Skip to content

Commit

Permalink
feat(cloudasset): update the API
Browse files Browse the repository at this point in the history
#### cloudasset:v1p1beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.type
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.description
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.type

#### cloudasset:v1p5beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.type
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.description
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.type

#### cloudasset:v1p7beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.type
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.description
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.type

#### cloudasset:v1beta1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.type
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.description
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.type

#### cloudasset:v1

The following keys were added:
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.description
- schemas.GoogleIdentityAccesscontextmanagerV1EgressSource.properties.resource.type
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.description
- schemas.GoogleIdentityAccesscontextmanagerV1IngressPolicy.properties.title.type
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.description
- schemas.GoogleIdentityAccesscontextmanagerV1ServicePerimeter.properties.etag.type

The following keys were changed:
- schemas.AnalyzeIamPolicyResponse.properties.serviceAccountImpersonationAnalysis.description
- schemas.EffectiveTagDetails.properties.attachedResource.description
- schemas.GoogleCloudAssetV1AnalyzeOrgPolicyGovernedAssetsResponseGovernedAsset.properties.policyBundle.description
- schemas.GoogleCloudAssetV1GovernedContainer.properties.policyBundle.description
- schemas.OrgPolicyResult.properties.consolidatedPolicy.description
- schemas.OrgPolicyResult.properties.policyBundle.description
  • Loading branch information
yoshi-automation authored and sofisl committed Jan 29, 2025
1 parent 1310a78 commit 2b797dd
Show file tree
Hide file tree
Showing 10 changed files with 177 additions and 17 deletions.
30 changes: 23 additions & 7 deletions discovery/cloudasset-v1.json
Original file line number Diff line number Diff line change
Expand Up @@ -1095,7 +1095,7 @@
}
}
},
"revision": "20240831",
"revision": "20250104",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"AccessSelector": {
Expand Down Expand Up @@ -1170,7 +1170,7 @@
"description": "The main analysis that matches the original request."
},
"serviceAccountImpersonationAnalysis": {
"description": "The service account impersonation analysis if AnalyzeIamPolicyRequest.analyze_service_account_impersonation is enabled.",
"description": "The service account impersonation analysis if IamPolicyAnalysisQuery.Options.analyze_service_account_impersonation is enabled.",
"items": {
"$ref": "IamPolicyAnalysis"
},
Expand Down Expand Up @@ -1620,7 +1620,7 @@
"id": "EffectiveTagDetails",
"properties": {
"attachedResource": {
"description": "The [full resource name](https://cloud.google.com/asset-inventory/docs/resource-name-format) of the ancestor from which an effective_tag is inherited, according to [tag inheritance](https://cloud.google.com/resource-manager/docs/tags/tags-overview#inheritance).",
"description": "The [full resource name](https://cloud.google.com/asset-inventory/docs/resource-name-format) of the ancestor from which effective_tags are inherited, according to [tag inheritance](https://cloud.google.com/resource-manager/docs/tags/tags-overview#inheritance).",
"type": "string"
},
"effectiveTags": {
Expand Down Expand Up @@ -1884,7 +1884,7 @@
"description": "A Google Cloud resource governed by the organization policies of the AnalyzeOrgPolicyGovernedAssetsRequest.constraint."
},
"policyBundle": {
"description": "The ordered list of all organization policies from the AnalyzeOrgPoliciesResponse.OrgPolicyResult.consolidated_policy.attached_resource to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.",
"description": "The ordered list of all organization policies from the consolidated_policy.attached_resource to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.",
"items": {
"$ref": "AnalyzerOrgPolicy"
},
Expand Down Expand Up @@ -2174,7 +2174,7 @@
"type": "string"
},
"policyBundle": {
"description": "The ordered list of all organization policies from the AnalyzeOrgPoliciesResponse.OrgPolicyResult.consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.",
"description": "The ordered list of all organization policies from the consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.",
"items": {
"$ref": "AnalyzerOrgPolicy"
},
Expand Down Expand Up @@ -2871,6 +2871,10 @@
"egressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1EgressTo",
"description": "Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand All @@ -2882,6 +2886,10 @@
"accessLevel": {
"description": "An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.",
"type": "string"
},
"resource": {
"description": "A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -2962,6 +2970,10 @@
"ingressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1IngressTo",
"description": "Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -3062,6 +3074,10 @@
"description": "Description of the `ServicePerimeter` and its use. Does not affect behavior.",
"type": "string"
},
"etag": {
"description": "Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided.",
"type": "string"
},
"name": {
"description": "Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.",
"type": "string"
Expand Down Expand Up @@ -3658,7 +3674,7 @@
"properties": {
"consolidatedPolicy": {
"$ref": "AnalyzerOrgPolicy",
"description": "The consolidated organization policy for the analyzed resource. The consolidated organization policy is computed by merging and evaluating AnalyzeOrgPoliciesResponse.policy_bundle. The evaluation will respect the organization policy [hierarchy rules](https://cloud.google.com/resource-manager/docs/organization-policy/understanding-hierarchy)."
"description": "The consolidated organization policy for the analyzed resource. The consolidated organization policy is computed by merging and evaluating policy_bundle. The evaluation will respect the organization policy [hierarchy rules](https://cloud.google.com/resource-manager/docs/organization-policy/understanding-hierarchy)."
},
"folders": {
"description": "The folder(s) that this consolidated policy belongs to, in the format of folders/{FOLDER_NUMBER}. This field is available when the consolidated policy belongs (directly or cascadingly) to one or more folders.",
Expand All @@ -3672,7 +3688,7 @@
"type": "string"
},
"policyBundle": {
"description": "The ordered list of all organization policies from the AnalyzeOrgPoliciesResponse.OrgPolicyResult.consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.",
"description": "The ordered list of all organization policies from the consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.",
"items": {
"$ref": "AnalyzerOrgPolicy"
},
Expand Down
18 changes: 17 additions & 1 deletion discovery/cloudasset-v1beta1.json
Original file line number Diff line number Diff line change
Expand Up @@ -411,7 +411,7 @@
}
}
},
"revision": "20240803",
"revision": "20250104",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"AnalyzeIamPolicyLongrunningMetadata": {
Expand Down Expand Up @@ -1181,6 +1181,10 @@
"egressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1EgressTo",
"description": "Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand All @@ -1192,6 +1196,10 @@
"accessLevel": {
"description": "An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.",
"type": "string"
},
"resource": {
"description": "A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -1272,6 +1280,10 @@
"ingressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1IngressTo",
"description": "Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -1372,6 +1384,10 @@
"description": "Description of the `ServicePerimeter` and its use. Does not affect behavior.",
"type": "string"
},
"etag": {
"description": "Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided.",
"type": "string"
},
"name": {
"description": "Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.",
"type": "string"
Expand Down
18 changes: 17 additions & 1 deletion discovery/cloudasset-v1p1beta1.json
Original file line number Diff line number Diff line change
Expand Up @@ -207,7 +207,7 @@
}
}
},
"revision": "20240803",
"revision": "20250104",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"AnalyzeIamPolicyLongrunningMetadata": {
Expand Down Expand Up @@ -883,6 +883,10 @@
"egressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1EgressTo",
"description": "Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand All @@ -894,6 +898,10 @@
"accessLevel": {
"description": "An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.",
"type": "string"
},
"resource": {
"description": "A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -974,6 +982,10 @@
"ingressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1IngressTo",
"description": "Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -1074,6 +1086,10 @@
"description": "Description of the `ServicePerimeter` and its use. Does not affect behavior.",
"type": "string"
},
"etag": {
"description": "Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided.",
"type": "string"
},
"name": {
"description": "Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.",
"type": "string"
Expand Down
18 changes: 17 additions & 1 deletion discovery/cloudasset-v1p5beta1.json
Original file line number Diff line number Diff line change
Expand Up @@ -177,7 +177,7 @@
}
}
},
"revision": "20240803",
"revision": "20250104",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"AnalyzeIamPolicyLongrunningMetadata": {
Expand Down Expand Up @@ -888,6 +888,10 @@
"egressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1EgressTo",
"description": "Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand All @@ -899,6 +903,10 @@
"accessLevel": {
"description": "An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.",
"type": "string"
},
"resource": {
"description": "A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -979,6 +987,10 @@
"ingressTo": {
"$ref": "GoogleIdentityAccesscontextmanagerV1IngressTo",
"description": "Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply."
},
"title": {
"description": "Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.",
"type": "string"
}
},
"type": "object"
Expand Down Expand Up @@ -1079,6 +1091,10 @@
"description": "Description of the `ServicePerimeter` and its use. Does not affect behavior.",
"type": "string"
},
"etag": {
"description": "Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided.",
"type": "string"
},
"name": {
"description": "Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.",
"type": "string"
Expand Down
Loading

0 comments on commit 2b797dd

Please sign in to comment.