From ab331cb8652fcd3562d624d62bdde315a572cbbb Mon Sep 17 00:00:00 2001 From: Anthonios Partheniou Date: Thu, 4 Jul 2024 18:34:13 +0000 Subject: [PATCH 1/5] fix: regenerate pb2 files for compatibility with protobuf 5.x --- noxfile.py | 439 +++++++++++++++++------------------- setup.py | 2 +- testing/constraints-3.7.txt | 2 +- 3 files changed, 209 insertions(+), 234 deletions(-) diff --git a/noxfile.py b/noxfile.py index 7b1fd9b..4b15f4d 100644 --- a/noxfile.py +++ b/noxfile.py @@ -14,246 +14,260 @@ # See the License for the specific language governing permissions and # limitations under the License. -# Generated by synthtool. DO NOT EDIT! - -from __future__ import absolute_import import os import pathlib +from pathlib import Path +import re import shutil -import warnings import nox + BLACK_VERSION = "black==22.3.0" -ISORT_VERSION = "isort==5.10.1" -LINT_PATHS = ["docs", "google", "tests", "noxfile.py", "setup.py"] +LINT_PATHS = ["docs", "google", "noxfile.py", "setup.py"] -# NOTE: Pin the version of grpcio-tools to 1.48.2 for compatibility with -# Protobuf 3.19.5. Please ensure that the minimum required version of -# protobuf in setup.py is compatible with the pb2 files generated -# by grpcio-tools before changing the pinned version below. -GRPCIO_TOOLS_VERSION = "grpcio-tools==1.48.2" -DEFAULT_PYTHON_VERSION = "3.8" - -UNIT_TEST_PYTHON_VERSIONS = ["3.7", "3.8", "3.9", "3.10", "3.11", "3.12"] -UNIT_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "asyncmock", - "pytest", - "pytest-cov", - "pytest-asyncio", -] -UNIT_TEST_EXTERNAL_DEPENDENCIES = [] -UNIT_TEST_LOCAL_DEPENDENCIES = [] -UNIT_TEST_DEPENDENCIES = [] -UNIT_TEST_EXTRAS = [] -UNIT_TEST_EXTRAS_BY_PYTHON = {} - -SYSTEM_TEST_PYTHON_VERSIONS = ["3.8"] -SYSTEM_TEST_STANDARD_DEPENDENCIES = [ - "mock", - "pytest", - "google-cloud-testutils", -] -SYSTEM_TEST_EXTERNAL_DEPENDENCIES = [] -SYSTEM_TEST_LOCAL_DEPENDENCIES = [] -SYSTEM_TEST_DEPENDENCIES = [] -SYSTEM_TEST_EXTRAS = [] -SYSTEM_TEST_EXTRAS_BY_PYTHON = {} +# `grpcio-tools` 1.59.0 or newer is required for protobuf 5.x compatibility. +GRPCIO_TOOLS_VERSION = "grpcio-tools==1.59.0" CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() - -# 'docfx' is excluded since it only needs to run in 'docs-presubmit' -nox.options.sessions = [ - "system", - "lint", - "integration_test", - "lint_setup_py", - "blacken", - "docs", - "unit", -] - -# Error if a python version is missing -nox.options.error_on_missing_interpreters = True - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def lint(session): - """Run linters. - - Returns a failure if the linters find linting errors or sufficiently - serious code quality issues. - """ - session.install("flake8", BLACK_VERSION) - session.run( - "black", - "--check", - *LINT_PATHS, - ) - session.run("flake8", "google", "tests") +UNIT_TEST_PYTHON_VERSIONS = ["3.7", "3.8", "3.9", "3.10", "3.11", "3.12"] -@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.session(python="3.8") def blacken(session): - """Run black. Format code to uniform standard.""" - session.install(BLACK_VERSION) - session.run( - "black", - *LINT_PATHS, - ) - - -@nox.session(python=DEFAULT_PYTHON_VERSION) -def format(session): - """ - Run isort to sort imports. Then run black - to format code to uniform standard. + """Run black. + Format code to uniform standard. + This currently uses Python 3.6 due to the automated Kokoro run of synthtool. + That run uses an image that doesn't have 3.6 installed. Before updating this + check the state of the `gcp_ubuntu_config` we use for that Kokoro run. """ - session.install(BLACK_VERSION, ISORT_VERSION) - # Use the --fss option to sort imports using strict alphabetical order. - # See https://pycqa.github.io/isort/docs/configuration/options.html#force-sort-within-sections - session.run( - "isort", - "--fss", - *LINT_PATHS, - ) - session.run( - "black", - *LINT_PATHS, - ) + session.install(BLACK_VERSION) + session.run("black", "google", "setup.py") -@nox.session(python=DEFAULT_PYTHON_VERSION) +@nox.session(python="3.8") def lint_setup_py(session): - """Verify that setup.py is valid (including RST check).""" + """Verify that setup.py is valid""" session.install("docutils", "pygments") - session.run("python", "setup.py", "check", "--restructuredtext", "--strict") + session.run("python", "setup.py", "check", "--strict") -def install_unittest_dependencies(session, *constraints): - standard_deps = UNIT_TEST_STANDARD_DEPENDENCIES + UNIT_TEST_DEPENDENCIES - session.install(*standard_deps, *constraints) +def unit(session, repository, package, prerelease, protobuf_implementation): + """Run the unit test suite.""" + downstream_dir = repository + if package: + downstream_dir = f"{repository}/packages/{package}" - if UNIT_TEST_EXTERNAL_DEPENDENCIES: - warnings.warn( - "'unit_test_external_dependencies' is deprecated. Instead, please " - "use 'unit_test_dependencies' or 'unit_test_local_dependencies'.", - DeprecationWarning, - ) - session.install(*UNIT_TEST_EXTERNAL_DEPENDENCIES, *constraints) + # Install all test dependencies, then install this package in-place. + session.install("asyncmock", "pytest-asyncio") - if UNIT_TEST_LOCAL_DEPENDENCIES: - session.install(*UNIT_TEST_LOCAL_DEPENDENCIES, *constraints) + # Pin mock due to https://github.com/googleapis/python-pubsub/issues/840 + session.install("mock==5.0.0", "pytest", "pytest-cov") - if UNIT_TEST_EXTRAS_BY_PYTHON: - extras = UNIT_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif UNIT_TEST_EXTRAS: - extras = UNIT_TEST_EXTRAS - else: - extras = [] + install_command = ["-e", f"{CURRENT_DIRECTORY}/{downstream_dir}"] - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) + if prerelease: + install_prerelease_dependencies( + session, + f"{CURRENT_DIRECTORY}/{downstream_dir}/testing/constraints-{UNIT_TEST_PYTHON_VERSIONS[0]}.txt", + ) + # Use the `--no-deps` options to allow pre-release versions of dependencies to be installed + install_command.extend(["--no-deps"]) else: - session.install("-e", ".", *constraints) + # Install the pinned dependencies in constraints file + install_command.extend( + [ + "-c", + f"{CURRENT_DIRECTORY}/{downstream_dir}/testing/constraints-{session.python}.txt", + ] + ) + # These *must* be the last 3 install commands to get the packages from source. + session.install(*install_command) -def default(session): - # Install all test dependencies, then install this package in-place. + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" - ) - install_unittest_dependencies(session, "-c", constraints_path) + # Install this library from source + session.install(".", "--no-deps") - # Run py.test against the unit tests. + # Print out package versions of dependencies session.run( - "py.test", - "--quiet", - f"--junitxml=unit_{session.python}_sponge_log.xml", - "--cov=google", - "--cov=tests/unit", - "--cov-append", - "--cov-config=.coveragerc", - "--cov-report=", - "--cov-fail-under=0", - os.path.join("tests", "unit"), - *session.posargs, + "python", "-c", "import google.protobuf; print(google.protobuf.__version__)" ) + session.run("python", "-c", "import grpc; print(grpc.__version__)") + session.run("python", "-c", "import google.auth; print(google.auth.__version__)") + session.run( + "python", "-c", "import google.api_core; print(google.api_core.__version__)" + ) -def install_systemtest_dependencies(session, *constraints): - - # Use pre-release gRPC for system tests. - session.install("--pre", "grpcio") - - session.install(*SYSTEM_TEST_STANDARD_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_EXTERNAL_DEPENDENCIES: - session.install(*SYSTEM_TEST_EXTERNAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_LOCAL_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_LOCAL_DEPENDENCIES, *constraints) - - if SYSTEM_TEST_DEPENDENCIES: - session.install("-e", *SYSTEM_TEST_DEPENDENCIES, *constraints) + # Run py.test against the unit tests in the downstream repository + with session.chdir(downstream_dir): + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + "--cov=google/cloud", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) - if SYSTEM_TEST_EXTRAS_BY_PYTHON: - extras = SYSTEM_TEST_EXTRAS_BY_PYTHON.get(session.python, []) - elif SYSTEM_TEST_EXTRAS: - extras = SYSTEM_TEST_EXTRAS - else: - extras = [] - if extras: - session.install("-e", f".[{','.join(extras)}]", *constraints) - else: - session.install("-e", ".", *constraints) +def install_prerelease_dependencies(session, constraints_path): + with open(constraints_path, encoding="utf-8") as constraints_file: + constraints_text = constraints_file.read() + # Ignore leading whitespace and comment lines. + constraints_deps = [ + match.group(1) + for match in re.finditer( + r"^\s*(\S+)(?===\S+)", constraints_text, flags=re.MULTILINE + ) + ] + session.install(*constraints_deps) + prerel_deps = [ + "googleapis-common-protos", + "protobuf", + "six", + "grpcio", + "grpcio-status", + "google-api-core", + "google-auth", + "proto-plus", + "google-cloud-testutils", + # dependencies of google-cloud-testutils" + "click", + ] + + for dep in prerel_deps: + session.install("--pre", "--no-deps", "--upgrade", dep) + + # Remaining dependencies + other_deps = [ + "requests", + ] + session.install(*other_deps) @nox.session(python=UNIT_TEST_PYTHON_VERSIONS) @nox.parametrize( - "library", + "library,prerelease,protobuf_implementation", [ - ("google-cloud-python", "google-cloud-asset"), + (("google-cloud-python", "google-cloud-asset"), False, "python"), + (("google-cloud-python", "google-cloud-asset"), False, "upb"), + (("google-cloud-python", "google-cloud-asset"), False, "cpp"), + (("google-cloud-python", "google-cloud-asset"), True, "python"), + (("google-cloud-python", "google-cloud-asset"), True, "upb"), + (("google-cloud-python", "google-cloud-asset"), True, "cpp"), ], - ids=["asset"], ) -def integration_test(session, library): +def unit_remote(session, library, prerelease, protobuf_implementation): """Run tests from a downstream libraries. + To verify that any changes we make here will not break downstream libraries, clone a few and run their unit and system tests. + NOTE: The unit and system test functions above are copied from the templates. They will need to be updated when the templates change. + + * Pub/Sub: GAPIC with handwritten layer. + * Speech: Full GAPIC, has long running operations. """ - package = "" - if type(library) == tuple: - library, package = library + + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12"): + session.skip("cpp implementation is not supported in python 3.11+") + + repository, package = library try: - session.run("git", "-C", library, "pull", external=True) + session.run("git", "-C", repository, "pull", external=True) except nox.command.CommandFailed: session.run( "git", "clone", "--single-branch", - f"https://github.com/googleapis/{library}", + f"https://github.com/googleapis/{repository}", external=True, ) - session.cd(library) - if package: - session.cd(f"packages/{package}") - default(session) - # system tests are run 3.7 only - if session.python == "3.7": - system(session) + unit( + session=session, + repository=repository, + package=package, + prerelease=prerelease, + protobuf_implementation=protobuf_implementation, + ) + + +@nox.session(python=UNIT_TEST_PYTHON_VERSIONS) +@nox.parametrize("protobuf_implementation", ["python", "upb", "cpp"]) +def unit_local(session, protobuf_implementation): + """Run tests in this local repo.""" + # Install all test dependencies, then install this package in-place. + + # TODO(https://github.com/googleapis/proto-plus-python/issues/389): + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf == 3.x however version 3.x + # does not support Python 3.11 and newer. The 'cpp' implementation + # must be excluded from the test matrix for these runtimes. + if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12"): + session.skip("cpp implementation is not supported in python 3.11+") + + constraints_path = str( + CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + ) + session.install( + "mock", + "asyncmock", + "pytest", + "pytest-cov", + "pytest-asyncio", + "-c", + constraints_path, + ) + + session.install("-e", ".", "-c", constraints_path) + + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") + + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + f"--junitxml=unit_{session.python}_sponge_log.xml", + "--cov=google", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) @nox.session(python="3.8") def generate_protos(session): """Generates the protos using protoc. + + This session but be last to avoid overwriting the protos used in CI runs. + Some notes on the `google` directory: 1. The `_pb2.py` files are produced by protoc. 2. The .proto files are non-functional but are left in the repository @@ -262,60 +276,12 @@ def generate_protos(session): If a new subdirectory is added, you will need to create more `__init__.py` files. """ - session.install(GRPCIO_TOOLS_VERSION) - protos = [str(p) for p in (pathlib.Path(".").glob("google/**/*.proto"))] + session.install(GRPCIO_TOOLS_VERSION) + protos = [str(p) for p in (Path(".").glob("google/**/*.proto"))] session.run( - "python", - "-m", - "grpc_tools.protoc", - "--proto_path=.", - "--python_out=.", - *protos, - ) - - -@nox.session(python=SYSTEM_TEST_PYTHON_VERSIONS) -def system(session): - """Run the system test suite.""" - constraints_path = str( - CURRENT_DIRECTORY / "testing" / f"constraints-{session.python}.txt" + "python", "-m", "grpc_tools.protoc", "--proto_path=.", "--python_out=.", *protos ) - system_test_path = os.path.join("tests", "system.py") - system_test_folder_path = os.path.join("tests", "system") - - # Check the value of `RUN_SYSTEM_TESTS` env var. It defaults to true. - if os.environ.get("RUN_SYSTEM_TESTS", "true") == "false": - session.skip("RUN_SYSTEM_TESTS is set to false, skipping") - # Install pyopenssl for mTLS testing. - if os.environ.get("GOOGLE_API_USE_CLIENT_CERTIFICATE", "false") == "true": - session.install("pyopenssl") - - system_test_exists = os.path.exists(system_test_path) - system_test_folder_exists = os.path.exists(system_test_folder_path) - # Sanity check: only run tests if found. - if not system_test_exists and not system_test_folder_exists: - session.skip("System tests were not found") - - install_systemtest_dependencies(session, "-c", constraints_path) - - # Run py.test against the system tests. - if system_test_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_path, - *session.posargs, - ) - if system_test_folder_exists: - session.run( - "py.test", - "--quiet", - f"--junitxml=system_{session.python}_sponge_log.xml", - system_test_folder_path, - *session.posargs, - ) @nox.session(python="3.9") @@ -399,7 +365,16 @@ def docfx(session): ) -@nox.session(python=UNIT_TEST_PYTHON_VERSIONS) -def unit(session): - """Run the unit test suite.""" - default(session) +@nox.session(python="3.8") +def lint(session): + """Run linters. + + Returns a failure if the linters find linting errors or sufficiently + serious code quality issues. + """ + session.install("flake8", BLACK_VERSION) + session.run( + "black", + "--check", + *LINT_PATHS, + ) diff --git a/setup.py b/setup.py index 9fefb46..72d57d3 100644 --- a/setup.py +++ b/setup.py @@ -30,7 +30,7 @@ release_status = "Development Status :: 4 - Beta" dependencies = [ "google-api-core[grpc] >= 1.34.1, <3.0.0dev,!=2.0.*,!=2.1.*,!=2.2.*,!=2.3.*,!=2.4.*,!=2.5.*,!=2.6.*,!=2.7.*,!=2.8.*,!=2.9.*,!=2.10.*", - "protobuf>=3.19.5,<5.0.0dev,!=3.20.0,!=3.20.1,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", + "protobuf>=3.20.2,<6.0.0dev,!=4.21.1,!=4.21.2,!=4.21.3,!=4.21.4,!=4.21.5", ] # Setup boilerplate below this line. diff --git a/testing/constraints-3.7.txt b/testing/constraints-3.7.txt index 7a1c665..5dccad8 100644 --- a/testing/constraints-3.7.txt +++ b/testing/constraints-3.7.txt @@ -5,5 +5,5 @@ # # e.g., if setup.py has "foo >= 1.14.0, < 2.0.0dev", # Then this file should have foo==1.14.0 -protobuf==3.19.5 +protobuf==3.20.2 google-api-core==1.34.1 From 281b477533043ffcd14e8a5ffd599d9ad31b6ce0 Mon Sep 17 00:00:00 2001 From: Owl Bot Date: Thu, 4 Jul 2024 18:37:20 +0000 Subject: [PATCH 2/5] =?UTF-8?q?=F0=9F=A6=89=20Updates=20from=20OwlBot=20po?= =?UTF-8?q?st-processor?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md --- .../type/device_resources_pb2.py | 47 +- .../v1/access_context_manager_pb2.py | 616 +++--------------- .../v1/access_level_pb2.py | 111 +--- .../v1/access_policy_pb2.py | 24 +- .../v1/gcp_user_access_binding_pb2.py | 26 +- .../v1/service_perimeter_pb2.py | 224 +------ 6 files changed, 180 insertions(+), 868 deletions(-) diff --git a/google/identity/accesscontextmanager/type/device_resources_pb2.py b/google/identity/accesscontextmanager/type/device_resources_pb2.py index 63d18cb..594894e 100644 --- a/google/identity/accesscontextmanager/type/device_resources_pb2.py +++ b/google/identity/accesscontextmanager/type/device_resources_pb2.py @@ -17,12 +17,10 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/identity/accesscontextmanager/type/device_resources.proto """Generated protocol buffer code.""" -from google.protobuf.internal import enum_type_wrapper from google.protobuf import descriptor as _descriptor from google.protobuf import descriptor_pool as _descriptor_pool -from google.protobuf import message as _message -from google.protobuf import reflection as _reflection from google.protobuf import symbol_database as _symbol_database +from google.protobuf.internal import builder as _builder # @@protoc_insertion_point(imports) @@ -33,37 +31,20 @@ b"\n@google/identity/accesscontextmanager/type/device_resources.proto\x12)google.identity.accesscontextmanager.type*p\n\x16\x44\x65viceEncryptionStatus\x12\x1a\n\x16\x45NCRYPTION_UNSPECIFIED\x10\x00\x12\x1a\n\x16\x45NCRYPTION_UNSUPPORTED\x10\x01\x12\x0f\n\x0bUNENCRYPTED\x10\x02\x12\r\n\tENCRYPTED\x10\x03*\x82\x01\n\x06OsType\x12\x12\n\x0eOS_UNSPECIFIED\x10\x00\x12\x0f\n\x0b\x44\x45SKTOP_MAC\x10\x01\x12\x13\n\x0f\x44\x45SKTOP_WINDOWS\x10\x02\x12\x11\n\rDESKTOP_LINUX\x10\x03\x12\x15\n\x11\x44\x45SKTOP_CHROME_OS\x10\x06\x12\x0b\n\x07\x41NDROID\x10\x04\x12\x07\n\x03IOS\x10\x05*V\n\x15\x44\x65viceManagementLevel\x12\x1a\n\x16MANAGEMENT_UNSPECIFIED\x10\x00\x12\x08\n\x04NONE\x10\x01\x12\t\n\x05\x42\x41SIC\x10\x02\x12\x0c\n\x08\x43OMPLETE\x10\x03\x42\x8d\x02\n-com.google.identity.accesscontextmanager.typeB\tTypeProtoP\x01ZHgoogle.golang.org/genproto/googleapis/identity/accesscontextmanager/type\xaa\x02)Google.Identity.AccessContextManager.Type\xca\x02)Google\\Identity\\AccessContextManager\\Type\xea\x02,Google::Identity::AccessContextManager::Typeb\x06proto3" ) -_DEVICEENCRYPTIONSTATUS = DESCRIPTOR.enum_types_by_name["DeviceEncryptionStatus"] -DeviceEncryptionStatus = enum_type_wrapper.EnumTypeWrapper(_DEVICEENCRYPTIONSTATUS) -_OSTYPE = DESCRIPTOR.enum_types_by_name["OsType"] -OsType = enum_type_wrapper.EnumTypeWrapper(_OSTYPE) -_DEVICEMANAGEMENTLEVEL = DESCRIPTOR.enum_types_by_name["DeviceManagementLevel"] -DeviceManagementLevel = enum_type_wrapper.EnumTypeWrapper(_DEVICEMANAGEMENTLEVEL) -ENCRYPTION_UNSPECIFIED = 0 -ENCRYPTION_UNSUPPORTED = 1 -UNENCRYPTED = 2 -ENCRYPTED = 3 -OS_UNSPECIFIED = 0 -DESKTOP_MAC = 1 -DESKTOP_WINDOWS = 2 -DESKTOP_LINUX = 3 -DESKTOP_CHROME_OS = 6 -ANDROID = 4 -IOS = 5 -MANAGEMENT_UNSPECIFIED = 0 -NONE = 1 -BASIC = 2 -COMPLETE = 3 - - +_globals = globals() +_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals) +_builder.BuildTopDescriptorsAndMessages( + DESCRIPTOR, + "google.identity.accesscontextmanager.type.device_resources_pb2", + _globals, +) if _descriptor._USE_C_DESCRIPTORS == False: - DESCRIPTOR._options = None DESCRIPTOR._serialized_options = b"\n-com.google.identity.accesscontextmanager.typeB\tTypeProtoP\001ZHgoogle.golang.org/genproto/googleapis/identity/accesscontextmanager/type\252\002)Google.Identity.AccessContextManager.Type\312\002)Google\\Identity\\AccessContextManager\\Type\352\002,Google::Identity::AccessContextManager::Type" - _DEVICEENCRYPTIONSTATUS._serialized_start = 111 - _DEVICEENCRYPTIONSTATUS._serialized_end = 223 - _OSTYPE._serialized_start = 226 - _OSTYPE._serialized_end = 356 - _DEVICEMANAGEMENTLEVEL._serialized_start = 358 - _DEVICEMANAGEMENTLEVEL._serialized_end = 444 + _globals["_DEVICEENCRYPTIONSTATUS"]._serialized_start = 111 + _globals["_DEVICEENCRYPTIONSTATUS"]._serialized_end = 223 + _globals["_OSTYPE"]._serialized_start = 226 + _globals["_OSTYPE"]._serialized_end = 356 + _globals["_DEVICEMANAGEMENTLEVEL"]._serialized_start = 358 + _globals["_DEVICEMANAGEMENTLEVEL"]._serialized_end = 444 # @@protoc_insertion_point(module_scope) diff --git a/google/identity/accesscontextmanager/v1/access_context_manager_pb2.py b/google/identity/accesscontextmanager/v1/access_context_manager_pb2.py index 078c0cc..a77c944 100644 --- a/google/identity/accesscontextmanager/v1/access_context_manager_pb2.py +++ b/google/identity/accesscontextmanager/v1/access_context_manager_pb2.py @@ -17,12 +17,10 @@ # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/identity/accesscontextmanager/v1/access_context_manager.proto """Generated protocol buffer code.""" -from google.protobuf.internal import enum_type_wrapper from google.protobuf import descriptor as _descriptor from google.protobuf import descriptor_pool as _descriptor_pool -from google.protobuf import message as _message -from google.protobuf import reflection as _reflection from google.protobuf import symbol_database as _symbol_database +from google.protobuf.internal import builder as _builder # @@protoc_insertion_point(imports) @@ -54,439 +52,17 @@ DESCRIPTOR = _descriptor_pool.Default().AddSerializedFile( - b'\nDgoogle/identity/accesscontextmanager/v1/access_context_manager.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a:google/identity/accesscontextmanager/v1/access_level.proto\x1a;google/identity/accesscontextmanager/v1/access_policy.proto\x1a\x45google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto\x1a?google/identity/accesscontextmanager/v1/service_perimeter.proto\x1a#google/longrunning/operations.proto\x1a google/protobuf/field_mask.proto"\x8c\x01\n\x19ListAccessPoliciesRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t"\x85\x01\n\x1aListAccessPoliciesResponse\x12N\n\x0f\x61\x63\x63\x65ss_policies\x18\x01 \x03(\x0b\x32\x35.google.identity.accesscontextmanager.v1.AccessPolicy\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"`\n\x16GetAccessPolicyRequest\x12\x46\n\x04name\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0accesscontextmanager.googleapis.com/AccessPolicy"\x9d\x01\n\x19UpdateAccessPolicyRequest\x12J\n\x06policy\x18\x01 \x01(\x0b\x32\x35.google.identity.accesscontextmanager.v1.AccessPolicyB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"c\n\x19\x44\x65leteAccessPolicyRequest\x12\x46\n\x04name\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0accesscontextmanager.googleapis.com/AccessPolicy"\xdc\x01\n\x17ListAccessLevelsRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\x12Q\n\x13\x61\x63\x63\x65ss_level_format\x18\x04 \x01(\x0e\x32\x34.google.identity.accesscontextmanager.v1.LevelFormat"\x80\x01\n\x18ListAccessLevelsResponse\x12K\n\raccess_levels\x18\x01 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevel\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"\xb1\x01\n\x15GetAccessLevelRequest\x12\x45\n\x04name\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel\x12Q\n\x13\x61\x63\x63\x65ss_level_format\x18\x02 \x01(\x0e\x32\x34.google.identity.accesscontextmanager.v1.LevelFormat"\xb4\x01\n\x18\x43reateAccessLevelRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12O\n\x0c\x61\x63\x63\x65ss_level\x18\x02 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02"\xa1\x01\n\x18UpdateAccessLevelRequest\x12O\n\x0c\x61\x63\x63\x65ss_level\x18\x01 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"a\n\x18\x44\x65leteAccessLevelRequest\x12\x45\n\x04name\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel"\xc5\x01\n\x1aReplaceAccessLevelsRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12P\n\raccess_levels\x18\x02 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\x12\x0c\n\x04\x65tag\x18\x04 \x01(\t"j\n\x1bReplaceAccessLevelsResponse\x12K\n\raccess_levels\x18\x01 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevel"\x93\x01\n\x1cListServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t"\x8f\x01\n\x1dListServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"h\n\x1aGetServicePerimeterRequest\x12J\n\x04name\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\n4accesscontextmanager.googleapis.com/ServicePerimeter"\xc8\x01\n\x1d\x43reateServicePerimeterRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12Y\n\x11service_perimeter\x18\x02 \x01(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02"\xb0\x01\n\x1dUpdateServicePerimeterRequest\x12Y\n\x11service_perimeter\x18\x01 \x01(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"k\n\x1d\x44\x65leteServicePerimeterRequest\x12J\n\x04name\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\n4accesscontextmanager.googleapis.com/ServicePerimeter"\xd9\x01\n\x1fReplaceServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12Z\n\x12service_perimeters\x18\x02 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\x12\x0c\n\x04\x65tag\x18\x03 \x01(\t"y\n ReplaceServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter"|\n\x1e\x43ommitServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12\x0c\n\x04\x65tag\x18\x02 \x01(\t"x\n\x1f\x43ommitServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter"\x9d\x01\n ListGcpUserAccessBindingsRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x9d\x01\n!ListGcpUserAccessBindingsResponse\x12_\n\x18gcp_user_access_bindings\x18\x01 \x03(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBinding\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"p\n\x1eGetGcpUserAccessBindingRequest\x12N\n\x04name\x18\x01 \x01(\tB@\xe0\x41\x02\xfa\x41:\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding"\xd2\x01\n!CreateGcpUserAccessBindingRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x63\n\x17gcp_user_access_binding\x18\x02 \x01(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBindingB\x03\xe0\x41\x02"\xbe\x01\n!UpdateGcpUserAccessBindingRequest\x12\x63\n\x17gcp_user_access_binding\x18\x01 \x01(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBindingB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"s\n!DeleteGcpUserAccessBindingRequest\x12N\n\x04name\x18\x01 \x01(\tB@\xe0\x41\x02\xfa\x41:\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding"\'\n%GcpUserAccessBindingOperationMetadata"\'\n%AccessContextManagerOperationMetadata*D\n\x0bLevelFormat\x12\x1c\n\x18LEVEL_FORMAT_UNSPECIFIED\x10\x00\x12\x0e\n\nAS_DEFINED\x10\x01\x12\x07\n\x03\x43\x45L\x10\x02\x32\xf1\x32\n\x14\x41\x63\x63\x65ssContextManager\x12\xb9\x01\n\x12ListAccessPolicies\x12\x42.google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest\x1a\x43.google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse"\x1a\x82\xd3\xe4\x93\x02\x14\x12\x12/v1/accessPolicies\x12\xb5\x01\n\x0fGetAccessPolicy\x12?.google.identity.accesscontextmanager.v1.GetAccessPolicyRequest\x1a\x35.google.identity.accesscontextmanager.v1.AccessPolicy"*\x82\xd3\xe4\x93\x02\x1d\x12\x1b/v1/{name=accessPolicies/*}\xda\x41\x04name\x12\xc1\x01\n\x12\x43reateAccessPolicy\x12\x35.google.identity.accesscontextmanager.v1.AccessPolicy\x1a\x1d.google.longrunning.Operation"U\x82\xd3\xe4\x93\x02\x17"\x12/v1/accessPolicies:\x01*\xca\x41\x35\n\x0c\x41\x63\x63\x65ssPolicy\x12%AccessContextManagerOperationMetadata\x12\xf8\x01\n\x12UpdateAccessPolicy\x12\x42.google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest\x1a\x1d.google.longrunning.Operation"\x7f\x82\xd3\xe4\x93\x02,2"/v1/{policy.name=accessPolicies/*}:\x06policy\xda\x41\x12policy,update_mask\xca\x41\x35\n\x0c\x41\x63\x63\x65ssPolicy\x12%AccessContextManagerOperationMetadata\x12\xe4\x01\n\x12\x44\x65leteAccessPolicy\x12\x42.google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest\x1a\x1d.google.longrunning.Operation"k\x82\xd3\xe4\x93\x02\x1d*\x1b/v1/{name=accessPolicies/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\x12\xd4\x01\n\x10ListAccessLevels\x12@.google.identity.accesscontextmanager.v1.ListAccessLevelsRequest\x1a\x41.google.identity.accesscontextmanager.v1.ListAccessLevelsResponse";\x82\xd3\xe4\x93\x02,\x12*/v1/{parent=accessPolicies/*}/accessLevels\xda\x41\x06parent\x12\xc1\x01\n\x0eGetAccessLevel\x12>.google.identity.accesscontextmanager.v1.GetAccessLevelRequest\x1a\x34.google.identity.accesscontextmanager.v1.AccessLevel"9\x82\xd3\xe4\x93\x02,\x12*/v1/{name=accessPolicies/*/accessLevels/*}\xda\x41\x04name\x12\x85\x02\n\x11\x43reateAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.CreateAccessLevelRequest\x1a\x1d.google.longrunning.Operation"\x8d\x01\x82\xd3\xe4\x93\x02:"*/v1/{parent=accessPolicies/*}/accessLevels:\x0c\x61\x63\x63\x65ss_level\xda\x41\x13parent,access_level\xca\x41\x34\n\x0b\x41\x63\x63\x65ssLevel\x12%AccessContextManagerOperationMetadata\x12\x97\x02\n\x11UpdateAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest\x1a\x1d.google.longrunning.Operation"\x9f\x01\x82\xd3\xe4\x93\x02G27/v1/{access_level.name=accessPolicies/*/accessLevels/*}:\x0c\x61\x63\x63\x65ss_level\xda\x41\x18\x61\x63\x63\x65ss_level,update_mask\xca\x41\x34\n\x0b\x41\x63\x63\x65ssLevel\x12%AccessContextManagerOperationMetadata\x12\xf1\x01\n\x11\x44\x65leteAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest\x1a\x1d.google.longrunning.Operation"z\x82\xd3\xe4\x93\x02,**/v1/{name=accessPolicies/*/accessLevels/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\x12\x83\x02\n\x13ReplaceAccessLevels\x12\x43.google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest\x1a\x1d.google.longrunning.Operation"\x87\x01\x82\xd3\xe4\x93\x02:"5/v1/{parent=accessPolicies/*}/accessLevels:replaceAll:\x01*\xca\x41\x44\n\x1bReplaceAccessLevelsResponse\x12%AccessContextManagerOperationMetadata\x12\xe8\x01\n\x15ListServicePerimeters\x12\x45.google.identity.accesscontextmanager.v1.ListServicePerimetersRequest\x1a\x46.google.identity.accesscontextmanager.v1.ListServicePerimetersResponse"@\x82\xd3\xe4\x93\x02\x31\x12//v1/{parent=accessPolicies/*}/servicePerimeters\xda\x41\x06parent\x12\xd5\x01\n\x13GetServicePerimeter\x12\x43.google.identity.accesscontextmanager.v1.GetServicePerimeterRequest\x1a\x39.google.identity.accesscontextmanager.v1.ServicePerimeter">\x82\xd3\xe4\x93\x02\x31\x12//v1/{name=accessPolicies/*/servicePerimeters/*}\xda\x41\x04name\x12\xa3\x02\n\x16\x43reateServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest\x1a\x1d.google.longrunning.Operation"\xa1\x01\x82\xd3\xe4\x93\x02\x44"//v1/{parent=accessPolicies/*}/servicePerimeters:\x11service_perimeter\xda\x41\x18parent,service_perimeter\xca\x41\x39\n\x10ServicePerimeter\x12%AccessContextManagerOperationMetadata\x12\xba\x02\n\x16UpdateServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest\x1a\x1d.google.longrunning.Operation"\xb8\x01\x82\xd3\xe4\x93\x02V2A/v1/{service_perimeter.name=accessPolicies/*/servicePerimeters/*}:\x11service_perimeter\xda\x41\x1dservice_perimeter,update_mask\xca\x41\x39\n\x10ServicePerimeter\x12%AccessContextManagerOperationMetadata\x12\x80\x02\n\x16\x44\x65leteServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest\x1a\x1d.google.longrunning.Operation"\x7f\x82\xd3\xe4\x93\x02\x31*//v1/{name=accessPolicies/*/servicePerimeters/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\x12\x97\x02\n\x18ReplaceServicePerimeters\x12H.google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest\x1a\x1d.google.longrunning.Operation"\x91\x01\x82\xd3\xe4\x93\x02?":/v1/{parent=accessPolicies/*}/servicePerimeters:replaceAll:\x01*\xca\x41I\n ReplaceServicePerimetersResponse\x12%AccessContextManagerOperationMetadata\x12\x90\x02\n\x17\x43ommitServicePerimeters\x12G.google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest\x1a\x1d.google.longrunning.Operation"\x8c\x01\x82\xd3\xe4\x93\x02;"6/v1/{parent=accessPolicies/*}/servicePerimeters:commit:\x01*\xca\x41H\n\x1f\x43ommitServicePerimetersResponse\x12%AccessContextManagerOperationMetadata\x12\xf7\x01\n\x19ListGcpUserAccessBindings\x12I.google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest\x1aJ.google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse"C\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{parent=organizations/*}/gcpUserAccessBindings\xda\x41\x06parent\x12\xe4\x01\n\x17GetGcpUserAccessBinding\x12G.google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest\x1a=.google.identity.accesscontextmanager.v1.GcpUserAccessBinding"A\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{name=organizations/*/gcpUserAccessBindings/*}\xda\x41\x04name\x12\xbe\x02\n\x1a\x43reateGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation"\xb4\x01\x82\xd3\xe4\x93\x02M"2/v1/{parent=organizations/*}/gcpUserAccessBindings:\x17gcp_user_access_binding\xda\x41\x1eparent,gcp_user_access_binding\xca\x41=\n\x14GcpUserAccessBinding\x12%GcpUserAccessBindingOperationMetadata\x12\xdb\x02\n\x1aUpdateGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation"\xd1\x01\x82\xd3\xe4\x93\x02\x65\x32J/v1/{gcp_user_access_binding.name=organizations/*/gcpUserAccessBindings/*}:\x17gcp_user_access_binding\xda\x41#gcp_user_access_binding,update_mask\xca\x41=\n\x14GcpUserAccessBinding\x12%GcpUserAccessBindingOperationMetadata\x12\x8c\x02\n\x1a\x44\x65leteGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation"\x82\x01\x82\xd3\xe4\x93\x02\x34*2/v1/{name=organizations/*/gcpUserAccessBindings/*}\xda\x41\x04name\xca\x41>\n\x15google.protobuf.Empty\x12%GcpUserAccessBindingOperationMetadata\x12\x82\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"7\x82\xd3\xe4\x93\x02\x31",/v1/{resource=accessPolicies/*}:setIamPolicy:\x01*\x12\x82\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"7\x82\xd3\xe4\x93\x02\x31",/v1/{resource=accessPolicies/*}:getIamPolicy:\x01*\x12\xbf\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"\xd3\x01\x82\xd3\xe4\x93\x02\xcc\x01"2/v1/{resource=accessPolicies/*}:testIamPermissions:\x01*ZF"A/v1/{resource=accessPolicies/*/accessLevels/*}:testIamPermissions:\x01*ZK"F/v1/{resource=accessPolicies/*/servicePerimeters/*}:testIamPermissions:\x01*\x1aW\xca\x41#accesscontextmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xb0\x02\n+com.google.identity.accesscontextmanager.v1B\x19\x41\x63\x63\x65ssContextManagerProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3' + b'\nDgoogle/identity/accesscontextmanager/v1/access_context_manager.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1egoogle/iam/v1/iam_policy.proto\x1a\x1agoogle/iam/v1/policy.proto\x1a:google/identity/accesscontextmanager/v1/access_level.proto\x1a;google/identity/accesscontextmanager/v1/access_policy.proto\x1a\x45google/identity/accesscontextmanager/v1/gcp_user_access_binding.proto\x1a?google/identity/accesscontextmanager/v1/service_perimeter.proto\x1a#google/longrunning/operations.proto\x1a google/protobuf/field_mask.proto"\x8c\x01\n\x19ListAccessPoliciesRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t"\x85\x01\n\x1aListAccessPoliciesResponse\x12N\n\x0f\x61\x63\x63\x65ss_policies\x18\x01 \x03(\x0b\x32\x35.google.identity.accesscontextmanager.v1.AccessPolicy\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"`\n\x16GetAccessPolicyRequest\x12\x46\n\x04name\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0accesscontextmanager.googleapis.com/AccessPolicy"\x9d\x01\n\x19UpdateAccessPolicyRequest\x12J\n\x06policy\x18\x01 \x01(\x0b\x32\x35.google.identity.accesscontextmanager.v1.AccessPolicyB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"c\n\x19\x44\x65leteAccessPolicyRequest\x12\x46\n\x04name\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0accesscontextmanager.googleapis.com/AccessPolicy"\xdc\x01\n\x17ListAccessLevelsRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t\x12Q\n\x13\x61\x63\x63\x65ss_level_format\x18\x04 \x01(\x0e\x32\x34.google.identity.accesscontextmanager.v1.LevelFormat"\x80\x01\n\x18ListAccessLevelsResponse\x12K\n\raccess_levels\x18\x01 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevel\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"\xb1\x01\n\x15GetAccessLevelRequest\x12\x45\n\x04name\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel\x12Q\n\x13\x61\x63\x63\x65ss_level_format\x18\x02 \x01(\x0e\x32\x34.google.identity.accesscontextmanager.v1.LevelFormat"\xb4\x01\n\x18\x43reateAccessLevelRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12O\n\x0c\x61\x63\x63\x65ss_level\x18\x02 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02"\xa1\x01\n\x18UpdateAccessLevelRequest\x12O\n\x0c\x61\x63\x63\x65ss_level\x18\x01 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"a\n\x18\x44\x65leteAccessLevelRequest\x12\x45\n\x04name\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel"\xc5\x01\n\x1aReplaceAccessLevelsRequest\x12G\n\x06parent\x18\x01 \x01(\tB7\xe0\x41\x02\xfa\x41\x31\x12/accesscontextmanager.googleapis.com/AccessLevel\x12P\n\raccess_levels\x18\x02 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevelB\x03\xe0\x41\x02\x12\x0c\n\x04\x65tag\x18\x04 \x01(\t"j\n\x1bReplaceAccessLevelsResponse\x12K\n\raccess_levels\x18\x01 \x03(\x0b\x32\x34.google.identity.accesscontextmanager.v1.AccessLevel"\x93\x01\n\x1cListServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12\x11\n\tpage_size\x18\x02 \x01(\x05\x12\x12\n\npage_token\x18\x03 \x01(\t"\x8f\x01\n\x1dListServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"h\n\x1aGetServicePerimeterRequest\x12J\n\x04name\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\n4accesscontextmanager.googleapis.com/ServicePerimeter"\xc8\x01\n\x1d\x43reateServicePerimeterRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12Y\n\x11service_perimeter\x18\x02 \x01(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02"\xb0\x01\n\x1dUpdateServicePerimeterRequest\x12Y\n\x11service_perimeter\x18\x01 \x01(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"k\n\x1d\x44\x65leteServicePerimeterRequest\x12J\n\x04name\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\n4accesscontextmanager.googleapis.com/ServicePerimeter"\xd9\x01\n\x1fReplaceServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12Z\n\x12service_perimeters\x18\x02 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeterB\x03\xe0\x41\x02\x12\x0c\n\x04\x65tag\x18\x03 \x01(\t"y\n ReplaceServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter"|\n\x1e\x43ommitServicePerimetersRequest\x12L\n\x06parent\x18\x01 \x01(\tB<\xe0\x41\x02\xfa\x41\x36\x12\x34\x61\x63\x63\x65sscontextmanager.googleapis.com/ServicePerimeter\x12\x0c\n\x04\x65tag\x18\x02 \x01(\t"x\n\x1f\x43ommitServicePerimetersResponse\x12U\n\x12service_perimeters\x18\x01 \x03(\x0b\x32\x39.google.identity.accesscontextmanager.v1.ServicePerimeter"\x9d\x01\n ListGcpUserAccessBindingsRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x16\n\tpage_size\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\npage_token\x18\x03 \x01(\tB\x03\xe0\x41\x01"\x9d\x01\n!ListGcpUserAccessBindingsResponse\x12_\n\x18gcp_user_access_bindings\x18\x01 \x03(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBinding\x12\x17\n\x0fnext_page_token\x18\x02 \x01(\t"p\n\x1eGetGcpUserAccessBindingRequest\x12N\n\x04name\x18\x01 \x01(\tB@\xe0\x41\x02\xfa\x41:\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding"\xd2\x01\n!CreateGcpUserAccessBindingRequest\x12H\n\x06parent\x18\x01 \x01(\tB8\xe0\x41\x02\xfa\x41\x32\n0cloudresourcemanager.googleapis.com/Organization\x12\x63\n\x17gcp_user_access_binding\x18\x02 \x01(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBindingB\x03\xe0\x41\x02"\xbe\x01\n!UpdateGcpUserAccessBindingRequest\x12\x63\n\x17gcp_user_access_binding\x18\x01 \x01(\x0b\x32=.google.identity.accesscontextmanager.v1.GcpUserAccessBindingB\x03\xe0\x41\x02\x12\x34\n\x0bupdate_mask\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.FieldMaskB\x03\xe0\x41\x02"s\n!DeleteGcpUserAccessBindingRequest\x12N\n\x04name\x18\x01 \x01(\tB@\xe0\x41\x02\xfa\x41:\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding"\'\n%GcpUserAccessBindingOperationMetadata"\'\n%AccessContextManagerOperationMetadata*D\n\x0bLevelFormat\x12\x1c\n\x18LEVEL_FORMAT_UNSPECIFIED\x10\x00\x12\x0e\n\nAS_DEFINED\x10\x01\x12\x07\n\x03\x43\x45L\x10\x02\x32\xf1\x32\n\x14\x41\x63\x63\x65ssContextManager\x12\xb9\x01\n\x12ListAccessPolicies\x12\x42.google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest\x1a\x43.google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse"\x1a\x82\xd3\xe4\x93\x02\x14\x12\x12/v1/accessPolicies\x12\xb5\x01\n\x0fGetAccessPolicy\x12?.google.identity.accesscontextmanager.v1.GetAccessPolicyRequest\x1a\x35.google.identity.accesscontextmanager.v1.AccessPolicy"*\xda\x41\x04name\x82\xd3\xe4\x93\x02\x1d\x12\x1b/v1/{name=accessPolicies/*}\x12\xc1\x01\n\x12\x43reateAccessPolicy\x12\x35.google.identity.accesscontextmanager.v1.AccessPolicy\x1a\x1d.google.longrunning.Operation"U\xca\x41\x35\n\x0c\x41\x63\x63\x65ssPolicy\x12%AccessContextManagerOperationMetadata\x82\xd3\xe4\x93\x02\x17"\x12/v1/accessPolicies:\x01*\x12\xf8\x01\n\x12UpdateAccessPolicy\x12\x42.google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest\x1a\x1d.google.longrunning.Operation"\x7f\xca\x41\x35\n\x0c\x41\x63\x63\x65ssPolicy\x12%AccessContextManagerOperationMetadata\xda\x41\x12policy,update_mask\x82\xd3\xe4\x93\x02,2"/v1/{policy.name=accessPolicies/*}:\x06policy\x12\xe4\x01\n\x12\x44\x65leteAccessPolicy\x12\x42.google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest\x1a\x1d.google.longrunning.Operation"k\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\xda\x41\x04name\x82\xd3\xe4\x93\x02\x1d*\x1b/v1/{name=accessPolicies/*}\x12\xd4\x01\n\x10ListAccessLevels\x12@.google.identity.accesscontextmanager.v1.ListAccessLevelsRequest\x1a\x41.google.identity.accesscontextmanager.v1.ListAccessLevelsResponse";\xda\x41\x06parent\x82\xd3\xe4\x93\x02,\x12*/v1/{parent=accessPolicies/*}/accessLevels\x12\xc1\x01\n\x0eGetAccessLevel\x12>.google.identity.accesscontextmanager.v1.GetAccessLevelRequest\x1a\x34.google.identity.accesscontextmanager.v1.AccessLevel"9\xda\x41\x04name\x82\xd3\xe4\x93\x02,\x12*/v1/{name=accessPolicies/*/accessLevels/*}\x12\x85\x02\n\x11\x43reateAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.CreateAccessLevelRequest\x1a\x1d.google.longrunning.Operation"\x8d\x01\xca\x41\x34\n\x0b\x41\x63\x63\x65ssLevel\x12%AccessContextManagerOperationMetadata\xda\x41\x13parent,access_level\x82\xd3\xe4\x93\x02:"*/v1/{parent=accessPolicies/*}/accessLevels:\x0c\x61\x63\x63\x65ss_level\x12\x97\x02\n\x11UpdateAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest\x1a\x1d.google.longrunning.Operation"\x9f\x01\xca\x41\x34\n\x0b\x41\x63\x63\x65ssLevel\x12%AccessContextManagerOperationMetadata\xda\x41\x18\x61\x63\x63\x65ss_level,update_mask\x82\xd3\xe4\x93\x02G27/v1/{access_level.name=accessPolicies/*/accessLevels/*}:\x0c\x61\x63\x63\x65ss_level\x12\xf1\x01\n\x11\x44\x65leteAccessLevel\x12\x41.google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest\x1a\x1d.google.longrunning.Operation"z\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\xda\x41\x04name\x82\xd3\xe4\x93\x02,**/v1/{name=accessPolicies/*/accessLevels/*}\x12\x83\x02\n\x13ReplaceAccessLevels\x12\x43.google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest\x1a\x1d.google.longrunning.Operation"\x87\x01\xca\x41\x44\n\x1bReplaceAccessLevelsResponse\x12%AccessContextManagerOperationMetadata\x82\xd3\xe4\x93\x02:"5/v1/{parent=accessPolicies/*}/accessLevels:replaceAll:\x01*\x12\xe8\x01\n\x15ListServicePerimeters\x12\x45.google.identity.accesscontextmanager.v1.ListServicePerimetersRequest\x1a\x46.google.identity.accesscontextmanager.v1.ListServicePerimetersResponse"@\xda\x41\x06parent\x82\xd3\xe4\x93\x02\x31\x12//v1/{parent=accessPolicies/*}/servicePerimeters\x12\xd5\x01\n\x13GetServicePerimeter\x12\x43.google.identity.accesscontextmanager.v1.GetServicePerimeterRequest\x1a\x39.google.identity.accesscontextmanager.v1.ServicePerimeter">\xda\x41\x04name\x82\xd3\xe4\x93\x02\x31\x12//v1/{name=accessPolicies/*/servicePerimeters/*}\x12\xa3\x02\n\x16\x43reateServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest\x1a\x1d.google.longrunning.Operation"\xa1\x01\xca\x41\x39\n\x10ServicePerimeter\x12%AccessContextManagerOperationMetadata\xda\x41\x18parent,service_perimeter\x82\xd3\xe4\x93\x02\x44"//v1/{parent=accessPolicies/*}/servicePerimeters:\x11service_perimeter\x12\xba\x02\n\x16UpdateServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest\x1a\x1d.google.longrunning.Operation"\xb8\x01\xca\x41\x39\n\x10ServicePerimeter\x12%AccessContextManagerOperationMetadata\xda\x41\x1dservice_perimeter,update_mask\x82\xd3\xe4\x93\x02V2A/v1/{service_perimeter.name=accessPolicies/*/servicePerimeters/*}:\x11service_perimeter\x12\x80\x02\n\x16\x44\x65leteServicePerimeter\x12\x46.google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest\x1a\x1d.google.longrunning.Operation"\x7f\xca\x41>\n\x15google.protobuf.Empty\x12%AccessContextManagerOperationMetadata\xda\x41\x04name\x82\xd3\xe4\x93\x02\x31*//v1/{name=accessPolicies/*/servicePerimeters/*}\x12\x97\x02\n\x18ReplaceServicePerimeters\x12H.google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest\x1a\x1d.google.longrunning.Operation"\x91\x01\xca\x41I\n ReplaceServicePerimetersResponse\x12%AccessContextManagerOperationMetadata\x82\xd3\xe4\x93\x02?":/v1/{parent=accessPolicies/*}/servicePerimeters:replaceAll:\x01*\x12\x90\x02\n\x17\x43ommitServicePerimeters\x12G.google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest\x1a\x1d.google.longrunning.Operation"\x8c\x01\xca\x41H\n\x1f\x43ommitServicePerimetersResponse\x12%AccessContextManagerOperationMetadata\x82\xd3\xe4\x93\x02;"6/v1/{parent=accessPolicies/*}/servicePerimeters:commit:\x01*\x12\xf7\x01\n\x19ListGcpUserAccessBindings\x12I.google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest\x1aJ.google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse"C\xda\x41\x06parent\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{parent=organizations/*}/gcpUserAccessBindings\x12\xe4\x01\n\x17GetGcpUserAccessBinding\x12G.google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest\x1a=.google.identity.accesscontextmanager.v1.GcpUserAccessBinding"A\xda\x41\x04name\x82\xd3\xe4\x93\x02\x34\x12\x32/v1/{name=organizations/*/gcpUserAccessBindings/*}\x12\xbe\x02\n\x1a\x43reateGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation"\xb4\x01\xca\x41=\n\x14GcpUserAccessBinding\x12%GcpUserAccessBindingOperationMetadata\xda\x41\x1eparent,gcp_user_access_binding\x82\xd3\xe4\x93\x02M"2/v1/{parent=organizations/*}/gcpUserAccessBindings:\x17gcp_user_access_binding\x12\xdb\x02\n\x1aUpdateGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation"\xd1\x01\xca\x41=\n\x14GcpUserAccessBinding\x12%GcpUserAccessBindingOperationMetadata\xda\x41#gcp_user_access_binding,update_mask\x82\xd3\xe4\x93\x02\x65\x32J/v1/{gcp_user_access_binding.name=organizations/*/gcpUserAccessBindings/*}:\x17gcp_user_access_binding\x12\x8c\x02\n\x1a\x44\x65leteGcpUserAccessBinding\x12J.google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest\x1a\x1d.google.longrunning.Operation"\x82\x01\xca\x41>\n\x15google.protobuf.Empty\x12%GcpUserAccessBindingOperationMetadata\xda\x41\x04name\x82\xd3\xe4\x93\x02\x34*2/v1/{name=organizations/*/gcpUserAccessBindings/*}\x12\x82\x01\n\x0cSetIamPolicy\x12".google.iam.v1.SetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"7\x82\xd3\xe4\x93\x02\x31",/v1/{resource=accessPolicies/*}:setIamPolicy:\x01*\x12\x82\x01\n\x0cGetIamPolicy\x12".google.iam.v1.GetIamPolicyRequest\x1a\x15.google.iam.v1.Policy"7\x82\xd3\xe4\x93\x02\x31",/v1/{resource=accessPolicies/*}:getIamPolicy:\x01*\x12\xbf\x02\n\x12TestIamPermissions\x12(.google.iam.v1.TestIamPermissionsRequest\x1a).google.iam.v1.TestIamPermissionsResponse"\xd3\x01\x82\xd3\xe4\x93\x02\xcc\x01"2/v1/{resource=accessPolicies/*}:testIamPermissions:\x01*ZF"A/v1/{resource=accessPolicies/*/accessLevels/*}:testIamPermissions:\x01*ZK"F/v1/{resource=accessPolicies/*/servicePerimeters/*}:testIamPermissions:\x01*\x1aW\xca\x41#accesscontextmanager.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\xb0\x02\n+com.google.identity.accesscontextmanager.v1B\x19\x41\x63\x63\x65ssContextManagerProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3' ) -_LEVELFORMAT = DESCRIPTOR.enum_types_by_name["LevelFormat"] -LevelFormat = enum_type_wrapper.EnumTypeWrapper(_LEVELFORMAT) -LEVEL_FORMAT_UNSPECIFIED = 0 -AS_DEFINED = 1 -CEL = 2 - - -_LISTACCESSPOLICIESREQUEST = DESCRIPTOR.message_types_by_name[ - "ListAccessPoliciesRequest" -] -_LISTACCESSPOLICIESRESPONSE = DESCRIPTOR.message_types_by_name[ - "ListAccessPoliciesResponse" -] -_GETACCESSPOLICYREQUEST = DESCRIPTOR.message_types_by_name["GetAccessPolicyRequest"] -_UPDATEACCESSPOLICYREQUEST = DESCRIPTOR.message_types_by_name[ - "UpdateAccessPolicyRequest" -] -_DELETEACCESSPOLICYREQUEST = DESCRIPTOR.message_types_by_name[ - "DeleteAccessPolicyRequest" -] -_LISTACCESSLEVELSREQUEST = DESCRIPTOR.message_types_by_name["ListAccessLevelsRequest"] -_LISTACCESSLEVELSRESPONSE = DESCRIPTOR.message_types_by_name["ListAccessLevelsResponse"] -_GETACCESSLEVELREQUEST = DESCRIPTOR.message_types_by_name["GetAccessLevelRequest"] -_CREATEACCESSLEVELREQUEST = DESCRIPTOR.message_types_by_name["CreateAccessLevelRequest"] -_UPDATEACCESSLEVELREQUEST = DESCRIPTOR.message_types_by_name["UpdateAccessLevelRequest"] -_DELETEACCESSLEVELREQUEST = DESCRIPTOR.message_types_by_name["DeleteAccessLevelRequest"] -_REPLACEACCESSLEVELSREQUEST = DESCRIPTOR.message_types_by_name[ - "ReplaceAccessLevelsRequest" -] -_REPLACEACCESSLEVELSRESPONSE = DESCRIPTOR.message_types_by_name[ - "ReplaceAccessLevelsResponse" -] -_LISTSERVICEPERIMETERSREQUEST = DESCRIPTOR.message_types_by_name[ - "ListServicePerimetersRequest" -] -_LISTSERVICEPERIMETERSRESPONSE = DESCRIPTOR.message_types_by_name[ - "ListServicePerimetersResponse" -] -_GETSERVICEPERIMETERREQUEST = DESCRIPTOR.message_types_by_name[ - "GetServicePerimeterRequest" -] -_CREATESERVICEPERIMETERREQUEST = DESCRIPTOR.message_types_by_name[ - "CreateServicePerimeterRequest" -] -_UPDATESERVICEPERIMETERREQUEST = DESCRIPTOR.message_types_by_name[ - "UpdateServicePerimeterRequest" -] -_DELETESERVICEPERIMETERREQUEST = DESCRIPTOR.message_types_by_name[ - "DeleteServicePerimeterRequest" -] -_REPLACESERVICEPERIMETERSREQUEST = DESCRIPTOR.message_types_by_name[ - "ReplaceServicePerimetersRequest" -] -_REPLACESERVICEPERIMETERSRESPONSE = DESCRIPTOR.message_types_by_name[ - "ReplaceServicePerimetersResponse" -] -_COMMITSERVICEPERIMETERSREQUEST = DESCRIPTOR.message_types_by_name[ - "CommitServicePerimetersRequest" -] -_COMMITSERVICEPERIMETERSRESPONSE = DESCRIPTOR.message_types_by_name[ - "CommitServicePerimetersResponse" -] -_LISTGCPUSERACCESSBINDINGSREQUEST = DESCRIPTOR.message_types_by_name[ - "ListGcpUserAccessBindingsRequest" -] -_LISTGCPUSERACCESSBINDINGSRESPONSE = DESCRIPTOR.message_types_by_name[ - "ListGcpUserAccessBindingsResponse" -] -_GETGCPUSERACCESSBINDINGREQUEST = DESCRIPTOR.message_types_by_name[ - "GetGcpUserAccessBindingRequest" -] -_CREATEGCPUSERACCESSBINDINGREQUEST = DESCRIPTOR.message_types_by_name[ - "CreateGcpUserAccessBindingRequest" -] -_UPDATEGCPUSERACCESSBINDINGREQUEST = DESCRIPTOR.message_types_by_name[ - "UpdateGcpUserAccessBindingRequest" -] -_DELETEGCPUSERACCESSBINDINGREQUEST = DESCRIPTOR.message_types_by_name[ - "DeleteGcpUserAccessBindingRequest" -] -_GCPUSERACCESSBINDINGOPERATIONMETADATA = DESCRIPTOR.message_types_by_name[ - "GcpUserAccessBindingOperationMetadata" -] -_ACCESSCONTEXTMANAGEROPERATIONMETADATA = DESCRIPTOR.message_types_by_name[ - "AccessContextManagerOperationMetadata" -] -ListAccessPoliciesRequest = _reflection.GeneratedProtocolMessageType( - "ListAccessPoliciesRequest", - (_message.Message,), - { - "DESCRIPTOR": _LISTACCESSPOLICIESREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListAccessPoliciesRequest) - }, -) -_sym_db.RegisterMessage(ListAccessPoliciesRequest) - -ListAccessPoliciesResponse = _reflection.GeneratedProtocolMessageType( - "ListAccessPoliciesResponse", - (_message.Message,), - { - "DESCRIPTOR": _LISTACCESSPOLICIESRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListAccessPoliciesResponse) - }, -) -_sym_db.RegisterMessage(ListAccessPoliciesResponse) - -GetAccessPolicyRequest = _reflection.GeneratedProtocolMessageType( - "GetAccessPolicyRequest", - (_message.Message,), - { - "DESCRIPTOR": _GETACCESSPOLICYREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.GetAccessPolicyRequest) - }, -) -_sym_db.RegisterMessage(GetAccessPolicyRequest) - -UpdateAccessPolicyRequest = _reflection.GeneratedProtocolMessageType( - "UpdateAccessPolicyRequest", - (_message.Message,), - { - "DESCRIPTOR": _UPDATEACCESSPOLICYREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.UpdateAccessPolicyRequest) - }, -) -_sym_db.RegisterMessage(UpdateAccessPolicyRequest) - -DeleteAccessPolicyRequest = _reflection.GeneratedProtocolMessageType( - "DeleteAccessPolicyRequest", - (_message.Message,), - { - "DESCRIPTOR": _DELETEACCESSPOLICYREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.DeleteAccessPolicyRequest) - }, -) -_sym_db.RegisterMessage(DeleteAccessPolicyRequest) - -ListAccessLevelsRequest = _reflection.GeneratedProtocolMessageType( - "ListAccessLevelsRequest", - (_message.Message,), - { - "DESCRIPTOR": _LISTACCESSLEVELSREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListAccessLevelsRequest) - }, -) -_sym_db.RegisterMessage(ListAccessLevelsRequest) - -ListAccessLevelsResponse = _reflection.GeneratedProtocolMessageType( - "ListAccessLevelsResponse", - (_message.Message,), - { - "DESCRIPTOR": _LISTACCESSLEVELSRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListAccessLevelsResponse) - }, -) -_sym_db.RegisterMessage(ListAccessLevelsResponse) - -GetAccessLevelRequest = _reflection.GeneratedProtocolMessageType( - "GetAccessLevelRequest", - (_message.Message,), - { - "DESCRIPTOR": _GETACCESSLEVELREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.GetAccessLevelRequest) - }, -) -_sym_db.RegisterMessage(GetAccessLevelRequest) - -CreateAccessLevelRequest = _reflection.GeneratedProtocolMessageType( - "CreateAccessLevelRequest", - (_message.Message,), - { - "DESCRIPTOR": _CREATEACCESSLEVELREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.CreateAccessLevelRequest) - }, -) -_sym_db.RegisterMessage(CreateAccessLevelRequest) - -UpdateAccessLevelRequest = _reflection.GeneratedProtocolMessageType( - "UpdateAccessLevelRequest", - (_message.Message,), - { - "DESCRIPTOR": _UPDATEACCESSLEVELREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.UpdateAccessLevelRequest) - }, -) -_sym_db.RegisterMessage(UpdateAccessLevelRequest) - -DeleteAccessLevelRequest = _reflection.GeneratedProtocolMessageType( - "DeleteAccessLevelRequest", - (_message.Message,), - { - "DESCRIPTOR": _DELETEACCESSLEVELREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.DeleteAccessLevelRequest) - }, -) -_sym_db.RegisterMessage(DeleteAccessLevelRequest) - -ReplaceAccessLevelsRequest = _reflection.GeneratedProtocolMessageType( - "ReplaceAccessLevelsRequest", - (_message.Message,), - { - "DESCRIPTOR": _REPLACEACCESSLEVELSREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ReplaceAccessLevelsRequest) - }, -) -_sym_db.RegisterMessage(ReplaceAccessLevelsRequest) - -ReplaceAccessLevelsResponse = _reflection.GeneratedProtocolMessageType( - "ReplaceAccessLevelsResponse", - (_message.Message,), - { - "DESCRIPTOR": _REPLACEACCESSLEVELSRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ReplaceAccessLevelsResponse) - }, -) -_sym_db.RegisterMessage(ReplaceAccessLevelsResponse) - -ListServicePerimetersRequest = _reflection.GeneratedProtocolMessageType( - "ListServicePerimetersRequest", - (_message.Message,), - { - "DESCRIPTOR": _LISTSERVICEPERIMETERSREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListServicePerimetersRequest) - }, -) -_sym_db.RegisterMessage(ListServicePerimetersRequest) - -ListServicePerimetersResponse = _reflection.GeneratedProtocolMessageType( - "ListServicePerimetersResponse", - (_message.Message,), - { - "DESCRIPTOR": _LISTSERVICEPERIMETERSRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListServicePerimetersResponse) - }, -) -_sym_db.RegisterMessage(ListServicePerimetersResponse) - -GetServicePerimeterRequest = _reflection.GeneratedProtocolMessageType( - "GetServicePerimeterRequest", - (_message.Message,), - { - "DESCRIPTOR": _GETSERVICEPERIMETERREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.GetServicePerimeterRequest) - }, +_globals = globals() +_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals) +_builder.BuildTopDescriptorsAndMessages( + DESCRIPTOR, + "google.identity.accesscontextmanager.v1.access_context_manager_pb2", + _globals, ) -_sym_db.RegisterMessage(GetServicePerimeterRequest) - -CreateServicePerimeterRequest = _reflection.GeneratedProtocolMessageType( - "CreateServicePerimeterRequest", - (_message.Message,), - { - "DESCRIPTOR": _CREATESERVICEPERIMETERREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.CreateServicePerimeterRequest) - }, -) -_sym_db.RegisterMessage(CreateServicePerimeterRequest) - -UpdateServicePerimeterRequest = _reflection.GeneratedProtocolMessageType( - "UpdateServicePerimeterRequest", - (_message.Message,), - { - "DESCRIPTOR": _UPDATESERVICEPERIMETERREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.UpdateServicePerimeterRequest) - }, -) -_sym_db.RegisterMessage(UpdateServicePerimeterRequest) - -DeleteServicePerimeterRequest = _reflection.GeneratedProtocolMessageType( - "DeleteServicePerimeterRequest", - (_message.Message,), - { - "DESCRIPTOR": _DELETESERVICEPERIMETERREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.DeleteServicePerimeterRequest) - }, -) -_sym_db.RegisterMessage(DeleteServicePerimeterRequest) - -ReplaceServicePerimetersRequest = _reflection.GeneratedProtocolMessageType( - "ReplaceServicePerimetersRequest", - (_message.Message,), - { - "DESCRIPTOR": _REPLACESERVICEPERIMETERSREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ReplaceServicePerimetersRequest) - }, -) -_sym_db.RegisterMessage(ReplaceServicePerimetersRequest) - -ReplaceServicePerimetersResponse = _reflection.GeneratedProtocolMessageType( - "ReplaceServicePerimetersResponse", - (_message.Message,), - { - "DESCRIPTOR": _REPLACESERVICEPERIMETERSRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ReplaceServicePerimetersResponse) - }, -) -_sym_db.RegisterMessage(ReplaceServicePerimetersResponse) - -CommitServicePerimetersRequest = _reflection.GeneratedProtocolMessageType( - "CommitServicePerimetersRequest", - (_message.Message,), - { - "DESCRIPTOR": _COMMITSERVICEPERIMETERSREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.CommitServicePerimetersRequest) - }, -) -_sym_db.RegisterMessage(CommitServicePerimetersRequest) - -CommitServicePerimetersResponse = _reflection.GeneratedProtocolMessageType( - "CommitServicePerimetersResponse", - (_message.Message,), - { - "DESCRIPTOR": _COMMITSERVICEPERIMETERSRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.CommitServicePerimetersResponse) - }, -) -_sym_db.RegisterMessage(CommitServicePerimetersResponse) - -ListGcpUserAccessBindingsRequest = _reflection.GeneratedProtocolMessageType( - "ListGcpUserAccessBindingsRequest", - (_message.Message,), - { - "DESCRIPTOR": _LISTGCPUSERACCESSBINDINGSREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsRequest) - }, -) -_sym_db.RegisterMessage(ListGcpUserAccessBindingsRequest) - -ListGcpUserAccessBindingsResponse = _reflection.GeneratedProtocolMessageType( - "ListGcpUserAccessBindingsResponse", - (_message.Message,), - { - "DESCRIPTOR": _LISTGCPUSERACCESSBINDINGSRESPONSE, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ListGcpUserAccessBindingsResponse) - }, -) -_sym_db.RegisterMessage(ListGcpUserAccessBindingsResponse) - -GetGcpUserAccessBindingRequest = _reflection.GeneratedProtocolMessageType( - "GetGcpUserAccessBindingRequest", - (_message.Message,), - { - "DESCRIPTOR": _GETGCPUSERACCESSBINDINGREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.GetGcpUserAccessBindingRequest) - }, -) -_sym_db.RegisterMessage(GetGcpUserAccessBindingRequest) - -CreateGcpUserAccessBindingRequest = _reflection.GeneratedProtocolMessageType( - "CreateGcpUserAccessBindingRequest", - (_message.Message,), - { - "DESCRIPTOR": _CREATEGCPUSERACCESSBINDINGREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.CreateGcpUserAccessBindingRequest) - }, -) -_sym_db.RegisterMessage(CreateGcpUserAccessBindingRequest) - -UpdateGcpUserAccessBindingRequest = _reflection.GeneratedProtocolMessageType( - "UpdateGcpUserAccessBindingRequest", - (_message.Message,), - { - "DESCRIPTOR": _UPDATEGCPUSERACCESSBINDINGREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.UpdateGcpUserAccessBindingRequest) - }, -) -_sym_db.RegisterMessage(UpdateGcpUserAccessBindingRequest) - -DeleteGcpUserAccessBindingRequest = _reflection.GeneratedProtocolMessageType( - "DeleteGcpUserAccessBindingRequest", - (_message.Message,), - { - "DESCRIPTOR": _DELETEGCPUSERACCESSBINDINGREQUEST, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.DeleteGcpUserAccessBindingRequest) - }, -) -_sym_db.RegisterMessage(DeleteGcpUserAccessBindingRequest) - -GcpUserAccessBindingOperationMetadata = _reflection.GeneratedProtocolMessageType( - "GcpUserAccessBindingOperationMetadata", - (_message.Message,), - { - "DESCRIPTOR": _GCPUSERACCESSBINDINGOPERATIONMETADATA, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.GcpUserAccessBindingOperationMetadata) - }, -) -_sym_db.RegisterMessage(GcpUserAccessBindingOperationMetadata) - -AccessContextManagerOperationMetadata = _reflection.GeneratedProtocolMessageType( - "AccessContextManagerOperationMetadata", - (_message.Message,), - { - "DESCRIPTOR": _ACCESSCONTEXTMANAGEROPERATIONMETADATA, - "__module__": "google.identity.accesscontextmanager.v1.access_context_manager_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.AccessContextManagerOperationMetadata) - }, -) -_sym_db.RegisterMessage(AccessContextManagerOperationMetadata) - -_ACCESSCONTEXTMANAGER = DESCRIPTOR.services_by_name["AccessContextManager"] if _descriptor._USE_C_DESCRIPTORS == False: - DESCRIPTOR._options = None DESCRIPTOR._serialized_options = b"\n+com.google.identity.accesscontextmanager.v1B\031AccessContextManagerProtoP\001Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\242\002\004GACM\252\002'Google.Identity.AccessContextManager.V1\312\002'Google\\Identity\\AccessContextManager\\V1\352\002*Google::Identity::AccessContextManager::V1" _LISTACCESSPOLICIESREQUEST.fields_by_name["parent"]._options = None @@ -673,92 +249,92 @@ _ACCESSCONTEXTMANAGER.methods_by_name[ "GetAccessPolicy" ]._serialized_options = ( - b"\202\323\344\223\002\035\022\033/v1/{name=accessPolicies/*}\332A\004name" + b"\332A\004name\202\323\344\223\002\035\022\033/v1/{name=accessPolicies/*}" ) _ACCESSCONTEXTMANAGER.methods_by_name["CreateAccessPolicy"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "CreateAccessPolicy" - ]._serialized_options = b'\202\323\344\223\002\027"\022/v1/accessPolicies:\001*\312A5\n\014AccessPolicy\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312A5\n\014AccessPolicy\022%AccessContextManagerOperationMetadata\202\323\344\223\002\027"\022/v1/accessPolicies:\001*' _ACCESSCONTEXTMANAGER.methods_by_name["UpdateAccessPolicy"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "UpdateAccessPolicy" - ]._serialized_options = b'\202\323\344\223\002,2"/v1/{policy.name=accessPolicies/*}:\006policy\332A\022policy,update_mask\312A5\n\014AccessPolicy\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312A5\n\014AccessPolicy\022%AccessContextManagerOperationMetadata\332A\022policy,update_mask\202\323\344\223\002,2"/v1/{policy.name=accessPolicies/*}:\006policy' _ACCESSCONTEXTMANAGER.methods_by_name["DeleteAccessPolicy"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "DeleteAccessPolicy" - ]._serialized_options = b"\202\323\344\223\002\035*\033/v1/{name=accessPolicies/*}\332A\004name\312A>\n\025google.protobuf.Empty\022%AccessContextManagerOperationMetadata" + ]._serialized_options = b"\312A>\n\025google.protobuf.Empty\022%AccessContextManagerOperationMetadata\332A\004name\202\323\344\223\002\035*\033/v1/{name=accessPolicies/*}" _ACCESSCONTEXTMANAGER.methods_by_name["ListAccessLevels"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "ListAccessLevels" - ]._serialized_options = b"\202\323\344\223\002,\022*/v1/{parent=accessPolicies/*}/accessLevels\332A\006parent" + ]._serialized_options = b"\332A\006parent\202\323\344\223\002,\022*/v1/{parent=accessPolicies/*}/accessLevels" _ACCESSCONTEXTMANAGER.methods_by_name["GetAccessLevel"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "GetAccessLevel" - ]._serialized_options = b"\202\323\344\223\002,\022*/v1/{name=accessPolicies/*/accessLevels/*}\332A\004name" + ]._serialized_options = b"\332A\004name\202\323\344\223\002,\022*/v1/{name=accessPolicies/*/accessLevels/*}" _ACCESSCONTEXTMANAGER.methods_by_name["CreateAccessLevel"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "CreateAccessLevel" - ]._serialized_options = b'\202\323\344\223\002:"*/v1/{parent=accessPolicies/*}/accessLevels:\014access_level\332A\023parent,access_level\312A4\n\013AccessLevel\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312A4\n\013AccessLevel\022%AccessContextManagerOperationMetadata\332A\023parent,access_level\202\323\344\223\002:"*/v1/{parent=accessPolicies/*}/accessLevels:\014access_level' _ACCESSCONTEXTMANAGER.methods_by_name["UpdateAccessLevel"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "UpdateAccessLevel" - ]._serialized_options = b"\202\323\344\223\002G27/v1/{access_level.name=accessPolicies/*/accessLevels/*}:\014access_level\332A\030access_level,update_mask\312A4\n\013AccessLevel\022%AccessContextManagerOperationMetadata" + ]._serialized_options = b"\312A4\n\013AccessLevel\022%AccessContextManagerOperationMetadata\332A\030access_level,update_mask\202\323\344\223\002G27/v1/{access_level.name=accessPolicies/*/accessLevels/*}:\014access_level" _ACCESSCONTEXTMANAGER.methods_by_name["DeleteAccessLevel"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "DeleteAccessLevel" - ]._serialized_options = b"\202\323\344\223\002,**/v1/{name=accessPolicies/*/accessLevels/*}\332A\004name\312A>\n\025google.protobuf.Empty\022%AccessContextManagerOperationMetadata" + ]._serialized_options = b"\312A>\n\025google.protobuf.Empty\022%AccessContextManagerOperationMetadata\332A\004name\202\323\344\223\002,**/v1/{name=accessPolicies/*/accessLevels/*}" _ACCESSCONTEXTMANAGER.methods_by_name["ReplaceAccessLevels"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "ReplaceAccessLevels" - ]._serialized_options = b'\202\323\344\223\002:"5/v1/{parent=accessPolicies/*}/accessLevels:replaceAll:\001*\312AD\n\033ReplaceAccessLevelsResponse\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312AD\n\033ReplaceAccessLevelsResponse\022%AccessContextManagerOperationMetadata\202\323\344\223\002:"5/v1/{parent=accessPolicies/*}/accessLevels:replaceAll:\001*' _ACCESSCONTEXTMANAGER.methods_by_name["ListServicePerimeters"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "ListServicePerimeters" - ]._serialized_options = b"\202\323\344\223\0021\022//v1/{parent=accessPolicies/*}/servicePerimeters\332A\006parent" + ]._serialized_options = b"\332A\006parent\202\323\344\223\0021\022//v1/{parent=accessPolicies/*}/servicePerimeters" _ACCESSCONTEXTMANAGER.methods_by_name["GetServicePerimeter"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "GetServicePerimeter" - ]._serialized_options = b"\202\323\344\223\0021\022//v1/{name=accessPolicies/*/servicePerimeters/*}\332A\004name" + ]._serialized_options = b"\332A\004name\202\323\344\223\0021\022//v1/{name=accessPolicies/*/servicePerimeters/*}" _ACCESSCONTEXTMANAGER.methods_by_name["CreateServicePerimeter"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "CreateServicePerimeter" - ]._serialized_options = b'\202\323\344\223\002D"//v1/{parent=accessPolicies/*}/servicePerimeters:\021service_perimeter\332A\030parent,service_perimeter\312A9\n\020ServicePerimeter\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312A9\n\020ServicePerimeter\022%AccessContextManagerOperationMetadata\332A\030parent,service_perimeter\202\323\344\223\002D"//v1/{parent=accessPolicies/*}/servicePerimeters:\021service_perimeter' _ACCESSCONTEXTMANAGER.methods_by_name["UpdateServicePerimeter"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "UpdateServicePerimeter" - ]._serialized_options = b"\202\323\344\223\002V2A/v1/{service_perimeter.name=accessPolicies/*/servicePerimeters/*}:\021service_perimeter\332A\035service_perimeter,update_mask\312A9\n\020ServicePerimeter\022%AccessContextManagerOperationMetadata" + ]._serialized_options = b"\312A9\n\020ServicePerimeter\022%AccessContextManagerOperationMetadata\332A\035service_perimeter,update_mask\202\323\344\223\002V2A/v1/{service_perimeter.name=accessPolicies/*/servicePerimeters/*}:\021service_perimeter" _ACCESSCONTEXTMANAGER.methods_by_name["DeleteServicePerimeter"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "DeleteServicePerimeter" - ]._serialized_options = b"\202\323\344\223\0021*//v1/{name=accessPolicies/*/servicePerimeters/*}\332A\004name\312A>\n\025google.protobuf.Empty\022%AccessContextManagerOperationMetadata" + ]._serialized_options = b"\312A>\n\025google.protobuf.Empty\022%AccessContextManagerOperationMetadata\332A\004name\202\323\344\223\0021*//v1/{name=accessPolicies/*/servicePerimeters/*}" _ACCESSCONTEXTMANAGER.methods_by_name["ReplaceServicePerimeters"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "ReplaceServicePerimeters" - ]._serialized_options = b'\202\323\344\223\002?":/v1/{parent=accessPolicies/*}/servicePerimeters:replaceAll:\001*\312AI\n ReplaceServicePerimetersResponse\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312AI\n ReplaceServicePerimetersResponse\022%AccessContextManagerOperationMetadata\202\323\344\223\002?":/v1/{parent=accessPolicies/*}/servicePerimeters:replaceAll:\001*' _ACCESSCONTEXTMANAGER.methods_by_name["CommitServicePerimeters"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "CommitServicePerimeters" - ]._serialized_options = b'\202\323\344\223\002;"6/v1/{parent=accessPolicies/*}/servicePerimeters:commit:\001*\312AH\n\037CommitServicePerimetersResponse\022%AccessContextManagerOperationMetadata' + ]._serialized_options = b'\312AH\n\037CommitServicePerimetersResponse\022%AccessContextManagerOperationMetadata\202\323\344\223\002;"6/v1/{parent=accessPolicies/*}/servicePerimeters:commit:\001*' _ACCESSCONTEXTMANAGER.methods_by_name["ListGcpUserAccessBindings"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "ListGcpUserAccessBindings" - ]._serialized_options = b"\202\323\344\223\0024\0222/v1/{parent=organizations/*}/gcpUserAccessBindings\332A\006parent" + ]._serialized_options = b"\332A\006parent\202\323\344\223\0024\0222/v1/{parent=organizations/*}/gcpUserAccessBindings" _ACCESSCONTEXTMANAGER.methods_by_name["GetGcpUserAccessBinding"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "GetGcpUserAccessBinding" - ]._serialized_options = b"\202\323\344\223\0024\0222/v1/{name=organizations/*/gcpUserAccessBindings/*}\332A\004name" + ]._serialized_options = b"\332A\004name\202\323\344\223\0024\0222/v1/{name=organizations/*/gcpUserAccessBindings/*}" _ACCESSCONTEXTMANAGER.methods_by_name["CreateGcpUserAccessBinding"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "CreateGcpUserAccessBinding" - ]._serialized_options = b'\202\323\344\223\002M"2/v1/{parent=organizations/*}/gcpUserAccessBindings:\027gcp_user_access_binding\332A\036parent,gcp_user_access_binding\312A=\n\024GcpUserAccessBinding\022%GcpUserAccessBindingOperationMetadata' + ]._serialized_options = b'\312A=\n\024GcpUserAccessBinding\022%GcpUserAccessBindingOperationMetadata\332A\036parent,gcp_user_access_binding\202\323\344\223\002M"2/v1/{parent=organizations/*}/gcpUserAccessBindings:\027gcp_user_access_binding' _ACCESSCONTEXTMANAGER.methods_by_name["UpdateGcpUserAccessBinding"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "UpdateGcpUserAccessBinding" - ]._serialized_options = b"\202\323\344\223\002e2J/v1/{gcp_user_access_binding.name=organizations/*/gcpUserAccessBindings/*}:\027gcp_user_access_binding\332A#gcp_user_access_binding,update_mask\312A=\n\024GcpUserAccessBinding\022%GcpUserAccessBindingOperationMetadata" + ]._serialized_options = b"\312A=\n\024GcpUserAccessBinding\022%GcpUserAccessBindingOperationMetadata\332A#gcp_user_access_binding,update_mask\202\323\344\223\002e2J/v1/{gcp_user_access_binding.name=organizations/*/gcpUserAccessBindings/*}:\027gcp_user_access_binding" _ACCESSCONTEXTMANAGER.methods_by_name["DeleteGcpUserAccessBinding"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "DeleteGcpUserAccessBinding" - ]._serialized_options = b"\202\323\344\223\0024*2/v1/{name=organizations/*/gcpUserAccessBindings/*}\332A\004name\312A>\n\025google.protobuf.Empty\022%GcpUserAccessBindingOperationMetadata" + ]._serialized_options = b"\312A>\n\025google.protobuf.Empty\022%GcpUserAccessBindingOperationMetadata\332A\004name\202\323\344\223\0024*2/v1/{name=organizations/*/gcpUserAccessBindings/*}" _ACCESSCONTEXTMANAGER.methods_by_name["SetIamPolicy"]._options = None _ACCESSCONTEXTMANAGER.methods_by_name[ "SetIamPolicy" @@ -775,70 +351,70 @@ _ACCESSCONTEXTMANAGER.methods_by_name[ "TestIamPermissions" ]._serialized_options = b'\202\323\344\223\002\314\001"2/v1/{resource=accessPolicies/*}:testIamPermissions:\001*ZF"A/v1/{resource=accessPolicies/*/accessLevels/*}:testIamPermissions:\001*ZK"F/v1/{resource=accessPolicies/*/servicePerimeters/*}:testIamPermissions:\001*' - _LEVELFORMAT._serialized_start = 5065 - _LEVELFORMAT._serialized_end = 5133 - _LISTACCESSPOLICIESREQUEST._serialized_start = 617 - _LISTACCESSPOLICIESREQUEST._serialized_end = 757 - _LISTACCESSPOLICIESRESPONSE._serialized_start = 760 - _LISTACCESSPOLICIESRESPONSE._serialized_end = 893 - _GETACCESSPOLICYREQUEST._serialized_start = 895 - _GETACCESSPOLICYREQUEST._serialized_end = 991 - _UPDATEACCESSPOLICYREQUEST._serialized_start = 994 - _UPDATEACCESSPOLICYREQUEST._serialized_end = 1151 - _DELETEACCESSPOLICYREQUEST._serialized_start = 1153 - _DELETEACCESSPOLICYREQUEST._serialized_end = 1252 - _LISTACCESSLEVELSREQUEST._serialized_start = 1255 - _LISTACCESSLEVELSREQUEST._serialized_end = 1475 - _LISTACCESSLEVELSRESPONSE._serialized_start = 1478 - _LISTACCESSLEVELSRESPONSE._serialized_end = 1606 - _GETACCESSLEVELREQUEST._serialized_start = 1609 - _GETACCESSLEVELREQUEST._serialized_end = 1786 - _CREATEACCESSLEVELREQUEST._serialized_start = 1789 - _CREATEACCESSLEVELREQUEST._serialized_end = 1969 - _UPDATEACCESSLEVELREQUEST._serialized_start = 1972 - _UPDATEACCESSLEVELREQUEST._serialized_end = 2133 - _DELETEACCESSLEVELREQUEST._serialized_start = 2135 - _DELETEACCESSLEVELREQUEST._serialized_end = 2232 - _REPLACEACCESSLEVELSREQUEST._serialized_start = 2235 - _REPLACEACCESSLEVELSREQUEST._serialized_end = 2432 - _REPLACEACCESSLEVELSRESPONSE._serialized_start = 2434 - _REPLACEACCESSLEVELSRESPONSE._serialized_end = 2540 - _LISTSERVICEPERIMETERSREQUEST._serialized_start = 2543 - _LISTSERVICEPERIMETERSREQUEST._serialized_end = 2690 - _LISTSERVICEPERIMETERSRESPONSE._serialized_start = 2693 - _LISTSERVICEPERIMETERSRESPONSE._serialized_end = 2836 - _GETSERVICEPERIMETERREQUEST._serialized_start = 2838 - _GETSERVICEPERIMETERREQUEST._serialized_end = 2942 - _CREATESERVICEPERIMETERREQUEST._serialized_start = 2945 - _CREATESERVICEPERIMETERREQUEST._serialized_end = 3145 - _UPDATESERVICEPERIMETERREQUEST._serialized_start = 3148 - _UPDATESERVICEPERIMETERREQUEST._serialized_end = 3324 - _DELETESERVICEPERIMETERREQUEST._serialized_start = 3326 - _DELETESERVICEPERIMETERREQUEST._serialized_end = 3433 - _REPLACESERVICEPERIMETERSREQUEST._serialized_start = 3436 - _REPLACESERVICEPERIMETERSREQUEST._serialized_end = 3653 - _REPLACESERVICEPERIMETERSRESPONSE._serialized_start = 3655 - _REPLACESERVICEPERIMETERSRESPONSE._serialized_end = 3776 - _COMMITSERVICEPERIMETERSREQUEST._serialized_start = 3778 - _COMMITSERVICEPERIMETERSREQUEST._serialized_end = 3902 - _COMMITSERVICEPERIMETERSRESPONSE._serialized_start = 3904 - _COMMITSERVICEPERIMETERSRESPONSE._serialized_end = 4024 - _LISTGCPUSERACCESSBINDINGSREQUEST._serialized_start = 4027 - _LISTGCPUSERACCESSBINDINGSREQUEST._serialized_end = 4184 - _LISTGCPUSERACCESSBINDINGSRESPONSE._serialized_start = 4187 - _LISTGCPUSERACCESSBINDINGSRESPONSE._serialized_end = 4344 - _GETGCPUSERACCESSBINDINGREQUEST._serialized_start = 4346 - _GETGCPUSERACCESSBINDINGREQUEST._serialized_end = 4458 - _CREATEGCPUSERACCESSBINDINGREQUEST._serialized_start = 4461 - _CREATEGCPUSERACCESSBINDINGREQUEST._serialized_end = 4671 - _UPDATEGCPUSERACCESSBINDINGREQUEST._serialized_start = 4674 - _UPDATEGCPUSERACCESSBINDINGREQUEST._serialized_end = 4864 - _DELETEGCPUSERACCESSBINDINGREQUEST._serialized_start = 4866 - _DELETEGCPUSERACCESSBINDINGREQUEST._serialized_end = 4981 - _GCPUSERACCESSBINDINGOPERATIONMETADATA._serialized_start = 4983 - _GCPUSERACCESSBINDINGOPERATIONMETADATA._serialized_end = 5022 - _ACCESSCONTEXTMANAGEROPERATIONMETADATA._serialized_start = 5024 - _ACCESSCONTEXTMANAGEROPERATIONMETADATA._serialized_end = 5063 - _ACCESSCONTEXTMANAGER._serialized_start = 5136 - _ACCESSCONTEXTMANAGER._serialized_end = 11649 + _globals["_LEVELFORMAT"]._serialized_start = 5065 + _globals["_LEVELFORMAT"]._serialized_end = 5133 + _globals["_LISTACCESSPOLICIESREQUEST"]._serialized_start = 617 + _globals["_LISTACCESSPOLICIESREQUEST"]._serialized_end = 757 + _globals["_LISTACCESSPOLICIESRESPONSE"]._serialized_start = 760 + _globals["_LISTACCESSPOLICIESRESPONSE"]._serialized_end = 893 + _globals["_GETACCESSPOLICYREQUEST"]._serialized_start = 895 + _globals["_GETACCESSPOLICYREQUEST"]._serialized_end = 991 + _globals["_UPDATEACCESSPOLICYREQUEST"]._serialized_start = 994 + _globals["_UPDATEACCESSPOLICYREQUEST"]._serialized_end = 1151 + _globals["_DELETEACCESSPOLICYREQUEST"]._serialized_start = 1153 + _globals["_DELETEACCESSPOLICYREQUEST"]._serialized_end = 1252 + _globals["_LISTACCESSLEVELSREQUEST"]._serialized_start = 1255 + _globals["_LISTACCESSLEVELSREQUEST"]._serialized_end = 1475 + _globals["_LISTACCESSLEVELSRESPONSE"]._serialized_start = 1478 + _globals["_LISTACCESSLEVELSRESPONSE"]._serialized_end = 1606 + _globals["_GETACCESSLEVELREQUEST"]._serialized_start = 1609 + _globals["_GETACCESSLEVELREQUEST"]._serialized_end = 1786 + _globals["_CREATEACCESSLEVELREQUEST"]._serialized_start = 1789 + _globals["_CREATEACCESSLEVELREQUEST"]._serialized_end = 1969 + _globals["_UPDATEACCESSLEVELREQUEST"]._serialized_start = 1972 + _globals["_UPDATEACCESSLEVELREQUEST"]._serialized_end = 2133 + _globals["_DELETEACCESSLEVELREQUEST"]._serialized_start = 2135 + _globals["_DELETEACCESSLEVELREQUEST"]._serialized_end = 2232 + _globals["_REPLACEACCESSLEVELSREQUEST"]._serialized_start = 2235 + _globals["_REPLACEACCESSLEVELSREQUEST"]._serialized_end = 2432 + _globals["_REPLACEACCESSLEVELSRESPONSE"]._serialized_start = 2434 + _globals["_REPLACEACCESSLEVELSRESPONSE"]._serialized_end = 2540 + _globals["_LISTSERVICEPERIMETERSREQUEST"]._serialized_start = 2543 + _globals["_LISTSERVICEPERIMETERSREQUEST"]._serialized_end = 2690 + _globals["_LISTSERVICEPERIMETERSRESPONSE"]._serialized_start = 2693 + _globals["_LISTSERVICEPERIMETERSRESPONSE"]._serialized_end = 2836 + _globals["_GETSERVICEPERIMETERREQUEST"]._serialized_start = 2838 + _globals["_GETSERVICEPERIMETERREQUEST"]._serialized_end = 2942 + _globals["_CREATESERVICEPERIMETERREQUEST"]._serialized_start = 2945 + _globals["_CREATESERVICEPERIMETERREQUEST"]._serialized_end = 3145 + _globals["_UPDATESERVICEPERIMETERREQUEST"]._serialized_start = 3148 + _globals["_UPDATESERVICEPERIMETERREQUEST"]._serialized_end = 3324 + _globals["_DELETESERVICEPERIMETERREQUEST"]._serialized_start = 3326 + _globals["_DELETESERVICEPERIMETERREQUEST"]._serialized_end = 3433 + _globals["_REPLACESERVICEPERIMETERSREQUEST"]._serialized_start = 3436 + _globals["_REPLACESERVICEPERIMETERSREQUEST"]._serialized_end = 3653 + _globals["_REPLACESERVICEPERIMETERSRESPONSE"]._serialized_start = 3655 + _globals["_REPLACESERVICEPERIMETERSRESPONSE"]._serialized_end = 3776 + _globals["_COMMITSERVICEPERIMETERSREQUEST"]._serialized_start = 3778 + _globals["_COMMITSERVICEPERIMETERSREQUEST"]._serialized_end = 3902 + _globals["_COMMITSERVICEPERIMETERSRESPONSE"]._serialized_start = 3904 + _globals["_COMMITSERVICEPERIMETERSRESPONSE"]._serialized_end = 4024 + _globals["_LISTGCPUSERACCESSBINDINGSREQUEST"]._serialized_start = 4027 + _globals["_LISTGCPUSERACCESSBINDINGSREQUEST"]._serialized_end = 4184 + _globals["_LISTGCPUSERACCESSBINDINGSRESPONSE"]._serialized_start = 4187 + _globals["_LISTGCPUSERACCESSBINDINGSRESPONSE"]._serialized_end = 4344 + _globals["_GETGCPUSERACCESSBINDINGREQUEST"]._serialized_start = 4346 + _globals["_GETGCPUSERACCESSBINDINGREQUEST"]._serialized_end = 4458 + _globals["_CREATEGCPUSERACCESSBINDINGREQUEST"]._serialized_start = 4461 + _globals["_CREATEGCPUSERACCESSBINDINGREQUEST"]._serialized_end = 4671 + _globals["_UPDATEGCPUSERACCESSBINDINGREQUEST"]._serialized_start = 4674 + _globals["_UPDATEGCPUSERACCESSBINDINGREQUEST"]._serialized_end = 4864 + _globals["_DELETEGCPUSERACCESSBINDINGREQUEST"]._serialized_start = 4866 + _globals["_DELETEGCPUSERACCESSBINDINGREQUEST"]._serialized_end = 4981 + _globals["_GCPUSERACCESSBINDINGOPERATIONMETADATA"]._serialized_start = 4983 + _globals["_GCPUSERACCESSBINDINGOPERATIONMETADATA"]._serialized_end = 5022 + _globals["_ACCESSCONTEXTMANAGEROPERATIONMETADATA"]._serialized_start = 5024 + _globals["_ACCESSCONTEXTMANAGEROPERATIONMETADATA"]._serialized_end = 5063 + _globals["_ACCESSCONTEXTMANAGER"]._serialized_start = 5136 + _globals["_ACCESSCONTEXTMANAGER"]._serialized_end = 11649 # @@protoc_insertion_point(module_scope) diff --git a/google/identity/accesscontextmanager/v1/access_level_pb2.py b/google/identity/accesscontextmanager/v1/access_level_pb2.py index 52032ad..b14d474 100644 --- a/google/identity/accesscontextmanager/v1/access_level_pb2.py +++ b/google/identity/accesscontextmanager/v1/access_level_pb2.py @@ -19,9 +19,8 @@ """Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import descriptor_pool as _descriptor_pool -from google.protobuf import message as _message -from google.protobuf import reflection as _reflection from google.protobuf import symbol_database as _symbol_database +from google.protobuf.internal import builder as _builder # @@protoc_insertion_point(imports) @@ -40,100 +39,28 @@ b'\n:google/identity/accesscontextmanager/v1/access_level.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x19google/api/resource.proto\x1a@google/identity/accesscontextmanager/type/device_resources.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x16google/type/expr.proto"\xaa\x03\n\x0b\x41\x63\x63\x65ssLevel\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\r\n\x05title\x18\x02 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x03 \x01(\t\x12\x44\n\x05\x62\x61sic\x18\x04 \x01(\x0b\x32\x33.google.identity.accesscontextmanager.v1.BasicLevelH\x00\x12\x46\n\x06\x63ustom\x18\x05 \x01(\x0b\x32\x34.google.identity.accesscontextmanager.v1.CustomLevelH\x00\x12/\n\x0b\x63reate_time\x18\x06 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x07 \x01(\x0b\x32\x1a.google.protobuf.Timestamp:p\xea\x41m\n/accesscontextmanager.googleapis.com/AccessLevel\x12:accessPolicies/{access_policy}/accessLevels/{access_level}B\x07\n\x05level"\xef\x01\n\nBasicLevel\x12\x46\n\nconditions\x18\x01 \x03(\x0b\x32\x32.google.identity.accesscontextmanager.v1.Condition\x12j\n\x12\x63ombining_function\x18\x02 \x01(\x0e\x32N.google.identity.accesscontextmanager.v1.BasicLevel.ConditionCombiningFunction"-\n\x1a\x43onditionCombiningFunction\x12\x07\n\x03\x41ND\x10\x00\x12\x06\n\x02OR\x10\x01"\xc3\x01\n\tCondition\x12\x16\n\x0eip_subnetworks\x18\x01 \x03(\t\x12L\n\rdevice_policy\x18\x02 \x01(\x0b\x32\x35.google.identity.accesscontextmanager.v1.DevicePolicy\x12\x1e\n\x16required_access_levels\x18\x03 \x03(\t\x12\x0e\n\x06negate\x18\x05 \x01(\x08\x12\x0f\n\x07members\x18\x06 \x03(\t\x12\x0f\n\x07regions\x18\x07 \x03(\t".\n\x0b\x43ustomLevel\x12\x1f\n\x04\x65xpr\x18\x01 \x01(\x0b\x32\x11.google.type.Expr"\x89\x03\n\x0c\x44\x65vicePolicy\x12\x1a\n\x12require_screenlock\x18\x01 \x01(\x08\x12\x66\n\x1b\x61llowed_encryption_statuses\x18\x02 \x03(\x0e\x32\x41.google.identity.accesscontextmanager.type.DeviceEncryptionStatus\x12M\n\x0eos_constraints\x18\x03 \x03(\x0b\x32\x35.google.identity.accesscontextmanager.v1.OsConstraint\x12j\n allowed_device_management_levels\x18\x06 \x03(\x0e\x32@.google.identity.accesscontextmanager.type.DeviceManagementLevel\x12\x1e\n\x16require_admin_approval\x18\x07 \x01(\x08\x12\x1a\n\x12require_corp_owned\x18\x08 \x01(\x08"\x8f\x01\n\x0cOsConstraint\x12\x42\n\x07os_type\x18\x01 \x01(\x0e\x32\x31.google.identity.accesscontextmanager.type.OsType\x12\x17\n\x0fminimum_version\x18\x02 \x01(\t\x12"\n\x1arequire_verified_chrome_os\x18\x03 \x01(\x08\x42\xa7\x02\n+com.google.identity.accesscontextmanager.v1B\x10\x41\x63\x63\x65ssLevelProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3' ) - -_ACCESSLEVEL = DESCRIPTOR.message_types_by_name["AccessLevel"] -_BASICLEVEL = DESCRIPTOR.message_types_by_name["BasicLevel"] -_CONDITION = DESCRIPTOR.message_types_by_name["Condition"] -_CUSTOMLEVEL = DESCRIPTOR.message_types_by_name["CustomLevel"] -_DEVICEPOLICY = DESCRIPTOR.message_types_by_name["DevicePolicy"] -_OSCONSTRAINT = DESCRIPTOR.message_types_by_name["OsConstraint"] -_BASICLEVEL_CONDITIONCOMBININGFUNCTION = _BASICLEVEL.enum_types_by_name[ - "ConditionCombiningFunction" -] -AccessLevel = _reflection.GeneratedProtocolMessageType( - "AccessLevel", - (_message.Message,), - { - "DESCRIPTOR": _ACCESSLEVEL, - "__module__": "google.identity.accesscontextmanager.v1.access_level_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.AccessLevel) - }, -) -_sym_db.RegisterMessage(AccessLevel) - -BasicLevel = _reflection.GeneratedProtocolMessageType( - "BasicLevel", - (_message.Message,), - { - "DESCRIPTOR": _BASICLEVEL, - "__module__": "google.identity.accesscontextmanager.v1.access_level_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.BasicLevel) - }, -) -_sym_db.RegisterMessage(BasicLevel) - -Condition = _reflection.GeneratedProtocolMessageType( - "Condition", - (_message.Message,), - { - "DESCRIPTOR": _CONDITION, - "__module__": "google.identity.accesscontextmanager.v1.access_level_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.Condition) - }, -) -_sym_db.RegisterMessage(Condition) - -CustomLevel = _reflection.GeneratedProtocolMessageType( - "CustomLevel", - (_message.Message,), - { - "DESCRIPTOR": _CUSTOMLEVEL, - "__module__": "google.identity.accesscontextmanager.v1.access_level_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.CustomLevel) - }, +_globals = globals() +_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals) +_builder.BuildTopDescriptorsAndMessages( + DESCRIPTOR, "google.identity.accesscontextmanager.v1.access_level_pb2", _globals ) -_sym_db.RegisterMessage(CustomLevel) - -DevicePolicy = _reflection.GeneratedProtocolMessageType( - "DevicePolicy", - (_message.Message,), - { - "DESCRIPTOR": _DEVICEPOLICY, - "__module__": "google.identity.accesscontextmanager.v1.access_level_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.DevicePolicy) - }, -) -_sym_db.RegisterMessage(DevicePolicy) - -OsConstraint = _reflection.GeneratedProtocolMessageType( - "OsConstraint", - (_message.Message,), - { - "DESCRIPTOR": _OSCONSTRAINT, - "__module__": "google.identity.accesscontextmanager.v1.access_level_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.OsConstraint) - }, -) -_sym_db.RegisterMessage(OsConstraint) - if _descriptor._USE_C_DESCRIPTORS == False: - DESCRIPTOR._options = None DESCRIPTOR._serialized_options = b"\n+com.google.identity.accesscontextmanager.v1B\020AccessLevelProtoP\001Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\242\002\004GACM\252\002'Google.Identity.AccessContextManager.V1\312\002'Google\\Identity\\AccessContextManager\\V1\352\002*Google::Identity::AccessContextManager::V1" _ACCESSLEVEL._options = None _ACCESSLEVEL._serialized_options = b"\352Am\n/accesscontextmanager.googleapis.com/AccessLevel\022:accessPolicies/{access_policy}/accessLevels/{access_level}" - _ACCESSLEVEL._serialized_start = 254 - _ACCESSLEVEL._serialized_end = 680 - _BASICLEVEL._serialized_start = 683 - _BASICLEVEL._serialized_end = 922 - _BASICLEVEL_CONDITIONCOMBININGFUNCTION._serialized_start = 877 - _BASICLEVEL_CONDITIONCOMBININGFUNCTION._serialized_end = 922 - _CONDITION._serialized_start = 925 - _CONDITION._serialized_end = 1120 - _CUSTOMLEVEL._serialized_start = 1122 - _CUSTOMLEVEL._serialized_end = 1168 - _DEVICEPOLICY._serialized_start = 1171 - _DEVICEPOLICY._serialized_end = 1564 - _OSCONSTRAINT._serialized_start = 1567 - _OSCONSTRAINT._serialized_end = 1710 + _globals["_ACCESSLEVEL"]._serialized_start = 254 + _globals["_ACCESSLEVEL"]._serialized_end = 680 + _globals["_BASICLEVEL"]._serialized_start = 683 + _globals["_BASICLEVEL"]._serialized_end = 922 + _globals["_BASICLEVEL_CONDITIONCOMBININGFUNCTION"]._serialized_start = 877 + _globals["_BASICLEVEL_CONDITIONCOMBININGFUNCTION"]._serialized_end = 922 + _globals["_CONDITION"]._serialized_start = 925 + _globals["_CONDITION"]._serialized_end = 1120 + _globals["_CUSTOMLEVEL"]._serialized_start = 1122 + _globals["_CUSTOMLEVEL"]._serialized_end = 1168 + _globals["_DEVICEPOLICY"]._serialized_start = 1171 + _globals["_DEVICEPOLICY"]._serialized_end = 1564 + _globals["_OSCONSTRAINT"]._serialized_start = 1567 + _globals["_OSCONSTRAINT"]._serialized_end = 1710 # @@protoc_insertion_point(module_scope) diff --git a/google/identity/accesscontextmanager/v1/access_policy_pb2.py b/google/identity/accesscontextmanager/v1/access_policy_pb2.py index 611429a..c264970 100644 --- a/google/identity/accesscontextmanager/v1/access_policy_pb2.py +++ b/google/identity/accesscontextmanager/v1/access_policy_pb2.py @@ -19,9 +19,8 @@ """Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import descriptor_pool as _descriptor_pool -from google.protobuf import message as _message -from google.protobuf import reflection as _reflection from google.protobuf import symbol_database as _symbol_database +from google.protobuf.internal import builder as _builder # @@protoc_insertion_point(imports) @@ -36,25 +35,16 @@ b"\n;google/identity/accesscontextmanager/v1/access_policy.proto\x12'google.identity.accesscontextmanager.v1\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\x92\x02\n\x0c\x41\x63\x63\x65ssPolicy\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x0e\n\x06parent\x18\x02 \x01(\t\x12\r\n\x05title\x18\x03 \x01(\t\x12\x0e\n\x06scopes\x18\x07 \x03(\t\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12\x0c\n\x04\x65tag\x18\x06 \x01(\t:U\xea\x41R\n0accesscontextmanager.googleapis.com/AccessPolicy\x12\x1e\x61\x63\x63\x65ssPolicies/{access_policy}B\xa2\x02\n+com.google.identity.accesscontextmanager.v1B\x0bPolicyProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02'Google.Identity.AccessContextManager.V1\xca\x02'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3" ) - -_ACCESSPOLICY = DESCRIPTOR.message_types_by_name["AccessPolicy"] -AccessPolicy = _reflection.GeneratedProtocolMessageType( - "AccessPolicy", - (_message.Message,), - { - "DESCRIPTOR": _ACCESSPOLICY, - "__module__": "google.identity.accesscontextmanager.v1.access_policy_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.AccessPolicy) - }, +_globals = globals() +_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals) +_builder.BuildTopDescriptorsAndMessages( + DESCRIPTOR, "google.identity.accesscontextmanager.v1.access_policy_pb2", _globals ) -_sym_db.RegisterMessage(AccessPolicy) - if _descriptor._USE_C_DESCRIPTORS == False: - DESCRIPTOR._options = None DESCRIPTOR._serialized_options = b"\n+com.google.identity.accesscontextmanager.v1B\013PolicyProtoP\001Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\242\002\004GACM\252\002'Google.Identity.AccessContextManager.V1\312\002'Google\\Identity\\AccessContextManager\\V1\352\002*Google::Identity::AccessContextManager::V1" _ACCESSPOLICY._options = None _ACCESSPOLICY._serialized_options = b"\352AR\n0accesscontextmanager.googleapis.com/AccessPolicy\022\036accessPolicies/{access_policy}" - _ACCESSPOLICY._serialized_start = 165 - _ACCESSPOLICY._serialized_end = 439 + _globals["_ACCESSPOLICY"]._serialized_start = 165 + _globals["_ACCESSPOLICY"]._serialized_end = 439 # @@protoc_insertion_point(module_scope) diff --git a/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb2.py b/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb2.py index 2b325bb..71d8afe 100644 --- a/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb2.py +++ b/google/identity/accesscontextmanager/v1/gcp_user_access_binding_pb2.py @@ -19,9 +19,8 @@ """Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import descriptor_pool as _descriptor_pool -from google.protobuf import message as _message -from google.protobuf import reflection as _reflection from google.protobuf import symbol_database as _symbol_database +from google.protobuf.internal import builder as _builder # @@protoc_insertion_point(imports) @@ -36,21 +35,14 @@ b"\nEgoogle/identity/accesscontextmanager/v1/gcp_user_access_binding.proto\x12'google.identity.accesscontextmanager.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\"\xa3\x02\n\x14GcpUserAccessBinding\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x05\x12\x19\n\tgroup_key\x18\x02 \x01(\tB\x06\xe0\x41\x02\xe0\x41\x05\x12N\n\raccess_levels\x18\x03 \x03(\tB7\xe0\x41\x02\xfa\x41\x31\n/accesscontextmanager.googleapis.com/AccessLevel:\x8c\x01\xea\x41\x88\x01\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding\x12Lorganizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}B\xb0\x02\n+com.google.identity.accesscontextmanager.v1B\x19GcpUserAccessBindingProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02'Google.Identity.AccessContextManager.V1\xca\x02'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3" ) - -_GCPUSERACCESSBINDING = DESCRIPTOR.message_types_by_name["GcpUserAccessBinding"] -GcpUserAccessBinding = _reflection.GeneratedProtocolMessageType( - "GcpUserAccessBinding", - (_message.Message,), - { - "DESCRIPTOR": _GCPUSERACCESSBINDING, - "__module__": "google.identity.accesscontextmanager.v1.gcp_user_access_binding_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.GcpUserAccessBinding) - }, +_globals = globals() +_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals) +_builder.BuildTopDescriptorsAndMessages( + DESCRIPTOR, + "google.identity.accesscontextmanager.v1.gcp_user_access_binding_pb2", + _globals, ) -_sym_db.RegisterMessage(GcpUserAccessBinding) - if _descriptor._USE_C_DESCRIPTORS == False: - DESCRIPTOR._options = None DESCRIPTOR._serialized_options = b"\n+com.google.identity.accesscontextmanager.v1B\031GcpUserAccessBindingProtoP\001Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\242\002\004GACM\252\002'Google.Identity.AccessContextManager.V1\312\002'Google\\Identity\\AccessContextManager\\V1\352\002*Google::Identity::AccessContextManager::V1" _GCPUSERACCESSBINDING.fields_by_name["name"]._options = None @@ -67,6 +59,6 @@ ) _GCPUSERACCESSBINDING._options = None _GCPUSERACCESSBINDING._serialized_options = b"\352A\210\001\n8accesscontextmanager.googleapis.com/GcpUserAccessBinding\022Lorganizations/{organization}/gcpUserAccessBindings/{gcp_user_access_binding}" - _GCPUSERACCESSBINDING._serialized_start = 175 - _GCPUSERACCESSBINDING._serialized_end = 466 + _globals["_GCPUSERACCESSBINDING"]._serialized_start = 175 + _globals["_GCPUSERACCESSBINDING"]._serialized_end = 466 # @@protoc_insertion_point(module_scope) diff --git a/google/identity/accesscontextmanager/v1/service_perimeter_pb2.py b/google/identity/accesscontextmanager/v1/service_perimeter_pb2.py index e89d85d..c4c1c2c 100644 --- a/google/identity/accesscontextmanager/v1/service_perimeter_pb2.py +++ b/google/identity/accesscontextmanager/v1/service_perimeter_pb2.py @@ -19,9 +19,8 @@ """Generated protocol buffer code.""" from google.protobuf import descriptor as _descriptor from google.protobuf import descriptor_pool as _descriptor_pool -from google.protobuf import message as _message -from google.protobuf import reflection as _reflection from google.protobuf import symbol_database as _symbol_database +from google.protobuf.internal import builder as _builder # @@protoc_insertion_point(imports) @@ -36,197 +35,44 @@ b'\n?google/identity/accesscontextmanager/v1/service_perimeter.proto\x12\'google.identity.accesscontextmanager.v1\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto"\x93\x05\n\x10ServicePerimeter\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\r\n\x05title\x18\x02 \x01(\t\x12\x13\n\x0b\x64\x65scription\x18\x03 \x01(\t\x12/\n\x0b\x63reate_time\x18\x04 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12/\n\x0bupdate_time\x18\x05 \x01(\x0b\x32\x1a.google.protobuf.Timestamp\x12_\n\x0eperimeter_type\x18\x06 \x01(\x0e\x32G.google.identity.accesscontextmanager.v1.ServicePerimeter.PerimeterType\x12O\n\x06status\x18\x07 \x01(\x0b\x32?.google.identity.accesscontextmanager.v1.ServicePerimeterConfig\x12M\n\x04spec\x18\x08 \x01(\x0b\x32?.google.identity.accesscontextmanager.v1.ServicePerimeterConfig\x12!\n\x19use_explicit_dry_run_spec\x18\t \x01(\x08"F\n\rPerimeterType\x12\x1a\n\x16PERIMETER_TYPE_REGULAR\x10\x00\x12\x19\n\x15PERIMETER_TYPE_BRIDGE\x10\x01:\x7f\xea\x41|\n4accesscontextmanager.googleapis.com/ServicePerimeter\x12\x44\x61\x63\x63\x65ssPolicies/{access_policy}/servicePerimeters/{service_perimeter}"\xb5\x0f\n\x16ServicePerimeterConfig\x12\x11\n\tresources\x18\x01 \x03(\t\x12\x15\n\raccess_levels\x18\x02 \x03(\t\x12\x1b\n\x13restricted_services\x18\x04 \x03(\t\x12v\n\x17vpc_accessible_services\x18\n \x01(\x0b\x32U.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices\x12g\n\x10ingress_policies\x18\x08 \x03(\x0b\x32M.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy\x12\x65\n\x0f\x65gress_policies\x18\t \x03(\x0b\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy\x1aM\n\x15VpcAccessibleServices\x12\x1a\n\x12\x65nable_restriction\x18\x01 \x01(\x08\x12\x18\n\x10\x61llowed_services\x18\x02 \x03(\t\x1a@\n\x0eMethodSelector\x12\x10\n\x06method\x18\x01 \x01(\tH\x00\x12\x14\n\npermission\x18\x02 \x01(\tH\x00\x42\x06\n\x04kind\x1a\x8e\x01\n\x0c\x41piOperation\x12\x14\n\x0cservice_name\x18\x01 \x01(\t\x12h\n\x10method_selectors\x18\x02 \x03(\x0b\x32N.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector\x1a\x45\n\rIngressSource\x12\x16\n\x0c\x61\x63\x63\x65ss_level\x18\x01 \x01(\tH\x00\x12\x12\n\x08resource\x18\x02 \x01(\tH\x00\x42\x08\n\x06source\x1a\xe6\x01\n\x0bIngressFrom\x12^\n\x07sources\x18\x01 \x03(\x0b\x32M.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource\x12\x12\n\nidentities\x18\x02 \x03(\t\x12\x63\n\ridentity_type\x18\x03 \x01(\x0e\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType\x1a\x80\x01\n\tIngressTo\x12`\n\noperations\x18\x01 \x03(\x0b\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\x12\x11\n\tresources\x18\x02 \x03(\t\x1a\xd1\x01\n\rIngressPolicy\x12\x61\n\x0cingress_from\x18\x01 \x01(\x0b\x32K.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom\x12]\n\ningress_to\x18\x02 \x01(\x0b\x32I.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo\x1a\x85\x01\n\nEgressFrom\x12\x12\n\nidentities\x18\x01 \x03(\t\x12\x63\n\ridentity_type\x18\x02 \x01(\x0e\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IdentityType\x1a\x9b\x01\n\x08\x45gressTo\x12\x11\n\tresources\x18\x01 \x03(\t\x12`\n\noperations\x18\x02 \x03(\x0b\x32L.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation\x12\x1a\n\x12\x65xternal_resources\x18\x03 \x03(\t\x1a\xcc\x01\n\x0c\x45gressPolicy\x12_\n\x0b\x65gress_from\x18\x01 \x01(\x0b\x32J.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom\x12[\n\tegress_to\x18\x02 \x01(\x0b\x32H.google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo"n\n\x0cIdentityType\x12\x1d\n\x19IDENTITY_TYPE_UNSPECIFIED\x10\x00\x12\x10\n\x0c\x41NY_IDENTITY\x10\x01\x12\x14\n\x10\x41NY_USER_ACCOUNT\x10\x02\x12\x17\n\x13\x41NY_SERVICE_ACCOUNT\x10\x03\x42\xac\x02\n+com.google.identity.accesscontextmanager.v1B\x15ServicePerimeterProtoP\x01Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\xa2\x02\x04GACM\xaa\x02\'Google.Identity.AccessContextManager.V1\xca\x02\'Google\\Identity\\AccessContextManager\\V1\xea\x02*Google::Identity::AccessContextManager::V1b\x06proto3' ) - -_SERVICEPERIMETER = DESCRIPTOR.message_types_by_name["ServicePerimeter"] -_SERVICEPERIMETERCONFIG = DESCRIPTOR.message_types_by_name["ServicePerimeterConfig"] -_SERVICEPERIMETERCONFIG_VPCACCESSIBLESERVICES = ( - _SERVICEPERIMETERCONFIG.nested_types_by_name["VpcAccessibleServices"] -) -_SERVICEPERIMETERCONFIG_METHODSELECTOR = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "MethodSelector" -] -_SERVICEPERIMETERCONFIG_APIOPERATION = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "ApiOperation" -] -_SERVICEPERIMETERCONFIG_INGRESSSOURCE = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "IngressSource" -] -_SERVICEPERIMETERCONFIG_INGRESSFROM = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "IngressFrom" -] -_SERVICEPERIMETERCONFIG_INGRESSTO = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "IngressTo" -] -_SERVICEPERIMETERCONFIG_INGRESSPOLICY = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "IngressPolicy" -] -_SERVICEPERIMETERCONFIG_EGRESSFROM = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "EgressFrom" -] -_SERVICEPERIMETERCONFIG_EGRESSTO = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "EgressTo" -] -_SERVICEPERIMETERCONFIG_EGRESSPOLICY = _SERVICEPERIMETERCONFIG.nested_types_by_name[ - "EgressPolicy" -] -_SERVICEPERIMETER_PERIMETERTYPE = _SERVICEPERIMETER.enum_types_by_name["PerimeterType"] -_SERVICEPERIMETERCONFIG_IDENTITYTYPE = _SERVICEPERIMETERCONFIG.enum_types_by_name[ - "IdentityType" -] -ServicePerimeter = _reflection.GeneratedProtocolMessageType( - "ServicePerimeter", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETER, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeter) - }, -) -_sym_db.RegisterMessage(ServicePerimeter) - -ServicePerimeterConfig = _reflection.GeneratedProtocolMessageType( - "ServicePerimeterConfig", - (_message.Message,), - { - "VpcAccessibleServices": _reflection.GeneratedProtocolMessageType( - "VpcAccessibleServices", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_VPCACCESSIBLESERVICES, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.VpcAccessibleServices) - }, - ), - "MethodSelector": _reflection.GeneratedProtocolMessageType( - "MethodSelector", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_METHODSELECTOR, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.MethodSelector) - }, - ), - "ApiOperation": _reflection.GeneratedProtocolMessageType( - "ApiOperation", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_APIOPERATION, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.ApiOperation) - }, - ), - "IngressSource": _reflection.GeneratedProtocolMessageType( - "IngressSource", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_INGRESSSOURCE, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressSource) - }, - ), - "IngressFrom": _reflection.GeneratedProtocolMessageType( - "IngressFrom", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_INGRESSFROM, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressFrom) - }, - ), - "IngressTo": _reflection.GeneratedProtocolMessageType( - "IngressTo", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_INGRESSTO, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressTo) - }, - ), - "IngressPolicy": _reflection.GeneratedProtocolMessageType( - "IngressPolicy", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_INGRESSPOLICY, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.IngressPolicy) - }, - ), - "EgressFrom": _reflection.GeneratedProtocolMessageType( - "EgressFrom", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_EGRESSFROM, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressFrom) - }, - ), - "EgressTo": _reflection.GeneratedProtocolMessageType( - "EgressTo", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_EGRESSTO, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressTo) - }, - ), - "EgressPolicy": _reflection.GeneratedProtocolMessageType( - "EgressPolicy", - (_message.Message,), - { - "DESCRIPTOR": _SERVICEPERIMETERCONFIG_EGRESSPOLICY, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig.EgressPolicy) - }, - ), - "DESCRIPTOR": _SERVICEPERIMETERCONFIG, - "__module__": "google.identity.accesscontextmanager.v1.service_perimeter_pb2" - # @@protoc_insertion_point(class_scope:google.identity.accesscontextmanager.v1.ServicePerimeterConfig) - }, +_globals = globals() +_builder.BuildMessageAndEnumDescriptors(DESCRIPTOR, _globals) +_builder.BuildTopDescriptorsAndMessages( + DESCRIPTOR, + "google.identity.accesscontextmanager.v1.service_perimeter_pb2", + _globals, ) -_sym_db.RegisterMessage(ServicePerimeterConfig) -_sym_db.RegisterMessage(ServicePerimeterConfig.VpcAccessibleServices) -_sym_db.RegisterMessage(ServicePerimeterConfig.MethodSelector) -_sym_db.RegisterMessage(ServicePerimeterConfig.ApiOperation) -_sym_db.RegisterMessage(ServicePerimeterConfig.IngressSource) -_sym_db.RegisterMessage(ServicePerimeterConfig.IngressFrom) -_sym_db.RegisterMessage(ServicePerimeterConfig.IngressTo) -_sym_db.RegisterMessage(ServicePerimeterConfig.IngressPolicy) -_sym_db.RegisterMessage(ServicePerimeterConfig.EgressFrom) -_sym_db.RegisterMessage(ServicePerimeterConfig.EgressTo) -_sym_db.RegisterMessage(ServicePerimeterConfig.EgressPolicy) - if _descriptor._USE_C_DESCRIPTORS == False: - DESCRIPTOR._options = None DESCRIPTOR._serialized_options = b"\n+com.google.identity.accesscontextmanager.v1B\025ServicePerimeterProtoP\001Z\\cloud.google.com/go/accesscontextmanager/apiv1/accesscontextmanagerpb;accesscontextmanagerpb\242\002\004GACM\252\002'Google.Identity.AccessContextManager.V1\312\002'Google\\Identity\\AccessContextManager\\V1\352\002*Google::Identity::AccessContextManager::V1" _SERVICEPERIMETER._options = None _SERVICEPERIMETER._serialized_options = b"\352A|\n4accesscontextmanager.googleapis.com/ServicePerimeter\022DaccessPolicies/{access_policy}/servicePerimeters/{service_perimeter}" - _SERVICEPERIMETER._serialized_start = 169 - _SERVICEPERIMETER._serialized_end = 828 - _SERVICEPERIMETER_PERIMETERTYPE._serialized_start = 629 - _SERVICEPERIMETER_PERIMETERTYPE._serialized_end = 699 - _SERVICEPERIMETERCONFIG._serialized_start = 831 - _SERVICEPERIMETERCONFIG._serialized_end = 2804 - _SERVICEPERIMETERCONFIG_VPCACCESSIBLESERVICES._serialized_start = 1256 - _SERVICEPERIMETERCONFIG_VPCACCESSIBLESERVICES._serialized_end = 1333 - _SERVICEPERIMETERCONFIG_METHODSELECTOR._serialized_start = 1335 - _SERVICEPERIMETERCONFIG_METHODSELECTOR._serialized_end = 1399 - _SERVICEPERIMETERCONFIG_APIOPERATION._serialized_start = 1402 - _SERVICEPERIMETERCONFIG_APIOPERATION._serialized_end = 1544 - _SERVICEPERIMETERCONFIG_INGRESSSOURCE._serialized_start = 1546 - _SERVICEPERIMETERCONFIG_INGRESSSOURCE._serialized_end = 1615 - _SERVICEPERIMETERCONFIG_INGRESSFROM._serialized_start = 1618 - _SERVICEPERIMETERCONFIG_INGRESSFROM._serialized_end = 1848 - _SERVICEPERIMETERCONFIG_INGRESSTO._serialized_start = 1851 - _SERVICEPERIMETERCONFIG_INGRESSTO._serialized_end = 1979 - _SERVICEPERIMETERCONFIG_INGRESSPOLICY._serialized_start = 1982 - _SERVICEPERIMETERCONFIG_INGRESSPOLICY._serialized_end = 2191 - _SERVICEPERIMETERCONFIG_EGRESSFROM._serialized_start = 2194 - _SERVICEPERIMETERCONFIG_EGRESSFROM._serialized_end = 2327 - _SERVICEPERIMETERCONFIG_EGRESSTO._serialized_start = 2330 - _SERVICEPERIMETERCONFIG_EGRESSTO._serialized_end = 2485 - _SERVICEPERIMETERCONFIG_EGRESSPOLICY._serialized_start = 2488 - _SERVICEPERIMETERCONFIG_EGRESSPOLICY._serialized_end = 2692 - _SERVICEPERIMETERCONFIG_IDENTITYTYPE._serialized_start = 2694 - _SERVICEPERIMETERCONFIG_IDENTITYTYPE._serialized_end = 2804 + _globals["_SERVICEPERIMETER"]._serialized_start = 169 + _globals["_SERVICEPERIMETER"]._serialized_end = 828 + _globals["_SERVICEPERIMETER_PERIMETERTYPE"]._serialized_start = 629 + _globals["_SERVICEPERIMETER_PERIMETERTYPE"]._serialized_end = 699 + _globals["_SERVICEPERIMETERCONFIG"]._serialized_start = 831 + _globals["_SERVICEPERIMETERCONFIG"]._serialized_end = 2804 + _globals["_SERVICEPERIMETERCONFIG_VPCACCESSIBLESERVICES"]._serialized_start = 1256 + _globals["_SERVICEPERIMETERCONFIG_VPCACCESSIBLESERVICES"]._serialized_end = 1333 + _globals["_SERVICEPERIMETERCONFIG_METHODSELECTOR"]._serialized_start = 1335 + _globals["_SERVICEPERIMETERCONFIG_METHODSELECTOR"]._serialized_end = 1399 + _globals["_SERVICEPERIMETERCONFIG_APIOPERATION"]._serialized_start = 1402 + _globals["_SERVICEPERIMETERCONFIG_APIOPERATION"]._serialized_end = 1544 + _globals["_SERVICEPERIMETERCONFIG_INGRESSSOURCE"]._serialized_start = 1546 + _globals["_SERVICEPERIMETERCONFIG_INGRESSSOURCE"]._serialized_end = 1615 + _globals["_SERVICEPERIMETERCONFIG_INGRESSFROM"]._serialized_start = 1618 + _globals["_SERVICEPERIMETERCONFIG_INGRESSFROM"]._serialized_end = 1848 + _globals["_SERVICEPERIMETERCONFIG_INGRESSTO"]._serialized_start = 1851 + _globals["_SERVICEPERIMETERCONFIG_INGRESSTO"]._serialized_end = 1979 + _globals["_SERVICEPERIMETERCONFIG_INGRESSPOLICY"]._serialized_start = 1982 + _globals["_SERVICEPERIMETERCONFIG_INGRESSPOLICY"]._serialized_end = 2191 + _globals["_SERVICEPERIMETERCONFIG_EGRESSFROM"]._serialized_start = 2194 + _globals["_SERVICEPERIMETERCONFIG_EGRESSFROM"]._serialized_end = 2327 + _globals["_SERVICEPERIMETERCONFIG_EGRESSTO"]._serialized_start = 2330 + _globals["_SERVICEPERIMETERCONFIG_EGRESSTO"]._serialized_end = 2485 + _globals["_SERVICEPERIMETERCONFIG_EGRESSPOLICY"]._serialized_start = 2488 + _globals["_SERVICEPERIMETERCONFIG_EGRESSPOLICY"]._serialized_end = 2692 + _globals["_SERVICEPERIMETERCONFIG_IDENTITYTYPE"]._serialized_start = 2694 + _globals["_SERVICEPERIMETERCONFIG_IDENTITYTYPE"]._serialized_end = 2804 # @@protoc_insertion_point(module_scope) From 1d3531f1421bd34b20188f0c18fca7bf88168ac0 Mon Sep 17 00:00:00 2001 From: Anthonios Partheniou Date: Mon, 29 Jul 2024 16:43:29 +0000 Subject: [PATCH 3/5] fix build --- noxfile.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/noxfile.py b/noxfile.py index 4b15f4d..b804a07 100644 --- a/noxfile.py +++ b/noxfile.py @@ -92,7 +92,7 @@ def unit(session, repository, package, prerelease, protobuf_implementation): session.install("protobuf<4") # Install this library from source - session.install(".", "--no-deps") + session.install(CURRENT_DIRECTORY, "--no-deps") # Print out package versions of dependencies session.run( From c247da9bc1c9aadf39ef6c7824f458600f1c7c35 Mon Sep 17 00:00:00 2001 From: Anthonios Partheniou Date: Wed, 14 Aug 2024 17:09:47 +0000 Subject: [PATCH 4/5] use temporary directory when testing remote GAPIC --- noxfile.py | 85 ++++++++++++++++++++++++++++++++++++++++++++++-------- 1 file changed, 73 insertions(+), 12 deletions(-) diff --git a/noxfile.py b/noxfile.py index b804a07..46e8a66 100644 --- a/noxfile.py +++ b/noxfile.py @@ -19,6 +19,7 @@ from pathlib import Path import re import shutil +import tempfile import nox @@ -181,32 +182,92 @@ def unit_remote(session, library, prerelease, protobuf_implementation): NOTE: The unit and system test functions above are copied from the templates. They will need to be updated when the templates change. - * Pub/Sub: GAPIC with handwritten layer. - * Speech: Full GAPIC, has long running operations. + * Asset: GAPIC which uses `google-cloud-access-context-manager` """ if protobuf_implementation == "cpp" and session.python in ("3.11", "3.12"): session.skip("cpp implementation is not supported in python 3.11+") repository, package = library - try: - session.run("git", "-C", repository, "pull", external=True) - except nox.command.CommandFailed: + with tempfile.TemporaryDirectory() as working_dir: session.run( "git", "clone", "--single-branch", f"https://github.com/googleapis/{repository}", + f"{working_dir}/{repository}", external=True, ) - unit( - session=session, - repository=repository, - package=package, - prerelease=prerelease, - protobuf_implementation=protobuf_implementation, - ) + downstream_dir = repository + if package: + downstream_dir = f"{working_dir}/{repository}/packages/{package}" + + # Install all test dependencies, then install this package in-place. + session.install("asyncmock", "pytest-asyncio") + + session.install("mock", "pytest", "pytest-cov") + + install_command = ["-e", downstream_dir] + + if prerelease: + install_prerelease_dependencies( + session, + f"{downstream_dir}/testing/constraints-{UNIT_TEST_PYTHON_VERSIONS[0]}.txt", + ) + # Use the `--no-deps` options to allow pre-release versions of dependencies to be installed + install_command.extend(["--no-deps"]) + else: + # Install the pinned dependencies in constraints file + install_command.extend( + [ + "-c", + f"{downstream_dir}/testing/constraints-{session.python}.txt", + ] + ) + + # These *must* be the last 3 install commands to get the packages from source. + session.install(*install_command) + + # Remove the 'cpp' implementation once support for Protobuf 3.x is dropped. + # The 'cpp' implementation requires Protobuf<4. + if protobuf_implementation == "cpp": + session.install("protobuf<4") + + # Install this library from source + session.install(CURRENT_DIRECTORY, "--no-deps") + + # Print out package versions of dependencies + session.run( + "python", "-c", "import google.protobuf; print(google.protobuf.__version__)" + ) + session.run("python", "-c", "import grpc; print(grpc.__version__)") + session.run( + "python", "-c", "import google.auth; print(google.auth.__version__)" + ) + + session.run( + "python", "-c", "import google.api_core; print(google.api_core.__version__)" + ) + + # Run py.test against the unit tests in the downstream repository + with session.chdir(downstream_dir): + # Run py.test against the unit tests. + session.run( + "py.test", + "--quiet", + "--cov=google/cloud", + "--cov=tests/unit", + "--cov-append", + "--cov-config=.coveragerc", + "--cov-report=", + "--cov-fail-under=0", + os.path.join("tests", "unit"), + *session.posargs, + env={ + "PROTOCOL_BUFFERS_PYTHON_IMPLEMENTATION": protobuf_implementation, + }, + ) @nox.session(python=UNIT_TEST_PYTHON_VERSIONS) From a66e1df1eb7240dea5d988639c9caed336e35d3e Mon Sep 17 00:00:00 2001 From: Anthonios Partheniou Date: Wed, 14 Aug 2024 20:38:10 +0000 Subject: [PATCH 5/5] omit generate_protos nox session --- noxfile.py | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/noxfile.py b/noxfile.py index 46e8a66..2058e71 100644 --- a/noxfile.py +++ b/noxfile.py @@ -34,6 +34,19 @@ CURRENT_DIRECTORY = pathlib.Path(__file__).parent.absolute() UNIT_TEST_PYTHON_VERSIONS = ["3.7", "3.8", "3.9", "3.10", "3.11", "3.12"] +nox.options.sessions = [ + "unit_local", + "unit_remote", + "blacken", + "lint_setup_py", + "docs", + "docfx", + "lint", +] + +# Error if a python version is missing +nox.options.error_on_missing_interpreters = True + @nox.session(python="3.8") def blacken(session):