# Copyright 2015 Google Inc. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. require 'date' require 'google/apis/core/base_service' require 'google/apis/core/json_representation' require 'google/apis/core/hashable' require 'google/apis/errors' module Google module Apis module CloudassetV1p5beta1 # An asset in Google Cloud. An asset can be any resource in the Google Cloud [ # resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud- # platform-resource-hierarchy), a resource outside the Google Cloud resource # hierarchy (such as Google Kubernetes Engine clusters and objects), or a policy # (e.g. Cloud IAM policy). See [Supported asset types](https://cloud.google.com/ # asset-inventory/docs/supported-asset-types) for more information. class Asset include Google::Apis::Core::Hashable # An `AccessLevel` is a label that can be applied to requests to Google Cloud # services, along with a list of requirements necessary for the label to be # applied. # Corresponds to the JSON property `accessLevel` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1AccessLevel] attr_accessor :access_level # `AccessPolicy` is a container for `AccessLevels` (which define the necessary # attributes to use Google Cloud services) and `ServicePerimeters` (which define # regions of services able to freely pass data within a perimeter). An access # policy is globally visible within an organization, and the restrictions it # specifies apply to all projects within an organization. # Corresponds to the JSON property `accessPolicy` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1AccessPolicy] attr_accessor :access_policy # The ancestry path of an asset in Google Cloud [resource hierarchy](https:// # cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy), # represented as a list of relative resource names. An ancestry path starts with # the closest ancestor in the hierarchy and ends at root. If the asset is a # project, folder, or organization, the ancestry path starts from the asset # itself. Example: `["projects/123456789", "folders/5432", "organizations/1234"]` # Corresponds to the JSON property `ancestors` # @return [Array] attr_accessor :ancestors # The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported # asset types](https://cloud.google.com/asset-inventory/docs/supported-asset- # types) for more information. # Corresponds to the JSON property `assetType` # @return [String] attr_accessor :asset_type # An Identity and Access Management (IAM) policy, which specifies access # controls for Google Cloud resources. A `Policy` is a collection of `bindings`. # A `binding` binds one or more `members` to a single `role`. Members can be # user accounts, service accounts, Google groups, and domains (such as G Suite). # A `role` is a named list of permissions; each `role` can be an IAM predefined # role or a user-created custom role. For some types of Google Cloud resources, # a `binding` can also specify a `condition`, which is a logical expression that # allows access to a resource only if the expression evaluates to `true`. A # condition can add constraints based on attributes of the request, the resource, # or both. To learn which resources support conditions in their IAM policies, # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/ # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/ # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", " # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@ # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager. # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` " # title": "expirable access", "description": "Does not grant access after Sep # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", ` # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: - # members: - user:mike@example.com - group:admins@example.com - domain:google. # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/ # resourcemanager.organizationAdmin - members: - user:eve@example.com role: # roles/resourcemanager.organizationViewer condition: title: expirable access # description: Does not grant access after Sep 2020 expression: request.time < # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a # description of IAM and its features, see the [IAM documentation](https://cloud. # google.com/iam/docs/). # Corresponds to the JSON property `iamPolicy` # @return [Google::Apis::CloudassetV1p5beta1::Policy] attr_accessor :iam_policy # The full name of the asset. Example: `//compute.googleapis.com/projects/ # my_project_123/zones/zone1/instances/instance1` See [Resource names](https:// # cloud.google.com/apis/design/resource_names#full_resource_name) for more # information. # Corresponds to the JSON property `name` # @return [String] attr_accessor :name # A representation of an [organization policy](https://cloud.google.com/resource- # manager/docs/organization-policy/overview#organization_policy). There can be # more than one organization policy with different constraints set on a given # resource. # Corresponds to the JSON property `orgPolicy` # @return [Array] attr_accessor :org_policy # A representation of a Google Cloud resource. # Corresponds to the JSON property `resource` # @return [Google::Apis::CloudassetV1p5beta1::Resource] attr_accessor :resource # `ServicePerimeter` describes a set of Google Cloud resources which can freely # import and export data amongst themselves, but not export outside of the ` # ServicePerimeter`. If a request with a source within this `ServicePerimeter` # has a target outside of the `ServicePerimeter`, the request will be blocked. # Otherwise the request is allowed. There are two types of Service Perimeter - # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google # Cloud project can only belong to a single regular Service Perimeter. Service # Perimeter Bridges can contain only Google Cloud projects as members, a single # Google Cloud project may belong to multiple Service Perimeter Bridges. # Corresponds to the JSON property `servicePerimeter` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeter] attr_accessor :service_perimeter def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @access_level = args[:access_level] if args.key?(:access_level) @access_policy = args[:access_policy] if args.key?(:access_policy) @ancestors = args[:ancestors] if args.key?(:ancestors) @asset_type = args[:asset_type] if args.key?(:asset_type) @iam_policy = args[:iam_policy] if args.key?(:iam_policy) @name = args[:name] if args.key?(:name) @org_policy = args[:org_policy] if args.key?(:org_policy) @resource = args[:resource] if args.key?(:resource) @service_perimeter = args[:service_perimeter] if args.key?(:service_perimeter) end end # Specifies the audit configuration for a service. The configuration determines # which permission types are logged, and what identities, if any, are exempted # from logging. An AuditConfig must have one or more AuditLogConfigs. If there # are AuditConfigs for both `allServices` and a specific service, the union of # the two AuditConfigs is used for that service: the log_types specified in each # AuditConfig are enabled, and the exempted_members in each AuditLogConfig are # exempted. Example Policy with multiple AuditConfigs: ` "audit_configs": [ ` " # service": "allServices", "audit_log_configs": [ ` "log_type": "DATA_READ", " # exempted_members": [ "user:jose@example.com" ] `, ` "log_type": "DATA_WRITE" `, # ` "log_type": "ADMIN_READ" ` ] `, ` "service": "sampleservice.googleapis.com", # "audit_log_configs": [ ` "log_type": "DATA_READ" `, ` "log_type": "DATA_WRITE" # , "exempted_members": [ "user:aliya@example.com" ] ` ] ` ] ` For sampleservice, # this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also # exempts jose@example.com from DATA_READ logging, and aliya@example.com from # DATA_WRITE logging. class AuditConfig include Google::Apis::Core::Hashable # The configuration for logging of each type of permission. # Corresponds to the JSON property `auditLogConfigs` # @return [Array] attr_accessor :audit_log_configs # Specifies a service that will be enabled for audit logging. For example, ` # storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special # value that covers all services. # Corresponds to the JSON property `service` # @return [String] attr_accessor :service def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @audit_log_configs = args[:audit_log_configs] if args.key?(:audit_log_configs) @service = args[:service] if args.key?(:service) end end # Provides the configuration for logging a type of permissions. Example: ` " # audit_log_configs": [ ` "log_type": "DATA_READ", "exempted_members": [ "user: # jose@example.com" ] `, ` "log_type": "DATA_WRITE" ` ] ` This enables ' # DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from # DATA_READ logging. class AuditLogConfig include Google::Apis::Core::Hashable # Specifies the identities that do not cause logging for this type of permission. # Follows the same format of Binding.members. # Corresponds to the JSON property `exemptedMembers` # @return [Array] attr_accessor :exempted_members # The log type that this config enables. # Corresponds to the JSON property `logType` # @return [String] attr_accessor :log_type def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @exempted_members = args[:exempted_members] if args.key?(:exempted_members) @log_type = args[:log_type] if args.key?(:log_type) end end # Associates `members` with a `role`. class Binding include Google::Apis::Core::Hashable # Represents a textual expression in the Common Expression Language (CEL) syntax. # CEL is a C-like expression language. The syntax and semantics of CEL are # documented at https://github.com/google/cel-spec. Example (Comparison): title: # "Summary size limit" description: "Determines if a summary is less than 100 # chars" expression: "document.summary.size() < 100" Example (Equality): title: " # Requestor is owner" description: "Determines if requestor is the document # owner" expression: "document.owner == request.auth.claims.email" Example ( # Logic): title: "Public documents" description: "Determine whether the document # should be publicly visible" expression: "document.type != 'private' && # document.type != 'internal'" Example (Data Manipulation): title: "Notification # string" description: "Create a notification string with a timestamp." # expression: "'New message received at ' + string(document.create_time)" The # exact variables and functions that may be referenced within an expression are # determined by the service that evaluates it. See the service documentation for # additional information. # Corresponds to the JSON property `condition` # @return [Google::Apis::CloudassetV1p5beta1::Expr] attr_accessor :condition # Specifies the identities requesting access for a Cloud Platform resource. ` # members` can have the following values: * `allUsers`: A special identifier # that represents anyone who is on the internet; with or without a Google # account. * `allAuthenticatedUsers`: A special identifier that represents # anyone who is authenticated with a Google account or a service account. * ` # user:`emailid``: An email address that represents a specific Google account. # For example, `alice@example.com` . * `serviceAccount:`emailid``: An email # address that represents a service account. For example, `my-other-app@appspot. # gserviceaccount.com`. * `group:`emailid``: An email address that represents a # Google group. For example, `admins@example.com`. * `deleted:user:`emailid`?uid= # `uniqueid``: An email address (plus unique identifier) representing a user # that has been recently deleted. For example, `alice@example.com?uid= # 123456789012345678901`. If the user is recovered, this value reverts to `user:` # emailid`` and the recovered user retains the role in the binding. * `deleted: # serviceAccount:`emailid`?uid=`uniqueid``: An email address (plus unique # identifier) representing a service account that has been recently deleted. For # example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`. # If the service account is undeleted, this value reverts to `serviceAccount:` # emailid`` and the undeleted service account retains the role in the binding. * # `deleted:group:`emailid`?uid=`uniqueid``: An email address (plus unique # identifier) representing a Google group that has been recently deleted. For # example, `admins@example.com?uid=123456789012345678901`. If the group is # recovered, this value reverts to `group:`emailid`` and the recovered group # retains the role in the binding. * `domain:`domain``: The G Suite domain ( # primary) that represents all the users of that domain. For example, `google. # com` or `example.com`. # Corresponds to the JSON property `members` # @return [Array] attr_accessor :members # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor` # , or `roles/owner`. # Corresponds to the JSON property `role` # @return [String] attr_accessor :role def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @condition = args[:condition] if args.key?(:condition) @members = args[:members] if args.key?(:members) @role = args[:role] if args.key?(:role) end end # Represents a textual expression in the Common Expression Language (CEL) syntax. # CEL is a C-like expression language. The syntax and semantics of CEL are # documented at https://github.com/google/cel-spec. Example (Comparison): title: # "Summary size limit" description: "Determines if a summary is less than 100 # chars" expression: "document.summary.size() < 100" Example (Equality): title: " # Requestor is owner" description: "Determines if requestor is the document # owner" expression: "document.owner == request.auth.claims.email" Example ( # Logic): title: "Public documents" description: "Determine whether the document # should be publicly visible" expression: "document.type != 'private' && # document.type != 'internal'" Example (Data Manipulation): title: "Notification # string" description: "Create a notification string with a timestamp." # expression: "'New message received at ' + string(document.create_time)" The # exact variables and functions that may be referenced within an expression are # determined by the service that evaluates it. See the service documentation for # additional information. class Expr include Google::Apis::Core::Hashable # Optional. Description of the expression. This is a longer text which describes # the expression, e.g. when hovered over it in a UI. # Corresponds to the JSON property `description` # @return [String] attr_accessor :description # Textual representation of an expression in Common Expression Language syntax. # Corresponds to the JSON property `expression` # @return [String] attr_accessor :expression # Optional. String indicating the location of the expression for error reporting, # e.g. a file name and a position in the file. # Corresponds to the JSON property `location` # @return [String] attr_accessor :location # Optional. Title for the expression, i.e. a short string describing its purpose. # This can be used e.g. in UIs which allow to enter the expression. # Corresponds to the JSON property `title` # @return [String] attr_accessor :title def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @description = args[:description] if args.key?(:description) @expression = args[:expression] if args.key?(:expression) @location = args[:location] if args.key?(:location) @title = args[:title] if args.key?(:title) end end # Used in `policy_type` to specify how `boolean_policy` will behave at this # resource. class GoogleCloudOrgpolicyV1BooleanPolicy include Google::Apis::Core::Hashable # If `true`, then the `Policy` is enforced. If `false`, then any configuration # is acceptable. Suppose you have a `Constraint` `constraints/compute. # disableSerialPortAccess` with `constraint_default` set to `ALLOW`. A `Policy` # for that `Constraint` exhibits the following behavior: - If the `Policy` at # this resource has enforced set to `false`, serial port connection attempts # will be allowed. - If the `Policy` at this resource has enforced set to `true`, # serial port connection attempts will be refused. - If the `Policy` at this # resource is `RestoreDefault`, serial port connection attempts will be allowed. # - If no `Policy` is set at this resource or anywhere higher in the resource # hierarchy, serial port connection attempts will be allowed. - If no `Policy` # is set at this resource, but one exists higher in the resource hierarchy, the # behavior is as if the`Policy` were set at this resource. The following # examples demonstrate the different possible layerings: Example 1 (nearest ` # Constraint` wins): `organizations/foo` has a `Policy` with: `enforced: false` ` # projects/bar` has no `Policy` set. The constraint at `projects/bar` and ` # organizations/foo` will not be enforced. Example 2 (enforcement gets replaced): # `organizations/foo` has a `Policy` with: `enforced: false` `projects/bar` has # a `Policy` with: `enforced: true` The constraint at `organizations/foo` is not # enforced. The constraint at `projects/bar` is enforced. Example 3 ( # RestoreDefault): `organizations/foo` has a `Policy` with: `enforced: true` ` # projects/bar` has a `Policy` with: `RestoreDefault: ``` The constraint at ` # organizations/foo` is enforced. The constraint at `projects/bar` is not # enforced, because `constraint_default` for the `Constraint` is `ALLOW`. # Corresponds to the JSON property `enforced` # @return [Boolean] attr_accessor :enforced alias_method :enforced?, :enforced def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @enforced = args[:enforced] if args.key?(:enforced) end end # Used in `policy_type` to specify how `list_policy` behaves at this resource. ` # ListPolicy` can define specific values and subtrees of Cloud Resource Manager # resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed # or denied by setting the `allowed_values` and `denied_values` fields. This is # achieved by using the `under:` and optional `is:` prefixes. The `under:` # prefix is used to denote resource subtree values. The `is:` prefix is used to # denote specific values, and is required only if the value contains a ":". # Values prefixed with "is:" are treated the same as values with no prefix. # Ancestry subtrees must be in one of the following formats: - "projects/", e.g. # "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/", # e.g. "organizations/1234" The `supports_under` field of the associated ` # Constraint` defines whether ancestry prefixes can be used. You can set ` # allowed_values` and `denied_values` in the same `Policy` if `all_values` is ` # ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all # values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values` # and `denied_values` must be unset. class GoogleCloudOrgpolicyV1ListPolicy include Google::Apis::Core::Hashable # The policy all_values state. # Corresponds to the JSON property `allValues` # @return [String] attr_accessor :all_values # List of values allowed at this resource. Can only be set if `all_values` is # set to `ALL_VALUES_UNSPECIFIED`. # Corresponds to the JSON property `allowedValues` # @return [Array] attr_accessor :allowed_values # List of values denied at this resource. Can only be set if `all_values` is set # to `ALL_VALUES_UNSPECIFIED`. # Corresponds to the JSON property `deniedValues` # @return [Array] attr_accessor :denied_values # Determines the inheritance behavior for this `Policy`. By default, a ` # ListPolicy` set at a resource supersedes any `Policy` set anywhere up the # resource hierarchy. However, if `inherit_from_parent` is set to `true`, then # the values from the effective `Policy` of the parent resource are inherited, # meaning the values set in this `Policy` are added to the values inherited up # the hierarchy. Setting `Policy` hierarchies that inherit both allowed values # and denied values isn't recommended in most circumstances to keep the # configuration simple and understandable. However, it is possible to set a ` # Policy` with `allowed_values` set that inherits a `Policy` with `denied_values` # set. In this case, the values that are allowed must be in `allowed_values` # and not present in `denied_values`. For example, suppose you have a ` # Constraint` `constraints/serviceuser.services`, which has a `constraint_type` # of `list_constraint`, and with `constraint_default` set to `ALLOW`. Suppose # that at the Organization level, a `Policy` is applied that restricts the # allowed API activations to ``E1`, `E2``. Then, if a `Policy` is applied to a # project below the Organization that has `inherit_from_parent` set to `false` # and field all_values set to DENY, then an attempt to activate any API will be # denied. The following examples demonstrate different possible layerings for ` # projects/bar` parented by `organizations/foo`: Example 1 (no inherited values): # `organizations/foo` has a `Policy` with values: `allowed_values: "E1" # allowed_values:"E2"` `projects/bar` has `inherit_from_parent` `false` and # values: `allowed_values: "E3" allowed_values: "E4"` The accepted values at ` # organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are ` # E3`, and `E4`. Example 2 (inherited values): `organizations/foo` has a `Policy` # with values: `allowed_values: "E1" allowed_values:"E2"` `projects/bar` has a ` # Policy` with values: `value: "E3" value: "E4" inherit_from_parent: true` The # accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at ` # projects/bar` are `E1`, `E2`, `E3`, and `E4`. Example 3 (inheriting both # allowed and denied values): `organizations/foo` has a `Policy` with values: ` # allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `Policy` with: # `denied_values: "E1"` The accepted values at `organizations/foo` are `E1`, `E2` # . The value accepted at `projects/bar` is `E2`. Example 4 (RestoreDefault): ` # organizations/foo` has a `Policy` with values: `allowed_values: "E1" # allowed_values:"E2"` `projects/bar` has a `Policy` with values: ` # RestoreDefault: ``` The accepted values at `organizations/foo` are `E1`, `E2`. # The accepted values at `projects/bar` are either all or none depending on the # value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 5 ( # no policy inherits parent policy): `organizations/foo` has no `Policy` set. ` # projects/bar` has no `Policy` set. The accepted values at both levels are # either all or none depending on the value of `constraint_default` (if `ALLOW`, # all; if `DENY`, none). Example 6 (ListConstraint allowing all): `organizations/ # foo` has a `Policy` with values: `allowed_values: "E1" allowed_values: "E2"` ` # projects/bar` has a `Policy` with: `all: ALLOW` The accepted values at ` # organizations/foo` are `E1`, E2`. Any value is accepted at `projects/bar`. # Example 7 (ListConstraint allowing none): `organizations/foo` has a `Policy` # with values: `allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a ` # Policy` with: `all: DENY` The accepted values at `organizations/foo` are `E1`, # E2`. No value is accepted at `projects/bar`. Example 10 (allowed and denied # subtrees of Resource Manager hierarchy): Given the following resource # hierarchy O1->`F1, F2`; F1->`P1`; F2->`P2, P3`, `organizations/foo` has a ` # Policy` with values: `allowed_values: "under:organizations/O1"` `projects/bar` # has a `Policy` with: `allowed_values: "under:projects/P3"` `denied_values: " # under:folders/F2"` The accepted values at `organizations/foo` are ` # organizations/O1`, `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, ` # projects/P3`. The accepted values at `projects/bar` are `organizations/O1`, ` # folders/F1`, `projects/P1`. # Corresponds to the JSON property `inheritFromParent` # @return [Boolean] attr_accessor :inherit_from_parent alias_method :inherit_from_parent?, :inherit_from_parent # Optional. The Google Cloud Console will try to default to a configuration that # matches the value specified in this `Policy`. If `suggested_value` is not set, # it will inherit the value specified higher in the hierarchy, unless ` # inherit_from_parent` is `false`. # Corresponds to the JSON property `suggestedValue` # @return [String] attr_accessor :suggested_value def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @all_values = args[:all_values] if args.key?(:all_values) @allowed_values = args[:allowed_values] if args.key?(:allowed_values) @denied_values = args[:denied_values] if args.key?(:denied_values) @inherit_from_parent = args[:inherit_from_parent] if args.key?(:inherit_from_parent) @suggested_value = args[:suggested_value] if args.key?(:suggested_value) end end # Defines a Cloud Organization `Policy` which is used to specify `Constraints` # for configurations of Cloud Platform resources. class GoogleCloudOrgpolicyV1Policy include Google::Apis::Core::Hashable # Used in `policy_type` to specify how `boolean_policy` will behave at this # resource. # Corresponds to the JSON property `booleanPolicy` # @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1BooleanPolicy] attr_accessor :boolean_policy # The name of the `Constraint` the `Policy` is configuring, for example, ` # constraints/serviceuser.services`. A [list of available constraints](/resource- # manager/docs/organization-policy/org-policy-constraints) is available. # Immutable after creation. # Corresponds to the JSON property `constraint` # @return [String] attr_accessor :constraint # An opaque tag indicating the current version of the `Policy`, used for # concurrency control. When the `Policy` is returned from either a `GetPolicy` # or a `ListOrgPolicy` request, this `etag` indicates the version of the current # `Policy` to use when executing a read-modify-write loop. When the `Policy` is # returned from a `GetEffectivePolicy` request, the `etag` will be unset. When # the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value that was # returned from a `GetOrgPolicy` request as part of a read-modify-write loop for # concurrency control. Not setting the `etag`in a `SetOrgPolicy` request will # result in an unconditional write of the `Policy`. # Corresponds to the JSON property `etag` # NOTE: Values are automatically base64 encoded/decoded in the client library. # @return [String] attr_accessor :etag # Used in `policy_type` to specify how `list_policy` behaves at this resource. ` # ListPolicy` can define specific values and subtrees of Cloud Resource Manager # resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed # or denied by setting the `allowed_values` and `denied_values` fields. This is # achieved by using the `under:` and optional `is:` prefixes. The `under:` # prefix is used to denote resource subtree values. The `is:` prefix is used to # denote specific values, and is required only if the value contains a ":". # Values prefixed with "is:" are treated the same as values with no prefix. # Ancestry subtrees must be in one of the following formats: - "projects/", e.g. # "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/", # e.g. "organizations/1234" The `supports_under` field of the associated ` # Constraint` defines whether ancestry prefixes can be used. You can set ` # allowed_values` and `denied_values` in the same `Policy` if `all_values` is ` # ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all # values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values` # and `denied_values` must be unset. # Corresponds to the JSON property `listPolicy` # @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1ListPolicy] attr_accessor :list_policy # Ignores policies set above this resource and restores the `constraint_default` # enforcement behavior of the specific `Constraint` at this resource. Suppose # that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/ # serviceuser.services`. Suppose that organization foo.com sets a `Policy` at # their Organization resource node that restricts the allowed service # activations to deny all service activations. They could then set a `Policy` # with the `policy_type` `restore_default` on several experimental projects, # restoring the `constraint_default` enforcement of the `Constraint` for only # those projects, allowing those projects to have all services activated. # Corresponds to the JSON property `restoreDefault` # @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1RestoreDefault] attr_accessor :restore_default # The time stamp the `Policy` was previously updated. This is set by the server, # not specified by the caller, and represents the last time a call to ` # SetOrgPolicy` was made for that `Policy`. Any value set by the client will be # ignored. # Corresponds to the JSON property `updateTime` # @return [String] attr_accessor :update_time # Version of the `Policy`. Default version is 0; # Corresponds to the JSON property `version` # @return [Fixnum] attr_accessor :version def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @boolean_policy = args[:boolean_policy] if args.key?(:boolean_policy) @constraint = args[:constraint] if args.key?(:constraint) @etag = args[:etag] if args.key?(:etag) @list_policy = args[:list_policy] if args.key?(:list_policy) @restore_default = args[:restore_default] if args.key?(:restore_default) @update_time = args[:update_time] if args.key?(:update_time) @version = args[:version] if args.key?(:version) end end # Ignores policies set above this resource and restores the `constraint_default` # enforcement behavior of the specific `Constraint` at this resource. Suppose # that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/ # serviceuser.services`. Suppose that organization foo.com sets a `Policy` at # their Organization resource node that restricts the allowed service # activations to deny all service activations. They could then set a `Policy` # with the `policy_type` `restore_default` on several experimental projects, # restoring the `constraint_default` enforcement of the `Constraint` for only # those projects, allowing those projects to have all services activated. class GoogleCloudOrgpolicyV1RestoreDefault include Google::Apis::Core::Hashable def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) end end # An `AccessLevel` is a label that can be applied to requests to Google Cloud # services, along with a list of requirements necessary for the label to be # applied. class GoogleIdentityAccesscontextmanagerV1AccessLevel include Google::Apis::Core::Hashable # `BasicLevel` is an `AccessLevel` using a set of recommended features. # Corresponds to the JSON property `basic` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1BasicLevel] attr_accessor :basic # `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language # to represent the necessary conditions for the level to apply to a request. See # CEL spec at: https://github.com/google/cel-spec # Corresponds to the JSON property `custom` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1CustomLevel] attr_accessor :custom # Description of the `AccessLevel` and its use. Does not affect behavior. # Corresponds to the JSON property `description` # @return [String] attr_accessor :description # Required. Resource name for the Access Level. The `short_name` component must # begin with a letter and only include alphanumeric and '_'. Format: ` # accessPolicies/`policy_id`/accessLevels/`short_name``. The maximum length of # the `short_name` component is 50 characters. # Corresponds to the JSON property `name` # @return [String] attr_accessor :name # Human readable title. Must be unique within the Policy. # Corresponds to the JSON property `title` # @return [String] attr_accessor :title def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @basic = args[:basic] if args.key?(:basic) @custom = args[:custom] if args.key?(:custom) @description = args[:description] if args.key?(:description) @name = args[:name] if args.key?(:name) @title = args[:title] if args.key?(:title) end end # `AccessPolicy` is a container for `AccessLevels` (which define the necessary # attributes to use Google Cloud services) and `ServicePerimeters` (which define # regions of services able to freely pass data within a perimeter). An access # policy is globally visible within an organization, and the restrictions it # specifies apply to all projects within an organization. class GoogleIdentityAccesscontextmanagerV1AccessPolicy include Google::Apis::Core::Hashable # Output only. An opaque identifier for the current version of the `AccessPolicy` # . This will always be a strongly validated etag, meaning that two Access # Polices will be identical if and only if their etags are identical. Clients # should not expect this to be in any specific format. # Corresponds to the JSON property `etag` # @return [String] attr_accessor :etag # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/` # policy_id`` # Corresponds to the JSON property `name` # @return [String] attr_accessor :name # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. # Currently immutable once created. Format: `organizations/`organization_id`` # Corresponds to the JSON property `parent` # @return [String] attr_accessor :parent # Required. Human readable title. Does not affect behavior. # Corresponds to the JSON property `title` # @return [String] attr_accessor :title def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @etag = args[:etag] if args.key?(:etag) @name = args[:name] if args.key?(:name) @parent = args[:parent] if args.key?(:parent) @title = args[:title] if args.key?(:title) end end # Identification for an API Operation. class GoogleIdentityAccesscontextmanagerV1ApiOperation include Google::Apis::Core::Hashable # API methods or permissions to allow. Method or permission must belong to the # service specified by `service_name` field. A single MethodSelector entry with ` # *` specified for the `method` field will allow all methods AND permissions for # the service specified in `service_name`. # Corresponds to the JSON property `methodSelectors` # @return [Array] attr_accessor :method_selectors # The name of the API whose methods or permissions the IngressPolicy or # EgressPolicy want to allow. A single ApiOperation with `service_name` field # set to `*` will allow all methods AND permissions for all services. # Corresponds to the JSON property `serviceName` # @return [String] attr_accessor :service_name def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @method_selectors = args[:method_selectors] if args.key?(:method_selectors) @service_name = args[:service_name] if args.key?(:service_name) end end # `BasicLevel` is an `AccessLevel` using a set of recommended features. class GoogleIdentityAccesscontextmanagerV1BasicLevel include Google::Apis::Core::Hashable # How the `conditions` list should be combined to determine if a request is # granted this `AccessLevel`. If AND is used, each `Condition` in `conditions` # must be satisfied for the `AccessLevel` to be applied. If OR is used, at least # one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be # applied. Default behavior is AND. # Corresponds to the JSON property `combiningFunction` # @return [String] attr_accessor :combining_function # Required. A list of requirements for the `AccessLevel` to be granted. # Corresponds to the JSON property `conditions` # @return [Array] attr_accessor :conditions def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @combining_function = args[:combining_function] if args.key?(:combining_function) @conditions = args[:conditions] if args.key?(:conditions) end end # A condition necessary for an `AccessLevel` to be granted. The Condition is an # AND over its fields. So a Condition is true if: 1) the request IP is from one # of the listed subnetworks AND 2) the originating device complies with the # listed device policy AND 3) all listed access levels are granted AND 4) the # request was sent at a time allowed by the DateTimeRestriction. class GoogleIdentityAccesscontextmanagerV1Condition include Google::Apis::Core::Hashable # `DevicePolicy` specifies device specific restrictions necessary to acquire a # given access level. A `DevicePolicy` specifies requirements for requests from # devices to be granted access levels, it does not do any enforcement on the # device. `DevicePolicy` acts as an AND over all specified fields, and each # repeated field is an OR over its elements. Any unset fields are ignored. For # example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX, # encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests # originating from encrypted Linux desktops and encrypted Windows desktops. # Corresponds to the JSON property `devicePolicy` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1DevicePolicy] attr_accessor :device_policy # CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a # CIDR IP address block, the specified IP address portion must be properly # truncated (i.e. all the host bits must be zero) or the input is considered # malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. # Similarly, for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" is # not. The originating IP of a request must be in one of the listed subnets in # order for this Condition to be true. If empty, all IP addresses are allowed. # Corresponds to the JSON property `ipSubnetworks` # @return [Array] attr_accessor :ip_subnetworks # The request must be made by one of the provided user or service accounts. # Groups are not supported. Syntax: `user:`emailid`` `serviceAccount:`emailid`` # If not specified, a request may come from any user. # Corresponds to the JSON property `members` # @return [Array] attr_accessor :members # Whether to negate the Condition. If true, the Condition becomes a NAND over # its non-empty fields, each field must be false for the Condition overall to be # satisfied. Defaults to false. # Corresponds to the JSON property `negate` # @return [Boolean] attr_accessor :negate alias_method :negate?, :negate # The request must originate from one of the provided countries/regions. Must be # valid ISO 3166-1 alpha-2 codes. # Corresponds to the JSON property `regions` # @return [Array] attr_accessor :regions # A list of other access levels defined in the same `Policy`, referenced by # resource name. Referencing an `AccessLevel` which does not exist is an error. # All access levels listed must be granted for the Condition to be true. Example: # "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"` # Corresponds to the JSON property `requiredAccessLevels` # @return [Array] attr_accessor :required_access_levels def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @device_policy = args[:device_policy] if args.key?(:device_policy) @ip_subnetworks = args[:ip_subnetworks] if args.key?(:ip_subnetworks) @members = args[:members] if args.key?(:members) @negate = args[:negate] if args.key?(:negate) @regions = args[:regions] if args.key?(:regions) @required_access_levels = args[:required_access_levels] if args.key?(:required_access_levels) end end # `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language # to represent the necessary conditions for the level to apply to a request. See # CEL spec at: https://github.com/google/cel-spec class GoogleIdentityAccesscontextmanagerV1CustomLevel include Google::Apis::Core::Hashable # Represents a textual expression in the Common Expression Language (CEL) syntax. # CEL is a C-like expression language. The syntax and semantics of CEL are # documented at https://github.com/google/cel-spec. Example (Comparison): title: # "Summary size limit" description: "Determines if a summary is less than 100 # chars" expression: "document.summary.size() < 100" Example (Equality): title: " # Requestor is owner" description: "Determines if requestor is the document # owner" expression: "document.owner == request.auth.claims.email" Example ( # Logic): title: "Public documents" description: "Determine whether the document # should be publicly visible" expression: "document.type != 'private' && # document.type != 'internal'" Example (Data Manipulation): title: "Notification # string" description: "Create a notification string with a timestamp." # expression: "'New message received at ' + string(document.create_time)" The # exact variables and functions that may be referenced within an expression are # determined by the service that evaluates it. See the service documentation for # additional information. # Corresponds to the JSON property `expr` # @return [Google::Apis::CloudassetV1p5beta1::Expr] attr_accessor :expr def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @expr = args[:expr] if args.key?(:expr) end end # `DevicePolicy` specifies device specific restrictions necessary to acquire a # given access level. A `DevicePolicy` specifies requirements for requests from # devices to be granted access levels, it does not do any enforcement on the # device. `DevicePolicy` acts as an AND over all specified fields, and each # repeated field is an OR over its elements. Any unset fields are ignored. For # example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX, # encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests # originating from encrypted Linux desktops and encrypted Windows desktops. class GoogleIdentityAccesscontextmanagerV1DevicePolicy include Google::Apis::Core::Hashable # Allowed device management levels, an empty list allows all management levels. # Corresponds to the JSON property `allowedDeviceManagementLevels` # @return [Array] attr_accessor :allowed_device_management_levels # Allowed encryptions statuses, an empty list allows all statuses. # Corresponds to the JSON property `allowedEncryptionStatuses` # @return [Array] attr_accessor :allowed_encryption_statuses # Allowed OS versions, an empty list allows all types and all versions. # Corresponds to the JSON property `osConstraints` # @return [Array] attr_accessor :os_constraints # Whether the device needs to be approved by the customer admin. # Corresponds to the JSON property `requireAdminApproval` # @return [Boolean] attr_accessor :require_admin_approval alias_method :require_admin_approval?, :require_admin_approval # Whether the device needs to be corp owned. # Corresponds to the JSON property `requireCorpOwned` # @return [Boolean] attr_accessor :require_corp_owned alias_method :require_corp_owned?, :require_corp_owned # Whether or not screenlock is required for the DevicePolicy to be true. # Defaults to `false`. # Corresponds to the JSON property `requireScreenlock` # @return [Boolean] attr_accessor :require_screenlock alias_method :require_screenlock?, :require_screenlock def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @allowed_device_management_levels = args[:allowed_device_management_levels] if args.key?(:allowed_device_management_levels) @allowed_encryption_statuses = args[:allowed_encryption_statuses] if args.key?(:allowed_encryption_statuses) @os_constraints = args[:os_constraints] if args.key?(:os_constraints) @require_admin_approval = args[:require_admin_approval] if args.key?(:require_admin_approval) @require_corp_owned = args[:require_corp_owned] if args.key?(:require_corp_owned) @require_screenlock = args[:require_screenlock] if args.key?(:require_screenlock) end end # Defines the conditions under which an EgressPolicy matches a request. # Conditions based on information about the source of the request. Note that if # the destination of the request is protected by a ServicePerimeter, then that # ServicePerimeter must have an IngressPolicy which allows access in order for # this request to succeed. class GoogleIdentityAccesscontextmanagerV1EgressFrom include Google::Apis::Core::Hashable # A list of identities that are allowed access through this [EgressPolicy]. # Should be in the format of email address. The email address should represent # individual user or service account only. # Corresponds to the JSON property `identities` # @return [Array] attr_accessor :identities # Specifies the type of identities that are allowed access to outside the # perimeter. If left unspecified, then members of `identities` field will be # allowed access. # Corresponds to the JSON property `identityType` # @return [String] attr_accessor :identity_type def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @identities = args[:identities] if args.key?(:identities) @identity_type = args[:identity_type] if args.key?(:identity_type) end end # Policy for egress from perimeter. EgressPolicies match requests based on ` # egress_from` and `egress_to` stanzas. For an EgressPolicy to match, both ` # egress_from` and `egress_to` stanzas must be matched. If an EgressPolicy # matches a request, the request is allowed to span the ServicePerimeter # boundary. For example, an EgressPolicy can be used to allow VMs on networks # within the ServicePerimeter to access a defined set of projects outside the # perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket # or query against a BigQuery dataset). EgressPolicies are concerned with the * # resources* that a request relates as well as the API services and API actions # being used. They do not related to the direction of data movement. More # detailed documentation for this concept can be found in the descriptions of # EgressFrom and EgressTo. class GoogleIdentityAccesscontextmanagerV1EgressPolicy include Google::Apis::Core::Hashable # Defines the conditions under which an EgressPolicy matches a request. # Conditions based on information about the source of the request. Note that if # the destination of the request is protected by a ServicePerimeter, then that # ServicePerimeter must have an IngressPolicy which allows access in order for # this request to succeed. # Corresponds to the JSON property `egressFrom` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressFrom] attr_accessor :egress_from # Defines the conditions under which an EgressPolicy matches a request. # Conditions are based on information about the ApiOperation intended to be # performed on the `resources` specified. Note that if the destination of the # request is protected by a ServicePerimeter, then that ServicePerimeter must # have an IngressPolicy which allows access in order for this request to succeed. # Corresponds to the JSON property `egressTo` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressTo] attr_accessor :egress_to def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @egress_from = args[:egress_from] if args.key?(:egress_from) @egress_to = args[:egress_to] if args.key?(:egress_to) end end # Defines the conditions under which an EgressPolicy matches a request. # Conditions are based on information about the ApiOperation intended to be # performed on the `resources` specified. Note that if the destination of the # request is protected by a ServicePerimeter, then that ServicePerimeter must # have an IngressPolicy which allows access in order for this request to succeed. class GoogleIdentityAccesscontextmanagerV1EgressTo include Google::Apis::Core::Hashable # A list of ApiOperations that this egress rule applies to. A request matches if # it contains an operation/service in this list. # Corresponds to the JSON property `operations` # @return [Array] attr_accessor :operations # A list of resources, currently only projects in the form `projects/`, that # match this to stanza. A request matches if it contains a resource in this list. # If `*` is specified for resources, then this EgressTo rule will authorize # access to all resources outside the perimeter. # Corresponds to the JSON property `resources` # @return [Array] attr_accessor :resources def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @operations = args[:operations] if args.key?(:operations) @resources = args[:resources] if args.key?(:resources) end end # Defines the conditions under which an IngressPolicy matches a request. # Conditions are based on information about the source of the request. class GoogleIdentityAccesscontextmanagerV1IngressFrom include Google::Apis::Core::Hashable # A list of identities that are allowed access through this ingress policy. # Should be in the format of email address. The email address should represent # individual user or service account only. # Corresponds to the JSON property `identities` # @return [Array] attr_accessor :identities # Specifies the type of identities that are allowed access from outside the # perimeter. If left unspecified, then members of `identities` field will be # allowed access. # Corresponds to the JSON property `identityType` # @return [String] attr_accessor :identity_type # Sources that this IngressPolicy authorizes access from. # Corresponds to the JSON property `sources` # @return [Array] attr_accessor :sources def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @identities = args[:identities] if args.key?(:identities) @identity_type = args[:identity_type] if args.key?(:identity_type) @sources = args[:sources] if args.key?(:sources) end end # Policy for ingress into ServicePerimeter. IngressPolicies match requests based # on `ingress_from` and `ingress_to` stanzas. For an ingress policy to match, # both the `ingress_from` and `ingress_to` stanzas must be matched. If an # IngressPolicy matches a request, the request is allowed through the perimeter # boundary from outside the perimeter. For example, access from the internet can # be allowed either based on an AccessLevel or, for traffic hosted on Google # Cloud, the project of the source network. For access from private networks, # using the project of the hosting network is required. Individual ingress # policies can be limited by restricting which services and/or actions they # match using the `ingress_to` field. class GoogleIdentityAccesscontextmanagerV1IngressPolicy include Google::Apis::Core::Hashable # Defines the conditions under which an IngressPolicy matches a request. # Conditions are based on information about the source of the request. # Corresponds to the JSON property `ingressFrom` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressFrom] attr_accessor :ingress_from # Defines the conditions under which an IngressPolicy matches a request. # Conditions are based on information about the ApiOperation intended to be # performed on the destination of the request. # Corresponds to the JSON property `ingressTo` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressTo] attr_accessor :ingress_to def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @ingress_from = args[:ingress_from] if args.key?(:ingress_from) @ingress_to = args[:ingress_to] if args.key?(:ingress_to) end end # The source that IngressPolicy authorizes access from. class GoogleIdentityAccesscontextmanagerV1IngressSource include Google::Apis::Core::Hashable # An AccessLevel resource name that allow resources within the ServicePerimeters # to be accessed from the internet. AccessLevels listed must be in the same # policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will # cause an error. If no AccessLevel names are listed, resources within the # perimeter can only be accessed via Google Cloud calls with request origins # within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL` # . If `*` is specified, then all IngressSources will be allowed. # Corresponds to the JSON property `accessLevel` # @return [String] attr_accessor :access_level # A Google Cloud resource that is allowed to ingress the perimeter. Requests # from these resources will be allowed to access perimeter data. Currently only # projects are allowed. Format: `projects/`project_number`` The project may be # in any Google Cloud organization, not just the organization that the perimeter # is defined in. `*` is not allowed, the case of allowing all Google Cloud # resources only is not supported. # Corresponds to the JSON property `resource` # @return [String] attr_accessor :resource def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @access_level = args[:access_level] if args.key?(:access_level) @resource = args[:resource] if args.key?(:resource) end end # Defines the conditions under which an IngressPolicy matches a request. # Conditions are based on information about the ApiOperation intended to be # performed on the destination of the request. class GoogleIdentityAccesscontextmanagerV1IngressTo include Google::Apis::Core::Hashable # A list of ApiOperations the sources specified in corresponding IngressFrom are # allowed to perform in this ServicePerimeter. # Corresponds to the JSON property `operations` # @return [Array] attr_accessor :operations # A list of resources, currently only projects in the form `projects/`, # protected by this ServicePerimeter that are allowed to be accessed by sources # defined in the corresponding IngressFrom. A request matches if it contains a # resource in this list. If `*` is specified for resources, then this IngressTo # rule will authorize access to all resources inside the perimeter, provided # that the request also matches the `operations` field. # Corresponds to the JSON property `resources` # @return [Array] attr_accessor :resources def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @operations = args[:operations] if args.key?(:operations) @resources = args[:resources] if args.key?(:resources) end end # An allowed method or permission of a service specified in ApiOperation. class GoogleIdentityAccesscontextmanagerV1MethodSelector include Google::Apis::Core::Hashable # Value for `method` should be a valid method name for the corresponding ` # service_name` in ApiOperation. If `*` used as value for `method`, then ALL # methods and permissions are allowed. # Corresponds to the JSON property `method` # @return [String] attr_accessor :method_prop # Value for `permission` should be a valid Cloud IAM permission for the # corresponding `service_name` in ApiOperation. # Corresponds to the JSON property `permission` # @return [String] attr_accessor :permission def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @method_prop = args[:method_prop] if args.key?(:method_prop) @permission = args[:permission] if args.key?(:permission) end end # A restriction on the OS type and version of devices making requests. class GoogleIdentityAccesscontextmanagerV1OsConstraint include Google::Apis::Core::Hashable # The minimum allowed OS version. If not set, any version of this OS satisfies # the constraint. Format: `"major.minor.patch"`. Examples: `"10.5.301"`, `"9.2.1" # `. # Corresponds to the JSON property `minimumVersion` # @return [String] attr_accessor :minimum_version # Required. The allowed OS type. # Corresponds to the JSON property `osType` # @return [String] attr_accessor :os_type # Only allows requests from devices with a verified Chrome OS. Verifications # includes requirements that the device is enterprise-managed, conformant to # domain policies, and the caller has permission to call the API targeted by the # request. # Corresponds to the JSON property `requireVerifiedChromeOs` # @return [Boolean] attr_accessor :require_verified_chrome_os alias_method :require_verified_chrome_os?, :require_verified_chrome_os def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @minimum_version = args[:minimum_version] if args.key?(:minimum_version) @os_type = args[:os_type] if args.key?(:os_type) @require_verified_chrome_os = args[:require_verified_chrome_os] if args.key?(:require_verified_chrome_os) end end # `ServicePerimeter` describes a set of Google Cloud resources which can freely # import and export data amongst themselves, but not export outside of the ` # ServicePerimeter`. If a request with a source within this `ServicePerimeter` # has a target outside of the `ServicePerimeter`, the request will be blocked. # Otherwise the request is allowed. There are two types of Service Perimeter - # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google # Cloud project can only belong to a single regular Service Perimeter. Service # Perimeter Bridges can contain only Google Cloud projects as members, a single # Google Cloud project may belong to multiple Service Perimeter Bridges. class GoogleIdentityAccesscontextmanagerV1ServicePerimeter include Google::Apis::Core::Hashable # Description of the `ServicePerimeter` and its use. Does not affect behavior. # Corresponds to the JSON property `description` # @return [String] attr_accessor :description # Required. Resource name for the ServicePerimeter. The `short_name` component # must begin with a letter and only include alphanumeric and '_'. Format: ` # accessPolicies/`policy_id`/servicePerimeters/`short_name`` # Corresponds to the JSON property `name` # @return [String] attr_accessor :name # Perimeter type indicator. A single project is allowed to be a member of single # regular perimeter, but multiple service perimeter bridges. A project cannot be # a included in a perimeter bridge without being included in regular perimeter. # For perimeter bridges, the restricted service list as well as access level # lists must be empty. # Corresponds to the JSON property `perimeterType` # @return [String] attr_accessor :perimeter_type # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # describe specific Service Perimeter configuration. # Corresponds to the JSON property `spec` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig] attr_accessor :spec # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # describe specific Service Perimeter configuration. # Corresponds to the JSON property `status` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig] attr_accessor :status # Human readable title. Must be unique within the Policy. # Corresponds to the JSON property `title` # @return [String] attr_accessor :title # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists # for all Service Perimeters, and that spec is identical to the status for those # Service Perimeters. When this flag is set, it inhibits the generation of the # implicit spec, thereby allowing the user to explicitly provide a configuration # ("spec") to use in a dry-run version of the Service Perimeter. This allows the # user to test changes to the enforced config ("status") without actually # enforcing them. This testing is done through analyzing the differences between # currently enforced and suggested restrictions. use_explicit_dry_run_spec must # bet set to True if any of the fields in the spec are set to non-default values. # Corresponds to the JSON property `useExplicitDryRunSpec` # @return [Boolean] attr_accessor :use_explicit_dry_run_spec alias_method :use_explicit_dry_run_spec?, :use_explicit_dry_run_spec def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @description = args[:description] if args.key?(:description) @name = args[:name] if args.key?(:name) @perimeter_type = args[:perimeter_type] if args.key?(:perimeter_type) @spec = args[:spec] if args.key?(:spec) @status = args[:status] if args.key?(:status) @title = args[:title] if args.key?(:title) @use_explicit_dry_run_spec = args[:use_explicit_dry_run_spec] if args.key?(:use_explicit_dry_run_spec) end end # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # describe specific Service Perimeter configuration. class GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig include Google::Apis::Core::Hashable # A list of `AccessLevel` resource names that allow resources within the ` # ServicePerimeter` to be accessed from the internet. `AccessLevels` listed must # be in the same policy as this `ServicePerimeter`. Referencing a nonexistent ` # AccessLevel` is a syntax error. If no `AccessLevel` names are listed, # resources within the perimeter can only be accessed via Google Cloud calls # with request origins within the perimeter. Example: `"accessPolicies/MY_POLICY/ # accessLevels/MY_LEVEL"`. For Service Perimeter Bridge, must be empty. # Corresponds to the JSON property `accessLevels` # @return [Array] attr_accessor :access_levels # List of EgressPolicies to apply to the perimeter. A perimeter may have # multiple EgressPolicies, each of which is evaluated separately. Access is # granted if any EgressPolicy grants it. Must be empty for a perimeter bridge. # Corresponds to the JSON property `egressPolicies` # @return [Array] attr_accessor :egress_policies # List of IngressPolicies to apply to the perimeter. A perimeter may have # multiple IngressPolicies, each of which is evaluated separately. Access is # granted if any Ingress Policy grants it. Must be empty for a perimeter bridge. # Corresponds to the JSON property `ingressPolicies` # @return [Array] attr_accessor :ingress_policies # A list of Google Cloud resources that are inside of the service perimeter. # Currently only projects are allowed. Format: `projects/`project_number`` # Corresponds to the JSON property `resources` # @return [Array] attr_accessor :resources # Google Cloud services that are subject to the Service Perimeter restrictions. # For example, if `storage.googleapis.com` is specified, access to the storage # buckets inside the perimeter must meet the perimeter's access restrictions. # Corresponds to the JSON property `restrictedServices` # @return [Array] attr_accessor :restricted_services # Specifies how APIs are allowed to communicate within the Service Perimeter. # Corresponds to the JSON property `vpcAccessibleServices` # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices] attr_accessor :vpc_accessible_services def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @access_levels = args[:access_levels] if args.key?(:access_levels) @egress_policies = args[:egress_policies] if args.key?(:egress_policies) @ingress_policies = args[:ingress_policies] if args.key?(:ingress_policies) @resources = args[:resources] if args.key?(:resources) @restricted_services = args[:restricted_services] if args.key?(:restricted_services) @vpc_accessible_services = args[:vpc_accessible_services] if args.key?(:vpc_accessible_services) end end # Specifies how APIs are allowed to communicate within the Service Perimeter. class GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices include Google::Apis::Core::Hashable # The list of APIs usable within the Service Perimeter. Must be empty unless ' # enable_restriction' is True. You can specify a list of individual services, as # well as include the 'RESTRICTED-SERVICES' value, which automatically includes # all of the services protected by the perimeter. # Corresponds to the JSON property `allowedServices` # @return [Array] attr_accessor :allowed_services # Whether to restrict API calls within the Service Perimeter to the list of APIs # specified in 'allowed_services'. # Corresponds to the JSON property `enableRestriction` # @return [Boolean] attr_accessor :enable_restriction alias_method :enable_restriction?, :enable_restriction def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @allowed_services = args[:allowed_services] if args.key?(:allowed_services) @enable_restriction = args[:enable_restriction] if args.key?(:enable_restriction) end end # ListAssets response. class ListAssetsResponse include Google::Apis::Core::Hashable # Assets. # Corresponds to the JSON property `assets` # @return [Array] attr_accessor :assets # Token to retrieve the next page of results. Set to empty if there are no # remaining results. # Corresponds to the JSON property `nextPageToken` # @return [String] attr_accessor :next_page_token # Time the snapshot was taken. # Corresponds to the JSON property `readTime` # @return [String] attr_accessor :read_time def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @assets = args[:assets] if args.key?(:assets) @next_page_token = args[:next_page_token] if args.key?(:next_page_token) @read_time = args[:read_time] if args.key?(:read_time) end end # An Identity and Access Management (IAM) policy, which specifies access # controls for Google Cloud resources. A `Policy` is a collection of `bindings`. # A `binding` binds one or more `members` to a single `role`. Members can be # user accounts, service accounts, Google groups, and domains (such as G Suite). # A `role` is a named list of permissions; each `role` can be an IAM predefined # role or a user-created custom role. For some types of Google Cloud resources, # a `binding` can also specify a `condition`, which is a logical expression that # allows access to a resource only if the expression evaluates to `true`. A # condition can add constraints based on attributes of the request, the resource, # or both. To learn which resources support conditions in their IAM policies, # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/ # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/ # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", " # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@ # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager. # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` " # title": "expirable access", "description": "Does not grant access after Sep # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", ` # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: - # members: - user:mike@example.com - group:admins@example.com - domain:google. # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/ # resourcemanager.organizationAdmin - members: - user:eve@example.com role: # roles/resourcemanager.organizationViewer condition: title: expirable access # description: Does not grant access after Sep 2020 expression: request.time < # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a # description of IAM and its features, see the [IAM documentation](https://cloud. # google.com/iam/docs/). class Policy include Google::Apis::Core::Hashable # Specifies cloud audit logging configuration for this policy. # Corresponds to the JSON property `auditConfigs` # @return [Array] attr_accessor :audit_configs # Associates a list of `members` to a `role`. Optionally, may specify a ` # condition` that determines how and when the `bindings` are applied. Each of # the `bindings` must contain at least one member. # Corresponds to the JSON property `bindings` # @return [Array] attr_accessor :bindings # `etag` is used for optimistic concurrency control as a way to help prevent # simultaneous updates of a policy from overwriting each other. It is strongly # suggested that systems make use of the `etag` in the read-modify-write cycle # to perform policy updates in order to avoid race conditions: An `etag` is # returned in the response to `getIamPolicy`, and systems are expected to put # that etag in the request to `setIamPolicy` to ensure that their change will be # applied to the same version of the policy. **Important:** If you use IAM # Conditions, you must include the `etag` field whenever you call `setIamPolicy`. # If you omit this field, then IAM allows you to overwrite a version `3` policy # with a version `1` policy, and all of the conditions in the version `3` policy # are lost. # Corresponds to the JSON property `etag` # NOTE: Values are automatically base64 encoded/decoded in the client library. # @return [String] attr_accessor :etag # Specifies the format of the policy. Valid values are `0`, `1`, and `3`. # Requests that specify an invalid value are rejected. Any operation that # affects conditional role bindings must specify version `3`. This requirement # applies to the following operations: * Getting a policy that includes a # conditional role binding * Adding a conditional role binding to a policy * # Changing a conditional role binding in a policy * Removing any role binding, # with or without a condition, from a policy that includes conditions ** # Important:** If you use IAM Conditions, you must include the `etag` field # whenever you call `setIamPolicy`. If you omit this field, then IAM allows you # to overwrite a version `3` policy with a version `1` policy, and all of the # conditions in the version `3` policy are lost. If a policy does not include # any conditions, operations on that policy may specify any valid version or # leave the field unset. To learn which resources support conditions in their # IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/ # conditions/resource-policies). # Corresponds to the JSON property `version` # @return [Fixnum] attr_accessor :version def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @audit_configs = args[:audit_configs] if args.key?(:audit_configs) @bindings = args[:bindings] if args.key?(:bindings) @etag = args[:etag] if args.key?(:etag) @version = args[:version] if args.key?(:version) end end # A representation of a Google Cloud resource. class Resource include Google::Apis::Core::Hashable # The content of the resource, in which some sensitive fields are removed and # may not be present. # Corresponds to the JSON property `data` # @return [Hash] attr_accessor :data # The URL of the discovery document containing the resource's JSON schema. # Example: `https://www.googleapis.com/discovery/v1/apis/compute/v1/rest` This # value is unspecified for resources that do not have an API based on a # discovery document, such as Cloud Bigtable. # Corresponds to the JSON property `discoveryDocumentUri` # @return [String] attr_accessor :discovery_document_uri # The JSON schema name listed in the discovery document. Example: `Project` This # value is unspecified for resources that do not have an API based on a # discovery document, such as Cloud Bigtable. # Corresponds to the JSON property `discoveryName` # @return [String] attr_accessor :discovery_name # The full name of the immediate parent of this resource. See [Resource Names]( # https://cloud.google.com/apis/design/resource_names#full_resource_name) for # more information. For Google Cloud assets, this value is the parent resource # defined in the [Cloud IAM policy hierarchy](https://cloud.google.com/iam/docs/ # overview#policy_hierarchy). Example: `//cloudresourcemanager.googleapis.com/ # projects/my_project_123` For third-party assets, this field may be set # differently. # Corresponds to the JSON property `parent` # @return [String] attr_accessor :parent # The REST URL for accessing the resource. An HTTP `GET` request using this URL # returns the resource itself. Example: `https://cloudresourcemanager.googleapis. # com/v1/projects/my-project-123` This value is unspecified for resources # without a REST API. # Corresponds to the JSON property `resourceUrl` # @return [String] attr_accessor :resource_url # The API version. Example: "v1". # Corresponds to the JSON property `version` # @return [String] attr_accessor :version def initialize(**args) update!(**args) end # Update properties of this object def update!(**args) @data = args[:data] if args.key?(:data) @discovery_document_uri = args[:discovery_document_uri] if args.key?(:discovery_document_uri) @discovery_name = args[:discovery_name] if args.key?(:discovery_name) @parent = args[:parent] if args.key?(:parent) @resource_url = args[:resource_url] if args.key?(:resource_url) @version = args[:version] if args.key?(:version) end end end end end