mirror of
https://github.com/OMGeeky/google-apis-rs.git
synced 2026-01-05 11:06:05 +01:00
update all json files
This commit is contained in:
@@ -22,6 +22,7 @@
|
||||
},
|
||||
"id": "accesscontextmanager:v1beta",
|
||||
"kind": "discovery#restDescription",
|
||||
"mtlsRootUrl": "https://accesscontextmanager.mtls.googleapis.com/",
|
||||
"name": "accesscontextmanager",
|
||||
"ownerDomain": "google.com",
|
||||
"ownerName": "Google",
|
||||
@@ -388,14 +389,14 @@
|
||||
],
|
||||
"parameters": {
|
||||
"name": {
|
||||
"description": "Required. Resource name for the Access Level. The `short_name` component\nmust begin with a letter and only include alphanumeric and '_'. Format:\n`accessPolicies/{policy_id}/accessLevels/{short_name}`",
|
||||
"description": "Required. Resource name for the Access Level. The `short_name` component\nmust begin with a letter and only include alphanumeric and '_'. Format:\n`accessPolicies/{policy_id}/accessLevels/{short_name}`. The maximum length\n // of the `short_name` component is 50 characters.",
|
||||
"location": "path",
|
||||
"pattern": "^accessPolicies/[^/]+/accessLevels/[^/]+$",
|
||||
"required": true,
|
||||
"type": "string"
|
||||
},
|
||||
"updateMask": {
|
||||
"description": "Required. Mask to control which fields get updated. Must be non-empty.",
|
||||
"description": "Required. Mask to control which fields get updated. Must be non-empty.",
|
||||
"format": "google-fieldmask",
|
||||
"location": "query",
|
||||
"type": "string"
|
||||
@@ -417,7 +418,7 @@
|
||||
"servicePerimeters": {
|
||||
"methods": {
|
||||
"create": {
|
||||
"description": "Create an Service Perimeter. The\nlongrunning operation from this RPC will have a successful status once the\nService Perimeter has\npropagated to long-lasting storage. Service Perimeters containing\nerrors will result in an error response for the first error encountered.",
|
||||
"description": "Create a Service Perimeter. The\nlongrunning operation from this RPC will have a successful status once the\nService Perimeter has\npropagated to long-lasting storage. Service Perimeters containing\nerrors will result in an error response for the first error encountered.",
|
||||
"flatPath": "v1beta/accessPolicies/{accessPoliciesId}/servicePerimeters",
|
||||
"httpMethod": "POST",
|
||||
"id": "accesscontextmanager.accessPolicies.servicePerimeters.create",
|
||||
@@ -445,7 +446,7 @@
|
||||
]
|
||||
},
|
||||
"delete": {
|
||||
"description": "Delete an Service Perimeter by resource\nname. The longrunning operation from this RPC will have a successful status\nonce the Service Perimeter has been\nremoved from long-lasting storage.",
|
||||
"description": "Delete a Service Perimeter by resource\nname. The longrunning operation from this RPC will have a successful status\nonce the Service Perimeter has been\nremoved from long-lasting storage.",
|
||||
"flatPath": "v1beta/accessPolicies/{accessPoliciesId}/servicePerimeters/{servicePerimetersId}",
|
||||
"httpMethod": "DELETE",
|
||||
"id": "accesscontextmanager.accessPolicies.servicePerimeters.delete",
|
||||
@@ -470,7 +471,7 @@
|
||||
]
|
||||
},
|
||||
"get": {
|
||||
"description": "Get an Service Perimeter by resource\nname.",
|
||||
"description": "Get a Service Perimeter by resource\nname.",
|
||||
"flatPath": "v1beta/accessPolicies/{accessPoliciesId}/servicePerimeters/{servicePerimetersId}",
|
||||
"httpMethod": "GET",
|
||||
"id": "accesscontextmanager.accessPolicies.servicePerimeters.get",
|
||||
@@ -531,7 +532,7 @@
|
||||
]
|
||||
},
|
||||
"patch": {
|
||||
"description": "Update an Service Perimeter. The\nlongrunning operation from this RPC will have a successful status once the\nchanges to the Service Perimeter have\npropagated to long-lasting storage. Service Perimeter containing\nerrors will result in an error response for the first error encountered.",
|
||||
"description": "Update a Service Perimeter. The\nlongrunning operation from this RPC will have a successful status once the\nchanges to the Service Perimeter have\npropagated to long-lasting storage. Service Perimeter containing\nerrors will result in an error response for the first error encountered.",
|
||||
"flatPath": "v1beta/accessPolicies/{accessPoliciesId}/servicePerimeters/{servicePerimetersId}",
|
||||
"httpMethod": "PATCH",
|
||||
"id": "accesscontextmanager.accessPolicies.servicePerimeters.patch",
|
||||
@@ -582,7 +583,7 @@
|
||||
"name": {
|
||||
"description": "The name of the operation resource.",
|
||||
"location": "path",
|
||||
"pattern": "^operations/.+$",
|
||||
"pattern": "^operations/.*$",
|
||||
"required": true,
|
||||
"type": "string"
|
||||
}
|
||||
@@ -598,51 +599,40 @@
|
||||
}
|
||||
}
|
||||
},
|
||||
"revision": "20190626",
|
||||
"revision": "20200405",
|
||||
"rootUrl": "https://accesscontextmanager.googleapis.com/",
|
||||
"schemas": {
|
||||
"AccessLevel": {
|
||||
"description": "An `AccessLevel` is a label that can be applied to requests to GCP services,\nalong with a list of requirements necessary for the label to be applied.",
|
||||
"description": "An `AccessLevel` is a label that can be applied to requests to Google Cloud\nservices, along with a list of requirements necessary for the label to be\napplied.",
|
||||
"id": "AccessLevel",
|
||||
"properties": {
|
||||
"basic": {
|
||||
"$ref": "BasicLevel",
|
||||
"description": "A `BasicLevel` composed of `Conditions`."
|
||||
},
|
||||
"createTime": {
|
||||
"description": "Output only. Time the `AccessLevel` was created in UTC.",
|
||||
"format": "google-datetime",
|
||||
"type": "string"
|
||||
"custom": {
|
||||
"$ref": "CustomLevel",
|
||||
"description": "A `CustomLevel` written in the Common Expression Language."
|
||||
},
|
||||
"description": {
|
||||
"description": "Description of the `AccessLevel` and its use. Does not affect behavior.",
|
||||
"type": "string"
|
||||
},
|
||||
"name": {
|
||||
"description": "Required. Resource name for the Access Level. The `short_name` component\nmust begin with a letter and only include alphanumeric and '_'. Format:\n`accessPolicies/{policy_id}/accessLevels/{short_name}`",
|
||||
"description": "Required. Resource name for the Access Level. The `short_name` component\nmust begin with a letter and only include alphanumeric and '_'. Format:\n`accessPolicies/{policy_id}/accessLevels/{short_name}`. The maximum length\n // of the `short_name` component is 50 characters.",
|
||||
"type": "string"
|
||||
},
|
||||
"title": {
|
||||
"description": "Human readable title. Must be unique within the Policy.",
|
||||
"type": "string"
|
||||
},
|
||||
"updateTime": {
|
||||
"description": "Output only. Time the `AccessLevel` was updated in UTC.",
|
||||
"format": "google-datetime",
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"AccessPolicy": {
|
||||
"description": "`AccessPolicy` is a container for `AccessLevels` (which define the necessary\nattributes to use GCP services) and `ServicePerimeters` (which define regions\nof services able to freely pass data within a perimeter). An access policy is\nglobally visible within an organization, and the restrictions it specifies\napply to all projects within an organization.",
|
||||
"description": "`AccessPolicy` is a container for `AccessLevels` (which define the necessary\nattributes to use Google Cloud services) and `ServicePerimeters` (which\ndefine regions of services able to freely pass data within a perimeter). An\naccess policy is globally visible within an organization, and the\nrestrictions it specifies apply to all projects within an organization.",
|
||||
"id": "AccessPolicy",
|
||||
"properties": {
|
||||
"createTime": {
|
||||
"description": "Output only. Time the `AccessPolicy` was created in UTC.",
|
||||
"format": "google-datetime",
|
||||
"type": "string"
|
||||
},
|
||||
"name": {
|
||||
"description": "Output only. Resource name of the `AccessPolicy`. Format:\n`accessPolicies/{policy_id}`",
|
||||
"type": "string"
|
||||
@@ -654,11 +644,6 @@
|
||||
"title": {
|
||||
"description": "Required. Human readable title. Does not affect behavior.",
|
||||
"type": "string"
|
||||
},
|
||||
"updateTime": {
|
||||
"description": "Output only. Time the `AccessPolicy` was updated in UTC.",
|
||||
"format": "google-datetime",
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
@@ -689,24 +674,6 @@
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"BridgeServiceRestriction": {
|
||||
"description": "Alpha. Specifies which services are granted access via this Bridge Service\nPerimeter.",
|
||||
"id": "BridgeServiceRestriction",
|
||||
"properties": {
|
||||
"allowedServices": {
|
||||
"description": "The list of APIs usable through the Bridge Perimeter. Must be empty\nunless 'enable_restriction' is True.",
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
},
|
||||
"enableRestriction": {
|
||||
"description": "Whether to restrict the set of APIs callable through the Bridge Service\nPerimeter.",
|
||||
"type": "boolean"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"Condition": {
|
||||
"description": "A condition necessary for an `AccessLevel` to be granted. The Condition is an\nAND over its fields. So a Condition is true if: 1) the request IP is from one\nof the listed subnetworks AND 2) the originating device complies with the\nlisted device policy AND 3) all listed access levels are granted AND 4) the\nrequest was sent at a time allowed by the DateTimeRestriction.",
|
||||
"id": "Condition",
|
||||
@@ -750,6 +717,17 @@
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"CustomLevel": {
|
||||
"description": "`CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language\nto represent the necessary conditions for the level to apply to a request.\nSee CEL spec at: https://github.com/google/cel-spec",
|
||||
"id": "CustomLevel",
|
||||
"properties": {
|
||||
"expr": {
|
||||
"$ref": "Expr",
|
||||
"description": "Required. A Cloud CEL expression evaluating to a boolean."
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"DevicePolicy": {
|
||||
"description": "`DevicePolicy` specifies device specific restrictions necessary to acquire a\ngiven access level. A `DevicePolicy` specifies requirements for requests from\ndevices to be granted access levels, it does not do any enforcement on the\ndevice. `DevicePolicy` acts as an AND over all specified fields, and each\nrepeated field is an OR over its elements. Any unset fields are ignored. For\nexample, if the proto is { os_type : DESKTOP_WINDOWS, os_type :\nDESKTOP_LINUX, encryption_status: ENCRYPTED}, then the DevicePolicy will be\ntrue for requests originating from encrypted Linux desktops and encrypted\nWindows desktops.",
|
||||
"id": "DevicePolicy",
|
||||
@@ -814,20 +792,25 @@
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"IngressServiceRestriction": {
|
||||
"description": "Alpha. Specifies how Access Levels are to be used for accessing the Service\nPerimeter.",
|
||||
"id": "IngressServiceRestriction",
|
||||
"Expr": {
|
||||
"description": "Represents a textual expression in the Common Expression Language (CEL)\nsyntax. CEL is a C-like expression language. The syntax and semantics of CEL\nare documented at https://github.com/google/cel-spec.\n\nExample (Comparison):\n\n title: \"Summary size limit\"\n description: \"Determines if a summary is less than 100 chars\"\n expression: \"document.summary.size() < 100\"\n\nExample (Equality):\n\n title: \"Requestor is owner\"\n description: \"Determines if requestor is the document owner\"\n expression: \"document.owner == request.auth.claims.email\"\n\nExample (Logic):\n\n title: \"Public documents\"\n description: \"Determine whether the document should be publicly visible\"\n expression: \"document.type != 'private' && document.type != 'internal'\"\n\nExample (Data Manipulation):\n\n title: \"Notification string\"\n description: \"Create a notification string with a timestamp.\"\n expression: \"'New message received at ' + string(document.create_time)\"\n\nThe exact variables and functions that may be referenced within an expression\nare determined by the service that evaluates it. See the service\ndocumentation for additional information.",
|
||||
"id": "Expr",
|
||||
"properties": {
|
||||
"allowedServices": {
|
||||
"description": "The list of APIs usable with a valid Access Level. Must be empty unless\n'enable_restriction' is True.",
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
"description": {
|
||||
"description": "Optional. Description of the expression. This is a longer text which\ndescribes the expression, e.g. when hovered over it in a UI.",
|
||||
"type": "string"
|
||||
},
|
||||
"enableRestriction": {
|
||||
"description": "Whether to restrict the set of APIs callable outside the Service\nPerimeter via Access Levels.",
|
||||
"type": "boolean"
|
||||
"expression": {
|
||||
"description": "Textual representation of an expression in Common Expression Language\nsyntax.",
|
||||
"type": "string"
|
||||
},
|
||||
"location": {
|
||||
"description": "Optional. String indicating the location of the expression for error\nreporting, e.g. a file name and a position in the file.",
|
||||
"type": "string"
|
||||
},
|
||||
"title": {
|
||||
"description": "Optional. Title for the expression, i.e. a short string describing\nits purpose. This can be used e.g. in UIs which allow to enter the\nexpression.",
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
@@ -936,33 +919,32 @@
|
||||
"DESKTOP_MAC",
|
||||
"DESKTOP_WINDOWS",
|
||||
"DESKTOP_LINUX",
|
||||
"DESKTOP_CHROME_OS"
|
||||
"DESKTOP_CHROME_OS",
|
||||
"ANDROID",
|
||||
"IOS"
|
||||
],
|
||||
"enumDescriptions": [
|
||||
"The operating system of the device is not specified or not known.",
|
||||
"A desktop Mac operating system.",
|
||||
"A desktop Windows operating system.",
|
||||
"A desktop Linux operating system.",
|
||||
"A desktop ChromeOS operating system."
|
||||
"A desktop ChromeOS operating system.",
|
||||
"An Android operating system.",
|
||||
"An iOS operating system."
|
||||
],
|
||||
"type": "string"
|
||||
},
|
||||
"requireVerifiedChromeOs": {
|
||||
"description": "Only allows requests from devices with a verified Chrome OS.\nVerifications includes requirements that the device is enterprise-managed,\nconformant to Dasher domain policies, and the caller has permission to call\nthe API targeted by the request.",
|
||||
"description": "Only allows requests from devices with a verified Chrome OS.\nVerifications includes requirements that the device is enterprise-managed,\nconformant to domain policies, and the caller has permission to call\nthe API targeted by the request.",
|
||||
"type": "boolean"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"ServicePerimeter": {
|
||||
"description": "`ServicePerimeter` describes a set of GCP resources which can freely import\nand export data amongst themselves, but not export outside of the\n`ServicePerimeter`. If a request with a source within this `ServicePerimeter`\nhas a target outside of the `ServicePerimeter`, the request will be blocked.\nOtherwise the request is allowed. There are two types of Service Perimeter -\nRegular and Bridge. Regular Service Perimeters cannot overlap, a single GCP\nproject can only belong to a single regular Service Perimeter. Service\nPerimeter Bridges can contain only GCP projects as members, a single GCP\nproject may belong to multiple Service Perimeter Bridges.",
|
||||
"description": "`ServicePerimeter` describes a set of Google Cloud resources which can freely\nimport and export data amongst themselves, but not export outside of the\n`ServicePerimeter`. If a request with a source within this `ServicePerimeter`\nhas a target outside of the `ServicePerimeter`, the request will be blocked.\nOtherwise the request is allowed. There are two types of Service Perimeter -\nRegular and Bridge. Regular Service Perimeters cannot overlap, a single\nGoogle Cloud project can only belong to a single regular Service Perimeter.\nService Perimeter Bridges can contain only Google Cloud projects as members,\na single Google Cloud project may belong to multiple Service Perimeter\nBridges.",
|
||||
"id": "ServicePerimeter",
|
||||
"properties": {
|
||||
"createTime": {
|
||||
"description": "Output only. Time the `ServicePerimeter` was created in UTC.",
|
||||
"format": "google-datetime",
|
||||
"type": "string"
|
||||
},
|
||||
"description": {
|
||||
"description": "Description of the `ServicePerimeter` and its use. Does not affect\nbehavior.",
|
||||
"type": "string"
|
||||
@@ -990,58 +972,45 @@
|
||||
"title": {
|
||||
"description": "Human readable title. Must be unique within the Policy.",
|
||||
"type": "string"
|
||||
},
|
||||
"updateTime": {
|
||||
"description": "Output only. Time the `ServicePerimeter` was updated in UTC.",
|
||||
"format": "google-datetime",
|
||||
"type": "string"
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"ServicePerimeterConfig": {
|
||||
"description": "`ServicePerimeterConfig` specifies a set of GCP resources that describe\nspecific Service Perimeter configuration.",
|
||||
"description": "`ServicePerimeterConfig` specifies a set of Google Cloud resources that\ndescribe specific Service Perimeter configuration.",
|
||||
"id": "ServicePerimeterConfig",
|
||||
"properties": {
|
||||
"accessLevels": {
|
||||
"description": "A list of `AccessLevel` resource names that allow resources within the\n`ServicePerimeter` to be accessed from the internet. `AccessLevels` listed\nmust be in the same policy as this `ServicePerimeter`. Referencing a\nnonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are\nlisted, resources within the perimeter can only be accessed via GCP calls\nwith request origins within the perimeter. Example:\n`\"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL\"`.\nFor Service Perimeter Bridge, must be empty.",
|
||||
"description": "A list of `AccessLevel` resource names that allow resources within the\n`ServicePerimeter` to be accessed from the internet. `AccessLevels` listed\nmust be in the same policy as this `ServicePerimeter`. Referencing a\nnonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are\nlisted, resources within the perimeter can only be accessed via Google\nCloud calls with request origins within the perimeter. Example:\n`\"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL\"`.\nFor Service Perimeter Bridge, must be empty.",
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
},
|
||||
"bridgeServiceRestriction": {
|
||||
"$ref": "BridgeServiceRestriction",
|
||||
"description": "Alpha. Configuration for what services are accessible via the Bridge\nPerimeter. Must be empty for non-Bridge Perimeters."
|
||||
},
|
||||
"ingressServiceRestriction": {
|
||||
"$ref": "IngressServiceRestriction",
|
||||
"description": "Alpha. Configuration for which services may be used with Access Levels."
|
||||
},
|
||||
"resources": {
|
||||
"description": "A list of GCP resources that are inside of the service perimeter.\nCurrently only projects are allowed. Format: `projects/{project_number}`",
|
||||
"description": "A list of Google Cloud resources that are inside of the service perimeter.\nCurrently only projects are allowed. Format: `projects/{project_number}`",
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
},
|
||||
"restrictedServices": {
|
||||
"description": "GCP services that are subject to the Service Perimeter restrictions. Must\ncontain a list of services. For example, if\n`storage.googleapis.com` is specified, access to the storage buckets\ninside the perimeter must meet the perimeter's access restrictions.",
|
||||
"description": "Google Cloud services that are subject to the Service Perimeter\nrestrictions. Must contain a list of services. For example, if\n`storage.googleapis.com` is specified, access to the storage buckets\ninside the perimeter must meet the perimeter's access restrictions.",
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
},
|
||||
"unrestrictedServices": {
|
||||
"description": "GCP services that are not subject to the Service Perimeter\nrestrictions. Deprecated. Must be set to a single wildcard \"*\".\n\nThe wildcard means that unless explicitly specified by\n\"restricted_services\" list, any service is treated as unrestricted.",
|
||||
"description": "Google Cloud services that are not subject to the Service Perimeter\nrestrictions. Deprecated. Must be set to a single wildcard \"*\".\n\nThe wildcard means that unless explicitly specified by\n\"restricted_services\" list, any service is treated as unrestricted.",
|
||||
"items": {
|
||||
"type": "string"
|
||||
},
|
||||
"type": "array"
|
||||
},
|
||||
"vpcServiceRestriction": {
|
||||
"$ref": "VpcServiceRestriction",
|
||||
"description": "Alpha. Configuration for within Perimeter allowed APIs."
|
||||
"vpcAccessibleServices": {
|
||||
"$ref": "VpcAccessibleServices",
|
||||
"description": "Beta. Configuration for APIs allowed within Perimeter."
|
||||
}
|
||||
},
|
||||
"type": "object"
|
||||
@@ -1073,9 +1042,9 @@
|
||||
},
|
||||
"type": "object"
|
||||
},
|
||||
"VpcServiceRestriction": {
|
||||
"description": "Alpha. Specifies how APIs are allowed to communicate within the Service\nPerimeter.",
|
||||
"id": "VpcServiceRestriction",
|
||||
"VpcAccessibleServices": {
|
||||
"description": "Specifies how APIs are allowed to communicate within the Service\nPerimeter.",
|
||||
"id": "VpcAccessibleServices",
|
||||
"properties": {
|
||||
"allowedServices": {
|
||||
"description": "The list of APIs usable within the Service Perimeter. Must be empty\nunless 'enable_restriction' is True.",
|
||||
|
||||
Reference in New Issue
Block a user