Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit d076b1b

Browse files
committedSep 18, 2023
feat(cloudasset): update the api
#### cloudasset:v1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1Condition.properties.vpcNetworkSources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sourceRestriction.type (Total Keys: 1) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcNetworkSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcSubNetwork (Total Keys: 5) #### cloudasset:v1beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1Condition.properties.vpcNetworkSources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sourceRestriction.type (Total Keys: 1) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcNetworkSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcSubNetwork (Total Keys: 5) #### cloudasset:v1p1beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1Condition.properties.vpcNetworkSources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sourceRestriction.type (Total Keys: 1) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcNetworkSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcSubNetwork (Total Keys: 5) #### cloudasset:v1p5beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1Condition.properties.vpcNetworkSources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sourceRestriction.type (Total Keys: 1) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcNetworkSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcSubNetwork (Total Keys: 5) #### cloudasset:v1p7beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1Condition.properties.vpcNetworkSources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sourceRestriction.type (Total Keys: 1) - schemas.GoogleIdentityAccesscontextmanagerV1EgressFrom.properties.sources (Total Keys: 2) - schemas.GoogleIdentityAccesscontextmanagerV1EgressSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcNetworkSource (Total Keys: 3) - schemas.GoogleIdentityAccesscontextmanagerV1VpcSubNetwork (Total Keys: 5)
1 parent 5310a18 commit d076b1b

10 files changed

+477
-5
lines changed
 

‎docs/dyn/cloudasset_v1.assets.html

+22
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,16 @@ <h3>Method Details</h3>
156156
&quot;requiredAccessLevels&quot;: [ # A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: &quot;`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME&quot;`
157157
&quot;A String&quot;,
158158
],
159+
&quot;vpcNetworkSources&quot;: [ # The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
160+
{ # The originating network source in Google Cloud.
161+
&quot;vpcSubnetwork&quot;: { # Sub-segment ranges inside of a VPC Network. # Sub-segment ranges of a VPC network.
162+
&quot;network&quot;: &quot;A String&quot;, # Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
163+
&quot;vpcIpSubnetworks&quot;: [ # CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, &quot;192.0.2.0/24&quot; is accepted but &quot;192.0.2.1/24&quot; is not. If empty, all IP addresses are allowed.
164+
&quot;A String&quot;,
165+
],
166+
},
167+
},
168+
],
159169
},
160170
],
161171
},
@@ -455,6 +465,12 @@ <h3>Method Details</h3>
455465
&quot;A String&quot;,
456466
],
457467
&quot;identityType&quot;: &quot;A String&quot;, # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
468+
&quot;sourceRestriction&quot;: &quot;A String&quot;, # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
469+
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
470+
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
471+
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
472+
},
473+
],
458474
},
459475
&quot;egressTo&quot;: { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
460476
&quot;externalResources&quot;: [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently &#x27;*&#x27; is not allowed.
@@ -533,6 +549,12 @@ <h3>Method Details</h3>
533549
&quot;A String&quot;,
534550
],
535551
&quot;identityType&quot;: &quot;A String&quot;, # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
552+
&quot;sourceRestriction&quot;: &quot;A String&quot;, # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
553+
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
554+
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
555+
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
556+
},
557+
],
536558
},
537559
&quot;egressTo&quot;: { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
538560
&quot;externalResources&quot;: [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently &#x27;*&#x27; is not allowed.

0 commit comments

Comments
 (0)
Please sign in to comment.