Skip to content

Commit

Permalink
feat(all): auto-regenerate discovery clients (#2159)
Browse files Browse the repository at this point in the history
  • Loading branch information
yoshi-automation committed Sep 13, 2023
1 parent c2fa93e commit 2b846e5
Show file tree
Hide file tree
Showing 43 changed files with 8,890 additions and 269 deletions.
70 changes: 69 additions & 1 deletion accesscontextmanager/v1/accesscontextmanager-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -1235,7 +1235,7 @@
}
}
},
"revision": "20230903",
"revision": "20230910",
"rootUrl": "https://accesscontextmanager.googleapis.com/",
"schemas": {
"AccessContextManagerOperationMetadata": {
Expand Down Expand Up @@ -1543,6 +1543,13 @@
"type": "string"
},
"type": "array"
},
"vpcNetworkSources": {
"description": "The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.",
"items": {
"$ref": "VpcNetworkSource"
},
"type": "array"
}
},
"type": "object"
Expand Down Expand Up @@ -1648,6 +1655,27 @@
"Authorize access from all service accounts outside the perimeter."
],
"type": "string"
},
"sourceRestriction": {
"description": "Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.",
"enum": [
"SOURCE_RESTRICTION_UNSPECIFIED",
"SOURCE_RESTRICTION_ENABLED",
"SOURCE_RESTRICTION_DISABLED"
],
"enumDescriptions": [
"Enforcement preference unspecified, will not enforce traffic restrictions based on `sources` in EgressFrom.",
"Enforcement preference enabled, traffic restrictions will be enforced based on `sources` in EgressFrom.",
"Enforcement preference disabled, will not enforce traffic restrictions based on `sources` in EgressFrom."
],
"type": "string"
},
"sources": {
"description": "Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.",
"items": {
"$ref": "EgressSource"
},
"type": "array"
}
},
"type": "object"
Expand All @@ -1667,6 +1695,17 @@
},
"type": "object"
},
"EgressSource": {
"description": "The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.",
"id": "EgressSource",
"properties": {
"accessLevel": {
"description": "An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.",
"type": "string"
}
},
"type": "object"
},
"EgressTo": {
"description": "Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter.",
"id": "EgressTo",
Expand Down Expand Up @@ -2337,6 +2376,35 @@
}
},
"type": "object"
},
"VpcNetworkSource": {
"description": "The originating network source in Google Cloud.",
"id": "VpcNetworkSource",
"properties": {
"vpcSubnetwork": {
"$ref": "VpcSubNetwork",
"description": "Sub-segment ranges of a VPC network."
}
},
"type": "object"
},
"VpcSubNetwork": {
"description": "Sub-segment ranges inside of a VPC Network.",
"id": "VpcSubNetwork",
"properties": {
"network": {
"description": "Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`",
"type": "string"
},
"vpcIpSubnetworks": {
"description": "CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, \"192.0.2.0/24\" is accepted but \"192.0.2.1/24\" is not. If empty, all IP addresses are allowed.",
"items": {
"type": "string"
},
"type": "array"
}
},
"type": "object"
}
},
"servicePath": "",
Expand Down
136 changes: 136 additions & 0 deletions accesscontextmanager/v1/accesscontextmanager-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions admob/v1beta/admob-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -758,7 +758,7 @@
}
}
},
"revision": "20230907",
"revision": "20230912",
"rootUrl": "https://admob.googleapis.com/",
"schemas": {
"AdSource": {
Expand Down Expand Up @@ -1412,7 +1412,7 @@
"type": "object"
},
"MediationAbExperiment": {
"description": "The mediation A/B experiment. NEXT ID: 12",
"description": "The mediation A/B experiment.",
"id": "MediationAbExperiment",
"properties": {
"controlMediationLines": {
Expand Down
2 changes: 1 addition & 1 deletion admob/v1beta/admob-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 2b846e5

Please sign in to comment.