From b7ae824e832b3add50d3088728440bc4625b6767 Mon Sep 17 00:00:00 2001 From: Yoshi Automation Date: Tue, 27 Feb 2024 07:08:29 +0000 Subject: [PATCH] feat(apigee): update the api #### apigee:v1 The following keys were added: - schemas.GoogleCloudApigeeV1SecurityActionConditionConfig.properties.accessTokens (Total Keys: 2) - schemas.GoogleCloudApigeeV1SecurityActionConditionConfig.properties.apiKeys (Total Keys: 2) - schemas.GoogleCloudApigeeV1SecurityActionConditionConfig.properties.apiProducts (Total Keys: 2) - schemas.GoogleCloudApigeeV1SecurityActionConditionConfig.properties.developerApps (Total Keys: 2) - schemas.GoogleCloudApigeeV1SecurityActionConditionConfig.properties.developers (Total Keys: 2) - schemas.GoogleCloudApigeeV1SecurityActionConditionConfig.properties.userAgents (Total Keys: 2) --- ...izations.environments.securityActions.html | 120 +++++++++++++++++- .../discovery_cache/documents/apigee.v1.json | 46 ++++++- 2 files changed, 158 insertions(+), 8 deletions(-) diff --git a/docs/dyn/apigee_v1.organizations.environments.securityActions.html b/docs/dyn/apigee_v1.organizations.environments.securityActions.html index 7e28237674..7bbe7e3372 100644 --- a/docs/dyn/apigee_v1.organizations.environments.securityActions.html +++ b/docs/dyn/apigee_v1.organizations.environments.securityActions.html @@ -113,13 +113,31 @@

Method Details

{ # A SecurityAction is rule that can be enforced at an environment level. The result is one of: - A denied API call - An explicitly allowed API call - A flagged API call (HTTP headers added before the target receives it) At least one condition is required to create a SecurityAction. "allow": { # Message that should be set in case of an Allow Action. This does not have any fields. # Allow a request through if it matches this SecurityAction. }, - "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: ["key1", "key2"] and developers: ["dev1", "dev2"] then this is interpreted as: enforce the action if the incoming request has ((api_key = "key1" OR api_key="key") AND (developer="dev1" OR developer="dev2")). # Required. A valid SecurityAction must contain at least one condition. + "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: ["ip1", "ip2"] and bot_reasons: ["Flooder", "Robot Abuser"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = "ip1" OR ip_address_ranges = "ip2") AND (bot_reasons="Flooder" OR bot_reasons="Robot Abuser")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed. # Required. A valid SecurityAction must contain at least one condition. + "accessTokens": [ # Optional. A list of access_tokens. Limit 1000 per action. + "A String", + ], + "apiKeys": [ # Optional. A list of API keys. Limit 1000 per action. + "A String", + ], + "apiProducts": [ # Optional. A list of API Products. Limit 1000 per action. + "A String", + ], "botReasons": [ # Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google. "A String", ], + "developerApps": [ # Optional. A list of developer apps. Limit 1000 per action. + "A String", + ], + "developers": [ # Optional. A list of developers. Limit 1000 per action. + "A String", + ], "ipAddressRanges": [ # Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action. "A String", ], + "userAgents": [ # Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action. + "A String", + ], }, "createTime": "A String", # Output only. The create time for this SecurityAction. "deny": { # Message that should be set in case of a Deny Action. # Deny a request through if it matches this SecurityAction. @@ -153,13 +171,31 @@

Method Details

{ # A SecurityAction is rule that can be enforced at an environment level. The result is one of: - A denied API call - An explicitly allowed API call - A flagged API call (HTTP headers added before the target receives it) At least one condition is required to create a SecurityAction. "allow": { # Message that should be set in case of an Allow Action. This does not have any fields. # Allow a request through if it matches this SecurityAction. }, - "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: ["key1", "key2"] and developers: ["dev1", "dev2"] then this is interpreted as: enforce the action if the incoming request has ((api_key = "key1" OR api_key="key") AND (developer="dev1" OR developer="dev2")). # Required. A valid SecurityAction must contain at least one condition. + "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: ["ip1", "ip2"] and bot_reasons: ["Flooder", "Robot Abuser"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = "ip1" OR ip_address_ranges = "ip2") AND (bot_reasons="Flooder" OR bot_reasons="Robot Abuser")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed. # Required. A valid SecurityAction must contain at least one condition. + "accessTokens": [ # Optional. A list of access_tokens. Limit 1000 per action. + "A String", + ], + "apiKeys": [ # Optional. A list of API keys. Limit 1000 per action. + "A String", + ], + "apiProducts": [ # Optional. A list of API Products. Limit 1000 per action. + "A String", + ], "botReasons": [ # Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google. "A String", ], + "developerApps": [ # Optional. A list of developer apps. Limit 1000 per action. + "A String", + ], + "developers": [ # Optional. A list of developers. Limit 1000 per action. + "A String", + ], "ipAddressRanges": [ # Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action. "A String", ], + "userAgents": [ # Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action. + "A String", + ], }, "createTime": "A String", # Output only. The create time for this SecurityAction. "deny": { # Message that should be set in case of a Deny Action. # Deny a request through if it matches this SecurityAction. @@ -205,13 +241,31 @@

Method Details

{ # A SecurityAction is rule that can be enforced at an environment level. The result is one of: - A denied API call - An explicitly allowed API call - A flagged API call (HTTP headers added before the target receives it) At least one condition is required to create a SecurityAction. "allow": { # Message that should be set in case of an Allow Action. This does not have any fields. # Allow a request through if it matches this SecurityAction. }, - "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: ["key1", "key2"] and developers: ["dev1", "dev2"] then this is interpreted as: enforce the action if the incoming request has ((api_key = "key1" OR api_key="key") AND (developer="dev1" OR developer="dev2")). # Required. A valid SecurityAction must contain at least one condition. + "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: ["ip1", "ip2"] and bot_reasons: ["Flooder", "Robot Abuser"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = "ip1" OR ip_address_ranges = "ip2") AND (bot_reasons="Flooder" OR bot_reasons="Robot Abuser")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed. # Required. A valid SecurityAction must contain at least one condition. + "accessTokens": [ # Optional. A list of access_tokens. Limit 1000 per action. + "A String", + ], + "apiKeys": [ # Optional. A list of API keys. Limit 1000 per action. + "A String", + ], + "apiProducts": [ # Optional. A list of API Products. Limit 1000 per action. + "A String", + ], "botReasons": [ # Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google. "A String", ], + "developerApps": [ # Optional. A list of developer apps. Limit 1000 per action. + "A String", + ], + "developers": [ # Optional. A list of developers. Limit 1000 per action. + "A String", + ], "ipAddressRanges": [ # Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action. "A String", ], + "userAgents": [ # Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action. + "A String", + ], }, "createTime": "A String", # Output only. The create time for this SecurityAction. "deny": { # Message that should be set in case of a Deny Action. # Deny a request through if it matches this SecurityAction. @@ -257,13 +311,31 @@

Method Details

{ # A SecurityAction is rule that can be enforced at an environment level. The result is one of: - A denied API call - An explicitly allowed API call - A flagged API call (HTTP headers added before the target receives it) At least one condition is required to create a SecurityAction. "allow": { # Message that should be set in case of an Allow Action. This does not have any fields. # Allow a request through if it matches this SecurityAction. }, - "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: ["key1", "key2"] and developers: ["dev1", "dev2"] then this is interpreted as: enforce the action if the incoming request has ((api_key = "key1" OR api_key="key") AND (developer="dev1" OR developer="dev2")). # Required. A valid SecurityAction must contain at least one condition. + "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: ["ip1", "ip2"] and bot_reasons: ["Flooder", "Robot Abuser"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = "ip1" OR ip_address_ranges = "ip2") AND (bot_reasons="Flooder" OR bot_reasons="Robot Abuser")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed. # Required. A valid SecurityAction must contain at least one condition. + "accessTokens": [ # Optional. A list of access_tokens. Limit 1000 per action. + "A String", + ], + "apiKeys": [ # Optional. A list of API keys. Limit 1000 per action. + "A String", + ], + "apiProducts": [ # Optional. A list of API Products. Limit 1000 per action. + "A String", + ], "botReasons": [ # Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google. "A String", ], + "developerApps": [ # Optional. A list of developer apps. Limit 1000 per action. + "A String", + ], + "developers": [ # Optional. A list of developers. Limit 1000 per action. + "A String", + ], "ipAddressRanges": [ # Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action. "A String", ], + "userAgents": [ # Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action. + "A String", + ], }, "createTime": "A String", # Output only. The create time for this SecurityAction. "deny": { # Message that should be set in case of a Deny Action. # Deny a request through if it matches this SecurityAction. @@ -303,13 +375,31 @@

Method Details

{ # A SecurityAction is rule that can be enforced at an environment level. The result is one of: - A denied API call - An explicitly allowed API call - A flagged API call (HTTP headers added before the target receives it) At least one condition is required to create a SecurityAction. "allow": { # Message that should be set in case of an Allow Action. This does not have any fields. # Allow a request through if it matches this SecurityAction. }, - "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: ["key1", "key2"] and developers: ["dev1", "dev2"] then this is interpreted as: enforce the action if the incoming request has ((api_key = "key1" OR api_key="key") AND (developer="dev1" OR developer="dev2")). # Required. A valid SecurityAction must contain at least one condition. + "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: ["ip1", "ip2"] and bot_reasons: ["Flooder", "Robot Abuser"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = "ip1" OR ip_address_ranges = "ip2") AND (bot_reasons="Flooder" OR bot_reasons="Robot Abuser")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed. # Required. A valid SecurityAction must contain at least one condition. + "accessTokens": [ # Optional. A list of access_tokens. Limit 1000 per action. + "A String", + ], + "apiKeys": [ # Optional. A list of API keys. Limit 1000 per action. + "A String", + ], + "apiProducts": [ # Optional. A list of API Products. Limit 1000 per action. + "A String", + ], "botReasons": [ # Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google. "A String", ], + "developerApps": [ # Optional. A list of developer apps. Limit 1000 per action. + "A String", + ], + "developers": [ # Optional. A list of developers. Limit 1000 per action. + "A String", + ], "ipAddressRanges": [ # Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action. "A String", ], + "userAgents": [ # Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action. + "A String", + ], }, "createTime": "A String", # Output only. The create time for this SecurityAction. "deny": { # Message that should be set in case of a Deny Action. # Deny a request through if it matches this SecurityAction. @@ -355,13 +445,31 @@

Method Details

{ # A SecurityAction is rule that can be enforced at an environment level. The result is one of: - A denied API call - An explicitly allowed API call - A flagged API call (HTTP headers added before the target receives it) At least one condition is required to create a SecurityAction. "allow": { # Message that should be set in case of an Allow Action. This does not have any fields. # Allow a request through if it matches this SecurityAction. }, - "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: ["key1", "key2"] and developers: ["dev1", "dev2"] then this is interpreted as: enforce the action if the incoming request has ((api_key = "key1" OR api_key="key") AND (developer="dev1" OR developer="dev2")). # Required. A valid SecurityAction must contain at least one condition. + "conditionConfig": { # The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: ["ip1", "ip2"] and bot_reasons: ["Flooder", "Robot Abuser"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = "ip1" OR ip_address_ranges = "ip2") AND (bot_reasons="Flooder" OR bot_reasons="Robot Abuser")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed. # Required. A valid SecurityAction must contain at least one condition. + "accessTokens": [ # Optional. A list of access_tokens. Limit 1000 per action. + "A String", + ], + "apiKeys": [ # Optional. A list of API keys. Limit 1000 per action. + "A String", + ], + "apiProducts": [ # Optional. A list of API Products. Limit 1000 per action. + "A String", + ], "botReasons": [ # Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google. "A String", ], + "developerApps": [ # Optional. A list of developer apps. Limit 1000 per action. + "A String", + ], + "developers": [ # Optional. A list of developers. Limit 1000 per action. + "A String", + ], "ipAddressRanges": [ # Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action. "A String", ], + "userAgents": [ # Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action. + "A String", + ], }, "createTime": "A String", # Output only. The create time for this SecurityAction. "deny": { # Message that should be set in case of a Deny Action. # Deny a request through if it matches this SecurityAction. diff --git a/googleapiclient/discovery_cache/documents/apigee.v1.json b/googleapiclient/discovery_cache/documents/apigee.v1.json index 03a69a3c4e..148de1e6c2 100644 --- a/googleapiclient/discovery_cache/documents/apigee.v1.json +++ b/googleapiclient/discovery_cache/documents/apigee.v1.json @@ -9814,7 +9814,7 @@ } } }, -"revision": "20240213", +"revision": "20240220", "rootUrl": "https://apigee.googleapis.com/", "schemas": { "EdgeConfigstoreBundleBadBundle": { @@ -16086,9 +16086,30 @@ "type": "object" }, "GoogleCloudApigeeV1SecurityActionConditionConfig": { -"description": "The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: api_keys: [\"key1\", \"key2\"] and developers: [\"dev1\", \"dev2\"] then this is interpreted as: enforce the action if the incoming request has ((api_key = \"key1\" OR api_key=\"key\") AND (developer=\"dev1\" OR developer=\"dev2\")).", +"description": "The following are a list of conditions. A valid SecurityAction must contain at least one condition. Within a condition, each element is ORed. Across conditions elements are ANDed. For example if a SecurityAction has the following: ip_address_ranges: [\"ip1\", \"ip2\"] and bot_reasons: [\"Flooder\", \"Robot Abuser\"] then this is interpreted as: enforce the action if the incoming request has ((ip_address_ranges = \"ip1\" OR ip_address_ranges = \"ip2\") AND (bot_reasons=\"Flooder\" OR bot_reasons=\"Robot Abuser\")). Conditions other than ip_address_ranges and bot_reasons cannot be ANDed.", "id": "GoogleCloudApigeeV1SecurityActionConditionConfig", "properties": { +"accessTokens": { +"description": "Optional. A list of access_tokens. Limit 1000 per action.", +"items": { +"type": "string" +}, +"type": "array" +}, +"apiKeys": { +"description": "Optional. A list of API keys. Limit 1000 per action.", +"items": { +"type": "string" +}, +"type": "array" +}, +"apiProducts": { +"description": "Optional. A list of API Products. Limit 1000 per action.", +"items": { +"type": "string" +}, +"type": "array" +}, "botReasons": { "description": "Optional. A list of Bot Reasons. Current options: Flooder, Brute Guessor, Static Content Scraper, OAuth Abuser, Robot Abuser, TorListRule, Advanced Anomaly Detection, Advanced API Scraper, Search Engine Crawlers, Public Clouds, Public Cloud AWS, Public Cloud Azure, and Public Cloud Google.", "items": { @@ -16096,12 +16117,33 @@ }, "type": "array" }, +"developerApps": { +"description": "Optional. A list of developer apps. Limit 1000 per action.", +"items": { +"type": "string" +}, +"type": "array" +}, +"developers": { +"description": "Optional. A list of developers. Limit 1000 per action.", +"items": { +"type": "string" +}, +"type": "array" +}, "ipAddressRanges": { "description": "Optional. A list of IP addresses. This could be either IPv4 or IPv6. Limited to 100 per action.", "items": { "type": "string" }, "type": "array" +}, +"userAgents": { +"description": "Optional. A list of user agents to deny. We look for exact matches. Limit 50 per action.", +"items": { +"type": "string" +}, +"type": "array" } }, "type": "object"