Skip to content

Commit 25f7607

Browse files
fix(networksecurity): update the API
#### networksecurity:v1beta1 The following keys were changed: - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.ipBlocks.description - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.principals.description - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.resources.description - schemas.AuthzPolicyAuthzRulePrincipal.properties.principalSelector.enumDescriptions - schemas.AuthzPolicyAuthzRuleRequestResourceTagValueIdSet.properties.ids.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.hosts.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.methods.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.paths.description - schemas.AuthzPolicyAuthzRuleToRequestOperationHeaderSet.properties.headers.description - schemas.DnsThreatDetector.description - schemas.ListDnsThreatDetectorsResponse.description #### networksecurity:v1 The following keys were changed: - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.ipBlocks.description - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.principals.description - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.resources.description - schemas.AuthzPolicyAuthzRulePrincipal.properties.principalSelector.enumDescriptions - schemas.AuthzPolicyAuthzRuleRequestResourceTagValueIdSet.properties.ids.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.hosts.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.methods.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.paths.description - schemas.AuthzPolicyAuthzRuleToRequestOperationHeaderSet.properties.headers.description
1 parent 777130a commit 25f7607

File tree

4 files changed

+44
-44
lines changed

4 files changed

+44
-44
lines changed

discovery/networksecurity-v1.json

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5070,7 +5070,7 @@
50705070
}
50715071
}
50725072
},
5073-
"revision": "20250714",
5073+
"revision": "20250804",
50745074
"rootUrl": "https://networksecurity.googleapis.com/",
50755075
"schemas": {
50765076
"AddAddressGroupItemsRequest": {
@@ -5387,21 +5387,21 @@
53875387
"id": "AuthzPolicyAuthzRuleFromRequestSource",
53885388
"properties": {
53895389
"ipBlocks": {
5390-
"description": "Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 5 ip_blocks.",
5390+
"description": "Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 10 ip_blocks per Authorization Policy",
53915391
"items": {
53925392
"$ref": "AuthzPolicyAuthzRuleIpBlock"
53935393
},
53945394
"type": "array"
53955395
},
53965396
"principals": {
5397-
"description": "Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 5 principals.",
5397+
"description": "Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 50 principals per Authorization Policy for Regional Internal Application Load Balancer, Regional External Application Load Balancer, Cross-region Internal Application Load Balancer, and Cloud Service Mesh. Limited to 25 principals per Authorization Policy for Global External Application Load Balancer.",
53985398
"items": {
53995399
"$ref": "AuthzPolicyAuthzRulePrincipal"
54005400
},
54015401
"type": "array"
54025402
},
54035403
"resources": {
5404-
"description": "Optional. A list of resources to match against the resource of the source VM of a request. Limited to 5 resources.",
5404+
"description": "Optional. A list of resources to match against the resource of the source VM of a request. Limited to 10 resources per Authorization Policy.",
54055405
"items": {
54065406
"$ref": "AuthzPolicyAuthzRuleRequestResource"
54075407
},
@@ -5459,9 +5459,9 @@
54595459
],
54605460
"enumDescriptions": [
54615461
"Unspecified principal selector. It will be treated as CLIENT_CERT_URI_SAN by default.",
5462-
"The principal rule is matched against a list of URI SANs in the validated clients certificate. A match happens when there is any exact URI SAN value match. This is the default principal selector.",
5463-
"The principal rule is matched against a list of DNS Name SANs in the validated clients certificate. A match happens when there is any exact DNS Name SAN value match.",
5464-
"The principal rule is matched against the common name in the clients certificate. Authorization against multiple common names in the client certificate is not supported. Requests with multiple common names in the client certificate will be rejected if CLIENT_CERT_COMMON_NAME is set as the principal selector. A match happens when there is an exact common name value match. This is only applicable for Application Load Balancers except for classic Global External Application load balancer. CLIENT_CERT_COMMON_NAME is not supported for INTERNAL_SELF_MANAGED load balancing scheme."
5462+
"The principal rule is matched against a list of URI SANs in the validated client's certificate. A match happens when there is any exact URI SAN value match. This is the default principal selector.",
5463+
"The principal rule is matched against a list of DNS Name SANs in the validated client's certificate. A match happens when there is any exact DNS Name SAN value match.",
5464+
"The principal rule is matched against the common name in the client's certificate. Authorization against multiple common names in the client certificate is not supported. Requests with multiple common names in the client certificate will be rejected if CLIENT_CERT_COMMON_NAME is set as the principal selector. A match happens when there is an exact common name value match. This is only applicable for Application Load Balancers except for classic Global External Application load balancer. CLIENT_CERT_COMMON_NAME is not supported for INTERNAL_SELF_MANAGED load balancing scheme."
54655465
],
54665466
"type": "string"
54675467
}
@@ -5488,7 +5488,7 @@
54885488
"id": "AuthzPolicyAuthzRuleRequestResourceTagValueIdSet",
54895489
"properties": {
54905490
"ids": {
5491-
"description": "Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 matches.",
5491+
"description": "Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 ids in the Tag value id set.",
54925492
"items": {
54935493
"format": "int64",
54945494
"type": "string"
@@ -5555,21 +5555,21 @@
55555555
"description": "Optional. A list of headers to match against in http header."
55565556
},
55575557
"hosts": {
5558-
"description": "Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.",
5558+
"description": "Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 hosts per Authorization Policy.",
55595559
"items": {
55605560
"$ref": "AuthzPolicyAuthzRuleStringMatch"
55615561
},
55625562
"type": "array"
55635563
},
55645564
"methods": {
5565-
"description": "Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive.",
5565+
"description": "Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive. Limited to 10 methods per Authorization Policy.",
55665566
"items": {
55675567
"type": "string"
55685568
},
55695569
"type": "array"
55705570
},
55715571
"paths": {
5572-
"description": "Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.",
5572+
"description": "Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 paths per Authorization Policy. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.",
55735573
"items": {
55745574
"$ref": "AuthzPolicyAuthzRuleStringMatch"
55755575
},
@@ -5583,7 +5583,7 @@
55835583
"id": "AuthzPolicyAuthzRuleToRequestOperationHeaderSet",
55845584
"properties": {
55855585
"headers": {
5586-
"description": "Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.",
5586+
"description": "Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 10 headers per Authorization Policy.",
55875587
"items": {
55885588
"$ref": "AuthzPolicyAuthzRuleHeaderMatch"
55895589
},

discovery/networksecurity-v1beta1.json

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5513,7 +5513,7 @@
55135513
}
55145514
}
55155515
},
5516-
"revision": "20250721",
5516+
"revision": "20250804",
55175517
"rootUrl": "https://networksecurity.googleapis.com/",
55185518
"schemas": {
55195519
"AddAddressGroupItemsRequest": {
@@ -5830,21 +5830,21 @@
58305830
"id": "AuthzPolicyAuthzRuleFromRequestSource",
58315831
"properties": {
58325832
"ipBlocks": {
5833-
"description": "Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 5 ip_blocks.",
5833+
"description": "Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 10 ip_blocks per Authorization Policy",
58345834
"items": {
58355835
"$ref": "AuthzPolicyAuthzRuleIpBlock"
58365836
},
58375837
"type": "array"
58385838
},
58395839
"principals": {
5840-
"description": "Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 5 principals.",
5840+
"description": "Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 50 principals per Authorization Policy for Regional Internal Application Load Balancer, Regional External Application Load Balancer, Cross-region Internal Application Load Balancer, and Cloud Service Mesh. Limited to 25 principals per Authorization Policy for Global External Application Load Balancer.",
58415841
"items": {
58425842
"$ref": "AuthzPolicyAuthzRulePrincipal"
58435843
},
58445844
"type": "array"
58455845
},
58465846
"resources": {
5847-
"description": "Optional. A list of resources to match against the resource of the source VM of a request. Limited to 5 resources.",
5847+
"description": "Optional. A list of resources to match against the resource of the source VM of a request. Limited to 10 resources per Authorization Policy.",
58485848
"items": {
58495849
"$ref": "AuthzPolicyAuthzRuleRequestResource"
58505850
},
@@ -5902,9 +5902,9 @@
59025902
],
59035903
"enumDescriptions": [
59045904
"Unspecified principal selector. It will be treated as CLIENT_CERT_URI_SAN by default.",
5905-
"The principal rule is matched against a list of URI SANs in the validated clients certificate. A match happens when there is any exact URI SAN value match. This is the default principal selector.",
5906-
"The principal rule is matched against a list of DNS Name SANs in the validated clients certificate. A match happens when there is any exact DNS Name SAN value match.",
5907-
"The principal rule is matched against the common name in the clients certificate. Authorization against multiple common names in the client certificate is not supported. Requests with multiple common names in the client certificate will be rejected if CLIENT_CERT_COMMON_NAME is set as the principal selector. A match happens when there is an exact common name value match. This is only applicable for Application Load Balancers except for classic Global External Application load balancer. CLIENT_CERT_COMMON_NAME is not supported for INTERNAL_SELF_MANAGED load balancing scheme."
5905+
"The principal rule is matched against a list of URI SANs in the validated client's certificate. A match happens when there is any exact URI SAN value match. This is the default principal selector.",
5906+
"The principal rule is matched against a list of DNS Name SANs in the validated client's certificate. A match happens when there is any exact DNS Name SAN value match.",
5907+
"The principal rule is matched against the common name in the client's certificate. Authorization against multiple common names in the client certificate is not supported. Requests with multiple common names in the client certificate will be rejected if CLIENT_CERT_COMMON_NAME is set as the principal selector. A match happens when there is an exact common name value match. This is only applicable for Application Load Balancers except for classic Global External Application load balancer. CLIENT_CERT_COMMON_NAME is not supported for INTERNAL_SELF_MANAGED load balancing scheme."
59085908
],
59095909
"type": "string"
59105910
}
@@ -5931,7 +5931,7 @@
59315931
"id": "AuthzPolicyAuthzRuleRequestResourceTagValueIdSet",
59325932
"properties": {
59335933
"ids": {
5934-
"description": "Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 matches.",
5934+
"description": "Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 ids in the Tag value id set.",
59355935
"items": {
59365936
"format": "int64",
59375937
"type": "string"
@@ -5998,21 +5998,21 @@
59985998
"description": "Optional. A list of headers to match against in http header."
59995999
},
60006000
"hosts": {
6001-
"description": "Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.",
6001+
"description": "Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 hosts per Authorization Policy.",
60026002
"items": {
60036003
"$ref": "AuthzPolicyAuthzRuleStringMatch"
60046004
},
60056005
"type": "array"
60066006
},
60076007
"methods": {
6008-
"description": "Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive.",
6008+
"description": "Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive. Limited to 10 methods per Authorization Policy.",
60096009
"items": {
60106010
"type": "string"
60116011
},
60126012
"type": "array"
60136013
},
60146014
"paths": {
6015-
"description": "Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.",
6015+
"description": "Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 paths per Authorization Policy. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.",
60166016
"items": {
60176017
"$ref": "AuthzPolicyAuthzRuleStringMatch"
60186018
},
@@ -6026,7 +6026,7 @@
60266026
"id": "AuthzPolicyAuthzRuleToRequestOperationHeaderSet",
60276027
"properties": {
60286028
"headers": {
6029-
"description": "Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.",
6029+
"description": "Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 10 headers per Authorization Policy.",
60306030
"items": {
60316031
"$ref": "AuthzPolicyAuthzRuleHeaderMatch"
60326032
},
@@ -6298,7 +6298,7 @@
62986298
"type": "object"
62996299
},
63006300
"DnsThreatDetector": {
6301-
"description": "Message describing DnsThreatDetector object",
6301+
"description": "Message describing DnsThreatDetector object.",
63026302
"id": "DnsThreatDetector",
63036303
"properties": {
63046304
"createTime": {
@@ -7456,7 +7456,7 @@
74567456
"type": "object"
74577457
},
74587458
"ListDnsThreatDetectorsResponse": {
7459-
"description": "Message for response to listing DnsThreatDetectors",
7459+
"description": "Message for response to listing DnsThreatDetectors.",
74607460
"id": "ListDnsThreatDetectorsResponse",
74617461
"properties": {
74627462
"dnsThreatDetectors": {

0 commit comments

Comments
 (0)