diff --git a/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/AccessContextManagerClient.java b/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/AccessContextManagerClient.java index 1178e3f45c43..2191a1cc9ad4 100644 --- a/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/AccessContextManagerClient.java +++ b/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/AccessContextManagerClient.java @@ -29,6 +29,11 @@ import com.google.api.gax.rpc.PageContext; import com.google.api.gax.rpc.UnaryCallable; import com.google.common.util.concurrent.MoreExecutors; +import com.google.iam.v1.GetIamPolicyRequest; +import com.google.iam.v1.Policy; +import com.google.iam.v1.SetIamPolicyRequest; +import com.google.iam.v1.TestIamPermissionsRequest; +import com.google.iam.v1.TestIamPermissionsResponse; import com.google.identity.accesscontextmanager.v1.stub.AccessContextManagerStub; import com.google.identity.accesscontextmanager.v1.stub.AccessContextManagerStubSettings; import com.google.longrunning.Operation; @@ -41,12 +46,12 @@ // AUTO-GENERATED DOCUMENTATION AND CLASS. /** - * Service Description: API for setting [Access Levels] - * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service Perimeters] - * [google.identity.accesscontextmanager.v1.ServicePerimeter] for Google Cloud Projects. Each - * organization has one [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] - * containing the [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel] and [Service - * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]. This [AccessPolicy] + * Service Description: API for setting [access levels] + * [google.identity.accesscontextmanager.v1.AccessLevel] and [service perimeters] + * [google.identity.accesscontextmanager.v1.ServicePerimeter] for Google Cloud projects. Each + * organization has one [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] that + * contains the [access levels] [google.identity.accesscontextmanager.v1.AccessLevel] and [service + * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]. This [access policy] * [google.identity.accesscontextmanager.v1.AccessPolicy] is applicable to all resources in the * organization. AccessPolicies * @@ -217,8 +222,8 @@ public final OperationsClient getHttpJsonOperationsClient() { // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * List all [AccessPolicies] [google.identity.accesscontextmanager.v1.AccessPolicy] under a - * container. + * Lists all [access policies] [google.identity.accesscontextmanager.v1.AccessPolicy] in an + * organization. * *
Sample code: * @@ -253,8 +258,8 @@ public final ListAccessPoliciesPagedResponse listAccessPolicies( // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * List all [AccessPolicies] [google.identity.accesscontextmanager.v1.AccessPolicy] under a - * container. + * Lists all [access policies] [google.identity.accesscontextmanager.v1.AccessPolicy] in an + * organization. * *
Sample code: * @@ -288,8 +293,8 @@ public final ListAccessPoliciesPagedResponse listAccessPolicies( // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * List all [AccessPolicies] [google.identity.accesscontextmanager.v1.AccessPolicy] under a - * container. + * Lists all [access policies] [google.identity.accesscontextmanager.v1.AccessPolicy] in an + * organization. * *
Sample code: * @@ -330,7 +335,8 @@ public final ListAccessPoliciesPagedResponse listAccessPolicies( // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * Get an [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] by name. + * Returns an [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] based on the + * name. * *
Sample code: * @@ -359,7 +365,8 @@ public final AccessPolicy getAccessPolicy(AccessPolicyName name) { // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * Get an [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] by name. + * Returns an [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] based on the + * name. * *
Sample code: * @@ -387,7 +394,8 @@ public final AccessPolicy getAccessPolicy(String name) { // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * Get an [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] by name. + * Returns an [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] based on the + * name. * *
Sample code: * @@ -416,7 +424,8 @@ public final AccessPolicy getAccessPolicy(GetAccessPolicyRequest request) { // AUTO-GENERATED DOCUMENTATION AND METHOD. /** - * Get an [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] by name. + * Returns an [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] based on the + * name. * *
Sample code:
*
@@ -445,9 +454,9 @@ public final UnaryCallable Sample code:
@@ -465,6 +474,7 @@ public final UnaryCallable Sample code:
@@ -503,6 +513,7 @@ public final UnaryCallable Sample code:
@@ -541,6 +552,7 @@ public final UnaryCallable Sample code:
*
@@ -594,11 +605,10 @@ public final UnaryCallable Sample code:
*
@@ -629,11 +639,10 @@ public final UnaryCallable Sample code:
*
@@ -665,11 +674,10 @@ public final UnaryCallable Sample code:
*
@@ -699,10 +707,9 @@ public final UnaryCallable Sample code:
*
@@ -734,10 +741,9 @@ public final UnaryCallable Sample code:
*
@@ -767,10 +773,9 @@ public final UnaryCallable Sample code:
*
@@ -800,10 +805,9 @@ public final UnaryCallable Sample code:
*
@@ -834,10 +838,9 @@ public final UnaryCallable Sample code:
*
@@ -866,7 +869,7 @@ public final UnaryCallable Sample code:
@@ -901,7 +904,7 @@ public final ListAccessLevelsPagedResponse listAccessLevels(AccessPolicyName par
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
+ * Lists all [access levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
* Sample code:
@@ -934,7 +937,7 @@ public final ListAccessLevelsPagedResponse listAccessLevels(String parent) {
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
+ * Lists all [access levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
* Sample code:
@@ -970,7 +973,7 @@ public final ListAccessLevelsPagedResponse listAccessLevels(ListAccessLevelsRequ
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
+ * Lists all [access levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
* Sample code:
@@ -1006,7 +1009,7 @@ public final ListAccessLevelsPagedResponse listAccessLevels(ListAccessLevelsRequ
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
+ * Lists all [access levels] [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
* Sample code:
@@ -1049,7 +1052,8 @@ public final ListAccessLevelsPagedResponse listAccessLevels(ListAccessLevelsRequ
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get an [Access Level] [google.identity.accesscontextmanager.v1.AccessLevel] by resource name.
+ * Gets an [access level] [google.identity.accesscontextmanager.v1.AccessLevel] based on the
+ * resource name.
*
* Sample code:
*
@@ -1079,7 +1083,8 @@ public final AccessLevel getAccessLevel(AccessLevelName name) {
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get an [Access Level] [google.identity.accesscontextmanager.v1.AccessLevel] by resource name.
+ * Gets an [access level] [google.identity.accesscontextmanager.v1.AccessLevel] based on the
+ * resource name.
*
* Sample code:
*
@@ -1108,7 +1113,8 @@ public final AccessLevel getAccessLevel(String name) {
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get an [Access Level] [google.identity.accesscontextmanager.v1.AccessLevel] by resource name.
+ * Gets an [access level] [google.identity.accesscontextmanager.v1.AccessLevel] based on the
+ * resource name.
*
* Sample code:
*
@@ -1138,7 +1144,8 @@ public final AccessLevel getAccessLevel(GetAccessLevelRequest request) {
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get an [Access Level] [google.identity.accesscontextmanager.v1.AccessLevel] by resource name.
+ * Gets an [access level] [google.identity.accesscontextmanager.v1.AccessLevel] based on the
+ * resource name.
*
* Sample code:
*
@@ -1168,11 +1175,11 @@ public final UnaryCallable Sample code:
*
@@ -1212,11 +1219,11 @@ public final UnaryCallable Sample code:
*
@@ -1253,11 +1260,11 @@ public final UnaryCallable Sample code:
*
@@ -1288,11 +1295,11 @@ public final UnaryCallable Sample code:
*
@@ -1324,11 +1331,11 @@ public final UnaryCallable Sample code:
*
@@ -1358,11 +1365,11 @@ public final UnaryCallable Sample code:
*
@@ -1400,11 +1407,11 @@ public final UnaryCallable Sample code:
*
@@ -1435,11 +1442,11 @@ public final UnaryCallable Sample code:
*
@@ -1471,11 +1478,11 @@ public final UnaryCallable Sample code:
*
@@ -1505,10 +1512,10 @@ public final UnaryCallable Sample code:
*
@@ -1541,10 +1548,10 @@ public final OperationFuture Sample code:
*
@@ -1574,10 +1581,10 @@ public final OperationFuture Sample code:
*
@@ -1607,10 +1614,10 @@ public final OperationFuture Sample code:
*
@@ -1641,10 +1648,10 @@ public final OperationFuture Sample code:
*
@@ -1673,17 +1680,16 @@ public final UnaryCallable Sample code:
*
@@ -1716,17 +1722,16 @@ public final UnaryCallable Sample code:
*
@@ -1761,17 +1766,16 @@ public final UnaryCallable Sample code:
*
@@ -1802,8 +1806,8 @@ public final UnaryCallable Sample code:
*
@@ -1838,8 +1842,8 @@ public final ListServicePerimetersPagedResponse listServicePerimeters(AccessPoli
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
- * access policy.
+ * Lists all [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for
+ * an access policy.
*
* Sample code:
*
@@ -1872,8 +1876,8 @@ public final ListServicePerimetersPagedResponse listServicePerimeters(String par
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
- * access policy.
+ * Lists all [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for
+ * an access policy.
*
* Sample code:
*
@@ -1908,8 +1912,8 @@ public final ListServicePerimetersPagedResponse listServicePerimeters(
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
- * access policy.
+ * Lists all [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for
+ * an access policy.
*
* Sample code:
*
@@ -1943,8 +1947,8 @@ public final ListServicePerimetersPagedResponse listServicePerimeters(
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * List all [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
- * access policy.
+ * Lists all [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] for
+ * an access policy.
*
* Sample code:
*
@@ -1985,8 +1989,8 @@ public final ListServicePerimetersPagedResponse listServicePerimeters(
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name.
+ * Gets a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based on
+ * the resource name.
*
* Sample code:
*
@@ -2018,8 +2022,8 @@ public final ServicePerimeter getServicePerimeter(ServicePerimeterName name) {
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name.
+ * Gets a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based on
+ * the resource name.
*
* Sample code:
*
@@ -2049,8 +2053,8 @@ public final ServicePerimeter getServicePerimeter(String name) {
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name.
+ * Gets a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based on
+ * the resource name.
*
* Sample code:
*
@@ -2079,8 +2083,8 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Get a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name.
+ * Gets a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based on
+ * the resource name.
*
* Sample code:
*
@@ -2110,11 +2114,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Create a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has propagated to long-lasting
- * storage. [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * containing errors will result in an error response for the first error encountered.
+ * Creates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2154,11 +2158,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Create a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has propagated to long-lasting
- * storage. [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * containing errors will result in an error response for the first error encountered.
+ * Creates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2198,11 +2202,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Create a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has propagated to long-lasting
- * storage. [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * containing errors will result in an error response for the first error encountered.
+ * Creates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2234,11 +2238,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Create a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has propagated to long-lasting
- * storage. [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * containing errors will result in an error response for the first error encountered.
+ * Creates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2270,11 +2274,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Create a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has propagated to long-lasting
- * storage. [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * containing errors will result in an error response for the first error encountered.
+ * Creates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2305,12 +2309,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Update a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the changes to the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] have propagated
- * to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing errors will result in an
- * error response for the first error encountered.
+ * Updates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2348,12 +2351,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Update a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the changes to the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] have propagated
- * to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing errors will result in an
- * error response for the first error encountered.
+ * Updates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2385,12 +2387,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Update a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the changes to the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] have propagated
- * to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing errors will result in an
- * error response for the first error encountered.
+ * Updates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2422,12 +2423,11 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Update a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the changes to the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] have propagated
- * to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing errors will result in an
- * error response for the first error encountered.
+ * Updates a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
+ * long-running operation from this RPC has a successful status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] propagates to long-lasting storage.
+ * If a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
* Sample code:
*
@@ -2458,9 +2458,9 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Delete a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name. The longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] has been removed
+ * Deletes a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based
+ * on the resource name. The long-running operation from this RPC has a successful status after
+ * the [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed
* from long-lasting storage.
*
* Sample code:
@@ -2494,9 +2494,9 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Delete a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name. The longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] has been removed
+ * Deletes a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based
+ * on the resource name. The long-running operation from this RPC has a successful status after
+ * the [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed
* from long-lasting storage.
*
* Sample code:
@@ -2528,9 +2528,9 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Delete a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name. The longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] has been removed
+ * Deletes a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based
+ * on the resource name. The long-running operation from this RPC has a successful status after
+ * the [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed
* from long-lasting storage.
*
* Sample code:
@@ -2561,9 +2561,9 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Delete a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name. The longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] has been removed
+ * Deletes a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based
+ * on the resource name. The long-running operation from this RPC has a successful status after
+ * the [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed
* from long-lasting storage.
*
* Sample code:
@@ -2595,9 +2595,9 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Delete a [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] by
- * resource name. The longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] has been removed
+ * Deletes a [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] based
+ * on the resource name. The long-running operation from this RPC has a successful status after
+ * the [service perimeter] [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed
* from long-lasting storage.
*
* Sample code:
@@ -2628,15 +2628,15 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [Access Policy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] with the [Service Perimeters]
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] with the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This is done atomically.
- * The longrunning operation from this RPC will have a successful status once all replacements
- * have propagated to long-lasting storage. Replacements containing errors will result in an error
- * response for the first error encountered. Replacement will be cancelled on error, existing
- * [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain ReplaceServicePerimetersResponse.
+ * The long-running operation from this RPC has a successful status after all replacements
+ * propagate to long-lasting storage. Replacements containing errors result in an error response
+ * for the first error encountered. Upon an error, replacement are cancelled and existing [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] are not affected. The
+ * Operation.response field contains ReplaceServicePerimetersResponse.
*
* Sample code:
*
@@ -2670,15 +2670,15 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [Access Policy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] with the [Service Perimeters]
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] with the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This is done atomically.
- * The longrunning operation from this RPC will have a successful status once all replacements
- * have propagated to long-lasting storage. Replacements containing errors will result in an error
- * response for the first error encountered. Replacement will be cancelled on error, existing
- * [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain ReplaceServicePerimetersResponse.
+ * The long-running operation from this RPC has a successful status after all replacements
+ * propagate to long-lasting storage. Replacements containing errors result in an error response
+ * for the first error encountered. Upon an error, replacement are cancelled and existing [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] are not affected. The
+ * Operation.response field contains ReplaceServicePerimetersResponse.
*
* Sample code:
*
@@ -2716,15 +2716,15 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [Access Policy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] with the [Service Perimeters]
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] with the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This is done atomically.
- * The longrunning operation from this RPC will have a successful status once all replacements
- * have propagated to long-lasting storage. Replacements containing errors will result in an error
- * response for the first error encountered. Replacement will be cancelled on error, existing
- * [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain ReplaceServicePerimetersResponse.
+ * The long-running operation from this RPC has a successful status after all replacements
+ * propagate to long-lasting storage. Replacements containing errors result in an error response
+ * for the first error encountered. Upon an error, replacement are cancelled and existing [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] are not affected. The
+ * Operation.response field contains ReplaceServicePerimetersResponse.
*
* Sample code:
*
@@ -2756,18 +2756,18 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Commit the dry-run spec for all the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [Access
- * Policy][google.identity.accesscontextmanager.v1.AccessPolicy]. A commit operation on a Service
- * Perimeter involves copying its `spec` field to that Service Perimeter's `status` field. Only
- * [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] with
+ * Commits the dry-run specification for all the [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy]. A commit operation on a service
+ * perimeter involves copying its `spec` field to the `status` field of the service perimeter.
+ * Only [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit operation. The
- * longrunning operation from this RPC will have a successful status once the dry-run specs for
- * all the [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * been committed. If a commit fails, it will cause the longrunning operation to return an error
- * response and the entire commit operation will be cancelled. When successful, Operation.response
- * field will contain CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will be
- * cleared after a successful commit operation.
+ * long-running operation from this RPC has a successful status after the dry-run specifications
+ * for all the [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * have been committed. If a commit fails, it causes the long-running operation to return an error
+ * response and the entire commit operation is cancelled. When successful, the Operation.response
+ * field contains CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are cleared
+ * after a successful commit operation.
*
* Sample code:
*
@@ -2800,18 +2800,18 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Commit the dry-run spec for all the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [Access
- * Policy][google.identity.accesscontextmanager.v1.AccessPolicy]. A commit operation on a Service
- * Perimeter involves copying its `spec` field to that Service Perimeter's `status` field. Only
- * [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] with
+ * Commits the dry-run specification for all the [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy]. A commit operation on a service
+ * perimeter involves copying its `spec` field to the `status` field of the service perimeter.
+ * Only [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit operation. The
- * longrunning operation from this RPC will have a successful status once the dry-run specs for
- * all the [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * been committed. If a commit fails, it will cause the longrunning operation to return an error
- * response and the entire commit operation will be cancelled. When successful, Operation.response
- * field will contain CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will be
- * cleared after a successful commit operation.
+ * long-running operation from this RPC has a successful status after the dry-run specifications
+ * for all the [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * have been committed. If a commit fails, it causes the long-running operation to return an error
+ * response and the entire commit operation is cancelled. When successful, the Operation.response
+ * field contains CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are cleared
+ * after a successful commit operation.
*
* Sample code:
*
@@ -2848,18 +2848,18 @@ public final ServicePerimeter getServicePerimeter(GetServicePerimeterRequest req
// AUTO-GENERATED DOCUMENTATION AND METHOD.
/**
- * Commit the dry-run spec for all the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [Access
- * Policy][google.identity.accesscontextmanager.v1.AccessPolicy]. A commit operation on a Service
- * Perimeter involves copying its `spec` field to that Service Perimeter's `status` field. Only
- * [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] with
+ * Commits the dry-run specification for all the [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy]. A commit operation on a service
+ * perimeter involves copying its `spec` field to the `status` field of the service perimeter.
+ * Only [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit operation. The
- * longrunning operation from this RPC will have a successful status once the dry-run specs for
- * all the [Service Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * been committed. If a commit fails, it will cause the longrunning operation to return an error
- * response and the entire commit operation will be cancelled. When successful, Operation.response
- * field will contain CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will be
- * cleared after a successful commit operation.
+ * long-running operation from this RPC has a successful status after the dry-run specifications
+ * for all the [service perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * have been committed. If a commit fails, it causes the long-running operation to return an error
+ * response and the entire commit operation is cancelled. When successful, the Operation.response
+ * field contains CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are cleared
+ * after a successful commit operation.
*
* Sample code:
*
@@ -3201,8 +3201,8 @@ public final GcpUserAccessBinding getGcpUserAccessBinding(
/**
* Creates a [GcpUserAccessBinding]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the client specifies a
- * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server will
- * ignore it. Fails if a resource already exists with the same [group_key]
+ * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server ignores
+ * it. Fails if a resource already exists with the same [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key]. Completion of this
* long-running operation does not necessarily signify that the new binding is deployed onto all
* affected users, which may take more time.
@@ -3246,8 +3246,8 @@ public final GcpUserAccessBinding getGcpUserAccessBinding(
/**
* Creates a [GcpUserAccessBinding]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the client specifies a
- * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server will
- * ignore it. Fails if a resource already exists with the same [group_key]
+ * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server ignores
+ * it. Fails if a resource already exists with the same [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key]. Completion of this
* long-running operation does not necessarily signify that the new binding is deployed onto all
* affected users, which may take more time.
@@ -3290,8 +3290,8 @@ public final GcpUserAccessBinding getGcpUserAccessBinding(
/**
* Creates a [GcpUserAccessBinding]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the client specifies a
- * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server will
- * ignore it. Fails if a resource already exists with the same [group_key]
+ * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server ignores
+ * it. Fails if a resource already exists with the same [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key]. Completion of this
* long-running operation does not necessarily signify that the new binding is deployed onto all
* affected users, which may take more time.
@@ -3328,8 +3328,8 @@ public final GcpUserAccessBinding getGcpUserAccessBinding(
/**
* Creates a [GcpUserAccessBinding]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the client specifies a
- * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server will
- * ignore it. Fails if a resource already exists with the same [group_key]
+ * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server ignores
+ * it. Fails if a resource already exists with the same [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key]. Completion of this
* long-running operation does not necessarily signify that the new binding is deployed onto all
* affected users, which may take more time.
@@ -3370,8 +3370,8 @@ public final GcpUserAccessBinding getGcpUserAccessBinding(
/**
* Creates a [GcpUserAccessBinding]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the client specifies a
- * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server will
- * ignore it. Fails if a resource already exists with the same [group_key]
+ * [name] [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name], the server ignores
+ * it. Fails if a resource already exists with the same [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key]. Completion of this
* long-running operation does not necessarily signify that the new binding is deployed onto all
* affected users, which may take more time.
@@ -3731,6 +3731,209 @@ public final GcpUserAccessBinding getGcpUserAccessBinding(
return stub.deleteGcpUserAccessBindingCallable();
}
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Sets the IAM policy for the specified Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy]. This method replaces the
+ * existing IAM policy on the access policy. The IAM policy controls the set of users who can
+ * perform specific operations on the Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ * Sample code:
+ *
+ * Sample code:
+ *
+ * Sample code:
+ *
+ * Sample code:
+ *
+ * Sample code:
+ *
+ * Sample code:
+ *
+ * The interfaces provided are listed below, along with usage samples.
*
* ======================= AccessContextManagerClient =======================
*
- * Service Description: API for setting [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] for Google Cloud Projects. Each
- * organization has one [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * containing the [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
- * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]. This [AccessPolicy]
+ * Service Description: API for setting [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] and [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] for Google Cloud projects. Each
+ * organization has one [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] that
+ * contains the [access levels] [google.identity.accesscontextmanager.v1.AccessLevel] and [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]. This [access policy]
* [google.identity.accesscontextmanager.v1.AccessPolicy] is applicable to all resources in the
* organization. AccessPolicies
*
diff --git a/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/stub/AccessContextManagerStub.java b/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/stub/AccessContextManagerStub.java
index 5ab449ae7541..454837097c49 100644
--- a/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/stub/AccessContextManagerStub.java
+++ b/java-accesscontextmanager/google-identity-accesscontextmanager/src/main/java/com/google/identity/accesscontextmanager/v1/stub/AccessContextManagerStub.java
@@ -24,6 +24,11 @@
import com.google.api.gax.core.BackgroundResource;
import com.google.api.gax.rpc.OperationCallable;
import com.google.api.gax.rpc.UnaryCallable;
+import com.google.iam.v1.GetIamPolicyRequest;
+import com.google.iam.v1.Policy;
+import com.google.iam.v1.SetIamPolicyRequest;
+import com.google.iam.v1.TestIamPermissionsRequest;
+import com.google.iam.v1.TestIamPermissionsResponse;
import com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata;
import com.google.identity.accesscontextmanager.v1.AccessLevel;
import com.google.identity.accesscontextmanager.v1.AccessPolicy;
@@ -320,6 +325,19 @@ public UnaryCallable{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (AccessContextManagerClient accessContextManagerClient =
+ * AccessContextManagerClient.create()) {
+ * SetIamPolicyRequest request =
+ * SetIamPolicyRequest.newBuilder()
+ * .setResource(AccessPolicyName.of("[ACCESS_POLICY]").toString())
+ * .setPolicy(Policy.newBuilder().build())
+ * .setUpdateMask(FieldMask.newBuilder().build())
+ * .build();
+ * Policy response = accessContextManagerClient.setIamPolicy(request);
+ * }
+ * }
+ *
+ * @param request The request object containing all of the parameters for the API call.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final Policy setIamPolicy(SetIamPolicyRequest request) {
+ return setIamPolicyCallable().call(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Sets the IAM policy for the specified Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy]. This method replaces the
+ * existing IAM policy on the access policy. The IAM policy controls the set of users who can
+ * perform specific operations on the Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ * {@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (AccessContextManagerClient accessContextManagerClient =
+ * AccessContextManagerClient.create()) {
+ * SetIamPolicyRequest request =
+ * SetIamPolicyRequest.newBuilder()
+ * .setResource(AccessPolicyName.of("[ACCESS_POLICY]").toString())
+ * .setPolicy(Policy.newBuilder().build())
+ * .setUpdateMask(FieldMask.newBuilder().build())
+ * .build();
+ * ApiFuture
+ */
+ public final UnaryCallable{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (AccessContextManagerClient accessContextManagerClient =
+ * AccessContextManagerClient.create()) {
+ * GetIamPolicyRequest request =
+ * GetIamPolicyRequest.newBuilder()
+ * .setResource(AccessPolicyName.of("[ACCESS_POLICY]").toString())
+ * .setOptions(GetPolicyOptions.newBuilder().build())
+ * .build();
+ * Policy response = accessContextManagerClient.getIamPolicy(request);
+ * }
+ * }
+ *
+ * @param request The request object containing all of the parameters for the API call.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final Policy getIamPolicy(GetIamPolicyRequest request) {
+ return getIamPolicyCallable().call(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Gets the IAM policy for the specified Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ * {@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (AccessContextManagerClient accessContextManagerClient =
+ * AccessContextManagerClient.create()) {
+ * GetIamPolicyRequest request =
+ * GetIamPolicyRequest.newBuilder()
+ * .setResource(AccessPolicyName.of("[ACCESS_POLICY]").toString())
+ * .setOptions(GetPolicyOptions.newBuilder().build())
+ * .build();
+ * ApiFuture
+ */
+ public final UnaryCallable{@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (AccessContextManagerClient accessContextManagerClient =
+ * AccessContextManagerClient.create()) {
+ * TestIamPermissionsRequest request =
+ * TestIamPermissionsRequest.newBuilder()
+ * .setResource(AccessLevelName.of("[ACCESS_POLICY]", "[ACCESS_LEVEL]").toString())
+ * .addAllPermissions(new ArrayList
+ *
+ * @param request The request object containing all of the parameters for the API call.
+ * @throws com.google.api.gax.rpc.ApiException if the remote call fails
+ */
+ public final TestIamPermissionsResponse testIamPermissions(TestIamPermissionsRequest request) {
+ return testIamPermissionsCallable().call(request);
+ }
+
+ // AUTO-GENERATED DOCUMENTATION AND METHOD.
+ /**
+ * Returns the IAM permissions that the caller has on the specified Access Context Manager
+ * resource. The resource can be an
+ * [AccessPolicy][google.identity.accesscontextmanager.v1.AccessPolicy],
+ * [AccessLevel][google.identity.accesscontextmanager.v1.AccessLevel], or
+ * [ServicePerimeter][google.identity.accesscontextmanager.v1.ServicePerimeter ]. This method does
+ * not support other resources.
+ *
+ * {@code
+ * // This snippet has been automatically generated and should be regarded as a code template only.
+ * // It will require modifications to work:
+ * // - It may require correct/in-range values for request initialization.
+ * // - It may require specifying regional endpoints when creating the service client as shown in
+ * // https://cloud.google.com/java/docs/setup#configure_endpoints_for_the_client_library
+ * try (AccessContextManagerClient accessContextManagerClient =
+ * AccessContextManagerClient.create()) {
+ * TestIamPermissionsRequest request =
+ * TestIamPermissionsRequest.newBuilder()
+ * .setResource(AccessLevelName.of("[ACCESS_POLICY]", "[ACCESS_LEVEL]").toString())
+ * .addAllPermissions(new ArrayList
+ */
+ public final UnaryCallable
- * API for setting [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
- * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * for Google Cloud Projects. Each organization has one [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
- * [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
- * and [Service Perimeters]
+ * API for setting [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] and [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * for Google Cloud projects. Each organization has one [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] that contains the
+ * [access levels] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * and [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
* applicable to all resources in the organization.
* AccessPolicies
*
@@ -1209,6 +1209,129 @@ private AccessContextManagerGrpc() {}
return getDeleteGcpUserAccessBindingMethod;
}
+ private static volatile io.grpc.MethodDescriptor<
+ com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy>
+ getSetIamPolicyMethod;
+
+ @io.grpc.stub.annotations.RpcMethod(
+ fullMethodName = SERVICE_NAME + '/' + "SetIamPolicy",
+ requestType = com.google.iam.v1.SetIamPolicyRequest.class,
+ responseType = com.google.iam.v1.Policy.class,
+ methodType = io.grpc.MethodDescriptor.MethodType.UNARY)
+ public static io.grpc.MethodDescriptor<
+ com.google.iam.v1.SetIamPolicyRequest, com.google.iam.v1.Policy>
+ getSetIamPolicyMethod() {
+ io.grpc.MethodDescriptor
- * API for setting [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
- * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * for Google Cloud Projects. Each organization has one [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
- * [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
- * and [Service Perimeters]
+ * API for setting [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] and [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * for Google Cloud projects. Each organization has one [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] that contains the
+ * [access levels] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * and [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
* applicable to all resources in the organization.
* AccessPolicies
*
@@ -1273,9 +1396,9 @@ public abstract static class AccessContextManagerImplBase implements io.grpc.Bin
*
*
*
- * List all [AccessPolicies]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] under a
- * container.
+ * Lists all [access policies]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] in an
+ * organization.
*
*/
public void listAccessPolicies(
@@ -1291,8 +1414,8 @@ public void listAccessPolicies(
*
*
*
- * Get an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by name.
+ * Returns an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the name.
*
*/
public void getAccessPolicy(
@@ -1307,10 +1430,10 @@ public void getAccessPolicy(
*
*
*
- * Create an `AccessPolicy`. Fails if this organization already has a
- * `AccessPolicy`. The longrunning Operation will have a successful status
- * once the `AccessPolicy` has propagated to long-lasting storage.
- * Syntactic and basic semantic errors will be returned in `metadata` as a
+ * Creates an access policy. This method fails if the organization already has
+ * an access policy. The long-running operation has a successful status
+ * after the access policy propagates to long-lasting storage.
+ * Syntactic and basic semantic errors are returned in `metadata` as a
* BadRequest proto.
*
*/
@@ -1325,13 +1448,12 @@ public void createAccessPolicy(
*
*
*
- * Update an [AccessPolicy]
+ * Updates an [access policy]
* [google.identity.accesscontextmanager.v1.AccessPolicy]. The
- * longrunning Operation from this RPC will have a successful status once the
- * changes to the [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] have propagated
- * to long-lasting storage. Syntactic and basic semantic errors will be
- * returned in `metadata` as a BadRequest proto.
+ * long-running operation from this RPC has a successful status after the
+ * changes to the [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] propagate
+ * to long-lasting storage.
*
*/
public void updateAccessPolicy(
@@ -1345,11 +1467,11 @@ public void updateAccessPolicy(
*
*
*
- * Delete an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by resource
- * name. The longrunning Operation will have a successful status once the
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * has been removed from long-lasting storage.
+ * Deletes an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the
+ * resource name. The long-running operation has a successful status after the
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
+ * is removed from long-lasting storage.
*
*/
public void deleteAccessPolicy(
@@ -1363,7 +1485,7 @@ public void deleteAccessPolicy(
*
*
*
- * List all [Access Levels]
+ * Lists all [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
@@ -1381,8 +1503,8 @@ public void listAccessLevels(
*
*
*
- * Get an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
+ * Gets an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
* name.
*
*/
@@ -1398,13 +1520,13 @@ public void getAccessLevel(
*
*
*
- * Create an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the [Access
- * Level] [google.identity.accesscontextmanager.v1.AccessLevel] has
- * propagated to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Creates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the [access
+ * level] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * propagates to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public void createAccessLevel(
@@ -1418,14 +1540,14 @@ public void createAccessLevel(
*
*
*
- * Update an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the changes to
- * the [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] have propagated
- * to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Updates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the changes to
+ * the [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] propagate
+ * to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public void updateAccessLevel(
@@ -1439,10 +1561,10 @@ public void updateAccessLevel(
*
*
*
- * Delete an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Access Level]
+ * Deletes an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
+ * name. The long-running operation from this RPC has a successful status
+ * after the [access level]
* [google.identity.accesscontextmanager.v1.AccessLevel] has been removed
* from long-lasting storage.
*
@@ -1458,22 +1580,22 @@ public void deleteAccessLevel(
*
*
*
- * Replace all existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] in an [Access
- * Policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
- * the [Access Levels]
+ * Replaces all existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
+ * the [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] provided. This
- * is done atomically. The longrunning operation from this RPC will have a
- * successful status once all replacements have propagated to long-lasting
- * storage. Replacements containing errors will result in an error response
- * for the first error encountered. Replacement will be cancelled on error,
- * existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] will not be
- * affected. Operation.response field will contain
- * ReplaceAccessLevelsResponse. Removing [Access Levels]
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting
+ * storage. If the replacement contains errors, an error response is returned
+ * for the first error encountered. Upon error, the replacement is cancelled,
+ * and existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] are not
+ * affected. The Operation.response field contains
+ * ReplaceAccessLevelsResponse. Removing [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] contained in existing
- * [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will result in
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] result in an
* error.
*
*/
@@ -1488,7 +1610,7 @@ public void replaceAccessLevels(
*
*
*
- * List all [Service Perimeters]
+ * Lists all [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
* access policy.
*
@@ -1506,9 +1628,9 @@ public void listServicePerimeters(
*
*
*
- * Get a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name.
+ * Gets a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name.
*
*/
public void getServicePerimeter(
@@ -1523,14 +1645,14 @@ public void getServicePerimeter(
*
*
*
- * Create a [Service Perimeter]
+ * Creates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has
- * propagated to long-lasting storage. [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public void createServicePerimeter(
@@ -1544,14 +1666,14 @@ public void createServicePerimeter(
*
*
*
- * Update a [Service Perimeter]
+ * Updates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * changes to the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * propagated to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public void updateServicePerimeter(
@@ -1565,12 +1687,12 @@ public void updateServicePerimeter(
*
*
*
- * Delete a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has been
- * removed from long-lasting storage.
+ * Deletes a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name. The long-running operation from this RPC has a successful
+ * status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed from
+ * long-lasting storage.
*
*/
public void deleteServicePerimeter(
@@ -1584,18 +1706,18 @@ public void deleteServicePerimeter(
*
*
*
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * with the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided.
- * This is done atomically. The longrunning operation from this
- * RPC will have a successful status once all replacements have propagated to
- * long-lasting storage. Replacements containing errors will result in an
- * error response for the first error encountered. Replacement will be
- * cancelled on error, existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with the
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting storage.
+ * Replacements containing errors result in an error response for the first
+ * error encountered. Upon an error, replacement are cancelled and existing
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] are not
+ * affected. The Operation.response field contains
* ReplaceServicePerimetersResponse.
*
*/
@@ -1610,21 +1732,21 @@ public void replaceServicePerimeters(
*
*
*
- * Commit the dry-run spec for all the [Service Perimeters]
+ * Commits the dry-run specification for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy][google.identity.accesscontextmanager.v1.AccessPolicy].
- * A commit operation on a Service Perimeter involves copying its `spec` field
- * to that Service Perimeter's `status` field. Only [Service Perimeters]
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * A commit operation on a service perimeter involves copying its `spec` field
+ * to the `status` field of the service perimeter. Only [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit
- * operation. The longrunning operation from this RPC will have a successful
- * status once the dry-run specs for all the [Service Perimeters]
+ * operation. The long-running operation from this RPC has a successful
+ * status after the dry-run specifications for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] have been
- * committed. If a commit fails, it will cause the longrunning operation to
- * return an error response and the entire commit operation will be cancelled.
- * When successful, Operation.response field will contain
- * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will
- * be cleared after a successful commit operation.
+ * committed. If a commit fails, it causes the long-running operation to
+ * return an error response and the entire commit operation is cancelled.
+ * When successful, the Operation.response field contains
+ * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are
+ * cleared after a successful commit operation.
*
*/
public void commitServicePerimeters(
@@ -1678,7 +1800,7 @@ public void getGcpUserAccessBinding(
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the
* client specifies a [name]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name],
- * the server will ignore it. Fails if a resource already exists with the same
+ * the server ignores it. Fails if a resource already exists with the same
* [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key].
* Completion of this long-running operation does not necessarily signify that
@@ -1729,6 +1851,60 @@ public void deleteGcpUserAccessBinding(
getDeleteGcpUserAccessBindingMethod(), responseObserver);
}
+ /**
+ *
+ *
+ *
+ * Sets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * This method replaces the existing IAM policy on the access policy. The IAM
+ * policy controls the set of users who can perform specific operations on the
+ * Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public void setIamPolicy(
+ com.google.iam.v1.SetIamPolicyRequest request,
+ io.grpc.stub.StreamObserver
+ * Gets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public void getIamPolicy(
+ com.google.iam.v1.GetIamPolicyRequest request,
+ io.grpc.stub.StreamObserver
+ * Returns the IAM permissions that the caller has on the specified Access
+ * Context Manager resource. The resource can be an
+ * [AccessPolicy][google.identity.accesscontextmanager.v1.AccessPolicy],
+ * [AccessLevel][google.identity.accesscontextmanager.v1.AccessLevel], or
+ * [ServicePerimeter][google.identity.accesscontextmanager.v1.ServicePerimeter
+ * ]. This method does not support other resources.
+ *
+ */
+ public void testIamPermissions(
+ com.google.iam.v1.TestIamPermissionsRequest request,
+ io.grpc.stub.StreamObserver
- * API for setting [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
- * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * for Google Cloud Projects. Each organization has one [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
- * [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
- * and [Service Perimeters]
+ * API for setting [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] and [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * for Google Cloud projects. Each organization has one [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] that contains the
+ * [access levels] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * and [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
* applicable to all resources in the organization.
* AccessPolicies
*
@@ -1919,9 +2114,9 @@ protected AccessContextManagerStub build(
*
*
*
- * List all [AccessPolicies]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] under a
- * container.
+ * Lists all [access policies]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] in an
+ * organization.
*
*/
public void listAccessPolicies(
@@ -1939,8 +2134,8 @@ public void listAccessPolicies(
*
*
*
- * Get an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by name.
+ * Returns an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the name.
*
*/
public void getAccessPolicy(
@@ -1957,10 +2152,10 @@ public void getAccessPolicy(
*
*
*
- * Create an `AccessPolicy`. Fails if this organization already has a
- * `AccessPolicy`. The longrunning Operation will have a successful status
- * once the `AccessPolicy` has propagated to long-lasting storage.
- * Syntactic and basic semantic errors will be returned in `metadata` as a
+ * Creates an access policy. This method fails if the organization already has
+ * an access policy. The long-running operation has a successful status
+ * after the access policy propagates to long-lasting storage.
+ * Syntactic and basic semantic errors are returned in `metadata` as a
* BadRequest proto.
*
*/
@@ -1977,13 +2172,12 @@ public void createAccessPolicy(
*
*
*
- * Update an [AccessPolicy]
+ * Updates an [access policy]
* [google.identity.accesscontextmanager.v1.AccessPolicy]. The
- * longrunning Operation from this RPC will have a successful status once the
- * changes to the [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] have propagated
- * to long-lasting storage. Syntactic and basic semantic errors will be
- * returned in `metadata` as a BadRequest proto.
+ * long-running operation from this RPC has a successful status after the
+ * changes to the [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] propagate
+ * to long-lasting storage.
*
*/
public void updateAccessPolicy(
@@ -1999,11 +2193,11 @@ public void updateAccessPolicy(
*
*
*
- * Delete an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by resource
- * name. The longrunning Operation will have a successful status once the
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * has been removed from long-lasting storage.
+ * Deletes an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the
+ * resource name. The long-running operation has a successful status after the
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
+ * is removed from long-lasting storage.
*
*/
public void deleteAccessPolicy(
@@ -2019,7 +2213,7 @@ public void deleteAccessPolicy(
*
*
*
- * List all [Access Levels]
+ * Lists all [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
@@ -2039,8 +2233,8 @@ public void listAccessLevels(
*
*
*
- * Get an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
+ * Gets an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
* name.
*
*/
@@ -2058,13 +2252,13 @@ public void getAccessLevel(
*
*
*
- * Create an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the [Access
- * Level] [google.identity.accesscontextmanager.v1.AccessLevel] has
- * propagated to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Creates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the [access
+ * level] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * propagates to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public void createAccessLevel(
@@ -2080,14 +2274,14 @@ public void createAccessLevel(
*
*
*
- * Update an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the changes to
- * the [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] have propagated
- * to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Updates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the changes to
+ * the [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] propagate
+ * to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public void updateAccessLevel(
@@ -2103,10 +2297,10 @@ public void updateAccessLevel(
*
*
*
- * Delete an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Access Level]
+ * Deletes an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
+ * name. The long-running operation from this RPC has a successful status
+ * after the [access level]
* [google.identity.accesscontextmanager.v1.AccessLevel] has been removed
* from long-lasting storage.
*
@@ -2124,22 +2318,22 @@ public void deleteAccessLevel(
*
*
*
- * Replace all existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] in an [Access
- * Policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
- * the [Access Levels]
+ * Replaces all existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
+ * the [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] provided. This
- * is done atomically. The longrunning operation from this RPC will have a
- * successful status once all replacements have propagated to long-lasting
- * storage. Replacements containing errors will result in an error response
- * for the first error encountered. Replacement will be cancelled on error,
- * existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] will not be
- * affected. Operation.response field will contain
- * ReplaceAccessLevelsResponse. Removing [Access Levels]
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting
+ * storage. If the replacement contains errors, an error response is returned
+ * for the first error encountered. Upon error, the replacement is cancelled,
+ * and existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] are not
+ * affected. The Operation.response field contains
+ * ReplaceAccessLevelsResponse. Removing [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] contained in existing
- * [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will result in
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] result in an
* error.
*
*/
@@ -2156,7 +2350,7 @@ public void replaceAccessLevels(
*
*
*
- * List all [Service Perimeters]
+ * Lists all [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
* access policy.
*
@@ -2176,9 +2370,9 @@ public void listServicePerimeters(
*
*
*
- * Get a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name.
+ * Gets a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name.
*
*/
public void getServicePerimeter(
@@ -2195,14 +2389,14 @@ public void getServicePerimeter(
*
*
*
- * Create a [Service Perimeter]
+ * Creates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has
- * propagated to long-lasting storage. [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public void createServicePerimeter(
@@ -2218,14 +2412,14 @@ public void createServicePerimeter(
*
*
*
- * Update a [Service Perimeter]
+ * Updates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * changes to the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * propagated to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public void updateServicePerimeter(
@@ -2241,12 +2435,12 @@ public void updateServicePerimeter(
*
*
*
- * Delete a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has been
- * removed from long-lasting storage.
+ * Deletes a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name. The long-running operation from this RPC has a successful
+ * status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed from
+ * long-lasting storage.
*
*/
public void deleteServicePerimeter(
@@ -2262,18 +2456,18 @@ public void deleteServicePerimeter(
*
*
*
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * with the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided.
- * This is done atomically. The longrunning operation from this
- * RPC will have a successful status once all replacements have propagated to
- * long-lasting storage. Replacements containing errors will result in an
- * error response for the first error encountered. Replacement will be
- * cancelled on error, existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with the
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting storage.
+ * Replacements containing errors result in an error response for the first
+ * error encountered. Upon an error, replacement are cancelled and existing
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] are not
+ * affected. The Operation.response field contains
* ReplaceServicePerimetersResponse.
*
*/
@@ -2290,21 +2484,21 @@ public void replaceServicePerimeters(
*
*
*
- * Commit the dry-run spec for all the [Service Perimeters]
+ * Commits the dry-run specification for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy][google.identity.accesscontextmanager.v1.AccessPolicy].
- * A commit operation on a Service Perimeter involves copying its `spec` field
- * to that Service Perimeter's `status` field. Only [Service Perimeters]
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * A commit operation on a service perimeter involves copying its `spec` field
+ * to the `status` field of the service perimeter. Only [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit
- * operation. The longrunning operation from this RPC will have a successful
- * status once the dry-run specs for all the [Service Perimeters]
+ * operation. The long-running operation from this RPC has a successful
+ * status after the dry-run specifications for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] have been
- * committed. If a commit fails, it will cause the longrunning operation to
- * return an error response and the entire commit operation will be cancelled.
- * When successful, Operation.response field will contain
- * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will
- * be cleared after a successful commit operation.
+ * committed. If a commit fails, it causes the long-running operation to
+ * return an error response and the entire commit operation is cancelled.
+ * When successful, the Operation.response field contains
+ * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are
+ * cleared after a successful commit operation.
*
*/
public void commitServicePerimeters(
@@ -2364,7 +2558,7 @@ public void getGcpUserAccessBinding(
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the
* client specifies a [name]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name],
- * the server will ignore it. Fails if a resource already exists with the same
+ * the server ignores it. Fails if a resource already exists with the same
* [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key].
* Completion of this long-running operation does not necessarily signify that
@@ -2420,21 +2614,81 @@ public void deleteGcpUserAccessBinding(
request,
responseObserver);
}
+
+ /**
+ *
+ *
+ *
+ * Sets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * This method replaces the existing IAM policy on the access policy. The IAM
+ * policy controls the set of users who can perform specific operations on the
+ * Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public void setIamPolicy(
+ com.google.iam.v1.SetIamPolicyRequest request,
+ io.grpc.stub.StreamObserver
+ * Gets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public void getIamPolicy(
+ com.google.iam.v1.GetIamPolicyRequest request,
+ io.grpc.stub.StreamObserver
+ * Returns the IAM permissions that the caller has on the specified Access
+ * Context Manager resource. The resource can be an
+ * [AccessPolicy][google.identity.accesscontextmanager.v1.AccessPolicy],
+ * [AccessLevel][google.identity.accesscontextmanager.v1.AccessLevel], or
+ * [ServicePerimeter][google.identity.accesscontextmanager.v1.ServicePerimeter
+ * ]. This method does not support other resources.
+ *
+ */
+ public void testIamPermissions(
+ com.google.iam.v1.TestIamPermissionsRequest request,
+ io.grpc.stub.StreamObserver
- * API for setting [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
- * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * for Google Cloud Projects. Each organization has one [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
- * [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
- * and [Service Perimeters]
+ * API for setting [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] and [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * for Google Cloud projects. Each organization has one [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] that contains the
+ * [access levels] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * and [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
* applicable to all resources in the organization.
* AccessPolicies
*
@@ -2456,9 +2710,9 @@ protected AccessContextManagerBlockingStub build(
*
*
*
- * List all [AccessPolicies]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] under a
- * container.
+ * Lists all [access policies]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] in an
+ * organization.
*
*/
public com.google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse
@@ -2472,8 +2726,8 @@ protected AccessContextManagerBlockingStub build(
*
*
*
- * Get an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by name.
+ * Returns an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the name.
*
*/
public com.google.identity.accesscontextmanager.v1.AccessPolicy getAccessPolicy(
@@ -2486,10 +2740,10 @@ public com.google.identity.accesscontextmanager.v1.AccessPolicy getAccessPolicy(
*
*
*
- * Create an `AccessPolicy`. Fails if this organization already has a
- * `AccessPolicy`. The longrunning Operation will have a successful status
- * once the `AccessPolicy` has propagated to long-lasting storage.
- * Syntactic and basic semantic errors will be returned in `metadata` as a
+ * Creates an access policy. This method fails if the organization already has
+ * an access policy. The long-running operation has a successful status
+ * after the access policy propagates to long-lasting storage.
+ * Syntactic and basic semantic errors are returned in `metadata` as a
* BadRequest proto.
*
*/
@@ -2503,13 +2757,12 @@ public com.google.longrunning.Operation createAccessPolicy(
*
*
*
- * Update an [AccessPolicy]
+ * Updates an [access policy]
* [google.identity.accesscontextmanager.v1.AccessPolicy]. The
- * longrunning Operation from this RPC will have a successful status once the
- * changes to the [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] have propagated
- * to long-lasting storage. Syntactic and basic semantic errors will be
- * returned in `metadata` as a BadRequest proto.
+ * long-running operation from this RPC has a successful status after the
+ * changes to the [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] propagate
+ * to long-lasting storage.
*
*/
public com.google.longrunning.Operation updateAccessPolicy(
@@ -2522,11 +2775,11 @@ public com.google.longrunning.Operation updateAccessPolicy(
*
*
*
- * Delete an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by resource
- * name. The longrunning Operation will have a successful status once the
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * has been removed from long-lasting storage.
+ * Deletes an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the
+ * resource name. The long-running operation has a successful status after the
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
+ * is removed from long-lasting storage.
*
*/
public com.google.longrunning.Operation deleteAccessPolicy(
@@ -2539,7 +2792,7 @@ public com.google.longrunning.Operation deleteAccessPolicy(
*
*
*
- * List all [Access Levels]
+ * Lists all [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
@@ -2554,8 +2807,8 @@ public com.google.identity.accesscontextmanager.v1.ListAccessLevelsResponse list
*
*
*
- * Get an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
+ * Gets an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
* name.
*
*/
@@ -2569,13 +2822,13 @@ public com.google.identity.accesscontextmanager.v1.AccessLevel getAccessLevel(
*
*
*
- * Create an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the [Access
- * Level] [google.identity.accesscontextmanager.v1.AccessLevel] has
- * propagated to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Creates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the [access
+ * level] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * propagates to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.longrunning.Operation createAccessLevel(
@@ -2588,14 +2841,14 @@ public com.google.longrunning.Operation createAccessLevel(
*
*
*
- * Update an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the changes to
- * the [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] have propagated
- * to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Updates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the changes to
+ * the [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] propagate
+ * to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.longrunning.Operation updateAccessLevel(
@@ -2608,10 +2861,10 @@ public com.google.longrunning.Operation updateAccessLevel(
*
*
*
- * Delete an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Access Level]
+ * Deletes an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
+ * name. The long-running operation from this RPC has a successful status
+ * after the [access level]
* [google.identity.accesscontextmanager.v1.AccessLevel] has been removed
* from long-lasting storage.
*
@@ -2626,22 +2879,22 @@ public com.google.longrunning.Operation deleteAccessLevel(
*
*
*
- * Replace all existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] in an [Access
- * Policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
- * the [Access Levels]
+ * Replaces all existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
+ * the [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] provided. This
- * is done atomically. The longrunning operation from this RPC will have a
- * successful status once all replacements have propagated to long-lasting
- * storage. Replacements containing errors will result in an error response
- * for the first error encountered. Replacement will be cancelled on error,
- * existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] will not be
- * affected. Operation.response field will contain
- * ReplaceAccessLevelsResponse. Removing [Access Levels]
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting
+ * storage. If the replacement contains errors, an error response is returned
+ * for the first error encountered. Upon error, the replacement is cancelled,
+ * and existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] are not
+ * affected. The Operation.response field contains
+ * ReplaceAccessLevelsResponse. Removing [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] contained in existing
- * [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will result in
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] result in an
* error.
*
*/
@@ -2655,7 +2908,7 @@ public com.google.longrunning.Operation replaceAccessLevels(
*
*
*
- * List all [Service Perimeters]
+ * Lists all [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
* access policy.
*
@@ -2671,9 +2924,9 @@ public com.google.longrunning.Operation replaceAccessLevels(
*
*
*
- * Get a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name.
+ * Gets a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name.
*
*/
public com.google.identity.accesscontextmanager.v1.ServicePerimeter getServicePerimeter(
@@ -2686,14 +2939,14 @@ public com.google.identity.accesscontextmanager.v1.ServicePerimeter getServicePe
*
*
*
- * Create a [Service Perimeter]
+ * Creates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has
- * propagated to long-lasting storage. [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.longrunning.Operation createServicePerimeter(
@@ -2706,14 +2959,14 @@ public com.google.longrunning.Operation createServicePerimeter(
*
*
*
- * Update a [Service Perimeter]
+ * Updates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * changes to the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * propagated to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.longrunning.Operation updateServicePerimeter(
@@ -2726,12 +2979,12 @@ public com.google.longrunning.Operation updateServicePerimeter(
*
*
*
- * Delete a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has been
- * removed from long-lasting storage.
+ * Deletes a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name. The long-running operation from this RPC has a successful
+ * status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed from
+ * long-lasting storage.
*
*/
public com.google.longrunning.Operation deleteServicePerimeter(
@@ -2744,18 +2997,18 @@ public com.google.longrunning.Operation deleteServicePerimeter(
*
*
*
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * with the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided.
- * This is done atomically. The longrunning operation from this
- * RPC will have a successful status once all replacements have propagated to
- * long-lasting storage. Replacements containing errors will result in an
- * error response for the first error encountered. Replacement will be
- * cancelled on error, existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with the
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting storage.
+ * Replacements containing errors result in an error response for the first
+ * error encountered. Upon an error, replacement are cancelled and existing
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] are not
+ * affected. The Operation.response field contains
* ReplaceServicePerimetersResponse.
*
*/
@@ -2769,21 +3022,21 @@ public com.google.longrunning.Operation replaceServicePerimeters(
*
*
*
- * Commit the dry-run spec for all the [Service Perimeters]
+ * Commits the dry-run specification for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy][google.identity.accesscontextmanager.v1.AccessPolicy].
- * A commit operation on a Service Perimeter involves copying its `spec` field
- * to that Service Perimeter's `status` field. Only [Service Perimeters]
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * A commit operation on a service perimeter involves copying its `spec` field
+ * to the `status` field of the service perimeter. Only [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit
- * operation. The longrunning operation from this RPC will have a successful
- * status once the dry-run specs for all the [Service Perimeters]
+ * operation. The long-running operation from this RPC has a successful
+ * status after the dry-run specifications for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] have been
- * committed. If a commit fails, it will cause the longrunning operation to
- * return an error response and the entire commit operation will be cancelled.
- * When successful, Operation.response field will contain
- * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will
- * be cleared after a successful commit operation.
+ * committed. If a commit fails, it causes the long-running operation to
+ * return an error response and the entire commit operation is cancelled.
+ * When successful, the Operation.response field contains
+ * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are
+ * cleared after a successful commit operation.
*
*/
public com.google.longrunning.Operation commitServicePerimeters(
@@ -2831,7 +3084,7 @@ public com.google.identity.accesscontextmanager.v1.GcpUserAccessBinding getGcpUs
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding]. If the
* client specifies a [name]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.name],
- * the server will ignore it. Fails if a resource already exists with the same
+ * the server ignores it. Fails if a resource already exists with the same
* [group_key]
* [google.identity.accesscontextmanager.v1.GcpUserAccessBinding.group_key].
* Completion of this long-running operation does not necessarily signify that
@@ -2878,21 +3131,69 @@ public com.google.longrunning.Operation deleteGcpUserAccessBinding(
return io.grpc.stub.ClientCalls.blockingUnaryCall(
getChannel(), getDeleteGcpUserAccessBindingMethod(), getCallOptions(), request);
}
+
+ /**
+ *
+ *
+ *
+ * Sets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * This method replaces the existing IAM policy on the access policy. The IAM
+ * policy controls the set of users who can perform specific operations on the
+ * Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public com.google.iam.v1.Policy setIamPolicy(com.google.iam.v1.SetIamPolicyRequest request) {
+ return io.grpc.stub.ClientCalls.blockingUnaryCall(
+ getChannel(), getSetIamPolicyMethod(), getCallOptions(), request);
+ }
+
+ /**
+ *
+ *
+ *
+ * Gets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public com.google.iam.v1.Policy getIamPolicy(com.google.iam.v1.GetIamPolicyRequest request) {
+ return io.grpc.stub.ClientCalls.blockingUnaryCall(
+ getChannel(), getGetIamPolicyMethod(), getCallOptions(), request);
+ }
+
+ /**
+ *
+ *
+ *
+ * Returns the IAM permissions that the caller has on the specified Access
+ * Context Manager resource. The resource can be an
+ * [AccessPolicy][google.identity.accesscontextmanager.v1.AccessPolicy],
+ * [AccessLevel][google.identity.accesscontextmanager.v1.AccessLevel], or
+ * [ServicePerimeter][google.identity.accesscontextmanager.v1.ServicePerimeter
+ * ]. This method does not support other resources.
+ *
+ */
+ public com.google.iam.v1.TestIamPermissionsResponse testIamPermissions(
+ com.google.iam.v1.TestIamPermissionsRequest request) {
+ return io.grpc.stub.ClientCalls.blockingUnaryCall(
+ getChannel(), getTestIamPermissionsMethod(), getCallOptions(), request);
+ }
}
/**
*
*
*
- * API for setting [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] and [Service
- * Perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
- * for Google Cloud Projects. Each organization has one [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] containing the
- * [Access Levels] [google.identity.accesscontextmanager.v1.AccessLevel]
- * and [Service Perimeters]
+ * API for setting [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] and [service
+ * perimeters] [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * for Google Cloud projects. Each organization has one [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] that contains the
+ * [access levels] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * and [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. This
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy] is
* applicable to all resources in the organization.
* AccessPolicies
*
@@ -2914,9 +3215,9 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * List all [AccessPolicies]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] under a
- * container.
+ * Lists all [access policies]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] in an
+ * organization.
*
*/
public com.google.common.util.concurrent.ListenableFuture<
@@ -2931,8 +3232,8 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Get an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by name.
+ * Returns an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the name.
*
*/
public com.google.common.util.concurrent.ListenableFuture<
@@ -2947,10 +3248,10 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Create an `AccessPolicy`. Fails if this organization already has a
- * `AccessPolicy`. The longrunning Operation will have a successful status
- * once the `AccessPolicy` has propagated to long-lasting storage.
- * Syntactic and basic semantic errors will be returned in `metadata` as a
+ * Creates an access policy. This method fails if the organization already has
+ * an access policy. The long-running operation has a successful status
+ * after the access policy propagates to long-lasting storage.
+ * Syntactic and basic semantic errors are returned in `metadata` as a
* BadRequest proto.
*
*/
@@ -2964,13 +3265,12 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Update an [AccessPolicy]
+ * Updates an [access policy]
* [google.identity.accesscontextmanager.v1.AccessPolicy]. The
- * longrunning Operation from this RPC will have a successful status once the
- * changes to the [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] have propagated
- * to long-lasting storage. Syntactic and basic semantic errors will be
- * returned in `metadata` as a BadRequest proto.
+ * long-running operation from this RPC has a successful status after the
+ * changes to the [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] propagate
+ * to long-lasting storage.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * Delete an [AccessPolicy]
- * [google.identity.accesscontextmanager.v1.AccessPolicy] by resource
- * name. The longrunning Operation will have a successful status once the
- * [AccessPolicy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * has been removed from long-lasting storage.
+ * Deletes an [access policy]
+ * [google.identity.accesscontextmanager.v1.AccessPolicy] based on the
+ * resource name. The long-running operation has a successful status after the
+ * [access policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
+ * is removed from long-lasting storage.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * List all [Access Levels]
+ * Lists all [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] for an access
* policy.
*
@@ -3019,8 +3319,8 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Get an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
+ * Gets an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
* name.
*
*/
@@ -3035,13 +3335,13 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Create an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the [Access
- * Level] [google.identity.accesscontextmanager.v1.AccessLevel] has
- * propagated to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Creates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the [access
+ * level] [google.identity.accesscontextmanager.v1.AccessLevel]
+ * propagates to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * Update an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel]. The longrunning
- * operation from this RPC will have a successful status once the changes to
- * the [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] have propagated
- * to long-lasting storage. [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] containing
- * errors will result in an error response for the first error encountered.
+ * Updates an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel]. The long-running
+ * operation from this RPC has a successful status after the changes to
+ * the [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] propagate
+ * to long-lasting storage. If [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] contain
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * Delete an [Access Level]
- * [google.identity.accesscontextmanager.v1.AccessLevel] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Access Level]
+ * Deletes an [access level]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] based on the resource
+ * name. The long-running operation from this RPC has a successful status
+ * after the [access level]
* [google.identity.accesscontextmanager.v1.AccessLevel] has been removed
* from long-lasting storage.
*
@@ -3095,22 +3395,22 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Replace all existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] in an [Access
- * Policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
- * the [Access Levels]
+ * Replaces all existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with
+ * the [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] provided. This
- * is done atomically. The longrunning operation from this RPC will have a
- * successful status once all replacements have propagated to long-lasting
- * storage. Replacements containing errors will result in an error response
- * for the first error encountered. Replacement will be cancelled on error,
- * existing [Access Levels]
- * [google.identity.accesscontextmanager.v1.AccessLevel] will not be
- * affected. Operation.response field will contain
- * ReplaceAccessLevelsResponse. Removing [Access Levels]
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting
+ * storage. If the replacement contains errors, an error response is returned
+ * for the first error encountered. Upon error, the replacement is cancelled,
+ * and existing [access levels]
+ * [google.identity.accesscontextmanager.v1.AccessLevel] are not
+ * affected. The Operation.response field contains
+ * ReplaceAccessLevelsResponse. Removing [access levels]
* [google.identity.accesscontextmanager.v1.AccessLevel] contained in existing
- * [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will result in
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] result in an
* error.
*
*/
@@ -3125,7 +3425,7 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * List all [Service Perimeters]
+ * Lists all [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] for an
* access policy.
*
@@ -3142,9 +3442,9 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Get a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name.
+ * Gets a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name.
*
*/
public com.google.common.util.concurrent.ListenableFuture<
@@ -3159,14 +3459,14 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Create a [Service Perimeter]
+ * Creates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has
- * propagated to long-lasting storage. [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * Update a [Service Perimeter]
+ * Updates a [service perimeter]
* [google.identity.accesscontextmanager.v1.ServicePerimeter]. The
- * longrunning operation from this RPC will have a successful status once the
- * changes to the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] have
- * propagated to long-lasting storage. [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] containing
- * errors will result in an error response for the first error encountered.
+ * long-running operation from this RPC has a successful status after the
+ * [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter]
+ * propagates to long-lasting storage. If a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] contains
+ * errors, an error response is returned for the first error encountered.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * Delete a [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] by resource
- * name. The longrunning operation from this RPC will have a successful status
- * once the [Service Perimeter]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] has been
- * removed from long-lasting storage.
+ * Deletes a [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] based on the
+ * resource name. The long-running operation from this RPC has a successful
+ * status after the [service perimeter]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] is removed from
+ * long-lasting storage.
*
*/
public com.google.common.util.concurrent.ListenableFuture
- * Replace all existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy] [google.identity.accesscontextmanager.v1.AccessPolicy]
- * with the [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided.
- * This is done atomically. The longrunning operation from this
- * RPC will have a successful status once all replacements have propagated to
- * long-lasting storage. Replacements containing errors will result in an
- * error response for the first error encountered. Replacement will be
- * cancelled on error, existing [Service Perimeters]
- * [google.identity.accesscontextmanager.v1.ServicePerimeter] will not be
- * affected. Operation.response field will contain
+ * Replace all existing [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] in an [access
+ * policy] [google.identity.accesscontextmanager.v1.AccessPolicy] with the
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] provided. This
+ * is done atomically. The long-running operation from this RPC has a
+ * successful status after all replacements propagate to long-lasting storage.
+ * Replacements containing errors result in an error response for the first
+ * error encountered. Upon an error, replacement are cancelled and existing
+ * [service perimeters]
+ * [google.identity.accesscontextmanager.v1.ServicePerimeter] are not
+ * affected. The Operation.response field contains
* ReplaceServicePerimetersResponse.
*
*/
@@ -3246,21 +3546,21 @@ protected AccessContextManagerFutureStub build(
*
*
*
- * Commit the dry-run spec for all the [Service Perimeters]
+ * Commits the dry-run specification for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] in an
- * [Access Policy][google.identity.accesscontextmanager.v1.AccessPolicy].
- * A commit operation on a Service Perimeter involves copying its `spec` field
- * to that Service Perimeter's `status` field. Only [Service Perimeters]
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * A commit operation on a service perimeter involves copying its `spec` field
+ * to the `status` field of the service perimeter. Only [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] with
* `use_explicit_dry_run_spec` field set to true are affected by a commit
- * operation. The longrunning operation from this RPC will have a successful
- * status once the dry-run specs for all the [Service Perimeters]
+ * operation. The long-running operation from this RPC has a successful
+ * status after the dry-run specifications for all the [service perimeters]
* [google.identity.accesscontextmanager.v1.ServicePerimeter] have been
- * committed. If a commit fails, it will cause the longrunning operation to
- * return an error response and the entire commit operation will be cancelled.
- * When successful, Operation.response field will contain
- * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will
- * be cleared after a successful commit operation.
+ * committed. If a commit fails, it causes the long-running operation to
+ * return an error response and the entire commit operation is cancelled.
+ * When successful, the Operation.response field contains
+ * CommitServicePerimetersResponse. The `dry_run` and the `spec` fields are
+ * cleared after a successful commit operation.
*
*/
public com.google.common.util.concurrent.ListenableFuture
+ * Sets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ * This method replaces the existing IAM policy on the access policy. The IAM
+ * policy controls the set of users who can perform specific operations on the
+ * Access Context Manager [access
+ * policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public com.google.common.util.concurrent.ListenableFuture
+ * Gets the IAM policy for the specified Access Context Manager
+ * [access policy][google.identity.accesscontextmanager.v1.AccessPolicy].
+ *
+ */
+ public com.google.common.util.concurrent.ListenableFuture
+ * Returns the IAM permissions that the caller has on the specified Access
+ * Context Manager resource. The resource can be an
+ * [AccessPolicy][google.identity.accesscontextmanager.v1.AccessPolicy],
+ * [AccessLevel][google.identity.accesscontextmanager.v1.AccessLevel], or
+ * [ServicePerimeter][google.identity.accesscontextmanager.v1.ServicePerimeter
+ * ]. This method does not support other resources.
+ *
+ */
+ public com.google.common.util.concurrent.ListenableFuture<
+ com.google.iam.v1.TestIamPermissionsResponse>
+ testIamPermissions(com.google.iam.v1.TestIamPermissionsRequest request) {
+ return io.grpc.stub.ClientCalls.futureUnaryCall(
+ getChannel().newCall(getTestIamPermissionsMethod(), getCallOptions()), request);
+ }
}
private static final int METHODID_LIST_ACCESS_POLICIES = 0;
@@ -3387,6 +3738,9 @@ protected AccessContextManagerFutureStub build(
private static final int METHODID_CREATE_GCP_USER_ACCESS_BINDING = 20;
private static final int METHODID_UPDATE_GCP_USER_ACCESS_BINDING = 21;
private static final int METHODID_DELETE_GCP_USER_ACCESS_BINDING = 22;
+ private static final int METHODID_SET_IAM_POLICY = 23;
+ private static final int METHODID_GET_IAM_POLICY = 24;
+ private static final int METHODID_TEST_IAM_PERMISSIONS = 25;
private static final class MethodHandlers
* The encryption state of the device.
*
*
* Protobuf enum {@code google.identity.accesscontextmanager.type.DeviceEncryptionStatus}
*/
-public enum DeviceEncryptionStatus
- implements com.google.protobuf.ProtocolMessageEnum {
+public enum DeviceEncryptionStatus implements com.google.protobuf.ProtocolMessageEnum {
/**
+ *
+ *
*
* The encryption status of the device is not specified or not known.
*
@@ -21,6 +39,8 @@ public enum DeviceEncryptionStatus
*/
ENCRYPTION_UNSPECIFIED(0),
/**
+ *
+ *
*
* The device does not support encryption.
*
@@ -29,6 +49,8 @@ public enum DeviceEncryptionStatus
*/
ENCRYPTION_UNSUPPORTED(1),
/**
+ *
+ *
*
* The device supports encryption, but is currently unencrypted.
*
@@ -37,6 +59,8 @@ public enum DeviceEncryptionStatus
*/
UNENCRYPTED(2),
/**
+ *
+ *
*
* The device is encrypted.
*
@@ -48,6 +72,8 @@ public enum DeviceEncryptionStatus
;
/**
+ *
+ *
*
* The encryption status of the device is not specified or not known.
*
@@ -56,6 +82,8 @@ public enum DeviceEncryptionStatus
*/
public static final int ENCRYPTION_UNSPECIFIED_VALUE = 0;
/**
+ *
+ *
*
* The device does not support encryption.
*
@@ -64,6 +92,8 @@ public enum DeviceEncryptionStatus
*/
public static final int ENCRYPTION_UNSUPPORTED_VALUE = 1;
/**
+ *
+ *
*
* The device supports encryption, but is currently unencrypted.
*
@@ -72,6 +102,8 @@ public enum DeviceEncryptionStatus
*/
public static final int UNENCRYPTED_VALUE = 2;
/**
+ *
+ *
*
* The device is encrypted.
*
@@ -80,7 +112,6 @@ public enum DeviceEncryptionStatus
*/
public static final int ENCRYPTED_VALUE = 3;
-
public final int getNumber() {
if (this == UNRECOGNIZED) {
throw new java.lang.IllegalArgumentException(
@@ -105,11 +136,16 @@ public static DeviceEncryptionStatus valueOf(int value) {
*/
public static DeviceEncryptionStatus forNumber(int value) {
switch (value) {
- case 0: return ENCRYPTION_UNSPECIFIED;
- case 1: return ENCRYPTION_UNSUPPORTED;
- case 2: return UNENCRYPTED;
- case 3: return ENCRYPTED;
- default: return null;
+ case 0:
+ return ENCRYPTION_UNSPECIFIED;
+ case 1:
+ return ENCRYPTION_UNSUPPORTED;
+ case 2:
+ return UNENCRYPTED;
+ case 3:
+ return ENCRYPTED;
+ default:
+ return null;
}
}
@@ -117,29 +153,31 @@ public static DeviceEncryptionStatus forNumber(int value) {
internalGetValueMap() {
return internalValueMap;
}
- private static final com.google.protobuf.Internal.EnumLiteMap<
- DeviceEncryptionStatus> internalValueMap =
- new com.google.protobuf.Internal.EnumLiteMap
* The degree to which the device is managed by the Cloud organization.
*
*
* Protobuf enum {@code google.identity.accesscontextmanager.type.DeviceManagementLevel}
*/
-public enum DeviceManagementLevel
- implements com.google.protobuf.ProtocolMessageEnum {
+public enum DeviceManagementLevel implements com.google.protobuf.ProtocolMessageEnum {
/**
+ *
+ *
*
* The device's management level is not specified or not known.
*
@@ -21,6 +39,8 @@ public enum DeviceManagementLevel
*/
MANAGEMENT_UNSPECIFIED(0),
/**
+ *
+ *
*
* The device is not managed.
*
@@ -29,6 +49,8 @@ public enum DeviceManagementLevel
*/
NONE(1),
/**
+ *
+ *
*
* Basic management is enabled, which is generally limited to monitoring and
* wiping the corporate account.
@@ -38,6 +60,8 @@ public enum DeviceManagementLevel
*/
BASIC(2),
/**
+ *
+ *
*
* Complete device management. This includes more thorough monitoring and the
* ability to directly manage the device (such as remote wiping). This can be
@@ -51,6 +75,8 @@ public enum DeviceManagementLevel
;
/**
+ *
+ *
*
* The device's management level is not specified or not known.
*
@@ -59,6 +85,8 @@ public enum DeviceManagementLevel
*/
public static final int MANAGEMENT_UNSPECIFIED_VALUE = 0;
/**
+ *
+ *
*
* The device is not managed.
*
@@ -67,6 +95,8 @@ public enum DeviceManagementLevel
*/
public static final int NONE_VALUE = 1;
/**
+ *
+ *
*
* Basic management is enabled, which is generally limited to monitoring and
* wiping the corporate account.
@@ -76,6 +106,8 @@ public enum DeviceManagementLevel
*/
public static final int BASIC_VALUE = 2;
/**
+ *
+ *
*
* Complete device management. This includes more thorough monitoring and the
* ability to directly manage the device (such as remote wiping). This can be
@@ -86,7 +118,6 @@ public enum DeviceManagementLevel
*/
public static final int COMPLETE_VALUE = 3;
-
public final int getNumber() {
if (this == UNRECOGNIZED) {
throw new java.lang.IllegalArgumentException(
@@ -111,11 +142,16 @@ public static DeviceManagementLevel valueOf(int value) {
*/
public static DeviceManagementLevel forNumber(int value) {
switch (value) {
- case 0: return MANAGEMENT_UNSPECIFIED;
- case 1: return NONE;
- case 2: return BASIC;
- case 3: return COMPLETE;
- default: return null;
+ case 0:
+ return MANAGEMENT_UNSPECIFIED;
+ case 1:
+ return NONE;
+ case 2:
+ return BASIC;
+ case 3:
+ return COMPLETE;
+ default:
+ return null;
}
}
@@ -123,29 +159,31 @@ public static DeviceManagementLevel forNumber(int value) {
internalGetValueMap() {
return internalValueMap;
}
- private static final com.google.protobuf.Internal.EnumLiteMap<
- DeviceManagementLevel> internalValueMap =
- new com.google.protobuf.Internal.EnumLiteMap
* The operating system type of the device.
* Next id: 7
@@ -11,9 +28,10 @@
*
* Protobuf enum {@code google.identity.accesscontextmanager.type.OsType}
*/
-public enum OsType
- implements com.google.protobuf.ProtocolMessageEnum {
+public enum OsType implements com.google.protobuf.ProtocolMessageEnum {
/**
+ *
+ *
*
* The operating system of the device is not specified or not known.
*
@@ -22,6 +40,8 @@ public enum OsType
*/
OS_UNSPECIFIED(0),
/**
+ *
+ *
*
* A desktop Mac operating system.
*
@@ -30,6 +50,8 @@ public enum OsType
*/
DESKTOP_MAC(1),
/**
+ *
+ *
*
* A desktop Windows operating system.
*
@@ -38,6 +60,8 @@ public enum OsType
*/
DESKTOP_WINDOWS(2),
/**
+ *
+ *
*
* A desktop Linux operating system.
*
@@ -46,6 +70,8 @@ public enum OsType
*/
DESKTOP_LINUX(3),
/**
+ *
+ *
*
* A desktop ChromeOS operating system.
*
@@ -54,6 +80,8 @@ public enum OsType
*/
DESKTOP_CHROME_OS(6),
/**
+ *
+ *
*
* An Android operating system.
*
@@ -62,6 +90,8 @@ public enum OsType
*/
ANDROID(4),
/**
+ *
+ *
*
* An iOS operating system.
*
@@ -73,6 +103,8 @@ public enum OsType
;
/**
+ *
+ *
*
* The operating system of the device is not specified or not known.
*
@@ -81,6 +113,8 @@ public enum OsType
*/
public static final int OS_UNSPECIFIED_VALUE = 0;
/**
+ *
+ *
*
* A desktop Mac operating system.
*
@@ -89,6 +123,8 @@ public enum OsType
*/
public static final int DESKTOP_MAC_VALUE = 1;
/**
+ *
+ *
*
* A desktop Windows operating system.
*
@@ -97,6 +133,8 @@ public enum OsType
*/
public static final int DESKTOP_WINDOWS_VALUE = 2;
/**
+ *
+ *
*
* A desktop Linux operating system.
*
@@ -105,6 +143,8 @@ public enum OsType
*/
public static final int DESKTOP_LINUX_VALUE = 3;
/**
+ *
+ *
*
* A desktop ChromeOS operating system.
*
@@ -113,6 +153,8 @@ public enum OsType
*/
public static final int DESKTOP_CHROME_OS_VALUE = 6;
/**
+ *
+ *
*
* An Android operating system.
*
@@ -121,6 +163,8 @@ public enum OsType
*/
public static final int ANDROID_VALUE = 4;
/**
+ *
+ *
*
* An iOS operating system.
*
@@ -129,7 +173,6 @@ public enum OsType
*/
public static final int IOS_VALUE = 5;
-
public final int getNumber() {
if (this == UNRECOGNIZED) {
throw new java.lang.IllegalArgumentException(
@@ -154,53 +197,59 @@ public static OsType valueOf(int value) {
*/
public static OsType forNumber(int value) {
switch (value) {
- case 0: return OS_UNSPECIFIED;
- case 1: return DESKTOP_MAC;
- case 2: return DESKTOP_WINDOWS;
- case 3: return DESKTOP_LINUX;
- case 6: return DESKTOP_CHROME_OS;
- case 4: return ANDROID;
- case 5: return IOS;
- default: return null;
+ case 0:
+ return OS_UNSPECIFIED;
+ case 1:
+ return DESKTOP_MAC;
+ case 2:
+ return DESKTOP_WINDOWS;
+ case 3:
+ return DESKTOP_LINUX;
+ case 6:
+ return DESKTOP_CHROME_OS;
+ case 4:
+ return ANDROID;
+ case 5:
+ return IOS;
+ default:
+ return null;
}
}
- public static com.google.protobuf.Internal.EnumLiteMap
+ * Metadata of Access Context Manager's Long Running Operations.
+ *
+ *
+ * Protobuf type {@code
+ * google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata}
+ */
+public final class AccessContextManagerOperationMetadata
+ extends com.google.protobuf.GeneratedMessageV3
+ implements
+ // @@protoc_insertion_point(message_implements:google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata)
+ AccessContextManagerOperationMetadataOrBuilder {
+ private static final long serialVersionUID = 0L;
+ // Use AccessContextManagerOperationMetadata.newBuilder() to construct.
+ private AccessContextManagerOperationMetadata(
+ com.google.protobuf.GeneratedMessageV3.Builder> builder) {
+ super(builder);
+ }
+
+ private AccessContextManagerOperationMetadata() {}
+
+ @java.lang.Override
+ @SuppressWarnings({"unused"})
+ protected java.lang.Object newInstance(UnusedPrivateParameter unused) {
+ return new AccessContextManagerOperationMetadata();
+ }
+
+ @java.lang.Override
+ public final com.google.protobuf.UnknownFieldSet getUnknownFields() {
+ return this.unknownFields;
+ }
+
+ public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
+ return com.google.identity.accesscontextmanager.v1.AccessContextManagerProto
+ .internal_static_google_identity_accesscontextmanager_v1_AccessContextManagerOperationMetadata_descriptor;
+ }
+
+ @java.lang.Override
+ protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
+ internalGetFieldAccessorTable() {
+ return com.google.identity.accesscontextmanager.v1.AccessContextManagerProto
+ .internal_static_google_identity_accesscontextmanager_v1_AccessContextManagerOperationMetadata_fieldAccessorTable
+ .ensureFieldAccessorsInitialized(
+ com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata.class,
+ com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ .Builder.class);
+ }
+
+ private byte memoizedIsInitialized = -1;
+
+ @java.lang.Override
+ public final boolean isInitialized() {
+ byte isInitialized = memoizedIsInitialized;
+ if (isInitialized == 1) return true;
+ if (isInitialized == 0) return false;
+
+ memoizedIsInitialized = 1;
+ return true;
+ }
+
+ @java.lang.Override
+ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
+ getUnknownFields().writeTo(output);
+ }
+
+ @java.lang.Override
+ public int getSerializedSize() {
+ int size = memoizedSize;
+ if (size != -1) return size;
+
+ size = 0;
+ size += getUnknownFields().getSerializedSize();
+ memoizedSize = size;
+ return size;
+ }
+
+ @java.lang.Override
+ public boolean equals(final java.lang.Object obj) {
+ if (obj == this) {
+ return true;
+ }
+ if (!(obj
+ instanceof
+ com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata)) {
+ return super.equals(obj);
+ }
+ com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata other =
+ (com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata) obj;
+
+ if (!getUnknownFields().equals(other.getUnknownFields())) return false;
+ return true;
+ }
+
+ @java.lang.Override
+ public int hashCode() {
+ if (memoizedHashCode != 0) {
+ return memoizedHashCode;
+ }
+ int hash = 41;
+ hash = (19 * hash) + getDescriptor().hashCode();
+ hash = (29 * hash) + getUnknownFields().hashCode();
+ memoizedHashCode = hash;
+ return hash;
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(java.nio.ByteBuffer data)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(
+ java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data, extensionRegistry);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(com.google.protobuf.ByteString data)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(
+ com.google.protobuf.ByteString data,
+ com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data, extensionRegistry);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(byte[] data) throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws com.google.protobuf.InvalidProtocolBufferException {
+ return PARSER.parseFrom(data, extensionRegistry);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(java.io.InputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(
+ java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
+ PARSER, input, extensionRegistry);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseDelimitedFrom(java.io.InputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseDelimitedFrom(
+ java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
+ PARSER, input, extensionRegistry);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(com.google.protobuf.CodedInputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
+ }
+
+ public static com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata
+ parseFrom(
+ com.google.protobuf.CodedInputStream input,
+ com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
+ PARSER, input, extensionRegistry);
+ }
+
+ @java.lang.Override
+ public Builder newBuilderForType() {
+ return newBuilder();
+ }
+
+ public static Builder newBuilder() {
+ return DEFAULT_INSTANCE.toBuilder();
+ }
+
+ public static Builder newBuilder(
+ com.google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata prototype) {
+ return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
+ }
+
+ @java.lang.Override
+ public Builder toBuilder() {
+ return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
+ }
+
+ @java.lang.Override
+ protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
+ Builder builder = new Builder(parent);
+ return builder;
+ }
+ /**
+ *
+ *
+ *
+ * Metadata of Access Context Manager's Long Running Operations.
+ *
+ *
+ * Protobuf type {@code
+ * google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata}
+ */
+ public static final class Builder extends com.google.protobuf.GeneratedMessageV3.Builder
* An `AccessLevel` is a label that can be applied to requests to Google Cloud
* services, along with a list of requirements necessary for the label to be
@@ -12,15 +29,16 @@
*
* Protobuf type {@code google.identity.accesscontextmanager.v1.AccessLevel}
*/
-public final class AccessLevel extends
- com.google.protobuf.GeneratedMessageV3 implements
+public final class AccessLevel extends com.google.protobuf.GeneratedMessageV3
+ implements
// @@protoc_insertion_point(message_implements:google.identity.accesscontextmanager.v1.AccessLevel)
AccessLevelOrBuilder {
-private static final long serialVersionUID = 0L;
+ private static final long serialVersionUID = 0L;
// Use AccessLevel.newBuilder() to construct.
private AccessLevel(com.google.protobuf.GeneratedMessageV3.Builder> builder) {
super(builder);
}
+
private AccessLevel() {
name_ = "";
title_ = "";
@@ -29,38 +47,42 @@ private AccessLevel() {
@java.lang.Override
@SuppressWarnings({"unused"})
- protected java.lang.Object newInstance(
- UnusedPrivateParameter unused) {
+ protected java.lang.Object newInstance(UnusedPrivateParameter unused) {
return new AccessLevel();
}
@java.lang.Override
- public final com.google.protobuf.UnknownFieldSet
- getUnknownFields() {
+ public final com.google.protobuf.UnknownFieldSet getUnknownFields() {
return this.unknownFields;
}
- public static final com.google.protobuf.Descriptors.Descriptor
- getDescriptor() {
- return com.google.identity.accesscontextmanager.v1.AccessLevelProto.internal_static_google_identity_accesscontextmanager_v1_AccessLevel_descriptor;
+
+ public static final com.google.protobuf.Descriptors.Descriptor getDescriptor() {
+ return com.google.identity.accesscontextmanager.v1.AccessLevelProto
+ .internal_static_google_identity_accesscontextmanager_v1_AccessLevel_descriptor;
}
@java.lang.Override
protected com.google.protobuf.GeneratedMessageV3.FieldAccessorTable
internalGetFieldAccessorTable() {
- return com.google.identity.accesscontextmanager.v1.AccessLevelProto.internal_static_google_identity_accesscontextmanager_v1_AccessLevel_fieldAccessorTable
+ return com.google.identity.accesscontextmanager.v1.AccessLevelProto
+ .internal_static_google_identity_accesscontextmanager_v1_AccessLevel_fieldAccessorTable
.ensureFieldAccessorsInitialized(
- com.google.identity.accesscontextmanager.v1.AccessLevel.class, com.google.identity.accesscontextmanager.v1.AccessLevel.Builder.class);
+ com.google.identity.accesscontextmanager.v1.AccessLevel.class,
+ com.google.identity.accesscontextmanager.v1.AccessLevel.Builder.class);
}
private int levelCase_ = 0;
private java.lang.Object level_;
+
public enum LevelCase
- implements com.google.protobuf.Internal.EnumLite,
+ implements
+ com.google.protobuf.Internal.EnumLite,
com.google.protobuf.AbstractMessage.InternalOneOfEnum {
BASIC(4),
CUSTOM(5),
LEVEL_NOT_SET(0);
private final int value;
+
private LevelCase(int value) {
this.value = value;
}
@@ -76,26 +98,31 @@ public static LevelCase valueOf(int value) {
public static LevelCase forNumber(int value) {
switch (value) {
- case 4: return BASIC;
- case 5: return CUSTOM;
- case 0: return LEVEL_NOT_SET;
- default: return null;
+ case 4:
+ return BASIC;
+ case 5:
+ return CUSTOM;
+ case 0:
+ return LEVEL_NOT_SET;
+ default:
+ return null;
}
}
+
public int getNumber() {
return this.value;
}
};
- public LevelCase
- getLevelCase() {
- return LevelCase.forNumber(
- levelCase_);
+ public LevelCase getLevelCase() {
+ return LevelCase.forNumber(levelCase_);
}
public static final int NAME_FIELD_NUMBER = 1;
private volatile java.lang.Object name_;
/**
+ *
+ *
*
* Required. Resource name for the Access Level. The `short_name` component
* must begin with a letter and only include alphanumeric and '_'. Format:
@@ -104,6 +131,7 @@ public int getNumber() {
*
*
* string name = 1;
+ *
* @return The name.
*/
@java.lang.Override
@@ -112,14 +140,15 @@ public java.lang.String getName() {
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
- com.google.protobuf.ByteString bs =
- (com.google.protobuf.ByteString) ref;
+ com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
name_ = s;
return s;
}
}
/**
+ *
+ *
*
* Required. Resource name for the Access Level. The `short_name` component
* must begin with a letter and only include alphanumeric and '_'. Format:
@@ -128,16 +157,15 @@ public java.lang.String getName() {
*
*
* string name = 1;
+ *
* @return The bytes for name.
*/
@java.lang.Override
- public com.google.protobuf.ByteString
- getNameBytes() {
+ public com.google.protobuf.ByteString getNameBytes() {
java.lang.Object ref = name_;
if (ref instanceof java.lang.String) {
- com.google.protobuf.ByteString b =
- com.google.protobuf.ByteString.copyFromUtf8(
- (java.lang.String) ref);
+ com.google.protobuf.ByteString b =
+ com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
name_ = b;
return b;
} else {
@@ -148,11 +176,14 @@ public java.lang.String getName() {
public static final int TITLE_FIELD_NUMBER = 2;
private volatile java.lang.Object title_;
/**
+ *
+ *
*
* Human readable title. Must be unique within the Policy.
*
*
* string title = 2;
+ *
* @return The title.
*/
@java.lang.Override
@@ -161,29 +192,29 @@ public java.lang.String getTitle() {
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
- com.google.protobuf.ByteString bs =
- (com.google.protobuf.ByteString) ref;
+ com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
title_ = s;
return s;
}
}
/**
+ *
+ *
*
* Human readable title. Must be unique within the Policy.
*
*
* string title = 2;
+ *
* @return The bytes for title.
*/
@java.lang.Override
- public com.google.protobuf.ByteString
- getTitleBytes() {
+ public com.google.protobuf.ByteString getTitleBytes() {
java.lang.Object ref = title_;
if (ref instanceof java.lang.String) {
- com.google.protobuf.ByteString b =
- com.google.protobuf.ByteString.copyFromUtf8(
- (java.lang.String) ref);
+ com.google.protobuf.ByteString b =
+ com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
title_ = b;
return b;
} else {
@@ -194,11 +225,14 @@ public java.lang.String getTitle() {
public static final int DESCRIPTION_FIELD_NUMBER = 3;
private volatile java.lang.Object description_;
/**
+ *
+ *
*
* Description of the `AccessLevel` and its use. Does not affect behavior.
*
*
* string description = 3;
+ *
* @return The description.
*/
@java.lang.Override
@@ -207,29 +241,29 @@ public java.lang.String getDescription() {
if (ref instanceof java.lang.String) {
return (java.lang.String) ref;
} else {
- com.google.protobuf.ByteString bs =
- (com.google.protobuf.ByteString) ref;
+ com.google.protobuf.ByteString bs = (com.google.protobuf.ByteString) ref;
java.lang.String s = bs.toStringUtf8();
description_ = s;
return s;
}
}
/**
+ *
+ *
*
* Description of the `AccessLevel` and its use. Does not affect behavior.
*
*
* string description = 3;
+ *
* @return The bytes for description.
*/
@java.lang.Override
- public com.google.protobuf.ByteString
- getDescriptionBytes() {
+ public com.google.protobuf.ByteString getDescriptionBytes() {
java.lang.Object ref = description_;
if (ref instanceof java.lang.String) {
- com.google.protobuf.ByteString b =
- com.google.protobuf.ByteString.copyFromUtf8(
- (java.lang.String) ref);
+ com.google.protobuf.ByteString b =
+ com.google.protobuf.ByteString.copyFromUtf8((java.lang.String) ref);
description_ = b;
return b;
} else {
@@ -239,11 +273,14 @@ public java.lang.String getDescription() {
public static final int BASIC_FIELD_NUMBER = 4;
/**
+ *
+ *
*
* A `BasicLevel` composed of `Conditions`.
*
*
* .google.identity.accesscontextmanager.v1.BasicLevel basic = 4;
+ *
* @return Whether the basic field is set.
*/
@java.lang.Override
@@ -251,21 +288,26 @@ public boolean hasBasic() {
return levelCase_ == 4;
}
/**
+ *
+ *
*
* A `BasicLevel` composed of `Conditions`.
*
*
* .google.identity.accesscontextmanager.v1.BasicLevel basic = 4;
+ *
* @return The basic.
*/
@java.lang.Override
public com.google.identity.accesscontextmanager.v1.BasicLevel getBasic() {
if (levelCase_ == 4) {
- return (com.google.identity.accesscontextmanager.v1.BasicLevel) level_;
+ return (com.google.identity.accesscontextmanager.v1.BasicLevel) level_;
}
return com.google.identity.accesscontextmanager.v1.BasicLevel.getDefaultInstance();
}
/**
+ *
+ *
*
* A `BasicLevel` composed of `Conditions`.
*
@@ -275,18 +317,21 @@ public com.google.identity.accesscontextmanager.v1.BasicLevel getBasic() {
@java.lang.Override
public com.google.identity.accesscontextmanager.v1.BasicLevelOrBuilder getBasicOrBuilder() {
if (levelCase_ == 4) {
- return (com.google.identity.accesscontextmanager.v1.BasicLevel) level_;
+ return (com.google.identity.accesscontextmanager.v1.BasicLevel) level_;
}
return com.google.identity.accesscontextmanager.v1.BasicLevel.getDefaultInstance();
}
public static final int CUSTOM_FIELD_NUMBER = 5;
/**
+ *
+ *
*
* A `CustomLevel` written in the Common Expression Language.
*
*
* .google.identity.accesscontextmanager.v1.CustomLevel custom = 5;
+ *
* @return Whether the custom field is set.
*/
@java.lang.Override
@@ -294,21 +339,26 @@ public boolean hasCustom() {
return levelCase_ == 5;
}
/**
+ *
+ *
*
* A `CustomLevel` written in the Common Expression Language.
*
*
* .google.identity.accesscontextmanager.v1.CustomLevel custom = 5;
+ *
* @return The custom.
*/
@java.lang.Override
public com.google.identity.accesscontextmanager.v1.CustomLevel getCustom() {
if (levelCase_ == 5) {
- return (com.google.identity.accesscontextmanager.v1.CustomLevel) level_;
+ return (com.google.identity.accesscontextmanager.v1.CustomLevel) level_;
}
return com.google.identity.accesscontextmanager.v1.CustomLevel.getDefaultInstance();
}
/**
+ *
+ *
*
* A `CustomLevel` written in the Common Expression Language.
*
@@ -318,7 +368,7 @@ public com.google.identity.accesscontextmanager.v1.CustomLevel getCustom() {
@java.lang.Override
public com.google.identity.accesscontextmanager.v1.CustomLevelOrBuilder getCustomOrBuilder() {
if (levelCase_ == 5) {
- return (com.google.identity.accesscontextmanager.v1.CustomLevel) level_;
+ return (com.google.identity.accesscontextmanager.v1.CustomLevel) level_;
}
return com.google.identity.accesscontextmanager.v1.CustomLevel.getDefaultInstance();
}
@@ -326,11 +376,14 @@ public com.google.identity.accesscontextmanager.v1.CustomLevelOrBuilder getCusto
public static final int CREATE_TIME_FIELD_NUMBER = 6;
private com.google.protobuf.Timestamp createTime_;
/**
+ *
+ *
*
* Output only. Time the `AccessLevel` was created in UTC.
*
*
* .google.protobuf.Timestamp create_time = 6;
+ *
* @return Whether the createTime field is set.
*/
@java.lang.Override
@@ -338,11 +391,14 @@ public boolean hasCreateTime() {
return createTime_ != null;
}
/**
+ *
+ *
*
* Output only. Time the `AccessLevel` was created in UTC.
*
*
* .google.protobuf.Timestamp create_time = 6;
+ *
* @return The createTime.
*/
@java.lang.Override
@@ -350,6 +406,8 @@ public com.google.protobuf.Timestamp getCreateTime() {
return createTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : createTime_;
}
/**
+ *
+ *
*
* Output only. Time the `AccessLevel` was created in UTC.
*
@@ -364,11 +422,14 @@ public com.google.protobuf.TimestampOrBuilder getCreateTimeOrBuilder() {
public static final int UPDATE_TIME_FIELD_NUMBER = 7;
private com.google.protobuf.Timestamp updateTime_;
/**
+ *
+ *
*
* Output only. Time the `AccessLevel` was updated in UTC.
*
*
* .google.protobuf.Timestamp update_time = 7;
+ *
* @return Whether the updateTime field is set.
*/
@java.lang.Override
@@ -376,11 +437,14 @@ public boolean hasUpdateTime() {
return updateTime_ != null;
}
/**
+ *
+ *
*
* Output only. Time the `AccessLevel` was updated in UTC.
*
*
* .google.protobuf.Timestamp update_time = 7;
+ *
* @return The updateTime.
*/
@java.lang.Override
@@ -388,6 +452,8 @@ public com.google.protobuf.Timestamp getUpdateTime() {
return updateTime_ == null ? com.google.protobuf.Timestamp.getDefaultInstance() : updateTime_;
}
/**
+ *
+ *
*
* Output only. Time the `AccessLevel` was updated in UTC.
*
@@ -400,6 +466,7 @@ public com.google.protobuf.TimestampOrBuilder getUpdateTimeOrBuilder() {
}
private byte memoizedIsInitialized = -1;
+
@java.lang.Override
public final boolean isInitialized() {
byte isInitialized = memoizedIsInitialized;
@@ -411,8 +478,7 @@ public final boolean isInitialized() {
}
@java.lang.Override
- public void writeTo(com.google.protobuf.CodedOutputStream output)
- throws java.io.IOException {
+ public void writeTo(com.google.protobuf.CodedOutputStream output) throws java.io.IOException {
if (!com.google.protobuf.GeneratedMessageV3.isStringEmpty(name_)) {
com.google.protobuf.GeneratedMessageV3.writeString(output, 1, name_);
}
@@ -453,20 +519,20 @@ public int getSerializedSize() {
size += com.google.protobuf.GeneratedMessageV3.computeStringSize(3, description_);
}
if (levelCase_ == 4) {
- size += com.google.protobuf.CodedOutputStream
- .computeMessageSize(4, (com.google.identity.accesscontextmanager.v1.BasicLevel) level_);
+ size +=
+ com.google.protobuf.CodedOutputStream.computeMessageSize(
+ 4, (com.google.identity.accesscontextmanager.v1.BasicLevel) level_);
}
if (levelCase_ == 5) {
- size += com.google.protobuf.CodedOutputStream
- .computeMessageSize(5, (com.google.identity.accesscontextmanager.v1.CustomLevel) level_);
+ size +=
+ com.google.protobuf.CodedOutputStream.computeMessageSize(
+ 5, (com.google.identity.accesscontextmanager.v1.CustomLevel) level_);
}
if (createTime_ != null) {
- size += com.google.protobuf.CodedOutputStream
- .computeMessageSize(6, getCreateTime());
+ size += com.google.protobuf.CodedOutputStream.computeMessageSize(6, getCreateTime());
}
if (updateTime_ != null) {
- size += com.google.protobuf.CodedOutputStream
- .computeMessageSize(7, getUpdateTime());
+ size += com.google.protobuf.CodedOutputStream.computeMessageSize(7, getUpdateTime());
}
size += getUnknownFields().getSerializedSize();
memoizedSize = size;
@@ -476,38 +542,32 @@ public int getSerializedSize() {
@java.lang.Override
public boolean equals(final java.lang.Object obj) {
if (obj == this) {
- return true;
+ return true;
}
if (!(obj instanceof com.google.identity.accesscontextmanager.v1.AccessLevel)) {
return super.equals(obj);
}
- com.google.identity.accesscontextmanager.v1.AccessLevel other = (com.google.identity.accesscontextmanager.v1.AccessLevel) obj;
+ com.google.identity.accesscontextmanager.v1.AccessLevel other =
+ (com.google.identity.accesscontextmanager.v1.AccessLevel) obj;
- if (!getName()
- .equals(other.getName())) return false;
- if (!getTitle()
- .equals(other.getTitle())) return false;
- if (!getDescription()
- .equals(other.getDescription())) return false;
+ if (!getName().equals(other.getName())) return false;
+ if (!getTitle().equals(other.getTitle())) return false;
+ if (!getDescription().equals(other.getDescription())) return false;
if (hasCreateTime() != other.hasCreateTime()) return false;
if (hasCreateTime()) {
- if (!getCreateTime()
- .equals(other.getCreateTime())) return false;
+ if (!getCreateTime().equals(other.getCreateTime())) return false;
}
if (hasUpdateTime() != other.hasUpdateTime()) return false;
if (hasUpdateTime()) {
- if (!getUpdateTime()
- .equals(other.getUpdateTime())) return false;
+ if (!getUpdateTime().equals(other.getUpdateTime())) return false;
}
if (!getLevelCase().equals(other.getLevelCase())) return false;
switch (levelCase_) {
case 4:
- if (!getBasic()
- .equals(other.getBasic())) return false;
+ if (!getBasic().equals(other.getBasic())) return false;
break;
case 5:
- if (!getCustom()
- .equals(other.getCustom())) return false;
+ if (!getCustom().equals(other.getCustom())) return false;
break;
case 0:
default:
@@ -555,96 +615,104 @@ public int hashCode() {
}
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
- java.nio.ByteBuffer data)
- throws com.google.protobuf.InvalidProtocolBufferException {
+ java.nio.ByteBuffer data) throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
- java.nio.ByteBuffer data,
- com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ java.nio.ByteBuffer data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
com.google.protobuf.ByteString data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
com.google.protobuf.ByteString data,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(byte[] data)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
- byte[] data,
- com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ byte[] data, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws com.google.protobuf.InvalidProtocolBufferException {
return PARSER.parseFrom(data, extensionRegistry);
}
- public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(java.io.InputStream input)
- throws java.io.IOException {
- return com.google.protobuf.GeneratedMessageV3
- .parseWithIOException(PARSER, input);
+
+ public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
+ java.io.InputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
- java.io.InputStream input,
- com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
- return com.google.protobuf.GeneratedMessageV3
- .parseWithIOException(PARSER, input, extensionRegistry);
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
+ PARSER, input, extensionRegistry);
}
- public static com.google.identity.accesscontextmanager.v1.AccessLevel parseDelimitedFrom(java.io.InputStream input)
- throws java.io.IOException {
- return com.google.protobuf.GeneratedMessageV3
- .parseDelimitedWithIOException(PARSER, input);
+
+ public static com.google.identity.accesscontextmanager.v1.AccessLevel parseDelimitedFrom(
+ java.io.InputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(PARSER, input);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseDelimitedFrom(
- java.io.InputStream input,
- com.google.protobuf.ExtensionRegistryLite extensionRegistry)
+ java.io.InputStream input, com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
- return com.google.protobuf.GeneratedMessageV3
- .parseDelimitedWithIOException(PARSER, input, extensionRegistry);
+ return com.google.protobuf.GeneratedMessageV3.parseDelimitedWithIOException(
+ PARSER, input, extensionRegistry);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
- com.google.protobuf.CodedInputStream input)
- throws java.io.IOException {
- return com.google.protobuf.GeneratedMessageV3
- .parseWithIOException(PARSER, input);
+ com.google.protobuf.CodedInputStream input) throws java.io.IOException {
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(PARSER, input);
}
+
public static com.google.identity.accesscontextmanager.v1.AccessLevel parseFrom(
com.google.protobuf.CodedInputStream input,
com.google.protobuf.ExtensionRegistryLite extensionRegistry)
throws java.io.IOException {
- return com.google.protobuf.GeneratedMessageV3
- .parseWithIOException(PARSER, input, extensionRegistry);
+ return com.google.protobuf.GeneratedMessageV3.parseWithIOException(
+ PARSER, input, extensionRegistry);
}
@java.lang.Override
- public Builder newBuilderForType() { return newBuilder(); }
+ public Builder newBuilderForType() {
+ return newBuilder();
+ }
+
public static Builder newBuilder() {
return DEFAULT_INSTANCE.toBuilder();
}
- public static Builder newBuilder(com.google.identity.accesscontextmanager.v1.AccessLevel prototype) {
+
+ public static Builder newBuilder(
+ com.google.identity.accesscontextmanager.v1.AccessLevel prototype) {
return DEFAULT_INSTANCE.toBuilder().mergeFrom(prototype);
}
+
@java.lang.Override
public Builder toBuilder() {
- return this == DEFAULT_INSTANCE
- ? new Builder() : new Builder().mergeFrom(this);
+ return this == DEFAULT_INSTANCE ? new Builder() : new Builder().mergeFrom(this);
}
@java.lang.Override
- protected Builder newBuilderForType(
- com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
+ protected Builder newBuilderForType(com.google.protobuf.GeneratedMessageV3.BuilderParent parent) {
Builder builder = new Builder(parent);
return builder;
}
/**
+ *
+ *
*
* An `AccessLevel` is a label that can be applied to requests to Google Cloud
* services, along with a list of requirements necessary for the label to be
@@ -653,33 +721,32 @@ protected Builder newBuilderForType(
*
* Protobuf type {@code google.identity.accesscontextmanager.v1.AccessLevel}
*/
- public static final class Builder extends
- com.google.protobuf.GeneratedMessageV3.Builder