Skip to content

Commit 301c360

Browse files
feat: Automated regeneration of AccessContextManager client (googleapis#12840)
Auto-created at 2025-01-18 13:14:29 +0000 using the toys pull request generator.
1 parent 3b2f92e commit 301c360

File tree

4 files changed

+7
-4
lines changed

4 files changed

+7
-4
lines changed

clients/access_context_manager/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Install this package from [Hex](https://hex.pm) by adding
1111

1212
```elixir
1313
def deps do
14-
[{:google_api_access_context_manager, "~> 0.27"}]
14+
[{:google_api_access_context_manager, "~> 0.28"}]
1515
end
1616
```
1717

clients/access_context_manager/lib/google_api/access_context_manager/v1/metadata.ex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ defmodule GoogleApi.AccessContextManager.V1 do
2020
API client metadata for GoogleApi.AccessContextManager.V1.
2121
"""
2222

23-
@discovery_revision "20241216"
23+
@discovery_revision "20250115"
2424

2525
def discovery_revision(), do: @discovery_revision
2626
end

clients/access_context_manager/lib/google_api/access_context_manager/v1/model/egress_source.ex

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,18 @@ defmodule GoogleApi.AccessContextManager.V1.Model.EgressSource do
2222
## Attributes
2323
2424
* `accessLevel` (*type:* `String.t`, *default:* `nil`) - An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
25+
* `resource` (*type:* `String.t`, *default:* `nil`) - A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.
2526
"""
2627

2728
use GoogleApi.Gax.ModelBase
2829

2930
@type t :: %__MODULE__{
30-
:accessLevel => String.t() | nil
31+
:accessLevel => String.t() | nil,
32+
:resource => String.t() | nil
3133
}
3234

3335
field(:accessLevel)
36+
field(:resource)
3437
end
3538

3639
defimpl Poison.Decoder, for: GoogleApi.AccessContextManager.V1.Model.EgressSource do

clients/access_context_manager/mix.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
defmodule GoogleApi.AccessContextManager.Mixfile do
1919
use Mix.Project
2020

21-
@version "0.27.2"
21+
@version "0.28.0"
2222

2323
def project() do
2424
[

0 commit comments

Comments
 (0)