Skip to content

Commit d3602db

Browse files
feat(cloudasset): update the api
#### cloudasset:v1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2) #### cloudasset:v1beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2) #### cloudasset:v1p1beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2) #### cloudasset:v1p4beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2) #### cloudasset:v1p5beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2) #### cloudasset:v1p7beta1 The following keys were added: - schemas.GoogleIdentityAccesscontextmanagerV1AccessPolicy.properties.scopes (Total Keys: 2)
1 parent daab1a1 commit d3602db

12 files changed

+76
-16
lines changed

docs/dyn/cloudasset_v1.assets.html

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -175,6 +175,9 @@ <h3>Method Details</h3>
175175
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
176176
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
177177
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
178+
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
179+
&quot;A String&quot;,
180+
],
178181
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
179182
},
180183
&quot;ancestors&quot;: [ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `[&quot;projects/123456789&quot;, &quot;folders/5432&quot;, &quot;organizations/1234&quot;]`

docs/dyn/cloudasset_v1.savedQueries.html

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ <h3>Method Details</h3>
112112

113113
{ # A saved query which can be shared with others or used later.
114114
&quot;content&quot;: { # The query content. # The query content.
115-
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
115+
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
116116
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
117117
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
118118
&quot;A String&quot;,
@@ -163,7 +163,7 @@ <h3>Method Details</h3>
163163

164164
{ # A saved query which can be shared with others or used later.
165165
&quot;content&quot;: { # The query content. # The query content.
166-
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
166+
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
167167
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
168168
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
169169
&quot;A String&quot;,
@@ -238,7 +238,7 @@ <h3>Method Details</h3>
238238

239239
{ # A saved query which can be shared with others or used later.
240240
&quot;content&quot;: { # The query content. # The query content.
241-
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
241+
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
242242
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
243243
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
244244
&quot;A String&quot;,
@@ -301,7 +301,7 @@ <h3>Method Details</h3>
301301
&quot;savedQueries&quot;: [ # A list of savedQueries.
302302
{ # A saved query which can be shared with others or used later.
303303
&quot;content&quot;: { # The query content. # The query content.
304-
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
304+
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
305305
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
306306
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
307307
&quot;A String&quot;,
@@ -369,7 +369,7 @@ <h3>Method Details</h3>
369369

370370
{ # A saved query which can be shared with others or used later.
371371
&quot;content&quot;: { # The query content. # The query content.
372-
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
372+
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
373373
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
374374
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
375375
&quot;A String&quot;,
@@ -420,7 +420,7 @@ <h3>Method Details</h3>
420420

421421
{ # A saved query which can be shared with others or used later.
422422
&quot;content&quot;: { # The query content. # The query content.
423-
&quot;iamPolicyAnalysisQuery&quot;: { # ## IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
423+
&quot;iamPolicyAnalysisQuery&quot;: { # IAM policy analysis query message. # An IAM Policy Analysis query, which could be used in the AssetService.AnalyzeIamPolicy rpc or the AssetService.AnalyzeIamPolicyLongrunning rpc.
424424
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
425425
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
426426
&quot;A String&quot;,

docs/dyn/cloudasset_v1.v1.html

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ <h3>Method Details</h3>
135135
{ # A response message for AssetService.AnalyzeIamPolicy.
136136
&quot;fullyExplored&quot;: True or False, # Represents whether all entries in the main_analysis and service_account_impersonation_analysis have been fully explored to answer the query in the request.
137137
&quot;mainAnalysis&quot;: { # An analysis message to group the query and results. # The main analysis that matches the original request.
138-
&quot;analysisQuery&quot;: { # ## IAM policy analysis query message. # The analysis query.
138+
&quot;analysisQuery&quot;: { # IAM policy analysis query message. # The analysis query.
139139
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
140140
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
141141
&quot;A String&quot;,
@@ -240,7 +240,7 @@ <h3>Method Details</h3>
240240
},
241241
&quot;serviceAccountImpersonationAnalysis&quot;: [ # The service account impersonation analysis if AnalyzeIamPolicyRequest.analyze_service_account_impersonation is enabled.
242242
{ # An analysis message to group the query and results.
243-
&quot;analysisQuery&quot;: { # ## IAM policy analysis query message. # The analysis query.
243+
&quot;analysisQuery&quot;: { # IAM policy analysis query message. # The analysis query.
244244
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
245245
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
246246
&quot;A String&quot;,
@@ -357,7 +357,7 @@ <h3>Method Details</h3>
357357
The object takes the form of:
358358

359359
{ # A request message for AssetService.AnalyzeIamPolicyLongrunning.
360-
&quot;analysisQuery&quot;: { # ## IAM policy analysis query message. # Required. The request query.
360+
&quot;analysisQuery&quot;: { # IAM policy analysis query message. # Required. The request query.
361361
&quot;accessSelector&quot;: { # Specifies roles and/or permissions to analyze, to determine both the identities possessing them and the resources they control. If multiple values are specified, results will include roles or permissions matching any of them. The total number of roles and permissions should be equal or less than 10. # Optional. Specifies roles or permissions for analysis. This is optional.
362362
&quot;permissions&quot;: [ # Optional. The permissions to appear in result.
363363
&quot;A String&quot;,
@@ -564,6 +564,9 @@ <h3>Method Details</h3>
564564
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
565565
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
566566
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
567+
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
568+
&quot;A String&quot;,
569+
],
567570
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
568571
},
569572
&quot;ancestors&quot;: [ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `[&quot;projects/123456789&quot;, &quot;folders/5432&quot;, &quot;organizations/1234&quot;]`
@@ -1033,6 +1036,9 @@ <h3>Method Details</h3>
10331036
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
10341037
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
10351038
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
1039+
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
1040+
&quot;A String&quot;,
1041+
],
10361042
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
10371043
},
10381044
&quot;ancestors&quot;: [ # The ancestry path of an asset in Google Cloud [resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), represented as a list of relative resource names. An ancestry path starts with the closest ancestor in the hierarchy and ends at root. If the asset is a project, folder, or organization, the ancestry path starts from the asset itself. Example: `[&quot;projects/123456789&quot;, &quot;folders/5432&quot;, &quot;organizations/1234&quot;]`

docs/dyn/cloudasset_v1beta1.organizations.html

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,9 @@ <h3>Method Details</h3>
170170
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
171171
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
172172
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
173+
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
174+
&quot;A String&quot;,
175+
],
173176
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
174177
},
175178
&quot;assetType&quot;: &quot;A String&quot;, # The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-types) for more information.

0 commit comments

Comments
 (0)