Skip to content

Commit d39390c

Browse files
feat(all): auto-regenerate discovery clients (#1616)
1 parent efe48de commit d39390c

39 files changed

+3099
-348
lines changed

androidmanagement/v1/androidmanagement-api.json

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1065,7 +1065,7 @@
10651065
}
10661066
}
10671067
},
1068-
"revision": "20220613",
1068+
"revision": "20220704",
10691069
"rootUrl": "https://androidmanagement.googleapis.com/",
10701070
"schemas": {
10711071
"AdbShellCommandEvent": {
@@ -1193,7 +1193,7 @@
11931193
"type": "string"
11941194
},
11951195
"packageNames": {
1196-
"description": "Package names of all packages that are associated with the particular user id. In most cases, this will be a single package name, the package that has been assigned that user id. If multiple application share a uid then all packages sharing uid will be included.",
1196+
"description": "Package names of all packages that are associated with the particular user ID. In most cases, this will be a single package name, the package that has been assigned that user ID. If multiple application share a UID then all packages sharing UID will be included.",
11971197
"items": {
11981198
"type": "string"
11991199
},
@@ -1583,7 +1583,9 @@
15831583
"BLOCK_UNINSTALL",
15841584
"PERMISSION_GRANT",
15851585
"PACKAGE_ACCESS",
1586-
"ENABLE_SYSTEM_APP"
1586+
"ENABLE_SYSTEM_APP",
1587+
"NETWORK_ACTIVITY_LOGS",
1588+
"SECURITY_LOGS"
15871589
],
15881590
"enumDescriptions": [
15891591
"No delegation scope specified.",
@@ -1592,7 +1594,9 @@
15921594
"Grants access to blocking uninstallation.",
15931595
"Grants access to permission policy and permission grant state.",
15941596
"Grants access to package access state.",
1595-
"Grants access for enabling system apps."
1597+
"Grants access for enabling system apps.",
1598+
"Grants access to network activity logs. Allows the delegated application to call setNetworkLoggingEnabled (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setNetworkLoggingEnabled%28android.content.ComponentName,%20boolean%29), isNetworkLoggingEnabled (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#isNetworkLoggingEnabled%28android.content.ComponentName%29) and retrieveNetworkLogs (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#retrieveNetworkLogs%28android.content.ComponentName,%20long%29) methods. This scope can be delegated to at most one application. Supported for fully managed devices on Android 10 and above. Supported for a work profile on Android 12 and above. When delegation is supported and set, NETWORK_ACTIVITY_LOGS is ignored.",
1599+
"Grants access to security logs. Allows the delegated application to call setSecurityLoggingEnabled (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setSecurityLoggingEnabled%28android.content.ComponentName,%20boolean%29), isSecurityLoggingEnabled (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#isSecurityLoggingEnabled%28android.content.ComponentName%29), retrieveSecurityLogs (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#retrieveSecurityLogs%28android.content.ComponentName%29) and retrievePreRebootSecurityLogs (https://developer.android.com/reference/android/app/admin/DevicePolicyManager#retrievePreRebootSecurityLogs%28android.content.ComponentName%29) methods. This scope can be delegated to at most one application. Supported for fully managed devices and company-owned devices with a work profile on Android 12 and above. When delegation is supported and set, SECURITY_LOGS is ignored."
15961600
],
15971601
"type": "string"
15981602
},
@@ -2603,7 +2607,7 @@
26032607
"type": "string"
26042608
},
26052609
"duration": {
2606-
"description": "The length of time the enrollment token is valid, ranging from 1 minute to 90 days. If not specified, the default duration is 1 hour.",
2610+
"description": "The length of time the enrollment token is valid, ranging from 1 minute to Durations.MAX_VALUE (https://developers.google.com/protocol-buffers/docs/reference/java/com/google/protobuf/util/Durations.html#MAX_VALUE), approximately 10,000 years. If not specified, the default duration is 1 hour. Please note that if requested duration causes the resulting expiration_timestamp to exceed Timestamps.MAX_VALUE (https://developers.google.com/protocol-buffers/docs/reference/java/com/google/protobuf/util/Timestamps.html#MAX_VALUE), then expiration_timestamp is coerced to Timestamps.MAX_VALUE.",
26072611
"format": "google-duration",
26082612
"type": "string"
26092613
},
@@ -5158,8 +5162,8 @@
51585162
],
51595163
"enumDescriptions": [
51605164
"This value is not used.",
5161-
"Enable logging of on-device security events, like when the device password is incorrectly entered or removable storage is mounted. See UsageLogEvent for a complete description of the logged security events. Supported for fully managed devices on Android 7 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only security events from the work profile are logged.",
5162-
"Enable logging of on-device network events, like DNS lookups and TCP connections. See UsageLogEvent for a complete description of the logged network events. Supported for fully managed devices on Android 8 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only network events from the work profile are logged."
5165+
"Enable logging of on-device security events, like when the device password is incorrectly entered or removable storage is mounted. See UsageLogEvent for a complete description of the logged security events. Supported for fully managed devices on Android 7 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only security events from the work profile are logged. Can be overridden by the application delegated scope SECURITY_LOGS",
5166+
"Enable logging of on-device network events, like DNS lookups and TCP connections. See UsageLogEvent for a complete description of the logged network events. Supported for fully managed devices on Android 8 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only network events from the work profile are logged. Can be overridden by the application delegated scope NETWORK_ACTIVITY_LOGS"
51635167
],
51645168
"type": "string"
51655169
},
@@ -5175,8 +5179,8 @@
51755179
],
51765180
"enumDescriptions": [
51775181
"This value is not used.",
5178-
"Enable logging of on-device security events, like when the device password is incorrectly entered or removable storage is mounted. See UsageLogEvent for a complete description of the logged security events. Supported for fully managed devices on Android 7 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only security events from the work profile are logged.",
5179-
"Enable logging of on-device network events, like DNS lookups and TCP connections. See UsageLogEvent for a complete description of the logged network events. Supported for fully managed devices on Android 8 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only network events from the work profile are logged."
5182+
"Enable logging of on-device security events, like when the device password is incorrectly entered or removable storage is mounted. See UsageLogEvent for a complete description of the logged security events. Supported for fully managed devices on Android 7 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only security events from the work profile are logged. Can be overridden by the application delegated scope SECURITY_LOGS",
5183+
"Enable logging of on-device network events, like DNS lookups and TCP connections. See UsageLogEvent for a complete description of the logged network events. Supported for fully managed devices on Android 8 and above. Supported for company-owned devices with a work profile on Android 12 and above, on which only network events from the work profile are logged. Can be overridden by the application delegated scope NETWORK_ACTIVITY_LOGS"
51805184
],
51815185
"type": "string"
51825186
},
@@ -5215,15 +5219,15 @@
52155219
},
52165220
"connectEvent": {
52175221
"$ref": "ConnectEvent",
5218-
"description": "A TCP connect event was initiated through the standard network stack. Part of NETWORK_LOGS."
5222+
"description": "A TCP connect event was initiated through the standard network stack. Part of NETWORK_ACTIVITY_LOGS."
52195223
},
52205224
"cryptoSelfTestCompletedEvent": {
52215225
"$ref": "CryptoSelfTestCompletedEvent",
52225226
"description": "Validates whether Android’s built-in cryptographic library (BoringSSL) is valid. Should always succeed on device boot, if it fails, the device should be considered untrusted. Part of SECURITY_LOGS."
52235227
},
52245228
"dnsEvent": {
52255229
"$ref": "DnsEvent",
5226-
"description": "A DNS lookup event was initiated through the standard network stack. Part of NETWORK_LOGS."
5230+
"description": "A DNS lookup event was initiated through the standard network stack. Part of NETWORK_ACTIVITY_LOGS."
52275231
},
52285232
"eventId": {
52295233
"description": "Unique id of the event.",
@@ -5369,7 +5373,7 @@
53695373
},
53705374
"wipeFailureEvent": {
53715375
"$ref": "WipeFailureEvent",
5372-
"description": "The work profile or company-owned device failed to wipe when when requested. This could be user initiated or admin initiated e.g. delete was received. Part of SECURITY_LOGS."
5376+
"description": "The work profile or company-owned device failed to wipe when requested. This could be user initiated or admin initiated e.g. delete was received. Part of SECURITY_LOGS."
53735377
}
53745378
},
53755379
"type": "object"
@@ -5537,7 +5541,7 @@
55375541
"type": "object"
55385542
},
55395543
"WipeFailureEvent": {
5540-
"description": "The work profile or company-owned device failed to wipe when when requested. This could be user initiated or admin initiated e.g. delete was received. Intentionally empty.",
5544+
"description": "The work profile or company-owned device failed to wipe when requested. This could be user initiated or admin initiated e.g. delete was received. Intentionally empty.",
55415545
"id": "WipeFailureEvent",
55425546
"properties": {},
55435547
"type": "object"

androidmanagement/v1/androidmanagement-gen.go

Lines changed: 48 additions & 15 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

api-list.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -622,7 +622,7 @@
622622
"name": "beyondcorp",
623623
"version": "v1alpha",
624624
"title": "BeyondCorp API",
625-
"description": "Beyondcorp Enterprise provides identity and context aware access controls for enterprise resources and enables zero-trust access. Using the Beyondcorp Enterprise APIs, enterprises can set up multi-cloud and on-prem connectivity using the App Connector hybrid connectivity solution.",
625+
"description": "Beyondcorp Enterprise provides identity and context aware access controls for enterprise resources and enables zero-trust access. Using the Beyondcorp Enterprise APIs, enterprises can set up multi-cloud and on-prem connectivity solutions.",
626626
"discoveryRestUrl": "https://beyondcorp.googleapis.com/$discovery/rest?version=v1alpha",
627627
"icons": {
628628
"x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",
@@ -637,7 +637,7 @@
637637
"name": "beyondcorp",
638638
"version": "v1",
639639
"title": "BeyondCorp API",
640-
"description": "Beyondcorp Enterprise provides identity and context aware access controls for enterprise resources and enables zero-trust access. Using the Beyondcorp Enterprise APIs, enterprises can set up multi-cloud and on-prem connectivity using the App Connector hybrid connectivity solution.",
640+
"description": "Beyondcorp Enterprise provides identity and context aware access controls for enterprise resources and enables zero-trust access. Using the Beyondcorp Enterprise APIs, enterprises can set up multi-cloud and on-prem connectivity solutions.",
641641
"discoveryRestUrl": "https://beyondcorp.googleapis.com/$discovery/rest?version=v1",
642642
"icons": {
643643
"x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",

0 commit comments

Comments
 (0)