Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(all): auto-regenerate discovery clients #1737

Merged
merged 1 commit into from Nov 3, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
14 changes: 9 additions & 5 deletions assuredworkloads/v1/assuredworkloads-api.json
Expand Up @@ -491,7 +491,7 @@
}
}
},
"revision": "20221020",
"revision": "20221028",
"rootUrl": "https://assuredworkloads.googleapis.com/",
"schemas": {
"GoogleCloudAssuredworkloadsV1AcknowledgeViolationRequest": {
Expand Down Expand Up @@ -614,12 +614,14 @@
"enum": [
"RESTRICTION_TYPE_UNSPECIFIED",
"ALLOW_ALL_GCP_RESOURCES",
"ALLOW_COMPLIANT_RESOURCES"
"ALLOW_COMPLIANT_RESOURCES",
"APPEND_COMPLIANT_RESOURCES"
],
"enumDescriptions": [
"Unknown restriction type.",
"Allow the use all of all gcp products, irrespective of the compliance posture. This effectively removes gcp.restrictServiceUsage OrgPolicy on the AssuredWorkloads Folder.",
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources."
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources.",
"Similar to ALLOW_COMPLIANT_RESOURCES but adds the list of compliant resources to the existing list of resources. Effective org-policy of the Folder is considered to ensure there is no disruption to the existing customer workflows."
],
"type": "string"
}
Expand Down Expand Up @@ -938,11 +940,13 @@
"description": "Optional. Compliance Regime associated with this workload.",
"enum": [
"PARTNER_UNSPECIFIED",
"LOCAL_CONTROLS_BY_S3NS"
"LOCAL_CONTROLS_BY_S3NS",
"SOVEREIGN_CONTROLS_BY_T_SYSTEMS"
],
"enumDescriptions": [
"Unknown partner regime/controls.",
"S3NS regime/controls."
"S3NS regime/controls.",
"TSystem regime/controls."
],
"type": "string"
},
Expand Down
5 changes: 5 additions & 0 deletions assuredworkloads/v1/assuredworkloads-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 9 additions & 5 deletions assuredworkloads/v1beta1/assuredworkloads-api.json
Expand Up @@ -595,7 +595,7 @@
}
}
},
"revision": "20221014",
"revision": "20221028",
"rootUrl": "https://assuredworkloads.googleapis.com/",
"schemas": {
"GoogleCloudAssuredworkloadsV1beta1AcknowledgeViolationRequest": {
Expand Down Expand Up @@ -678,12 +678,14 @@
"enum": [
"RESTRICTION_TYPE_UNSPECIFIED",
"ALLOW_ALL_GCP_RESOURCES",
"ALLOW_COMPLIANT_RESOURCES"
"ALLOW_COMPLIANT_RESOURCES",
"APPEND_COMPLIANT_RESOURCES"
],
"enumDescriptions": [
"Unknown restriction type.",
"Allow the use all of all gcp products, irrespective of the compliance posture. This effectively removes gcp.restrictServiceUsage OrgPolicy on the AssuredWorkloads Folder.",
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources."
"Based on Workload's compliance regime, allowed list changes. See - https://cloud.google.com/assured-workloads/docs/supported-products for the list of supported resources.",
"Similar to ALLOW_COMPLIANT_RESOURCES but adds the list of compliant resources to the existing list of compliant resources. Effective org-policy of the Folder is considered to ensure there is no disruption to the existing customer workflows."
],
"type": "string"
}
Expand Down Expand Up @@ -1018,11 +1020,13 @@
"description": "Optional. Compliance Regime associated with this workload.",
"enum": [
"PARTNER_UNSPECIFIED",
"LOCAL_CONTROLS_BY_S3NS"
"LOCAL_CONTROLS_BY_S3NS",
"SOVEREIGN_CONTROLS_BY_T_SYSTEMS"
],
"enumDescriptions": [
"Unknown partner regime/controls.",
"S3NS regime/controls."
"S3NS regime/controls.",
"TSystems regime/controls."
],
"type": "string"
},
Expand Down
5 changes: 5 additions & 0 deletions assuredworkloads/v1beta1/assuredworkloads-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

29 changes: 28 additions & 1 deletion cloudidentity/v1beta1/cloudidentity-api.json
Expand Up @@ -1932,7 +1932,7 @@
}
}
},
"revision": "20221025",
"revision": "20221101",
"rootUrl": "https://cloudidentity.googleapis.com/",
"schemas": {
"AddIdpCredentialOperationMetadata": {
Expand Down Expand Up @@ -2355,6 +2355,29 @@
"readOnly": true,
"type": "string"
},
"clientTypes": {
"description": "List of the clients the device is reporting to.",
"items": {
"enum": [
"CLIENT_TYPE_UNSPECIFIED",
"DRIVE_FS",
"FUNDAMENTAL",
"ENDPOINT_VERIFICATION",
"WINDOWS_ADVANCED",
"GOOGLE_CREDENTIALS_PROVIDER_FOR_WINDOWS"
],
"enumDescriptions": [
"Default value",
"Managed by DriveFS",
"Management type for every secure device",
"Managed by Endpoint Verification",
"Managed by Windows",
"Managed by Google credential provider for windows"
],
"type": "string"
},
"type": "array"
},
"compromisedState": {
"description": "Output only. Represents whether the Device is compromised.",
"enum": [
Expand Down Expand Up @@ -2437,6 +2460,10 @@
"description": "Output only. Attributes specific to Endpoint Verification devices.",
"readOnly": true
},
"hostname": {
"description": "Host name of the device.",
"type": "string"
},
"imei": {
"description": "Output only. IMEI number of device if GSM device; empty otherwise.",
"readOnly": true,
Expand Down
15 changes: 15 additions & 0 deletions cloudidentity/v1beta1/cloudidentity-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions cloudtasks/v2beta2/cloudtasks-api.json
Expand Up @@ -876,7 +876,7 @@
}
}
},
"revision": "20221014",
"revision": "20221025",
"rootUrl": "https://cloudtasks.googleapis.com/",
"schemas": {
"AcknowledgeTaskRequest": {
Expand Down Expand Up @@ -1025,7 +1025,7 @@
"type": "object"
},
"BufferTaskRequest": {
"description": "LINT.IfChange Request message for BufferTask.",
"description": "Request message for BufferTask.",
"id": "BufferTaskRequest",
"properties": {
"body": {
Expand Down
2 changes: 1 addition & 1 deletion cloudtasks/v2beta2/cloudtasks-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

21 changes: 20 additions & 1 deletion dlp/v2/dlp-api.json
Expand Up @@ -3412,7 +3412,7 @@
}
}
},
"revision": "20221017",
"revision": "20221029",
"rootUrl": "https://dlp.googleapis.com/",
"schemas": {
"GooglePrivacyDlpV2Action": {
Expand Down Expand Up @@ -5044,6 +5044,21 @@
},
"type": "object"
},
"GooglePrivacyDlpV2ExcludeByHotword": {
"description": "The rule to exclude findings based on a hotword. For record inspection of tables, column names are considered hotwords. An example of this is to exclude a finding if a BigQuery column matches a specific pattern.",
"id": "GooglePrivacyDlpV2ExcludeByHotword",
"properties": {
"hotwordRegex": {
"$ref": "GooglePrivacyDlpV2Regex",
"description": "Regular expression pattern defining what qualifies as a hotword."
},
"proximity": {
"$ref": "GooglePrivacyDlpV2Proximity",
"description": "Range of characters within which the entire hotword must reside. The total length of the window cannot exceed 1000 characters. The windowBefore property in proximity should be set to 1 if the hotword needs to be included in a column header."
}
},
"type": "object"
},
"GooglePrivacyDlpV2ExcludeInfoTypes": {
"description": "List of excluded infoTypes.",
"id": "GooglePrivacyDlpV2ExcludeInfoTypes",
Expand All @@ -5066,6 +5081,10 @@
"$ref": "GooglePrivacyDlpV2Dictionary",
"description": "Dictionary which defines the rule."
},
"excludeByHotword": {
"$ref": "GooglePrivacyDlpV2ExcludeByHotword",
"description": "Drop if the hotword rule is contained in the proximate context. For tabular data, the context includes the column name."
},
"excludeInfoTypes": {
"$ref": "GooglePrivacyDlpV2ExcludeInfoTypes",
"description": "Set of infoTypes for which findings would affect this rule."
Expand Down
43 changes: 43 additions & 0 deletions dlp/v2/dlp-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.