Skip to content

Commit 7045981

Browse files
fix(networksecurity): update the API
#### networksecurity:v1beta1 The following keys were changed: - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.ipBlocks.description - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.principals.description - schemas.AuthzPolicyAuthzRuleFromRequestSource.properties.resources.description - schemas.AuthzPolicyAuthzRulePrincipal.properties.principalSelector.enumDescriptions - schemas.AuthzPolicyAuthzRuleRequestResourceTagValueIdSet.properties.ids.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.hosts.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.methods.description - schemas.AuthzPolicyAuthzRuleToRequestOperation.properties.paths.description - schemas.AuthzPolicyAuthzRuleToRequestOperationHeaderSet.properties.headers.description - schemas.DnsThreatDetector.description - schemas.ListDnsThreatDetectorsResponse.description
1 parent 5c450b7 commit 7045981

File tree

2 files changed

+24
-24
lines changed

2 files changed

+24
-24
lines changed

discovery/networksecurity-v1beta1.json

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5513,7 +5513,7 @@
55135513
}
55145514
}
55155515
},
5516-
"revision": "20250721",
5516+
"revision": "20250804",
55175517
"rootUrl": "https://networksecurity.googleapis.com/",
55185518
"schemas": {
55195519
"AddAddressGroupItemsRequest": {
@@ -5830,21 +5830,21 @@
58305830
"id": "AuthzPolicyAuthzRuleFromRequestSource",
58315831
"properties": {
58325832
"ipBlocks": {
5833-
"description": "Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 5 ip_blocks.",
5833+
"description": "Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 10 ip_blocks per Authorization Policy",
58345834
"items": {
58355835
"$ref": "AuthzPolicyAuthzRuleIpBlock"
58365836
},
58375837
"type": "array"
58385838
},
58395839
"principals": {
5840-
"description": "Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 5 principals.",
5840+
"description": "Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 50 principals per Authorization Policy for Regional Internal Application Load Balancer, Regional External Application Load Balancer, Cross-region Internal Application Load Balancer, and Cloud Service Mesh. Limited to 25 principals per Authorization Policy for Global External Application Load Balancer.",
58415841
"items": {
58425842
"$ref": "AuthzPolicyAuthzRulePrincipal"
58435843
},
58445844
"type": "array"
58455845
},
58465846
"resources": {
5847-
"description": "Optional. A list of resources to match against the resource of the source VM of a request. Limited to 5 resources.",
5847+
"description": "Optional. A list of resources to match against the resource of the source VM of a request. Limited to 10 resources per Authorization Policy.",
58485848
"items": {
58495849
"$ref": "AuthzPolicyAuthzRuleRequestResource"
58505850
},
@@ -5902,9 +5902,9 @@
59025902
],
59035903
"enumDescriptions": [
59045904
"Unspecified principal selector. It will be treated as CLIENT_CERT_URI_SAN by default.",
5905-
"The principal rule is matched against a list of URI SANs in the validated clients certificate. A match happens when there is any exact URI SAN value match. This is the default principal selector.",
5906-
"The principal rule is matched against a list of DNS Name SANs in the validated clients certificate. A match happens when there is any exact DNS Name SAN value match.",
5907-
"The principal rule is matched against the common name in the clients certificate. Authorization against multiple common names in the client certificate is not supported. Requests with multiple common names in the client certificate will be rejected if CLIENT_CERT_COMMON_NAME is set as the principal selector. A match happens when there is an exact common name value match. This is only applicable for Application Load Balancers except for classic Global External Application load balancer. CLIENT_CERT_COMMON_NAME is not supported for INTERNAL_SELF_MANAGED load balancing scheme."
5905+
"The principal rule is matched against a list of URI SANs in the validated client's certificate. A match happens when there is any exact URI SAN value match. This is the default principal selector.",
5906+
"The principal rule is matched against a list of DNS Name SANs in the validated client's certificate. A match happens when there is any exact DNS Name SAN value match.",
5907+
"The principal rule is matched against the common name in the client's certificate. Authorization against multiple common names in the client certificate is not supported. Requests with multiple common names in the client certificate will be rejected if CLIENT_CERT_COMMON_NAME is set as the principal selector. A match happens when there is an exact common name value match. This is only applicable for Application Load Balancers except for classic Global External Application load balancer. CLIENT_CERT_COMMON_NAME is not supported for INTERNAL_SELF_MANAGED load balancing scheme."
59085908
],
59095909
"type": "string"
59105910
}
@@ -5931,7 +5931,7 @@
59315931
"id": "AuthzPolicyAuthzRuleRequestResourceTagValueIdSet",
59325932
"properties": {
59335933
"ids": {
5934-
"description": "Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 matches.",
5934+
"description": "Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 ids in the Tag value id set.",
59355935
"items": {
59365936
"format": "int64",
59375937
"type": "string"
@@ -5998,21 +5998,21 @@
59985998
"description": "Optional. A list of headers to match against in http header."
59995999
},
60006000
"hosts": {
6001-
"description": "Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.",
6001+
"description": "Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 hosts per Authorization Policy.",
60026002
"items": {
60036003
"$ref": "AuthzPolicyAuthzRuleStringMatch"
60046004
},
60056005
"type": "array"
60066006
},
60076007
"methods": {
6008-
"description": "Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive.",
6008+
"description": "Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive. Limited to 10 methods per Authorization Policy.",
60096009
"items": {
60106010
"type": "string"
60116011
},
60126012
"type": "array"
60136013
},
60146014
"paths": {
6015-
"description": "Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.",
6015+
"description": "Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 paths per Authorization Policy. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.",
60166016
"items": {
60176017
"$ref": "AuthzPolicyAuthzRuleStringMatch"
60186018
},
@@ -6026,7 +6026,7 @@
60266026
"id": "AuthzPolicyAuthzRuleToRequestOperationHeaderSet",
60276027
"properties": {
60286028
"headers": {
6029-
"description": "Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.",
6029+
"description": "Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 10 headers per Authorization Policy.",
60306030
"items": {
60316031
"$ref": "AuthzPolicyAuthzRuleHeaderMatch"
60326032
},
@@ -6298,7 +6298,7 @@
62986298
"type": "object"
62996299
},
63006300
"DnsThreatDetector": {
6301-
"description": "Message describing DnsThreatDetector object",
6301+
"description": "Message describing DnsThreatDetector object.",
63026302
"id": "DnsThreatDetector",
63036303
"properties": {
63046304
"createTime": {
@@ -7456,7 +7456,7 @@
74567456
"type": "object"
74577457
},
74587458
"ListDnsThreatDetectorsResponse": {
7459-
"description": "Message for response to listing DnsThreatDetectors",
7459+
"description": "Message for response to listing DnsThreatDetectors.",
74607460
"id": "ListDnsThreatDetectorsResponse",
74617461
"properties": {
74627462
"dnsThreatDetectors": {

src/apis/networksecurity/v1beta1.ts

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -306,15 +306,15 @@ export namespace networksecurity_v1beta1 {
306306
*/
307307
export interface Schema$AuthzPolicyAuthzRuleFromRequestSource {
308308
/**
309-
* Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 5 ip_blocks.
309+
* Optional. A list of IP addresses or IP address ranges to match against the source IP address of the request. Limited to 10 ip_blocks per Authorization Policy
310310
*/
311311
ipBlocks?: Schema$AuthzPolicyAuthzRuleIpBlock[];
312312
/**
313-
* Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 5 principals.
313+
* Optional. A list of identities derived from the client's certificate. This field will not match on a request unless frontend mutual TLS is enabled for the forwarding rule or Gateway and the client certificate has been successfully validated by mTLS. Each identity is a string whose value is matched against a list of URI SANs, DNS Name SANs, or the common name in the client's certificate. A match happens when any principal matches with the rule. Limited to 50 principals per Authorization Policy for Regional Internal Application Load Balancer, Regional External Application Load Balancer, Cross-region Internal Application Load Balancer, and Cloud Service Mesh. Limited to 25 principals per Authorization Policy for Global External Application Load Balancer.
314314
*/
315315
principals?: Schema$AuthzPolicyAuthzRulePrincipal[];
316316
/**
317-
* Optional. A list of resources to match against the resource of the source VM of a request. Limited to 5 resources.
317+
* Optional. A list of resources to match against the resource of the source VM of a request. Limited to 10 resources per Authorization Policy.
318318
*/
319319
resources?: Schema$AuthzPolicyAuthzRuleRequestResource[];
320320
}
@@ -375,7 +375,7 @@ export namespace networksecurity_v1beta1 {
375375
*/
376376
export interface Schema$AuthzPolicyAuthzRuleRequestResourceTagValueIdSet {
377377
/**
378-
* Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 matches.
378+
* Required. A list of resource tag value permanent IDs to match against the resource manager tags value associated with the source VM of a request. The match follows AND semantics which means all the ids must match. Limited to 5 ids in the Tag value id set.
379379
*/
380380
ids?: string[] | null;
381381
}
@@ -426,15 +426,15 @@ export namespace networksecurity_v1beta1 {
426426
*/
427427
headerSet?: Schema$AuthzPolicyAuthzRuleToRequestOperationHeaderSet;
428428
/**
429-
* Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.
429+
* Optional. A list of HTTP Hosts to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 hosts per Authorization Policy.
430430
*/
431431
hosts?: Schema$AuthzPolicyAuthzRuleStringMatch[];
432432
/**
433-
* Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive.
433+
* Optional. A list of HTTP methods to match against. Each entry must be a valid HTTP method name (GET, PUT, POST, HEAD, PATCH, DELETE, OPTIONS). It only allows exact match and is always case sensitive. Limited to 10 methods per Authorization Policy.
434434
*/
435435
methods?: string[] | null;
436436
/**
437-
* Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.
437+
* Optional. A list of paths to match against. The match can be one of exact, prefix, suffix, or contains (substring match). Matches are always case sensitive unless the ignoreCase is set. Limited to 10 paths per Authorization Policy. Note that this path match includes the query parameters. For gRPC services, this should be a fully-qualified name of the form /package.service/method.
438438
*/
439439
paths?: Schema$AuthzPolicyAuthzRuleStringMatch[];
440440
}
@@ -443,7 +443,7 @@ export namespace networksecurity_v1beta1 {
443443
*/
444444
export interface Schema$AuthzPolicyAuthzRuleToRequestOperationHeaderSet {
445445
/**
446-
* Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 5 matches.
446+
* Required. A list of headers to match against in http header. The match can be one of exact, prefix, suffix, or contains (substring match). The match follows AND semantics which means all the headers must match. Matches are always case sensitive unless the ignoreCase is set. Limited to 10 headers per Authorization Policy.
447447
*/
448448
headers?: Schema$AuthzPolicyAuthzRuleHeaderMatch[];
449449
}
@@ -630,7 +630,7 @@ export namespace networksecurity_v1beta1 {
630630
ports?: number[] | null;
631631
}
632632
/**
633-
* Message describing DnsThreatDetector object
633+
* Message describing DnsThreatDetector object.
634634
*/
635635
export interface Schema$DnsThreatDetector {
636636
/**
@@ -1360,7 +1360,7 @@ export namespace networksecurity_v1beta1 {
13601360
nextPageToken?: string | null;
13611361
}
13621362
/**
1363-
* Message for response to listing DnsThreatDetectors
1363+
* Message for response to listing DnsThreatDetectors.
13641364
*/
13651365
export interface Schema$ListDnsThreatDetectorsResponse {
13661366
/**

0 commit comments

Comments
 (0)