Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit f0aa8a3

Browse files
committedJun 20, 2023
feat(cloudasset): update the api
#### cloudasset:v1 The following keys were deleted: - resources.v1.methods.analyzeIamPolicy.parameters.analysisQuery.options.includeDenyPolicyAnalysis (Total Keys: 2) - schemas.DeniedAccess (Total Keys: 5) - schemas.GoogleCloudAssetV1DeniedAccessAccess (Total Keys: 9) - schemas.GoogleCloudAssetV1DeniedAccessDenyDetail (Total Keys: 10) - schemas.GoogleCloudAssetV1DeniedAccessIdentity (Total Keys: 3) - schemas.GoogleCloudAssetV1DeniedAccessResource (Total Keys: 3) - schemas.GoogleIamV2DenyRule (Total Keys: 11) - schemas.IamPolicyAnalysis.properties.deniedAccesses (Total Keys: 2) - schemas.Options.properties.includeDenyPolicyAnalysis.type (Total Keys: 1)
1 parent 591d99d commit f0aa8a3

7 files changed

+16
-305
lines changed
 

‎docs/dyn/cloudasset_v1.savedQueries.html

-6
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,6 @@ <h3>Method Details</h3>
132132
&quot;expandGroups&quot;: True or False, # Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.
133133
&quot;expandResources&quot;: True or False, # Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.
134134
&quot;expandRoles&quot;: True or False, # Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.
135-
&quot;includeDenyPolicyAnalysis&quot;: True or False, # Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.
136135
&quot;outputGroupEdges&quot;: True or False, # Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
137136
&quot;outputResourceEdges&quot;: True or False, # Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
138137
},
@@ -184,7 +183,6 @@ <h3>Method Details</h3>
184183
&quot;expandGroups&quot;: True or False, # Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.
185184
&quot;expandResources&quot;: True or False, # Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.
186185
&quot;expandRoles&quot;: True or False, # Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.
187-
&quot;includeDenyPolicyAnalysis&quot;: True or False, # Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.
188186
&quot;outputGroupEdges&quot;: True or False, # Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
189187
&quot;outputResourceEdges&quot;: True or False, # Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
190188
},
@@ -260,7 +258,6 @@ <h3>Method Details</h3>
260258
&quot;expandGroups&quot;: True or False, # Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.
261259
&quot;expandResources&quot;: True or False, # Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.
262260
&quot;expandRoles&quot;: True or False, # Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.
263-
&quot;includeDenyPolicyAnalysis&quot;: True or False, # Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.
264261
&quot;outputGroupEdges&quot;: True or False, # Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
265262
&quot;outputResourceEdges&quot;: True or False, # Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
266263
},
@@ -324,7 +321,6 @@ <h3>Method Details</h3>
324321
&quot;expandGroups&quot;: True or False, # Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.
325322
&quot;expandResources&quot;: True or False, # Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.
326323
&quot;expandRoles&quot;: True or False, # Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.
327-
&quot;includeDenyPolicyAnalysis&quot;: True or False, # Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.
328324
&quot;outputGroupEdges&quot;: True or False, # Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
329325
&quot;outputResourceEdges&quot;: True or False, # Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
330326
},
@@ -393,7 +389,6 @@ <h3>Method Details</h3>
393389
&quot;expandGroups&quot;: True or False, # Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.
394390
&quot;expandResources&quot;: True or False, # Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.
395391
&quot;expandRoles&quot;: True or False, # Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.
396-
&quot;includeDenyPolicyAnalysis&quot;: True or False, # Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.
397392
&quot;outputGroupEdges&quot;: True or False, # Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
398393
&quot;outputResourceEdges&quot;: True or False, # Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
399394
},
@@ -445,7 +440,6 @@ <h3>Method Details</h3>
445440
&quot;expandGroups&quot;: True or False, # Optional. If true, the identities section of the result will expand any Google groups appearing in an IAM policy binding. If IamPolicyAnalysisQuery.identity_selector is specified, the identity in the result will be determined by the selector, and this flag is not allowed to set. If true, the default max expansion per group is 1000 for AssetService.AnalyzeIamPolicy][]. Default is false.
446441
&quot;expandResources&quot;: True or False, # Optional. If true and IamPolicyAnalysisQuery.resource_selector is not specified, the resource section of the result will expand any resource attached to an IAM policy to include resources lower in the resource hierarchy. For example, if the request analyzes for which resources user A has permission P, and the results include an IAM policy with P on a Google Cloud folder, the results will also include resources in that folder with permission P. If true and IamPolicyAnalysisQuery.resource_selector is specified, the resource section of the result will expand the specified resource to include resources lower in the resource hierarchy. Only project or lower resources are supported. Folder and organization resources cannot be used together with this option. For example, if the request analyzes for which users have permission P on a Google Cloud project with this option enabled, the results will include all users who have permission P on that project or any lower resource. If true, the default max expansion per resource is 1000 for AssetService.AnalyzeIamPolicy][] and 100000 for AssetService.AnalyzeIamPolicyLongrunning][]. Default is false.
447442
&quot;expandRoles&quot;: True or False, # Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.
448-
&quot;includeDenyPolicyAnalysis&quot;: True or False, # Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.
449443
&quot;outputGroupEdges&quot;: True or False, # Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.
450444
&quot;outputResourceEdges&quot;: True or False, # Optional. If true, the result will output the relevant parent/child relationships between resources. Default is false.
451445
},

‎docs/dyn/cloudasset_v1.v1.html

+9-127
Large diffs are not rendered by default.

‎googleapiclient/discovery_cache/documents/cloudasset.v1.json

+3-168
Original file line numberDiff line numberDiff line change
@@ -601,11 +601,6 @@
601601
"location": "query",
602602
"type": "boolean"
603603
},
604-
"analysisQuery.options.includeDenyPolicyAnalysis": {
605-
"description": "Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.",
606-
"location": "query",
607-
"type": "boolean"
608-
},
609604
"analysisQuery.options.outputGroupEdges": {
610605
"description": "Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.",
611606
"location": "query",
@@ -1076,7 +1071,7 @@
10761071
"type": "string"
10771072
},
10781073
"readMask": {
1079-
"description": "Optional. A comma-separated list of fields specifying which fields to be returned in ResourceSearchResult. Only '*' or combination of top level fields can be specified. Field names of both snake_case and camelCase are supported. Examples: `\"*\"`, `\"name,location\"`, `\"name,versionedResources\"`. The read_mask paths must be valid field paths listed but not limited to (both snake_case and camelCase are supported): * name * assetType * project * displayName * description * location * tagKeys * tagValues * tagValueIds * labels * networkTags * kmsKey (This field is deprecated. Please use the `kmsKeys` field to retrieve Cloud KMS key information.) * kmsKeys * createTime * updateTime * state * additionalAttributes * versionedResources If read_mask is not specified, all fields except versionedResources will be returned. If only '*' is specified, all fields including versionedResources will be returned. Any invalid field path will trigger INVALID_ARGUMENT error.",
1074+
"description": "Optional. A comma-separated list of fields that you want returned in the results. The following fields are returned by default if not specified: * `name` * `assetType` * `project` * `folders` * `organization` * `displayName` * `description` * `location` * `labels` * `networkTags` * `kmsKeys` * `createTime` * `updateTime` * `state` * `additionalAttributes` * `parentFullResourceName` * `parentAssetType` Some fields of large size, such as `versionedResources` and `attachedResources`, are not returned by default, but you can specify them in the `read_mask` parameter if you want to include them. If `\"*\"` is specified, all [available fields](https://cloud.google.com/asset-inventory/docs/reference/rest/v1/TopLevel/searchAllResources#resourcesearchresult) are returned. Examples: `\"name,location\"`, `\"name,versionedResources\"`, `\"*\"`. Any invalid field path will trigger INVALID_ARGUMENT error.",
10801075
"format": "google-fieldmask",
10811076
"location": "query",
10821077
"type": "string"
@@ -1100,7 +1095,7 @@
11001095
}
11011096
}
11021097
},
1103-
"revision": "20230527",
1098+
"revision": "20230609",
11041099
"rootUrl": "https://cloudasset.googleapis.com/",
11051100
"schemas": {
11061101
"AccessSelector": {
@@ -1590,24 +1585,6 @@
15901585
},
15911586
"type": "object"
15921587
},
1593-
"DeniedAccess": {
1594-
"description": "A denied access contains details about an access tuple that is blocked by IAM deny policies.",
1595-
"id": "DeniedAccess",
1596-
"properties": {
1597-
"deniedAccessTuple": {
1598-
"$ref": "GoogleCloudAssetV1DeniedAccessAccessTuple",
1599-
"description": "A denied access tuple that is either fully or partially denied by IAM deny rules. This access tuple should match at least one access tuple derived from IamPolicyAnalysisResult."
1600-
},
1601-
"denyDetails": {
1602-
"description": "The details about how denied_access_tuple is denied.",
1603-
"items": {
1604-
"$ref": "GoogleCloudAssetV1DeniedAccessDenyDetail"
1605-
},
1606-
"type": "array"
1607-
}
1608-
},
1609-
"type": "object"
1610-
},
16111588
"EffectiveIamPolicy": {
16121589
"description": "The effective IAM policies on one resource.",
16131590
"id": "EffectiveIamPolicy",
@@ -2087,98 +2064,6 @@
20872064
},
20882065
"type": "object"
20892066
},
2090-
"GoogleCloudAssetV1DeniedAccessAccess": {
2091-
"description": "An IAM role or permission under analysis.",
2092-
"id": "GoogleCloudAssetV1DeniedAccessAccess",
2093-
"properties": {
2094-
"permission": {
2095-
"description": "The IAM permission in [v1 format](https://cloud.google.com/iam/docs/permissions-reference)",
2096-
"type": "string"
2097-
},
2098-
"role": {
2099-
"description": "The IAM role.",
2100-
"type": "string"
2101-
}
2102-
},
2103-
"type": "object"
2104-
},
2105-
"GoogleCloudAssetV1DeniedAccessAccessTuple": {
2106-
"description": "An access tuple contains a tuple of a resource, an identity and an access.",
2107-
"id": "GoogleCloudAssetV1DeniedAccessAccessTuple",
2108-
"properties": {
2109-
"access": {
2110-
"$ref": "GoogleCloudAssetV1DeniedAccessAccess",
2111-
"description": "One access from IamPolicyAnalysisResult.AccessControlList.accesses."
2112-
},
2113-
"identity": {
2114-
"$ref": "GoogleCloudAssetV1DeniedAccessIdentity",
2115-
"description": "One identity from IamPolicyAnalysisResult.IdentityList.identities."
2116-
},
2117-
"resource": {
2118-
"$ref": "GoogleCloudAssetV1DeniedAccessResource",
2119-
"description": "One resource from IamPolicyAnalysisResult.AccessControlList.resources."
2120-
}
2121-
},
2122-
"type": "object"
2123-
},
2124-
"GoogleCloudAssetV1DeniedAccessDenyDetail": {
2125-
"description": "A deny detail that explains which IAM deny rule denies the denied_access_tuple.",
2126-
"id": "GoogleCloudAssetV1DeniedAccessDenyDetail",
2127-
"properties": {
2128-
"accesses": {
2129-
"description": "The denied accesses. If this deny_rule fully denies the denied_access_tuple, this field will be same as AccessTuple.access. Otherwise, this field can contain AccessTuple.access and its descendant accesses, such as a subset of IAM permissions contained in an IAM role.",
2130-
"items": {
2131-
"$ref": "GoogleCloudAssetV1DeniedAccessAccess"
2132-
},
2133-
"type": "array"
2134-
},
2135-
"denyRule": {
2136-
"$ref": "GoogleIamV2DenyRule",
2137-
"description": "A deny rule in an IAM deny policy."
2138-
},
2139-
"fullyDenied": {
2140-
"description": "Whether the deny_rule fully denies all access granted by the denied_access_tuple. `True` means the deny rule fully blocks the access tuple. `False` means the deny rule partially blocks the access tuple.\"",
2141-
"type": "boolean"
2142-
},
2143-
"identities": {
2144-
"description": "If this deny_rule fully denies the denied_access_tuple, this field will be same as AccessTuple.identity. Otherwise, this field can contain AccessTuple.identity and its descendant identities, such as a subset of users in a group.",
2145-
"items": {
2146-
"$ref": "GoogleCloudAssetV1DeniedAccessIdentity"
2147-
},
2148-
"type": "array"
2149-
},
2150-
"resources": {
2151-
"description": "The resources that the identities are denied access to. If this deny_rule fully denies the denied_access_tuple, this field will be same as AccessTuple.resource. Otherwise, this field can contain AccessTuple.resource and its descendant resources.",
2152-
"items": {
2153-
"$ref": "GoogleCloudAssetV1DeniedAccessResource"
2154-
},
2155-
"type": "array"
2156-
}
2157-
},
2158-
"type": "object"
2159-
},
2160-
"GoogleCloudAssetV1DeniedAccessIdentity": {
2161-
"description": "An identity under analysis.",
2162-
"id": "GoogleCloudAssetV1DeniedAccessIdentity",
2163-
"properties": {
2164-
"name": {
2165-
"description": "The identity of members, formatted as appear in an [IAM policy binding](https://cloud.google.com/iam/reference/rest/v1/Binding). For example, they might be formatted like the following: - user:foo@google.com - group:group1@google.com - serviceAccount:s1@prj1.iam.gserviceaccount.com - projectOwner:some_project_id - domain:google.com - allUsers",
2166-
"type": "string"
2167-
}
2168-
},
2169-
"type": "object"
2170-
},
2171-
"GoogleCloudAssetV1DeniedAccessResource": {
2172-
"description": "A Google Cloud resource under analysis.",
2173-
"id": "GoogleCloudAssetV1DeniedAccessResource",
2174-
"properties": {
2175-
"fullResourceName": {
2176-
"description": "The [full resource name](https://cloud.google.com/asset-inventory/docs/resource-name-format)",
2177-
"type": "string"
2178-
}
2179-
},
2180-
"type": "object"
2181-
},
21822067
"GoogleCloudAssetV1Edge": {
21832068
"description": "A directional edge.",
21842069
"id": "GoogleCloudAssetV1Edge",
@@ -2317,7 +2202,7 @@
23172202
"type": "object"
23182203
},
23192204
"GoogleCloudAssetV1Rule": {
2320-
"description": "Represents a rule defined in an organization policy",
2205+
"description": "This rule message is a customized version of the one defined in the Organization Policy system. In addition to the fields defined in the original organization policy, it contains additional field(s) under specific circumstances to support analysis results.",
23212206
"id": "GoogleCloudAssetV1Rule",
23222207
"properties": {
23232208
"allowAll": {
@@ -2622,45 +2507,6 @@
26222507
"properties": {},
26232508
"type": "object"
26242509
},
2625-
"GoogleIamV2DenyRule": {
2626-
"description": "A deny rule in an IAM deny policy.",
2627-
"id": "GoogleIamV2DenyRule",
2628-
"properties": {
2629-
"denialCondition": {
2630-
"$ref": "Expr",
2631-
"description": "The condition that determines whether this deny rule applies to a request. If the condition expression evaluates to `true`, then the deny rule is applied; otherwise, the deny rule is not applied. Each deny rule is evaluated independently. If this deny rule does not apply to a request, other deny rules might still apply. The condition can use CEL functions that evaluate [resource tags](https://cloud.google.com/iam/help/conditions/resource-tags). Other functions and operators are not supported."
2632-
},
2633-
"deniedPermissions": {
2634-
"description": "The permissions that are explicitly denied by this rule. Each permission uses the format `{service_fqdn}/{resource}.{verb}`, where `{service_fqdn}` is the fully qualified domain name for the service. For example, `iam.googleapis.com/roles.list`.",
2635-
"items": {
2636-
"type": "string"
2637-
},
2638-
"type": "array"
2639-
},
2640-
"deniedPrincipals": {
2641-
"description": "The identities that are prevented from using one or more permissions on Google Cloud resources. This field can contain the following values: * `principalSet://goog/public:all`: A special identifier that represents any principal that is on the internet, even if they do not have a Google Account or are not logged in. * `principal://goog/subject/{email_id}`: A specific Google Account. Includes Gmail, Cloud Identity, and Google Workspace user accounts. For example, `principal://goog/subject/alice@example.com`. * `deleted:principal://goog/subject/{email_id}?uid={uid}`: A specific Google Account that was deleted recently. For example, `deleted:principal://goog/subject/alice@example.com?uid=1234567890`. If the Google Account is recovered, this identifier reverts to the standard identifier for a Google Account. * `principalSet://goog/group/{group_id}`: A Google group. For example, `principalSet://goog/group/admins@example.com`. * `deleted:principalSet://goog/group/{group_id}?uid={uid}`: A Google group that was deleted recently. For example, `deleted:principalSet://goog/group/admins@example.com?uid=1234567890`. If the Google group is restored, this identifier reverts to the standard identifier for a Google group. * `principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}`: A Google Cloud service account. For example, `principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account@iam.gserviceaccount.com`. * `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/{service_account_id}?uid={uid}`: A Google Cloud service account that was deleted recently. For example, `deleted:principal://iam.googleapis.com/projects/-/serviceAccounts/my-service-account@iam.gserviceaccount.com?uid=1234567890`. If the service account is undeleted, this identifier reverts to the standard identifier for a service account. * `principalSet://goog/cloudIdentityCustomerId/{customer_id}`: All of the principals associated with the specified Google Workspace or Cloud Identity customer ID. For example, `principalSet://goog/cloudIdentityCustomerId/C01Abc35`.",
2642-
"items": {
2643-
"type": "string"
2644-
},
2645-
"type": "array"
2646-
},
2647-
"exceptionPermissions": {
2648-
"description": "Specifies the permissions that this rule excludes from the set of denied permissions given by `denied_permissions`. If a permission appears in `denied_permissions` _and_ in `exception_permissions` then it will _not_ be denied. The excluded permissions can be specified using the same syntax as `denied_permissions`.",
2649-
"items": {
2650-
"type": "string"
2651-
},
2652-
"type": "array"
2653-
},
2654-
"exceptionPrincipals": {
2655-
"description": "The identities that are excluded from the deny rule, even if they are listed in the `denied_principals`. For example, you could add a Google group to the `denied_principals`, then exclude specific users who belong to that group. This field can contain the same values as the `denied_principals` field, excluding `principalSet://goog/public:all`, which represents all users on the internet.",
2656-
"items": {
2657-
"type": "string"
2658-
},
2659-
"type": "array"
2660-
}
2661-
},
2662-
"type": "object"
2663-
},
26642510
"GoogleIdentityAccesscontextmanagerV1AccessLevel": {
26652511
"description": "An `AccessLevel` is a label that can be applied to requests to Google Cloud services, along with a list of requirements necessary for the label to be applied.",
26662512
"id": "GoogleIdentityAccesscontextmanagerV1AccessLevel",
@@ -3215,13 +3061,6 @@
32153061
},
32163062
"type": "array"
32173063
},
3218-
"deniedAccesses": {
3219-
"description": "A list of DeniedAccess, which contains all access tuples in the analysis_results that are denied by IAM deny policies. If no access tuples are denied, the list is empty. This is only populated when IamPolicyAnalysisQuery.Options.include_deny_policy_analysis is true.",
3220-
"items": {
3221-
"$ref": "DeniedAccess"
3222-
},
3223-
"type": "array"
3224-
},
32253064
"fullyExplored": {
32263065
"description": "Represents whether all entries in the analysis_results have been fully explored to answer the query.",
32273066
"type": "boolean"
@@ -3658,10 +3497,6 @@
36583497
"description": "Optional. If true, the access section of result will expand any roles appearing in IAM policy bindings to include their permissions. If IamPolicyAnalysisQuery.access_selector is specified, the access section of the result will be determined by the selector, and this flag is not allowed to set. Default is false.",
36593498
"type": "boolean"
36603499
},
3661-
"includeDenyPolicyAnalysis": {
3662-
"description": "Optional. If true, the response includes deny policy analysis results, and you can see which access tuples are denied. Default is false.",
3663-
"type": "boolean"
3664-
},
36653500
"outputGroupEdges": {
36663501
"description": "Optional. If true, the result will output the relevant membership relationships between groups and other groups, and between groups and principals. Default is false.",
36673502
"type": "boolean"

‎googleapiclient/discovery_cache/documents/cloudasset.v1beta1.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,7 @@
411411
}
412412
}
413413
},
414-
"revision": "20230527",
414+
"revision": "20230609",
415415
"rootUrl": "https://cloudasset.googleapis.com/",
416416
"schemas": {
417417
"AnalyzeIamPolicyLongrunningMetadata": {

‎googleapiclient/discovery_cache/documents/cloudasset.v1p1beta1.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@
207207
}
208208
}
209209
},
210-
"revision": "20230527",
210+
"revision": "20230609",
211211
"rootUrl": "https://cloudasset.googleapis.com/",
212212
"schemas": {
213213
"AnalyzeIamPolicyLongrunningMetadata": {

‎googleapiclient/discovery_cache/documents/cloudasset.v1p5beta1.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@
177177
}
178178
}
179179
},
180-
"revision": "20230527",
180+
"revision": "20230609",
181181
"rootUrl": "https://cloudasset.googleapis.com/",
182182
"schemas": {
183183
"AnalyzeIamPolicyLongrunningMetadata": {

‎googleapiclient/discovery_cache/documents/cloudasset.v1p7beta1.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@
167167
}
168168
}
169169
},
170-
"revision": "20230527",
170+
"revision": "20230609",
171171
"rootUrl": "https://cloudasset.googleapis.com/",
172172
"schemas": {
173173
"AnalyzeIamPolicyLongrunningMetadata": {

0 commit comments

Comments
 (0)
Please sign in to comment.