityAccesscontextmanagerV1EgressPolicy[];
638
- /**
639
- * List of IngressPolicies to apply to the perimeter. A perimeter may have multiple IngressPolicies, each of which is evaluated separately. Access is granted if any Ingress Policy
640
- * grants it. Must be empty for a perimeter bridge.
641
- */
642
- ingressPolicies?:
643
- GoogleIdentityAccesscontextmanagerV1IngressPolicy[];
644
- /**
645
- * A list of Google Cloud resources that are inside of the service perimeter. Currently only projects and VPCs are allowed. Project format: `projects/{project_number}` VPC network
646
- * format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`.
647
- */
648
- resources?:
649
- string[];
650
- /**
651
- * Google Cloud services that are subject to the Service Perimeter restrictions. For example, if `storage.googleapis.com` is specified, access to the storage buckets inside the
652
- * perimeter must meet the perimeter's access restrictions.
653
- */
654
- restrictedServices?:
655
- string[];
656
- /** Configuration for APIs allowed within Perimeter. */
657
- vpcAccessibleServices?:
658
- GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices;
659
- }
660
- interface GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices {
661
- /**
662
- * The list of APIs usable within the Service Perimeter. Must be empty unless 'enable_restriction' is True. You can specify a list of individual services, as well as include the
663
- * 'RESTRICTED-SERVICES' value, which automatically includes all of the services protected by the perimeter.
664
- */
665
- allowedServices?:
666
- string[];
667
- /** Whether to restrict API calls within the Service Perimeter to the list of APIs specified in 'allowed_services'. */
668
- enableRestriction?:
669
- boolean;
670
- }
671
- interface GoogleIdentityAccesscontextmanagerV1VpcNetworkSource {
672
- /** Sub-segment ranges of a VPC network. */
673
- vpcSubnetwork?:
674
- GoogleIdentityAccesscontextmanagerV1VpcSubNetwork;
675
- }
676
- interface GoogleIdentityAccesscontextmanagerV1VpcSubNetwork {
677
- /**
678
- * Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format:
679
- * `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
680
- */
681
- network?:
682
- string;
683
- /**
684
- * CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP
685
- * address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is
686
- * not. If empty, all IP addresses are allowed.
687
- */
688
- vpcIpSubnetworks?:
689
- string[];
690
- }
691
- interface IamPolicySearchResult {
692
- /** Explanation about the IAM policy search result. It contains additional information that explains why the search result matches the query. */
693
- explanation?:
694
- Explanation;
695
- /**
696
- * The IAM policy attached to the specified resource. Note that the original IAM policy can contain multiple bindings. This only contains the bindings that match the given query. For
697
- * queries that don't contain a constraint on policies (e.g. an empty query), this contains all the bindings.
698
- */
699
- policy?:
700
- Policy;
701
- /**
702
- * The project that the associated Google Cloud resource belongs to, in the form of `projects/{project_number}`. If an IAM policy is set on a resource -- such as a Compute Engine
703
- * instance or a Cloud Storage bucket -- the project field will indicate the project that contains the resource. If an IAM policy is set on a folder or orgnization, the project field
704
- * will be empty.
705
- */
706
- project?:
707
- string;
708
- /** The [full resource name](https://cloud.google.com/apis/design/resource_names#full_resource_name) of the resource associated with this IAM policy. */
709
- resource?:
710
- string;
711
- }
712
- interface Permissions {
713
- /** A list of permissions. Example permission string: "compute.disk.get". */
714
- permissions?:
715
- string[];
716
- }
717
- interface Policy {
718
- /** Specifies cloud audit logging configuration for this policy. */
719
- auditConfigs?:
720
- AuditConfig[];
721
- /**
722
- * Associates a list of `members`, or principals, with a `role`. Optionally, may specify a `condition` that determines how and when the `bindings` are applied. Each of the `bindings`
723
- * must contain at least one principal. The `bindings` in a `Policy` can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a
724
- * principal counts towards these limits. For example, if the `bindings` grant 50 different roles to `user:alice@example.com`, and not to any other principal, then you can add another
725
- * 1,450 principals to the `bindings` in the `Policy`.
726
- */
727
- bindings?:
728
- Binding[];
729
- /**
730
- * `etag` is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make
731
- * use of the `etag` in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An `etag` is returned in the response to `getIamPolicy`, and systems
732
- * are expected to put that etag in the request to `setIamPolicy` to ensure that their change will be applied to the same version of the policy. **Important:** If you use IAM
733
- * Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1`
734
- * policy, and all of the conditions in the version `3` policy are lost.
735
- */
736
- etag?:
737
- string;
738
- /**
739
- * Specifies the format of the policy. Valid values are `0`, `1`, and `3`. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings
740
- * must specify version `3`. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a
741
- * policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions **Important:** If you use
742
- * IAM Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1`
743
- * policy, and all of the conditions in the version `3` policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave
744
- * the field unset. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
745
- */
746
- version?:
747
- number;
748
- }
749
- interface SearchAllIamPoliciesResponse {
750
- /** Set if there are more results than those appearing in this response; to get the next set of results, call this method again, using this value as the `page_token`. */
751
- nextPageToken?:
752
- string;
753
- /** A list of IAM policies that match the search query. Related information such as the associated resource is returned along with the policy. */
754
- results?:
755
- IamPolicySearchResult[];
756
- }
757
- interface SearchAllResourcesResponse {
758
- /**
759
- * If there are more results than those appearing in this response, then `next_page_token` is included. To get the next set of results, call this method again using the value of
760
- * `next_page_token` as `page_token`.
761
- */
762
- nextPageToken?:
763
- string;
764
- /** A list of resource that match the search query. */
765
- results?:
766
- StandardResourceMetadata[];
767
- }
768
- interface StandardResourceMetadata {
769
- /** Additional searchable attributes of this resource. Informational only. The exact set of attributes is subject to change. For example: project id, DNS name etc. */
770
- additionalAttributes?:
771
- string[];
772
- /** The type of this resource. For example: "compute.googleapis.com/Disk". */
773
- assetType?:
774
- string;
775
- /** One or more paragraphs of text description of this resource. Maximum length could be up to 1M bytes. */
776
- description?:
777
- string;
778
- /** The display name of this resource. */
779
- displayName?:
780
- string;
781
- /**
782
- * Labels associated with this resource. See [Labelling and grouping Google Cloud
783
- * resources](https://cloud.google.com/blog/products/gcp/labelling-and-grouping-your-google-cloud-platform-resources) for more information.
784
- */
785
- labels?:
786
- { [P in string]: string };
787
- /** Location can be "global", regional like "us-east1", or zonal like "us-west1-b". */
788
- location?:
789
- string;
790
- /**
791
- * The full resource name. For example: `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1`. See [Resource
792
- * Names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information.
793
- */
794
- name?:
795
- string;
796
- /**
797
- * Network tags associated with this resource. Like labels, network tags are a type of annotations used to group Google Cloud resources. See [Labelling Google Cloud
798
- * resources](lhttps://cloud.google.com/blog/products/gcp/labelling-and-grouping-your-google-cloud-platform-resources) for more information.
799
- */
800
- networkTags?:
801
- string[];
802
- /** The project that this resource belongs to, in the form of `projects/{project_number}`. */
803
- project?:
804
- string;
805
- }
806
- interface IamPoliciesResource {
807
- /**
808
- * Searches all the IAM policies within a given accessible Resource Manager scope (project/folder/organization). This RPC gives callers especially administrators the ability to search
809
- * all the IAM policies within a scope, even if they don't have `.getIamPolicy` permission of all the IAM policies. Callers should have `cloud.assets.SearchAllIamPolicies` permission
810
- * on the requested scope, otherwise the request will be rejected.
811
- */
812
- searchAll(request?: {
813
- /** V1 error format. */
814
- "$.xgafv"?:
815
- string;
816
- /** OAuth access token. */
817
- access_token?:
818
- string;
819
- /** Data format for response. */
820
- alt?:
821
- string;
822
- /** JSONP */
823
- callback?:
824
- string;
825
- /** Selector specifying which fields to include in a partial response. */
826
- fields?:
827
- string;
828
- /** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
829
- key?:
830
- string;
831
- /** OAuth 2.0 token for the current user. */
832
- oauth_token?:
833
- string;
834
- /**
835
- * Optional. The page size for search result pagination. Page size is capped at 500 even if a larger value is given. If set to zero, server will pick an appropriate default.
836
- * Returned results may be fewer than requested. When this happens, there could be more results as long as `next_page_token` is returned.
837
- */
838
- pageSize?:
839
- number;
840
- /**
841
- * Optional. If present, retrieve the next batch of results from the preceding call to this method. `page_token` must be the value of `next_page_token` from the previous response.
842
- * The values of all other method parameters must be identical to those in the previous call.
843
- */
844
- pageToken?:
845
- string;
846
- /** Returns response with indentations and line breaks. */
847
- prettyPrint?:
848
- boolean;
849
- /** Optional. The query statement. Examples: * "policy:myuser@mydomain.com" * "policy:(myuser@mydomain.com viewer)" */
850
- query?:
851
- string;
852
- /** Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters. */
853
- quotaUser?:
854
- string;
855
- /**
856
- * Required. The relative name of an asset. The search is limited to the resources within the `scope`. The allowed value must be: * Organization number (such as
857
- * "organizations/123") * Folder number (such as "folders/1234") * Project number (such as "projects/12345") * Project ID (such as "projects/abc")
858
- */
859
- scope:
860
- string;
861
- /** Upload protocol for media (e.g. "raw", "multipart"). */
862
- upload_protocol?:
863
- string;
864
- /** Legacy upload protocol for media (e.g. "media", "multipart"). */
865
- uploadType?:
866
- string;
867
- }): Request<SearchAllIamPoliciesResponse>;
868
- }
869
- interface ResourcesResource {
870
- /**
871
- * Searches all the resources within a given accessible Resource Manager scope (project/folder/organization). This RPC gives callers especially administrators the ability to search all
872
- * the resources within a scope, even if they don't have `.get` permission of all the resources. Callers should have `cloud.assets.SearchAllResources` permission on the requested
873
- * scope, otherwise the request will be rejected.
874
- */
875
- searchAll(request?: {
876
- /** V1 error format. */
877
- "$.xgafv"?:
878
- string;
879
- /** OAuth access token. */
880
- access_token?:
881
- string;
882
- /** Data format for response. */
883
- alt?:
884
- string;
885
- /** Optional. A list of asset types that this request searches for. If empty, it will search all the supported asset types. */
886
- assetTypes?:
887
- string | string[];
888
- /** JSONP */
889
- callback?:
890
- string;
891
- /** Selector specifying which fields to include in a partial response. */
892
- fields?:
893
- string;
894
- /** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
895
- key?:
896
- string;
897
- /** OAuth 2.0 token for the current user. */
898
- oauth_token?:
899
- string;
900
- /**
901
- * Optional. A comma separated list of fields specifying the sorting order of the results. The default order is ascending. Add ` DESC` after the field name to indicate descending
902
- * order. Redundant space characters are ignored. For example, ` location DESC , name `.
903
- */
904
- orderBy?:
905
- string;
906
- /**
907
- * Optional. The page size for search result pagination. Page size is capped at 500 even if a larger value is given. If set to zero, server will pick an appropriate default.
908
- * Returned results may be fewer than requested. When this happens, there could be more results as long as `next_page_token` is returned.
909
- */
910
- pageSize?:
911
- number;
912
- /**
913
- * Optional. If present, then retrieve the next batch of results from the preceding call to this method. `page_token` must be the value of `next_page_token` from the previous
914
- * response. The values of all other method parameters, must be identical to those in the previous call.
915
- */
916
- pageToken?:
917
- string;
918
- /** Returns response with indentations and line breaks. */
919
- prettyPrint?:
920
- boolean;
921
- /** Optional. The query statement. */
922
- query?:
923
- string;
924
- /** Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters. */
925
- quotaUser?:
926
- string;
927
- /**
928
- * Required. The relative name of an asset. The search is limited to the resources within the `scope`. The allowed value must be: * Organization number (such as
929
- * "organizations/123") * Folder number (such as "folders/1234") * Project number (such as "projects/12345") * Project ID (such as "projects/abc")
930
- */
931
- scope:
932
- string;
933
- /** Upload protocol for media (e.g. "raw", "multipart"). */
934
- upload_protocol?:
935
- string;
936
- /** Legacy upload protocol for media (e.g. "media", "multipart"). */
937
- uploadType?:
938
- string;
939
- }): Request<SearchAllResourcesResponse>;
940
- }
30
+ namespace cloudasset {
31
+ interface AnalyzeIamPolicyLongrunningMetadata {
32
+ /** Output only. The time the operation was created. */
33
+ createTime?: string;
34
+ }
35
+ interface AnalyzeIamPolicyLongrunningResponse {}
36
+ interface AuditConfig {
37
+ /** The configuration for logging of each type of permission. */
38
+ auditLogConfigs?: AuditLogConfig[];
39
+ /** Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services. */
40
+ service?: string;
41
+ }
42
+ interface AuditLogConfig {
43
+ /** Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members. */
44
+ exemptedMembers?: string[];
45
+ /** The log type that this config enables. */
46
+ logType?: string;
47
+ }
48
+ interface Binding {
49
+ /** The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). */
50
+ condition?: Expr;
51
+ /** Specifies the principals requesting access for a Google Cloud resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. Does not include identities that come from external identity providers (IdPs) through identity federation. * `user:{emailid}`: An email address that represents a specific Google account. For example, `alice@example.com` . * `serviceAccount:{emailid}`: An email address that represents a Google service account. For example, `my-other-app@appspot.gserviceaccount.com`. * `serviceAccount:{projectid}.svc.id.goog[{namespace}/{kubernetes-sa}]`: An identifier for a [Kubernetes service account](https://cloud.google.com/kubernetes-engine/docs/how-to/kubernetes-service-accounts). For example, `my-project.svc.id.goog[my-namespace/my-kubernetes-sa]`. * `group:{emailid}`: An email address that represents a Google group. For example, `admins@example.com`. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, `alice@example.com?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, `admins@example.com?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. */
52
+ members?: string[];
53
+ /** Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. */
54
+ role?: string;
55
+ }
56
+ interface Explanation {
57
+ /** The map from roles to their included permission matching the permission query (e.g. containing `policy.role.permissions:`). Example role string: "roles/compute.instanceAdmin". The roles can also be found in the returned `policy` bindings. Note that the map is populated only if requesting with a permission query. */
58
+ matchedPermissions?: {[P in string]: Permissions};
59
+ }
60
+ interface Expr {
61
+ /** Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI. */
62
+ description?: string;
63
+ /** Textual representation of an expression in Common Expression Language syntax. */
64
+ expression?: string;
65
+ /** Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file. */
66
+ location?: string;
67
+ /** Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression. */
68
+ title?: string;
69
+ }
70
+ interface GoogleCloudAssetV1p7beta1Asset {
71
+ /** Please also refer to the [access level user guide](https://cloud.google.com/access-context-manager/docs/overview#access-levels). */
72
+ accessLevel?: GoogleIdentityAccesscontextmanagerV1AccessLevel;
73
+ /** Please also refer to the [access policy user guide](https://cloud.google.com/access-context-manager/docs/overview#access-policies). */
74
+ accessPolicy?: GoogleIdentityAccesscontextmanagerV1AccessPolicy;
75
+ /** The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `["projects/123456789", "folders/5432", "organizations/1234"]` */
76
+ ancestors?: string[];
77
+ /** The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types) for more information. */
78
+ assetType?: string;
79
+ /** A representation of the IAM policy set on a Google Cloud resource. There can be a maximum of one IAM policy set on any given resource. In addition, IAM policies inherit their granted access scope from any policies set on parent resources in the resource hierarchy. Therefore, the effectively policy is the union of both the policy set on this resource and each policy set on all of the resource's ancestry resource levels in the hierarchy. See [this topic](https://cloud.google.com/iam/help/allow-policies/inheritance) for more information. */
80
+ iamPolicy?: Policy;
81
+ /** The full name of the asset. Example: `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1` See [Resource names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information. */
82
+ name?: string;
83
+ /** A representation of an [organization policy](https://cloud.google.com/resource-manager/docs/organization-policy/overview#organization_policy). There can be more than one organization policy with different constraints set on a given resource. */
84
+ orgPolicy?: GoogleCloudOrgpolicyV1Policy[];
85
+ /** The related assets of the asset of one relationship type. One asset only represents one type of relationship. */
86
+ relatedAssets?: GoogleCloudAssetV1p7beta1RelatedAssets;
87
+ /** A representation of the resource. */
88
+ resource?: GoogleCloudAssetV1p7beta1Resource;
89
+ /** Please also refer to the [service perimeter user guide](https://cloud.google.com/vpc-service-controls/docs/overview). */
90
+ servicePerimeter?: GoogleIdentityAccesscontextmanagerV1ServicePerimeter;
91
+ /** The last update timestamp of an asset. update_time is updated when create/update/delete operation is performed. */
92
+ updateTime?: string;
93
+ }
94
+ interface GoogleCloudAssetV1p7beta1RelatedAsset {
95
+ /** The ancestors of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. Example: `["projects/123456789", "folders/5432", "organizations/1234"]` */
96
+ ancestors?: string[];
97
+ /** The full name of the asset. Example: `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1` See [Resource names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information. */
98
+ asset?: string;
99
+ /** The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types) for more information. */
100
+ assetType?: string;
101
+ }
102
+ interface GoogleCloudAssetV1p7beta1RelatedAssets {
103
+ /** The peer resources of the relationship. */
104
+ assets?: GoogleCloudAssetV1p7beta1RelatedAsset[];
105
+ /** The detailed relation attributes. */
106
+ relationshipAttributes?: GoogleCloudAssetV1p7beta1RelationshipAttributes;
107
+ }
108
+ interface GoogleCloudAssetV1p7beta1RelationshipAttributes {
109
+ /** The detail of the relationship, e.g. `contains`, `attaches` */
110
+ action?: string;
111
+ /** The source asset type. Example: `compute.googleapis.com/Instance` */
112
+ sourceResourceType?: string;
113
+ /** The target asset type. Example: `compute.googleapis.com/Disk` */
114
+ targetResourceType?: string;
115
+ /** The unique identifier of the relationship type. Example: `INSTANCE_TO_INSTANCEGROUP` */
116
+ type?: string;
117
+ }
118
+ interface GoogleCloudAssetV1p7beta1Resource {
119
+ /** The content of the resource, in which some sensitive fields are removed and may not be present. */
120
+ data?: {[P in string]: any};
121
+ /** The URL of the discovery document containing the resource's JSON schema. Example: `https://www.googleapis.com/discovery/v1/apis/compute/v1/rest` This value is unspecified for resources that do not have an API based on a discovery document, such as Cloud Bigtable. */
122
+ discoveryDocumentUri?: string;
123
+ /** The JSON schema name listed in the discovery document. Example: `Project` This value is unspecified for resources that do not have an API based on a discovery document, such as Cloud Bigtable. */
124
+ discoveryName?: string;
125
+ /** The location of the resource in Google Cloud, such as its zone and region. For more information, see https://cloud.google.com/about/locations/. */
126
+ location?: string;
127
+ /** The full name of the immediate parent of this resource. See [Resource Names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information. For Google Cloud assets, this value is the parent resource defined in the [IAM policy hierarchy](https://cloud.google.com/iam/docs/overview#policy_hierarchy). Example: `//cloudresourcemanager.googleapis.com/projects/my_project_123` For third-party assets, this field may be set differently. */
128
+ parent?: string;
129
+ /** The REST URL for accessing the resource. An HTTP `GET` request using this URL returns the resource itself. Example: `https://cloudresourcemanager.googleapis.com/v1/projects/my-project-123` This value is unspecified for resources without a REST API. */
130
+ resourceUrl?: string;
131
+ /** The API version. Example: `v1` */
132
+ version?: string;
133
+ }
134
+ interface GoogleCloudOrgpolicyV1BooleanPolicy {
135
+ /** If `true`, then the `Policy` is enforced. If `false`, then any configuration is acceptable. Suppose you have a `Constraint` `constraints/compute.disableSerialPortAccess` with `constraint_default` set to `ALLOW`. A `Policy` for that `Constraint` exhibits the following behavior: - If the `Policy` at this resource has enforced set to `false`, serial port connection attempts will be allowed. - If the `Policy` at this resource has enforced set to `true`, serial port connection attempts will be refused. - If the `Policy` at this resource is `RestoreDefault`, serial port connection attempts will be allowed. - If no `Policy` is set at this resource or anywhere higher in the resource hierarchy, serial port connection attempts will be allowed. - If no `Policy` is set at this resource, but one exists higher in the resource hierarchy, the behavior is as if the`Policy` were set at this resource. The following examples demonstrate the different possible layerings: Example 1 (nearest `Constraint` wins): `organizations/foo` has a `Policy` with: {enforced: false} `projects/bar` has no `Policy` set. The constraint at `projects/bar` and `organizations/foo` will not be enforced. Example 2 (enforcement gets replaced): `organizations/foo` has a `Policy` with: {enforced: false} `projects/bar` has a `Policy` with: {enforced: true} The constraint at `organizations/foo` is not enforced. The constraint at `projects/bar` is enforced. Example 3 (RestoreDefault): `organizations/foo` has a `Policy` with: {enforced: true} `projects/bar` has a `Policy` with: {RestoreDefault: {}} The constraint at `organizations/foo` is enforced. The constraint at `projects/bar` is not enforced, because `constraint_default` for the `Constraint` is `ALLOW`. */
136
+ enforced?: boolean;
137
+ }
138
+ interface GoogleCloudOrgpolicyV1ListPolicy {
139
+ /** List of values allowed at this resource. Can only be set if `all_values` is set to `ALL_VALUES_UNSPECIFIED`. */
140
+ allowedValues?: string[];
141
+ /** The policy all_values state. */
142
+ allValues?: string;
143
+ /** List of values denied at this resource. Can only be set if `all_values` is set to `ALL_VALUES_UNSPECIFIED`. */
144
+ deniedValues?: string[];
145
+ /** Determines the inheritance behavior for this `Policy`. By default, a `ListPolicy` set at a resource supersedes any `Policy` set anywhere up the resource hierarchy. However, if `inherit_from_parent` is set to `true`, then the values from the effective `Policy` of the parent resource are inherited, meaning the values set in this `Policy` are added to the values inherited up the hierarchy. Setting `Policy` hierarchies that inherit both allowed values and denied values isn't recommended in most circumstances to keep the configuration simple and understandable. However, it is possible to set a `Policy` with `allowed_values` set that inherits a `Policy` with `denied_values` set. In this case, the values that are allowed must be in `allowed_values` and not present in `denied_values`. For example, suppose you have a `Constraint` `constraints/serviceuser.services`, which has a `constraint_type` of `list_constraint`, and with `constraint_default` set to `ALLOW`. Suppose that at the Organization level, a `Policy` is applied that restricts the allowed API activations to {`E1`, `E2`}. Then, if a `Policy` is applied to a project below the Organization that has `inherit_from_parent` set to `false` and field all_values set to DENY, then an attempt to activate any API will be denied. The following examples demonstrate different possible layerings for `projects/bar` parented by `organizations/foo`: Example 1 (no inherited values): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values:"E2"} `projects/bar` has `inherit_from_parent` `false` and values: {allowed_values: "E3" allowed_values: "E4"} The accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `E3`, and `E4`. Example 2 (inherited values): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values:"E2"} `projects/bar` has a `Policy` with values: {value: "E3" value: "E4" inherit_from_parent: true} The accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`. Example 3 (inheriting both allowed and denied values): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values: "E2"} `projects/bar` has a `Policy` with: {denied_values: "E1"} The accepted values at `organizations/foo` are `E1`, `E2`. The value accepted at `projects/bar` is `E2`. Example 4 (RestoreDefault): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values:"E2"} `projects/bar` has a `Policy` with values: {RestoreDefault: {}} The accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are either all or none depending on the value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 5 (no policy inherits parent policy): `organizations/foo` has no `Policy` set. `projects/bar` has no `Policy` set. The accepted values at both levels are either all or none depending on the value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 6 (ListConstraint allowing all): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values: "E2"} `projects/bar` has a `Policy` with: {all: ALLOW} The accepted values at `organizations/foo` are `E1`, E2`. Any value is accepted at `projects/bar`. Example 7 (ListConstraint allowing none): `organizations/foo` has a `Policy` with values: {allowed_values: "E1" allowed_values: "E2"} `projects/bar` has a `Policy` with: {all: DENY} The accepted values at `organizations/foo` are `E1`, E2`. No value is accepted at `projects/bar`. Example 10 (allowed and denied subtrees of Resource Manager hierarchy): Given the following resource hierarchy O1->{F1, F2}; F1->{P1}; F2->{P2, P3}, `organizations/foo` has a `Policy` with values: {allowed_values: "under:organizations/O1"} `projects/bar` has a `Policy` with: {allowed_values: "under:projects/P3"} {denied_values: "under:folders/F2"} The accepted values at `organizations/foo` are `organizations/O1`, `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, `projects/P3`. The accepted values at `projects/bar` are `organizations/O1`, `folders/F1`, `projects/P1`. */
146
+ inheritFromParent?: boolean;
147
+ /** Optional. The Google Cloud Console will try to default to a configuration that matches the value specified in this `Policy`. If `suggested_value` is not set, it will inherit the value specified higher in the hierarchy, unless `inherit_from_parent` is `false`. */
148
+ suggestedValue?: string;
149
+ }
150
+ interface GoogleCloudOrgpolicyV1Policy {
151
+ /** For boolean `Constraints`, whether to enforce the `Constraint` or not. */
152
+ booleanPolicy?: GoogleCloudOrgpolicyV1BooleanPolicy;
153
+ /** The name of the `Constraint` the `Policy` is configuring, for example, `constraints/serviceuser.services`. A [list of available constraints](/resource-manager/docs/organization-policy/org-policy-constraints) is available. Immutable after creation. */
154
+ constraint?: string;
155
+ /** An opaque tag indicating the current version of the `Policy`, used for concurrency control. When the `Policy` is returned from either a `GetPolicy` or a `ListOrgPolicy` request, this `etag` indicates the version of the current `Policy` to use when executing a read-modify-write loop. When the `Policy` is returned from a `GetEffectivePolicy` request, the `etag` will be unset. When the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value that was returned from a `GetOrgPolicy` request as part of a read-modify-write loop for concurrency control. Not setting the `etag`in a `SetOrgPolicy` request will result in an unconditional write of the `Policy`. */
156
+ etag?: string;
157
+ /** List of values either allowed or disallowed. */
158
+ listPolicy?: GoogleCloudOrgpolicyV1ListPolicy;
159
+ /** Restores the default behavior of the constraint; independent of `Constraint` type. */
160
+ restoreDefault?: any;
161
+ /** The time stamp the `Policy` was previously updated. This is set by the server, not specified by the caller, and represents the last time a call to `SetOrgPolicy` was made for that `Policy`. Any value set by the client will be ignored. */
162
+ updateTime?: string;
163
+ /** Version of the `Policy`. Default version is 0; */
164
+ version?: number;
165
+ }
166
+ interface GoogleCloudOrgpolicyV1RestoreDefault {}
167
+ interface GoogleIdentityAccesscontextmanagerV1AccessLevel {
168
+ /** A `BasicLevel` composed of `Conditions`. */
169
+ basic?: GoogleIdentityAccesscontextmanagerV1BasicLevel;
170
+ /** A `CustomLevel` written in the Common Expression Language. */
171
+ custom?: GoogleIdentityAccesscontextmanagerV1CustomLevel;
172
+ /** Description of the `AccessLevel` and its use. Does not affect behavior. */
173
+ description?: string;
174
+ /** Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`. */
175
+ name?: string;
176
+ /** Human readable title. Must be unique within the Policy. */
177
+ title?: string;
178
+ }
179
+ interface GoogleIdentityAccesscontextmanagerV1AccessPolicy {
180
+ /** Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. */
181
+ etag?: string;
182
+ /** Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}` */
183
+ name?: string;
184
+ /** Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}` */
185
+ parent?: string;
186
+ /** The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=["folders/123"]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}` */
187
+ scopes?: string[];
188
+ /** Required. Human readable title. Does not affect behavior. */
189
+ title?: string;
190
+ }
191
+ interface GoogleIdentityAccesscontextmanagerV1ApiOperation {
192
+ /** API methods or permissions to allow. Method or permission must belong to the service specified by `service_name` field. A single MethodSelector entry with `*` specified for the `method` field will allow all methods AND permissions for the service specified in `service_name`. */
193
+ methodSelectors?: GoogleIdentityAccesscontextmanagerV1MethodSelector[];
194
+ /** The name of the API whose methods or permissions the IngressPolicy or EgressPolicy want to allow. A single ApiOperation with `service_name` field set to `*` will allow all methods AND permissions for all services. */
195
+ serviceName?: string;
196
+ }
197
+ interface GoogleIdentityAccesscontextmanagerV1BasicLevel {
198
+ /** How the `conditions` list should be combined to determine if a request is granted this `AccessLevel`. If AND is used, each `Condition` in `conditions` must be satisfied for the `AccessLevel` to be applied. If OR is used, at least one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be applied. Default behavior is AND. */
199
+ combiningFunction?: string;
200
+ /** Required. A list of requirements for the `AccessLevel` to be granted. */
201
+ conditions?: GoogleIdentityAccesscontextmanagerV1Condition[];
202
+ }
203
+ interface GoogleIdentityAccesscontextmanagerV1Condition {
204
+ /** Device specific restrictions, all restrictions must hold for the Condition to be true. If not specified, all devices are allowed. */
205
+ devicePolicy?: GoogleIdentityAccesscontextmanagerV1DevicePolicy;
206
+ /** CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. Similarly, for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" is not. The originating IP of a request must be in one of the listed subnets in order for this Condition to be true. If empty, all IP addresses are allowed. */
207
+ ipSubnetworks?: string[];
208
+ /** The request must be made by one of the provided user or service accounts. Groups are not supported. Syntax: `user:{emailid}` `serviceAccount:{emailid}` If not specified, a request may come from any user. */
209
+ members?: string[];
210
+ /** Whether to negate the Condition. If true, the Condition becomes a NAND over its non-empty fields. Any non-empty field criteria evaluating to false will result in the Condition to be satisfied. Defaults to false. */
211
+ negate?: boolean;
212
+ /** The request must originate from one of the provided countries/regions. Must be valid ISO 3166-1 alpha-2 codes. */
213
+ regions?: string[];
214
+ /** A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"` */
215
+ requiredAccessLevels?: string[];
216
+ /** The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`. */
217
+ vpcNetworkSources?: GoogleIdentityAccesscontextmanagerV1VpcNetworkSource[];
218
+ }
219
+ interface GoogleIdentityAccesscontextmanagerV1CustomLevel {
220
+ /** Required. A Cloud CEL expression evaluating to a boolean. */
221
+ expr?: Expr;
222
+ }
223
+ interface GoogleIdentityAccesscontextmanagerV1DevicePolicy {
224
+ /** Allowed device management levels, an empty list allows all management levels. */
225
+ allowedDeviceManagementLevels?: string[];
226
+ /** Allowed encryptions statuses, an empty list allows all statuses. */
227
+ allowedEncryptionStatuses?: string[];
228
+ /** Allowed OS versions, an empty list allows all types and all versions. */
229
+ osConstraints?: GoogleIdentityAccesscontextmanagerV1OsConstraint[];
230
+ /** Whether the device needs to be approved by the customer admin. */
231
+ requireAdminApproval?: boolean;
232
+ /** Whether the device needs to be corp owned. */
233
+ requireCorpOwned?: boolean;
234
+ /** Whether or not screenlock is required for the DevicePolicy to be true. Defaults to `false`. */
235
+ requireScreenlock?: boolean;
236
+ }
237
+ interface GoogleIdentityAccesscontextmanagerV1EgressFrom {
238
+ /** A list of identities that are allowed access through this [EgressPolicy]. Should be in the format of email address. The email address should represent individual user or service account only. */
239
+ identities?: string[];
240
+ /** Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access. */
241
+ identityType?: string;
242
+ /** Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`. */
243
+ sourceRestriction?: string;
244
+ /** Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`. */
245
+ sources?: GoogleIdentityAccesscontextmanagerV1EgressSource[];
246
+ }
247
+ interface GoogleIdentityAccesscontextmanagerV1EgressPolicy {
248
+ /** Defines conditions on the source of a request causing this EgressPolicy to apply. */
249
+ egressFrom?: GoogleIdentityAccesscontextmanagerV1EgressFrom;
250
+ /** Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. */
251
+ egressTo?: GoogleIdentityAccesscontextmanagerV1EgressTo;
252
+ }
253
+ interface GoogleIdentityAccesscontextmanagerV1EgressSource {
254
+ /** An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed. */
255
+ accessLevel?: string;
256
+ }
257
+ interface GoogleIdentityAccesscontextmanagerV1EgressTo {
258
+ /** A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed. */
259
+ externalResources?: string[];
260
+ /** A list of ApiOperations allowed to be performed by the sources specified in the corresponding EgressFrom. A request matches if it uses an operation/service in this list. */
261
+ operations?: GoogleIdentityAccesscontextmanagerV1ApiOperation[];
262
+ /** A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter. */
263
+ resources?: string[];
264
+ }
265
+ interface GoogleIdentityAccesscontextmanagerV1IngressFrom {
266
+ /** A list of identities that are allowed access through this ingress policy. Should be in the format of email address. The email address should represent individual user or service account only. */
267
+ identities?: string[];
268
+ /** Specifies the type of identities that are allowed access from outside the perimeter. If left unspecified, then members of `identities` field will be allowed access. */
269
+ identityType?: string;
270
+ /** Sources that this IngressPolicy authorizes access from. */
271
+ sources?: GoogleIdentityAccesscontextmanagerV1IngressSource[];
272
+ }
273
+ interface GoogleIdentityAccesscontextmanagerV1IngressPolicy {
274
+ /** Defines the conditions on the source of a request causing this IngressPolicy to apply. */
275
+ ingressFrom?: GoogleIdentityAccesscontextmanagerV1IngressFrom;
276
+ /** Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply. */
277
+ ingressTo?: GoogleIdentityAccesscontextmanagerV1IngressTo;
278
+ }
279
+ interface GoogleIdentityAccesscontextmanagerV1IngressSource {
280
+ /** An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed. */
281
+ accessLevel?: string;
282
+ /** A Google Cloud resource that is allowed to ingress the perimeter. Requests from these resources will be allowed to access perimeter data. Currently only projects and VPCs are allowed. Project format: `projects/{project_number}` VPC network format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`. The project may be in any Google Cloud organization, not just the organization that the perimeter is defined in. `*` is not allowed, the case of allowing all Google Cloud resources only is not supported. */
283
+ resource?: string;
284
+ }
285
+ interface GoogleIdentityAccesscontextmanagerV1IngressTo {
286
+ /** A list of ApiOperations allowed to be performed by the sources specified in corresponding IngressFrom in this ServicePerimeter. */
287
+ operations?: GoogleIdentityAccesscontextmanagerV1ApiOperation[];
288
+ /** A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed. */
289
+ resources?: string[];
290
+ }
291
+ interface GoogleIdentityAccesscontextmanagerV1MethodSelector {
292
+ /** Value for `method` should be a valid method name for the corresponding `service_name` in ApiOperation. If `*` used as value for `method`, then ALL methods and permissions are allowed. */
293
+ method?: string;
294
+ /** Value for `permission` should be a valid Cloud IAM permission for the corresponding `service_name` in ApiOperation. */
295
+ permission?: string;
296
+ }
297
+ interface GoogleIdentityAccesscontextmanagerV1OsConstraint {
298
+ /** The minimum allowed OS version. If not set, any version of this OS satisfies the constraint. Format: `"major.minor.patch"`. Examples: `"10.5.301"`, `"9.2.1"`. */
299
+ minimumVersion?: string;
300
+ /** Required. The allowed OS type. */
301
+ osType?: string;
302
+ /** Only allows requests from devices with a verified Chrome OS. Verifications includes requirements that the device is enterprise-managed, conformant to domain policies, and the caller has permission to call the API targeted by the request. */
303
+ requireVerifiedChromeOs?: boolean;
304
+ }
305
+ interface GoogleIdentityAccesscontextmanagerV1ServicePerimeter {
306
+ /** Description of the `ServicePerimeter` and its use. Does not affect behavior. */
307
+ description?: string;
308
+ /** Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`. */
309
+ name?: string;
310
+ /** Perimeter type indicator. A single project or VPC network is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty. */
311
+ perimeterType?: string;
312
+ /** Proposed (or dry run) ServicePerimeter configuration. This configuration allows to specify and test ServicePerimeter configuration without enforcing actual access restrictions. Only allowed to be set when the "use_explicit_dry_run_spec" flag is set. */
313
+ spec?: GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig;
314
+ /** Current ServicePerimeter configuration. Specifies sets of resources, restricted services and access levels that determine perimeter content and boundaries. */
315
+ status?: GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig;
316
+ /** Human readable title. Must be unique within the Policy. */
317
+ title?: string;
318
+ /** Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists for all Service Perimeters, and that spec is identical to the status for those Service Perimeters. When this flag is set, it inhibits the generation of the implicit spec, thereby allowing the user to explicitly provide a configuration ("spec") to use in a dry-run version of the Service Perimeter. This allows the user to test changes to the enforced config ("status") without actually enforcing them. This testing is done through analyzing the differences between currently enforced and suggested restrictions. use_explicit_dry_run_spec must bet set to True if any of the fields in the spec are set to non-default values. */
319
+ useExplicitDryRunSpec?: boolean;
320
+ }
321
+ interface GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig {
322
+ /** A list of `AccessLevel` resource names that allow resources within the `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed must be in the same policy as this `ServicePerimeter`. Referencing a nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. For Service Perimeter Bridge, must be empty. */
323
+ accessLevels?: string[];
324
+ /** List of EgressPolicies to apply to the perimeter. A perimeter may have multiple EgressPolicies, each of which is evaluated separately. Access is granted if any EgressPolicy grants it. Must be empty for a perimeter bridge. */
325
+ egressPolicies?: GoogleIdentityAccesscontextmanagerV1EgressPolicy[];
326
+ /** List of IngressPolicies to apply to the perimeter. A perimeter may have multiple IngressPolicies, each of which is evaluated separately. Access is granted if any Ingress Policy grants it. Must be empty for a perimeter bridge. */
327
+ ingressPolicies?: GoogleIdentityAccesscontextmanagerV1IngressPolicy[];
328
+ /** A list of Google Cloud resources that are inside of the service perimeter. Currently only projects and VPCs are allowed. Project format: `projects/{project_number}` VPC network format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NAME}`. */
329
+ resources?: string[];
330
+ /** Google Cloud services that are subject to the Service Perimeter restrictions. For example, if `storage.googleapis.com` is specified, access to the storage buckets inside the perimeter must meet the perimeter's access restrictions. */
331
+ restrictedServices?: string[];
332
+ /** Configuration for APIs allowed within Perimeter. */
333
+ vpcAccessibleServices?: GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices;
334
+ }
335
+ interface GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices {
336
+ /** The list of APIs usable within the Service Perimeter. Must be empty unless 'enable_restriction' is True. You can specify a list of individual services, as well as include the 'RESTRICTED-SERVICES' value, which automatically includes all of the services protected by the perimeter. */
337
+ allowedServices?: string[];
338
+ /** Whether to restrict API calls within the Service Perimeter to the list of APIs specified in 'allowed_services'. */
339
+ enableRestriction?: boolean;
340
+ }
341
+ interface GoogleIdentityAccesscontextmanagerV1VpcNetworkSource {
342
+ /** Sub-segment ranges of a VPC network. */
343
+ vpcSubnetwork?: GoogleIdentityAccesscontextmanagerV1VpcSubNetwork;
344
+ }
345
+ interface GoogleIdentityAccesscontextmanagerV1VpcSubNetwork {
346
+ /** Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1` */
347
+ network?: string;
348
+ /** CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed. */
349
+ vpcIpSubnetworks?: string[];
350
+ }
351
+ interface IamPolicySearchResult {
352
+ /** Explanation about the IAM policy search result. It contains additional information that explains why the search result matches the query. */
353
+ explanation?: Explanation;
354
+ /** The IAM policy attached to the specified resource. Note that the original IAM policy can contain multiple bindings. This only contains the bindings that match the given query. For queries that don't contain a constraint on policies (e.g. an empty query), this contains all the bindings. */
355
+ policy?: Policy;
356
+ /** The project that the associated Google Cloud resource belongs to, in the form of `projects/{project_number}`. If an IAM policy is set on a resource -- such as a Compute Engine instance or a Cloud Storage bucket -- the project field will indicate the project that contains the resource. If an IAM policy is set on a folder or orgnization, the project field will be empty. */
357
+ project?: string;
358
+ /** The [full resource name](https://cloud.google.com/apis/design/resource_names#full_resource_name) of the resource associated with this IAM policy. */
359
+ resource?: string;
360
+ }
361
+ interface Permissions {
362
+ /** A list of permissions. Example permission string: "compute.disk.get". */
363
+ permissions?: string[];
364
+ }
365
+ interface Policy {
366
+ /** Specifies cloud audit logging configuration for this policy. */
367
+ auditConfigs?: AuditConfig[];
368
+ /** Associates a list of `members`, or principals, with a `role`. Optionally, may specify a `condition` that determines how and when the `bindings` are applied. Each of the `bindings` must contain at least one principal. The `bindings` in a `Policy` can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the `bindings` grant 50 different roles to `user:alice@example.com`, and not to any other principal, then you can add another 1,450 principals to the `bindings` in the `Policy`. */
369
+ bindings?: Binding[];
370
+ /** `etag` is used for optimistic concurrency control as a way to help prevent simultaneous updates of a policy from overwriting each other. It is strongly suggested that systems make use of the `etag` in the read-modify-write cycle to perform policy updates in order to avoid race conditions: An `etag` is returned in the response to `getIamPolicy`, and systems are expected to put that etag in the request to `setIamPolicy` to ensure that their change will be applied to the same version of the policy. **Important:** If you use IAM Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1` policy, and all of the conditions in the version `3` policy are lost. */
371
+ etag?: string;
372
+ /** Specifies the format of the policy. Valid values are `0`, `1`, and `3`. Requests that specify an invalid value are rejected. Any operation that affects conditional role bindings must specify version `3`. This requirement applies to the following operations: * Getting a policy that includes a conditional role binding * Adding a conditional role binding to a policy * Changing a conditional role binding in a policy * Removing any role binding, with or without a condition, from a policy that includes conditions **Important:** If you use IAM Conditions, you must include the `etag` field whenever you call `setIamPolicy`. If you omit this field, then IAM allows you to overwrite a version `3` policy with a version `1` policy, and all of the conditions in the version `3` policy are lost. If a policy does not include any conditions, operations on that policy may specify any valid version or leave the field unset. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). */
373
+ version?: number;
374
+ }
375
+ interface SearchAllIamPoliciesResponse {
376
+ /** Set if there are more results than those appearing in this response; to get the next set of results, call this method again, using this value as the `page_token`. */
377
+ nextPageToken?: string;
378
+ /** A list of IAM policies that match the search query. Related information such as the associated resource is returned along with the policy. */
379
+ results?: IamPolicySearchResult[];
380
+ }
381
+ interface SearchAllResourcesResponse {
382
+ /** If there are more results than those appearing in this response, then `next_page_token` is included. To get the next set of results, call this method again using the value of `next_page_token` as `page_token`. */
383
+ nextPageToken?: string;
384
+ /** A list of resource that match the search query. */
385
+ results?: StandardResourceMetadata[];
386
+ }
387
+ interface StandardResourceMetadata {
388
+ /** Additional searchable attributes of this resource. Informational only. The exact set of attributes is subject to change. For example: project id, DNS name etc. */
389
+ additionalAttributes?: string[];
390
+ /** The type of this resource. For example: "compute.googleapis.com/Disk". */
391
+ assetType?: string;
392
+ /** One or more paragraphs of text description of this resource. Maximum length could be up to 1M bytes. */
393
+ description?: string;
394
+ /** The display name of this resource. */
395
+ displayName?: string;
396
+ /** Labels associated with this resource. See [Labelling and grouping Google Cloud resources](https://cloud.google.com/blog/products/gcp/labelling-and-grouping-your-google-cloud-platform-resources) for more information. */
397
+ labels?: {[P in string]: string};
398
+ /** Location can be "global", regional like "us-east1", or zonal like "us-west1-b". */
399
+ location?: string;
400
+ /** The full resource name. For example: `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1`. See [Resource Names](https://cloud.google.com/apis/design/resource_names#full_resource_name) for more information. */
401
+ name?: string;
402
+ /** Network tags associated with this resource. Like labels, network tags are a type of annotations used to group Google Cloud resources. See [Labelling Google Cloud resources](lhttps://cloud.google.com/blog/products/gcp/labelling-and-grouping-your-google-cloud-platform-resources) for more information. */
403
+ networkTags?: string[];
404
+ /** The project that this resource belongs to, in the form of `projects/{project_number}`. */
405
+ project?: string;
406
+ }
407
+ interface IamPoliciesResource {
408
+ /** Searches all the IAM policies within a given accessible Resource Manager scope (project/folder/organization). This RPC gives callers especially administrators the ability to search all the IAM policies within a scope, even if they don't have `.getIamPolicy` permission of all the IAM policies. Callers should have `cloud.assets.SearchAllIamPolicies` permission on the requested scope, otherwise the request will be rejected. */
409
+ searchAll(request?: {
410
+ /** V1 error format. */
411
+ '$.xgafv'?: string;
412
+ /** OAuth access token. */
413
+ access_token?: string;
414
+ /** Data format for response. */
415
+ alt?: string;
416
+ /** JSONP */
417
+ callback?: string;
418
+ /** Selector specifying which fields to include in a partial response. */
419
+ fields?: string;
420
+ /** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
421
+ key?: string;
422
+ /** OAuth 2.0 token for the current user. */
423
+ oauth_token?: string;
424
+ /** Optional. The page size for search result pagination. Page size is capped at 500 even if a larger value is given. If set to zero, server will pick an appropriate default. Returned results may be fewer than requested. When this happens, there could be more results as long as `next_page_token` is returned. */
425
+ pageSize?: number;
426
+ /** Optional. If present, retrieve the next batch of results from the preceding call to this method. `page_token` must be the value of `next_page_token` from the previous response. The values of all other method parameters must be identical to those in the previous call. */
427
+ pageToken?: string;
428
+ /** Returns response with indentations and line breaks. */
429
+ prettyPrint?: boolean;
430
+ /** Optional. The query statement. Examples: * "policy:myuser@mydomain.com" * "policy:(myuser@mydomain.com viewer)" */
431
+ query?: string;
432
+ /** Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters. */
433
+ quotaUser?: string;
434
+ /** Required. The relative name of an asset. The search is limited to the resources within the `scope`. The allowed value must be: * Organization number (such as "organizations/123") * Folder number (such as "folders/1234") * Project number (such as "projects/12345") * Project ID (such as "projects/abc") */
435
+ scope: string;
436
+ /** Upload protocol for media (e.g. "raw", "multipart"). */
437
+ upload_protocol?: string;
438
+ /** Legacy upload protocol for media (e.g. "media", "multipart"). */
439
+ uploadType?: string;
440
+ }): Request<SearchAllIamPoliciesResponse>;
441
+ }
442
+ interface ResourcesResource {
443
+ /** Searches all the resources within a given accessible Resource Manager scope (project/folder/organization). This RPC gives callers especially administrators the ability to search all the resources within a scope, even if they don't have `.get` permission of all the resources. Callers should have `cloud.assets.SearchAllResources` permission on the requested scope, otherwise the request will be rejected. */
444
+ searchAll(request?: {
445
+ /** V1 error format. */
446
+ '$.xgafv'?: string;
447
+ /** OAuth access token. */
448
+ access_token?: string;
449
+ /** Data format for response. */
450
+ alt?: string;
451
+ /** Optional. A list of asset types that this request searches for. If empty, it will search all the supported asset types. */
452
+ assetTypes?: string | string[];
453
+ /** JSONP */
454
+ callback?: string;
455
+ /** Selector specifying which fields to include in a partial response. */
456
+ fields?: string;
457
+ /** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
458
+ key?: string;
459
+ /** OAuth 2.0 token for the current user. */
460
+ oauth_token?: string;
461
+ /** Optional. A comma separated list of fields specifying the sorting order of the results. The default order is ascending. Add ` DESC` after the field name to indicate descending order. Redundant space characters are ignored. For example, ` location DESC , name `. */
462
+ orderBy?: string;
463
+ /** Optional. The page size for search result pagination. Page size is capped at 500 even if a larger value is given. If set to zero, server will pick an appropriate default. Returned results may be fewer than requested. When this happens, there could be more results as long as `next_page_token` is returned. */
464
+ pageSize?: number;
465
+ /** Optional. If present, then retrieve the next batch of results from the preceding call to this method. `page_token` must be the value of `next_page_token` from the previous response. The values of all other method parameters, must be identical to those in the previous call. */
466
+ pageToken?: string;
467
+ /** Returns response with indentations and line breaks. */
468
+ prettyPrint?: boolean;
469
+ /** Optional. The query statement. */
470
+ query?: string;
471
+ /** Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters. */
472
+ quotaUser?: string;
473
+ /** Required. The relative name of an asset. The search is limited to the resources within the `scope`. The allowed value must be: * Organization number (such as "organizations/123") * Folder number (such as "folders/1234") * Project number (such as "projects/12345") * Project ID (such as "projects/abc") */
474
+ scope: string;
475
+ /** Upload protocol for media (e.g. "raw", "multipart"). */
476
+ upload_protocol?: string;
477
+ /** Legacy upload protocol for media (e.g. "media", "multipart"). */
478
+ uploadType?: string;
479
+ }): Request<SearchAllResourcesResponse>;
480
+ }
941
481
 
942
- const iamPolicies: IamPoliciesResource;
482
+ const iamPolicies: IamPoliciesResource;
943
483
 
944
- const resources: ResourcesResource;
945
- }
484
+ const resources: ResourcesResource;
485
+ }
946
486
  }