Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 165d3b5

Browse files
chore: Update discovery artifacts (googleapis#2551)
## Deleted keys were detected in the following stable discovery artifacts: aiplatform v1 https://togithub.com/googleapis/google-api-python-client/commit/24228d48862449405aa3486cf812a2fc5208ab32 androidenterprise v1 https://togithub.com/googleapis/google-api-python-client/commit/b7865bd3ff77dbfa296d3e9682623d048cc6b66d displayvideo v2 https://togithub.com/googleapis/google-api-python-client/commit/63b01f3147d6520061c67d4540701deac665c33b file v1 https://togithub.com/googleapis/google-api-python-client/commit/e7bf3e1cc7df45ec600553b433da3dc7ca4e2b6f gkehub v1 https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 gkehub v2 https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 ## Deleted keys were detected in the following pre-stable discovery artifacts: aiplatform v1beta1 https://togithub.com/googleapis/google-api-python-client/commit/24228d48862449405aa3486cf812a2fc5208ab32 file v1beta1 https://togithub.com/googleapis/google-api-python-client/commit/e7bf3e1cc7df45ec600553b433da3dc7ca4e2b6f gkehub v1alpha https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 gkehub v1beta https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 gkehub v2alpha https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 gkehub v2beta https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 ## Discovery Artifact Change Summary: feat(accesscontextmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/8b40ee693835e6f737b06d121394e8a0b485a9b8 feat(adsenseplatform): update the api https://togithub.com/googleapis/google-api-python-client/commit/04355c7c7c184536c4f808ab27f0e97448845683 feat(aiplatform): update the api https://togithub.com/googleapis/google-api-python-client/commit/24228d48862449405aa3486cf812a2fc5208ab32 feat(analyticsadmin): update the api https://togithub.com/googleapis/google-api-python-client/commit/dff2a84a823c6af6d59cb98d257d18aa4f39256c feat(analyticshub): update the api https://togithub.com/googleapis/google-api-python-client/commit/0208b0b0288c703b0a344e0789675d3660caae2b feat(androidenterprise): update the api https://togithub.com/googleapis/google-api-python-client/commit/b7865bd3ff77dbfa296d3e9682623d048cc6b66d feat(classroom): update the api https://togithub.com/googleapis/google-api-python-client/commit/ef72b5f7f95abea4e3d851ee8807f628183a240f feat(cloudbuild): update the api https://togithub.com/googleapis/google-api-python-client/commit/41e76d1b7e678c5b8ec344dd1b6be9eb01820c03 feat(compute): update the api https://togithub.com/googleapis/google-api-python-client/commit/48c508dffa1ed1df4e02d7d2238542b6eb8840f7 feat(dialogflow): update the api https://togithub.com/googleapis/google-api-python-client/commit/6c3ff8511522ff8fec923ef5a41384e0e3f1ee7b feat(discoveryengine): update the api https://togithub.com/googleapis/google-api-python-client/commit/9afd49fbbf75e9088910a1f0a643579a67ea2b06 feat(displayvideo): update the api https://togithub.com/googleapis/google-api-python-client/commit/63b01f3147d6520061c67d4540701deac665c33b feat(file): update the api https://togithub.com/googleapis/google-api-python-client/commit/e7bf3e1cc7df45ec600553b433da3dc7ca4e2b6f feat(gkehub): update the api https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44 feat(integrations): update the api https://togithub.com/googleapis/google-api-python-client/commit/da21dd8bebbd0eb4ca584b09df8f0ad78abf2fb5 feat(merchantapi): update the api https://togithub.com/googleapis/google-api-python-client/commit/c66e25ffad13cd34d42b0a0e40898688563d44af feat(migrationcenter): update the api https://togithub.com/googleapis/google-api-python-client/commit/06c1759266fb5c72cbb1cc5aebebe26d6bbd5a6b feat(monitoring): update the api https://togithub.com/googleapis/google-api-python-client/commit/6d1dc833753d7c076d966c3fb8bb105b618b22ec feat(netapp): update the api https://togithub.com/googleapis/google-api-python-client/commit/628b723392cd62e63fa668f9602b398fb0474ec7 feat(networkmanagement): update the api https://togithub.com/googleapis/google-api-python-client/commit/45d70c19e93b8edb0b52ca80e5235c0540cc1463 feat(redis): update the api https://togithub.com/googleapis/google-api-python-client/commit/a866933256348e166064a7ed1aee2d92a42630a9 fix(secretmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/477de50ccc8bc597101c3c8ac80505565674f6ac feat(spanner): update the api https://togithub.com/googleapis/google-api-python-client/commit/9540ac50fcb9506cfaf204f2746f3da047cc2c08 feat(websecurityscanner): update the api https://togithub.com/googleapis/google-api-python-client/commit/5eae43739b774edf6fb5b91bd5807a1154533180
1 parent f4b3014 commit 165d3b5

File tree

274 files changed

+4821
-4150
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

274 files changed

+4821
-4150
lines changed

docs/dyn/accesscontextmanager_v1.accessPolicies.servicePerimeters.html

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,7 @@ <h3>Method Details</h3>
181181
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
182182
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
183183
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
184+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
184185
},
185186
],
186187
},
@@ -267,6 +268,7 @@ <h3>Method Details</h3>
267268
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
268269
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
269270
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
271+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
270272
},
271273
],
272274
},
@@ -440,6 +442,7 @@ <h3>Method Details</h3>
440442
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
441443
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
442444
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
445+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
443446
},
444447
],
445448
},
@@ -526,6 +529,7 @@ <h3>Method Details</h3>
526529
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
527530
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
528531
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
532+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
529533
},
530534
],
531535
},
@@ -641,6 +645,7 @@ <h3>Method Details</h3>
641645
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
642646
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
643647
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
648+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
644649
},
645650
],
646651
},
@@ -727,6 +732,7 @@ <h3>Method Details</h3>
727732
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
728733
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
729734
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
735+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
730736
},
731737
],
732738
},
@@ -848,6 +854,7 @@ <h3>Method Details</h3>
848854
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
849855
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
850856
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
857+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
851858
},
852859
],
853860
},
@@ -934,6 +941,7 @@ <h3>Method Details</h3>
934941
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
935942
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
936943
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
944+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
937945
},
938946
],
939947
},
@@ -1071,6 +1079,7 @@ <h3>Method Details</h3>
10711079
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
10721080
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
10731081
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
1082+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
10741083
},
10751084
],
10761085
},
@@ -1157,6 +1166,7 @@ <h3>Method Details</h3>
11571166
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
11581167
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
11591168
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
1169+
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
11601170
},
11611171
],
11621172
},
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
<html><body>
2+
<style>
3+
4+
body, h1, h2, h3, div, span, p, pre, a {
5+
margin: 0;
6+
padding: 0;
7+
border: 0;
8+
font-weight: inherit;
9+
font-style: inherit;
10+
font-size: 100%;
11+
font-family: inherit;
12+
vertical-align: baseline;
13+
}
14+
15+
body {
16+
font-size: 13px;
17+
padding: 1em;
18+
}
19+
20+
h1 {
21+
font-size: 26px;
22+
margin-bottom: 1em;
23+
}
24+
25+
h2 {
26+
font-size: 24px;
27+
margin-bottom: 1em;
28+
}
29+
30+
h3 {
31+
font-size: 20px;
32+
margin-bottom: 1em;
33+
margin-top: 1em;
34+
}
35+
36+
pre, code {
37+
line-height: 1.5;
38+
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39+
}
40+
41+
pre {
42+
margin-top: 0.5em;
43+
}
44+
45+
h1, h2, h3, p {
46+
font-family: Arial, sans serif;
47+
}
48+
49+
h1, h2, h3 {
50+
border-bottom: solid #CCC 1px;
51+
}
52+
53+
.toc_element {
54+
margin-top: 0.5em;
55+
}
56+
57+
.firstline {
58+
margin-left: 2 em;
59+
}
60+
61+
.method {
62+
margin-top: 1em;
63+
border: solid 1px #CCC;
64+
padding: 1em;
65+
background: #EEE;
66+
}
67+
68+
.details {
69+
font-weight: bold;
70+
font-size: 14px;
71+
}
72+
73+
</style>
74+
75+
<h1><a href="adsenseplatform_v1alpha.html">AdSense Platform API</a> . <a href="adsenseplatform_v1alpha.accounts.html">accounts</a> . <a href="adsenseplatform_v1alpha.accounts.platforms.html">platforms</a> . <a href="adsenseplatform_v1alpha.accounts.platforms.childAccounts.html">childAccounts</a></h1>
76+
<h2>Instance Methods</h2>
77+
<p class="toc_element">
78+
<code><a href="adsenseplatform_v1alpha.accounts.platforms.childAccounts.sites.html">sites()</a></code>
79+
</p>
80+
<p class="firstline">Returns the sites Resource.</p>
81+
82+
<p class="toc_element">
83+
<code><a href="#close">close()</a></code></p>
84+
<p class="firstline">Close httplib2 connections.</p>
85+
<h3>Method Details</h3>
86+
<div class="method">
87+
<code class="details" id="close">close()</code>
88+
<pre>Close httplib2 connections.</pre>
89+
</div>
90+
91+
</body></html>

0 commit comments

Comments
 (0)