|
1095 | 1095 | }
|
1096 | 1096 | }
|
1097 | 1097 | },
|
1098 |
| - "revision": "20240831", |
| 1098 | + "revision": "20250104", |
1099 | 1099 | "rootUrl": "https://cloudasset.googleapis.com/",
|
1100 | 1100 | "schemas": {
|
1101 | 1101 | "AccessSelector": {
|
|
1170 | 1170 | "description": "The main analysis that matches the original request."
|
1171 | 1171 | },
|
1172 | 1172 | "serviceAccountImpersonationAnalysis": {
|
1173 |
| - "description": "The service account impersonation analysis if AnalyzeIamPolicyRequest.analyze_service_account_impersonation is enabled.", |
| 1173 | + "description": "The service account impersonation analysis if IamPolicyAnalysisQuery.Options.analyze_service_account_impersonation is enabled.", |
1174 | 1174 | "items": {
|
1175 | 1175 | "$ref": "IamPolicyAnalysis"
|
1176 | 1176 | },
|
|
1620 | 1620 | "id": "EffectiveTagDetails",
|
1621 | 1621 | "properties": {
|
1622 | 1622 | "attachedResource": {
|
1623 |
| - "description": "The [full resource name](https://cloud.google.com/asset-inventory/docs/resource-name-format) of the ancestor from which an effective_tag is inherited, according to [tag inheritance](https://cloud.google.com/resource-manager/docs/tags/tags-overview#inheritance).", |
| 1623 | + "description": "The [full resource name](https://cloud.google.com/asset-inventory/docs/resource-name-format) of the ancestor from which effective_tags are inherited, according to [tag inheritance](https://cloud.google.com/resource-manager/docs/tags/tags-overview#inheritance).", |
1624 | 1624 | "type": "string"
|
1625 | 1625 | },
|
1626 | 1626 | "effectiveTags": {
|
|
1884 | 1884 | "description": "A Google Cloud resource governed by the organization policies of the AnalyzeOrgPolicyGovernedAssetsRequest.constraint."
|
1885 | 1885 | },
|
1886 | 1886 | "policyBundle": {
|
1887 |
| - "description": "The ordered list of all organization policies from the AnalyzeOrgPoliciesResponse.OrgPolicyResult.consolidated_policy.attached_resource to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.", |
| 1887 | + "description": "The ordered list of all organization policies from the consolidated_policy.attached_resource to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.", |
1888 | 1888 | "items": {
|
1889 | 1889 | "$ref": "AnalyzerOrgPolicy"
|
1890 | 1890 | },
|
|
2174 | 2174 | "type": "string"
|
2175 | 2175 | },
|
2176 | 2176 | "policyBundle": {
|
2177 |
| - "description": "The ordered list of all organization policies from the AnalyzeOrgPoliciesResponse.OrgPolicyResult.consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.", |
| 2177 | + "description": "The ordered list of all organization policies from the consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.", |
2178 | 2178 | "items": {
|
2179 | 2179 | "$ref": "AnalyzerOrgPolicy"
|
2180 | 2180 | },
|
|
2871 | 2871 | "egressTo": {
|
2872 | 2872 | "$ref": "GoogleIdentityAccesscontextmanagerV1EgressTo",
|
2873 | 2873 | "description": "Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply."
|
| 2874 | + }, |
| 2875 | + "title": { |
| 2876 | + "description": "Optional. Human-readable title for the egress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.", |
| 2877 | + "type": "string" |
2874 | 2878 | }
|
2875 | 2879 | },
|
2876 | 2880 | "type": "object"
|
|
2882 | 2886 | "accessLevel": {
|
2883 | 2887 | "description": "An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.",
|
2884 | 2888 | "type": "string"
|
| 2889 | + }, |
| 2890 | + "resource": { |
| 2891 | + "description": "A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources.", |
| 2892 | + "type": "string" |
2885 | 2893 | }
|
2886 | 2894 | },
|
2887 | 2895 | "type": "object"
|
|
2962 | 2970 | "ingressTo": {
|
2963 | 2971 | "$ref": "GoogleIdentityAccesscontextmanagerV1IngressTo",
|
2964 | 2972 | "description": "Defines the conditions on the ApiOperation and request destination that cause this IngressPolicy to apply."
|
| 2973 | + }, |
| 2974 | + "title": { |
| 2975 | + "description": "Optional. Human-readable title for the ingress rule. The title must be unique within the perimeter and can not exceed 100 characters. Within the access policy, the combined length of all rule titles must not exceed 240,000 characters.", |
| 2976 | + "type": "string" |
2965 | 2977 | }
|
2966 | 2978 | },
|
2967 | 2979 | "type": "object"
|
|
3062 | 3074 | "description": "Description of the `ServicePerimeter` and its use. Does not affect behavior.",
|
3063 | 3075 | "type": "string"
|
3064 | 3076 | },
|
| 3077 | + "etag": { |
| 3078 | + "description": "Optional. An opaque identifier for the current version of the `ServicePerimeter`. This identifier does not follow any specific format. If an etag is not provided, the operation will be performed as if a valid etag is provided.", |
| 3079 | + "type": "string" |
| 3080 | + }, |
3065 | 3081 | "name": {
|
3066 | 3082 | "description": "Identifier. Resource name for the `ServicePerimeter`. Format: `accessPolicies/{access_policy}/servicePerimeters/{service_perimeter}`. The `service_perimeter` component must begin with a letter, followed by alphanumeric characters or `_`. After you create a `ServicePerimeter`, you cannot change its `name`.",
|
3067 | 3083 | "type": "string"
|
|
3658 | 3674 | "properties": {
|
3659 | 3675 | "consolidatedPolicy": {
|
3660 | 3676 | "$ref": "AnalyzerOrgPolicy",
|
3661 |
| - "description": "The consolidated organization policy for the analyzed resource. The consolidated organization policy is computed by merging and evaluating AnalyzeOrgPoliciesResponse.policy_bundle. The evaluation will respect the organization policy [hierarchy rules](https://cloud.google.com/resource-manager/docs/organization-policy/understanding-hierarchy)." |
| 3677 | + "description": "The consolidated organization policy for the analyzed resource. The consolidated organization policy is computed by merging and evaluating policy_bundle. The evaluation will respect the organization policy [hierarchy rules](https://cloud.google.com/resource-manager/docs/organization-policy/understanding-hierarchy)." |
3662 | 3678 | },
|
3663 | 3679 | "folders": {
|
3664 | 3680 | "description": "The folder(s) that this consolidated policy belongs to, in the format of folders/{FOLDER_NUMBER}. This field is available when the consolidated policy belongs (directly or cascadingly) to one or more folders.",
|
|
3672 | 3688 | "type": "string"
|
3673 | 3689 | },
|
3674 | 3690 | "policyBundle": {
|
3675 |
| - "description": "The ordered list of all organization policies from the AnalyzeOrgPoliciesResponse.OrgPolicyResult.consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.", |
| 3691 | + "description": "The ordered list of all organization policies from the consolidated_policy.attached_resource. to the scope specified in the request. If the constraint is defined with default policy, it will also appear in the list.", |
3676 | 3692 | "items": {
|
3677 | 3693 | "$ref": "AnalyzerOrgPolicy"
|
3678 | 3694 | },
|
|
0 commit comments