Skip to content

Commit 17aae81

Browse files
chore: Update discovery artifacts (#2427)
## Deleted keys were detected in the following stable discovery artifacts: bigquery v2 https://togithub.com/googleapis/google-api-python-client/commit/1b44551ace1aea63571dc86e3927e79cb49e7d07 policysimulator v1 https://togithub.com/googleapis/google-api-python-client/commit/57723e593f60fae72fb27b61bda5a6eb606bfccd ## Deleted keys were detected in the following pre-stable discovery artifacts: sqladmin v1beta4 https://togithub.com/googleapis/google-api-python-client/commit/6fe857f679c65af446b35f7b5b50cd6383bc777a ## Discovery Artifact Change Summary: feat(accesscontextmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/84a06e1c93c9265010757417ae114849070f9eaa feat(analyticshub): update the api https://togithub.com/googleapis/google-api-python-client/commit/572f7cab3f7da1f7273efdca1bf9bd7d679acb77 feat(beyondcorp): update the api https://togithub.com/googleapis/google-api-python-client/commit/93cbb474022ec6fe394a93cbf5a4ad4b62e2ba69 feat(bigquery): update the api https://togithub.com/googleapis/google-api-python-client/commit/1b44551ace1aea63571dc86e3927e79cb49e7d07 feat(chat): update the api https://togithub.com/googleapis/google-api-python-client/commit/c4485d4e275bfb35e22bc44c1f61a7507b81da2e feat(cloudcontrolspartner): update the api https://togithub.com/googleapis/google-api-python-client/commit/777370823356e8d8e9f5467a025be7c09f40f59c feat(compute): update the api https://togithub.com/googleapis/google-api-python-client/commit/33107239b29391862565a5460f0e6132be5692f4 feat(connectors): update the api https://togithub.com/googleapis/google-api-python-client/commit/00885f5db343e1df6c8f47cb18eee7d1eb33a524 feat(containeranalysis): update the api https://togithub.com/googleapis/google-api-python-client/commit/d7812ed355cbc5c2e93f30ad3d0abb55654c0a3d feat(dataflow): update the api https://togithub.com/googleapis/google-api-python-client/commit/b3907de0778e3c6108f0b1372448ad3ed0a988a9 feat(dialogflow): update the api https://togithub.com/googleapis/google-api-python-client/commit/9f4d3a91a7d2578f580b3bfe07d28bdea4890a3d feat(displayvideo): update the api https://togithub.com/googleapis/google-api-python-client/commit/6c0b5bae60a8698b7db2c34848441b15c3dcafba feat(dlp): update the api https://togithub.com/googleapis/google-api-python-client/commit/0ab9f23ad8bd7d7b90f4afd8a7f66433250c16a6 fix(factchecktools): update the api https://togithub.com/googleapis/google-api-python-client/commit/5066f77cb693d98268730cd92ea12aa4bdad409d feat(file): update the api https://togithub.com/googleapis/google-api-python-client/commit/e59a4de0da478919228ae5676f15c25b11de9f99 feat(firebaseappdistribution): update the api https://togithub.com/googleapis/google-api-python-client/commit/fac0afa90e055bbb437a7489ac4ed48737094a1f feat(gkehub): update the api https://togithub.com/googleapis/google-api-python-client/commit/5c8cd184754868338928074de0b71c1fd92714f3 feat(logging): update the api https://togithub.com/googleapis/google-api-python-client/commit/925c0b82afdcc0dcd663268b4ac3f1af0696b33b feat(metastore): update the api https://togithub.com/googleapis/google-api-python-client/commit/891fe5a12e32b41f3488728b6d2e19e3e3cc1f3c feat(migrationcenter): update the api https://togithub.com/googleapis/google-api-python-client/commit/65e7d2381ad7201b7eaaf7b10f2c4ac20bba7bb4 feat(ondemandscanning): update the api https://togithub.com/googleapis/google-api-python-client/commit/2b468b2d3ce9d47369594ac1c7b7e371fc462a3f feat(policysimulator): update the api https://togithub.com/googleapis/google-api-python-client/commit/57723e593f60fae72fb27b61bda5a6eb606bfccd feat(pubsub): update the api https://togithub.com/googleapis/google-api-python-client/commit/09a4806aa0db8ee3a337a1f7abc13251d2fb4f04 feat(sqladmin): update the api https://togithub.com/googleapis/google-api-python-client/commit/6fe857f679c65af446b35f7b5b50cd6383bc777a feat(storage): update the api https://togithub.com/googleapis/google-api-python-client/commit/4d3fcef5067512db9034751f5363e7d8e26bd701 feat(tasks): update the api https://togithub.com/googleapis/google-api-python-client/commit/caf8ca809a50a5773442546186e0e68da2d39afa feat(vault): update the api https://togithub.com/googleapis/google-api-python-client/commit/22a9fde6e9bcf5c6452125e4c61d1dd258c51876 feat(workloadmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/796bf11180dd46d3cf41611c38cf5d478ef8ea46 feat(workstations): update the api https://togithub.com/googleapis/google-api-python-client/commit/e6c58903285043d04fcfc2199aa59eead5920cfb
1 parent 3793533 commit 17aae81

File tree

551 files changed

+12371
-2891
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

551 files changed

+12371
-2891
lines changed

docs/dyn/accesscontextmanager_v1.accessPolicies.accessLevels.html

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ <h3>Method Details</h3>
174174
},
175175
},
176176
&quot;description&quot;: &quot;A String&quot;, # Description of the `AccessLevel` and its use. Does not affect behavior.
177-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
177+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
178178
&quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
179179
}
180180

@@ -319,7 +319,7 @@ <h3>Method Details</h3>
319319
},
320320
},
321321
&quot;description&quot;: &quot;A String&quot;, # Description of the `AccessLevel` and its use. Does not affect behavior.
322-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
322+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
323323
&quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
324324
}</pre>
325325
</div>
@@ -405,7 +405,7 @@ <h3>Method Details</h3>
405405
},
406406
},
407407
&quot;description&quot;: &quot;A String&quot;, # Description of the `AccessLevel` and its use. Does not affect behavior.
408-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
408+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
409409
&quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
410410
},
411411
],
@@ -432,7 +432,7 @@ <h3>Method Details</h3>
432432
<pre>Updates an access level. The long-running operation from this RPC has a successful status after the changes to the access level propagate to long-lasting storage. If access levels contain errors, an error response is returned for the first error encountered.
433433

434434
Args:
435-
name: string, Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`. (required)
435+
name: string, Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`. (required)
436436
body: object, The request body.
437437
The object takes the form of:
438438

@@ -494,7 +494,7 @@ <h3>Method Details</h3>
494494
},
495495
},
496496
&quot;description&quot;: &quot;A String&quot;, # Description of the `AccessLevel` and its use. Does not affect behavior.
497-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
497+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
498498
&quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
499499
}
500500

@@ -597,7 +597,7 @@ <h3>Method Details</h3>
597597
},
598598
},
599599
&quot;description&quot;: &quot;A String&quot;, # Description of the `AccessLevel` and its use. Does not affect behavior.
600-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
600+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AccessLevel`. Format: `accessPolicies/{access_policy}/accessLevels/{access_level}`. The `access_level` component must begin with a letter, followed by alphanumeric characters or `_`. Its maximum length is 50 characters. After you create an `AccessLevel`, you cannot change its `name`.
601601
&quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
602602
},
603603
],

docs/dyn/accesscontextmanager_v1.accessPolicies.authorizedOrgsDescs.html

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ <h3>Method Details</h3>
114114
&quot;assetType&quot;: &quot;A String&quot;, # The asset type of this authorized orgs desc. Valid values are `ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
115115
&quot;authorizationDirection&quot;: &quot;A String&quot;, # The direction of the authorization relationship between this organization and the organizations listed in the `orgs` field. The valid values for this field include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this organization to evaluate traffic in the organizations listed in the `orgs` field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `orgs` field to evaluate the traffic in this organization. For the authorization relationship to take effect, all of the organizations must authorize and specify the appropriate relationship direction. For example, if organization A authorized organization B and C to evaluate its traffic, by specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction, organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the authorization direction in their `AuthorizedOrgsDesc` resource.
116116
&quot;authorizationType&quot;: &quot;A String&quot;, # A granular control type for authorization levels. Valid value is `AUTHORIZATION_TYPE_TRUST`.
117-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
117+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
118118
&quot;orgs&quot;: [ # The list of organization ids in this AuthorizedOrgsDesc. Format: `organizations/` Example: `organizations/123456`
119119
&quot;A String&quot;,
120120
],
@@ -202,7 +202,7 @@ <h3>Method Details</h3>
202202
&quot;assetType&quot;: &quot;A String&quot;, # The asset type of this authorized orgs desc. Valid values are `ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
203203
&quot;authorizationDirection&quot;: &quot;A String&quot;, # The direction of the authorization relationship between this organization and the organizations listed in the `orgs` field. The valid values for this field include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this organization to evaluate traffic in the organizations listed in the `orgs` field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `orgs` field to evaluate the traffic in this organization. For the authorization relationship to take effect, all of the organizations must authorize and specify the appropriate relationship direction. For example, if organization A authorized organization B and C to evaluate its traffic, by specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction, organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the authorization direction in their `AuthorizedOrgsDesc` resource.
204204
&quot;authorizationType&quot;: &quot;A String&quot;, # A granular control type for authorization levels. Valid value is `AUTHORIZATION_TYPE_TRUST`.
205-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
205+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
206206
&quot;orgs&quot;: [ # The list of organization ids in this AuthorizedOrgsDesc. Format: `organizations/` Example: `organizations/123456`
207207
&quot;A String&quot;,
208208
],
@@ -231,7 +231,7 @@ <h3>Method Details</h3>
231231
&quot;assetType&quot;: &quot;A String&quot;, # The asset type of this authorized orgs desc. Valid values are `ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
232232
&quot;authorizationDirection&quot;: &quot;A String&quot;, # The direction of the authorization relationship between this organization and the organizations listed in the `orgs` field. The valid values for this field include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this organization to evaluate traffic in the organizations listed in the `orgs` field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `orgs` field to evaluate the traffic in this organization. For the authorization relationship to take effect, all of the organizations must authorize and specify the appropriate relationship direction. For example, if organization A authorized organization B and C to evaluate its traffic, by specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction, organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the authorization direction in their `AuthorizedOrgsDesc` resource.
233233
&quot;authorizationType&quot;: &quot;A String&quot;, # A granular control type for authorization levels. Valid value is `AUTHORIZATION_TYPE_TRUST`.
234-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
234+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
235235
&quot;orgs&quot;: [ # The list of organization ids in this AuthorizedOrgsDesc. Format: `organizations/` Example: `organizations/123456`
236236
&quot;A String&quot;,
237237
],
@@ -260,15 +260,15 @@ <h3>Method Details</h3>
260260
<pre>Updates an authorized orgs desc. The long-running operation from this RPC has a successful status after the authorized orgs desc propagates to long-lasting storage. If a authorized orgs desc contains errors, an error response is returned for the first error encountered. Only the organization list in `AuthorizedOrgsDesc` can be updated. The name, authorization_type, asset_type and authorization_direction cannot be updated.
261261

262262
Args:
263-
name: string, Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`. (required)
263+
name: string, Identifier. Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`. (required)
264264
body: object, The request body.
265265
The object takes the form of:
266266

267267
{ # `AuthorizedOrgsDesc` contains data for an organization&#x27;s authorization policy.
268268
&quot;assetType&quot;: &quot;A String&quot;, # The asset type of this authorized orgs desc. Valid values are `ASSET_TYPE_DEVICE`, and `ASSET_TYPE_CREDENTIAL_STRENGTH`.
269269
&quot;authorizationDirection&quot;: &quot;A String&quot;, # The direction of the authorization relationship between this organization and the organizations listed in the `orgs` field. The valid values for this field include the following: `AUTHORIZATION_DIRECTION_FROM`: Allows this organization to evaluate traffic in the organizations listed in the `orgs` field. `AUTHORIZATION_DIRECTION_TO`: Allows the organizations listed in the `orgs` field to evaluate the traffic in this organization. For the authorization relationship to take effect, all of the organizations must authorize and specify the appropriate relationship direction. For example, if organization A authorized organization B and C to evaluate its traffic, by specifying `AUTHORIZATION_DIRECTION_TO` as the authorization direction, organizations B and C must specify `AUTHORIZATION_DIRECTION_FROM` as the authorization direction in their `AuthorizedOrgsDesc` resource.
270270
&quot;authorizationType&quot;: &quot;A String&quot;, # A granular control type for authorization levels. Valid value is `AUTHORIZATION_TYPE_TRUST`.
271-
&quot;name&quot;: &quot;A String&quot;, # Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
271+
&quot;name&quot;: &quot;A String&quot;, # Identifier. Resource name for the `AuthorizedOrgsDesc`. Format: `accessPolicies/{access_policy}/authorizedOrgsDescs/{authorized_orgs_desc}`. The `authorized_orgs_desc` component must begin with a letter, followed by alphanumeric characters or `_`. After you create an `AuthorizedOrgsDesc`, you cannot change its `name`.
272272
&quot;orgs&quot;: [ # The list of organization ids in this AuthorizedOrgsDesc. Format: `organizations/` Example: `organizations/123456`
273273
&quot;A String&quot;,
274274
],

0 commit comments

Comments
 (0)