@maxim_mazurok/gapi.client.cloudasset-v1p1beta1 0.0.20240601 → 0.0.20240614
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +5 -5
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://cloudasset.googleapis.com/$discovery/rest?version=v1p1beta1
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240614
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -171,15 +171,15 @@ declare namespace gapi.client {
|
|
|
171
171
|
custom?: GoogleIdentityAccesscontextmanagerV1CustomLevel;
|
|
172
172
|
/** Description of the `AccessLevel` and its use. Does not affect behavior. */
|
|
173
173
|
description?: string;
|
|
174
|
-
/** Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`. */
|
|
174
|
+
/** Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`. */
|
|
175
175
|
name?: string;
|
|
176
176
|
/** Human readable title. Must be unique within the Policy. */
|
|
177
177
|
title?: string;
|
|
178
178
|
}
|
|
179
179
|
interface GoogleIdentityAccesscontextmanagerV1AccessPolicy {
|
|
180
|
-
/** Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access
|
|
180
|
+
/** Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Policies will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format. */
|
|
181
181
|
etag?: string;
|
|
182
|
-
/** Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}` */
|
|
182
|
+
/** Output only. Identifier. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}` */
|
|
183
183
|
name?: string;
|
|
184
184
|
/** Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}` */
|
|
185
185
|
parent?: string;
|
|
@@ -305,7 +305,7 @@ declare namespace gapi.client {
|
|
|
305
305
|
interface GoogleIdentityAccesscontextmanagerV1ServicePerimeter {
|
|
306
306
|
/** Description of the `ServicePerimeter` and its use. Does not affect behavior. */
|
|
307
307
|
description?: string;
|
|
308
|
-
/** Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`. */
|
|
308
|
+
/** Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`. */
|
|
309
309
|
name?: string;
|
|
310
310
|
/** Perimeter type indicator. A single project or VPC network is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty. */
|
|
311
311
|
perimeterType?: string;
|