Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 980533d

Browse files
committedMar 18, 2025
feat(accesscontextmanager): update the api
#### accesscontextmanager:v1 The following keys were added: - schemas.EgressTo.properties.roles (Total Keys: 2) - schemas.IngressTo.properties.roles (Total Keys: 2)
1 parent b6ac0b8 commit 980533d

File tree

2 files changed

+75
-1
lines changed

2 files changed

+75
-1
lines changed
 

‎docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html

+60
Original file line numberDiff line numberDiff line change
@@ -203,6 +203,9 @@ <h3>Method Details</h3>
203203
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
204204
&quot;A String&quot;,
205205
],
206+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
207+
&quot;A String&quot;,
208+
],
206209
},
207210
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
208211
},
@@ -236,6 +239,9 @@ <h3>Method Details</h3>
236239
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
237240
&quot;A String&quot;,
238241
],
242+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
243+
&quot;A String&quot;,
244+
],
239245
},
240246
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
241247
},
@@ -290,6 +296,9 @@ <h3>Method Details</h3>
290296
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
291297
&quot;A String&quot;,
292298
],
299+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
300+
&quot;A String&quot;,
301+
],
293302
},
294303
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
295304
},
@@ -323,6 +332,9 @@ <h3>Method Details</h3>
323332
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
324333
&quot;A String&quot;,
325334
],
335+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
336+
&quot;A String&quot;,
337+
],
326338
},
327339
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
328340
},
@@ -464,6 +476,9 @@ <h3>Method Details</h3>
464476
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
465477
&quot;A String&quot;,
466478
],
479+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
480+
&quot;A String&quot;,
481+
],
467482
},
468483
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
469484
},
@@ -497,6 +512,9 @@ <h3>Method Details</h3>
497512
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
498513
&quot;A String&quot;,
499514
],
515+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
516+
&quot;A String&quot;,
517+
],
500518
},
501519
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
502520
},
@@ -551,6 +569,9 @@ <h3>Method Details</h3>
551569
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
552570
&quot;A String&quot;,
553571
],
572+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
573+
&quot;A String&quot;,
574+
],
554575
},
555576
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
556577
},
@@ -584,6 +605,9 @@ <h3>Method Details</h3>
584605
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
585606
&quot;A String&quot;,
586607
],
608+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
609+
&quot;A String&quot;,
610+
],
587611
},
588612
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
589613
},
@@ -667,6 +691,9 @@ <h3>Method Details</h3>
667691
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
668692
&quot;A String&quot;,
669693
],
694+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
695+
&quot;A String&quot;,
696+
],
670697
},
671698
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
672699
},
@@ -700,6 +727,9 @@ <h3>Method Details</h3>
700727
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
701728
&quot;A String&quot;,
702729
],
730+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
731+
&quot;A String&quot;,
732+
],
703733
},
704734
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
705735
},
@@ -754,6 +784,9 @@ <h3>Method Details</h3>
754784
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
755785
&quot;A String&quot;,
756786
],
787+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
788+
&quot;A String&quot;,
789+
],
757790
},
758791
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
759792
},
@@ -787,6 +820,9 @@ <h3>Method Details</h3>
787820
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
788821
&quot;A String&quot;,
789822
],
823+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
824+
&quot;A String&quot;,
825+
],
790826
},
791827
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
792828
},
@@ -876,6 +912,9 @@ <h3>Method Details</h3>
876912
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
877913
&quot;A String&quot;,
878914
],
915+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
916+
&quot;A String&quot;,
917+
],
879918
},
880919
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
881920
},
@@ -909,6 +948,9 @@ <h3>Method Details</h3>
909948
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
910949
&quot;A String&quot;,
911950
],
951+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
952+
&quot;A String&quot;,
953+
],
912954
},
913955
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
914956
},
@@ -963,6 +1005,9 @@ <h3>Method Details</h3>
9631005
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
9641006
&quot;A String&quot;,
9651007
],
1008+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
1009+
&quot;A String&quot;,
1010+
],
9661011
},
9671012
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
9681013
},
@@ -996,6 +1041,9 @@ <h3>Method Details</h3>
9961041
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
9971042
&quot;A String&quot;,
9981043
],
1044+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
1045+
&quot;A String&quot;,
1046+
],
9991047
},
10001048
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
10011049
},
@@ -1101,6 +1149,9 @@ <h3>Method Details</h3>
11011149
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
11021150
&quot;A String&quot;,
11031151
],
1152+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
1153+
&quot;A String&quot;,
1154+
],
11041155
},
11051156
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
11061157
},
@@ -1134,6 +1185,9 @@ <h3>Method Details</h3>
11341185
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
11351186
&quot;A String&quot;,
11361187
],
1188+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
1189+
&quot;A String&quot;,
1190+
],
11371191
},
11381192
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
11391193
},
@@ -1188,6 +1242,9 @@ <h3>Method Details</h3>
11881242
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, that are allowed to be accessed by sources defined in the corresponding EgressFrom. A request matches if it contains a resource in this list. If `*` is specified for `resources`, then this EgressTo rule will authorize access to all resources outside the perimeter.
11891243
&quot;A String&quot;,
11901244
],
1245+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.
1246+
&quot;A String&quot;,
1247+
],
11911248
},
11921249
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
11931250
},
@@ -1221,6 +1278,9 @@ <h3>Method Details</h3>
12211278
&quot;resources&quot;: [ # A list of resources, currently only projects in the form `projects/`, protected by this ServicePerimeter that are allowed to be accessed by sources defined in the corresponding IngressFrom. If a single `*` is specified, then access to all resources inside the perimeter are allowed.
12221279
&quot;A String&quot;,
12231280
],
1281+
&quot;roles&quot;: [ # IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.
1282+
&quot;A String&quot;,
1283+
],
12241284
},
12251285
&quot;title&quot;: &quot;A String&quot;, # Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.
12261286
},

‎googleapiclient/discovery_cache/documents/accesscontextmanager.v1.json

+15-1
Original file line numberDiff line numberDiff line change
@@ -1295,7 +1295,7 @@
12951295
}
12961296
}
12971297
},
1298-
"revision": "20250212",
1298+
"revision": "20250312",
12991299
"rootUrl": "https://accesscontextmanager.googleapis.com/",
13001300
"schemas": {
13011301
"AccessContextManagerOperationMetadata": {
@@ -1854,6 +1854,13 @@
18541854
"type": "string"
18551855
},
18561856
"type": "array"
1857+
},
1858+
"roles": {
1859+
"description": "IAM roles that represent the set of operations that the sources specified in the corresponding EgressFrom. are allowed to perform in this ServicePerimeter.",
1860+
"items": {
1861+
"type": "string"
1862+
},
1863+
"type": "array"
18571864
}
18581865
},
18591866
"type": "object"
@@ -2051,6 +2058,13 @@
20512058
"type": "string"
20522059
},
20532060
"type": "array"
2061+
},
2062+
"roles": {
2063+
"description": "IAM roles that represent the set of operations that the sources specified in the corresponding IngressFrom are allowed to perform in this ServicePerimeter.",
2064+
"items": {
2065+
"type": "string"
2066+
},
2067+
"type": "array"
20542068
}
20552069
},
20562070
"type": "object"

0 commit comments

Comments
 (0)
Please sign in to comment.