Skip to content

Commit f53d28d

Browse files
1 parent 2e953b2 commit f53d28d

File tree

14 files changed

+136
-132
lines changed

14 files changed

+136
-132
lines changed

clients/google-api-services-networksecurity/v1/2.0.0/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
2222
<dependency>
2323
<groupId>com.google.apis</groupId>
2424
<artifactId>google-api-services-networksecurity</artifactId>
25-
<version>v1-rev20240505-2.0.0</version>
25+
<version>v1-rev20240626-2.0.0</version>
2626
</dependency>
2727
</dependencies>
2828
</project>
@@ -35,7 +35,7 @@ repositories {
3535
mavenCentral()
3636
}
3737
dependencies {
38-
implementation 'com.google.apis:google-api-services-networksecurity:v1-rev20240505-2.0.0'
38+
implementation 'com.google.apis:google-api-services-networksecurity:v1-rev20240626-2.0.0'
3939
}
4040
```
4141

clients/google-api-services-networksecurity/v1/2.0.0/com/google/api/services/networksecurity/v1/model/MTLSPolicy.java

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@
3030
public final class MTLSPolicy extends com.google.api.client.json.GenericJson {
3131

3232
/**
33-
* Required if the policy is to be used with Traffic Director. For external HTTPS load balancers
34-
* it must be empty. Defines the mechanism to obtain the Certificate Authority certificate to
33+
* Required if the policy is to be used with Traffic Director. For Application Load Balancers it
34+
* must be empty. Defines the mechanism to obtain the Certificate Authority certificate to
3535
* validate the client certificate.
3636
* The value may be {@code null}.
3737
*/
@@ -41,7 +41,7 @@ public final class MTLSPolicy extends com.google.api.client.json.GenericJson {
4141
/**
4242
* When the client presents an invalid certificate or no certificate to the load balancer, the
4343
* `client_validation_mode` specifies how the client connection is handled. Required if the policy
44-
* is to be used with the external HTTPS load balancing. For Traffic Director it must be empty.
44+
* is to be used with the Application Load Balancers. For Traffic Director it must be empty.
4545
* The value may be {@code null}.
4646
*/
4747
@com.google.api.client.util.Key
@@ -50,15 +50,15 @@ public final class MTLSPolicy extends com.google.api.client.json.GenericJson {
5050
/**
5151
* Reference to the TrustConfig from certificatemanager.googleapis.com namespace. If specified,
5252
* the chain validation will be performed against certificates configured in the given
53-
* TrustConfig. Allowed only if the policy is to be used with external HTTPS load balancers.
53+
* TrustConfig. Allowed only if the policy is to be used with Application Load Balancers.
5454
* The value may be {@code null}.
5555
*/
5656
@com.google.api.client.util.Key
5757
private java.lang.String clientValidationTrustConfig;
5858

5959
/**
60-
* Required if the policy is to be used with Traffic Director. For external HTTPS load balancers
61-
* it must be empty. Defines the mechanism to obtain the Certificate Authority certificate to
60+
* Required if the policy is to be used with Traffic Director. For Application Load Balancers it
61+
* must be empty. Defines the mechanism to obtain the Certificate Authority certificate to
6262
* validate the client certificate.
6363
* @return value or {@code null} for none
6464
*/
@@ -67,8 +67,8 @@ public java.util.List<ValidationCA> getClientValidationCa() {
6767
}
6868

6969
/**
70-
* Required if the policy is to be used with Traffic Director. For external HTTPS load balancers
71-
* it must be empty. Defines the mechanism to obtain the Certificate Authority certificate to
70+
* Required if the policy is to be used with Traffic Director. For Application Load Balancers it
71+
* must be empty. Defines the mechanism to obtain the Certificate Authority certificate to
7272
* validate the client certificate.
7373
* @param clientValidationCa clientValidationCa or {@code null} for none
7474
*/
@@ -80,7 +80,7 @@ public MTLSPolicy setClientValidationCa(java.util.List<ValidationCA> clientValid
8080
/**
8181
* When the client presents an invalid certificate or no certificate to the load balancer, the
8282
* `client_validation_mode` specifies how the client connection is handled. Required if the policy
83-
* is to be used with the external HTTPS load balancing. For Traffic Director it must be empty.
83+
* is to be used with the Application Load Balancers. For Traffic Director it must be empty.
8484
* @return value or {@code null} for none
8585
*/
8686
public java.lang.String getClientValidationMode() {
@@ -90,7 +90,7 @@ public java.lang.String getClientValidationMode() {
9090
/**
9191
* When the client presents an invalid certificate or no certificate to the load balancer, the
9292
* `client_validation_mode` specifies how the client connection is handled. Required if the policy
93-
* is to be used with the external HTTPS load balancing. For Traffic Director it must be empty.
93+
* is to be used with the Application Load Balancers. For Traffic Director it must be empty.
9494
* @param clientValidationMode clientValidationMode or {@code null} for none
9595
*/
9696
public MTLSPolicy setClientValidationMode(java.lang.String clientValidationMode) {
@@ -101,7 +101,7 @@ public MTLSPolicy setClientValidationMode(java.lang.String clientValidationMode)
101101
/**
102102
* Reference to the TrustConfig from certificatemanager.googleapis.com namespace. If specified,
103103
* the chain validation will be performed against certificates configured in the given
104-
* TrustConfig. Allowed only if the policy is to be used with external HTTPS load balancers.
104+
* TrustConfig. Allowed only if the policy is to be used with Application Load Balancers.
105105
* @return value or {@code null} for none
106106
*/
107107
public java.lang.String getClientValidationTrustConfig() {
@@ -111,7 +111,7 @@ public java.lang.String getClientValidationTrustConfig() {
111111
/**
112112
* Reference to the TrustConfig from certificatemanager.googleapis.com namespace. If specified,
113113
* the chain validation will be performed against certificates configured in the given
114-
* TrustConfig. Allowed only if the policy is to be used with external HTTPS load balancers.
114+
* TrustConfig. Allowed only if the policy is to be used with Application Load Balancers.
115115
* @param clientValidationTrustConfig clientValidationTrustConfig or {@code null} for none
116116
*/
117117
public MTLSPolicy setClientValidationTrustConfig(java.lang.String clientValidationTrustConfig) {

clients/google-api-services-networksecurity/v1/2.0.0/com/google/api/services/networksecurity/v1/model/SecurityProfile.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
package com.google.api.services.networksecurity.v1.model;
1818

1919
/**
20-
* SecurityProfile is a resource that defines the behavior for one of many ProfileTypes. Next ID: 10
20+
* SecurityProfile is a resource that defines the behavior for one of many ProfileTypes. Next ID: 11
2121
*
2222
* <p> This is the Java data model class that specifies how to parse/serialize into the JSON that is
2323
* transmitted over HTTP when working with the Network Security API. For a detailed explanation see:

clients/google-api-services-networksecurity/v1/2.0.0/com/google/api/services/networksecurity/v1/model/SecurityProfileGroup.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,8 @@
1717
package com.google.api.services.networksecurity.v1.model;
1818

1919
/**
20-
* SecurityProfileGroup is a resource that defines the behavior for various ProfileTypes. Next ID: 9
20+
* SecurityProfileGroup is a resource that defines the behavior for various ProfileTypes. Next ID:
21+
* 10
2122
*
2223
* <p> This is the Java data model class that specifies how to parse/serialize into the JSON that is
2324
* transmitted over HTTP when working with the Network Security API. For a detailed explanation see:

clients/google-api-services-networksecurity/v1/2.0.0/com/google/api/services/networksecurity/v1/model/ServerTlsPolicy.java

Lines changed: 47 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -19,10 +19,11 @@
1919
/**
2020
* ServerTlsPolicy is a resource that specifies how a server should authenticate incoming requests.
2121
* This resource itself does not affect configuration unless it is attached to a target HTTPS proxy
22-
* or endpoint config selector resource. ServerTlsPolicy in the form accepted by external HTTPS load
23-
* balancers can be attached only to TargetHttpsProxy with an `EXTERNAL` or `EXTERNAL_MANAGED` load
24-
* balancing scheme. Traffic Director compatible ServerTlsPolicies can be attached to EndpointPolicy
25-
* and TargetHttpsProxy with Traffic Director `INTERNAL_SELF_MANAGED` load balancing scheme.
22+
* or endpoint config selector resource. ServerTlsPolicy in the form accepted by Application Load
23+
* Balancers can be attached only to TargetHttpsProxy with an `EXTERNAL`, `EXTERNAL_MANAGED` or
24+
* `INTERNAL_MANAGED` load balancing scheme. Traffic Director compatible ServerTlsPolicies can be
25+
* attached to EndpointPolicy and TargetHttpsProxy with Traffic Director `INTERNAL_SELF_MANAGED`
26+
* load balancing scheme.
2627
*
2728
* <p> This is the Java data model class that specifies how to parse/serialize into the JSON that is
2829
* transmitted over HTTP when working with the Network Security API. For a detailed explanation see:
@@ -35,13 +36,13 @@
3536
public final class ServerTlsPolicy extends com.google.api.client.json.GenericJson {
3637

3738
/**
38-
* This field applies only for Traffic Director policies. It is must be set to false for external
39-
* HTTPS load balancer policies. Determines if server allows plaintext connections. If set to
40-
* true, server allows plain text connections. By default, it is set to false. This setting is not
41-
* exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are set,
42-
* server allows both plain text and mTLS connections. See documentation of other encryption modes
43-
* to confirm compatibility. Consider using it if you wish to upgrade in place your deployment to
44-
* TLS while having mixed TLS and non-TLS traffic reaching port :80.
39+
* This field applies only for Traffic Director policies. It is must be set to false for
40+
* Application Load Balancer policies. Determines if server allows plaintext connections. If set
41+
* to true, server allows plain text connections. By default, it is set to false. This setting is
42+
* not exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are
43+
* set, server allows both plain text and mTLS connections. See documentation of other encryption
44+
* modes to confirm compatibility. Consider using it if you wish to upgrade in place your
45+
* deployment to TLS while having mixed TLS and non-TLS traffic reaching port :80.
4546
* The value may be {@code null}.
4647
*/
4748
@com.google.api.client.util.Key
@@ -69,11 +70,11 @@ public final class ServerTlsPolicy extends com.google.api.client.json.GenericJso
6970
private java.util.Map<String, java.lang.String> labels;
7071

7172
/**
72-
* This field is required if the policy is used with external HTTPS load balancers. This field can
73-
* be empty for Traffic Director. Defines a mechanism to provision peer validation certificates
74-
* for peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will
75-
* not be requested. The connection is treated as TLS and not mTLS. If `allow_open` and
76-
* `mtls_policy` are set, server allows both plain text and mTLS connections.
73+
* This field is required if the policy is used with Application Load Balancers. This field can be
74+
* empty for Traffic Director. Defines a mechanism to provision peer validation certificates for
75+
* peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will not
76+
* be requested. The connection is treated as TLS and not mTLS. If `allow_open` and `mtls_policy`
77+
* are set, server allows both plain text and mTLS connections.
7778
* The value may be {@code null}.
7879
*/
7980
@com.google.api.client.util.Key
@@ -88,8 +89,8 @@ public final class ServerTlsPolicy extends com.google.api.client.json.GenericJso
8889
private java.lang.String name;
8990

9091
/**
91-
* Optional if policy is to be used with Traffic Director. For external HTTPS load balancer must
92-
* be empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
92+
* Optional if policy is to be used with Traffic Director. For Application Load Balancers must be
93+
* empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
9394
* combined with `allow_open` as a permissive mode that allows both plain text and TLS is not
9495
* supported.
9596
* The value may be {@code null}.
@@ -105,27 +106,27 @@ public final class ServerTlsPolicy extends com.google.api.client.json.GenericJso
105106
private String updateTime;
106107

107108
/**
108-
* This field applies only for Traffic Director policies. It is must be set to false for external
109-
* HTTPS load balancer policies. Determines if server allows plaintext connections. If set to
110-
* true, server allows plain text connections. By default, it is set to false. This setting is not
111-
* exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are set,
112-
* server allows both plain text and mTLS connections. See documentation of other encryption modes
113-
* to confirm compatibility. Consider using it if you wish to upgrade in place your deployment to
114-
* TLS while having mixed TLS and non-TLS traffic reaching port :80.
109+
* This field applies only for Traffic Director policies. It is must be set to false for
110+
* Application Load Balancer policies. Determines if server allows plaintext connections. If set
111+
* to true, server allows plain text connections. By default, it is set to false. This setting is
112+
* not exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are
113+
* set, server allows both plain text and mTLS connections. See documentation of other encryption
114+
* modes to confirm compatibility. Consider using it if you wish to upgrade in place your
115+
* deployment to TLS while having mixed TLS and non-TLS traffic reaching port :80.
115116
* @return value or {@code null} for none
116117
*/
117118
public java.lang.Boolean getAllowOpen() {
118119
return allowOpen;
119120
}
120121

121122
/**
122-
* This field applies only for Traffic Director policies. It is must be set to false for external
123-
* HTTPS load balancer policies. Determines if server allows plaintext connections. If set to
124-
* true, server allows plain text connections. By default, it is set to false. This setting is not
125-
* exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are set,
126-
* server allows both plain text and mTLS connections. See documentation of other encryption modes
127-
* to confirm compatibility. Consider using it if you wish to upgrade in place your deployment to
128-
* TLS while having mixed TLS and non-TLS traffic reaching port :80.
123+
* This field applies only for Traffic Director policies. It is must be set to false for
124+
* Application Load Balancer policies. Determines if server allows plaintext connections. If set
125+
* to true, server allows plain text connections. By default, it is set to false. This setting is
126+
* not exclusive of other encryption modes. For example, if `allow_open` and `mtls_policy` are
127+
* set, server allows both plain text and mTLS connections. See documentation of other encryption
128+
* modes to confirm compatibility. Consider using it if you wish to upgrade in place your
129+
* deployment to TLS while having mixed TLS and non-TLS traffic reaching port :80.
129130
* @param allowOpen allowOpen or {@code null} for none
130131
*/
131132
public ServerTlsPolicy setAllowOpen(java.lang.Boolean allowOpen) {
@@ -185,23 +186,23 @@ public ServerTlsPolicy setLabels(java.util.Map<String, java.lang.String> labels)
185186
}
186187

187188
/**
188-
* This field is required if the policy is used with external HTTPS load balancers. This field can
189-
* be empty for Traffic Director. Defines a mechanism to provision peer validation certificates
190-
* for peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will
191-
* not be requested. The connection is treated as TLS and not mTLS. If `allow_open` and
192-
* `mtls_policy` are set, server allows both plain text and mTLS connections.
189+
* This field is required if the policy is used with Application Load Balancers. This field can be
190+
* empty for Traffic Director. Defines a mechanism to provision peer validation certificates for
191+
* peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will not
192+
* be requested. The connection is treated as TLS and not mTLS. If `allow_open` and `mtls_policy`
193+
* are set, server allows both plain text and mTLS connections.
193194
* @return value or {@code null} for none
194195
*/
195196
public MTLSPolicy getMtlsPolicy() {
196197
return mtlsPolicy;
197198
}
198199

199200
/**
200-
* This field is required if the policy is used with external HTTPS load balancers. This field can
201-
* be empty for Traffic Director. Defines a mechanism to provision peer validation certificates
202-
* for peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will
203-
* not be requested. The connection is treated as TLS and not mTLS. If `allow_open` and
204-
* `mtls_policy` are set, server allows both plain text and mTLS connections.
201+
* This field is required if the policy is used with Application Load Balancers. This field can be
202+
* empty for Traffic Director. Defines a mechanism to provision peer validation certificates for
203+
* peer to peer authentication (Mutual TLS - mTLS). If not specified, client certificate will not
204+
* be requested. The connection is treated as TLS and not mTLS. If `allow_open` and `mtls_policy`
205+
* are set, server allows both plain text and mTLS connections.
205206
* @param mtlsPolicy mtlsPolicy or {@code null} for none
206207
*/
207208
public ServerTlsPolicy setMtlsPolicy(MTLSPolicy mtlsPolicy) {
@@ -229,8 +230,8 @@ public ServerTlsPolicy setName(java.lang.String name) {
229230
}
230231

231232
/**
232-
* Optional if policy is to be used with Traffic Director. For external HTTPS load balancer must
233-
* be empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
233+
* Optional if policy is to be used with Traffic Director. For Application Load Balancers must be
234+
* empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
234235
* combined with `allow_open` as a permissive mode that allows both plain text and TLS is not
235236
* supported.
236237
* @return value or {@code null} for none
@@ -240,8 +241,8 @@ public GoogleCloudNetworksecurityV1CertificateProvider getServerCertificate() {
240241
}
241242

242243
/**
243-
* Optional if policy is to be used with Traffic Director. For external HTTPS load balancer must
244-
* be empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
244+
* Optional if policy is to be used with Traffic Director. For Application Load Balancers must be
245+
* empty. Defines a mechanism to provision server identity (public and private keys). Cannot be
245246
* combined with `allow_open` as a permissive mode that allows both plain text and TLS is not
246247
* supported.
247248
* @param serverCertificate serverCertificate or {@code null} for none

clients/google-api-services-networksecurity/v1/2.0.0/pom.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@
88

99
<groupId>com.google.apis</groupId>
1010
<artifactId>google-api-services-networksecurity</artifactId>
11-
<version>v1-rev20240505-2.0.0</version>
12-
<name>Network Security API v1-rev20240505-2.0.0</name>
11+
<version>v1-rev20240626-2.0.0</version>
12+
<name>Network Security API v1-rev20240626-2.0.0</name>
1313
<packaging>jar</packaging>
1414

1515
<inceptionYear>2011</inceptionYear>

clients/google-api-services-networksecurity/v1/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
2222
<dependency>
2323
<groupId>com.google.apis</groupId>
2424
<artifactId>google-api-services-networksecurity</artifactId>
25-
<version>v1-rev20240505-2.0.0</version>
25+
<version>v1-rev20240626-2.0.0</version>
2626
</dependency>
2727
</dependencies>
2828
</project>
@@ -35,7 +35,7 @@ repositories {
3535
mavenCentral()
3636
}
3737
dependencies {
38-
implementation 'com.google.apis:google-api-services-networksecurity:v1-rev20240505-2.0.0'
38+
implementation 'com.google.apis:google-api-services-networksecurity:v1-rev20240626-2.0.0'
3939
}
4040
```
4141

clients/google-api-services-networksecurity/v1beta1/2.0.0/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
2222
<dependency>
2323
<groupId>com.google.apis</groupId>
2424
<artifactId>google-api-services-networksecurity</artifactId>
25-
<version>v1beta1-rev20240505-2.0.0</version>
25+
<version>v1beta1-rev20240626-2.0.0</version>
2626
</dependency>
2727
</dependencies>
2828
</project>
@@ -35,7 +35,7 @@ repositories {
3535
mavenCentral()
3636
}
3737
dependencies {
38-
implementation 'com.google.apis:google-api-services-networksecurity:v1beta1-rev20240505-2.0.0'
38+
implementation 'com.google.apis:google-api-services-networksecurity:v1beta1-rev20240626-2.0.0'
3939
}
4040
```
4141

0 commit comments

Comments
 (0)