Skip to content

Commit

Permalink
feat(cloudasset): update the api
Browse files Browse the repository at this point in the history
#### cloudasset:v1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)

#### cloudasset:v1beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)

#### cloudasset:v1p1beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)

#### cloudasset:v1p4beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)

#### cloudasset:v1p5beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)

#### cloudasset:v1p7beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)
  • Loading branch information
yoshi-automation committed Dec 7, 2021
1 parent daab1a1 commit d3602db
Show file tree
Hide file tree
Showing 12 changed files with 76 additions and 16 deletions.
3 changes: 3 additions & 0 deletions docs/dyn/cloudasset_v1.assets.html
Expand Up @@ -175,6 +175,9 @@ <h3>Method Details</h3>
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
&quot;A String&quot;,
],
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
},
&quot;ancestors&quot;: [ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `[&quot;projects/123456789&quot;, &quot;folders/5432&quot;, &quot;organizations/1234&quot;]`
Expand Down
12 changes: 6 additions & 6 deletions docs/dyn/cloudasset_v1.savedQueries.html
Expand Up @@ -112,7 +112,7 @@ <h3>Method Details</h3>

{ # A saved query which can be shared with others or used later.
&quot;content&quot;: { # The query content. # The query content.
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -163,7 +163,7 @@ <h3>Method Details</h3>

{ # A saved query which can be shared with others or used later.
&quot;content&quot;: { # The query content. # The query content.
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -238,7 +238,7 @@ <h3>Method Details</h3>

{ # A saved query which can be shared with others or used later.
&quot;content&quot;: { # The query content. # The query content.
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -301,7 +301,7 @@ <h3>Method Details</h3>
&quot;savedQueries&quot;: [ # A list of savedQueries.
{ # A saved query which can be shared with others or used later.
&quot;content&quot;: { # The query content. # The query content.
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -369,7 +369,7 @@ <h3>Method Details</h3>

{ # A saved query which can be shared with others or used later.
&quot;content&quot;: { # The query content. # The query content.
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -420,7 +420,7 @@ <h3>Method Details</h3>

{ # A saved query which can be shared with others or used later.
&quot;content&quot;: { # The query content. # The query content.
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down
12 changes: 9 additions & 3 deletions docs/dyn/cloudasset_v1.v1.html
Expand Up @@ -135,7 +135,7 @@ <h3>Method Details</h3>
{ # A response message for AssetService.AnalyzeIamPolicy.
&quot;fullyExplored&quot;: True or False, # Represents whether all entries in the main_analysis and service_account_impersonation_analysis have been fully explored to answer the query in the request.
&quot;mainAnalysis&quot;: { # An analysis message to group the query and results. # The main analysis that matches the original request.
&quot;analysisQuery&quot;: { # ## IAM policy analysis query message. # The analysis query.
&quot;analysisQuery&quot;: { # IAM policy analysis query message. # The analysis query.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -240,7 +240,7 @@ <h3>Method Details</h3>
},
&quot;serviceAccountImpersonationAnalysis&quot;: [ # The service account impersonation analysis if AnalyzeIamPolicyRequest.analyze_service_account_impersonation is enabled.
{ # An analysis message to group the query and results.
&quot;analysisQuery&quot;: { # ## IAM policy analysis query message. # The analysis query.
&quot;analysisQuery&quot;: { # IAM policy analysis query message. # The analysis query.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -357,7 +357,7 @@ <h3>Method Details</h3>
The object takes the form of:

{ # A request message for AssetService.AnalyzeIamPolicyLongrunning.
&quot;analysisQuery&quot;: { # ## IAM policy analysis query message. # Required. The request query.
&quot;analysisQuery&quot;: { # IAM policy analysis query message. # Required. The request query.
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
&quot;A String&quot;,
Expand Down Expand Up @@ -564,6 +564,9 @@ <h3>Method Details</h3>
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
&quot;A String&quot;,
],
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
},
&quot;ancestors&quot;: [ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `[&quot;projects/123456789&quot;, &quot;folders/5432&quot;, &quot;organizations/1234&quot;]`
Expand Down Expand Up @@ -1033,6 +1036,9 @@ <h3>Method Details</h3>
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
&quot;A String&quot;,
],
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
},
&quot;ancestors&quot;: [ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `[&quot;projects/123456789&quot;, &quot;folders/5432&quot;, &quot;organizations/1234&quot;]`
Expand Down
3 changes: 3 additions & 0 deletions docs/dyn/cloudasset_v1beta1.organizations.html
Expand Up @@ -170,6 +170,9 @@ <h3>Method Details</h3>
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
&quot;A String&quot;,
],
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
},
&quot;assetType&quot;: &quot;A String&quot;, # The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types) for more information.
Expand Down

0 comments on commit d3602db

Please sign in to comment.