Skip to content

Commit

Permalink
feat(accesscontextmanager): update the API
Browse files Browse the repository at this point in the history
#### accesscontextmanager:v1

The following keys were added:
- schemas.Application.description
- schemas.Application.id
- schemas.Application.properties.clientId.description
- schemas.Application.properties.clientId.type
- schemas.Application.properties.name.description
- schemas.Application.properties.name.type
- schemas.Application.type
- schemas.GcpUserAccessBinding.properties.restrictedClientApplications.description
- schemas.GcpUserAccessBinding.properties.restrictedClientApplications.items.$ref
- schemas.GcpUserAccessBinding.properties.restrictedClientApplications.type
  • Loading branch information
yoshi-automation authored and sofisl committed May 7, 2024
1 parent 626e4a9 commit 9307046
Show file tree
Hide file tree
Showing 2 changed files with 40 additions and 1 deletion.
24 changes: 23 additions & 1 deletion discovery/accesscontextmanager-v1.json
Original file line number Diff line number Diff line change
Expand Up @@ -1290,7 +1290,7 @@
}
}
},
"revision": "20240424",
"revision": "20240429",
"rootUrl": "https://accesscontextmanager.googleapis.com/",
"schemas": {
"AccessContextManagerOperationMetadata": {
Expand Down Expand Up @@ -1374,6 +1374,21 @@
},
"type": "object"
},
"Application": {
"description": "An application that accesses Google Cloud APIs.",
"id": "Application",
"properties": {
"clientId": {
"description": "The OAuth client ID of the application.",
"type": "string"
},
"name": {
"description": "The name of the application. Example: \"Cloud Console\"",
"type": "string"
}
},
"type": "object"
},
"AuditConfig": {
"description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:jose@example.com\" ] }, { \"log_type\": \"DATA_WRITE\" }, { \"log_type\": \"ADMIN_READ\" } ] }, { \"service\": \"sampleservice.googleapis.com\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\" }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:aliya@example.com\" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts `jose@example.com` from DATA_READ logging, and `aliya@example.com` from DATA_WRITE logging.",
"id": "AuditConfig",
Expand Down Expand Up @@ -1843,6 +1858,13 @@
"name": {
"description": "Immutable. Assigned by the server during creation. The last segment has an arbitrary length and has only URI unreserved characters (as defined by [RFC 3986 Section 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be specified by the client during creation. Example: \"organizations/256/gcpUserAccessBindings/b3-BhcX_Ud5N\"",
"type": "string"
},
"restrictedClientApplications": {
"description": "Optional. A list of applications that are subject to this binding's restrictions. If the list is empty, the binding restrictions will universally apply to all applications.",
"items": {
"$ref": "Application"
},
"type": "array"
}
},
"type": "object"
Expand Down
17 changes: 17 additions & 0 deletions src/apis/accesscontextmanager/v1.ts
Original file line number Diff line number Diff line change
Expand Up @@ -197,6 +197,19 @@ export namespace accesscontextmanager_v1 {
*/
serviceName?: string | null;
}
/**
* An application that accesses Google Cloud APIs.
*/
export interface Schema$Application {
/**
* The OAuth client ID of the application.
*/
clientId?: string | null;
/**
* The name of the application. Example: "Cloud Console"
*/
name?: string | null;
}
/**
* Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:jose@example.com" ] \}, { "log_type": "DATA_WRITE" \}, { "log_type": "ADMIN_READ" \} ] \}, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" \}, { "log_type": "DATA_WRITE", "exempted_members": [ "user:aliya@example.com" ] \} ] \} ] \} For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts `jose@example.com` from DATA_READ logging, and `aliya@example.com` from DATA_WRITE logging.
*/
Expand Down Expand Up @@ -476,6 +489,10 @@ export namespace accesscontextmanager_v1 {
* Immutable. Assigned by the server during creation. The last segment has an arbitrary length and has only URI unreserved characters (as defined by [RFC 3986 Section 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be specified by the client during creation. Example: "organizations/256/gcpUserAccessBindings/b3-BhcX_Ud5N"
*/
name?: string | null;
/**
* Optional. A list of applications that are subject to this binding's restrictions. If the list is empty, the binding restrictions will universally apply to all applications.
*/
restrictedClientApplications?: Schema$Application[];
}
/**
* Metadata of GCP Access Binding Long Running Operations.
Expand Down

0 comments on commit 9307046

Please sign in to comment.