Skip to content

Commit

Permalink
fix(accesscontextmanager): update the API
Browse files Browse the repository at this point in the history
#### accesscontextmanager:v1

The following keys were changed:
- schemas.Binding.properties.role.description
- schemas.EgressFrom.properties.identities.description
- schemas.IngressFrom.properties.identities.description
  • Loading branch information
yoshi-automation authored and bcoe committed Feb 2, 2024
1 parent 666c9e1 commit aa12f37
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 7 deletions.
8 changes: 4 additions & 4 deletions discovery/accesscontextmanager-v1.json
Original file line number Diff line number Diff line change
Expand Up @@ -1290,7 +1290,7 @@
}
}
},
"revision": "20240102",
"revision": "20240126",
"rootUrl": "https://accesscontextmanager.googleapis.com/",
"schemas": {
"AccessContextManagerOperationMetadata": {
Expand Down Expand Up @@ -1522,7 +1522,7 @@
"type": "array"
},
"role": {
"description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.",
"description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles).",
"type": "string"
}
},
Expand Down Expand Up @@ -1689,7 +1689,7 @@
"id": "EgressFrom",
"properties": {
"identities": {
"description": "A list of identities that are allowed access through this [EgressPolicy]. Should be in the format of email address. The email address should represent individual user or service account only.",
"description": "A list of identities that are allowed access through this [EgressPolicy], in the format of `user:{email_id}` or `serviceAccount:{email_id}`.",
"items": {
"type": "string"
},
Expand Down Expand Up @@ -1881,7 +1881,7 @@
"id": "IngressFrom",
"properties": {
"identities": {
"description": "A list of identities that are allowed access through this ingress policy. Should be in the format of email address. The email address should represent individual user or service account only.",
"description": "A list of identities that are allowed access through this ingress policy, in the format of `user:{email_id}` or `serviceAccount:{email_id}`.",
"items": {
"type": "string"
},
Expand Down
6 changes: 3 additions & 3 deletions src/apis/accesscontextmanager/v1.ts
Original file line number Diff line number Diff line change
Expand Up @@ -274,7 +274,7 @@ export namespace accesscontextmanager_v1 {
*/
members?: string[] | null;
/**
* Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
* Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles).
*/
role?: string | null;
}
Expand Down Expand Up @@ -376,7 +376,7 @@ export namespace accesscontextmanager_v1 {
*/
export interface Schema$EgressFrom {
/**
* A list of identities that are allowed access through this [EgressPolicy]. Should be in the format of email address. The email address should represent individual user or service account only.
* A list of identities that are allowed access through this [EgressPolicy], in the format of `user:{email_id\}` or `serviceAccount:{email_id\}`.
*/
identities?: string[] | null;
/**
Expand Down Expand Up @@ -504,7 +504,7 @@ export namespace accesscontextmanager_v1 {
*/
export interface Schema$IngressFrom {
/**
* A list of identities that are allowed access through this ingress policy. Should be in the format of email address. The email address should represent individual user or service account only.
* A list of identities that are allowed access through this ingress policy, in the format of `user:{email_id\}` or `serviceAccount:{email_id\}`.
*/
identities?: string[] | null;
/**
Expand Down

0 comments on commit aa12f37

Please sign in to comment.