Skip to content

Commit 221e35c

Browse files
feat: Automated regeneration of CloudAsset client (googleapis#12782)
Auto-created at 2025-01-08 13:13:11 +0000 using the toys pull request generator.
1 parent 712add8 commit 221e35c

File tree

4 files changed

+7
-4
lines changed

4 files changed

+7
-4
lines changed

clients/cloud_asset/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Install this package from [Hex](https://hex.pm) by adding
1111

1212
```elixir
1313
def deps do
14-
[{:google_api_cloud_asset, "~> 0.41"}]
14+
[{:google_api_cloud_asset, "~> 0.42"}]
1515
end
1616
```
1717

clients/cloud_asset/lib/google_api/cloud_asset/v1/metadata.ex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ defmodule GoogleApi.CloudAsset.V1 do
2020
API client metadata for GoogleApi.CloudAsset.V1.
2121
"""
2222

23-
@discovery_revision "20241211"
23+
@discovery_revision "20250104"
2424

2525
def discovery_revision(), do: @discovery_revision
2626
end

clients/cloud_asset/lib/google_api/cloud_asset/v1/model/google_identity_accesscontextmanager_v1_egress_source.ex

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,18 @@ defmodule GoogleApi.CloudAsset.V1.Model.GoogleIdentityAccesscontextmanagerV1Egre
2222
## Attributes
2323
2424
* `accessLevel` (*type:* `String.t`, *default:* `nil`) - An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
25+
* `resource` (*type:* `String.t`, *default:* `nil`) - A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.
2526
"""
2627

2728
use GoogleApi.Gax.ModelBase
2829

2930
@type t :: %__MODULE__{
30-
:accessLevel => String.t() | nil
31+
:accessLevel => String.t() | nil,
32+
:resource => String.t() | nil
3133
}
3234

3335
field(:accessLevel)
36+
field(:resource)
3437
end
3538

3639
defimpl Poison.Decoder,

clients/cloud_asset/mix.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
defmodule GoogleApi.CloudAsset.Mixfile do
1919
use Mix.Project
2020

21-
@version "0.41.0"
21+
@version "0.42.0"
2222

2323
def project() do
2424
[

0 commit comments

Comments
 (0)