make regen-apis

This commit is contained in:
OMGeeky
2023-10-23 12:55:17 +02:00
parent a4b0f56b8c
commit 4a258a57a6
1025 changed files with 29943 additions and 28980 deletions

View File

@@ -77,7 +77,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -362,7 +362,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -580,7 +580,7 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.access_policies().access_levels_get("name")
/// .access_level_format("gubergren")
/// .access_level_format(&Default::default())
/// .doit().await;
/// # }
/// ```
@@ -589,7 +589,7 @@ pub struct AccessPolicyAccessLevelGetCall<'a, S>
pub(super) hub: &'a AccessContextManager<S>,
pub(super) _name: String,
pub(super) _access_level_format: Option<String>,
pub(super) _access_level_format: Option<AccessPolicyAccessLevelFormatEnum>,
pub(super) _delegate: Option<&'a mut dyn client::Delegate>,
pub(super) _additional_params: HashMap<String, String>,
pub(super) _scopes: BTreeSet<String>
@@ -626,7 +626,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._access_level_format.as_ref() {
params.push("accessLevelFormat", value);
}
@@ -747,8 +747,8 @@ where
/// Whether to return `BasicLevels` in the Cloud Common Expression Language rather than as `BasicLevels`. Defaults to AS_DEFINED, where Access Levels are returned as `BasicLevels` or `CustomLevels` based on how they were created. If set to CEL, all Access Levels are returned as `CustomLevels`. In the CEL case, `BasicLevels` are translated to equivalent `CustomLevels`.
///
/// Sets the *access level format* query property to the given value.
pub fn access_level_format(mut self, new_value: &str) -> AccessPolicyAccessLevelGetCall<'a, S> {
self._access_level_format = Some(new_value.to_string());
pub fn access_level_format(mut self, new_value: &AccessPolicyAccessLevelFormatEnum) -> AccessPolicyAccessLevelGetCall<'a, S> {
self._access_level_format = Some(new_value.clone());
self
}
/// The delegate implementation is consulted whenever there is an intermediate result, or if something goes wrong
@@ -854,9 +854,9 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.access_policies().access_levels_list("parent")
/// .page_token("dolor")
/// .page_size(-17)
/// .access_level_format("ipsum")
/// .page_token("eos")
/// .page_size(-4)
/// .access_level_format(&Default::default())
/// .doit().await;
/// # }
/// ```
@@ -867,7 +867,7 @@ pub struct AccessPolicyAccessLevelListCall<'a, S>
pub(super) _parent: String,
pub(super) _page_token: Option<String>,
pub(super) _page_size: Option<i32>,
pub(super) _access_level_format: Option<String>,
pub(super) _access_level_format: Option<AccessPolicyAccessLevelFormatEnum>,
pub(super) _delegate: Option<&'a mut dyn client::Delegate>,
pub(super) _additional_params: HashMap<String, String>,
pub(super) _scopes: BTreeSet<String>
@@ -904,7 +904,7 @@ where
}
let mut params = Params::with_capacity(6 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
if let Some(value) = self._page_token.as_ref() {
params.push("pageToken", value);
}
@@ -1045,8 +1045,8 @@ where
/// Whether to return `BasicLevels` in the Cloud Common Expression language, as `CustomLevels`, rather than as `BasicLevels`. Defaults to returning `AccessLevels` in the format they were defined.
///
/// Sets the *access level format* query property to the given value.
pub fn access_level_format(mut self, new_value: &str) -> AccessPolicyAccessLevelListCall<'a, S> {
self._access_level_format = Some(new_value.to_string());
pub fn access_level_format(mut self, new_value: &AccessPolicyAccessLevelFormatEnum) -> AccessPolicyAccessLevelListCall<'a, S> {
self._access_level_format = Some(new_value.clone());
self
}
/// The delegate implementation is consulted whenever there is an intermediate result, or if something goes wrong
@@ -1205,7 +1205,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._update_mask.as_ref() {
params.push("updateMask", value.to_string());
}
@@ -1507,7 +1507,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -1799,7 +1799,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("resource", self._resource);
params.push("resource", &self._resource);
params.extend(self._additional_params.iter());
@@ -2091,7 +2091,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -2376,7 +2376,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -2638,7 +2638,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -2856,8 +2856,8 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.access_policies().authorized_orgs_descs_list("parent")
/// .page_token("rebum.")
/// .page_size(-57)
/// .page_token("ut")
/// .page_size(-12)
/// .doit().await;
/// # }
/// ```
@@ -2904,7 +2904,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
if let Some(value) = self._page_token.as_ref() {
params.push("pageToken", value);
}
@@ -3195,7 +3195,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._update_mask.as_ref() {
params.push("updateMask", value.to_string());
}
@@ -3497,7 +3497,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -3789,7 +3789,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -4074,7 +4074,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -4336,7 +4336,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -4554,8 +4554,8 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.access_policies().service_perimeters_list("parent")
/// .page_token("Lorem")
/// .page_size(-25)
/// .page_token("ea")
/// .page_size(-99)
/// .doit().await;
/// # }
/// ```
@@ -4602,7 +4602,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
if let Some(value) = self._page_token.as_ref() {
params.push("pageToken", value);
}
@@ -4893,7 +4893,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._update_mask.as_ref() {
params.push("updateMask", value.to_string());
}
@@ -5195,7 +5195,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -5487,7 +5487,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("resource", self._resource);
params.push("resource", &self._resource);
params.extend(self._additional_params.iter());
@@ -6045,7 +6045,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -6307,7 +6307,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -6576,7 +6576,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("resource", self._resource);
params.push("resource", &self._resource);
params.extend(self._additional_params.iter());
@@ -6817,9 +6817,9 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.access_policies().list()
/// .parent("kasd")
/// .page_token("et")
/// .page_size(-43)
/// .parent("no")
/// .page_token("Stet")
/// .page_size(-13)
/// .doit().await;
/// # }
/// ```
@@ -7149,7 +7149,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._update_mask.as_ref() {
params.push("updateMask", value.to_string());
}
@@ -7451,7 +7451,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("resource", self._resource);
params.push("resource", &self._resource);
params.extend(self._additional_params.iter());
@@ -7743,7 +7743,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("resource", self._resource);
params.push("resource", &self._resource);
params.extend(self._additional_params.iter());
@@ -8035,7 +8035,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -8320,7 +8320,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -8582,7 +8582,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -8800,9 +8800,9 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.operations().list("name")
/// .page_token("et")
/// .page_size(-28)
/// .filter("amet.")
/// .page_token("duo")
/// .page_size(-34)
/// .filter("et")
/// .doit().await;
/// # }
/// ```
@@ -8850,7 +8850,7 @@ where
}
let mut params = Params::with_capacity(6 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._page_token.as_ref() {
params.push("pageToken", value);
}
@@ -9149,7 +9149,7 @@ where
}
let mut params = Params::with_capacity(4 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
params.extend(self._additional_params.iter());
@@ -9434,7 +9434,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -9696,7 +9696,7 @@ where
}
let mut params = Params::with_capacity(3 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
params.extend(self._additional_params.iter());
@@ -9914,8 +9914,8 @@ where
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.organizations().gcp_user_access_bindings_list("parent")
/// .page_token("et")
/// .page_size(-95)
/// .page_token("dolor")
/// .page_size(-18)
/// .doit().await;
/// # }
/// ```
@@ -9962,7 +9962,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("parent", self._parent);
params.push("parent", &self._parent);
if let Some(value) = self._page_token.as_ref() {
params.push("pageToken", value);
}
@@ -10253,7 +10253,7 @@ where
}
let mut params = Params::with_capacity(5 + self._additional_params.len());
params.push("name", self._name);
params.push("name", &self._name);
if let Some(value) = self._update_mask.as_ref() {
params.push("updateMask", value.to_string());
}

View File

@@ -30,3 +30,6 @@ pub use method_builders::*;
mod call_builders;
pub use call_builders::*;
mod enums;
pub use enums::*;

View File

@@ -120,7 +120,7 @@ pub struct AuditLogConfig {
/// The log type that this config enables.
#[serde(rename="logType")]
pub log_type: Option<String>,
pub log_type: Option<AuditLogConfigLogTypeEnum>,
}
impl client::Part for AuditLogConfig {}
@@ -142,15 +142,15 @@ pub struct AuthorizedOrgsDesc {
/// The asset type of this authorized orgs desc. e.g. device, credential strength.
#[serde(rename="assetType")]
pub asset_type: Option<String>,
pub asset_type: Option<AuthorizedOrgsDescAssetTypeEnum>,
/// Authorization direction of this authorization relationship. i.e. Whether to allow specified orgs to evaluate this org's traffic, or allow specified orgs' traffic to be evaluated by this org. Orgs specified as `AUTHORIZATION_DIRECTION_TO` in this AuthorizedOrgsDesc[com.google.identity.accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `AUTHORIZATION_DIRECTION_FROM` in their own AuthorizedOrgsDesc in order for this relationship to take effect. Orgs specified as `AUTHORIZATION_DIRECTION_FROM` in this AuthorizedOrgsDesc[com.google.identity.accesscontextmanager.v1.AuthorizedOrgsDesc] must also specify this org as the `AUTHORIZATION_DIRECTION_TO` in their own AuthorizedOrgsDesc in order for this relationship to take effect.
#[serde(rename="authorizationDirection")]
pub authorization_direction: Option<String>,
pub authorization_direction: Option<AuthorizedOrgsDescAuthorizationDirectionEnum>,
/// The authorization type of this authorized orgs desc. e.g.authorization, troubleshooting or logging.
#[serde(rename="authorizationType")]
pub authorization_type: Option<String>,
pub authorization_type: Option<AuthorizedOrgsDescAuthorizationTypeEnum>,
/// Assigned by the server during creation. The last segment has an arbitrary length and has only URI unreserved characters (as defined by [RFC 3986 Section 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be specified by the client during creation. Example: "accessPolicies/122256/authorizedOrgs/b3-BhcX_Ud5N"
pub name: Option<String>,
@@ -173,7 +173,7 @@ pub struct BasicLevel {
/// How the `conditions` list should be combined to determine if a request is granted this `AccessLevel`. If AND is used, each `Condition` in `conditions` must be satisfied for the `AccessLevel` to be applied. If OR is used, at least one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be applied. Default behavior is AND.
#[serde(rename="combiningFunction")]
pub combining_function: Option<String>,
pub combining_function: Option<BasicLevelCombiningFunctionEnum>,
/// Required. A list of requirements for the `AccessLevel` to be granted.
pub conditions: Option<Vec<Condition>>,
@@ -295,11 +295,11 @@ pub struct DevicePolicy {
/// Allowed device management levels, an empty list allows all management levels.
#[serde(rename="allowedDeviceManagementLevels")]
pub allowed_device_management_levels: Option<Vec<String>>,
pub allowed_device_management_levels: Option<Vec<DevicePolicyAllowedDeviceManagementLevelsEnum>>,
/// Allowed encryptions statuses, an empty list allows all statuses.
#[serde(rename="allowedEncryptionStatuses")]
pub allowed_encryption_statuses: Option<Vec<String>>,
pub allowed_encryption_statuses: Option<Vec<DevicePolicyAllowedEncryptionStatusesEnum>>,
/// Allowed OS versions, an empty list allows all types and all versions.
#[serde(rename="osConstraints")]
@@ -334,7 +334,7 @@ pub struct EgressFrom {
/// Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
#[serde(rename="identityType")]
pub identity_type: Option<String>,
pub identity_type: Option<EgressFromIdentityTypeEnum>,
}
impl client::Part for EgressFrom {}
@@ -500,7 +500,7 @@ pub struct IngressFrom {
/// Specifies the type of identities that are allowed access from outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
#[serde(rename="identityType")]
pub identity_type: Option<String>,
pub identity_type: Option<IngressFromIdentityTypeEnum>,
/// Sources that this IngressPolicy authorizes access from.
pub sources: Option<Vec<IngressSource>>,
@@ -794,7 +794,7 @@ pub struct OsConstraint {
/// Required. The allowed OS type.
#[serde(rename="osType")]
pub os_type: Option<String>,
pub os_type: Option<OsConstraintOsTypeEnum>,
/// Only allows requests from devices with a verified Chrome OS. Verifications includes requirements that the device is enterprise-managed, conformant to domain policies, and the caller has permission to call the API targeted by the request.
#[serde(rename="requireVerifiedChromeOs")]
@@ -903,7 +903,7 @@ pub struct ServicePerimeter {
/// Perimeter type indicator. A single project is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty.
#[serde(rename="perimeterType")]
pub perimeter_type: Option<String>,
pub perimeter_type: Option<ServicePerimeterPerimeterTypeEnum>,
/// Proposed (or dry run) ServicePerimeter configuration. This configuration allows to specify and test ServicePerimeter configuration without enforcing actual access restrictions. Only allowed to be set when the "use_explicit_dry_run_spec" flag is set.
pub spec: Option<ServicePerimeterConfig>,