1627 lines
		
	
	
		
			86 KiB
		
	
	
	
		
			Ruby
		
	
	
	
			
		
		
	
	
			1627 lines
		
	
	
		
			86 KiB
		
	
	
	
		
			Ruby
		
	
	
	
| # Copyright 2020 Google LLC
 | |
| #
 | |
| # Licensed under the Apache License, Version 2.0 (the "License");
 | |
| # you may not use this file except in compliance with the License.
 | |
| # You may obtain a copy of the License at
 | |
| #
 | |
| #      http://www.apache.org/licenses/LICENSE-2.0
 | |
| #
 | |
| # Unless required by applicable law or agreed to in writing, software
 | |
| # distributed under the License is distributed on an "AS IS" BASIS,
 | |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| # See the License for the specific language governing permissions and
 | |
| # limitations under the License.
 | |
| 
 | |
| require 'date'
 | |
| require 'google/apis/core/base_service'
 | |
| require 'google/apis/core/json_representation'
 | |
| require 'google/apis/core/hashable'
 | |
| require 'google/apis/errors'
 | |
| 
 | |
| module Google
 | |
|   module Apis
 | |
|     module CloudassetV1p5beta1
 | |
|       
 | |
|       # An asset in Google Cloud. An asset can be any resource in the Google Cloud [
 | |
|       # resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-
 | |
|       # platform-resource-hierarchy), a resource outside the Google Cloud resource
 | |
|       # hierarchy (such as Google Kubernetes Engine clusters and objects), or a policy
 | |
|       # (e.g. Cloud IAM policy). See [Supported asset types](https://cloud.google.com/
 | |
|       # asset-inventory/docs/supported-asset-types) for more information.
 | |
|       class Asset
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # An `AccessLevel` is a label that can be applied to requests to Google Cloud
 | |
|         # services, along with a list of requirements necessary for the label to be
 | |
|         # applied.
 | |
|         # Corresponds to the JSON property `accessLevel`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1AccessLevel]
 | |
|         attr_accessor :access_level
 | |
|       
 | |
|         # `AccessPolicy` is a container for `AccessLevels` (which define the necessary
 | |
|         # attributes to use Google Cloud services) and `ServicePerimeters` (which define
 | |
|         # regions of services able to freely pass data within a perimeter). An access
 | |
|         # policy is globally visible within an organization, and the restrictions it
 | |
|         # specifies apply to all projects within an organization.
 | |
|         # Corresponds to the JSON property `accessPolicy`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1AccessPolicy]
 | |
|         attr_accessor :access_policy
 | |
|       
 | |
|         # The ancestry path of an asset in Google Cloud [resource hierarchy](https://
 | |
|         # cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy),
 | |
|         # represented as a list of relative resource names. An ancestry path starts with
 | |
|         # the closest ancestor in the hierarchy and ends at root. If the asset is a
 | |
|         # project, folder, or organization, the ancestry path starts from the asset
 | |
|         # itself. Example: `["projects/123456789", "folders/5432", "organizations/1234"]`
 | |
|         # Corresponds to the JSON property `ancestors`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :ancestors
 | |
|       
 | |
|         # The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported
 | |
|         # asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-
 | |
|         # types) for more information.
 | |
|         # Corresponds to the JSON property `assetType`
 | |
|         # @return [String]
 | |
|         attr_accessor :asset_type
 | |
|       
 | |
|         # An Identity and Access Management (IAM) policy, which specifies access
 | |
|         # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
 | |
|         # A `binding` binds one or more `members` to a single `role`. Members can be
 | |
|         # user accounts, service accounts, Google groups, and domains (such as G Suite).
 | |
|         # A `role` is a named list of permissions; each `role` can be an IAM predefined
 | |
|         # role or a user-created custom role. For some types of Google Cloud resources,
 | |
|         # a `binding` can also specify a `condition`, which is a logical expression that
 | |
|         # allows access to a resource only if the expression evaluates to `true`. A
 | |
|         # condition can add constraints based on attributes of the request, the resource,
 | |
|         # or both. To learn which resources support conditions in their IAM policies,
 | |
|         # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
 | |
|         # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
 | |
|         # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
 | |
|         # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
 | |
|         # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
 | |
|         # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
 | |
|         # title": "expirable access", "description": "Does not grant access after Sep
 | |
|         # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
 | |
|         # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
 | |
|         # members: - user:mike@example.com - group:admins@example.com - domain:google.
 | |
|         # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
 | |
|         # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
 | |
|         # roles/resourcemanager.organizationViewer condition: title: expirable access
 | |
|         # description: Does not grant access after Sep 2020 expression: request.time <
 | |
|         # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
 | |
|         # description of IAM and its features, see the [IAM documentation](https://cloud.
 | |
|         # google.com/iam/docs/).
 | |
|         # Corresponds to the JSON property `iamPolicy`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::Policy]
 | |
|         attr_accessor :iam_policy
 | |
|       
 | |
|         # The full name of the asset. Example: `//compute.googleapis.com/projects/
 | |
|         # my_project_123/zones/zone1/instances/instance1` See [Resource names](https://
 | |
|         # cloud.google.com/apis/design/resource_names#full_resource_name) for more
 | |
|         # information.
 | |
|         # Corresponds to the JSON property `name`
 | |
|         # @return [String]
 | |
|         attr_accessor :name
 | |
|       
 | |
|         # A representation of an [organization policy](https://cloud.google.com/resource-
 | |
|         # manager/docs/organization-policy/overview#organization_policy). There can be
 | |
|         # more than one organization policy with different constraints set on a given
 | |
|         # resource.
 | |
|         # Corresponds to the JSON property `orgPolicy`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1Policy>]
 | |
|         attr_accessor :org_policy
 | |
|       
 | |
|         # A representation of a Google Cloud resource.
 | |
|         # Corresponds to the JSON property `resource`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::Resource]
 | |
|         attr_accessor :resource
 | |
|       
 | |
|         # `ServicePerimeter` describes a set of Google Cloud resources which can freely
 | |
|         # import and export data amongst themselves, but not export outside of the `
 | |
|         # ServicePerimeter`. If a request with a source within this `ServicePerimeter`
 | |
|         # has a target outside of the `ServicePerimeter`, the request will be blocked.
 | |
|         # Otherwise the request is allowed. There are two types of Service Perimeter -
 | |
|         # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
 | |
|         # Cloud project can only belong to a single regular Service Perimeter. Service
 | |
|         # Perimeter Bridges can contain only Google Cloud projects as members, a single
 | |
|         # Google Cloud project may belong to multiple Service Perimeter Bridges.
 | |
|         # Corresponds to the JSON property `servicePerimeter`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeter]
 | |
|         attr_accessor :service_perimeter
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @access_level = args[:access_level] if args.key?(:access_level)
 | |
|           @access_policy = args[:access_policy] if args.key?(:access_policy)
 | |
|           @ancestors = args[:ancestors] if args.key?(:ancestors)
 | |
|           @asset_type = args[:asset_type] if args.key?(:asset_type)
 | |
|           @iam_policy = args[:iam_policy] if args.key?(:iam_policy)
 | |
|           @name = args[:name] if args.key?(:name)
 | |
|           @org_policy = args[:org_policy] if args.key?(:org_policy)
 | |
|           @resource = args[:resource] if args.key?(:resource)
 | |
|           @service_perimeter = args[:service_perimeter] if args.key?(:service_perimeter)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Specifies the audit configuration for a service. The configuration determines
 | |
|       # which permission types are logged, and what identities, if any, are exempted
 | |
|       # from logging. An AuditConfig must have one or more AuditLogConfigs. If there
 | |
|       # are AuditConfigs for both `allServices` and a specific service, the union of
 | |
|       # the two AuditConfigs is used for that service: the log_types specified in each
 | |
|       # AuditConfig are enabled, and the exempted_members in each AuditLogConfig are
 | |
|       # exempted. Example Policy with multiple AuditConfigs: ` "audit_configs": [ ` "
 | |
|       # service": "allServices", "audit_log_configs": [ ` "log_type": "DATA_READ", "
 | |
|       # exempted_members": [ "user:jose@example.com" ] `, ` "log_type": "DATA_WRITE" `,
 | |
|       # ` "log_type": "ADMIN_READ" ` ] `, ` "service": "sampleservice.googleapis.com",
 | |
|       # "audit_log_configs": [ ` "log_type": "DATA_READ" `, ` "log_type": "DATA_WRITE"
 | |
|       # , "exempted_members": [ "user:aliya@example.com" ] ` ] ` ] ` For sampleservice,
 | |
|       # this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also
 | |
|       # exempts jose@example.com from DATA_READ logging, and aliya@example.com from
 | |
|       # DATA_WRITE logging.
 | |
|       class AuditConfig
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # The configuration for logging of each type of permission.
 | |
|         # Corresponds to the JSON property `auditLogConfigs`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::AuditLogConfig>]
 | |
|         attr_accessor :audit_log_configs
 | |
|       
 | |
|         # Specifies a service that will be enabled for audit logging. For example, `
 | |
|         # storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special
 | |
|         # value that covers all services.
 | |
|         # Corresponds to the JSON property `service`
 | |
|         # @return [String]
 | |
|         attr_accessor :service
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @audit_log_configs = args[:audit_log_configs] if args.key?(:audit_log_configs)
 | |
|           @service = args[:service] if args.key?(:service)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Provides the configuration for logging a type of permissions. Example: ` "
 | |
|       # audit_log_configs": [ ` "log_type": "DATA_READ", "exempted_members": [ "user:
 | |
|       # jose@example.com" ] `, ` "log_type": "DATA_WRITE" ` ] ` This enables '
 | |
|       # DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from
 | |
|       # DATA_READ logging.
 | |
|       class AuditLogConfig
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Specifies the identities that do not cause logging for this type of permission.
 | |
|         # Follows the same format of Binding.members.
 | |
|         # Corresponds to the JSON property `exemptedMembers`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :exempted_members
 | |
|       
 | |
|         # The log type that this config enables.
 | |
|         # Corresponds to the JSON property `logType`
 | |
|         # @return [String]
 | |
|         attr_accessor :log_type
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @exempted_members = args[:exempted_members] if args.key?(:exempted_members)
 | |
|           @log_type = args[:log_type] if args.key?(:log_type)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Associates `members` with a `role`.
 | |
|       class Binding
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Represents a textual expression in the Common Expression Language (CEL) syntax.
 | |
|         # CEL is a C-like expression language. The syntax and semantics of CEL are
 | |
|         # documented at https://github.com/google/cel-spec. Example (Comparison): title:
 | |
|         # "Summary size limit" description: "Determines if a summary is less than 100
 | |
|         # chars" expression: "document.summary.size() < 100" Example (Equality): title: "
 | |
|         # Requestor is owner" description: "Determines if requestor is the document
 | |
|         # owner" expression: "document.owner == request.auth.claims.email" Example (
 | |
|         # Logic): title: "Public documents" description: "Determine whether the document
 | |
|         # should be publicly visible" expression: "document.type != 'private' &&
 | |
|         # document.type != 'internal'" Example (Data Manipulation): title: "Notification
 | |
|         # string" description: "Create a notification string with a timestamp."
 | |
|         # expression: "'New message received at ' + string(document.create_time)" The
 | |
|         # exact variables and functions that may be referenced within an expression are
 | |
|         # determined by the service that evaluates it. See the service documentation for
 | |
|         # additional information.
 | |
|         # Corresponds to the JSON property `condition`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::Expr]
 | |
|         attr_accessor :condition
 | |
|       
 | |
|         # Specifies the identities requesting access for a Cloud Platform resource. `
 | |
|         # members` can have the following values: * `allUsers`: A special identifier
 | |
|         # that represents anyone who is on the internet; with or without a Google
 | |
|         # account. * `allAuthenticatedUsers`: A special identifier that represents
 | |
|         # anyone who is authenticated with a Google account or a service account. * `
 | |
|         # user:`emailid``: An email address that represents a specific Google account.
 | |
|         # For example, `alice@example.com` . * `serviceAccount:`emailid``: An email
 | |
|         # address that represents a service account. For example, `my-other-app@appspot.
 | |
|         # gserviceaccount.com`. * `group:`emailid``: An email address that represents a
 | |
|         # Google group. For example, `admins@example.com`. * `deleted:user:`emailid`?uid=
 | |
|         # `uniqueid``: An email address (plus unique identifier) representing a user
 | |
|         # that has been recently deleted. For example, `alice@example.com?uid=
 | |
|         # 123456789012345678901`. If the user is recovered, this value reverts to `user:`
 | |
|         # emailid`` and the recovered user retains the role in the binding. * `deleted:
 | |
|         # serviceAccount:`emailid`?uid=`uniqueid``: An email address (plus unique
 | |
|         # identifier) representing a service account that has been recently deleted. For
 | |
|         # example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
 | |
|         # If the service account is undeleted, this value reverts to `serviceAccount:`
 | |
|         # emailid`` and the undeleted service account retains the role in the binding. *
 | |
|         # `deleted:group:`emailid`?uid=`uniqueid``: An email address (plus unique
 | |
|         # identifier) representing a Google group that has been recently deleted. For
 | |
|         # example, `admins@example.com?uid=123456789012345678901`. If the group is
 | |
|         # recovered, this value reverts to `group:`emailid`` and the recovered group
 | |
|         # retains the role in the binding. * `domain:`domain``: The G Suite domain (
 | |
|         # primary) that represents all the users of that domain. For example, `google.
 | |
|         # com` or `example.com`.
 | |
|         # Corresponds to the JSON property `members`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :members
 | |
|       
 | |
|         # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
 | |
|         # , or `roles/owner`.
 | |
|         # Corresponds to the JSON property `role`
 | |
|         # @return [String]
 | |
|         attr_accessor :role
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @condition = args[:condition] if args.key?(:condition)
 | |
|           @members = args[:members] if args.key?(:members)
 | |
|           @role = args[:role] if args.key?(:role)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Represents a textual expression in the Common Expression Language (CEL) syntax.
 | |
|       # CEL is a C-like expression language. The syntax and semantics of CEL are
 | |
|       # documented at https://github.com/google/cel-spec. Example (Comparison): title:
 | |
|       # "Summary size limit" description: "Determines if a summary is less than 100
 | |
|       # chars" expression: "document.summary.size() < 100" Example (Equality): title: "
 | |
|       # Requestor is owner" description: "Determines if requestor is the document
 | |
|       # owner" expression: "document.owner == request.auth.claims.email" Example (
 | |
|       # Logic): title: "Public documents" description: "Determine whether the document
 | |
|       # should be publicly visible" expression: "document.type != 'private' &&
 | |
|       # document.type != 'internal'" Example (Data Manipulation): title: "Notification
 | |
|       # string" description: "Create a notification string with a timestamp."
 | |
|       # expression: "'New message received at ' + string(document.create_time)" The
 | |
|       # exact variables and functions that may be referenced within an expression are
 | |
|       # determined by the service that evaluates it. See the service documentation for
 | |
|       # additional information.
 | |
|       class Expr
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Optional. Description of the expression. This is a longer text which describes
 | |
|         # the expression, e.g. when hovered over it in a UI.
 | |
|         # Corresponds to the JSON property `description`
 | |
|         # @return [String]
 | |
|         attr_accessor :description
 | |
|       
 | |
|         # Textual representation of an expression in Common Expression Language syntax.
 | |
|         # Corresponds to the JSON property `expression`
 | |
|         # @return [String]
 | |
|         attr_accessor :expression
 | |
|       
 | |
|         # Optional. String indicating the location of the expression for error reporting,
 | |
|         # e.g. a file name and a position in the file.
 | |
|         # Corresponds to the JSON property `location`
 | |
|         # @return [String]
 | |
|         attr_accessor :location
 | |
|       
 | |
|         # Optional. Title for the expression, i.e. a short string describing its purpose.
 | |
|         # This can be used e.g. in UIs which allow to enter the expression.
 | |
|         # Corresponds to the JSON property `title`
 | |
|         # @return [String]
 | |
|         attr_accessor :title
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @description = args[:description] if args.key?(:description)
 | |
|           @expression = args[:expression] if args.key?(:expression)
 | |
|           @location = args[:location] if args.key?(:location)
 | |
|           @title = args[:title] if args.key?(:title)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Used in `policy_type` to specify how `boolean_policy` will behave at this
 | |
|       # resource.
 | |
|       class GoogleCloudOrgpolicyV1BooleanPolicy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # If `true`, then the `Policy` is enforced. If `false`, then any configuration
 | |
|         # is acceptable. Suppose you have a `Constraint` `constraints/compute.
 | |
|         # disableSerialPortAccess` with `constraint_default` set to `ALLOW`. A `Policy`
 | |
|         # for that `Constraint` exhibits the following behavior: - If the `Policy` at
 | |
|         # this resource has enforced set to `false`, serial port connection attempts
 | |
|         # will be allowed. - If the `Policy` at this resource has enforced set to `true`,
 | |
|         # serial port connection attempts will be refused. - If the `Policy` at this
 | |
|         # resource is `RestoreDefault`, serial port connection attempts will be allowed.
 | |
|         # - If no `Policy` is set at this resource or anywhere higher in the resource
 | |
|         # hierarchy, serial port connection attempts will be allowed. - If no `Policy`
 | |
|         # is set at this resource, but one exists higher in the resource hierarchy, the
 | |
|         # behavior is as if the`Policy` were set at this resource. The following
 | |
|         # examples demonstrate the different possible layerings: Example 1 (nearest `
 | |
|         # Constraint` wins): `organizations/foo` has a `Policy` with: `enforced: false` `
 | |
|         # projects/bar` has no `Policy` set. The constraint at `projects/bar` and `
 | |
|         # organizations/foo` will not be enforced. Example 2 (enforcement gets replaced):
 | |
|         # `organizations/foo` has a `Policy` with: `enforced: false` `projects/bar` has
 | |
|         # a `Policy` with: `enforced: true` The constraint at `organizations/foo` is not
 | |
|         # enforced. The constraint at `projects/bar` is enforced. Example 3 (
 | |
|         # RestoreDefault): `organizations/foo` has a `Policy` with: `enforced: true` `
 | |
|         # projects/bar` has a `Policy` with: `RestoreDefault: ``` The constraint at `
 | |
|         # organizations/foo` is enforced. The constraint at `projects/bar` is not
 | |
|         # enforced, because `constraint_default` for the `Constraint` is `ALLOW`.
 | |
|         # Corresponds to the JSON property `enforced`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :enforced
 | |
|         alias_method :enforced?, :enforced
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @enforced = args[:enforced] if args.key?(:enforced)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Used in `policy_type` to specify how `list_policy` behaves at this resource. `
 | |
|       # ListPolicy` can define specific values and subtrees of Cloud Resource Manager
 | |
|       # resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed
 | |
|       # or denied by setting the `allowed_values` and `denied_values` fields. This is
 | |
|       # achieved by using the `under:` and optional `is:` prefixes. The `under:`
 | |
|       # prefix is used to denote resource subtree values. The `is:` prefix is used to
 | |
|       # denote specific values, and is required only if the value contains a ":".
 | |
|       # Values prefixed with "is:" are treated the same as values with no prefix.
 | |
|       # Ancestry subtrees must be in one of the following formats: - "projects/", e.g.
 | |
|       # "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/",
 | |
|       # e.g. "organizations/1234" The `supports_under` field of the associated `
 | |
|       # Constraint` defines whether ancestry prefixes can be used. You can set `
 | |
|       # allowed_values` and `denied_values` in the same `Policy` if `all_values` is `
 | |
|       # ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
 | |
|       # values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values`
 | |
|       # and `denied_values` must be unset.
 | |
|       class GoogleCloudOrgpolicyV1ListPolicy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # The policy all_values state.
 | |
|         # Corresponds to the JSON property `allValues`
 | |
|         # @return [String]
 | |
|         attr_accessor :all_values
 | |
|       
 | |
|         # List of values allowed at this resource. Can only be set if `all_values` is
 | |
|         # set to `ALL_VALUES_UNSPECIFIED`.
 | |
|         # Corresponds to the JSON property `allowedValues`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :allowed_values
 | |
|       
 | |
|         # List of values denied at this resource. Can only be set if `all_values` is set
 | |
|         # to `ALL_VALUES_UNSPECIFIED`.
 | |
|         # Corresponds to the JSON property `deniedValues`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :denied_values
 | |
|       
 | |
|         # Determines the inheritance behavior for this `Policy`. By default, a `
 | |
|         # ListPolicy` set at a resource supersedes any `Policy` set anywhere up the
 | |
|         # resource hierarchy. However, if `inherit_from_parent` is set to `true`, then
 | |
|         # the values from the effective `Policy` of the parent resource are inherited,
 | |
|         # meaning the values set in this `Policy` are added to the values inherited up
 | |
|         # the hierarchy. Setting `Policy` hierarchies that inherit both allowed values
 | |
|         # and denied values isn't recommended in most circumstances to keep the
 | |
|         # configuration simple and understandable. However, it is possible to set a `
 | |
|         # Policy` with `allowed_values` set that inherits a `Policy` with `denied_values`
 | |
|         # set. In this case, the values that are allowed must be in `allowed_values`
 | |
|         # and not present in `denied_values`. For example, suppose you have a `
 | |
|         # Constraint` `constraints/serviceuser.services`, which has a `constraint_type`
 | |
|         # of `list_constraint`, and with `constraint_default` set to `ALLOW`. Suppose
 | |
|         # that at the Organization level, a `Policy` is applied that restricts the
 | |
|         # allowed API activations to ``E1`, `E2``. Then, if a `Policy` is applied to a
 | |
|         # project below the Organization that has `inherit_from_parent` set to `false`
 | |
|         # and field all_values set to DENY, then an attempt to activate any API will be
 | |
|         # denied. The following examples demonstrate different possible layerings for `
 | |
|         # projects/bar` parented by `organizations/foo`: Example 1 (no inherited values):
 | |
|         # `organizations/foo` has a `Policy` with values: `allowed_values: "E1"
 | |
|         # allowed_values:"E2"` `projects/bar` has `inherit_from_parent` `false` and
 | |
|         # values: `allowed_values: "E3" allowed_values: "E4"` The accepted values at `
 | |
|         # organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `
 | |
|         # E3`, and `E4`. Example 2 (inherited values): `organizations/foo` has a `Policy`
 | |
|         # with values: `allowed_values: "E1" allowed_values:"E2"` `projects/bar` has a `
 | |
|         # Policy` with values: `value: "E3" value: "E4" inherit_from_parent: true` The
 | |
|         # accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `
 | |
|         # projects/bar` are `E1`, `E2`, `E3`, and `E4`. Example 3 (inheriting both
 | |
|         # allowed and denied values): `organizations/foo` has a `Policy` with values: `
 | |
|         # allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `Policy` with:
 | |
|         # `denied_values: "E1"` The accepted values at `organizations/foo` are `E1`, `E2`
 | |
|         # . The value accepted at `projects/bar` is `E2`. Example 4 (RestoreDefault): `
 | |
|         # organizations/foo` has a `Policy` with values: `allowed_values: "E1"
 | |
|         # allowed_values:"E2"` `projects/bar` has a `Policy` with values: `
 | |
|         # RestoreDefault: ``` The accepted values at `organizations/foo` are `E1`, `E2`.
 | |
|         # The accepted values at `projects/bar` are either all or none depending on the
 | |
|         # value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 5 (
 | |
|         # no policy inherits parent policy): `organizations/foo` has no `Policy` set. `
 | |
|         # projects/bar` has no `Policy` set. The accepted values at both levels are
 | |
|         # either all or none depending on the value of `constraint_default` (if `ALLOW`,
 | |
|         # all; if `DENY`, none). Example 6 (ListConstraint allowing all): `organizations/
 | |
|         # foo` has a `Policy` with values: `allowed_values: "E1" allowed_values: "E2"` `
 | |
|         # projects/bar` has a `Policy` with: `all: ALLOW` The accepted values at `
 | |
|         # organizations/foo` are `E1`, E2`. Any value is accepted at `projects/bar`.
 | |
|         # Example 7 (ListConstraint allowing none): `organizations/foo` has a `Policy`
 | |
|         # with values: `allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `
 | |
|         # Policy` with: `all: DENY` The accepted values at `organizations/foo` are `E1`,
 | |
|         # E2`. No value is accepted at `projects/bar`. Example 10 (allowed and denied
 | |
|         # subtrees of Resource Manager hierarchy): Given the following resource
 | |
|         # hierarchy O1->`F1, F2`; F1->`P1`; F2->`P2, P3`, `organizations/foo` has a `
 | |
|         # Policy` with values: `allowed_values: "under:organizations/O1"` `projects/bar`
 | |
|         # has a `Policy` with: `allowed_values: "under:projects/P3"` `denied_values: "
 | |
|         # under:folders/F2"` The accepted values at `organizations/foo` are `
 | |
|         # organizations/O1`, `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, `
 | |
|         # projects/P3`. The accepted values at `projects/bar` are `organizations/O1`, `
 | |
|         # folders/F1`, `projects/P1`.
 | |
|         # Corresponds to the JSON property `inheritFromParent`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :inherit_from_parent
 | |
|         alias_method :inherit_from_parent?, :inherit_from_parent
 | |
|       
 | |
|         # Optional. The Google Cloud Console will try to default to a configuration that
 | |
|         # matches the value specified in this `Policy`. If `suggested_value` is not set,
 | |
|         # it will inherit the value specified higher in the hierarchy, unless `
 | |
|         # inherit_from_parent` is `false`.
 | |
|         # Corresponds to the JSON property `suggestedValue`
 | |
|         # @return [String]
 | |
|         attr_accessor :suggested_value
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @all_values = args[:all_values] if args.key?(:all_values)
 | |
|           @allowed_values = args[:allowed_values] if args.key?(:allowed_values)
 | |
|           @denied_values = args[:denied_values] if args.key?(:denied_values)
 | |
|           @inherit_from_parent = args[:inherit_from_parent] if args.key?(:inherit_from_parent)
 | |
|           @suggested_value = args[:suggested_value] if args.key?(:suggested_value)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Defines a Cloud Organization `Policy` which is used to specify `Constraints`
 | |
|       # for configurations of Cloud Platform resources.
 | |
|       class GoogleCloudOrgpolicyV1Policy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Used in `policy_type` to specify how `boolean_policy` will behave at this
 | |
|         # resource.
 | |
|         # Corresponds to the JSON property `booleanPolicy`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1BooleanPolicy]
 | |
|         attr_accessor :boolean_policy
 | |
|       
 | |
|         # The name of the `Constraint` the `Policy` is configuring, for example, `
 | |
|         # constraints/serviceuser.services`. A [list of available constraints](/resource-
 | |
|         # manager/docs/organization-policy/org-policy-constraints) is available.
 | |
|         # Immutable after creation.
 | |
|         # Corresponds to the JSON property `constraint`
 | |
|         # @return [String]
 | |
|         attr_accessor :constraint
 | |
|       
 | |
|         # An opaque tag indicating the current version of the `Policy`, used for
 | |
|         # concurrency control. When the `Policy` is returned from either a `GetPolicy`
 | |
|         # or a `ListOrgPolicy` request, this `etag` indicates the version of the current
 | |
|         # `Policy` to use when executing a read-modify-write loop. When the `Policy` is
 | |
|         # returned from a `GetEffectivePolicy` request, the `etag` will be unset. When
 | |
|         # the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value that was
 | |
|         # returned from a `GetOrgPolicy` request as part of a read-modify-write loop for
 | |
|         # concurrency control. Not setting the `etag`in a `SetOrgPolicy` request will
 | |
|         # result in an unconditional write of the `Policy`.
 | |
|         # Corresponds to the JSON property `etag`
 | |
|         # NOTE: Values are automatically base64 encoded/decoded in the client library.
 | |
|         # @return [String]
 | |
|         attr_accessor :etag
 | |
|       
 | |
|         # Used in `policy_type` to specify how `list_policy` behaves at this resource. `
 | |
|         # ListPolicy` can define specific values and subtrees of Cloud Resource Manager
 | |
|         # resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed
 | |
|         # or denied by setting the `allowed_values` and `denied_values` fields. This is
 | |
|         # achieved by using the `under:` and optional `is:` prefixes. The `under:`
 | |
|         # prefix is used to denote resource subtree values. The `is:` prefix is used to
 | |
|         # denote specific values, and is required only if the value contains a ":".
 | |
|         # Values prefixed with "is:" are treated the same as values with no prefix.
 | |
|         # Ancestry subtrees must be in one of the following formats: - "projects/", e.g.
 | |
|         # "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/",
 | |
|         # e.g. "organizations/1234" The `supports_under` field of the associated `
 | |
|         # Constraint` defines whether ancestry prefixes can be used. You can set `
 | |
|         # allowed_values` and `denied_values` in the same `Policy` if `all_values` is `
 | |
|         # ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
 | |
|         # values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values`
 | |
|         # and `denied_values` must be unset.
 | |
|         # Corresponds to the JSON property `listPolicy`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1ListPolicy]
 | |
|         attr_accessor :list_policy
 | |
|       
 | |
|         # Ignores policies set above this resource and restores the `constraint_default`
 | |
|         # enforcement behavior of the specific `Constraint` at this resource. Suppose
 | |
|         # that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/
 | |
|         # serviceuser.services`. Suppose that organization foo.com sets a `Policy` at
 | |
|         # their Organization resource node that restricts the allowed service
 | |
|         # activations to deny all service activations. They could then set a `Policy`
 | |
|         # with the `policy_type` `restore_default` on several experimental projects,
 | |
|         # restoring the `constraint_default` enforcement of the `Constraint` for only
 | |
|         # those projects, allowing those projects to have all services activated.
 | |
|         # Corresponds to the JSON property `restoreDefault`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1RestoreDefault]
 | |
|         attr_accessor :restore_default
 | |
|       
 | |
|         # The time stamp the `Policy` was previously updated. This is set by the server,
 | |
|         # not specified by the caller, and represents the last time a call to `
 | |
|         # SetOrgPolicy` was made for that `Policy`. Any value set by the client will be
 | |
|         # ignored.
 | |
|         # Corresponds to the JSON property `updateTime`
 | |
|         # @return [String]
 | |
|         attr_accessor :update_time
 | |
|       
 | |
|         # Version of the `Policy`. Default version is 0;
 | |
|         # Corresponds to the JSON property `version`
 | |
|         # @return [Fixnum]
 | |
|         attr_accessor :version
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @boolean_policy = args[:boolean_policy] if args.key?(:boolean_policy)
 | |
|           @constraint = args[:constraint] if args.key?(:constraint)
 | |
|           @etag = args[:etag] if args.key?(:etag)
 | |
|           @list_policy = args[:list_policy] if args.key?(:list_policy)
 | |
|           @restore_default = args[:restore_default] if args.key?(:restore_default)
 | |
|           @update_time = args[:update_time] if args.key?(:update_time)
 | |
|           @version = args[:version] if args.key?(:version)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Ignores policies set above this resource and restores the `constraint_default`
 | |
|       # enforcement behavior of the specific `Constraint` at this resource. Suppose
 | |
|       # that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/
 | |
|       # serviceuser.services`. Suppose that organization foo.com sets a `Policy` at
 | |
|       # their Organization resource node that restricts the allowed service
 | |
|       # activations to deny all service activations. They could then set a `Policy`
 | |
|       # with the `policy_type` `restore_default` on several experimental projects,
 | |
|       # restoring the `constraint_default` enforcement of the `Constraint` for only
 | |
|       # those projects, allowing those projects to have all services activated.
 | |
|       class GoogleCloudOrgpolicyV1RestoreDefault
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # An `AccessLevel` is a label that can be applied to requests to Google Cloud
 | |
|       # services, along with a list of requirements necessary for the label to be
 | |
|       # applied.
 | |
|       class GoogleIdentityAccesscontextmanagerV1AccessLevel
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # `BasicLevel` is an `AccessLevel` using a set of recommended features.
 | |
|         # Corresponds to the JSON property `basic`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1BasicLevel]
 | |
|         attr_accessor :basic
 | |
|       
 | |
|         # `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
 | |
|         # to represent the necessary conditions for the level to apply to a request. See
 | |
|         # CEL spec at: https://github.com/google/cel-spec
 | |
|         # Corresponds to the JSON property `custom`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1CustomLevel]
 | |
|         attr_accessor :custom
 | |
|       
 | |
|         # Description of the `AccessLevel` and its use. Does not affect behavior.
 | |
|         # Corresponds to the JSON property `description`
 | |
|         # @return [String]
 | |
|         attr_accessor :description
 | |
|       
 | |
|         # Required. Resource name for the Access Level. The `short_name` component must
 | |
|         # begin with a letter and only include alphanumeric and '_'. Format: `
 | |
|         # accessPolicies/`policy_id`/accessLevels/`short_name``. The maximum length of
 | |
|         # the `short_name` component is 50 characters.
 | |
|         # Corresponds to the JSON property `name`
 | |
|         # @return [String]
 | |
|         attr_accessor :name
 | |
|       
 | |
|         # Human readable title. Must be unique within the Policy.
 | |
|         # Corresponds to the JSON property `title`
 | |
|         # @return [String]
 | |
|         attr_accessor :title
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @basic = args[:basic] if args.key?(:basic)
 | |
|           @custom = args[:custom] if args.key?(:custom)
 | |
|           @description = args[:description] if args.key?(:description)
 | |
|           @name = args[:name] if args.key?(:name)
 | |
|           @title = args[:title] if args.key?(:title)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # `AccessPolicy` is a container for `AccessLevels` (which define the necessary
 | |
|       # attributes to use Google Cloud services) and `ServicePerimeters` (which define
 | |
|       # regions of services able to freely pass data within a perimeter). An access
 | |
|       # policy is globally visible within an organization, and the restrictions it
 | |
|       # specifies apply to all projects within an organization.
 | |
|       class GoogleIdentityAccesscontextmanagerV1AccessPolicy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Output only. An opaque identifier for the current version of the `AccessPolicy`
 | |
|         # . This will always be a strongly validated etag, meaning that two Access
 | |
|         # Polices will be identical if and only if their etags are identical. Clients
 | |
|         # should not expect this to be in any specific format.
 | |
|         # Corresponds to the JSON property `etag`
 | |
|         # @return [String]
 | |
|         attr_accessor :etag
 | |
|       
 | |
|         # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/`
 | |
|         # policy_id``
 | |
|         # Corresponds to the JSON property `name`
 | |
|         # @return [String]
 | |
|         attr_accessor :name
 | |
|       
 | |
|         # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy.
 | |
|         # Currently immutable once created. Format: `organizations/`organization_id``
 | |
|         # Corresponds to the JSON property `parent`
 | |
|         # @return [String]
 | |
|         attr_accessor :parent
 | |
|       
 | |
|         # Required. Human readable title. Does not affect behavior.
 | |
|         # Corresponds to the JSON property `title`
 | |
|         # @return [String]
 | |
|         attr_accessor :title
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @etag = args[:etag] if args.key?(:etag)
 | |
|           @name = args[:name] if args.key?(:name)
 | |
|           @parent = args[:parent] if args.key?(:parent)
 | |
|           @title = args[:title] if args.key?(:title)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Identification for an API Operation.
 | |
|       class GoogleIdentityAccesscontextmanagerV1ApiOperation
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # API methods or permissions to allow. Method or permission must belong to the
 | |
|         # service specified by `service_name` field. A single MethodSelector entry with `
 | |
|         # *` specified for the `method` field will allow all methods AND permissions for
 | |
|         # the service specified in `service_name`.
 | |
|         # Corresponds to the JSON property `methodSelectors`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1MethodSelector>]
 | |
|         attr_accessor :method_selectors
 | |
|       
 | |
|         # The name of the API whose methods or permissions the IngressPolicy or
 | |
|         # EgressPolicy want to allow. A single ApiOperation with `service_name` field
 | |
|         # set to `*` will allow all methods AND permissions for all services.
 | |
|         # Corresponds to the JSON property `serviceName`
 | |
|         # @return [String]
 | |
|         attr_accessor :service_name
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @method_selectors = args[:method_selectors] if args.key?(:method_selectors)
 | |
|           @service_name = args[:service_name] if args.key?(:service_name)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # `BasicLevel` is an `AccessLevel` using a set of recommended features.
 | |
|       class GoogleIdentityAccesscontextmanagerV1BasicLevel
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # How the `conditions` list should be combined to determine if a request is
 | |
|         # granted this `AccessLevel`. If AND is used, each `Condition` in `conditions`
 | |
|         # must be satisfied for the `AccessLevel` to be applied. If OR is used, at least
 | |
|         # one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be
 | |
|         # applied. Default behavior is AND.
 | |
|         # Corresponds to the JSON property `combiningFunction`
 | |
|         # @return [String]
 | |
|         attr_accessor :combining_function
 | |
|       
 | |
|         # Required. A list of requirements for the `AccessLevel` to be granted.
 | |
|         # Corresponds to the JSON property `conditions`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1Condition>]
 | |
|         attr_accessor :conditions
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @combining_function = args[:combining_function] if args.key?(:combining_function)
 | |
|           @conditions = args[:conditions] if args.key?(:conditions)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # A condition necessary for an `AccessLevel` to be granted. The Condition is an
 | |
|       # AND over its fields. So a Condition is true if: 1) the request IP is from one
 | |
|       # of the listed subnetworks AND 2) the originating device complies with the
 | |
|       # listed device policy AND 3) all listed access levels are granted AND 4) the
 | |
|       # request was sent at a time allowed by the DateTimeRestriction.
 | |
|       class GoogleIdentityAccesscontextmanagerV1Condition
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # `DevicePolicy` specifies device specific restrictions necessary to acquire a
 | |
|         # given access level. A `DevicePolicy` specifies requirements for requests from
 | |
|         # devices to be granted access levels, it does not do any enforcement on the
 | |
|         # device. `DevicePolicy` acts as an AND over all specified fields, and each
 | |
|         # repeated field is an OR over its elements. Any unset fields are ignored. For
 | |
|         # example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX,
 | |
|         # encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests
 | |
|         # originating from encrypted Linux desktops and encrypted Windows desktops.
 | |
|         # Corresponds to the JSON property `devicePolicy`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1DevicePolicy]
 | |
|         attr_accessor :device_policy
 | |
|       
 | |
|         # CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a
 | |
|         # CIDR IP address block, the specified IP address portion must be properly
 | |
|         # truncated (i.e. all the host bits must be zero) or the input is considered
 | |
|         # malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not.
 | |
|         # Similarly, for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" is
 | |
|         # not. The originating IP of a request must be in one of the listed subnets in
 | |
|         # order for this Condition to be true. If empty, all IP addresses are allowed.
 | |
|         # Corresponds to the JSON property `ipSubnetworks`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :ip_subnetworks
 | |
|       
 | |
|         # The request must be made by one of the provided user or service accounts.
 | |
|         # Groups are not supported. Syntax: `user:`emailid`` `serviceAccount:`emailid``
 | |
|         # If not specified, a request may come from any user.
 | |
|         # Corresponds to the JSON property `members`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :members
 | |
|       
 | |
|         # Whether to negate the Condition. If true, the Condition becomes a NAND over
 | |
|         # its non-empty fields, each field must be false for the Condition overall to be
 | |
|         # satisfied. Defaults to false.
 | |
|         # Corresponds to the JSON property `negate`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :negate
 | |
|         alias_method :negate?, :negate
 | |
|       
 | |
|         # The request must originate from one of the provided countries/regions. Must be
 | |
|         # valid ISO 3166-1 alpha-2 codes.
 | |
|         # Corresponds to the JSON property `regions`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :regions
 | |
|       
 | |
|         # A list of other access levels defined in the same `Policy`, referenced by
 | |
|         # resource name. Referencing an `AccessLevel` which does not exist is an error.
 | |
|         # All access levels listed must be granted for the Condition to be true. Example:
 | |
|         # "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
 | |
|         # Corresponds to the JSON property `requiredAccessLevels`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :required_access_levels
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @device_policy = args[:device_policy] if args.key?(:device_policy)
 | |
|           @ip_subnetworks = args[:ip_subnetworks] if args.key?(:ip_subnetworks)
 | |
|           @members = args[:members] if args.key?(:members)
 | |
|           @negate = args[:negate] if args.key?(:negate)
 | |
|           @regions = args[:regions] if args.key?(:regions)
 | |
|           @required_access_levels = args[:required_access_levels] if args.key?(:required_access_levels)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
 | |
|       # to represent the necessary conditions for the level to apply to a request. See
 | |
|       # CEL spec at: https://github.com/google/cel-spec
 | |
|       class GoogleIdentityAccesscontextmanagerV1CustomLevel
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Represents a textual expression in the Common Expression Language (CEL) syntax.
 | |
|         # CEL is a C-like expression language. The syntax and semantics of CEL are
 | |
|         # documented at https://github.com/google/cel-spec. Example (Comparison): title:
 | |
|         # "Summary size limit" description: "Determines if a summary is less than 100
 | |
|         # chars" expression: "document.summary.size() < 100" Example (Equality): title: "
 | |
|         # Requestor is owner" description: "Determines if requestor is the document
 | |
|         # owner" expression: "document.owner == request.auth.claims.email" Example (
 | |
|         # Logic): title: "Public documents" description: "Determine whether the document
 | |
|         # should be publicly visible" expression: "document.type != 'private' &&
 | |
|         # document.type != 'internal'" Example (Data Manipulation): title: "Notification
 | |
|         # string" description: "Create a notification string with a timestamp."
 | |
|         # expression: "'New message received at ' + string(document.create_time)" The
 | |
|         # exact variables and functions that may be referenced within an expression are
 | |
|         # determined by the service that evaluates it. See the service documentation for
 | |
|         # additional information.
 | |
|         # Corresponds to the JSON property `expr`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::Expr]
 | |
|         attr_accessor :expr
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @expr = args[:expr] if args.key?(:expr)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # `DevicePolicy` specifies device specific restrictions necessary to acquire a
 | |
|       # given access level. A `DevicePolicy` specifies requirements for requests from
 | |
|       # devices to be granted access levels, it does not do any enforcement on the
 | |
|       # device. `DevicePolicy` acts as an AND over all specified fields, and each
 | |
|       # repeated field is an OR over its elements. Any unset fields are ignored. For
 | |
|       # example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX,
 | |
|       # encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests
 | |
|       # originating from encrypted Linux desktops and encrypted Windows desktops.
 | |
|       class GoogleIdentityAccesscontextmanagerV1DevicePolicy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Allowed device management levels, an empty list allows all management levels.
 | |
|         # Corresponds to the JSON property `allowedDeviceManagementLevels`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :allowed_device_management_levels
 | |
|       
 | |
|         # Allowed encryptions statuses, an empty list allows all statuses.
 | |
|         # Corresponds to the JSON property `allowedEncryptionStatuses`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :allowed_encryption_statuses
 | |
|       
 | |
|         # Allowed OS versions, an empty list allows all types and all versions.
 | |
|         # Corresponds to the JSON property `osConstraints`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1OsConstraint>]
 | |
|         attr_accessor :os_constraints
 | |
|       
 | |
|         # Whether the device needs to be approved by the customer admin.
 | |
|         # Corresponds to the JSON property `requireAdminApproval`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :require_admin_approval
 | |
|         alias_method :require_admin_approval?, :require_admin_approval
 | |
|       
 | |
|         # Whether the device needs to be corp owned.
 | |
|         # Corresponds to the JSON property `requireCorpOwned`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :require_corp_owned
 | |
|         alias_method :require_corp_owned?, :require_corp_owned
 | |
|       
 | |
|         # Whether or not screenlock is required for the DevicePolicy to be true.
 | |
|         # Defaults to `false`.
 | |
|         # Corresponds to the JSON property `requireScreenlock`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :require_screenlock
 | |
|         alias_method :require_screenlock?, :require_screenlock
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @allowed_device_management_levels = args[:allowed_device_management_levels] if args.key?(:allowed_device_management_levels)
 | |
|           @allowed_encryption_statuses = args[:allowed_encryption_statuses] if args.key?(:allowed_encryption_statuses)
 | |
|           @os_constraints = args[:os_constraints] if args.key?(:os_constraints)
 | |
|           @require_admin_approval = args[:require_admin_approval] if args.key?(:require_admin_approval)
 | |
|           @require_corp_owned = args[:require_corp_owned] if args.key?(:require_corp_owned)
 | |
|           @require_screenlock = args[:require_screenlock] if args.key?(:require_screenlock)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Defines the conditions under which an EgressPolicy matches a request.
 | |
|       # Conditions based on information about the source of the request. Note that if
 | |
|       # the destination of the request is protected by a ServicePerimeter, then that
 | |
|       # ServicePerimeter must have an IngressPolicy which allows access in order for
 | |
|       # this request to succeed.
 | |
|       class GoogleIdentityAccesscontextmanagerV1EgressFrom
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # A list of identities that are allowed access through this [EgressPolicy].
 | |
|         # Should be in the format of email address. The email address should represent
 | |
|         # individual user or service account only.
 | |
|         # Corresponds to the JSON property `identities`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :identities
 | |
|       
 | |
|         # Specifies the type of identities that are allowed access to outside the
 | |
|         # perimeter. If left unspecified, then members of `identities` field will be
 | |
|         # allowed access.
 | |
|         # Corresponds to the JSON property `identityType`
 | |
|         # @return [String]
 | |
|         attr_accessor :identity_type
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @identities = args[:identities] if args.key?(:identities)
 | |
|           @identity_type = args[:identity_type] if args.key?(:identity_type)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Policy for egress from perimeter. EgressPolicies match requests based on `
 | |
|       # egress_from` and `egress_to` stanzas. For an EgressPolicy to match, both `
 | |
|       # egress_from` and `egress_to` stanzas must be matched. If an EgressPolicy
 | |
|       # matches a request, the request is allowed to span the ServicePerimeter
 | |
|       # boundary. For example, an EgressPolicy can be used to allow VMs on networks
 | |
|       # within the ServicePerimeter to access a defined set of projects outside the
 | |
|       # perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
 | |
|       # or query against a BigQuery dataset). EgressPolicies are concerned with the *
 | |
|       # resources* that a request relates as well as the API services and API actions
 | |
|       # being used. They do not related to the direction of data movement. More
 | |
|       # detailed documentation for this concept can be found in the descriptions of
 | |
|       # EgressFrom and EgressTo.
 | |
|       class GoogleIdentityAccesscontextmanagerV1EgressPolicy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Defines the conditions under which an EgressPolicy matches a request.
 | |
|         # Conditions based on information about the source of the request. Note that if
 | |
|         # the destination of the request is protected by a ServicePerimeter, then that
 | |
|         # ServicePerimeter must have an IngressPolicy which allows access in order for
 | |
|         # this request to succeed.
 | |
|         # Corresponds to the JSON property `egressFrom`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressFrom]
 | |
|         attr_accessor :egress_from
 | |
|       
 | |
|         # Defines the conditions under which an EgressPolicy matches a request.
 | |
|         # Conditions are based on information about the ApiOperation intended to be
 | |
|         # performed on the `resources` specified. Note that if the destination of the
 | |
|         # request is protected by a ServicePerimeter, then that ServicePerimeter must
 | |
|         # have an IngressPolicy which allows access in order for this request to succeed.
 | |
|         # Corresponds to the JSON property `egressTo`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressTo]
 | |
|         attr_accessor :egress_to
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @egress_from = args[:egress_from] if args.key?(:egress_from)
 | |
|           @egress_to = args[:egress_to] if args.key?(:egress_to)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Defines the conditions under which an EgressPolicy matches a request.
 | |
|       # Conditions are based on information about the ApiOperation intended to be
 | |
|       # performed on the `resources` specified. Note that if the destination of the
 | |
|       # request is protected by a ServicePerimeter, then that ServicePerimeter must
 | |
|       # have an IngressPolicy which allows access in order for this request to succeed.
 | |
|       class GoogleIdentityAccesscontextmanagerV1EgressTo
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # A list of ApiOperations that this egress rule applies to. A request matches if
 | |
|         # it contains an operation/service in this list.
 | |
|         # Corresponds to the JSON property `operations`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ApiOperation>]
 | |
|         attr_accessor :operations
 | |
|       
 | |
|         # A list of resources, currently only projects in the form `projects/`, that
 | |
|         # match this to stanza. A request matches if it contains a resource in this list.
 | |
|         # If `*` is specified for resources, then this EgressTo rule will authorize
 | |
|         # access to all resources outside the perimeter.
 | |
|         # Corresponds to the JSON property `resources`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :resources
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @operations = args[:operations] if args.key?(:operations)
 | |
|           @resources = args[:resources] if args.key?(:resources)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Defines the conditions under which an IngressPolicy matches a request.
 | |
|       # Conditions are based on information about the source of the request.
 | |
|       class GoogleIdentityAccesscontextmanagerV1IngressFrom
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # A list of identities that are allowed access through this ingress policy.
 | |
|         # Should be in the format of email address. The email address should represent
 | |
|         # individual user or service account only.
 | |
|         # Corresponds to the JSON property `identities`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :identities
 | |
|       
 | |
|         # Specifies the type of identities that are allowed access from outside the
 | |
|         # perimeter. If left unspecified, then members of `identities` field will be
 | |
|         # allowed access.
 | |
|         # Corresponds to the JSON property `identityType`
 | |
|         # @return [String]
 | |
|         attr_accessor :identity_type
 | |
|       
 | |
|         # Sources that this IngressPolicy authorizes access from.
 | |
|         # Corresponds to the JSON property `sources`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressSource>]
 | |
|         attr_accessor :sources
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @identities = args[:identities] if args.key?(:identities)
 | |
|           @identity_type = args[:identity_type] if args.key?(:identity_type)
 | |
|           @sources = args[:sources] if args.key?(:sources)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Policy for ingress into ServicePerimeter. IngressPolicies match requests based
 | |
|       # on `ingress_from` and `ingress_to` stanzas. For an ingress policy to match,
 | |
|       # both the `ingress_from` and `ingress_to` stanzas must be matched. If an
 | |
|       # IngressPolicy matches a request, the request is allowed through the perimeter
 | |
|       # boundary from outside the perimeter. For example, access from the internet can
 | |
|       # be allowed either based on an AccessLevel or, for traffic hosted on Google
 | |
|       # Cloud, the project of the source network. For access from private networks,
 | |
|       # using the project of the hosting network is required. Individual ingress
 | |
|       # policies can be limited by restricting which services and/or actions they
 | |
|       # match using the `ingress_to` field.
 | |
|       class GoogleIdentityAccesscontextmanagerV1IngressPolicy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Defines the conditions under which an IngressPolicy matches a request.
 | |
|         # Conditions are based on information about the source of the request.
 | |
|         # Corresponds to the JSON property `ingressFrom`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressFrom]
 | |
|         attr_accessor :ingress_from
 | |
|       
 | |
|         # Defines the conditions under which an IngressPolicy matches a request.
 | |
|         # Conditions are based on information about the ApiOperation intended to be
 | |
|         # performed on the destination of the request.
 | |
|         # Corresponds to the JSON property `ingressTo`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressTo]
 | |
|         attr_accessor :ingress_to
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @ingress_from = args[:ingress_from] if args.key?(:ingress_from)
 | |
|           @ingress_to = args[:ingress_to] if args.key?(:ingress_to)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # The source that IngressPolicy authorizes access from.
 | |
|       class GoogleIdentityAccesscontextmanagerV1IngressSource
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # An AccessLevel resource name that allow resources within the ServicePerimeters
 | |
|         # to be accessed from the internet. AccessLevels listed must be in the same
 | |
|         # policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will
 | |
|         # cause an error. If no AccessLevel names are listed, resources within the
 | |
|         # perimeter can only be accessed via Google Cloud calls with request origins
 | |
|         # within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`
 | |
|         # . If `*` is specified, then all IngressSources will be allowed.
 | |
|         # Corresponds to the JSON property `accessLevel`
 | |
|         # @return [String]
 | |
|         attr_accessor :access_level
 | |
|       
 | |
|         # A Google Cloud resource that is allowed to ingress the perimeter. Requests
 | |
|         # from these resources will be allowed to access perimeter data. Currently only
 | |
|         # projects are allowed. Format: `projects/`project_number`` The project may be
 | |
|         # in any Google Cloud organization, not just the organization that the perimeter
 | |
|         # is defined in. `*` is not allowed, the case of allowing all Google Cloud
 | |
|         # resources only is not supported.
 | |
|         # Corresponds to the JSON property `resource`
 | |
|         # @return [String]
 | |
|         attr_accessor :resource
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @access_level = args[:access_level] if args.key?(:access_level)
 | |
|           @resource = args[:resource] if args.key?(:resource)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Defines the conditions under which an IngressPolicy matches a request.
 | |
|       # Conditions are based on information about the ApiOperation intended to be
 | |
|       # performed on the destination of the request.
 | |
|       class GoogleIdentityAccesscontextmanagerV1IngressTo
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # A list of ApiOperations the sources specified in corresponding IngressFrom are
 | |
|         # allowed to perform in this ServicePerimeter.
 | |
|         # Corresponds to the JSON property `operations`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ApiOperation>]
 | |
|         attr_accessor :operations
 | |
|       
 | |
|         # A list of resources, currently only projects in the form `projects/`,
 | |
|         # protected by this ServicePerimeter that are allowed to be accessed by sources
 | |
|         # defined in the corresponding IngressFrom. A request matches if it contains a
 | |
|         # resource in this list. If `*` is specified for resources, then this IngressTo
 | |
|         # rule will authorize access to all resources inside the perimeter, provided
 | |
|         # that the request also matches the `operations` field.
 | |
|         # Corresponds to the JSON property `resources`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :resources
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @operations = args[:operations] if args.key?(:operations)
 | |
|           @resources = args[:resources] if args.key?(:resources)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # An allowed method or permission of a service specified in ApiOperation.
 | |
|       class GoogleIdentityAccesscontextmanagerV1MethodSelector
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Value for `method` should be a valid method name for the corresponding `
 | |
|         # service_name` in ApiOperation. If `*` used as value for `method`, then ALL
 | |
|         # methods and permissions are allowed.
 | |
|         # Corresponds to the JSON property `method`
 | |
|         # @return [String]
 | |
|         attr_accessor :method_prop
 | |
|       
 | |
|         # Value for `permission` should be a valid Cloud IAM permission for the
 | |
|         # corresponding `service_name` in ApiOperation.
 | |
|         # Corresponds to the JSON property `permission`
 | |
|         # @return [String]
 | |
|         attr_accessor :permission
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @method_prop = args[:method_prop] if args.key?(:method_prop)
 | |
|           @permission = args[:permission] if args.key?(:permission)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # A restriction on the OS type and version of devices making requests.
 | |
|       class GoogleIdentityAccesscontextmanagerV1OsConstraint
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # The minimum allowed OS version. If not set, any version of this OS satisfies
 | |
|         # the constraint. Format: `"major.minor.patch"`. Examples: `"10.5.301"`, `"9.2.1"
 | |
|         # `.
 | |
|         # Corresponds to the JSON property `minimumVersion`
 | |
|         # @return [String]
 | |
|         attr_accessor :minimum_version
 | |
|       
 | |
|         # Required. The allowed OS type.
 | |
|         # Corresponds to the JSON property `osType`
 | |
|         # @return [String]
 | |
|         attr_accessor :os_type
 | |
|       
 | |
|         # Only allows requests from devices with a verified Chrome OS. Verifications
 | |
|         # includes requirements that the device is enterprise-managed, conformant to
 | |
|         # domain policies, and the caller has permission to call the API targeted by the
 | |
|         # request.
 | |
|         # Corresponds to the JSON property `requireVerifiedChromeOs`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :require_verified_chrome_os
 | |
|         alias_method :require_verified_chrome_os?, :require_verified_chrome_os
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @minimum_version = args[:minimum_version] if args.key?(:minimum_version)
 | |
|           @os_type = args[:os_type] if args.key?(:os_type)
 | |
|           @require_verified_chrome_os = args[:require_verified_chrome_os] if args.key?(:require_verified_chrome_os)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # `ServicePerimeter` describes a set of Google Cloud resources which can freely
 | |
|       # import and export data amongst themselves, but not export outside of the `
 | |
|       # ServicePerimeter`. If a request with a source within this `ServicePerimeter`
 | |
|       # has a target outside of the `ServicePerimeter`, the request will be blocked.
 | |
|       # Otherwise the request is allowed. There are two types of Service Perimeter -
 | |
|       # Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
 | |
|       # Cloud project can only belong to a single regular Service Perimeter. Service
 | |
|       # Perimeter Bridges can contain only Google Cloud projects as members, a single
 | |
|       # Google Cloud project may belong to multiple Service Perimeter Bridges.
 | |
|       class GoogleIdentityAccesscontextmanagerV1ServicePerimeter
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Description of the `ServicePerimeter` and its use. Does not affect behavior.
 | |
|         # Corresponds to the JSON property `description`
 | |
|         # @return [String]
 | |
|         attr_accessor :description
 | |
|       
 | |
|         # Required. Resource name for the ServicePerimeter. The `short_name` component
 | |
|         # must begin with a letter and only include alphanumeric and '_'. Format: `
 | |
|         # accessPolicies/`policy_id`/servicePerimeters/`short_name``
 | |
|         # Corresponds to the JSON property `name`
 | |
|         # @return [String]
 | |
|         attr_accessor :name
 | |
|       
 | |
|         # Perimeter type indicator. A single project is allowed to be a member of single
 | |
|         # regular perimeter, but multiple service perimeter bridges. A project cannot be
 | |
|         # a included in a perimeter bridge without being included in regular perimeter.
 | |
|         # For perimeter bridges, the restricted service list as well as access level
 | |
|         # lists must be empty.
 | |
|         # Corresponds to the JSON property `perimeterType`
 | |
|         # @return [String]
 | |
|         attr_accessor :perimeter_type
 | |
|       
 | |
|         # `ServicePerimeterConfig` specifies a set of Google Cloud resources that
 | |
|         # describe specific Service Perimeter configuration.
 | |
|         # Corresponds to the JSON property `spec`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig]
 | |
|         attr_accessor :spec
 | |
|       
 | |
|         # `ServicePerimeterConfig` specifies a set of Google Cloud resources that
 | |
|         # describe specific Service Perimeter configuration.
 | |
|         # Corresponds to the JSON property `status`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig]
 | |
|         attr_accessor :status
 | |
|       
 | |
|         # Human readable title. Must be unique within the Policy.
 | |
|         # Corresponds to the JSON property `title`
 | |
|         # @return [String]
 | |
|         attr_accessor :title
 | |
|       
 | |
|         # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists
 | |
|         # for all Service Perimeters, and that spec is identical to the status for those
 | |
|         # Service Perimeters. When this flag is set, it inhibits the generation of the
 | |
|         # implicit spec, thereby allowing the user to explicitly provide a configuration
 | |
|         # ("spec") to use in a dry-run version of the Service Perimeter. This allows the
 | |
|         # user to test changes to the enforced config ("status") without actually
 | |
|         # enforcing them. This testing is done through analyzing the differences between
 | |
|         # currently enforced and suggested restrictions. use_explicit_dry_run_spec must
 | |
|         # bet set to True if any of the fields in the spec are set to non-default values.
 | |
|         # Corresponds to the JSON property `useExplicitDryRunSpec`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :use_explicit_dry_run_spec
 | |
|         alias_method :use_explicit_dry_run_spec?, :use_explicit_dry_run_spec
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @description = args[:description] if args.key?(:description)
 | |
|           @name = args[:name] if args.key?(:name)
 | |
|           @perimeter_type = args[:perimeter_type] if args.key?(:perimeter_type)
 | |
|           @spec = args[:spec] if args.key?(:spec)
 | |
|           @status = args[:status] if args.key?(:status)
 | |
|           @title = args[:title] if args.key?(:title)
 | |
|           @use_explicit_dry_run_spec = args[:use_explicit_dry_run_spec] if args.key?(:use_explicit_dry_run_spec)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # `ServicePerimeterConfig` specifies a set of Google Cloud resources that
 | |
|       # describe specific Service Perimeter configuration.
 | |
|       class GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # A list of `AccessLevel` resource names that allow resources within the `
 | |
|         # ServicePerimeter` to be accessed from the internet. `AccessLevels` listed must
 | |
|         # be in the same policy as this `ServicePerimeter`. Referencing a nonexistent `
 | |
|         # AccessLevel` is a syntax error. If no `AccessLevel` names are listed,
 | |
|         # resources within the perimeter can only be accessed via Google Cloud calls
 | |
|         # with request origins within the perimeter. Example: `"accessPolicies/MY_POLICY/
 | |
|         # accessLevels/MY_LEVEL"`. For Service Perimeter Bridge, must be empty.
 | |
|         # Corresponds to the JSON property `accessLevels`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :access_levels
 | |
|       
 | |
|         # List of EgressPolicies to apply to the perimeter. A perimeter may have
 | |
|         # multiple EgressPolicies, each of which is evaluated separately. Access is
 | |
|         # granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
 | |
|         # Corresponds to the JSON property `egressPolicies`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressPolicy>]
 | |
|         attr_accessor :egress_policies
 | |
|       
 | |
|         # List of IngressPolicies to apply to the perimeter. A perimeter may have
 | |
|         # multiple IngressPolicies, each of which is evaluated separately. Access is
 | |
|         # granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
 | |
|         # Corresponds to the JSON property `ingressPolicies`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressPolicy>]
 | |
|         attr_accessor :ingress_policies
 | |
|       
 | |
|         # A list of Google Cloud resources that are inside of the service perimeter.
 | |
|         # Currently only projects are allowed. Format: `projects/`project_number``
 | |
|         # Corresponds to the JSON property `resources`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :resources
 | |
|       
 | |
|         # Google Cloud services that are subject to the Service Perimeter restrictions.
 | |
|         # For example, if `storage.googleapis.com` is specified, access to the storage
 | |
|         # buckets inside the perimeter must meet the perimeter's access restrictions.
 | |
|         # Corresponds to the JSON property `restrictedServices`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :restricted_services
 | |
|       
 | |
|         # Specifies how APIs are allowed to communicate within the Service Perimeter.
 | |
|         # Corresponds to the JSON property `vpcAccessibleServices`
 | |
|         # @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices]
 | |
|         attr_accessor :vpc_accessible_services
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @access_levels = args[:access_levels] if args.key?(:access_levels)
 | |
|           @egress_policies = args[:egress_policies] if args.key?(:egress_policies)
 | |
|           @ingress_policies = args[:ingress_policies] if args.key?(:ingress_policies)
 | |
|           @resources = args[:resources] if args.key?(:resources)
 | |
|           @restricted_services = args[:restricted_services] if args.key?(:restricted_services)
 | |
|           @vpc_accessible_services = args[:vpc_accessible_services] if args.key?(:vpc_accessible_services)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # Specifies how APIs are allowed to communicate within the Service Perimeter.
 | |
|       class GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # The list of APIs usable within the Service Perimeter. Must be empty unless '
 | |
|         # enable_restriction' is True. You can specify a list of individual services, as
 | |
|         # well as include the 'RESTRICTED-SERVICES' value, which automatically includes
 | |
|         # all of the services protected by the perimeter.
 | |
|         # Corresponds to the JSON property `allowedServices`
 | |
|         # @return [Array<String>]
 | |
|         attr_accessor :allowed_services
 | |
|       
 | |
|         # Whether to restrict API calls within the Service Perimeter to the list of APIs
 | |
|         # specified in 'allowed_services'.
 | |
|         # Corresponds to the JSON property `enableRestriction`
 | |
|         # @return [Boolean]
 | |
|         attr_accessor :enable_restriction
 | |
|         alias_method :enable_restriction?, :enable_restriction
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @allowed_services = args[:allowed_services] if args.key?(:allowed_services)
 | |
|           @enable_restriction = args[:enable_restriction] if args.key?(:enable_restriction)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # ListAssets response.
 | |
|       class ListAssetsResponse
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Assets.
 | |
|         # Corresponds to the JSON property `assets`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::Asset>]
 | |
|         attr_accessor :assets
 | |
|       
 | |
|         # Token to retrieve the next page of results. Set to empty if there are no
 | |
|         # remaining results.
 | |
|         # Corresponds to the JSON property `nextPageToken`
 | |
|         # @return [String]
 | |
|         attr_accessor :next_page_token
 | |
|       
 | |
|         # Time the snapshot was taken.
 | |
|         # Corresponds to the JSON property `readTime`
 | |
|         # @return [String]
 | |
|         attr_accessor :read_time
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @assets = args[:assets] if args.key?(:assets)
 | |
|           @next_page_token = args[:next_page_token] if args.key?(:next_page_token)
 | |
|           @read_time = args[:read_time] if args.key?(:read_time)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # An Identity and Access Management (IAM) policy, which specifies access
 | |
|       # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
 | |
|       # A `binding` binds one or more `members` to a single `role`. Members can be
 | |
|       # user accounts, service accounts, Google groups, and domains (such as G Suite).
 | |
|       # A `role` is a named list of permissions; each `role` can be an IAM predefined
 | |
|       # role or a user-created custom role. For some types of Google Cloud resources,
 | |
|       # a `binding` can also specify a `condition`, which is a logical expression that
 | |
|       # allows access to a resource only if the expression evaluates to `true`. A
 | |
|       # condition can add constraints based on attributes of the request, the resource,
 | |
|       # or both. To learn which resources support conditions in their IAM policies,
 | |
|       # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
 | |
|       # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
 | |
|       # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
 | |
|       # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
 | |
|       # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
 | |
|       # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
 | |
|       # title": "expirable access", "description": "Does not grant access after Sep
 | |
|       # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
 | |
|       # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
 | |
|       # members: - user:mike@example.com - group:admins@example.com - domain:google.
 | |
|       # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
 | |
|       # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
 | |
|       # roles/resourcemanager.organizationViewer condition: title: expirable access
 | |
|       # description: Does not grant access after Sep 2020 expression: request.time <
 | |
|       # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
 | |
|       # description of IAM and its features, see the [IAM documentation](https://cloud.
 | |
|       # google.com/iam/docs/).
 | |
|       class Policy
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # Specifies cloud audit logging configuration for this policy.
 | |
|         # Corresponds to the JSON property `auditConfigs`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::AuditConfig>]
 | |
|         attr_accessor :audit_configs
 | |
|       
 | |
|         # Associates a list of `members` to a `role`. Optionally, may specify a `
 | |
|         # condition` that determines how and when the `bindings` are applied. Each of
 | |
|         # the `bindings` must contain at least one member.
 | |
|         # Corresponds to the JSON property `bindings`
 | |
|         # @return [Array<Google::Apis::CloudassetV1p5beta1::Binding>]
 | |
|         attr_accessor :bindings
 | |
|       
 | |
|         # `etag` is used for optimistic concurrency control as a way to help prevent
 | |
|         # simultaneous updates of a policy from overwriting each other. It is strongly
 | |
|         # suggested that systems make use of the `etag` in the read-modify-write cycle
 | |
|         # to perform policy updates in order to avoid race conditions: An `etag` is
 | |
|         # returned in the response to `getIamPolicy`, and systems are expected to put
 | |
|         # that etag in the request to `setIamPolicy` to ensure that their change will be
 | |
|         # applied to the same version of the policy. **Important:** If you use IAM
 | |
|         # Conditions, you must include the `etag` field whenever you call `setIamPolicy`.
 | |
|         # If you omit this field, then IAM allows you to overwrite a version `3` policy
 | |
|         # with a version `1` policy, and all of the conditions in the version `3` policy
 | |
|         # are lost.
 | |
|         # Corresponds to the JSON property `etag`
 | |
|         # NOTE: Values are automatically base64 encoded/decoded in the client library.
 | |
|         # @return [String]
 | |
|         attr_accessor :etag
 | |
|       
 | |
|         # Specifies the format of the policy. Valid values are `0`, `1`, and `3`.
 | |
|         # Requests that specify an invalid value are rejected. Any operation that
 | |
|         # affects conditional role bindings must specify version `3`. This requirement
 | |
|         # applies to the following operations: * Getting a policy that includes a
 | |
|         # conditional role binding * Adding a conditional role binding to a policy *
 | |
|         # Changing a conditional role binding in a policy * Removing any role binding,
 | |
|         # with or without a condition, from a policy that includes conditions **
 | |
|         # Important:** If you use IAM Conditions, you must include the `etag` field
 | |
|         # whenever you call `setIamPolicy`. If you omit this field, then IAM allows you
 | |
|         # to overwrite a version `3` policy with a version `1` policy, and all of the
 | |
|         # conditions in the version `3` policy are lost. If a policy does not include
 | |
|         # any conditions, operations on that policy may specify any valid version or
 | |
|         # leave the field unset. To learn which resources support conditions in their
 | |
|         # IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/
 | |
|         # conditions/resource-policies).
 | |
|         # Corresponds to the JSON property `version`
 | |
|         # @return [Fixnum]
 | |
|         attr_accessor :version
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @audit_configs = args[:audit_configs] if args.key?(:audit_configs)
 | |
|           @bindings = args[:bindings] if args.key?(:bindings)
 | |
|           @etag = args[:etag] if args.key?(:etag)
 | |
|           @version = args[:version] if args.key?(:version)
 | |
|         end
 | |
|       end
 | |
|       
 | |
|       # A representation of a Google Cloud resource.
 | |
|       class Resource
 | |
|         include Google::Apis::Core::Hashable
 | |
|       
 | |
|         # The content of the resource, in which some sensitive fields are removed and
 | |
|         # may not be present.
 | |
|         # Corresponds to the JSON property `data`
 | |
|         # @return [Hash<String,Object>]
 | |
|         attr_accessor :data
 | |
|       
 | |
|         # The URL of the discovery document containing the resource's JSON schema.
 | |
|         # Example: `https://www.googleapis.com/discovery/v1/apis/compute/v1/rest` This
 | |
|         # value is unspecified for resources that do not have an API based on a
 | |
|         # discovery document, such as Cloud Bigtable.
 | |
|         # Corresponds to the JSON property `discoveryDocumentUri`
 | |
|         # @return [String]
 | |
|         attr_accessor :discovery_document_uri
 | |
|       
 | |
|         # The JSON schema name listed in the discovery document. Example: `Project` This
 | |
|         # value is unspecified for resources that do not have an API based on a
 | |
|         # discovery document, such as Cloud Bigtable.
 | |
|         # Corresponds to the JSON property `discoveryName`
 | |
|         # @return [String]
 | |
|         attr_accessor :discovery_name
 | |
|       
 | |
|         # The full name of the immediate parent of this resource. See [Resource Names](
 | |
|         # https://cloud.google.com/apis/design/resource_names#full_resource_name) for
 | |
|         # more information. For Google Cloud assets, this value is the parent resource
 | |
|         # defined in the [Cloud IAM policy hierarchy](https://cloud.google.com/iam/docs/
 | |
|         # overview#policy_hierarchy). Example: `//cloudresourcemanager.googleapis.com/
 | |
|         # projects/my_project_123` For third-party assets, this field may be set
 | |
|         # differently.
 | |
|         # Corresponds to the JSON property `parent`
 | |
|         # @return [String]
 | |
|         attr_accessor :parent
 | |
|       
 | |
|         # The REST URL for accessing the resource. An HTTP `GET` request using this URL
 | |
|         # returns the resource itself. Example: `https://cloudresourcemanager.googleapis.
 | |
|         # com/v1/projects/my-project-123` This value is unspecified for resources
 | |
|         # without a REST API.
 | |
|         # Corresponds to the JSON property `resourceUrl`
 | |
|         # @return [String]
 | |
|         attr_accessor :resource_url
 | |
|       
 | |
|         # The API version. Example: "v1".
 | |
|         # Corresponds to the JSON property `version`
 | |
|         # @return [String]
 | |
|         attr_accessor :version
 | |
|       
 | |
|         def initialize(**args)
 | |
|            update!(**args)
 | |
|         end
 | |
|       
 | |
|         # Update properties of this object
 | |
|         def update!(**args)
 | |
|           @data = args[:data] if args.key?(:data)
 | |
|           @discovery_document_uri = args[:discovery_document_uri] if args.key?(:discovery_document_uri)
 | |
|           @discovery_name = args[:discovery_name] if args.key?(:discovery_name)
 | |
|           @parent = args[:parent] if args.key?(:parent)
 | |
|           @resource_url = args[:resource_url] if args.key?(:resource_url)
 | |
|           @version = args[:version] if args.key?(:version)
 | |
|         end
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| end
 |