Files
google-apis-rs/google_accesscontextmanager1/api/index.html
2021-04-02 00:20:57 +08:00

77 lines
35 KiB
HTML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width, initial-scale=1.0"><meta name="generator" content="rustdoc"><meta name="description" content="API documentation for the Rust `api` mod in crate `google_accesscontextmanager1`."><meta name="keywords" content="rust, rustlang, rust-lang, api"><title>google_accesscontextmanager1::api - Rust</title><link rel="stylesheet" type="text/css" href="../../normalize.css"><link rel="stylesheet" type="text/css" href="../../rustdoc.css" id="mainThemeStyle"><link rel="stylesheet" type="text/css" href="../../light.css" id="themeStyle"><link rel="stylesheet" type="text/css" href="../../dark.css" disabled ><link rel="stylesheet" type="text/css" href="../../ayu.css" disabled ><script id="default-settings"></script><script src="../../storage.js"></script><noscript><link rel="stylesheet" href="../../noscript.css"></noscript><link rel="icon" type="image/svg+xml" href="../../favicon.svg">
<link rel="alternate icon" type="image/png" href="../../favicon-16x16.png">
<link rel="alternate icon" type="image/png" href="../../favicon-32x32.png"><style type="text/css">#crate-search{background-image:url("../../down-arrow.svg");}</style></head><body class="rustdoc mod"><!--[if lte IE 8]><div class="warning">This old browser is unsupported and will most likely display funky things.</div><![endif]--><nav class="sidebar"><div class="sidebar-menu">&#9776;</div><a href='../../google_accesscontextmanager1/index.html'><div class='logo-container rust-logo'><img src='../../rust-logo.png' alt='logo'></div></a><p class="location">Module api</p><div class="sidebar-elems"><div class="block items"><ul><li><a href="#structs">Structs</a></li><li><a href="#enums">Enums</a></li></ul></div><p class="location"><a href="../index.html">google_accesscontextmanager1</a></p><div id="sidebar-vars" data-name="api" data-ty="mod" data-relpath="../"></div><script defer src="../sidebar-items.js"></script></div></nav><div class="theme-picker"><button id="theme-picker" aria-label="Pick another theme!" aria-haspopup="menu"><img src="../../brush.svg" width="18" alt="Pick another theme!"></button><div id="theme-choices" role="menu"></div></div><script src="../../theme.js"></script><nav class="sub"><form class="search-form"><div class="search-container"><div><select id="crate-search"><option value="All crates">All crates</option></select><input class="search-input" name="search" disabled autocomplete="off" spellcheck="false" placeholder="Click or press S to search, ? for more options…" type="search"></div><button type="button" class="help-button">?</button>
<a id="settings-menu" href="../../settings.html"><img src="../../wheel.svg" width="18" alt="Change settings"></a></div></form></nav><section id="main" class="content"><h1 class="fqn"><span class="in-band">Module <a href="../index.html">google_accesscontextmanager1</a>::<wbr><a class="mod" href="">api</a></span><span class="out-of-band"><span id="render-detail"><a id="toggle-all-docs" href="javascript:void(0)" title="collapse all docs">[<span class="inner">&#x2212;</span>]</a></span><a class="srclink" href="../../src/google_accesscontextmanager1/api.rs.html#1-9203" title="goto source code">[src]</a></span></h1><h2 id="structs" class="section-header"><a href="#structs">Structs</a></h2>
<table><tr class="module-item"><td><a class="struct" href="struct.AccessContextManager.html" title="google_accesscontextmanager1::api::AccessContextManager struct">AccessContextManager</a></td><td class="docblock-short"><p>Central instance to access all AccessContextManager related resource activities</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessLevel.html" title="google_accesscontextmanager1::api::AccessLevel struct">AccessLevel</a></td><td class="docblock-short"><p>An <code>AccessLevel</code> is a label that can be applied to requests to Google Cloud services, along with a list of requirements necessary for the label to be applied.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicy.html" title="google_accesscontextmanager1::api::AccessPolicy struct">AccessPolicy</a></td><td class="docblock-short"><p><code>AccessPolicy</code> is a container for <code>AccessLevels</code> (which define the necessary attributes to use Google Cloud services) and <code>ServicePerimeters</code> (which define regions of services able to freely pass data within a perimeter). An access policy is globally visible within an organization, and the restrictions it specifies apply to all projects within an organization.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyAccessLevelCreateCall.html" title="google_accesscontextmanager1::api::AccessPolicyAccessLevelCreateCall struct">AccessPolicyAccessLevelCreateCall</a></td><td class="docblock-short"><p>Create an Access Level. The longrunning operation from this RPC will have a successful status once the Access Level has propagated to long-lasting storage. Access Levels containing errors will result in an error response for the first error encountered.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyAccessLevelDeleteCall.html" title="google_accesscontextmanager1::api::AccessPolicyAccessLevelDeleteCall struct">AccessPolicyAccessLevelDeleteCall</a></td><td class="docblock-short"><p>Delete an Access Level by resource name. The longrunning operation from this RPC will have a successful status once the Access Level has been removed from long-lasting storage.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyAccessLevelGetCall.html" title="google_accesscontextmanager1::api::AccessPolicyAccessLevelGetCall struct">AccessPolicyAccessLevelGetCall</a></td><td class="docblock-short"><p>Get an Access Level by resource name.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyAccessLevelListCall.html" title="google_accesscontextmanager1::api::AccessPolicyAccessLevelListCall struct">AccessPolicyAccessLevelListCall</a></td><td class="docblock-short"><p>List all Access Levels for an access policy.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyAccessLevelPatchCall.html" title="google_accesscontextmanager1::api::AccessPolicyAccessLevelPatchCall struct">AccessPolicyAccessLevelPatchCall</a></td><td class="docblock-short"><p>Update an Access Level. The longrunning operation from this RPC will have a successful status once the changes to the Access Level have propagated to long-lasting storage. Access Levels containing errors will result in an error response for the first error encountered.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyAccessLevelReplaceAllCall.html" title="google_accesscontextmanager1::api::AccessPolicyAccessLevelReplaceAllCall struct">AccessPolicyAccessLevelReplaceAllCall</a></td><td class="docblock-short"><p>Replace all existing Access Levels in an Access Policy with the Access Levels provided. This is done atomically. The longrunning operation from this RPC will have a successful status once all replacements have propagated to long-lasting storage. Replacements containing errors will result in an error response for the first error encountered. Replacement will be cancelled on error, existing Access Levels will not be affected. Operation.response field will contain ReplaceAccessLevelsResponse. Removing Access Levels contained in existing Service Perimeters will result in error.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyCreateCall.html" title="google_accesscontextmanager1::api::AccessPolicyCreateCall struct">AccessPolicyCreateCall</a></td><td class="docblock-short"><p>Create an <code>AccessPolicy</code>. Fails if this organization already has a <code>AccessPolicy</code>. The longrunning Operation will have a successful status once the <code>AccessPolicy</code> has propagated to long-lasting storage. Syntactic and basic semantic errors will be returned in <code>metadata</code> as a BadRequest proto.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyDeleteCall.html" title="google_accesscontextmanager1::api::AccessPolicyDeleteCall struct">AccessPolicyDeleteCall</a></td><td class="docblock-short"><p>Delete an AccessPolicy by resource name. The longrunning Operation will have a successful status once the AccessPolicy has been removed from long-lasting storage.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyGetCall.html" title="google_accesscontextmanager1::api::AccessPolicyGetCall struct">AccessPolicyGetCall</a></td><td class="docblock-short"><p>Get an AccessPolicy by name.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyListCall.html" title="google_accesscontextmanager1::api::AccessPolicyListCall struct">AccessPolicyListCall</a></td><td class="docblock-short"><p>List all AccessPolicies under a container.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyMethods.html" title="google_accesscontextmanager1::api::AccessPolicyMethods struct">AccessPolicyMethods</a></td><td class="docblock-short"><p>A builder providing access to all methods supported on <em>accessPolicy</em> resources.
It is not used directly, but through the <code>AccessContextManager</code> hub.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyPatchCall.html" title="google_accesscontextmanager1::api::AccessPolicyPatchCall struct">AccessPolicyPatchCall</a></td><td class="docblock-short"><p>Update an AccessPolicy. The longrunning Operation from this RPC will have a successful status once the changes to the AccessPolicy have propagated to long-lasting storage. Syntactic and basic semantic errors will be returned in <code>metadata</code> as a BadRequest proto.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterCommitCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterCommitCall struct">AccessPolicyServicePerimeterCommitCall</a></td><td class="docblock-short"><p>Commit the dry-run spec for all the Service Perimeters in an Access Policy. A commit operation on a Service Perimeter involves copying its <code>spec</code> field to that Service Perimeter's <code>status</code> field. Only Service Perimeters with <code>use_explicit_dry_run_spec</code> field set to true are affected by a commit operation. The longrunning operation from this RPC will have a successful status once the dry-run specs for all the Service Perimeters have been committed. If a commit fails, it will cause the longrunning operation to return an error response and the entire commit operation will be cancelled. When successful, Operation.response field will contain CommitServicePerimetersResponse. The <code>dry_run</code> and the <code>spec</code> fields will be cleared after a successful commit operation.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterCreateCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterCreateCall struct">AccessPolicyServicePerimeterCreateCall</a></td><td class="docblock-short"><p>Create a Service Perimeter. The longrunning operation from this RPC will have a successful status once the Service Perimeter has propagated to long-lasting storage. Service Perimeters containing errors will result in an error response for the first error encountered.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterDeleteCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterDeleteCall struct">AccessPolicyServicePerimeterDeleteCall</a></td><td class="docblock-short"><p>Delete a Service Perimeter by resource name. The longrunning operation from this RPC will have a successful status once the Service Perimeter has been removed from long-lasting storage.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterGetCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterGetCall struct">AccessPolicyServicePerimeterGetCall</a></td><td class="docblock-short"><p>Get a Service Perimeter by resource name.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterListCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterListCall struct">AccessPolicyServicePerimeterListCall</a></td><td class="docblock-short"><p>List all Service Perimeters for an access policy.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterPatchCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterPatchCall struct">AccessPolicyServicePerimeterPatchCall</a></td><td class="docblock-short"><p>Update a Service Perimeter. The longrunning operation from this RPC will have a successful status once the changes to the Service Perimeter have propagated to long-lasting storage. Service Perimeter containing errors will result in an error response for the first error encountered.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.AccessPolicyServicePerimeterReplaceAllCall.html" title="google_accesscontextmanager1::api::AccessPolicyServicePerimeterReplaceAllCall struct">AccessPolicyServicePerimeterReplaceAllCall</a></td><td class="docblock-short"><p>Replace all existing Service Perimeters in an Access Policy with the Service Perimeters provided. This is done atomically. The longrunning operation from this RPC will have a successful status once all replacements have propagated to long-lasting storage. Replacements containing errors will result in an error response for the first error encountered. Replacement will be cancelled on error, existing Service Perimeters will not be affected. Operation.response field will contain ReplaceServicePerimetersResponse.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ApiOperation.html" title="google_accesscontextmanager1::api::ApiOperation struct">ApiOperation</a></td><td class="docblock-short"><p>Identification for an API Operation.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.BasicLevel.html" title="google_accesscontextmanager1::api::BasicLevel struct">BasicLevel</a></td><td class="docblock-short"><p><code>BasicLevel</code> is an <code>AccessLevel</code> using a set of recommended features.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.CancelOperationRequest.html" title="google_accesscontextmanager1::api::CancelOperationRequest struct">CancelOperationRequest</a></td><td class="docblock-short"><p>The request message for Operations.CancelOperation.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.CommitServicePerimetersRequest.html" title="google_accesscontextmanager1::api::CommitServicePerimetersRequest struct">CommitServicePerimetersRequest</a></td><td class="docblock-short"><p>A request to commit dry-run specs in all Service Perimeters belonging to an Access Policy.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.Condition.html" title="google_accesscontextmanager1::api::Condition struct">Condition</a></td><td class="docblock-short"><p>A condition necessary for an <code>AccessLevel</code> to be granted. The Condition is an AND over its fields. So a Condition is true if: 1) the request IP is from one of the listed subnetworks AND 2) the originating device complies with the listed device policy AND 3) all listed access levels are granted AND 4) the request was sent at a time allowed by the DateTimeRestriction.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.CustomLevel.html" title="google_accesscontextmanager1::api::CustomLevel struct">CustomLevel</a></td><td class="docblock-short"><p><code>CustomLevel</code> is an <code>AccessLevel</code> using the Cloud Common Expression Language to represent the necessary conditions for the level to apply to a request. See CEL spec at: https://github.com/google/cel-spec</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.DevicePolicy.html" title="google_accesscontextmanager1::api::DevicePolicy struct">DevicePolicy</a></td><td class="docblock-short"><p><code>DevicePolicy</code> specifies device specific restrictions necessary to acquire a given access level. A <code>DevicePolicy</code> specifies requirements for requests from devices to be granted access levels, it does not do any enforcement on the device. <code>DevicePolicy</code> acts as an AND over all specified fields, and each repeated field is an OR over its elements. Any unset fields are ignored. For example, if the proto is { os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX, encryption_status: ENCRYPTED}, then the DevicePolicy will be true for requests originating from encrypted Linux desktops and encrypted Windows desktops.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.EgressFrom.html" title="google_accesscontextmanager1::api::EgressFrom struct">EgressFrom</a></td><td class="docblock-short"><p>Defines the conditions under which an EgressPolicy matches a request. Conditions based on information about the source of the request. Note that if the destination of the request is protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.EgressPolicy.html" title="google_accesscontextmanager1::api::EgressPolicy struct">EgressPolicy</a></td><td class="docblock-short"><p>Policy for egress from perimeter. EgressPolicies match requests based on <code>egress_from</code> and <code>egress_to</code> stanzas. For an EgressPolicy to match, both <code>egress_from</code> and <code>egress_to</code> stanzas must be matched. If an EgressPolicy matches a request, the request is allowed to span the ServicePerimeter boundary. For example, an EgressPolicy can be used to allow VMs on networks within the ServicePerimeter to access a defined set of projects outside the perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket or query against a BigQuery dataset). EgressPolicies are concerned with the <em>resources</em> that a request relates as well as the API services and API actions being used. They do not related to the direction of data movement. More detailed documentation for this concept can be found in the descriptions of EgressFrom and EgressTo.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.EgressTo.html" title="google_accesscontextmanager1::api::EgressTo struct">EgressTo</a></td><td class="docblock-short"><p>Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the <code>resources</code> specified. Note that if the destination of the request is protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.Empty.html" title="google_accesscontextmanager1::api::Empty struct">Empty</a></td><td class="docblock-short"><p>A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); } The JSON representation for <code>Empty</code> is empty JSON object <code>{}</code>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.Expr.html" title="google_accesscontextmanager1::api::Expr struct">Expr</a></td><td class="docblock-short"><p>Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: &quot;Summary size limit&quot; description: &quot;Determines if a summary is less than 100 chars&quot; expression: &quot;document.summary.size() &lt; 100&quot; Example (Equality): title: &quot;Requestor is owner&quot; description: &quot;Determines if requestor is the document owner&quot; expression: &quot;document.owner == request.auth.claims.email&quot; Example (Logic): title: &quot;Public documents&quot; description: &quot;Determine whether the document should be publicly visible&quot; expression: &quot;document.type != 'private' &amp;&amp; document.type != 'internal'&quot; Example (Data Manipulation): title: &quot;Notification string&quot; description: &quot;Create a notification string with a timestamp.&quot; expression: &quot;'New message received at ' + string(document.create_time)&quot; The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.GcpUserAccessBinding.html" title="google_accesscontextmanager1::api::GcpUserAccessBinding struct">GcpUserAccessBinding</a></td><td class="docblock-short"><p>Restricts access to Cloud Console and Google Cloud APIs for a set of users using Context-Aware Access.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.IngressFrom.html" title="google_accesscontextmanager1::api::IngressFrom struct">IngressFrom</a></td><td class="docblock-short"><p>Defines the conditions under which an IngressPolicy matches a request. Conditions are based on information about the source of the request.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.IngressPolicy.html" title="google_accesscontextmanager1::api::IngressPolicy struct">IngressPolicy</a></td><td class="docblock-short"><p>Policy for ingress into ServicePerimeter. IngressPolicies match requests based on <code>ingress_from</code> and <code>ingress_to</code> stanzas. For an ingress policy to match, both the <code>ingress_from</code> and <code>ingress_to</code> stanzas must be matched. If an IngressPolicy matches a request, the request is allowed through the perimeter boundary from outside the perimeter. For example, access from the internet can be allowed either based on an AccessLevel or, for traffic hosted on Google Cloud, the project of the source network. For access from private networks, using the project of the hosting network is required. Individual ingress policies can be limited by restricting which services and/or actions they match using the <code>ingress_to</code> field.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.IngressSource.html" title="google_accesscontextmanager1::api::IngressSource struct">IngressSource</a></td><td class="docblock-short"><p>The source that IngressPolicy authorizes access from.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.IngressTo.html" title="google_accesscontextmanager1::api::IngressTo struct">IngressTo</a></td><td class="docblock-short"><p>Defines the conditions under which an IngressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the destination of the request.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ListAccessLevelsResponse.html" title="google_accesscontextmanager1::api::ListAccessLevelsResponse struct">ListAccessLevelsResponse</a></td><td class="docblock-short"><p>A response to <code>ListAccessLevelsRequest</code>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ListAccessPoliciesResponse.html" title="google_accesscontextmanager1::api::ListAccessPoliciesResponse struct">ListAccessPoliciesResponse</a></td><td class="docblock-short"><p>A response to <code>ListAccessPoliciesRequest</code>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ListGcpUserAccessBindingsResponse.html" title="google_accesscontextmanager1::api::ListGcpUserAccessBindingsResponse struct">ListGcpUserAccessBindingsResponse</a></td><td class="docblock-short"><p>Response of ListGcpUserAccessBindings.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ListOperationsResponse.html" title="google_accesscontextmanager1::api::ListOperationsResponse struct">ListOperationsResponse</a></td><td class="docblock-short"><p>The response message for Operations.ListOperations.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ListServicePerimetersResponse.html" title="google_accesscontextmanager1::api::ListServicePerimetersResponse struct">ListServicePerimetersResponse</a></td><td class="docblock-short"><p>A response to <code>ListServicePerimetersRequest</code>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.MethodSelector.html" title="google_accesscontextmanager1::api::MethodSelector struct">MethodSelector</a></td><td class="docblock-short"><p>An allowed method or permission of a service specified in ApiOperation.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.Operation.html" title="google_accesscontextmanager1::api::Operation struct">Operation</a></td><td class="docblock-short"><p>This resource represents a long-running operation that is the result of a network API call.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OperationCancelCall.html" title="google_accesscontextmanager1::api::OperationCancelCall struct">OperationCancelCall</a></td><td class="docblock-short"><p>Starts asynchronous cancellation on a long-running operation. The server makes a best effort to cancel the operation, but success is not guaranteed. If the server doesn't support this method, it returns <code>google.rpc.Code.UNIMPLEMENTED</code>. Clients can use Operations.GetOperation or other methods to check whether the cancellation succeeded or whether the operation completed despite cancellation. On successful cancellation, the operation is not deleted; instead, it becomes an operation with an Operation.error value with a google.rpc.Status.code of 1, corresponding to <code>Code.CANCELLED</code>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OperationDeleteCall.html" title="google_accesscontextmanager1::api::OperationDeleteCall struct">OperationDeleteCall</a></td><td class="docblock-short"><p>Deletes a long-running operation. This method indicates that the client is no longer interested in the operation result. It does not cancel the operation. If the server doesn't support this method, it returns <code>google.rpc.Code.UNIMPLEMENTED</code>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OperationGetCall.html" title="google_accesscontextmanager1::api::OperationGetCall struct">OperationGetCall</a></td><td class="docblock-short"><p>Gets the latest state of a long-running operation. Clients can use this method to poll the operation result at intervals as recommended by the API service.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OperationListCall.html" title="google_accesscontextmanager1::api::OperationListCall struct">OperationListCall</a></td><td class="docblock-short"><p>Lists operations that match the specified filter in the request. If the server doesn't support this method, it returns <code>UNIMPLEMENTED</code>. NOTE: the <code>name</code> binding allows API services to override the binding to use different resource name schemes, such as <code>users/*/operations</code>. To override the binding, API services can add a binding such as <code>&quot;/v1/{name=users/*}/operations&quot;</code> to their service configuration. For backwards compatibility, the default name includes the operations collection id, however overriding users must ensure the name binding is the parent resource, without the operations collection id.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OperationMethods.html" title="google_accesscontextmanager1::api::OperationMethods struct">OperationMethods</a></td><td class="docblock-short"><p>A builder providing access to all methods supported on <em>operation</em> resources.
It is not used directly, but through the <code>AccessContextManager</code> hub.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OrganizationGcpUserAccessBindingCreateCall.html" title="google_accesscontextmanager1::api::OrganizationGcpUserAccessBindingCreateCall struct">OrganizationGcpUserAccessBindingCreateCall</a></td><td class="docblock-short"><p>Creates a GcpUserAccessBinding. If the client specifies a name, the server will ignore it. Fails if a resource already exists with the same group_key. Completion of this long-running operation does not necessarily signify that the new binding is deployed onto all affected users, which may take more time.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OrganizationGcpUserAccessBindingDeleteCall.html" title="google_accesscontextmanager1::api::OrganizationGcpUserAccessBindingDeleteCall struct">OrganizationGcpUserAccessBindingDeleteCall</a></td><td class="docblock-short"><p>Deletes a GcpUserAccessBinding. Completion of this long-running operation does not necessarily signify that the binding deletion is deployed onto all affected users, which may take more time.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OrganizationGcpUserAccessBindingGetCall.html" title="google_accesscontextmanager1::api::OrganizationGcpUserAccessBindingGetCall struct">OrganizationGcpUserAccessBindingGetCall</a></td><td class="docblock-short"><p>Gets the GcpUserAccessBinding with the given name.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OrganizationGcpUserAccessBindingListCall.html" title="google_accesscontextmanager1::api::OrganizationGcpUserAccessBindingListCall struct">OrganizationGcpUserAccessBindingListCall</a></td><td class="docblock-short"><p>Lists all GcpUserAccessBindings for a Google Cloud organization.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OrganizationGcpUserAccessBindingPatchCall.html" title="google_accesscontextmanager1::api::OrganizationGcpUserAccessBindingPatchCall struct">OrganizationGcpUserAccessBindingPatchCall</a></td><td class="docblock-short"><p>Updates a GcpUserAccessBinding. Completion of this long-running operation does not necessarily signify that the changed binding is deployed onto all affected users, which may take more time.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OrganizationMethods.html" title="google_accesscontextmanager1::api::OrganizationMethods struct">OrganizationMethods</a></td><td class="docblock-short"><p>A builder providing access to all methods supported on <em>organization</em> resources.
It is not used directly, but through the <code>AccessContextManager</code> hub.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.OsConstraint.html" title="google_accesscontextmanager1::api::OsConstraint struct">OsConstraint</a></td><td class="docblock-short"><p>A restriction on the OS type and version of devices making requests.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ReplaceAccessLevelsRequest.html" title="google_accesscontextmanager1::api::ReplaceAccessLevelsRequest struct">ReplaceAccessLevelsRequest</a></td><td class="docblock-short"><p>A request to replace all existing Access Levels in an Access Policy with the Access Levels provided. This is done atomically.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ReplaceServicePerimetersRequest.html" title="google_accesscontextmanager1::api::ReplaceServicePerimetersRequest struct">ReplaceServicePerimetersRequest</a></td><td class="docblock-short"><p>A request to replace all existing Service Perimeters in an Access Policy with the Service Perimeters provided. This is done atomically.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ServicePerimeter.html" title="google_accesscontextmanager1::api::ServicePerimeter struct">ServicePerimeter</a></td><td class="docblock-short"><p><code>ServicePerimeter</code> describes a set of Google Cloud resources which can freely import and export data amongst themselves, but not export outside of the <code>ServicePerimeter</code>. If a request with a source within this <code>ServicePerimeter</code> has a target outside of the <code>ServicePerimeter</code>, the request will be blocked. Otherwise the request is allowed. There are two types of Service Perimeter - Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google Cloud project can only belong to a single regular Service Perimeter. Service Perimeter Bridges can contain only Google Cloud projects as members, a single Google Cloud project may belong to multiple Service Perimeter Bridges.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.ServicePerimeterConfig.html" title="google_accesscontextmanager1::api::ServicePerimeterConfig struct">ServicePerimeterConfig</a></td><td class="docblock-short"><p><code>ServicePerimeterConfig</code> specifies a set of Google Cloud resources that describe specific Service Perimeter configuration.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.Status.html" title="google_accesscontextmanager1::api::Status struct">Status</a></td><td class="docblock-short"><p>The <code>Status</code> type defines a logical error model that is suitable for different programming environments, including REST APIs and RPC APIs. It is used by <a href="https://github.com/grpc">gRPC</a>. Each <code>Status</code> message contains three pieces of data: error code, error message, and error details. You can find out more about this error model and how to work with it in the <a href="https://cloud.google.com/apis/design/errors">API Design Guide</a>.</p>
</td></tr><tr class="module-item"><td><a class="struct" href="struct.VpcAccessibleServices.html" title="google_accesscontextmanager1::api::VpcAccessibleServices struct">VpcAccessibleServices</a></td><td class="docblock-short"><p>Specifies how APIs are allowed to communicate within the Service Perimeter.</p>
</td></tr></table><h2 id="enums" class="section-header"><a href="#enums">Enums</a></h2>
<table><tr class="module-item"><td><a class="enum" href="enum.Scope.html" title="google_accesscontextmanager1::api::Scope enum">Scope</a></td><td class="docblock-short"><p>Identifies the an OAuth2 authorization scope.
A scope is needed when requesting an
<a href="https://developers.google.com/youtube/v3/guides/authentication">authorization token</a>.</p>
</td></tr></table></section><section id="search" class="content hidden"></section><section class="footer"></section><div id="rustdoc-vars" data-root-path="../../" data-current-crate="google_accesscontextmanager1"></div>
<script src="../../main.js"></script><script defer src="../../search-index.js"></script></body></html>