Skip to content

Commit 6a86124

Browse files
feat: Automated regeneration of gmail v1 client (googleapis#23515)
Auto-created at 2025-06-22 10:33:19 +0000 using the toys pull request generator.
1 parent 447688b commit 6a86124

File tree

4 files changed

+139
-17
lines changed

4 files changed

+139
-17
lines changed

generated/google-apis-gmail_v1/CHANGELOG.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
# Release history for google-apis-gmail_v1
22

3+
### v0.44.0 (2025-06-22)
4+
5+
* Regenerated from discovery document revision 20250616
6+
* Regenerated using generator version 0.18.0
7+
38
### v0.43.0 (2025-05-04)
49

510
* Regenerated using generator version 0.17.0

generated/google-apis-gmail_v1/lib/google/apis/gmail_v1/classes.rb

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,15 @@ def update!(**args)
108108
# The client-side encryption (CSE) configuration for the email address of an
109109
# authenticated user. Gmail uses CSE configurations to save drafts of client-
110110
# side encrypted email messages, and to sign and send encrypted email messages.
111+
# For administrators managing identities and keypairs for users in their
112+
# organization, requests require authorization with a [service account](https://
113+
# developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
114+
# domain-wide delegation authority](https://developers.google.com/identity/
115+
# protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
116+
# the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
117+
# managing their own identities and keypairs, requests require [hardware key
118+
# encryption](https://support.google.com/a/answer/14153163) turned on and
119+
# configured.
111120
class CseIdentity
112121
include Google::Apis::Core::Hashable
113122

@@ -145,7 +154,15 @@ def update!(**args)
145154
# key pair to complete the following tasks: - Sign outgoing client-side
146155
# encrypted messages. - Save and reopen drafts of client-side encrypted messages.
147156
# - Save and reopen sent messages. - Decrypt incoming or archived S/MIME
148-
# messages.
157+
# messages. For administrators managing identities and keypairs for users in
158+
# their organization, requests require authorization with a [service account](
159+
# https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that
160+
# has [domain-wide delegation authority](https://developers.google.com/identity/
161+
# protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
162+
# the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
163+
# managing their own identities and keypairs, requests require [hardware key
164+
# encryption](https://support.google.com/a/answer/14153163) turned on and
165+
# configured.
149166
class CseKeyPair
150167
include Google::Apis::Core::Hashable
151168

@@ -210,7 +227,11 @@ def update!(**args)
210227
class CsePrivateKeyMetadata
211228
include Google::Apis::Core::Hashable
212229

213-
# Metadata for hardware keys.
230+
# Metadata for hardware keys. If [hardware key encryption](https://support.
231+
# google.com/a/answer/14153163) is set up for the Google Workspace organization,
232+
# users can optionally store their private key on their smart card and use it to
233+
# sign and decrypt email messages in Gmail by inserting their smart card into a
234+
# reader attached to their Windows device.
214235
# Corresponds to the JSON property `hardwareKeyMetadata`
215236
# @return [Google::Apis::GmailV1::HardwareKeyMetadata]
216237
attr_accessor :hardware_key_metadata
@@ -485,7 +506,11 @@ def update!(**args)
485506
end
486507
end
487508

488-
# Metadata for hardware keys.
509+
# Metadata for hardware keys. If [hardware key encryption](https://support.
510+
# google.com/a/answer/14153163) is set up for the Google Workspace organization,
511+
# users can optionally store their private key on their smart card and use it to
512+
# sign and decrypt email messages in Gmail by inserting their smart card into a
513+
# reader attached to their Windows device.
489514
class HardwareKeyMetadata
490515
include Google::Apis::Core::Hashable
491516

generated/google-apis-gmail_v1/lib/google/apis/gmail_v1/gem_version.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ module Google
1616
module Apis
1717
module GmailV1
1818
# Version of the google-apis-gmail_v1 gem
19-
GEM_VERSION = "0.43.0"
19+
GEM_VERSION = "0.44.0"
2020

2121
# Version of the code generator used to generate this client
22-
GENERATOR_VERSION = "0.17.0"
22+
GENERATOR_VERSION = "0.18.0"
2323

2424
# Revision of the discovery document this client was generated from
25-
REVISION = "20250331"
25+
REVISION = "20250616"
2626
end
2727
end
2828
end

generated/google-apis-gmail_v1/lib/google/apis/gmail_v1/service.rb

Lines changed: 103 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1492,7 +1492,15 @@ def update_user_setting_vacation(user_id, vacation_settings_object = nil, fields
14921492
# Creates and configures a client-side encryption identity that's authorized to
14931493
# send mail from the user account. Google publishes the S/MIME certificate to a
14941494
# shared domain-wide directory so that people within a Google Workspace
1495-
# organization can encrypt and send mail to the identity.
1495+
# organization can encrypt and send mail to the identity. For administrators
1496+
# managing identities and keypairs for users in their organization, requests
1497+
# require authorization with a [service account](https://developers.google.com/
1498+
# identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1499+
# authority](https://developers.google.com/identity/protocols/
1500+
# OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1501+
# //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1502+
# their own identities and keypairs, requests require [hardware key encryption](
1503+
# https://support.google.com/a/answer/14153163) turned on and configured.
14961504
# @param [String] user_id
14971505
# The requester's primary email address. To indicate the authenticated user, you
14981506
# can use the special value `me`.
@@ -1529,7 +1537,15 @@ def create_user_setting_cse_identity(user_id, cse_identity_object = nil, fields:
15291537
# Deletes a client-side encryption identity. The authenticated user can no
15301538
# longer use the identity to send encrypted messages. You cannot restore the
15311539
# identity after you delete it. Instead, use the CreateCseIdentity method to
1532-
# create another identity with the same configuration.
1540+
# create another identity with the same configuration. For administrators
1541+
# managing identities and keypairs for users in their organization, requests
1542+
# require authorization with a [service account](https://developers.google.com/
1543+
# identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1544+
# authority](https://developers.google.com/identity/protocols/
1545+
# OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1546+
# //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1547+
# their own identities and keypairs, requests require [hardware key encryption](
1548+
# https://support.google.com/a/answer/14153163) turned on and configured.
15331549
# @param [String] user_id
15341550
# The requester's primary email address. To indicate the authenticated user, you
15351551
# can use the special value `me`.
@@ -1562,7 +1578,15 @@ def delete_user_setting_cse_identity(user_id, cse_email_address, fields: nil, qu
15621578
execute_or_queue_command(command, &block)
15631579
end
15641580

1565-
# Retrieves a client-side encryption identity configuration.
1581+
# Retrieves a client-side encryption identity configuration. For administrators
1582+
# managing identities and keypairs for users in their organization, requests
1583+
# require authorization with a [service account](https://developers.google.com/
1584+
# identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1585+
# authority](https://developers.google.com/identity/protocols/
1586+
# OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1587+
# //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1588+
# their own identities and keypairs, requests require [hardware key encryption](
1589+
# https://support.google.com/a/answer/14153163) turned on and configured.
15661590
# @param [String] user_id
15671591
# The requester's primary email address. To indicate the authenticated user, you
15681592
# can use the special value `me`.
@@ -1597,7 +1621,16 @@ def get_user_setting_cse_identity(user_id, cse_email_address, fields: nil, quota
15971621
execute_or_queue_command(command, &block)
15981622
end
15991623

1600-
# Lists the client-side encrypted identities for an authenticated user.
1624+
# Lists the client-side encrypted identities for an authenticated user. For
1625+
# administrators managing identities and keypairs for users in their
1626+
# organization, requests require authorization with a [service account](https://
1627+
# developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1628+
# domain-wide delegation authority](https://developers.google.com/identity/
1629+
# protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1630+
# the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1631+
# managing their own identities and keypairs, requests require [hardware key
1632+
# encryption](https://support.google.com/a/answer/14153163) turned on and
1633+
# configured.
16011634
# @param [String] user_id
16021635
# The requester's primary email address. To indicate the authenticated user, you
16031636
# can use the special value `me`.
@@ -1638,7 +1671,16 @@ def list_user_setting_cse_identities(user_id, page_size: nil, page_token: nil, f
16381671

16391672
# Associates a different key pair with an existing client-side encryption
16401673
# identity. The updated key pair must validate against Google's [S/MIME
1641-
# certificate profiles](https://support.google.com/a/answer/7300887).
1674+
# certificate profiles](https://support.google.com/a/answer/7300887). For
1675+
# administrators managing identities and keypairs for users in their
1676+
# organization, requests require authorization with a [service account](https://
1677+
# developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1678+
# domain-wide delegation authority](https://developers.google.com/identity/
1679+
# protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1680+
# the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1681+
# managing their own identities and keypairs, requests require [hardware key
1682+
# encryption](https://support.google.com/a/answer/14153163) turned on and
1683+
# configured.
16421684
# @param [String] user_id
16431685
# The requester's primary email address. To indicate the authenticated user, you
16441686
# can use the special value `me`.
@@ -1676,7 +1718,15 @@ def patch_user_setting_cse_identity(user_id, email_address, cse_identity_object
16761718
end
16771719

16781720
# Creates and uploads a client-side encryption S/MIME public key certificate
1679-
# chain and private key metadata for the authenticated user.
1721+
# chain and private key metadata for the authenticated user. For administrators
1722+
# managing identities and keypairs for users in their organization, requests
1723+
# require authorization with a [service account](https://developers.google.com/
1724+
# identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1725+
# authority](https://developers.google.com/identity/protocols/
1726+
# OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1727+
# //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1728+
# their own identities and keypairs, requests require [hardware key encryption](
1729+
# https://support.google.com/a/answer/14153163) turned on and configured.
16801730
# @param [String] user_id
16811731
# The requester's primary email address. To indicate the authenticated user, you
16821732
# can use the special value `me`.
@@ -1714,7 +1764,15 @@ def create_user_setting_cse_keypair(user_id, cse_key_pair_object = nil, fields:
17141764
# longer use the key pair to decrypt incoming CSE message texts or sign outgoing
17151765
# CSE mail. To regain access, use the EnableCseKeyPair to turn on the key pair.
17161766
# After 30 days, you can permanently delete the key pair by using the
1717-
# ObliterateCseKeyPair method.
1767+
# ObliterateCseKeyPair method. For administrators managing identities and
1768+
# keypairs for users in their organization, requests require authorization with
1769+
# a [service account](https://developers.google.com/identity/protocols/
1770+
# OAuth2ServiceAccount) that has [domain-wide delegation authority](https://
1771+
# developers.google.com/identity/protocols/OAuth2ServiceAccount#
1772+
# delegatingauthority) to impersonate users with the `https://www.googleapis.com/
1773+
# auth/gmail.settings.basic` scope. For users managing their own identities and
1774+
# keypairs, requests require [hardware key encryption](https://support.google.
1775+
# com/a/answer/14153163) turned on and configured.
17181776
# @param [String] user_id
17191777
# The requester's primary email address. To indicate the authenticated user, you
17201778
# can use the special value `me`.
@@ -1752,7 +1810,16 @@ def disable_keypair_cse_key_pair(user_id, key_pair_id, disable_cse_key_pair_requ
17521810
end
17531811

17541812
# Turns on a client-side encryption key pair that was turned off. The key pair
1755-
# becomes active again for any associated client-side encryption identities.
1813+
# becomes active again for any associated client-side encryption identities. For
1814+
# administrators managing identities and keypairs for users in their
1815+
# organization, requests require authorization with a [service account](https://
1816+
# developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1817+
# domain-wide delegation authority](https://developers.google.com/identity/
1818+
# protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1819+
# the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1820+
# managing their own identities and keypairs, requests require [hardware key
1821+
# encryption](https://support.google.com/a/answer/14153163) turned on and
1822+
# configured.
17561823
# @param [String] user_id
17571824
# The requester's primary email address. To indicate the authenticated user, you
17581825
# can use the special value `me`.
@@ -1789,7 +1856,15 @@ def enable_keypair_cse_key_pair(user_id, key_pair_id, enable_cse_key_pair_reques
17891856
execute_or_queue_command(command, &block)
17901857
end
17911858

1792-
# Retrieves an existing client-side encryption key pair.
1859+
# Retrieves an existing client-side encryption key pair. For administrators
1860+
# managing identities and keypairs for users in their organization, requests
1861+
# require authorization with a [service account](https://developers.google.com/
1862+
# identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1863+
# authority](https://developers.google.com/identity/protocols/
1864+
# OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1865+
# //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1866+
# their own identities and keypairs, requests require [hardware key encryption](
1867+
# https://support.google.com/a/answer/14153163) turned on and configured.
17931868
# @param [String] user_id
17941869
# The requester's primary email address. To indicate the authenticated user, you
17951870
# can use the special value `me`.
@@ -1823,7 +1898,16 @@ def get_user_setting_cse_keypair(user_id, key_pair_id, fields: nil, quota_user:
18231898
execute_or_queue_command(command, &block)
18241899
end
18251900

1826-
# Lists client-side encryption key pairs for an authenticated user.
1901+
# Lists client-side encryption key pairs for an authenticated user. For
1902+
# administrators managing identities and keypairs for users in their
1903+
# organization, requests require authorization with a [service account](https://
1904+
# developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1905+
# domain-wide delegation authority](https://developers.google.com/identity/
1906+
# protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1907+
# the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1908+
# managing their own identities and keypairs, requests require [hardware key
1909+
# encryption](https://support.google.com/a/answer/14153163) turned on and
1910+
# configured.
18271911
# @param [String] user_id
18281912
# The requester's primary email address. To indicate the authenticated user, you
18291913
# can use the special value `me`.
@@ -1867,7 +1951,15 @@ def list_user_setting_cse_keypairs(user_id, page_size: nil, page_token: nil, fie
18671951
# days. To turn off a key pair, use the DisableCseKeyPair method. Gmail can't
18681952
# restore or decrypt any messages that were encrypted by an obliterated key.
18691953
# Authenticated users and Google Workspace administrators lose access to reading
1870-
# the encrypted messages.
1954+
# the encrypted messages. For administrators managing identities and keypairs
1955+
# for users in their organization, requests require authorization with a [
1956+
# service account](https://developers.google.com/identity/protocols/
1957+
# OAuth2ServiceAccount) that has [domain-wide delegation authority](https://
1958+
# developers.google.com/identity/protocols/OAuth2ServiceAccount#
1959+
# delegatingauthority) to impersonate users with the `https://www.googleapis.com/
1960+
# auth/gmail.settings.basic` scope. For users managing their own identities and
1961+
# keypairs, requests require [hardware key encryption](https://support.google.
1962+
# com/a/answer/14153163) turned on and configured.
18711963
# @param [String] user_id
18721964
# The requester's primary email address. To indicate the authenticated user, you
18731965
# can use the special value `me`.

0 commit comments

Comments
 (0)