Skip to content

Commit

Permalink
feat(all): auto-regenerate discovery clients (#1737)
Browse files Browse the repository at this point in the history
  • Loading branch information
yoshi-automation authored Nov 3, 2022
1 parent 0d7f97a commit de99200
Show file tree
Hide file tree
Showing 22 changed files with 273 additions and 500 deletions.
14 changes: 9 additions & 5 deletions assuredworkloads/v1/assuredworkloads-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -491,7 +491,7 @@
}
}
},
"revision": "20221020",
"revision": "20221028",
"rootUrl": "https://assuredworkloads.googleapis.com/",
"schemas": {
"GoogleCloudAssuredworkloadsV1AcknowledgeViolationRequest": {
Expand Down Expand Up @@ -614,12 +614,14 @@
"enum": [
"RESTRICTION_TYPE_UNSPECIFIED",
"ALLOW_ALL_GCP_RESOURCES",
"ALLOW_COMPLIANT_RESOURCES"
"ALLOW_COMPLIANT_RESOURCES",
"APPEND_COMPLIANT_RESOURCES"
],
"enumDescriptions": [
"Unknown restriction type.",
"Allow the use all of all gcp products, irrespective of the compliance posture. This effectively removes gcp.restrictServiceUsage OrgPolicy on the AssuredWorkloads Folder.",
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources."
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources.",
"Similar to ALLOW_COMPLIANT_RESOURCES but adds the list of compliant resources to the existing list of resources. Effective org-policy of the Folder is considered to ensure there is no disruption to the existing customer workflows."
],
"type": "string"
}
Expand Down Expand Up @@ -938,11 +940,13 @@
"description": "Optional. Compliance Regime associated with this workload.",
"enum": [
"PARTNER_UNSPECIFIED",
"LOCAL_CONTROLS_BY_S3NS"
"LOCAL_CONTROLS_BY_S3NS",
"SOVEREIGN_CONTROLS_BY_T_SYSTEMS"
],
"enumDescriptions": [
"Unknown partner regime/controls.",
"S3NS regime/controls."
"S3NS regime/controls.",
"TSystem regime/controls."
],
"type": "string"
},
Expand Down
5 changes: 5 additions & 0 deletions assuredworkloads/v1/assuredworkloads-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 9 additions & 5 deletions assuredworkloads/v1beta1/assuredworkloads-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -595,7 +595,7 @@
}
}
},
"revision": "20221014",
"revision": "20221028",
"rootUrl": "https://assuredworkloads.googleapis.com/",
"schemas": {
"GoogleCloudAssuredworkloadsV1beta1AcknowledgeViolationRequest": {
Expand Down Expand Up @@ -678,12 +678,14 @@
"enum": [
"RESTRICTION_TYPE_UNSPECIFIED",
"ALLOW_ALL_GCP_RESOURCES",
"ALLOW_COMPLIANT_RESOURCES"
"ALLOW_COMPLIANT_RESOURCES",
"APPEND_COMPLIANT_RESOURCES"
],
"enumDescriptions": [
"Unknown restriction type.",
"Allow the use all of all gcp products, irrespective of the compliance posture. This effectively removes gcp.restrictServiceUsage OrgPolicy on the AssuredWorkloads Folder.",
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources."
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources.",
"Similar to ALLOW_COMPLIANT_RESOURCES but adds the list of compliant resources to the existing list of compliant resources. Effective org-policy of the Folder is considered to ensure there is no disruption to the existing customer workflows."
],
"type": "string"
}
Expand Down Expand Up @@ -1018,11 +1020,13 @@
"description": "Optional. Compliance Regime associated with this workload.",
"enum": [
"PARTNER_UNSPECIFIED",
"LOCAL_CONTROLS_BY_S3NS"
"LOCAL_CONTROLS_BY_S3NS",
"SOVEREIGN_CONTROLS_BY_T_SYSTEMS"
],
"enumDescriptions": [
"Unknown partner regime/controls.",
"S3NS regime/controls."
"S3NS regime/controls.",
"TSystems regime/controls."
],
"type": "string"
},
Expand Down
5 changes: 5 additions & 0 deletions assuredworkloads/v1beta1/assuredworkloads-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

29 changes: 28 additions & 1 deletion cloudidentity/v1beta1/cloudidentity-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -1932,7 +1932,7 @@
}
}
},
"revision": "20221025",
"revision": "20221101",
"rootUrl": "https://cloudidentity.googleapis.com/",
"schemas": {
"AddIdpCredentialOperationMetadata": {
Expand Down Expand Up @@ -2355,6 +2355,29 @@
"readOnly": true,
"type": "string"
},
"clientTypes": {
"description": "List of the clients the device is reporting to.",
"items": {
"enum": [
"CLIENT_TYPE_UNSPECIFIED",
"DRIVE_FS",
"FUNDAMENTAL",
"ENDPOINT_VERIFICATION",
"WINDOWS_ADVANCED",
"GOOGLE_CREDENTIALS_PROVIDER_FOR_WINDOWS"
],
"enumDescriptions": [
"Default value",
"Managed by DriveFS",
"Management type for every secure device",
"Managed by Endpoint Verification",
"Managed by Windows",
"Managed by Google credential provider for windows"
],
"type": "string"
},
"type": "array"
},
"compromisedState": {
"description": "Output only. Represents whether the Device is compromised.",
"enum": [
Expand Down Expand Up @@ -2437,6 +2460,10 @@
"description": "Output only. Attributes specific to Endpoint Verification devices.",
"readOnly": true
},
"hostname": {
"description": "Host name of the device.",
"type": "string"
},
"imei": {
"description": "Output only. IMEI number of device if GSM device; empty otherwise.",
"readOnly": true,
Expand Down
15 changes: 15 additions & 0 deletions cloudidentity/v1beta1/cloudidentity-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions cloudtasks/v2beta2/cloudtasks-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -876,7 +876,7 @@
}
}
},
"revision": "20221014",
"revision": "20221025",
"rootUrl": "https://cloudtasks.googleapis.com/",
"schemas": {
"AcknowledgeTaskRequest": {
Expand Down Expand Up @@ -1025,7 +1025,7 @@
"type": "object"
},
"BufferTaskRequest": {
"description": "LINT.IfChange Request message for BufferTask.",
"description": "Request message for BufferTask.",
"id": "BufferTaskRequest",
"properties": {
"body": {
Expand Down
2 changes: 1 addition & 1 deletion cloudtasks/v2beta2/cloudtasks-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

21 changes: 20 additions & 1 deletion dlp/v2/dlp-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -3412,7 +3412,7 @@
}
}
},
"revision": "20221017",
"revision": "20221029",
"rootUrl": "https://dlp.googleapis.com/",
"schemas": {
"GooglePrivacyDlpV2Action": {
Expand Down Expand Up @@ -5044,6 +5044,21 @@
},
"type": "object"
},
"GooglePrivacyDlpV2ExcludeByHotword": {
"description": "The rule to exclude findings based on a hotword. For record inspection of tables, column names are considered hotwords. An example of this is to exclude a finding if a BigQuery column matches a specific pattern.",
"id": "GooglePrivacyDlpV2ExcludeByHotword",
"properties": {
"hotwordRegex": {
"$ref": "GooglePrivacyDlpV2Regex",
"description": "Regular expression pattern defining what qualifies as a hotword."
},
"proximity": {
"$ref": "GooglePrivacyDlpV2Proximity",
"description": "Range of characters within which the entire hotword must reside. The total length of the window cannot exceed 1000 characters. The windowBefore property in proximity should be set to 1 if the hotword needs to be included in a column header."
}
},
"type": "object"
},
"GooglePrivacyDlpV2ExcludeInfoTypes": {
"description": "List of excluded infoTypes.",
"id": "GooglePrivacyDlpV2ExcludeInfoTypes",
Expand All @@ -5066,6 +5081,10 @@
"$ref": "GooglePrivacyDlpV2Dictionary",
"description": "Dictionary which defines the rule."
},
"excludeByHotword": {
"$ref": "GooglePrivacyDlpV2ExcludeByHotword",
"description": "Drop if the hotword rule is contained in the proximate context. For tabular data, the context includes the column name."
},
"excludeInfoTypes": {
"$ref": "GooglePrivacyDlpV2ExcludeInfoTypes",
"description": "Set of infoTypes for which findings would affect this rule."
Expand Down
43 changes: 43 additions & 0 deletions dlp/v2/dlp-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit de99200

Please sign in to comment.