Skip to content

Commit

Permalink
requireAdminApproval/requireCorpOwned in AccessLevel's devicePolicy (#…
Browse files Browse the repository at this point in the history
…2710)

Merged PR #2710.
  • Loading branch information
drebes authored and modular-magician committed Nov 18, 2019
1 parent a5a6465 commit 8ef590c
Show file tree
Hide file tree
Showing 5 changed files with 13 additions and 3 deletions.
2 changes: 1 addition & 1 deletion build/terraform
2 changes: 1 addition & 1 deletion build/terraform-beta
2 changes: 1 addition & 1 deletion build/terraform-mapper
8 changes: 8 additions & 0 deletions products/accesscontextmanager/api.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -276,6 +276,14 @@ objects:
- :DESKTOP_WINDOWS
- :DESKTOP_LINUX
- :DESKTOP_CHROME_OS
- !ruby/object:Api::Type::Boolean
name: 'requireAdminApproval'
description: |
Whether the device needs to be approved by the customer admin.
- !ruby/object:Api::Type::Boolean
name: 'requireCorpOwned'
description: |
Whether the device needs to be corp owned.
- !ruby/object:Api::Resource
name: 'ServicePerimeter'
# This is an unusual API, so we need to use a few fields to map the methods
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -146,6 +146,8 @@ resource "google_access_context_manager_access_level" "test-access" {
negate = false
device_policy {
require_screen_lock = false
require_admin_approval = false
require_corp_owned = true
os_constraints {
os_type = "DESKTOP_CHROME_OS"
}
Expand Down

0 comments on commit 8ef590c

Please sign in to comment.