Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(all): auto-regenerate discovery clients #2026

Merged
merged 1 commit into from
Jun 14, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions api-list.json
Original file line number Diff line number Diff line change
Expand Up @@ -1161,8 +1161,8 @@
"id": "clouddebugger:v2",
"name": "clouddebugger",
"version": "v2",
"title": "Cloud Debugger API",
"description": "Examines the call stack and variables of a running application without stopping or slowing it down.",
"title": "Cloud Debugger API (Deprecated)",
"description": "Examines the call stack and variables of a running application without stopping or slowing it down. (Deprecated)",
"discoveryRestUrl": "https://clouddebugger.googleapis.com/$discovery/rest?version=v2",
"icons": {
"x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",
Expand Down
171 changes: 3 additions & 168 deletions cloudasset/v1/cloudasset-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -601,11 +601,6 @@
"location": "query",
"type": "boolean"
},
"analysisQuery.options.includeDenyPolicyAnalysis": {
"description": "Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.",
"location": "query",
"type": "boolean"
},
"analysisQuery.options.outputGroupEdges": {
"description": "Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.",
"location": "query",
Expand Down Expand Up @@ -1076,7 +1071,7 @@
"type": "string"
},
"readMask": {
"description": "Optional. A comma-separated list of fields specifying which fields to be returned in ResourceSearchResult. Only '*' or combination of top level fields can be specified. Field names of both snake_case and camelCase are supported. Examples: `\"*\"`, `\"name,location\"`, `\"name,versionedResources\"`. The read_mask paths must be valid field paths listed but not limited to (both snake_case and camelCase are supported): * name * assetType * project * displayName * description * location * tagKeys * tagValues * tagValueIds * labels * networkTags * kmsKey (This field is deprecated. Please use the `kmsKeys` field to retrieve Cloud KMS key information.) * kmsKeys * createTime * updateTime * state * additionalAttributes * versionedResources If read_mask is not specified, all fields except versionedResources will be returned. If only '*' is specified, all fields including versionedResources will be returned. Any invalid field path will trigger INVALID_ARGUMENT error.",
"description": "Optional. A comma-separated list of fields that you want returned in the results. The following fields are returned by default if not specified: * `name` * `assetType` * `project` * `folders` * `organization` * `displayName` * `description` * `location` * `labels` * `networkTags` * `kmsKeys` * `createTime` * `updateTime` * `state` * `additionalAttributes` * `parentFullResourceName` * `parentAssetType` Some fields of large size, such as `versionedResources` and `attachedResources`, are not returned by default, but you can specify them in the `read_mask` parameter if you want to include them. If `\"*\"` is specified, all [available fields](https://cloud.google.com/asset-inventory/docs/reference/rest/v1/TopLevel/searchAllResources#resourcesearchresult) are returned. Examples: `\"name,location\"`, `\"name,versionedResources\"`, `\"*\"`. Any invalid field path will trigger INVALID_ARGUMENT error.",
"format": "google-fieldmask",
"location": "query",
"type": "string"
Expand All @@ -1100,7 +1095,7 @@
}
}
},
"revision": "20230513",
"revision": "20230609",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"AccessSelector": {
Expand Down Expand Up @@ -1590,24 +1585,6 @@
},
"type": "object"
},
"DeniedAccess": {
"description": "A denied access contains details about an access tuple that is blocked by IAM deny policies.",
"id": "DeniedAccess",
"properties": {
"deniedAccessTuple": {
"$ref": "GoogleCloudAssetV1DeniedAccessAccessTuple",
"description": "A denied access tuple that is either fully or partially denied by IAM deny rules. This access tuple should match at least one access tuple derived from IamPolicyAnalysisResult."
},
"denyDetails": {
"description": "The details about how denied_access_tuple is denied.",
"items": {
"$ref": "GoogleCloudAssetV1DeniedAccessDenyDetail"
},
"type": "array"
}
},
"type": "object"
},
"EffectiveIamPolicy": {
"description": "The effective IAM policies on one resource.",
"id": "EffectiveIamPolicy",
Expand Down Expand Up @@ -2087,98 +2064,6 @@
},
"type": "object"
},
"GoogleCloudAssetV1DeniedAccessAccess": {
"description": "An IAM role or permission under analysis.",
"id": "GoogleCloudAssetV1DeniedAccessAccess",
"properties": {
"permission": {
"description": "The IAM permission in [v1 format](https://cloud.google.com/iam/docs/permissions-reference)",
"type": "string"
},
"role": {
"description": "The IAM role.",
"type": "string"
}
},
"type": "object"
},
"GoogleCloudAssetV1DeniedAccessAccessTuple": {
"description": "An access tuple contains a tuple of a resource, an identity and an access.",
"id": "GoogleCloudAssetV1DeniedAccessAccessTuple",
"properties": {
"access": {
"$ref": "GoogleCloudAssetV1DeniedAccessAccess",
"description": "One access from IamPolicyAnalysisResult.AccessControlList.accesses."
},
"identity": {
"$ref": "GoogleCloudAssetV1DeniedAccessIdentity",
"description": "One identity from IamPolicyAnalysisResult.IdentityList.identities."
},
"resource": {
"$ref": "GoogleCloudAssetV1DeniedAccessResource",
"description": "One resource from IamPolicyAnalysisResult.AccessControlList.resources."
}
},
"type": "object"
},
"GoogleCloudAssetV1DeniedAccessDenyDetail": {
"description": "A deny detail that explains which IAM deny rule denies the denied_access_tuple.",
"id": "GoogleCloudAssetV1DeniedAccessDenyDetail",
"properties": {
"accesses": {
"description": "The denied accesses. If this deny_rule fully denies the denied_access_tuple, this field will be same as AccessTuple.access. Otherwise, this field can contain AccessTuple.access and its descendant accesses, such as a subset of IAM permissions contained in an IAM role.",
"items": {
"$ref": "GoogleCloudAssetV1DeniedAccessAccess"
},
"type": "array"
},
"denyRule": {
"$ref": "GoogleIamV2DenyRule",
"description": "A deny rule in an IAM deny policy."
},
"fullyDenied": {
"description": "Whether the deny_rule fully denies all access granted by the denied_access_tuple. `True` means the deny rule fully blocks the access tuple. `False` means the deny rule partially blocks the access tuple.\"",
"type": "boolean"
},
"identities": {
"description": "If this deny_rule fully denies the denied_access_tuple, this field will be same as AccessTuple.identity. Otherwise, this field can contain AccessTuple.identity and its descendant identities, such as a subset of users in a group.",
"items": {
"$ref": "GoogleCloudAssetV1DeniedAccessIdentity"
},
"type": "array"
},
"resources": {
"description": "The resources that the identities are denied access to. If this deny_rule fully denies the denied_access_tuple, this field will be same as AccessTuple.resource. Otherwise, this field can contain AccessTuple.resource and its descendant resources.",
"items": {
"$ref": "GoogleCloudAssetV1DeniedAccessResource"
},
"type": "array"
}
},
"type": "object"
},
"GoogleCloudAssetV1DeniedAccessIdentity": {
"description": "An identity under analysis.",
"id": "GoogleCloudAssetV1DeniedAccessIdentity",
"properties": {
"name": {
"description": "The identity of members, formatted as appear in an [IAM policy binding](https://cloud.google.com/iam/reference/rest/v1/Binding). For example, they might be formatted like the following: - user:foo@google.com - group:group1@google.com - serviceAccount:s1@prj1.iam.gserviceaccount.com - projectOwner:some_project_id - domain:google.com - allUsers",
"type": "string"
}
},
"type": "object"
},
"GoogleCloudAssetV1DeniedAccessResource": {
"description": "A Google Cloud resource under analysis.",
"id": "GoogleCloudAssetV1DeniedAccessResource",
"properties": {
"fullResourceName": {
"description": "The [full resource name](https://cloud.google.com/asset-inventory/docs/resource-name-format)",
"type": "string"
}
},
"type": "object"
},
"GoogleCloudAssetV1Edge": {
"description": "A directional edge.",
"id": "GoogleCloudAssetV1Edge",
Expand Down Expand Up @@ -2317,7 +2202,7 @@
"type": "object"
},
"GoogleCloudAssetV1Rule": {
"description": "Represents a rule defined in an organization policy",
"description": "This rule message is a customized version of the one defined in the Organization Policy system. In addition to the fields defined in the original organization policy, it contains additional field(s) under specific circumstances to support analysis results.",
"id": "GoogleCloudAssetV1Rule",
"properties": {
"allowAll": {
Expand Down Expand Up @@ -2622,45 +2507,6 @@
"properties": {},
"type": "object"
},
"GoogleIamV2DenyRule": {
"description": "A deny rule in an IAM deny policy.",
"id": "GoogleIamV2DenyRule",
"properties": {
"denialCondition": {
"$ref": "Expr",
"description": "The condition that determines whether this deny rule applies to a request. If the condition expression evaluates to `true`, then the deny rule is applied; otherwise, the deny rule is not applied. Each deny rule is evaluated independently. If this deny rule does not apply to a request, other deny rules might still apply. The condition can use CEL functions that evaluate [resource tags](https://cloud.google.com/iam/help/conditions/resource-tags). Other functions and operators are not supported."
},
"deniedPermissions": {
"description": "The permissions that are explicitly denied by this rule. Each permission uses the format `{service_fqdn}/{resource}.{verb}`, where `{service_fqdn}` is the fully qualified domain name for the service. For example, `iam.googleapis.com/roles.list`.",
"items": {
"type": "string"
},
"type": "array"
},
"deniedPrincipals": {
"description": "The identities that are prevented from using one or more permissions on Google Cloud resources. This field can contain the following values: * `principalSet://goog/public:all`: A special identifier that represents any principal that is on the internet, even if they do not have a Google Account or are not logged in. * `principal://goog/subject/{email_id}`: A specific Google Account. Includes Gmail, Cloud Identity, and Google Workspace user accounts. For example, `principal://goog/subject/alice@example.com`. * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific Google Account that was deleted recently. For example, `deleted:principal://goog/subject/alice@example.com?uid=1234567890`. If the Google Account is recovered, this identifier reverts to the standard identifier for a Google Account. * `principalSet://goog/group/{group_id}`: A Google group. For example, `principalSet://goog/group/admins@example.com`. * `deleted:principalSet://goog/group/{group_id}?uid={uid}`: A Google group that was deleted recently. For example, `deleted:principalSet://goog/group/admins@example.com?uid=1234567890`. If the Google group is restored, this identifier reverts to the standard identifier for a Google group. * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`: A Google Cloud service account. For example, `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account@iam.gserviceaccount.com`. * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={uid}`: A Google Cloud service account that was deleted recently. For example, `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account@iam.gserviceaccount.com?uid=1234567890`. If the service account is undeleted, this identifier reverts to the standard identifier for a service account. * `principalSet://goog/cloudIdentityCustomerId/{customer_id}`: All of the principals associated with the specified Google Workspace or Cloud Identity customer ID. For example, `principalSet://goog/cloudIdentityCustomerId/C01Abc35`.",
"items": {
"type": "string"
},
"type": "array"
},
"exceptionPermissions": {
"description": "Specifies the permissions that this rule excludes from the set of denied permissions given by `denied_permissions`. If a permission appears in `denied_permissions` _and_ in `exception_permissions` then it will _not_ be denied. The excluded permissions can be specified using the same syntax as `denied_permissions`.",
"items": {
"type": "string"
},
"type": "array"
},
"exceptionPrincipals": {
"description": "The identities that are excluded from the deny rule, even if they are listed in the `denied_principals`. For example, you could add a Google group to the `denied_principals`, then exclude specific users who belong to that group. This field can contain the same values as the `denied_principals` field, excluding `principalSet://goog/public:all`, which represents all users on the internet.",
"items": {
"type": "string"
},
"type": "array"
}
},
"type": "object"
},
"GoogleIdentityAccesscontextmanagerV1AccessLevel": {
"description": "An `AccessLevel` is a label that can be applied to requests to Google Cloud services, along with a list of requirements necessary for the label to be applied.",
"id": "GoogleIdentityAccesscontextmanagerV1AccessLevel",
Expand Down Expand Up @@ -3215,13 +3061,6 @@
},
"type": "array"
},
"deniedAccesses": {
"description": "A list of DeniedAccess, which contains all access tuples in the analysis_results that are denied by IAM deny policies. If no access tuples are denied, the list is empty. This is only populated when IamPolicyAnalysisQuery.Options.include_deny_policy_analysis is true.",
"items": {
"$ref": "DeniedAccess"
},
"type": "array"
},
"fullyExplored": {
"description": "Represents whether all entries in the analysis_results have been fully explored to answer the query.",
"type": "boolean"
Expand Down Expand Up @@ -3658,10 +3497,6 @@
"description": "Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.",
"type": "boolean"
},
"includeDenyPolicyAnalysis": {
"description": "Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.",
"type": "boolean"
},
"outputGroupEdges": {
"description": "Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.",
"type": "boolean"
Expand Down
Loading