Skip to content

Commit d014022

Browse files
feat: Automated regeneration of AccessContextManager client (googleapis#12502)
Auto-created at 2024-11-10 13:11:01 +0000 using the toys pull request generator.
1 parent ac6cc4c commit d014022

File tree

7 files changed

+8
-69
lines changed

7 files changed

+8
-69
lines changed

clients/access_context_manager/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Install this package from [Hex](https://hex.pm) by adding
1111

1212
```elixir
1313
def deps do
14-
[{:google_api_access_context_manager, "~> 0.25"}]
14+
[{:google_api_access_context_manager, "~> 0.26"}]
1515
end
1616
```
1717

clients/access_context_manager/lib/google_api/access_context_manager/v1/metadata.ex

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ defmodule GoogleApi.AccessContextManager.V1 do
2020
API client metadata for GoogleApi.AccessContextManager.V1.
2121
"""
2222

23-
@discovery_revision "20241028"
23+
@discovery_revision "20241103"
2424

2525
def discovery_revision(), do: @discovery_revision
2626
end

clients/access_context_manager/lib/google_api/access_context_manager/v1/model/access_settings.ex

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,20 +22,17 @@ defmodule GoogleApi.AccessContextManager.V1.Model.AccessSettings do
2222
## Attributes
2323
2424
* `accessLevels` (*type:* `list(String.t)`, *default:* `nil`) - Optional. Access level that a user must have to be granted access. Only one access level is supported, not multiple. This repeated field must have exactly one element. Example: "accessPolicies/9522/accessLevels/device_trusted"
25-
* `reauthSettings` (*type:* `GoogleApi.AccessContextManager.V1.Model.ReauthSettings.t`, *default:* `nil`) - Optional. Reauth settings applied to user access on a given AccessScope.
26-
* `sessionSettings` (*type:* `GoogleApi.AccessContextManager.V1.Model.SessionSettings.t`, *default:* `nil`) - Optional. Session settings applied to user access on a given AccessScope. Migrated from ReauthSettings
25+
* `sessionSettings` (*type:* `GoogleApi.AccessContextManager.V1.Model.SessionSettings.t`, *default:* `nil`) - Optional. Session settings applied to user access on a given AccessScope.
2726
"""
2827

2928
use GoogleApi.Gax.ModelBase
3029

3130
@type t :: %__MODULE__{
3231
:accessLevels => list(String.t()) | nil,
33-
:reauthSettings => GoogleApi.AccessContextManager.V1.Model.ReauthSettings.t() | nil,
3432
:sessionSettings => GoogleApi.AccessContextManager.V1.Model.SessionSettings.t() | nil
3533
}
3634

3735
field(:accessLevels, type: :list)
38-
field(:reauthSettings, as: GoogleApi.AccessContextManager.V1.Model.ReauthSettings)
3936
field(:sessionSettings, as: GoogleApi.AccessContextManager.V1.Model.SessionSettings)
4037
end
4138

clients/access_context_manager/lib/google_api/access_context_manager/v1/model/gcp_user_access_binding.ex

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,9 @@ defmodule GoogleApi.AccessContextManager.V1.Model.GcpUserAccessBinding do
2525
* `dryRunAccessLevels` (*type:* `list(String.t)`, *default:* `nil`) - Optional. Dry run access level that will be evaluated but will not be enforced. The access denial based on dry run policy will be logged. Only one access level is supported, not multiple. This list must have exactly one element. Example: "accessPolicies/9522/accessLevels/device_trusted"
2626
* `groupKey` (*type:* `String.t`, *default:* `nil`) - Required. Immutable. Google Group id whose members are subject to this binding's restrictions. See "id" in the [G Suite Directory API's Groups resource] (https://developers.google.com/admin-sdk/directory/v1/reference/groups#resource). If a group's email address/alias is changed, this resource will continue to point at the changed group. This field does not accept group email addresses or aliases. Example: "01d520gv4vjcrht"
2727
* `name` (*type:* `String.t`, *default:* `nil`) - Immutable. Assigned by the server during creation. The last segment has an arbitrary length and has only URI unreserved characters (as defined by [RFC 3986 Section 2.3](https://tools.ietf.org/html/rfc3986#section-2.3)). Should not be specified by the client during creation. Example: "organizations/256/gcpUserAccessBindings/b3-BhcX_Ud5N"
28-
* `reauthSettings` (*type:* `GoogleApi.AccessContextManager.V1.Model.ReauthSettings.t`, *default:* `nil`) - Optional. GCSL policy for the group key.
2928
* `restrictedClientApplications` (*type:* `list(GoogleApi.AccessContextManager.V1.Model.Application.t)`, *default:* `nil`) - Optional. A list of applications that are subject to this binding's restrictions. If the list is empty, the binding restrictions will universally apply to all applications.
3029
* `scopedAccessSettings` (*type:* `list(GoogleApi.AccessContextManager.V1.Model.ScopedAccessSettings.t)`, *default:* `nil`) - Optional. A list of scoped access settings that set this binding's restrictions on a subset of applications. This field cannot be set if restricted_client_applications is set.
31-
* `sessionSettings` (*type:* `GoogleApi.AccessContextManager.V1.Model.SessionSettings.t`, *default:* `nil`) - Optional. GCSL policy for the group key. Migrated from ReauthSettings
30+
* `sessionSettings` (*type:* `GoogleApi.AccessContextManager.V1.Model.SessionSettings.t`, *default:* `nil`) - Optional. GCSL policy for the group key.
3231
"""
3332

3433
use GoogleApi.Gax.ModelBase
@@ -38,7 +37,6 @@ defmodule GoogleApi.AccessContextManager.V1.Model.GcpUserAccessBinding do
3837
:dryRunAccessLevels => list(String.t()) | nil,
3938
:groupKey => String.t() | nil,
4039
:name => String.t() | nil,
41-
:reauthSettings => GoogleApi.AccessContextManager.V1.Model.ReauthSettings.t() | nil,
4240
:restrictedClientApplications =>
4341
list(GoogleApi.AccessContextManager.V1.Model.Application.t()) | nil,
4442
:scopedAccessSettings =>
@@ -50,7 +48,6 @@ defmodule GoogleApi.AccessContextManager.V1.Model.GcpUserAccessBinding do
5048
field(:dryRunAccessLevels, type: :list)
5149
field(:groupKey)
5250
field(:name)
53-
field(:reauthSettings, as: GoogleApi.AccessContextManager.V1.Model.ReauthSettings)
5451

5552
field(:restrictedClientApplications,
5653
as: GoogleApi.AccessContextManager.V1.Model.Application,

clients/access_context_manager/lib/google_api/access_context_manager/v1/model/reauth_settings.ex

Lines changed: 0 additions & 58 deletions
This file was deleted.

clients/access_context_manager/lib/google_api/access_context_manager/v1/model/service_perimeter.ex

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ defmodule GoogleApi.AccessContextManager.V1.Model.ServicePerimeter do
2222
## Attributes
2323
2424
* `description` (*type:* `String.t`, *default:* `nil`) - Description of the `ServicePerimeter` and its use. Does not affect behavior.
25+
* `etag` (*type:* `String.t`, *default:* `nil`) - Optional. An opaque identifier for the current version of the `ServicePerimeter`. Clients should not expect this to be in any specific format. If etag is not provided, the operation will be performed as if a valid etag is provided.
2526
* `name` (*type:* `String.t`, *default:* `nil`) - Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.
2627
* `perimeterType` (*type:* `String.t`, *default:* `nil`) - Perimeter type indicator. A single project or VPC network is allowed to be a member of single regular perimeter, but multiple service perimeter bridges. A project cannot be a included in a perimeter bridge without being included in regular perimeter. For perimeter bridges, the restricted service list as well as access level lists must be empty.
2728
* `spec` (*type:* `GoogleApi.AccessContextManager.V1.Model.ServicePerimeterConfig.t`, *default:* `nil`) - Proposed (or dry run) ServicePerimeter configuration. This configuration allows to specify and test ServicePerimeter configuration without enforcing actual access restrictions. Only allowed to be set when the "use_explicit_dry_run_spec" flag is set.
@@ -34,6 +35,7 @@ defmodule GoogleApi.AccessContextManager.V1.Model.ServicePerimeter do
3435

3536
@type t :: %__MODULE__{
3637
:description => String.t() | nil,
38+
:etag => String.t() | nil,
3739
:name => String.t() | nil,
3840
:perimeterType => String.t() | nil,
3941
:spec => GoogleApi.AccessContextManager.V1.Model.ServicePerimeterConfig.t() | nil,
@@ -43,6 +45,7 @@ defmodule GoogleApi.AccessContextManager.V1.Model.ServicePerimeter do
4345
}
4446

4547
field(:description)
48+
field(:etag)
4649
field(:name)
4750
field(:perimeterType)
4851
field(:spec, as: GoogleApi.AccessContextManager.V1.Model.ServicePerimeterConfig)

clients/access_context_manager/mix.exs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
defmodule GoogleApi.AccessContextManager.Mixfile do
1919
use Mix.Project
2020

21-
@version "0.25.0"
21+
@version "0.26.0"
2222

2323
def project() do
2424
[

0 commit comments

Comments
 (0)