1627 lines
86 KiB
Ruby
1627 lines
86 KiB
Ruby
# Copyright 2020 Google LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
require 'date'
|
|
require 'google/apis/core/base_service'
|
|
require 'google/apis/core/json_representation'
|
|
require 'google/apis/core/hashable'
|
|
require 'google/apis/errors'
|
|
|
|
module Google
|
|
module Apis
|
|
module CloudassetV1p5beta1
|
|
|
|
# An asset in Google Cloud. An asset can be any resource in the Google Cloud [
|
|
# resource hierarchy](https://cloud.google.com/resource-manager/docs/cloud-
|
|
# platform-resource-hierarchy), a resource outside the Google Cloud resource
|
|
# hierarchy (such as Google Kubernetes Engine clusters and objects), or a policy
|
|
# (e.g. Cloud IAM policy). See [Supported asset types](https://cloud.google.com/
|
|
# asset-inventory/docs/supported-asset-types) for more information.
|
|
class Asset
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# An `AccessLevel` is a label that can be applied to requests to Google Cloud
|
|
# services, along with a list of requirements necessary for the label to be
|
|
# applied.
|
|
# Corresponds to the JSON property `accessLevel`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1AccessLevel]
|
|
attr_accessor :access_level
|
|
|
|
# `AccessPolicy` is a container for `AccessLevels` (which define the necessary
|
|
# attributes to use Google Cloud services) and `ServicePerimeters` (which define
|
|
# regions of services able to freely pass data within a perimeter). An access
|
|
# policy is globally visible within an organization, and the restrictions it
|
|
# specifies apply to all projects within an organization.
|
|
# Corresponds to the JSON property `accessPolicy`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1AccessPolicy]
|
|
attr_accessor :access_policy
|
|
|
|
# The ancestry path of an asset in Google Cloud [resource hierarchy](https://
|
|
# cloud.google.com/resource-manager/docs/cloud-platform-resource-hierarchy),
|
|
# represented as a list of relative resource names. An ancestry path starts with
|
|
# the closest ancestor in the hierarchy and ends at root. If the asset is a
|
|
# project, folder, or organization, the ancestry path starts from the asset
|
|
# itself. Example: `["projects/123456789", "folders/5432", "organizations/1234"]`
|
|
# Corresponds to the JSON property `ancestors`
|
|
# @return [Array<String>]
|
|
attr_accessor :ancestors
|
|
|
|
# The type of the asset. Example: `compute.googleapis.com/Disk` See [Supported
|
|
# asset types](https://cloud.google.com/asset-inventory/docs/supported-asset-
|
|
# types) for more information.
|
|
# Corresponds to the JSON property `assetType`
|
|
# @return [String]
|
|
attr_accessor :asset_type
|
|
|
|
# An Identity and Access Management (IAM) policy, which specifies access
|
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
|
# A `binding` binds one or more `members` to a single `role`. Members can be
|
|
# user accounts, service accounts, Google groups, and domains (such as G Suite).
|
|
# A `role` is a named list of permissions; each `role` can be an IAM predefined
|
|
# role or a user-created custom role. For some types of Google Cloud resources,
|
|
# a `binding` can also specify a `condition`, which is a logical expression that
|
|
# allows access to a resource only if the expression evaluates to `true`. A
|
|
# condition can add constraints based on attributes of the request, the resource,
|
|
# or both. To learn which resources support conditions in their IAM policies,
|
|
# see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
|
|
# resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
|
|
# resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
|
|
# group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
|
|
# appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
|
|
# organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
|
|
# title": "expirable access", "description": "Does not grant access after Sep
|
|
# 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
|
|
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
|
|
# members: - user:mike@example.com - group:admins@example.com - domain:google.
|
|
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
|
|
# resourcemanager.organizationAdmin - members: - user:eve@example.com role:
|
|
# roles/resourcemanager.organizationViewer condition: title: expirable access
|
|
# description: Does not grant access after Sep 2020 expression: request.time <
|
|
# timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
|
|
# description of IAM and its features, see the [IAM documentation](https://cloud.
|
|
# google.com/iam/docs/).
|
|
# Corresponds to the JSON property `iamPolicy`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::Policy]
|
|
attr_accessor :iam_policy
|
|
|
|
# The full name of the asset. Example: `//compute.googleapis.com/projects/
|
|
# my_project_123/zones/zone1/instances/instance1` See [Resource names](https://
|
|
# cloud.google.com/apis/design/resource_names#full_resource_name) for more
|
|
# information.
|
|
# Corresponds to the JSON property `name`
|
|
# @return [String]
|
|
attr_accessor :name
|
|
|
|
# A representation of an [organization policy](https://cloud.google.com/resource-
|
|
# manager/docs/organization-policy/overview#organization_policy). There can be
|
|
# more than one organization policy with different constraints set on a given
|
|
# resource.
|
|
# Corresponds to the JSON property `orgPolicy`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1Policy>]
|
|
attr_accessor :org_policy
|
|
|
|
# A representation of a Google Cloud resource.
|
|
# Corresponds to the JSON property `resource`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::Resource]
|
|
attr_accessor :resource
|
|
|
|
# `ServicePerimeter` describes a set of Google Cloud resources which can freely
|
|
# import and export data amongst themselves, but not export outside of the `
|
|
# ServicePerimeter`. If a request with a source within this `ServicePerimeter`
|
|
# has a target outside of the `ServicePerimeter`, the request will be blocked.
|
|
# Otherwise the request is allowed. There are two types of Service Perimeter -
|
|
# Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
|
|
# Cloud project can only belong to a single regular Service Perimeter. Service
|
|
# Perimeter Bridges can contain only Google Cloud projects as members, a single
|
|
# Google Cloud project may belong to multiple Service Perimeter Bridges.
|
|
# Corresponds to the JSON property `servicePerimeter`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeter]
|
|
attr_accessor :service_perimeter
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@access_level = args[:access_level] if args.key?(:access_level)
|
|
@access_policy = args[:access_policy] if args.key?(:access_policy)
|
|
@ancestors = args[:ancestors] if args.key?(:ancestors)
|
|
@asset_type = args[:asset_type] if args.key?(:asset_type)
|
|
@iam_policy = args[:iam_policy] if args.key?(:iam_policy)
|
|
@name = args[:name] if args.key?(:name)
|
|
@org_policy = args[:org_policy] if args.key?(:org_policy)
|
|
@resource = args[:resource] if args.key?(:resource)
|
|
@service_perimeter = args[:service_perimeter] if args.key?(:service_perimeter)
|
|
end
|
|
end
|
|
|
|
# Specifies the audit configuration for a service. The configuration determines
|
|
# which permission types are logged, and what identities, if any, are exempted
|
|
# from logging. An AuditConfig must have one or more AuditLogConfigs. If there
|
|
# are AuditConfigs for both `allServices` and a specific service, the union of
|
|
# the two AuditConfigs is used for that service: the log_types specified in each
|
|
# AuditConfig are enabled, and the exempted_members in each AuditLogConfig are
|
|
# exempted. Example Policy with multiple AuditConfigs: ` "audit_configs": [ ` "
|
|
# service": "allServices", "audit_log_configs": [ ` "log_type": "DATA_READ", "
|
|
# exempted_members": [ "user:jose@example.com" ] `, ` "log_type": "DATA_WRITE" `,
|
|
# ` "log_type": "ADMIN_READ" ` ] `, ` "service": "sampleservice.googleapis.com",
|
|
# "audit_log_configs": [ ` "log_type": "DATA_READ" `, ` "log_type": "DATA_WRITE"
|
|
# , "exempted_members": [ "user:aliya@example.com" ] ` ] ` ] ` For sampleservice,
|
|
# this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also
|
|
# exempts jose@example.com from DATA_READ logging, and aliya@example.com from
|
|
# DATA_WRITE logging.
|
|
class AuditConfig
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# The configuration for logging of each type of permission.
|
|
# Corresponds to the JSON property `auditLogConfigs`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::AuditLogConfig>]
|
|
attr_accessor :audit_log_configs
|
|
|
|
# Specifies a service that will be enabled for audit logging. For example, `
|
|
# storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special
|
|
# value that covers all services.
|
|
# Corresponds to the JSON property `service`
|
|
# @return [String]
|
|
attr_accessor :service
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@audit_log_configs = args[:audit_log_configs] if args.key?(:audit_log_configs)
|
|
@service = args[:service] if args.key?(:service)
|
|
end
|
|
end
|
|
|
|
# Provides the configuration for logging a type of permissions. Example: ` "
|
|
# audit_log_configs": [ ` "log_type": "DATA_READ", "exempted_members": [ "user:
|
|
# jose@example.com" ] `, ` "log_type": "DATA_WRITE" ` ] ` This enables '
|
|
# DATA_READ' and 'DATA_WRITE' logging, while exempting jose@example.com from
|
|
# DATA_READ logging.
|
|
class AuditLogConfig
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Specifies the identities that do not cause logging for this type of permission.
|
|
# Follows the same format of Binding.members.
|
|
# Corresponds to the JSON property `exemptedMembers`
|
|
# @return [Array<String>]
|
|
attr_accessor :exempted_members
|
|
|
|
# The log type that this config enables.
|
|
# Corresponds to the JSON property `logType`
|
|
# @return [String]
|
|
attr_accessor :log_type
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@exempted_members = args[:exempted_members] if args.key?(:exempted_members)
|
|
@log_type = args[:log_type] if args.key?(:log_type)
|
|
end
|
|
end
|
|
|
|
# Associates `members` with a `role`.
|
|
class Binding
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Represents a textual expression in the Common Expression Language (CEL) syntax.
|
|
# CEL is a C-like expression language. The syntax and semantics of CEL are
|
|
# documented at https://github.com/google/cel-spec. Example (Comparison): title:
|
|
# "Summary size limit" description: "Determines if a summary is less than 100
|
|
# chars" expression: "document.summary.size() < 100" Example (Equality): title: "
|
|
# Requestor is owner" description: "Determines if requestor is the document
|
|
# owner" expression: "document.owner == request.auth.claims.email" Example (
|
|
# Logic): title: "Public documents" description: "Determine whether the document
|
|
# should be publicly visible" expression: "document.type != 'private' &&
|
|
# document.type != 'internal'" Example (Data Manipulation): title: "Notification
|
|
# string" description: "Create a notification string with a timestamp."
|
|
# expression: "'New message received at ' + string(document.create_time)" The
|
|
# exact variables and functions that may be referenced within an expression are
|
|
# determined by the service that evaluates it. See the service documentation for
|
|
# additional information.
|
|
# Corresponds to the JSON property `condition`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::Expr]
|
|
attr_accessor :condition
|
|
|
|
# Specifies the identities requesting access for a Cloud Platform resource. `
|
|
# members` can have the following values: * `allUsers`: A special identifier
|
|
# that represents anyone who is on the internet; with or without a Google
|
|
# account. * `allAuthenticatedUsers`: A special identifier that represents
|
|
# anyone who is authenticated with a Google account or a service account. * `
|
|
# user:`emailid``: An email address that represents a specific Google account.
|
|
# For example, `alice@example.com` . * `serviceAccount:`emailid``: An email
|
|
# address that represents a service account. For example, `my-other-app@appspot.
|
|
# gserviceaccount.com`. * `group:`emailid``: An email address that represents a
|
|
# Google group. For example, `admins@example.com`. * `deleted:user:`emailid`?uid=
|
|
# `uniqueid``: An email address (plus unique identifier) representing a user
|
|
# that has been recently deleted. For example, `alice@example.com?uid=
|
|
# 123456789012345678901`. If the user is recovered, this value reverts to `user:`
|
|
# emailid`` and the recovered user retains the role in the binding. * `deleted:
|
|
# serviceAccount:`emailid`?uid=`uniqueid``: An email address (plus unique
|
|
# identifier) representing a service account that has been recently deleted. For
|
|
# example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
|
|
# If the service account is undeleted, this value reverts to `serviceAccount:`
|
|
# emailid`` and the undeleted service account retains the role in the binding. *
|
|
# `deleted:group:`emailid`?uid=`uniqueid``: An email address (plus unique
|
|
# identifier) representing a Google group that has been recently deleted. For
|
|
# example, `admins@example.com?uid=123456789012345678901`. If the group is
|
|
# recovered, this value reverts to `group:`emailid`` and the recovered group
|
|
# retains the role in the binding. * `domain:`domain``: The G Suite domain (
|
|
# primary) that represents all the users of that domain. For example, `google.
|
|
# com` or `example.com`.
|
|
# Corresponds to the JSON property `members`
|
|
# @return [Array<String>]
|
|
attr_accessor :members
|
|
|
|
# Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
|
|
# , or `roles/owner`.
|
|
# Corresponds to the JSON property `role`
|
|
# @return [String]
|
|
attr_accessor :role
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@condition = args[:condition] if args.key?(:condition)
|
|
@members = args[:members] if args.key?(:members)
|
|
@role = args[:role] if args.key?(:role)
|
|
end
|
|
end
|
|
|
|
# Represents a textual expression in the Common Expression Language (CEL) syntax.
|
|
# CEL is a C-like expression language. The syntax and semantics of CEL are
|
|
# documented at https://github.com/google/cel-spec. Example (Comparison): title:
|
|
# "Summary size limit" description: "Determines if a summary is less than 100
|
|
# chars" expression: "document.summary.size() < 100" Example (Equality): title: "
|
|
# Requestor is owner" description: "Determines if requestor is the document
|
|
# owner" expression: "document.owner == request.auth.claims.email" Example (
|
|
# Logic): title: "Public documents" description: "Determine whether the document
|
|
# should be publicly visible" expression: "document.type != 'private' &&
|
|
# document.type != 'internal'" Example (Data Manipulation): title: "Notification
|
|
# string" description: "Create a notification string with a timestamp."
|
|
# expression: "'New message received at ' + string(document.create_time)" The
|
|
# exact variables and functions that may be referenced within an expression are
|
|
# determined by the service that evaluates it. See the service documentation for
|
|
# additional information.
|
|
class Expr
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Optional. Description of the expression. This is a longer text which describes
|
|
# the expression, e.g. when hovered over it in a UI.
|
|
# Corresponds to the JSON property `description`
|
|
# @return [String]
|
|
attr_accessor :description
|
|
|
|
# Textual representation of an expression in Common Expression Language syntax.
|
|
# Corresponds to the JSON property `expression`
|
|
# @return [String]
|
|
attr_accessor :expression
|
|
|
|
# Optional. String indicating the location of the expression for error reporting,
|
|
# e.g. a file name and a position in the file.
|
|
# Corresponds to the JSON property `location`
|
|
# @return [String]
|
|
attr_accessor :location
|
|
|
|
# Optional. Title for the expression, i.e. a short string describing its purpose.
|
|
# This can be used e.g. in UIs which allow to enter the expression.
|
|
# Corresponds to the JSON property `title`
|
|
# @return [String]
|
|
attr_accessor :title
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@description = args[:description] if args.key?(:description)
|
|
@expression = args[:expression] if args.key?(:expression)
|
|
@location = args[:location] if args.key?(:location)
|
|
@title = args[:title] if args.key?(:title)
|
|
end
|
|
end
|
|
|
|
# Used in `policy_type` to specify how `boolean_policy` will behave at this
|
|
# resource.
|
|
class GoogleCloudOrgpolicyV1BooleanPolicy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# If `true`, then the `Policy` is enforced. If `false`, then any configuration
|
|
# is acceptable. Suppose you have a `Constraint` `constraints/compute.
|
|
# disableSerialPortAccess` with `constraint_default` set to `ALLOW`. A `Policy`
|
|
# for that `Constraint` exhibits the following behavior: - If the `Policy` at
|
|
# this resource has enforced set to `false`, serial port connection attempts
|
|
# will be allowed. - If the `Policy` at this resource has enforced set to `true`,
|
|
# serial port connection attempts will be refused. - If the `Policy` at this
|
|
# resource is `RestoreDefault`, serial port connection attempts will be allowed.
|
|
# - If no `Policy` is set at this resource or anywhere higher in the resource
|
|
# hierarchy, serial port connection attempts will be allowed. - If no `Policy`
|
|
# is set at this resource, but one exists higher in the resource hierarchy, the
|
|
# behavior is as if the`Policy` were set at this resource. The following
|
|
# examples demonstrate the different possible layerings: Example 1 (nearest `
|
|
# Constraint` wins): `organizations/foo` has a `Policy` with: `enforced: false` `
|
|
# projects/bar` has no `Policy` set. The constraint at `projects/bar` and `
|
|
# organizations/foo` will not be enforced. Example 2 (enforcement gets replaced):
|
|
# `organizations/foo` has a `Policy` with: `enforced: false` `projects/bar` has
|
|
# a `Policy` with: `enforced: true` The constraint at `organizations/foo` is not
|
|
# enforced. The constraint at `projects/bar` is enforced. Example 3 (
|
|
# RestoreDefault): `organizations/foo` has a `Policy` with: `enforced: true` `
|
|
# projects/bar` has a `Policy` with: `RestoreDefault: ``` The constraint at `
|
|
# organizations/foo` is enforced. The constraint at `projects/bar` is not
|
|
# enforced, because `constraint_default` for the `Constraint` is `ALLOW`.
|
|
# Corresponds to the JSON property `enforced`
|
|
# @return [Boolean]
|
|
attr_accessor :enforced
|
|
alias_method :enforced?, :enforced
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@enforced = args[:enforced] if args.key?(:enforced)
|
|
end
|
|
end
|
|
|
|
# Used in `policy_type` to specify how `list_policy` behaves at this resource. `
|
|
# ListPolicy` can define specific values and subtrees of Cloud Resource Manager
|
|
# resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed
|
|
# or denied by setting the `allowed_values` and `denied_values` fields. This is
|
|
# achieved by using the `under:` and optional `is:` prefixes. The `under:`
|
|
# prefix is used to denote resource subtree values. The `is:` prefix is used to
|
|
# denote specific values, and is required only if the value contains a ":".
|
|
# Values prefixed with "is:" are treated the same as values with no prefix.
|
|
# Ancestry subtrees must be in one of the following formats: - "projects/", e.g.
|
|
# "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/",
|
|
# e.g. "organizations/1234" The `supports_under` field of the associated `
|
|
# Constraint` defines whether ancestry prefixes can be used. You can set `
|
|
# allowed_values` and `denied_values` in the same `Policy` if `all_values` is `
|
|
# ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
|
|
# values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values`
|
|
# and `denied_values` must be unset.
|
|
class GoogleCloudOrgpolicyV1ListPolicy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# The policy all_values state.
|
|
# Corresponds to the JSON property `allValues`
|
|
# @return [String]
|
|
attr_accessor :all_values
|
|
|
|
# List of values allowed at this resource. Can only be set if `all_values` is
|
|
# set to `ALL_VALUES_UNSPECIFIED`.
|
|
# Corresponds to the JSON property `allowedValues`
|
|
# @return [Array<String>]
|
|
attr_accessor :allowed_values
|
|
|
|
# List of values denied at this resource. Can only be set if `all_values` is set
|
|
# to `ALL_VALUES_UNSPECIFIED`.
|
|
# Corresponds to the JSON property `deniedValues`
|
|
# @return [Array<String>]
|
|
attr_accessor :denied_values
|
|
|
|
# Determines the inheritance behavior for this `Policy`. By default, a `
|
|
# ListPolicy` set at a resource supersedes any `Policy` set anywhere up the
|
|
# resource hierarchy. However, if `inherit_from_parent` is set to `true`, then
|
|
# the values from the effective `Policy` of the parent resource are inherited,
|
|
# meaning the values set in this `Policy` are added to the values inherited up
|
|
# the hierarchy. Setting `Policy` hierarchies that inherit both allowed values
|
|
# and denied values isn't recommended in most circumstances to keep the
|
|
# configuration simple and understandable. However, it is possible to set a `
|
|
# Policy` with `allowed_values` set that inherits a `Policy` with `denied_values`
|
|
# set. In this case, the values that are allowed must be in `allowed_values`
|
|
# and not present in `denied_values`. For example, suppose you have a `
|
|
# Constraint` `constraints/serviceuser.services`, which has a `constraint_type`
|
|
# of `list_constraint`, and with `constraint_default` set to `ALLOW`. Suppose
|
|
# that at the Organization level, a `Policy` is applied that restricts the
|
|
# allowed API activations to ``E1`, `E2``. Then, if a `Policy` is applied to a
|
|
# project below the Organization that has `inherit_from_parent` set to `false`
|
|
# and field all_values set to DENY, then an attempt to activate any API will be
|
|
# denied. The following examples demonstrate different possible layerings for `
|
|
# projects/bar` parented by `organizations/foo`: Example 1 (no inherited values):
|
|
# `organizations/foo` has a `Policy` with values: `allowed_values: "E1"
|
|
# allowed_values:"E2"` `projects/bar` has `inherit_from_parent` `false` and
|
|
# values: `allowed_values: "E3" allowed_values: "E4"` The accepted values at `
|
|
# organizations/foo` are `E1`, `E2`. The accepted values at `projects/bar` are `
|
|
# E3`, and `E4`. Example 2 (inherited values): `organizations/foo` has a `Policy`
|
|
# with values: `allowed_values: "E1" allowed_values:"E2"` `projects/bar` has a `
|
|
# Policy` with values: `value: "E3" value: "E4" inherit_from_parent: true` The
|
|
# accepted values at `organizations/foo` are `E1`, `E2`. The accepted values at `
|
|
# projects/bar` are `E1`, `E2`, `E3`, and `E4`. Example 3 (inheriting both
|
|
# allowed and denied values): `organizations/foo` has a `Policy` with values: `
|
|
# allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `Policy` with:
|
|
# `denied_values: "E1"` The accepted values at `organizations/foo` are `E1`, `E2`
|
|
# . The value accepted at `projects/bar` is `E2`. Example 4 (RestoreDefault): `
|
|
# organizations/foo` has a `Policy` with values: `allowed_values: "E1"
|
|
# allowed_values:"E2"` `projects/bar` has a `Policy` with values: `
|
|
# RestoreDefault: ``` The accepted values at `organizations/foo` are `E1`, `E2`.
|
|
# The accepted values at `projects/bar` are either all or none depending on the
|
|
# value of `constraint_default` (if `ALLOW`, all; if `DENY`, none). Example 5 (
|
|
# no policy inherits parent policy): `organizations/foo` has no `Policy` set. `
|
|
# projects/bar` has no `Policy` set. The accepted values at both levels are
|
|
# either all or none depending on the value of `constraint_default` (if `ALLOW`,
|
|
# all; if `DENY`, none). Example 6 (ListConstraint allowing all): `organizations/
|
|
# foo` has a `Policy` with values: `allowed_values: "E1" allowed_values: "E2"` `
|
|
# projects/bar` has a `Policy` with: `all: ALLOW` The accepted values at `
|
|
# organizations/foo` are `E1`, E2`. Any value is accepted at `projects/bar`.
|
|
# Example 7 (ListConstraint allowing none): `organizations/foo` has a `Policy`
|
|
# with values: `allowed_values: "E1" allowed_values: "E2"` `projects/bar` has a `
|
|
# Policy` with: `all: DENY` The accepted values at `organizations/foo` are `E1`,
|
|
# E2`. No value is accepted at `projects/bar`. Example 10 (allowed and denied
|
|
# subtrees of Resource Manager hierarchy): Given the following resource
|
|
# hierarchy O1->`F1, F2`; F1->`P1`; F2->`P2, P3`, `organizations/foo` has a `
|
|
# Policy` with values: `allowed_values: "under:organizations/O1"` `projects/bar`
|
|
# has a `Policy` with: `allowed_values: "under:projects/P3"` `denied_values: "
|
|
# under:folders/F2"` The accepted values at `organizations/foo` are `
|
|
# organizations/O1`, `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`, `
|
|
# projects/P3`. The accepted values at `projects/bar` are `organizations/O1`, `
|
|
# folders/F1`, `projects/P1`.
|
|
# Corresponds to the JSON property `inheritFromParent`
|
|
# @return [Boolean]
|
|
attr_accessor :inherit_from_parent
|
|
alias_method :inherit_from_parent?, :inherit_from_parent
|
|
|
|
# Optional. The Google Cloud Console will try to default to a configuration that
|
|
# matches the value specified in this `Policy`. If `suggested_value` is not set,
|
|
# it will inherit the value specified higher in the hierarchy, unless `
|
|
# inherit_from_parent` is `false`.
|
|
# Corresponds to the JSON property `suggestedValue`
|
|
# @return [String]
|
|
attr_accessor :suggested_value
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@all_values = args[:all_values] if args.key?(:all_values)
|
|
@allowed_values = args[:allowed_values] if args.key?(:allowed_values)
|
|
@denied_values = args[:denied_values] if args.key?(:denied_values)
|
|
@inherit_from_parent = args[:inherit_from_parent] if args.key?(:inherit_from_parent)
|
|
@suggested_value = args[:suggested_value] if args.key?(:suggested_value)
|
|
end
|
|
end
|
|
|
|
# Defines a Cloud Organization `Policy` which is used to specify `Constraints`
|
|
# for configurations of Cloud Platform resources.
|
|
class GoogleCloudOrgpolicyV1Policy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Used in `policy_type` to specify how `boolean_policy` will behave at this
|
|
# resource.
|
|
# Corresponds to the JSON property `booleanPolicy`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1BooleanPolicy]
|
|
attr_accessor :boolean_policy
|
|
|
|
# The name of the `Constraint` the `Policy` is configuring, for example, `
|
|
# constraints/serviceuser.services`. A [list of available constraints](/resource-
|
|
# manager/docs/organization-policy/org-policy-constraints) is available.
|
|
# Immutable after creation.
|
|
# Corresponds to the JSON property `constraint`
|
|
# @return [String]
|
|
attr_accessor :constraint
|
|
|
|
# An opaque tag indicating the current version of the `Policy`, used for
|
|
# concurrency control. When the `Policy` is returned from either a `GetPolicy`
|
|
# or a `ListOrgPolicy` request, this `etag` indicates the version of the current
|
|
# `Policy` to use when executing a read-modify-write loop. When the `Policy` is
|
|
# returned from a `GetEffectivePolicy` request, the `etag` will be unset. When
|
|
# the `Policy` is used in a `SetOrgPolicy` method, use the `etag` value that was
|
|
# returned from a `GetOrgPolicy` request as part of a read-modify-write loop for
|
|
# concurrency control. Not setting the `etag`in a `SetOrgPolicy` request will
|
|
# result in an unconditional write of the `Policy`.
|
|
# Corresponds to the JSON property `etag`
|
|
# NOTE: Values are automatically base64 encoded/decoded in the client library.
|
|
# @return [String]
|
|
attr_accessor :etag
|
|
|
|
# Used in `policy_type` to specify how `list_policy` behaves at this resource. `
|
|
# ListPolicy` can define specific values and subtrees of Cloud Resource Manager
|
|
# resource hierarchy (`Organizations`, `Folders`, `Projects`) that are allowed
|
|
# or denied by setting the `allowed_values` and `denied_values` fields. This is
|
|
# achieved by using the `under:` and optional `is:` prefixes. The `under:`
|
|
# prefix is used to denote resource subtree values. The `is:` prefix is used to
|
|
# denote specific values, and is required only if the value contains a ":".
|
|
# Values prefixed with "is:" are treated the same as values with no prefix.
|
|
# Ancestry subtrees must be in one of the following formats: - "projects/", e.g.
|
|
# "projects/tokyo-rain-123" - "folders/", e.g. "folders/1234" - "organizations/",
|
|
# e.g. "organizations/1234" The `supports_under` field of the associated `
|
|
# Constraint` defines whether ancestry prefixes can be used. You can set `
|
|
# allowed_values` and `denied_values` in the same `Policy` if `all_values` is `
|
|
# ALL_VALUES_UNSPECIFIED`. `ALLOW` or `DENY` are used to allow or deny all
|
|
# values. If `all_values` is set to either `ALLOW` or `DENY`, `allowed_values`
|
|
# and `denied_values` must be unset.
|
|
# Corresponds to the JSON property `listPolicy`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1ListPolicy]
|
|
attr_accessor :list_policy
|
|
|
|
# Ignores policies set above this resource and restores the `constraint_default`
|
|
# enforcement behavior of the specific `Constraint` at this resource. Suppose
|
|
# that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/
|
|
# serviceuser.services`. Suppose that organization foo.com sets a `Policy` at
|
|
# their Organization resource node that restricts the allowed service
|
|
# activations to deny all service activations. They could then set a `Policy`
|
|
# with the `policy_type` `restore_default` on several experimental projects,
|
|
# restoring the `constraint_default` enforcement of the `Constraint` for only
|
|
# those projects, allowing those projects to have all services activated.
|
|
# Corresponds to the JSON property `restoreDefault`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleCloudOrgpolicyV1RestoreDefault]
|
|
attr_accessor :restore_default
|
|
|
|
# The time stamp the `Policy` was previously updated. This is set by the server,
|
|
# not specified by the caller, and represents the last time a call to `
|
|
# SetOrgPolicy` was made for that `Policy`. Any value set by the client will be
|
|
# ignored.
|
|
# Corresponds to the JSON property `updateTime`
|
|
# @return [String]
|
|
attr_accessor :update_time
|
|
|
|
# Version of the `Policy`. Default version is 0;
|
|
# Corresponds to the JSON property `version`
|
|
# @return [Fixnum]
|
|
attr_accessor :version
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@boolean_policy = args[:boolean_policy] if args.key?(:boolean_policy)
|
|
@constraint = args[:constraint] if args.key?(:constraint)
|
|
@etag = args[:etag] if args.key?(:etag)
|
|
@list_policy = args[:list_policy] if args.key?(:list_policy)
|
|
@restore_default = args[:restore_default] if args.key?(:restore_default)
|
|
@update_time = args[:update_time] if args.key?(:update_time)
|
|
@version = args[:version] if args.key?(:version)
|
|
end
|
|
end
|
|
|
|
# Ignores policies set above this resource and restores the `constraint_default`
|
|
# enforcement behavior of the specific `Constraint` at this resource. Suppose
|
|
# that `constraint_default` is set to `ALLOW` for the `Constraint` `constraints/
|
|
# serviceuser.services`. Suppose that organization foo.com sets a `Policy` at
|
|
# their Organization resource node that restricts the allowed service
|
|
# activations to deny all service activations. They could then set a `Policy`
|
|
# with the `policy_type` `restore_default` on several experimental projects,
|
|
# restoring the `constraint_default` enforcement of the `Constraint` for only
|
|
# those projects, allowing those projects to have all services activated.
|
|
class GoogleCloudOrgpolicyV1RestoreDefault
|
|
include Google::Apis::Core::Hashable
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
end
|
|
end
|
|
|
|
# An `AccessLevel` is a label that can be applied to requests to Google Cloud
|
|
# services, along with a list of requirements necessary for the label to be
|
|
# applied.
|
|
class GoogleIdentityAccesscontextmanagerV1AccessLevel
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# `BasicLevel` is an `AccessLevel` using a set of recommended features.
|
|
# Corresponds to the JSON property `basic`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1BasicLevel]
|
|
attr_accessor :basic
|
|
|
|
# `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
|
|
# to represent the necessary conditions for the level to apply to a request. See
|
|
# CEL spec at: https://github.com/google/cel-spec
|
|
# Corresponds to the JSON property `custom`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1CustomLevel]
|
|
attr_accessor :custom
|
|
|
|
# Description of the `AccessLevel` and its use. Does not affect behavior.
|
|
# Corresponds to the JSON property `description`
|
|
# @return [String]
|
|
attr_accessor :description
|
|
|
|
# Required. Resource name for the Access Level. The `short_name` component must
|
|
# begin with a letter and only include alphanumeric and '_'. Format: `
|
|
# accessPolicies/`policy_id`/accessLevels/`short_name``. The maximum length of
|
|
# the `short_name` component is 50 characters.
|
|
# Corresponds to the JSON property `name`
|
|
# @return [String]
|
|
attr_accessor :name
|
|
|
|
# Human readable title. Must be unique within the Policy.
|
|
# Corresponds to the JSON property `title`
|
|
# @return [String]
|
|
attr_accessor :title
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@basic = args[:basic] if args.key?(:basic)
|
|
@custom = args[:custom] if args.key?(:custom)
|
|
@description = args[:description] if args.key?(:description)
|
|
@name = args[:name] if args.key?(:name)
|
|
@title = args[:title] if args.key?(:title)
|
|
end
|
|
end
|
|
|
|
# `AccessPolicy` is a container for `AccessLevels` (which define the necessary
|
|
# attributes to use Google Cloud services) and `ServicePerimeters` (which define
|
|
# regions of services able to freely pass data within a perimeter). An access
|
|
# policy is globally visible within an organization, and the restrictions it
|
|
# specifies apply to all projects within an organization.
|
|
class GoogleIdentityAccesscontextmanagerV1AccessPolicy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Output only. An opaque identifier for the current version of the `AccessPolicy`
|
|
# . This will always be a strongly validated etag, meaning that two Access
|
|
# Polices will be identical if and only if their etags are identical. Clients
|
|
# should not expect this to be in any specific format.
|
|
# Corresponds to the JSON property `etag`
|
|
# @return [String]
|
|
attr_accessor :etag
|
|
|
|
# Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/`
|
|
# policy_id``
|
|
# Corresponds to the JSON property `name`
|
|
# @return [String]
|
|
attr_accessor :name
|
|
|
|
# Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy.
|
|
# Currently immutable once created. Format: `organizations/`organization_id``
|
|
# Corresponds to the JSON property `parent`
|
|
# @return [String]
|
|
attr_accessor :parent
|
|
|
|
# Required. Human readable title. Does not affect behavior.
|
|
# Corresponds to the JSON property `title`
|
|
# @return [String]
|
|
attr_accessor :title
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@etag = args[:etag] if args.key?(:etag)
|
|
@name = args[:name] if args.key?(:name)
|
|
@parent = args[:parent] if args.key?(:parent)
|
|
@title = args[:title] if args.key?(:title)
|
|
end
|
|
end
|
|
|
|
# Identification for an API Operation.
|
|
class GoogleIdentityAccesscontextmanagerV1ApiOperation
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# API methods or permissions to allow. Method or permission must belong to the
|
|
# service specified by `service_name` field. A single MethodSelector entry with `
|
|
# *` specified for the `method` field will allow all methods AND permissions for
|
|
# the service specified in `service_name`.
|
|
# Corresponds to the JSON property `methodSelectors`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1MethodSelector>]
|
|
attr_accessor :method_selectors
|
|
|
|
# The name of the API whose methods or permissions the IngressPolicy or
|
|
# EgressPolicy want to allow. A single ApiOperation with `service_name` field
|
|
# set to `*` will allow all methods AND permissions for all services.
|
|
# Corresponds to the JSON property `serviceName`
|
|
# @return [String]
|
|
attr_accessor :service_name
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@method_selectors = args[:method_selectors] if args.key?(:method_selectors)
|
|
@service_name = args[:service_name] if args.key?(:service_name)
|
|
end
|
|
end
|
|
|
|
# `BasicLevel` is an `AccessLevel` using a set of recommended features.
|
|
class GoogleIdentityAccesscontextmanagerV1BasicLevel
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# How the `conditions` list should be combined to determine if a request is
|
|
# granted this `AccessLevel`. If AND is used, each `Condition` in `conditions`
|
|
# must be satisfied for the `AccessLevel` to be applied. If OR is used, at least
|
|
# one `Condition` in `conditions` must be satisfied for the `AccessLevel` to be
|
|
# applied. Default behavior is AND.
|
|
# Corresponds to the JSON property `combiningFunction`
|
|
# @return [String]
|
|
attr_accessor :combining_function
|
|
|
|
# Required. A list of requirements for the `AccessLevel` to be granted.
|
|
# Corresponds to the JSON property `conditions`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1Condition>]
|
|
attr_accessor :conditions
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@combining_function = args[:combining_function] if args.key?(:combining_function)
|
|
@conditions = args[:conditions] if args.key?(:conditions)
|
|
end
|
|
end
|
|
|
|
# A condition necessary for an `AccessLevel` to be granted. The Condition is an
|
|
# AND over its fields. So a Condition is true if: 1) the request IP is from one
|
|
# of the listed subnetworks AND 2) the originating device complies with the
|
|
# listed device policy AND 3) all listed access levels are granted AND 4) the
|
|
# request was sent at a time allowed by the DateTimeRestriction.
|
|
class GoogleIdentityAccesscontextmanagerV1Condition
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# `DevicePolicy` specifies device specific restrictions necessary to acquire a
|
|
# given access level. A `DevicePolicy` specifies requirements for requests from
|
|
# devices to be granted access levels, it does not do any enforcement on the
|
|
# device. `DevicePolicy` acts as an AND over all specified fields, and each
|
|
# repeated field is an OR over its elements. Any unset fields are ignored. For
|
|
# example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX,
|
|
# encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests
|
|
# originating from encrypted Linux desktops and encrypted Windows desktops.
|
|
# Corresponds to the JSON property `devicePolicy`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1DevicePolicy]
|
|
attr_accessor :device_policy
|
|
|
|
# CIDR block IP subnetwork specification. May be IPv4 or IPv6. Note that for a
|
|
# CIDR IP address block, the specified IP address portion must be properly
|
|
# truncated (i.e. all the host bits must be zero) or the input is considered
|
|
# malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not.
|
|
# Similarly, for IPv6, "2001:db8::/32" is accepted whereas "2001:db8::1/32" is
|
|
# not. The originating IP of a request must be in one of the listed subnets in
|
|
# order for this Condition to be true. If empty, all IP addresses are allowed.
|
|
# Corresponds to the JSON property `ipSubnetworks`
|
|
# @return [Array<String>]
|
|
attr_accessor :ip_subnetworks
|
|
|
|
# The request must be made by one of the provided user or service accounts.
|
|
# Groups are not supported. Syntax: `user:`emailid`` `serviceAccount:`emailid``
|
|
# If not specified, a request may come from any user.
|
|
# Corresponds to the JSON property `members`
|
|
# @return [Array<String>]
|
|
attr_accessor :members
|
|
|
|
# Whether to negate the Condition. If true, the Condition becomes a NAND over
|
|
# its non-empty fields, each field must be false for the Condition overall to be
|
|
# satisfied. Defaults to false.
|
|
# Corresponds to the JSON property `negate`
|
|
# @return [Boolean]
|
|
attr_accessor :negate
|
|
alias_method :negate?, :negate
|
|
|
|
# The request must originate from one of the provided countries/regions. Must be
|
|
# valid ISO 3166-1 alpha-2 codes.
|
|
# Corresponds to the JSON property `regions`
|
|
# @return [Array<String>]
|
|
attr_accessor :regions
|
|
|
|
# A list of other access levels defined in the same `Policy`, referenced by
|
|
# resource name. Referencing an `AccessLevel` which does not exist is an error.
|
|
# All access levels listed must be granted for the Condition to be true. Example:
|
|
# "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
|
|
# Corresponds to the JSON property `requiredAccessLevels`
|
|
# @return [Array<String>]
|
|
attr_accessor :required_access_levels
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@device_policy = args[:device_policy] if args.key?(:device_policy)
|
|
@ip_subnetworks = args[:ip_subnetworks] if args.key?(:ip_subnetworks)
|
|
@members = args[:members] if args.key?(:members)
|
|
@negate = args[:negate] if args.key?(:negate)
|
|
@regions = args[:regions] if args.key?(:regions)
|
|
@required_access_levels = args[:required_access_levels] if args.key?(:required_access_levels)
|
|
end
|
|
end
|
|
|
|
# `CustomLevel` is an `AccessLevel` using the Cloud Common Expression Language
|
|
# to represent the necessary conditions for the level to apply to a request. See
|
|
# CEL spec at: https://github.com/google/cel-spec
|
|
class GoogleIdentityAccesscontextmanagerV1CustomLevel
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Represents a textual expression in the Common Expression Language (CEL) syntax.
|
|
# CEL is a C-like expression language. The syntax and semantics of CEL are
|
|
# documented at https://github.com/google/cel-spec. Example (Comparison): title:
|
|
# "Summary size limit" description: "Determines if a summary is less than 100
|
|
# chars" expression: "document.summary.size() < 100" Example (Equality): title: "
|
|
# Requestor is owner" description: "Determines if requestor is the document
|
|
# owner" expression: "document.owner == request.auth.claims.email" Example (
|
|
# Logic): title: "Public documents" description: "Determine whether the document
|
|
# should be publicly visible" expression: "document.type != 'private' &&
|
|
# document.type != 'internal'" Example (Data Manipulation): title: "Notification
|
|
# string" description: "Create a notification string with a timestamp."
|
|
# expression: "'New message received at ' + string(document.create_time)" The
|
|
# exact variables and functions that may be referenced within an expression are
|
|
# determined by the service that evaluates it. See the service documentation for
|
|
# additional information.
|
|
# Corresponds to the JSON property `expr`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::Expr]
|
|
attr_accessor :expr
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@expr = args[:expr] if args.key?(:expr)
|
|
end
|
|
end
|
|
|
|
# `DevicePolicy` specifies device specific restrictions necessary to acquire a
|
|
# given access level. A `DevicePolicy` specifies requirements for requests from
|
|
# devices to be granted access levels, it does not do any enforcement on the
|
|
# device. `DevicePolicy` acts as an AND over all specified fields, and each
|
|
# repeated field is an OR over its elements. Any unset fields are ignored. For
|
|
# example, if the proto is ` os_type : DESKTOP_WINDOWS, os_type : DESKTOP_LINUX,
|
|
# encryption_status: ENCRYPTED`, then the DevicePolicy will be true for requests
|
|
# originating from encrypted Linux desktops and encrypted Windows desktops.
|
|
class GoogleIdentityAccesscontextmanagerV1DevicePolicy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Allowed device management levels, an empty list allows all management levels.
|
|
# Corresponds to the JSON property `allowedDeviceManagementLevels`
|
|
# @return [Array<String>]
|
|
attr_accessor :allowed_device_management_levels
|
|
|
|
# Allowed encryptions statuses, an empty list allows all statuses.
|
|
# Corresponds to the JSON property `allowedEncryptionStatuses`
|
|
# @return [Array<String>]
|
|
attr_accessor :allowed_encryption_statuses
|
|
|
|
# Allowed OS versions, an empty list allows all types and all versions.
|
|
# Corresponds to the JSON property `osConstraints`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1OsConstraint>]
|
|
attr_accessor :os_constraints
|
|
|
|
# Whether the device needs to be approved by the customer admin.
|
|
# Corresponds to the JSON property `requireAdminApproval`
|
|
# @return [Boolean]
|
|
attr_accessor :require_admin_approval
|
|
alias_method :require_admin_approval?, :require_admin_approval
|
|
|
|
# Whether the device needs to be corp owned.
|
|
# Corresponds to the JSON property `requireCorpOwned`
|
|
# @return [Boolean]
|
|
attr_accessor :require_corp_owned
|
|
alias_method :require_corp_owned?, :require_corp_owned
|
|
|
|
# Whether or not screenlock is required for the DevicePolicy to be true.
|
|
# Defaults to `false`.
|
|
# Corresponds to the JSON property `requireScreenlock`
|
|
# @return [Boolean]
|
|
attr_accessor :require_screenlock
|
|
alias_method :require_screenlock?, :require_screenlock
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@allowed_device_management_levels = args[:allowed_device_management_levels] if args.key?(:allowed_device_management_levels)
|
|
@allowed_encryption_statuses = args[:allowed_encryption_statuses] if args.key?(:allowed_encryption_statuses)
|
|
@os_constraints = args[:os_constraints] if args.key?(:os_constraints)
|
|
@require_admin_approval = args[:require_admin_approval] if args.key?(:require_admin_approval)
|
|
@require_corp_owned = args[:require_corp_owned] if args.key?(:require_corp_owned)
|
|
@require_screenlock = args[:require_screenlock] if args.key?(:require_screenlock)
|
|
end
|
|
end
|
|
|
|
# Defines the conditions under which an EgressPolicy matches a request.
|
|
# Conditions based on information about the source of the request. Note that if
|
|
# the destination of the request is protected by a ServicePerimeter, then that
|
|
# ServicePerimeter must have an IngressPolicy which allows access in order for
|
|
# this request to succeed.
|
|
class GoogleIdentityAccesscontextmanagerV1EgressFrom
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# A list of identities that are allowed access through this [EgressPolicy].
|
|
# Should be in the format of email address. The email address should represent
|
|
# individual user or service account only.
|
|
# Corresponds to the JSON property `identities`
|
|
# @return [Array<String>]
|
|
attr_accessor :identities
|
|
|
|
# Specifies the type of identities that are allowed access to outside the
|
|
# perimeter. If left unspecified, then members of `identities` field will be
|
|
# allowed access.
|
|
# Corresponds to the JSON property `identityType`
|
|
# @return [String]
|
|
attr_accessor :identity_type
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@identities = args[:identities] if args.key?(:identities)
|
|
@identity_type = args[:identity_type] if args.key?(:identity_type)
|
|
end
|
|
end
|
|
|
|
# Policy for egress from perimeter. EgressPolicies match requests based on `
|
|
# egress_from` and `egress_to` stanzas. For an EgressPolicy to match, both `
|
|
# egress_from` and `egress_to` stanzas must be matched. If an EgressPolicy
|
|
# matches a request, the request is allowed to span the ServicePerimeter
|
|
# boundary. For example, an EgressPolicy can be used to allow VMs on networks
|
|
# within the ServicePerimeter to access a defined set of projects outside the
|
|
# perimeter in certain contexts (e.g. to read data from a Cloud Storage bucket
|
|
# or query against a BigQuery dataset). EgressPolicies are concerned with the *
|
|
# resources* that a request relates as well as the API services and API actions
|
|
# being used. They do not related to the direction of data movement. More
|
|
# detailed documentation for this concept can be found in the descriptions of
|
|
# EgressFrom and EgressTo.
|
|
class GoogleIdentityAccesscontextmanagerV1EgressPolicy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Defines the conditions under which an EgressPolicy matches a request.
|
|
# Conditions based on information about the source of the request. Note that if
|
|
# the destination of the request is protected by a ServicePerimeter, then that
|
|
# ServicePerimeter must have an IngressPolicy which allows access in order for
|
|
# this request to succeed.
|
|
# Corresponds to the JSON property `egressFrom`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressFrom]
|
|
attr_accessor :egress_from
|
|
|
|
# Defines the conditions under which an EgressPolicy matches a request.
|
|
# Conditions are based on information about the ApiOperation intended to be
|
|
# performed on the `resources` specified. Note that if the destination of the
|
|
# request is protected by a ServicePerimeter, then that ServicePerimeter must
|
|
# have an IngressPolicy which allows access in order for this request to succeed.
|
|
# Corresponds to the JSON property `egressTo`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressTo]
|
|
attr_accessor :egress_to
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@egress_from = args[:egress_from] if args.key?(:egress_from)
|
|
@egress_to = args[:egress_to] if args.key?(:egress_to)
|
|
end
|
|
end
|
|
|
|
# Defines the conditions under which an EgressPolicy matches a request.
|
|
# Conditions are based on information about the ApiOperation intended to be
|
|
# performed on the `resources` specified. Note that if the destination of the
|
|
# request is protected by a ServicePerimeter, then that ServicePerimeter must
|
|
# have an IngressPolicy which allows access in order for this request to succeed.
|
|
class GoogleIdentityAccesscontextmanagerV1EgressTo
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# A list of ApiOperations that this egress rule applies to. A request matches if
|
|
# it contains an operation/service in this list.
|
|
# Corresponds to the JSON property `operations`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ApiOperation>]
|
|
attr_accessor :operations
|
|
|
|
# A list of resources, currently only projects in the form `projects/`, that
|
|
# match this to stanza. A request matches if it contains a resource in this list.
|
|
# If `*` is specified for resources, then this EgressTo rule will authorize
|
|
# access to all resources outside the perimeter.
|
|
# Corresponds to the JSON property `resources`
|
|
# @return [Array<String>]
|
|
attr_accessor :resources
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@operations = args[:operations] if args.key?(:operations)
|
|
@resources = args[:resources] if args.key?(:resources)
|
|
end
|
|
end
|
|
|
|
# Defines the conditions under which an IngressPolicy matches a request.
|
|
# Conditions are based on information about the source of the request.
|
|
class GoogleIdentityAccesscontextmanagerV1IngressFrom
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# A list of identities that are allowed access through this ingress policy.
|
|
# Should be in the format of email address. The email address should represent
|
|
# individual user or service account only.
|
|
# Corresponds to the JSON property `identities`
|
|
# @return [Array<String>]
|
|
attr_accessor :identities
|
|
|
|
# Specifies the type of identities that are allowed access from outside the
|
|
# perimeter. If left unspecified, then members of `identities` field will be
|
|
# allowed access.
|
|
# Corresponds to the JSON property `identityType`
|
|
# @return [String]
|
|
attr_accessor :identity_type
|
|
|
|
# Sources that this IngressPolicy authorizes access from.
|
|
# Corresponds to the JSON property `sources`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressSource>]
|
|
attr_accessor :sources
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@identities = args[:identities] if args.key?(:identities)
|
|
@identity_type = args[:identity_type] if args.key?(:identity_type)
|
|
@sources = args[:sources] if args.key?(:sources)
|
|
end
|
|
end
|
|
|
|
# Policy for ingress into ServicePerimeter. IngressPolicies match requests based
|
|
# on `ingress_from` and `ingress_to` stanzas. For an ingress policy to match,
|
|
# both the `ingress_from` and `ingress_to` stanzas must be matched. If an
|
|
# IngressPolicy matches a request, the request is allowed through the perimeter
|
|
# boundary from outside the perimeter. For example, access from the internet can
|
|
# be allowed either based on an AccessLevel or, for traffic hosted on Google
|
|
# Cloud, the project of the source network. For access from private networks,
|
|
# using the project of the hosting network is required. Individual ingress
|
|
# policies can be limited by restricting which services and/or actions they
|
|
# match using the `ingress_to` field.
|
|
class GoogleIdentityAccesscontextmanagerV1IngressPolicy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Defines the conditions under which an IngressPolicy matches a request.
|
|
# Conditions are based on information about the source of the request.
|
|
# Corresponds to the JSON property `ingressFrom`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressFrom]
|
|
attr_accessor :ingress_from
|
|
|
|
# Defines the conditions under which an IngressPolicy matches a request.
|
|
# Conditions are based on information about the ApiOperation intended to be
|
|
# performed on the destination of the request.
|
|
# Corresponds to the JSON property `ingressTo`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressTo]
|
|
attr_accessor :ingress_to
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@ingress_from = args[:ingress_from] if args.key?(:ingress_from)
|
|
@ingress_to = args[:ingress_to] if args.key?(:ingress_to)
|
|
end
|
|
end
|
|
|
|
# The source that IngressPolicy authorizes access from.
|
|
class GoogleIdentityAccesscontextmanagerV1IngressSource
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# An AccessLevel resource name that allow resources within the ServicePerimeters
|
|
# to be accessed from the internet. AccessLevels listed must be in the same
|
|
# policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will
|
|
# cause an error. If no AccessLevel names are listed, resources within the
|
|
# perimeter can only be accessed via Google Cloud calls with request origins
|
|
# within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`
|
|
# . If `*` is specified, then all IngressSources will be allowed.
|
|
# Corresponds to the JSON property `accessLevel`
|
|
# @return [String]
|
|
attr_accessor :access_level
|
|
|
|
# A Google Cloud resource that is allowed to ingress the perimeter. Requests
|
|
# from these resources will be allowed to access perimeter data. Currently only
|
|
# projects are allowed. Format: `projects/`project_number`` The project may be
|
|
# in any Google Cloud organization, not just the organization that the perimeter
|
|
# is defined in. `*` is not allowed, the case of allowing all Google Cloud
|
|
# resources only is not supported.
|
|
# Corresponds to the JSON property `resource`
|
|
# @return [String]
|
|
attr_accessor :resource
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@access_level = args[:access_level] if args.key?(:access_level)
|
|
@resource = args[:resource] if args.key?(:resource)
|
|
end
|
|
end
|
|
|
|
# Defines the conditions under which an IngressPolicy matches a request.
|
|
# Conditions are based on information about the ApiOperation intended to be
|
|
# performed on the destination of the request.
|
|
class GoogleIdentityAccesscontextmanagerV1IngressTo
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# A list of ApiOperations the sources specified in corresponding IngressFrom are
|
|
# allowed to perform in this ServicePerimeter.
|
|
# Corresponds to the JSON property `operations`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ApiOperation>]
|
|
attr_accessor :operations
|
|
|
|
# A list of resources, currently only projects in the form `projects/`,
|
|
# protected by this ServicePerimeter that are allowed to be accessed by sources
|
|
# defined in the corresponding IngressFrom. A request matches if it contains a
|
|
# resource in this list. If `*` is specified for resources, then this IngressTo
|
|
# rule will authorize access to all resources inside the perimeter, provided
|
|
# that the request also matches the `operations` field.
|
|
# Corresponds to the JSON property `resources`
|
|
# @return [Array<String>]
|
|
attr_accessor :resources
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@operations = args[:operations] if args.key?(:operations)
|
|
@resources = args[:resources] if args.key?(:resources)
|
|
end
|
|
end
|
|
|
|
# An allowed method or permission of a service specified in ApiOperation.
|
|
class GoogleIdentityAccesscontextmanagerV1MethodSelector
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Value for `method` should be a valid method name for the corresponding `
|
|
# service_name` in ApiOperation. If `*` used as value for `method`, then ALL
|
|
# methods and permissions are allowed.
|
|
# Corresponds to the JSON property `method`
|
|
# @return [String]
|
|
attr_accessor :method_prop
|
|
|
|
# Value for `permission` should be a valid Cloud IAM permission for the
|
|
# corresponding `service_name` in ApiOperation.
|
|
# Corresponds to the JSON property `permission`
|
|
# @return [String]
|
|
attr_accessor :permission
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@method_prop = args[:method_prop] if args.key?(:method_prop)
|
|
@permission = args[:permission] if args.key?(:permission)
|
|
end
|
|
end
|
|
|
|
# A restriction on the OS type and version of devices making requests.
|
|
class GoogleIdentityAccesscontextmanagerV1OsConstraint
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# The minimum allowed OS version. If not set, any version of this OS satisfies
|
|
# the constraint. Format: `"major.minor.patch"`. Examples: `"10.5.301"`, `"9.2.1"
|
|
# `.
|
|
# Corresponds to the JSON property `minimumVersion`
|
|
# @return [String]
|
|
attr_accessor :minimum_version
|
|
|
|
# Required. The allowed OS type.
|
|
# Corresponds to the JSON property `osType`
|
|
# @return [String]
|
|
attr_accessor :os_type
|
|
|
|
# Only allows requests from devices with a verified Chrome OS. Verifications
|
|
# includes requirements that the device is enterprise-managed, conformant to
|
|
# domain policies, and the caller has permission to call the API targeted by the
|
|
# request.
|
|
# Corresponds to the JSON property `requireVerifiedChromeOs`
|
|
# @return [Boolean]
|
|
attr_accessor :require_verified_chrome_os
|
|
alias_method :require_verified_chrome_os?, :require_verified_chrome_os
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@minimum_version = args[:minimum_version] if args.key?(:minimum_version)
|
|
@os_type = args[:os_type] if args.key?(:os_type)
|
|
@require_verified_chrome_os = args[:require_verified_chrome_os] if args.key?(:require_verified_chrome_os)
|
|
end
|
|
end
|
|
|
|
# `ServicePerimeter` describes a set of Google Cloud resources which can freely
|
|
# import and export data amongst themselves, but not export outside of the `
|
|
# ServicePerimeter`. If a request with a source within this `ServicePerimeter`
|
|
# has a target outside of the `ServicePerimeter`, the request will be blocked.
|
|
# Otherwise the request is allowed. There are two types of Service Perimeter -
|
|
# Regular and Bridge. Regular Service Perimeters cannot overlap, a single Google
|
|
# Cloud project can only belong to a single regular Service Perimeter. Service
|
|
# Perimeter Bridges can contain only Google Cloud projects as members, a single
|
|
# Google Cloud project may belong to multiple Service Perimeter Bridges.
|
|
class GoogleIdentityAccesscontextmanagerV1ServicePerimeter
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Description of the `ServicePerimeter` and its use. Does not affect behavior.
|
|
# Corresponds to the JSON property `description`
|
|
# @return [String]
|
|
attr_accessor :description
|
|
|
|
# Required. Resource name for the ServicePerimeter. The `short_name` component
|
|
# must begin with a letter and only include alphanumeric and '_'. Format: `
|
|
# accessPolicies/`policy_id`/servicePerimeters/`short_name``
|
|
# Corresponds to the JSON property `name`
|
|
# @return [String]
|
|
attr_accessor :name
|
|
|
|
# Perimeter type indicator. A single project is allowed to be a member of single
|
|
# regular perimeter, but multiple service perimeter bridges. A project cannot be
|
|
# a included in a perimeter bridge without being included in regular perimeter.
|
|
# For perimeter bridges, the restricted service list as well as access level
|
|
# lists must be empty.
|
|
# Corresponds to the JSON property `perimeterType`
|
|
# @return [String]
|
|
attr_accessor :perimeter_type
|
|
|
|
# `ServicePerimeterConfig` specifies a set of Google Cloud resources that
|
|
# describe specific Service Perimeter configuration.
|
|
# Corresponds to the JSON property `spec`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig]
|
|
attr_accessor :spec
|
|
|
|
# `ServicePerimeterConfig` specifies a set of Google Cloud resources that
|
|
# describe specific Service Perimeter configuration.
|
|
# Corresponds to the JSON property `status`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig]
|
|
attr_accessor :status
|
|
|
|
# Human readable title. Must be unique within the Policy.
|
|
# Corresponds to the JSON property `title`
|
|
# @return [String]
|
|
attr_accessor :title
|
|
|
|
# Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly exists
|
|
# for all Service Perimeters, and that spec is identical to the status for those
|
|
# Service Perimeters. When this flag is set, it inhibits the generation of the
|
|
# implicit spec, thereby allowing the user to explicitly provide a configuration
|
|
# ("spec") to use in a dry-run version of the Service Perimeter. This allows the
|
|
# user to test changes to the enforced config ("status") without actually
|
|
# enforcing them. This testing is done through analyzing the differences between
|
|
# currently enforced and suggested restrictions. use_explicit_dry_run_spec must
|
|
# bet set to True if any of the fields in the spec are set to non-default values.
|
|
# Corresponds to the JSON property `useExplicitDryRunSpec`
|
|
# @return [Boolean]
|
|
attr_accessor :use_explicit_dry_run_spec
|
|
alias_method :use_explicit_dry_run_spec?, :use_explicit_dry_run_spec
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@description = args[:description] if args.key?(:description)
|
|
@name = args[:name] if args.key?(:name)
|
|
@perimeter_type = args[:perimeter_type] if args.key?(:perimeter_type)
|
|
@spec = args[:spec] if args.key?(:spec)
|
|
@status = args[:status] if args.key?(:status)
|
|
@title = args[:title] if args.key?(:title)
|
|
@use_explicit_dry_run_spec = args[:use_explicit_dry_run_spec] if args.key?(:use_explicit_dry_run_spec)
|
|
end
|
|
end
|
|
|
|
# `ServicePerimeterConfig` specifies a set of Google Cloud resources that
|
|
# describe specific Service Perimeter configuration.
|
|
class GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# A list of `AccessLevel` resource names that allow resources within the `
|
|
# ServicePerimeter` to be accessed from the internet. `AccessLevels` listed must
|
|
# be in the same policy as this `ServicePerimeter`. Referencing a nonexistent `
|
|
# AccessLevel` is a syntax error. If no `AccessLevel` names are listed,
|
|
# resources within the perimeter can only be accessed via Google Cloud calls
|
|
# with request origins within the perimeter. Example: `"accessPolicies/MY_POLICY/
|
|
# accessLevels/MY_LEVEL"`. For Service Perimeter Bridge, must be empty.
|
|
# Corresponds to the JSON property `accessLevels`
|
|
# @return [Array<String>]
|
|
attr_accessor :access_levels
|
|
|
|
# List of EgressPolicies to apply to the perimeter. A perimeter may have
|
|
# multiple EgressPolicies, each of which is evaluated separately. Access is
|
|
# granted if any EgressPolicy grants it. Must be empty for a perimeter bridge.
|
|
# Corresponds to the JSON property `egressPolicies`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1EgressPolicy>]
|
|
attr_accessor :egress_policies
|
|
|
|
# List of IngressPolicies to apply to the perimeter. A perimeter may have
|
|
# multiple IngressPolicies, each of which is evaluated separately. Access is
|
|
# granted if any Ingress Policy grants it. Must be empty for a perimeter bridge.
|
|
# Corresponds to the JSON property `ingressPolicies`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1IngressPolicy>]
|
|
attr_accessor :ingress_policies
|
|
|
|
# A list of Google Cloud resources that are inside of the service perimeter.
|
|
# Currently only projects are allowed. Format: `projects/`project_number``
|
|
# Corresponds to the JSON property `resources`
|
|
# @return [Array<String>]
|
|
attr_accessor :resources
|
|
|
|
# Google Cloud services that are subject to the Service Perimeter restrictions.
|
|
# For example, if `storage.googleapis.com` is specified, access to the storage
|
|
# buckets inside the perimeter must meet the perimeter's access restrictions.
|
|
# Corresponds to the JSON property `restrictedServices`
|
|
# @return [Array<String>]
|
|
attr_accessor :restricted_services
|
|
|
|
# Specifies how APIs are allowed to communicate within the Service Perimeter.
|
|
# Corresponds to the JSON property `vpcAccessibleServices`
|
|
# @return [Google::Apis::CloudassetV1p5beta1::GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices]
|
|
attr_accessor :vpc_accessible_services
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@access_levels = args[:access_levels] if args.key?(:access_levels)
|
|
@egress_policies = args[:egress_policies] if args.key?(:egress_policies)
|
|
@ingress_policies = args[:ingress_policies] if args.key?(:ingress_policies)
|
|
@resources = args[:resources] if args.key?(:resources)
|
|
@restricted_services = args[:restricted_services] if args.key?(:restricted_services)
|
|
@vpc_accessible_services = args[:vpc_accessible_services] if args.key?(:vpc_accessible_services)
|
|
end
|
|
end
|
|
|
|
# Specifies how APIs are allowed to communicate within the Service Perimeter.
|
|
class GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# The list of APIs usable within the Service Perimeter. Must be empty unless '
|
|
# enable_restriction' is True. You can specify a list of individual services, as
|
|
# well as include the 'RESTRICTED-SERVICES' value, which automatically includes
|
|
# all of the services protected by the perimeter.
|
|
# Corresponds to the JSON property `allowedServices`
|
|
# @return [Array<String>]
|
|
attr_accessor :allowed_services
|
|
|
|
# Whether to restrict API calls within the Service Perimeter to the list of APIs
|
|
# specified in 'allowed_services'.
|
|
# Corresponds to the JSON property `enableRestriction`
|
|
# @return [Boolean]
|
|
attr_accessor :enable_restriction
|
|
alias_method :enable_restriction?, :enable_restriction
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@allowed_services = args[:allowed_services] if args.key?(:allowed_services)
|
|
@enable_restriction = args[:enable_restriction] if args.key?(:enable_restriction)
|
|
end
|
|
end
|
|
|
|
# ListAssets response.
|
|
class ListAssetsResponse
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Assets.
|
|
# Corresponds to the JSON property `assets`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::Asset>]
|
|
attr_accessor :assets
|
|
|
|
# Token to retrieve the next page of results. Set to empty if there are no
|
|
# remaining results.
|
|
# Corresponds to the JSON property `nextPageToken`
|
|
# @return [String]
|
|
attr_accessor :next_page_token
|
|
|
|
# Time the snapshot was taken.
|
|
# Corresponds to the JSON property `readTime`
|
|
# @return [String]
|
|
attr_accessor :read_time
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@assets = args[:assets] if args.key?(:assets)
|
|
@next_page_token = args[:next_page_token] if args.key?(:next_page_token)
|
|
@read_time = args[:read_time] if args.key?(:read_time)
|
|
end
|
|
end
|
|
|
|
# An Identity and Access Management (IAM) policy, which specifies access
|
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
|
# A `binding` binds one or more `members` to a single `role`. Members can be
|
|
# user accounts, service accounts, Google groups, and domains (such as G Suite).
|
|
# A `role` is a named list of permissions; each `role` can be an IAM predefined
|
|
# role or a user-created custom role. For some types of Google Cloud resources,
|
|
# a `binding` can also specify a `condition`, which is a logical expression that
|
|
# allows access to a resource only if the expression evaluates to `true`. A
|
|
# condition can add constraints based on attributes of the request, the resource,
|
|
# or both. To learn which resources support conditions in their IAM policies,
|
|
# see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
|
|
# resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
|
|
# resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
|
|
# group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
|
|
# appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
|
|
# organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
|
|
# title": "expirable access", "description": "Does not grant access after Sep
|
|
# 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
|
|
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
|
|
# members: - user:mike@example.com - group:admins@example.com - domain:google.
|
|
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
|
|
# resourcemanager.organizationAdmin - members: - user:eve@example.com role:
|
|
# roles/resourcemanager.organizationViewer condition: title: expirable access
|
|
# description: Does not grant access after Sep 2020 expression: request.time <
|
|
# timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
|
|
# description of IAM and its features, see the [IAM documentation](https://cloud.
|
|
# google.com/iam/docs/).
|
|
class Policy
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# Specifies cloud audit logging configuration for this policy.
|
|
# Corresponds to the JSON property `auditConfigs`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::AuditConfig>]
|
|
attr_accessor :audit_configs
|
|
|
|
# Associates a list of `members` to a `role`. Optionally, may specify a `
|
|
# condition` that determines how and when the `bindings` are applied. Each of
|
|
# the `bindings` must contain at least one member.
|
|
# Corresponds to the JSON property `bindings`
|
|
# @return [Array<Google::Apis::CloudassetV1p5beta1::Binding>]
|
|
attr_accessor :bindings
|
|
|
|
# `etag` is used for optimistic concurrency control as a way to help prevent
|
|
# simultaneous updates of a policy from overwriting each other. It is strongly
|
|
# suggested that systems make use of the `etag` in the read-modify-write cycle
|
|
# to perform policy updates in order to avoid race conditions: An `etag` is
|
|
# returned in the response to `getIamPolicy`, and systems are expected to put
|
|
# that etag in the request to `setIamPolicy` to ensure that their change will be
|
|
# applied to the same version of the policy. **Important:** If you use IAM
|
|
# Conditions, you must include the `etag` field whenever you call `setIamPolicy`.
|
|
# If you omit this field, then IAM allows you to overwrite a version `3` policy
|
|
# with a version `1` policy, and all of the conditions in the version `3` policy
|
|
# are lost.
|
|
# Corresponds to the JSON property `etag`
|
|
# NOTE: Values are automatically base64 encoded/decoded in the client library.
|
|
# @return [String]
|
|
attr_accessor :etag
|
|
|
|
# Specifies the format of the policy. Valid values are `0`, `1`, and `3`.
|
|
# Requests that specify an invalid value are rejected. Any operation that
|
|
# affects conditional role bindings must specify version `3`. This requirement
|
|
# applies to the following operations: * Getting a policy that includes a
|
|
# conditional role binding * Adding a conditional role binding to a policy *
|
|
# Changing a conditional role binding in a policy * Removing any role binding,
|
|
# with or without a condition, from a policy that includes conditions **
|
|
# Important:** If you use IAM Conditions, you must include the `etag` field
|
|
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows you
|
|
# to overwrite a version `3` policy with a version `1` policy, and all of the
|
|
# conditions in the version `3` policy are lost. If a policy does not include
|
|
# any conditions, operations on that policy may specify any valid version or
|
|
# leave the field unset. To learn which resources support conditions in their
|
|
# IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/
|
|
# conditions/resource-policies).
|
|
# Corresponds to the JSON property `version`
|
|
# @return [Fixnum]
|
|
attr_accessor :version
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@audit_configs = args[:audit_configs] if args.key?(:audit_configs)
|
|
@bindings = args[:bindings] if args.key?(:bindings)
|
|
@etag = args[:etag] if args.key?(:etag)
|
|
@version = args[:version] if args.key?(:version)
|
|
end
|
|
end
|
|
|
|
# A representation of a Google Cloud resource.
|
|
class Resource
|
|
include Google::Apis::Core::Hashable
|
|
|
|
# The content of the resource, in which some sensitive fields are removed and
|
|
# may not be present.
|
|
# Corresponds to the JSON property `data`
|
|
# @return [Hash<String,Object>]
|
|
attr_accessor :data
|
|
|
|
# The URL of the discovery document containing the resource's JSON schema.
|
|
# Example: `https://www.googleapis.com/discovery/v1/apis/compute/v1/rest` This
|
|
# value is unspecified for resources that do not have an API based on a
|
|
# discovery document, such as Cloud Bigtable.
|
|
# Corresponds to the JSON property `discoveryDocumentUri`
|
|
# @return [String]
|
|
attr_accessor :discovery_document_uri
|
|
|
|
# The JSON schema name listed in the discovery document. Example: `Project` This
|
|
# value is unspecified for resources that do not have an API based on a
|
|
# discovery document, such as Cloud Bigtable.
|
|
# Corresponds to the JSON property `discoveryName`
|
|
# @return [String]
|
|
attr_accessor :discovery_name
|
|
|
|
# The full name of the immediate parent of this resource. See [Resource Names](
|
|
# https://cloud.google.com/apis/design/resource_names#full_resource_name) for
|
|
# more information. For Google Cloud assets, this value is the parent resource
|
|
# defined in the [Cloud IAM policy hierarchy](https://cloud.google.com/iam/docs/
|
|
# overview#policy_hierarchy). Example: `//cloudresourcemanager.googleapis.com/
|
|
# projects/my_project_123` For third-party assets, this field may be set
|
|
# differently.
|
|
# Corresponds to the JSON property `parent`
|
|
# @return [String]
|
|
attr_accessor :parent
|
|
|
|
# The REST URL for accessing the resource. An HTTP `GET` request using this URL
|
|
# returns the resource itself. Example: `https://cloudresourcemanager.googleapis.
|
|
# com/v1/projects/my-project-123` This value is unspecified for resources
|
|
# without a REST API.
|
|
# Corresponds to the JSON property `resourceUrl`
|
|
# @return [String]
|
|
attr_accessor :resource_url
|
|
|
|
# The API version. Example: "v1".
|
|
# Corresponds to the JSON property `version`
|
|
# @return [String]
|
|
attr_accessor :version
|
|
|
|
def initialize(**args)
|
|
update!(**args)
|
|
end
|
|
|
|
# Update properties of this object
|
|
def update!(**args)
|
|
@data = args[:data] if args.key?(:data)
|
|
@discovery_document_uri = args[:discovery_document_uri] if args.key?(:discovery_document_uri)
|
|
@discovery_name = args[:discovery_name] if args.key?(:discovery_name)
|
|
@parent = args[:parent] if args.key?(:parent)
|
|
@resource_url = args[:resource_url] if args.key?(:resource_url)
|
|
@version = args[:version] if args.key?(:version)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|