Skip to content

Commit 46fab24

Browse files
feat(all): auto-regenerate discovery clients (#2895)
1 parent c1b41c9 commit 46fab24

20 files changed

+192
-111
lines changed

‎CHANGES.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
## [0.209.0](https://github.com/googleapis/google-api-go-client/compare/v0.208.0...v0.209.0) (2024-11-21)
44

55

6+
67
### Features
78

89
* **all:** Auto-regenerate discovery clients ([#2883](https://github.com/googleapis/google-api-go-client/issues/2883)) ([0b83533](https://github.com/googleapis/google-api-go-client/commit/0b8353371f75d5f3645a3fe6b91cdf004566fa4a))

‎admin/directory/v1/admin-api.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4671,7 +4671,7 @@
46714671
}
46724672
}
46734673
},
4674-
"revision": "20241113",
4674+
"revision": "20241126",
46754675
"rootUrl": "https://admin.googleapis.com/",
46764676
"schemas": {
46774677
"Alias": {
@@ -7493,6 +7493,10 @@
74937493
"readOnly": true,
74947494
"type": "string"
74957495
},
7496+
"condition": {
7497+
"description": "Optional. Note: Feature is available to Enterprise Standard, Enterprise Plus, Google Workspace for Education Plus and Cloud Identity Premium customers. No additional setup is needed to use the feature. The condition associated with this role assignment. A `RoleAssignment` with the `condition` field set will only take effect when the resource being accessed meets the condition. If `condition` is empty, the role (`role_id`) is applied to the actor (`assigned_to`) at the scope (`scope_type`) unconditionally. Currently, only two conditions are supported: - To make the `RoleAssignment` only applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) \u0026\u0026 resource.type == 'cloudidentity.googleapis.com/Group'` - To make the `RoleAssignment` not applicable to [Security Groups](https://cloud.google.com/identity/docs/groups#group_types): `!api.getAttribute('cloudidentity.googleapis.com/groups.labels', []).hasAny(['groups.security']) \u0026\u0026 resource.type == 'cloudidentity.googleapis.com/Group'` Currently, the two condition strings have to be verbatim and they only work with the following [pre-built administrator roles](https://support.google.com/a/answer/2405986): - Groups Editor - Groups Reader The condition follows [Cloud IAM condition syntax](https://cloud.google.com/iam/docs/conditions-overview).",
7498+
"type": "string"
7499+
},
74967500
"etag": {
74977501
"description": "ETag of the resource.",
74987502
"type": "string"

‎admin/directory/v1/admin-gen.go

Lines changed: 23 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎cloudidentity/v1/cloudidentity-api.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1487,7 +1487,7 @@
14871487
"type": "integer"
14881488
},
14891489
"pageToken": {
1490-
"description": "The next_page_token value returned from a previous list request, if any",
1490+
"description": "The `next_page_token` value returned from a previous list request, if any",
14911491
"location": "query",
14921492
"type": "string"
14931493
},
@@ -1530,7 +1530,7 @@
15301530
"type": "integer"
15311531
},
15321532
"pageToken": {
1533-
"description": "The next_page_token value returned from a previous list request, if any.",
1533+
"description": "The `next_page_token` value returned from a previous list request, if any.",
15341534
"location": "query",
15351535
"type": "string"
15361536
},
@@ -1542,7 +1542,7 @@
15421542
"type": "string"
15431543
},
15441544
"query": {
1545-
"description": "Required. A CEL expression that MUST include member specification AND label(s). This is a `required` field. Users can search on label attributes of groups. CONTAINS match ('in') is supported on labels. Identity-mapped groups are uniquely identified by both a `member_key_id` and a `member_key_namespace`, which requires an additional query input: `member_key_namespace`. Example query: `member_key_id == 'member_key_id_value' \u0026\u0026 in labels` Query may optionally contain equality operators on the parent of the group restricting the search within a particular customer, e.g. `parent == 'customers/{customer_id}'`. The `customer_id` must begin with \"C\" (for example, 'C046psxkn'). This filtering is only supported for Admins with groups read permissons on the input customer. Example query: `member_key_id == 'member_key_id_value' \u0026\u0026 in labels \u0026\u0026 parent == 'customers/C046psxkn'`",
1545+
"description": "Required. A CEL expression that MUST include member specification AND label(s). This is a `required` field. Users can search on label attributes of groups. CONTAINS match ('in') is supported on labels. Identity-mapped groups are uniquely identified by both a `member_key_id` and a `member_key_namespace`, which requires an additional query input: `member_key_namespace`. Example query: `member_key_id == 'member_key_id_value' \u0026\u0026 in labels` Query may optionally contain equality operators on the parent of the group restricting the search within a particular customer, e.g. `parent == 'customers/{customer_id}'`. The `customer_id` must begin with \"C\" (for example, 'C046psxkn'). This filtering is only supported for Admins with groups read permissions on the input customer. Example query: `member_key_id == 'member_key_id_value' \u0026\u0026 in labels \u0026\u0026 parent == 'customers/C046psxkn'`",
15461546
"location": "query",
15471547
"type": "string"
15481548
}
@@ -1573,7 +1573,7 @@
15731573
"type": "integer"
15741574
},
15751575
"pageToken": {
1576-
"description": "The next_page_token value returned from a previous list request, if any.",
1576+
"description": "The `next_page_token` value returned from a previous list request, if any.",
15771577
"location": "query",
15781578
"type": "string"
15791579
},
@@ -2016,7 +2016,7 @@
20162016
}
20172017
}
20182018
},
2019-
"revision": "20241119",
2019+
"revision": "20241126",
20202020
"rootUrl": "https://cloudidentity.googleapis.com/",
20212021
"schemas": {
20222022
"AddIdpCredentialOperationMetadata": {
@@ -2939,7 +2939,7 @@
29392939
"type": "string"
29402940
},
29412941
"name": {
2942-
"description": "Output only. [Resource name](https://cloud.google.com/apis/design/resource_names) of the Device in format: `devices/{device}`, where device is the unique id assigned to the Device.",
2942+
"description": "Output only. [Resource name](https://cloud.google.com/apis/design/resource_names) of the Device in format: `devices/{device}`, where device is the unique id assigned to the Device. Important: Device API scopes require that you use domain-wide delegation to access the API. For more information, see [Set up the Devices API](https://cloud.google.com/identity/docs/how-to/setup-devices).",
29432943
"readOnly": true,
29442944
"type": "string"
29452945
},
@@ -3787,7 +3787,7 @@
37873787
"id": "MembershipAdjacencyList",
37883788
"properties": {
37893789
"edges": {
3790-
"description": "Each edge contains information about the member that belongs to this group. Note: Fields returned here will help identify the specific Membership resource (e.g name, preferred_member_key and role), but may not be a comprehensive list of all fields.",
3790+
"description": "Each edge contains information about the member that belongs to this group. Note: Fields returned here will help identify the specific Membership resource (e.g `name`, `preferred_member_key` and `role`), but may not be a comprehensive list of all fields.",
37913791
"items": {
37923792
"$ref": "Membership"
37933793
},

‎cloudidentity/v1/cloudidentity-gen.go

Lines changed: 11 additions & 9 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)