@maxim_mazurok/gapi.client.cloudasset-v1p1beta1 0.0.20241110 → 0.0.20241211
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +6 -2
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://cloudasset.googleapis.com/$discovery/rest?version=v1p1beta1
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20241211
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -249,6 +249,8 @@ declare namespace gapi.client {
|
|
|
249
249
|
egressFrom?: GoogleIdentityAccesscontextmanagerV1EgressFrom;
|
|
250
250
|
/** Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. */
|
|
251
251
|
egressTo?: GoogleIdentityAccesscontextmanagerV1EgressTo;
|
|
252
|
+
/** Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters. */
|
|
253
|
+
title?: string;
|
|
252
254
|
}
|
|
253
255
|
interface GoogleIdentityAccesscontextmanagerV1EgressSource {
|
|
254
256
|
/** An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed. */
|
|
@@ -275,6 +277,8 @@ declare namespace gapi.client {
|
|
|
275
277
|
ingressFrom?: GoogleIdentityAccesscontextmanagerV1IngressFrom;
|
|
276
278
|
/** Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply. */
|
|
277
279
|
ingressTo?: GoogleIdentityAccesscontextmanagerV1IngressTo;
|
|
280
|
+
/** Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters. */
|
|
281
|
+
title?: string;
|
|
278
282
|
}
|
|
279
283
|
interface GoogleIdentityAccesscontextmanagerV1IngressSource {
|
|
280
284
|
/** An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed. */
|
|
@@ -305,7 +309,7 @@ declare namespace gapi.client {
|
|
|
305
309
|
interface GoogleIdentityAccesscontextmanagerV1ServicePerimeter {
|
|
306
310
|
/** Description of the `ServicePerimeter` and its use. Does not affect behavior. */
|
|
307
311
|
description?: string;
|
|
308
|
-
/** Optional. An opaque identifier for the current version of the `ServicePerimeter`.
|
|
312
|
+
/** Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided. */
|
|
309
313
|
etag?: string;
|
|
310
314
|
/** Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`. */
|
|
311
315
|
name?: string;
|