@maxim_mazurok/gapi.client.cloudasset-v1p1beta1 0.0.20241110 → 0.0.20241211

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.d.ts +6 -2
  2. package/package.json +1 -1
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://cloudasset.googleapis.com/$discovery/rest?version=v1p1beta1
12
- // Revision: 20241110
12
+ // Revision: 20241211
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -249,6 +249,8 @@ declare namespace gapi.client {
249
249
  egressFrom?: GoogleIdentityAccesscontextmanagerV1EgressFrom;
250
250
  /** Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply. */
251
251
  egressTo?: GoogleIdentityAccesscontextmanagerV1EgressTo;
252
+ /** Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters. */
253
+ title?: string;
252
254
  }
253
255
  interface GoogleIdentityAccesscontextmanagerV1EgressSource {
254
256
  /** An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed. */
@@ -275,6 +277,8 @@ declare namespace gapi.client {
275
277
  ingressFrom?: GoogleIdentityAccesscontextmanagerV1IngressFrom;
276
278
  /** Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply. */
277
279
  ingressTo?: GoogleIdentityAccesscontextmanagerV1IngressTo;
280
+ /** Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters. */
281
+ title?: string;
278
282
  }
279
283
  interface GoogleIdentityAccesscontextmanagerV1IngressSource {
280
284
  /** An AccessLevel resource name that allow resources within the ServicePerimeters to be accessed from the internet. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If no AccessLevel names are listed, resources within the perimeter can only be accessed via Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all IngressSources will be allowed. */
@@ -305,7 +309,7 @@ declare namespace gapi.client {
305
309
  interface GoogleIdentityAccesscontextmanagerV1ServicePerimeter {
306
310
  /** Description of the `ServicePerimeter` and its use. Does not affect behavior. */
307
311
  description?: string;
308
- /** Optional. An opaque identifier for the current version of the `ServicePerimeter`. Clients should not expect this to be in any specific format. If etag is not provided, the operation will be performed as if a valid etag is provided. */
312
+ /** Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided. */
309
313
  etag?: string;
310
314
  /** Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`. */
311
315
  name?: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.cloudasset-v1p1beta1",
3
- "version": "0.0.20241110",
3
+ "version": "0.0.20241211",
4
4
  "description": "TypeScript typings for Cloud Asset API v1p1beta1",
5
5
  "repository": {
6
6
  "type": "git",