From f77ee2603d587d4b974602611b3475845f4e0a85 Mon Sep 17 00:00:00 2001
From: yoshi-code-bot <70984784+yoshi-code-bot@users.noreply.github.com>
Date: Mon, 18 Sep 2023 06:46:18 -0700
Subject: [PATCH 1/2] chore: Update discovery artifacts (#2238)
## Deleted keys were detected in the following stable discovery artifacts:
gkeonprem v1 https://togithub.com/googleapis/google-api-python-client/commit/f5890d08262d926b393d3e34eb518f5fb994ba33
mybusinessverifications v1 https://togithub.com/googleapis/google-api-python-client/commit/fde7890f06667733cb3917ab3edc573f979f7b14
notebooks v1 https://togithub.com/googleapis/google-api-python-client/commit/66dd9d0e43a6698c5e3b9b2918a6971d8267d156
places v1 https://togithub.com/googleapis/google-api-python-client/commit/db06598e16cd646cfd0251627e4c607feabb1588
## Deleted keys were detected in the following pre-stable discovery artifacts:
aiplatform v1beta1 https://togithub.com/googleapis/google-api-python-client/commit/fbcd223a51ef9353a69c895c5dd0664c7260139c
appengine v1beta https://togithub.com/googleapis/google-api-python-client/commit/266598f5533b402c553c3c741c645d0a1dbc5e5e
checks v1alpha https://togithub.com/googleapis/google-api-python-client/commit/3d7acfbe7058daa7501bffe5fdbbe324092645e5
## Discovery Artifact Change Summary:
feat(accesscontextmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/f6f6113f42261f1be9d18d0336a54c9c8ca54da8
feat(advisorynotifications): update the api https://togithub.com/googleapis/google-api-python-client/commit/0025b75976439ceedf5ecf184fd2cb3defd74af8
feat(aiplatform): update the api https://togithub.com/googleapis/google-api-python-client/commit/fbcd223a51ef9353a69c895c5dd0664c7260139c
feat(androidmanagement): update the api https://togithub.com/googleapis/google-api-python-client/commit/23cd554b0425f9096938fa6a48d15dab16de96e4
feat(appengine): update the api https://togithub.com/googleapis/google-api-python-client/commit/266598f5533b402c553c3c741c645d0a1dbc5e5e
feat(artifactregistry): update the api https://togithub.com/googleapis/google-api-python-client/commit/fe34c2221c9cdd48d08ba62fc8bc19960fbc9005
feat(assuredworkloads): update the api https://togithub.com/googleapis/google-api-python-client/commit/86eaf3ff8d5be74e0254e22045789c5d6d8c969b
feat(beyondcorp): update the api https://togithub.com/googleapis/google-api-python-client/commit/f27ec8e0acbb16eacfda7eda5df7716be18cb7ef
feat(blockchainnodeengine): update the api https://togithub.com/googleapis/google-api-python-client/commit/bf425463c4dcd4b3cac74689accec071593114cd
feat(checks): update the api https://togithub.com/googleapis/google-api-python-client/commit/3d7acfbe7058daa7501bffe5fdbbe324092645e5
feat(chromemanagement): update the api https://togithub.com/googleapis/google-api-python-client/commit/5310a182fd65eef841364c600a477bb4c8b7aaa8
feat(cloudasset): update the api https://togithub.com/googleapis/google-api-python-client/commit/d076b1bd45757a9a790b1be5da6437c9f2de6104
feat(cloudfunctions): update the api https://togithub.com/googleapis/google-api-python-client/commit/c9d14b98bffdee4b5509e7b0eeec94e37584c8b2
feat(cloudtasks): update the api https://togithub.com/googleapis/google-api-python-client/commit/fe0bcad3476804ab033bffe71ee92cc8b26d6273
feat(composer): update the api https://togithub.com/googleapis/google-api-python-client/commit/4d9e24a39caa038f30d6ef3593d6c5d4f6073793
feat(connectors): update the api https://togithub.com/googleapis/google-api-python-client/commit/7e2e3f0687d86e98db77baebdefd91bed1be6619
feat(contactcenteraiplatform): update the api https://togithub.com/googleapis/google-api-python-client/commit/ee747d28f2b9848d53c2fcbb4b92c2caac1f47e6
feat(datamigration): update the api https://togithub.com/googleapis/google-api-python-client/commit/de2aa36bbf671e2754eeb329fce83b502aef74d4
feat(gkeonprem): update the api https://togithub.com/googleapis/google-api-python-client/commit/f5890d08262d926b393d3e34eb518f5fb994ba33
feat(gmail): update the api https://togithub.com/googleapis/google-api-python-client/commit/40b0348d282435d229e5980ceffaf572b7df7707
feat(integrations): update the api https://togithub.com/googleapis/google-api-python-client/commit/ddf9afb276fa225bea8a677a50f0ddd7635310b1
feat(monitoring): update the api https://togithub.com/googleapis/google-api-python-client/commit/f64be2390ca1e6e59ce63fcef8b22ee78922eae0
feat(mybusinessverifications): update the api https://togithub.com/googleapis/google-api-python-client/commit/fde7890f06667733cb3917ab3edc573f979f7b14
feat(networkconnectivity): update the api https://togithub.com/googleapis/google-api-python-client/commit/0d299134e87b7b373500b51d43799d931f7fbf8b
feat(networkmanagement): update the api https://togithub.com/googleapis/google-api-python-client/commit/47352429b14691f327743f9d54c079cef1dcf3cb
feat(notebooks): update the api https://togithub.com/googleapis/google-api-python-client/commit/66dd9d0e43a6698c5e3b9b2918a6971d8267d156
feat(paymentsresellersubscription): update the api https://togithub.com/googleapis/google-api-python-client/commit/d0fae461de28dd1134dda00fb21998737241cfd7
feat(places): update the api https://togithub.com/googleapis/google-api-python-client/commit/db06598e16cd646cfd0251627e4c607feabb1588
feat(run): update the api https://togithub.com/googleapis/google-api-python-client/commit/d10dad24fea5a6ea8374ee69e3e7878619b4e708
fix(smartdevicemanagement): update the api https://togithub.com/googleapis/google-api-python-client/commit/03ffb2b7ad905cd7404f400b9311c92a6fe5a057
feat(spanner): update the api https://togithub.com/googleapis/google-api-python-client/commit/531ba38b88d4f5195a991037dec5db6223b71fbc
feat(storage): update the api https://togithub.com/googleapis/google-api-python-client/commit/8610476ae829869f9abc93a349ff6c1c52d5bade
feat(transcoder): update the api https://togithub.com/googleapis/google-api-python-client/commit/7d2dfac9b7a320ac21921266c437fc67cf525047
feat(vision): update the api https://togithub.com/googleapis/google-api-python-client/commit/4de577bc69271c120360e6066de91e38e5f48ee4
---
...anager_v1.accessPolicies.accessLevels.html | 50 +
...r_v1.accessPolicies.servicePerimeters.html | 60 +
...ediationGroups.mediationAbExperiments.html | 6 +-
...ifications_v1.organizations.locations.html | 69 +
...ns.featurestores.entityTypes.features.html | 32 +-
...m_v1.projects.locations.featurestores.html | 2 +-
..._v1.projects.locations.indexEndpoints.html | 39 +-
...latform_v1.projects.locations.indexes.html | 20 +-
..._v1.projects.locations.studies.trials.html | 11 +
...ns.featurestores.entityTypes.features.html | 32 +-
...eta1.projects.locations.featurestores.html | 2 +-
...aiplatform_v1beta1.projects.locations.html | 5 +
...ta1.projects.locations.indexEndpoints.html | 39 +-
...rm_v1beta1.projects.locations.indexes.html | 20 +-
...jects.locations.notebookExecutionJobs.html | 151 ++
...1.projects.locations.notebookRuntimes.html | 3 +
...rojects.locations.persistentResources.html | 139 +-
...ta1.projects.locations.studies.trials.html | 11 +
...organizations.locations.dataExchanges.html | 2 +-
...b_v1.projects.locations.dataExchanges.html | 12 +-
...oidmanagement_v1.enterprises.policies.html | 20 +
docs/dyn/appengine_v1.apps.html | 18 +-
docs/dyn/appengine_v1.apps.services.html | 9 +
.../appengine_v1.apps.services.versions.html | 8 +-
docs/dyn/appengine_v1beta.apps.html | 18 +-
docs/dyn/appengine_v1beta.apps.runtimes.html | 38 +-
docs/dyn/appengine_v1beta.apps.services.html | 18 +-
...pengine_v1beta.apps.services.versions.html | 29 +-
...ry_v1.projects.locations.repositories.html | 20 +-
...beta1.projects.locations.repositories.html | 10 +-
...beta2.projects.locations.repositories.html | 10 +-
..._v1.organizations.locations.workloads.html | 75 +
.../dyn/batch_v1.projects.locations.jobs.html | 24 +-
...lobal_.partnerTenants.browserDlpRules.html | 258 ++++
...ions.locations.global_.partnerTenants.html | 5 +
...v1.projects.locations.blockchainNodes.html | 10 +-
...gine_v1.projects.locations.operations.html | 4 +-
.../checks_v1alpha.accounts.apps.reports.html | 2 -
...agement_v1.customers.telemetry.events.html | 12 +
docs/dyn/cloudasset_v1.assets.html | 22 +
docs/dyn/cloudasset_v1.v1.html | 44 +
.../dyn/cloudasset_v1beta1.organizations.html | 22 +
docs/dyn/cloudasset_v1beta1.projects.html | 22 +
docs/dyn/cloudasset_v1p5beta1.assets.html | 22 +
...ctions_v2.projects.locations.runtimes.html | 10 +
...s_v2alpha.projects.locations.runtimes.html | 10 +
...ns_v2beta.projects.locations.runtimes.html | 10 +
...oudtasks_v2.projects.locations.queues.html | 60 +-
...ks_v2.projects.locations.queues.tasks.html | 10 +-
...cloudtasks_v2beta2.projects.locations.html | 56 +
...sks_v2beta2.projects.locations.queues.html | 10 +-
...sks_v2beta3.projects.locations.queues.html | 96 +-
...beta3.projects.locations.queues.tasks.html | 12 +-
...er_v1.projects.locations.environments.html | 8 +
...ors_v1.projects.locations.connections.html | 24 +-
...ions.connections.runtimeActionSchemas.html | 76 +
...ions.connections.runtimeEntitySchemas.html | 38 +
...cations.providers.connectors.versions.html | 2 +
...rojects.locations.connections.actions.html | 223 ++-
...cts.locations.connections.entityTypes.html | 136 +-
...ha1.projects.locations.contactCenters.html | 4 +
...s_v1.projects.locations.conversations.html | 2 +-
...projects.locations.connectionProfiles.html | 12 +
docs/dyn/datastore_v1.projects.html | 396 ++---
..._v1beta1.projects.sites.customDomains.html | 210 +--
...ects.locations.bareMetalAdminClusters.html | 1 +
....projects.locations.bareMetalClusters.html | 1 +
..._v1.projects.locations.vmwareClusters.html | 25 +-
.../gmail_v1.users.settings.cse.keypairs.html | 18 +
docs/dyn/index.md | 4 +
...1alpha.projects.locations.connections.html | 18 +-
.../monitoring_v1.projects.dashboards.html | 1320 +++++++++++++++++
docs/dyn/mybusinessverifications_v1.html | 5 -
...s.locations.global_.connectivityTests.html | 188 ++-
...ks_v1.projects.locations.environments.html | 4 +-
...ooks_v1.projects.locations.executions.html | 4 +-
...books_v1.projects.locations.instances.html | 82 +-
...ooks_v1.projects.locations.operations.html | 4 +-
...ebooks_v1.projects.locations.runtimes.html | 64 +-
...books_v1.projects.locations.schedules.html | 6 +-
...books_v2.projects.locations.instances.html | 34 +-
...ooks_v2.projects.locations.operations.html | 4 +-
...llersubscription_v1.partners.products.html | 9 +
docs/dyn/places_v1.html | 5 -
docs/dyn/rapidmigrationassessment_v1.html | 111 ++
.../rapidmigrationassessment_v1.projects.html | 91 ++
...ent_v1.projects.locations.annotations.html | 166 +++
...ment_v1.projects.locations.collectors.html | 507 +++++++
...ationassessment_v1.projects.locations.html | 186 +++
...ment_v1.projects.locations.operations.html | 235 +++
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
...ocations.recommenders.recommendations.html | 2 +-
.../dyn/run_v1.namespaces.configurations.html | 16 +-
.../dyn/run_v1.namespaces.domainmappings.html | 16 +-
docs/dyn/run_v1.namespaces.executions.html | 12 +-
docs/dyn/run_v1.namespaces.jobs.html | 54 +-
docs/dyn/run_v1.namespaces.revisions.html | 8 +-
docs/dyn/run_v1.namespaces.routes.html | 12 +-
docs/dyn/run_v1.namespaces.services.html | 60 +-
docs/dyn/run_v1.namespaces.tasks.html | 8 +-
..._v1.projects.locations.configurations.html | 16 +-
..._v1.projects.locations.domainmappings.html | 16 +-
.../run_v1.projects.locations.revisions.html | 8 +-
.../dyn/run_v1.projects.locations.routes.html | 12 +-
.../run_v1.projects.locations.services.html | 60 +-
...v2.projects.locations.jobs.executions.html | 26 +-
...jects.locations.jobs.executions.tasks.html | 26 +-
docs/dyn/run_v2.projects.locations.jobs.html | 52 +-
.../run_v2.projects.locations.services.html | 52 +-
...projects.locations.services.revisions.html | 26 +-
...projects.instances.databases.sessions.html | 124 ++
docs/dyn/storage_v1.buckets.html | 86 +-
docs/dyn/storage_v1.objects.html | 74 +-
.../testing_v1.projects.deviceSessions.html | 12 +-
...er_v1.projects.locations.jobTemplates.html | 12 +
...transcoder_v1.projects.locations.jobs.html | 12 +
docs/dyn/vision_v1.files.html | 6 +
docs/dyn/vision_v1.images.html | 6 +
docs/dyn/vision_v1.projects.files.html | 6 +
docs/dyn/vision_v1.projects.images.html | 6 +
.../vision_v1.projects.locations.files.html | 6 +
.../vision_v1.projects.locations.images.html | 6 +
docs/dyn/vision_v1p2beta1.files.html | 6 +
docs/dyn/vision_v1p2beta1.images.html | 6 +
docs/dyn/vision_v1p2beta1.projects.files.html | 6 +
.../dyn/vision_v1p2beta1.projects.images.html | 6 +
...on_v1p2beta1.projects.locations.files.html | 6 +
...n_v1p2beta1.projects.locations.images.html | 6 +
...cess_v1.projects.locations.connectors.html | 2 +-
...v1beta1.projects.locations.connectors.html | 18 +-
...flows_v1.projects.locations.workflows.html | 66 +
.../acceleratedmobilepageurl.v1.json | 2 +-
.../documents/accesscontextmanager.v1.json | 70 +-
.../accesscontextmanager.v1beta.json | 2 +-
.../discovery_cache/documents/acmedns.v1.json | 2 +-
.../documents/adexchangebuyer2.v2beta1.json | 2 +-
.../documents/admin.datatransfer_v1.json | 2 +-
.../documents/admin.directory_v1.json | 2 +-
.../documents/admin.reports_v1.json | 2 +-
.../discovery_cache/documents/admob.v1.json | 2 +-
.../documents/admob.v1beta.json | 4 +-
.../discovery_cache/documents/adsense.v2.json | 2 +-
.../documents/advisorynotifications.v1.json | 91 +-
.../documents/aiplatform.v1.json | 67 +-
.../documents/aiplatform.v1beta1.json | 229 ++-
.../documents/analyticsadmin.v1alpha.json | 2 +-
.../documents/analyticsadmin.v1beta.json | 2 +-
.../documents/analyticsdata.v1beta.json | 2 +-
.../documents/analyticshub.v1.json | 4 +-
.../documents/analyticshub.v1beta1.json | 2 +-
.../androiddeviceprovisioning.v1.json | 2 +-
.../documents/androidenterprise.v1.json | 2 +-
.../documents/androidmanagement.v1.json | 12 +-
.../documents/androidpublisher.v3.json | 8 +-
.../documents/apigateway.v1.json | 2 +-
.../documents/apigateway.v1beta.json | 2 +-
.../discovery_cache/documents/apikeys.v2.json | 2 +-
.../documents/appengine.v1.json | 35 +-
.../documents/appengine.v1alpha.json | 2 +-
.../documents/appengine.v1beta.json | 124 +-
.../documents/area120tables.v1alpha1.json | 2 +-
.../documents/artifactregistry.v1.json | 13 +-
.../documents/artifactregistry.v1beta1.json | 11 +-
.../documents/artifactregistry.v1beta2.json | 11 +-
.../documents/assuredworkloads.v1.json | 140 +-
.../authorizedbuyersmarketplace.v1.json | 2 +-
.../documents/baremetalsolution.v2.json | 2 +-
.../discovery_cache/documents/batch.v1.json | 4 +-
.../documents/beyondcorp.v1.json | 93 +-
.../documents/beyondcorp.v1alpha.json | 2 +-
.../documents/bigqueryreservation.v1.json | 2 +-
.../documents/billingbudgets.v1.json | 2 +-
.../documents/billingbudgets.v1beta1.json | 2 +-
.../documents/binaryauthorization.v1.json | 2 +-
.../binaryauthorization.v1beta1.json | 2 +-
.../documents/blockchainnodeengine.v1.json | 9 +-
.../discovery_cache/documents/blogger.v2.json | 2 +-
.../discovery_cache/documents/blogger.v3.json | 2 +-
.../discovery_cache/documents/books.v1.json | 2 +-
.../businessprofileperformance.v1.json | 2 +-
.../documents/certificatemanager.v1.json | 4 +-
.../discovery_cache/documents/chat.v1.json | 2 +-
.../documents/checks.v1alpha.json | 6 +-
.../documents/chromemanagement.v1.json | 88 +-
.../documents/chromepolicy.v1.json | 2 +-
.../documents/civicinfo.v2.json | 2 +-
.../documents/classroom.v1.json | 2 +-
.../documents/cloudasset.v1.json | 70 +-
.../documents/cloudasset.v1beta1.json | 70 +-
.../documents/cloudasset.v1p1beta1.json | 70 +-
.../documents/cloudasset.v1p5beta1.json | 70 +-
.../documents/cloudasset.v1p7beta1.json | 70 +-
.../documents/cloudbilling.v1.json | 2 +-
.../documents/cloudbilling.v1beta.json | 2 +-
.../documents/cloudchannel.v1.json | 2 +-
.../documents/cloudfunctions.v1.json | 2 +-
.../documents/cloudfunctions.v2.json | 32 +-
.../documents/cloudfunctions.v2alpha.json | 32 +-
.../documents/cloudfunctions.v2beta.json | 32 +-
.../documents/cloudidentity.v1.json | 2 +-
.../documents/cloudidentity.v1beta1.json | 2 +-
.../documents/cloudkms.v1.json | 2 +-
.../documents/cloudprofiler.v2.json | 2 +-
.../cloudresourcemanager.v1beta1.json | 2 +-
.../documents/cloudresourcemanager.v2.json | 2 +-
.../cloudresourcemanager.v2beta1.json | 2 +-
.../documents/cloudresourcemanager.v3.json | 2 +-
.../documents/cloudscheduler.v1.json | 2 +-
.../documents/cloudscheduler.v1beta1.json | 2 +-
.../documents/cloudshell.v1.json | 2 +-
.../documents/cloudsupport.v2.json | 2 +-
.../documents/cloudsupport.v2beta.json | 2 +-
.../documents/cloudtasks.v2.json | 10 +-
.../documents/cloudtasks.v2beta2.json | 83 +-
.../documents/cloudtasks.v2beta3.json | 14 +-
.../documents/composer.v1.json | 12 +-
.../documents/composer.v1beta1.json | 2 +-
.../documents/connectors.v1.json | 255 +++-
.../documents/connectors.v2.json | 310 +++-
.../contactcenteraiplatform.v1alpha1.json | 6 +-
.../documents/contactcenterinsights.v1.json | 6 +-
.../documents/content.v2.1.json | 2 +-
.../documents/customsearch.v1.json | 2 +-
.../documents/datacatalog.v1.json | 2 +-
.../documents/datacatalog.v1beta1.json | 2 +-
.../documents/dataflow.v1b3.json | 2 +-
.../documents/dataform.v1beta1.json | 4 +-
.../documents/datalineage.v1.json | 2 +-
.../documents/datamigration.v1.json | 17 +-
.../documents/datamigration.v1beta1.json | 2 +-
.../documents/dataplex.v1.json | 2 +-
.../documents/datastore.v1.json | 2 +-
.../documents/datastore.v1beta1.json | 2 +-
.../documents/datastore.v1beta3.json | 2 +-
.../documents/datastream.v1.json | 2 +-
.../documents/datastream.v1alpha1.json | 2 +-
.../documents/digitalassetlinks.v1.json | 2 +-
.../documents/displayvideo.v1.json | 18 +-
.../documents/displayvideo.v2.json | 18 +-
.../discovery_cache/documents/dlp.v2.json | 2 +-
.../discovery_cache/documents/dns.v1.json | 2 +-
.../documents/dns.v1beta2.json | 2 +-
.../documents/documentai.v1.json | 6 +-
.../documents/documentai.v1beta2.json | 2 +-
.../documents/documentai.v1beta3.json | 14 +-
.../documents/domainsrdap.v1.json | 2 +-
.../documents/doubleclickbidmanager.v2.json | 2 +-
.../documents/doubleclicksearch.v2.json | 2 +-
.../discovery_cache/documents/drive.v2.json | 2 +-
.../discovery_cache/documents/drive.v3.json | 2 +-
.../documents/drivelabels.v2.json | 2 +-
.../documents/drivelabels.v2beta.json | 2 +-
.../documents/essentialcontacts.v1.json | 2 +-
.../documents/eventarc.v1.json | 2 +-
.../documents/eventarc.v1beta1.json | 2 +-
.../documents/factchecktools.v1alpha1.json | 2 +-
.../discovery_cache/documents/fcm.v1.json | 2 +-
.../documents/fcmdata.v1beta1.json | 2 +-
.../documents/firebase.v1beta1.json | 2 +-
.../documents/firebaseappdistribution.v1.json | 2 +-
.../documents/firebasedatabase.v1beta.json | 2 +-
.../documents/firebasedynamiclinks.v1.json | 2 +-
.../documents/firebasehosting.v1.json | 40 +-
.../documents/firebasehosting.v1beta1.json | 100 +-
.../documents/firebaseml.v1.json | 2 +-
.../documents/firebaseml.v1beta2.json | 2 +-
.../documents/firestore.v1.json | 2 +-
.../documents/firestore.v1beta1.json | 2 +-
.../documents/firestore.v1beta2.json | 2 +-
.../discovery_cache/documents/fitness.v1.json | 2 +-
.../documents/gkebackup.v1.json | 2 +-
.../discovery_cache/documents/gkehub.v1.json | 2 +-
.../documents/gkehub.v1alpha.json | 2 +-
.../documents/gkehub.v1alpha2.json | 2 +-
.../documents/gkehub.v1beta.json | 2 +-
.../documents/gkehub.v1beta1.json | 2 +-
.../documents/gkehub.v2alpha.json | 2 +-
.../documents/gkeonprem.v1.json | 19 +-
.../discovery_cache/documents/gmail.v1.json | 17 +-
.../documents/gmailpostmastertools.v1.json | 2 +-
.../gmailpostmastertools.v1beta1.json | 2 +-
.../documents/groupsmigration.v1.json | 2 +-
.../documents/homegraph.v1.json | 2 +-
.../discovery_cache/documents/iap.v1.json | 2 +-
.../documents/iap.v1beta1.json | 2 +-
.../documents/integrations.v1alpha.json | 96 +-
.../documents/libraryagent.v1.json | 2 +-
.../documents/licensing.v1.json | 2 +-
.../documents/localservices.v1.json | 2 +-
.../discovery_cache/documents/logging.v2.json | 2 +-
.../documents/migrationcenter.v1.json | 2 +-
.../documents/migrationcenter.v1alpha1.json | 2 +-
.../documents/monitoring.v1.json | 183 ++-
.../documents/monitoring.v3.json | 2 +-
.../mybusinessaccountmanagement.v1.json | 2 +-
.../mybusinessbusinessinformation.v1.json | 2 +-
.../documents/mybusinesslodging.v1.json | 2 +-
.../documents/mybusinessnotifications.v1.json | 2 +-
.../documents/mybusinessplaceactions.v1.json | 2 +-
.../documents/mybusinessqanda.v1.json | 2 +-
.../documents/mybusinessverifications.v1.json | 70 +-
.../documents/networkconnectivity.v1.json | 24 +-
.../networkconnectivity.v1alpha1.json | 2 +-
.../documents/networkmanagement.v1.json | 176 ++-
.../documents/networkmanagement.v1beta1.json | 2 +-
.../documents/networksecurity.v1.json | 2 +-
.../documents/networksecurity.v1beta1.json | 2 +-
.../documents/networkservices.v1.json | 2 +-
.../documents/networkservices.v1beta1.json | 2 +-
.../documents/notebooks.v1.json | 170 ++-
.../documents/notebooks.v2.json | 16 +-
.../documents/ondemandscanning.v1.json | 2 +-
.../documents/ondemandscanning.v1beta1.json | 2 +-
.../documents/orgpolicy.v2.json | 2 +-
.../documents/osconfig.v1.json | 2 +-
.../documents/osconfig.v1alpha.json | 2 +-
.../documents/pagespeedonline.v5.json | 2 +-
.../paymentsresellersubscription.v1.json | 62 +-
.../discovery_cache/documents/people.v1.json | 2 +-
.../discovery_cache/documents/places.v1.json | 30 +-
.../documents/playcustomapp.v1.json | 2 +-
.../playdeveloperreporting.v1alpha1.json | 2 +-
.../playdeveloperreporting.v1beta1.json | 2 +-
.../documents/playgrouping.v1alpha1.json | 2 +-
.../documents/playintegrity.v1.json | 2 +-
.../documents/policysimulator.v1.json | 2 +-
.../documents/policysimulator.v1alpha.json | 2 +-
.../documents/policysimulator.v1beta.json | 2 +-
.../documents/prod_tt_sasportal.v1alpha1.json | 2 +-
.../documents/pubsublite.v1.json | 2 +-
.../rapidmigrationassessment.v1.json | 1059 +++++++++++++
.../readerrevenuesubscriptionlinking.v1.json | 2 +-
.../documents/realtimebidding.v1.json | 2 +-
.../documents/recaptchaenterprise.v1.json | 2 +-
.../documents/recommender.v1.json | 10 +-
.../documents/recommender.v1beta1.json | 10 +-
.../discovery_cache/documents/redis.v1.json | 2 +-
.../documents/redis.v1beta1.json | 2 +-
.../documents/reseller.v1.json | 2 +-
.../documents/resourcesettings.v1.json | 2 +-
.../discovery_cache/documents/retail.v2.json | 2 +-
.../documents/retail.v2alpha.json | 2 +-
.../documents/retail.v2beta.json | 2 +-
.../discovery_cache/documents/run.v1.json | 14 +-
.../discovery_cache/documents/run.v2.json | 33 +-
.../documents/runtimeconfig.v1.json | 2 +-
.../documents/runtimeconfig.v1beta1.json | 2 +-
.../documents/safebrowsing.v4.json | 2 +-
.../documents/sasportal.v1alpha1.json | 2 +-
.../documents/searchconsole.v1.json | 2 +-
.../documents/secretmanager.v1.json | 2 +-
.../documents/secretmanager.v1beta1.json | 2 +-
.../documents/securitycenter.v1.json | 8 +-
.../documents/securitycenter.v1beta1.json | 8 +-
.../documents/securitycenter.v1beta2.json | 8 +-
.../serviceconsumermanagement.v1.json | 2 +-
.../serviceconsumermanagement.v1beta1.json | 2 +-
.../documents/servicecontrol.v1.json | 2 +-
.../documents/servicecontrol.v2.json | 2 +-
.../documents/servicemanagement.v1.json | 2 +-
.../documents/servicenetworking.v1.json | 2 +-
.../documents/servicenetworking.v1beta.json | 2 +-
.../documents/serviceusage.v1.json | 12 +-
.../documents/serviceusage.v1beta1.json | 12 +-
.../discovery_cache/documents/sheets.v4.json | 2 +-
.../documents/smartdevicemanagement.v1.json | 36 +-
.../discovery_cache/documents/spanner.v1.json | 87 +-
.../discovery_cache/documents/speech.v1.json | 2 +-
.../documents/speech.v1p1beta1.json | 2 +-
.../discovery_cache/documents/storage.v1.json | 70 +-
.../documents/storagetransfer.v1.json | 2 +-
.../documents/streetviewpublish.v1.json | 2 +-
.../discovery_cache/documents/sts.v1.json | 2 +-
.../discovery_cache/documents/sts.v1beta.json | 2 +-
.../documents/tagmanager.v1.json | 2 +-
.../documents/tagmanager.v2.json | 2 +-
.../discovery_cache/documents/tasks.v1.json | 2 +-
.../discovery_cache/documents/testing.v1.json | 4 +-
.../documents/texttospeech.v1.json | 2 +-
.../documents/texttospeech.v1beta1.json | 2 +-
.../documents/toolresults.v1beta3.json | 2 +-
.../discovery_cache/documents/tpu.v1.json | 2 +-
.../documents/tpu.v1alpha1.json | 2 +-
.../discovery_cache/documents/tpu.v2.json | 2 +-
.../documents/tpu.v2alpha1.json | 2 +-
.../documents/transcoder.v1.json | 17 +-
.../documents/travelimpactmodel.v1.json | 2 +-
.../discovery_cache/documents/vault.v1.json | 2 +-
.../documents/versionhistory.v1.json | 2 +-
.../discovery_cache/documents/vision.v1.json | 30 +-
.../documents/vision.v1p2beta1.json | 30 +-
.../documents/vmmigration.v1.json | 2 +-
.../documents/vmmigration.v1alpha1.json | 2 +-
.../documents/vpcaccess.v1.json | 4 +-
.../documents/vpcaccess.v1beta1.json | 8 +-
.../documents/websecurityscanner.v1.json | 2 +-
.../documents/websecurityscanner.v1alpha.json | 2 +-
.../documents/websecurityscanner.v1beta.json | 2 +-
.../documents/workflowexecutions.v1.json | 2 +-
.../documents/workflowexecutions.v1beta.json | 2 +-
.../documents/workflows.v1.json | 56 +-
.../documents/workflows.v1beta.json | 2 +-
.../discovery_cache/documents/youtube.v3.json | 2 +-
.../documents/youtubeAnalytics.v2.json | 2 +-
.../documents/youtubereporting.v1.json | 2 +-
411 files changed, 10556 insertions(+), 1499 deletions(-)
create mode 100644 docs/dyn/aiplatform_v1beta1.projects.locations.notebookExecutionJobs.html
create mode 100644 docs/dyn/beyondcorp_v1.organizations.locations.global_.partnerTenants.browserDlpRules.html
create mode 100644 docs/dyn/rapidmigrationassessment_v1.html
create mode 100644 docs/dyn/rapidmigrationassessment_v1.projects.html
create mode 100644 docs/dyn/rapidmigrationassessment_v1.projects.locations.annotations.html
create mode 100644 docs/dyn/rapidmigrationassessment_v1.projects.locations.collectors.html
create mode 100644 docs/dyn/rapidmigrationassessment_v1.projects.locations.html
create mode 100644 docs/dyn/rapidmigrationassessment_v1.projects.locations.operations.html
create mode 100644 googleapiclient/discovery_cache/documents/rapidmigrationassessment.v1.json
diff --git a/docs/dyn/accesscontextmanager_v1.accessPolicies.accessLevels.html b/docs/dyn/accesscontextmanager_v1.accessPolicies.accessLevels.html
index f8235f9e2eb..a99502d5539 100644
--- a/docs/dyn/accesscontextmanager_v1.accessPolicies.accessLevels.html
+++ b/docs/dyn/accesscontextmanager_v1.accessPolicies.accessLevels.html
@@ -152,6 +152,16 @@
Method Details
"requiredAccessLevels": [ # A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
"A String",
],
+ "vpcNetworkSources": [ # The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
+ { # The originating network source in Google Cloud.
+ "vpcSubnetwork": { # Sub-segment ranges inside of a VPC Network. # Sub-segment ranges of a VPC network.
+ "network": "A String", # Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
+ "vpcIpSubnetworks": [ # CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed.
+ "A String",
+ ],
+ },
+ },
+ ],
},
],
},
@@ -287,6 +297,16 @@ Method Details
"requiredAccessLevels": [ # A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
"A String",
],
+ "vpcNetworkSources": [ # The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
+ { # The originating network source in Google Cloud.
+ "vpcSubnetwork": { # Sub-segment ranges inside of a VPC Network. # Sub-segment ranges of a VPC network.
+ "network": "A String", # Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
+ "vpcIpSubnetworks": [ # CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed.
+ "A String",
+ ],
+ },
+ },
+ ],
},
],
},
@@ -363,6 +383,16 @@ Method Details
"requiredAccessLevels": [ # A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
"A String",
],
+ "vpcNetworkSources": [ # The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
+ { # The originating network source in Google Cloud.
+ "vpcSubnetwork": { # Sub-segment ranges inside of a VPC Network. # Sub-segment ranges of a VPC network.
+ "network": "A String", # Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
+ "vpcIpSubnetworks": [ # CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed.
+ "A String",
+ ],
+ },
+ },
+ ],
},
],
},
@@ -442,6 +472,16 @@ Method Details
"requiredAccessLevels": [ # A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
"A String",
],
+ "vpcNetworkSources": [ # The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
+ { # The originating network source in Google Cloud.
+ "vpcSubnetwork": { # Sub-segment ranges inside of a VPC Network. # Sub-segment ranges of a VPC network.
+ "network": "A String", # Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
+ "vpcIpSubnetworks": [ # CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed.
+ "A String",
+ ],
+ },
+ },
+ ],
},
],
},
@@ -535,6 +575,16 @@ Method Details
"requiredAccessLevels": [ # A list of other access levels defined in the same `Policy`, referenced by resource name. Referencing an `AccessLevel` which does not exist is an error. All access levels listed must be granted for the Condition to be true. Example: "`accessPolicies/MY_POLICY/accessLevels/LEVEL_NAME"`
"A String",
],
+ "vpcNetworkSources": [ # The request must originate from one of the provided VPC networks in Google Cloud. Cannot specify this field together with `ip_subnetworks`.
+ { # The originating network source in Google Cloud.
+ "vpcSubnetwork": { # Sub-segment ranges inside of a VPC Network. # Sub-segment ranges of a VPC network.
+ "network": "A String", # Required. Network name. If the network is not part of the organization, the `compute.network.get` permission must be granted to the caller. Format: `//compute.googleapis.com/projects/{PROJECT_ID}/global/networks/{NETWORK_NAME}` Example: `//compute.googleapis.com/projects/my-project/global/networks/network-1`
+ "vpcIpSubnetworks": [ # CIDR block IP subnetwork specification. The IP address must be an IPv4 address and can be a public or private IP address. Note that for a CIDR IP address block, the specified IP address portion must be properly truncated (i.e. all the host bits must be zero) or the input is considered malformed. For example, "192.0.2.0/24" is accepted but "192.0.2.1/24" is not. If empty, all IP addresses are allowed.
+ "A String",
+ ],
+ },
+ },
+ ],
},
],
},
diff --git a/docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html b/docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html
index f11bad2aaa4..877f8c722ef 100644
--- a/docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html
+++ b/docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html
@@ -176,6 +176,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -254,6 +260,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -418,6 +430,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -496,6 +514,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -602,6 +626,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -680,6 +710,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -792,6 +828,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -870,6 +912,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -998,6 +1046,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
@@ -1076,6 +1130,12 @@ Method Details
"A String",
],
"identityType": "A String", # Specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of `identities` field will be allowed access.
+ "sourceRestriction": "A String", # Whether to enforce traffic restrictions based on `sources` field. If the `sources` fields is non-empty, then this field must be set to `SOURCE_RESTRICTION_ENABLED`.
+ "sources": [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
+ { # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
+ "accessLevel": "A String", # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
+ },
+ ],
},
"egressTo": { # Defines the conditions under which an EgressPolicy matches a request. Conditions are based on information about the ApiOperation intended to be performed on the `resources` specified. Note that if the destination of the request is also protected by a ServicePerimeter, then that ServicePerimeter must have an IngressPolicy which allows access in order for this request to succeed. The request must match `operations` AND `resources` fields in order to be allowed egress out of the perimeter. # Defines the conditions on the ApiOperation and destination resources that cause this EgressPolicy to apply.
"externalResources": [ # A list of external resources that are allowed to be accessed. Only AWS and Azure resources are supported. For Amazon S3, the supported format is s3://BUCKET_NAME. For Azure Storage, the supported format is azure://myaccount.blob.core.windows.net/CONTAINER_NAME. A request matches if it contains an external resource in this list (Example: s3://bucket/path). Currently '*' is not allowed.
diff --git a/docs/dyn/admob_v1beta.accounts.mediationGroups.mediationAbExperiments.html b/docs/dyn/admob_v1beta.accounts.mediationGroups.mediationAbExperiments.html
index 2ed880f6af2..46a857d4154 100644
--- a/docs/dyn/admob_v1beta.accounts.mediationGroups.mediationAbExperiments.html
+++ b/docs/dyn/admob_v1beta.accounts.mediationGroups.mediationAbExperiments.html
@@ -98,7 +98,7 @@ Method Details
body: object, The request body.
The object takes the form of:
-{ # The mediation A/B experiment. NEXT ID: 12
+{ # The mediation A/B experiment.
"controlMediationLines": [ # Output only. The experiment mediation lines for control. They are inherited from the parent mediation group. It is an output only field.
{ # The mediation group line for the experiment. It will be used for serving during the run of the experiment.
"mediationGroupLine": { # Settings for an ad network used by a mediation group. # The mediation group line used by the experiment.
@@ -146,7 +146,7 @@ Method Details
Returns:
An object of the form:
- { # The mediation A/B experiment. NEXT ID: 12
+ { # The mediation A/B experiment.
"controlMediationLines": [ # Output only. The experiment mediation lines for control. They are inherited from the parent mediation group. It is an output only field.
{ # The mediation group line for the experiment. It will be used for serving during the run of the experiment.
"mediationGroupLine": { # Settings for an ad network used by a mediation group. # The mediation group line used by the experiment.
@@ -208,7 +208,7 @@ Method Details
Returns:
An object of the form:
- { # The mediation A/B experiment. NEXT ID: 12
+ { # The mediation A/B experiment.
"controlMediationLines": [ # Output only. The experiment mediation lines for control. They are inherited from the parent mediation group. It is an output only field.
{ # The mediation group line for the experiment. It will be used for serving during the run of the experiment.
"mediationGroupLine": { # Settings for an ad network used by a mediation group. # The mediation group line used by the experiment.
diff --git a/docs/dyn/advisorynotifications_v1.organizations.locations.html b/docs/dyn/advisorynotifications_v1.organizations.locations.html
index 9ddbbadc220..fc4833435e2 100644
--- a/docs/dyn/advisorynotifications_v1.organizations.locations.html
+++ b/docs/dyn/advisorynotifications_v1.organizations.locations.html
@@ -82,10 +82,79 @@ Instance Methods
close()
Close httplib2 connections.
+
+ getSettings(name, x__xgafv=None)
+Get notification settings.
+
+ updateSettings(name, body=None, x__xgafv=None)
+Update notification settings.
Method Details
close()
Close httplib2 connections.
+
+
getSettings(name, x__xgafv=None)
+
Get notification settings.
+
+Args:
+ name: string, Required. The resource name of the settings to retrieve. Format: organizations/{organization}/locations/{location}/settings. (required)
+ x__xgafv: string, V1 error format.
+ Allowed values
+ 1 - v1 error format
+ 2 - v2 error format
+
+Returns:
+ An object of the form:
+
+ { # Settings for Advisory Notifications.
+ "etag": "A String", # Required. Fingerprint for optimistic concurrency returned in Get requests. Must be provided for Update requests. If the value provided does not match the value known to the server, ABORTED will be thrown, and the client should retry the read-modify-write cycle.
+ "name": "A String", # Output only. The resource name of the settings to retrieve. Format: organizations/{organization}/locations/{location}/settings.
+ "notificationSettings": { # Required. Map of each notification type and its settings to get/set all settings at once. The server will validate the value for each notification type.
+ "a_key": { # Settings for each NotificationType.
+ "enabled": True or False, # Whether the associated NotificationType is enabled.
+ },
+ },
+}
+
+
+
+
updateSettings(name, body=None, x__xgafv=None)
+
Update notification settings.
+
+Args:
+ name: string, Output only. The resource name of the settings to retrieve. Format: organizations/{organization}/locations/{location}/settings. (required)
+ body: object, The request body.
+ The object takes the form of:
+
+{ # Settings for Advisory Notifications.
+ "etag": "A String", # Required. Fingerprint for optimistic concurrency returned in Get requests. Must be provided for Update requests. If the value provided does not match the value known to the server, ABORTED will be thrown, and the client should retry the read-modify-write cycle.
+ "name": "A String", # Output only. The resource name of the settings to retrieve. Format: organizations/{organization}/locations/{location}/settings.
+ "notificationSettings": { # Required. Map of each notification type and its settings to get/set all settings at once. The server will validate the value for each notification type.
+ "a_key": { # Settings for each NotificationType.
+ "enabled": True or False, # Whether the associated NotificationType is enabled.
+ },
+ },
+}
+
+ x__xgafv: string, V1 error format.
+ Allowed values
+ 1 - v1 error format
+ 2 - v2 error format
+
+Returns:
+ An object of the form:
+
+ { # Settings for Advisory Notifications.
+ "etag": "A String", # Required. Fingerprint for optimistic concurrency returned in Get requests. Must be provided for Update requests. If the value provided does not match the value known to the server, ABORTED will be thrown, and the client should retry the read-modify-write cycle.
+ "name": "A String", # Output only. The resource name of the settings to retrieve. Format: organizations/{organization}/locations/{location}/settings.
+ "notificationSettings": { # Required. Map of each notification type and its settings to get/set all settings at once. The server will validate the value for each notification type.
+ "a_key": { # Settings for each NotificationType.
+ "enabled": True or False, # Whether the associated NotificationType is enabled.
+ },
+ },
+}
+
+