Skip to content

Commit 8e1c21a

Browse files
feat(all): auto-regenerate discovery clients (#2142)
1 parent 733fb17 commit 8e1c21a

548 files changed

Lines changed: 84212 additions & 9529 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

abusiveexperiencereport/v1/abusiveexperiencereport-gen.go

Lines changed: 19 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

acceleratedmobilepageurl/v1/acceleratedmobilepageurl-gen.go

Lines changed: 19 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

accessapproval/v1/accessapproval-gen.go

Lines changed: 19 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

accesscontextmanager/v1/accesscontextmanager-api.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1235,7 +1235,7 @@
12351235
}
12361236
}
12371237
},
1238-
"revision": "20230806",
1238+
"revision": "20230903",
12391239
"rootUrl": "https://accesscontextmanager.googleapis.com/",
12401240
"schemas": {
12411241
"AccessContextManagerOperationMetadata": {
@@ -1288,7 +1288,7 @@
12881288
"type": "string"
12891289
},
12901290
"scopes": {
1291-
"description": "The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[\"folders/123\"] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes \"folders/123\" will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`",
1291+
"description": "The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=[\"folders/123\"]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`",
12921292
"items": {
12931293
"type": "string"
12941294
},

accesscontextmanager/v1/accesscontextmanager-gen.go

Lines changed: 31 additions & 19 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

accesscontextmanager/v1beta/accesscontextmanager-gen.go

Lines changed: 19 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

acmedns/v1/acmedns-gen.go

Lines changed: 19 additions & 6 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)