blob: 00b6a91a1d74fca15392ff023a075306af376885 [file] [log] [blame]
Bu Sun Kim715bd7f2019-06-14 16:50:42 -07001<html><body>
2<style>
3
4body, h1, h2, h3, div, span, p, pre, a {
5 margin: 0;
6 padding: 0;
7 border: 0;
8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
13}
14
15body {
16 font-size: 13px;
17 padding: 1em;
18}
19
20h1 {
21 font-size: 26px;
22 margin-bottom: 1em;
23}
24
25h2 {
26 font-size: 24px;
27 margin-bottom: 1em;
28}
29
30h3 {
31 font-size: 20px;
32 margin-bottom: 1em;
33 margin-top: 1em;
34}
35
36pre, code {
37 line-height: 1.5;
38 font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39}
40
41pre {
42 margin-top: 0.5em;
43}
44
45h1, h2, h3, p {
46 font-family: Arial, sans serif;
47}
48
49h1, h2, h3 {
50 border-bottom: solid #CCC 1px;
51}
52
53.toc_element {
54 margin-top: 0.5em;
55}
56
57.firstline {
58 margin-left: 2 em;
59}
60
61.method {
62 margin-top: 1em;
63 border: solid 1px #CCC;
64 padding: 1em;
65 background: #EEE;
66}
67
68.details {
69 font-weight: bold;
70 font-size: 14px;
71}
72
73</style>
74
75<h1><a href="accesscontextmanager_v1.html">Access Context Manager API</a> . <a href="accesscontextmanager_v1.accessPolicies.html">accessPolicies</a> . <a href="accesscontextmanager_v1.accessPolicies.servicePerimeters.html">servicePerimeters</a></h1>
76<h2>Instance Methods</h2>
77<p class="toc_element">
Dan O'Mearadd494642020-05-01 07:42:23 -070078 <code><a href="#commit">commit(parent, body=None, x__xgafv=None)</a></code></p>
79<p class="firstline">Commit the dry-run spec for all the Service Perimeters in an</p>
80<p class="toc_element">
81 <code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p>
82<p class="firstline">Create a Service Perimeter. The</p>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070083<p class="toc_element">
84 <code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
Dan O'Mearadd494642020-05-01 07:42:23 -070085<p class="firstline">Delete a Service Perimeter by resource</p>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070086<p class="toc_element">
87 <code><a href="#get">get(name, x__xgafv=None)</a></code></p>
Dan O'Mearadd494642020-05-01 07:42:23 -070088<p class="firstline">Get a Service Perimeter by resource</p>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070089<p class="toc_element">
Bu Sun Kim65020912020-05-20 12:08:20 -070090 <code><a href="#list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</a></code></p>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -070091<p class="firstline">List all Service Perimeters for an</p>
92<p class="toc_element">
93 <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
94<p class="firstline">Retrieves the next page of results.</p>
95<p class="toc_element">
Dan O'Mearadd494642020-05-01 07:42:23 -070096 <code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
97<p class="firstline">Update a Service Perimeter. The</p>
98<p class="toc_element">
99 <code><a href="#replaceAll">replaceAll(parent, body=None, x__xgafv=None)</a></code></p>
100<p class="firstline">Replace all existing Service Perimeters in an</p>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700101<h3>Method Details</h3>
102<div class="method">
Dan O'Mearadd494642020-05-01 07:42:23 -0700103 <code class="details" id="commit">commit(parent, body=None, x__xgafv=None)</code>
104 <pre>Commit the dry-run spec for all the Service Perimeters in an
105Access Policy.
106A commit operation on a Service Perimeter involves copying its `spec` field
Bu Sun Kim65020912020-05-20 12:08:20 -0700107to that Service Perimeter&#x27;s `status` field. Only Service Perimeters with
Dan O'Mearadd494642020-05-01 07:42:23 -0700108`use_explicit_dry_run_spec` field set to true are affected by a commit
109operation. The longrunning operation from this RPC will have a successful
110status once the dry-run specs for all the Service Perimeters have been
111committed. If a commit fails, it will cause the longrunning operation to
112return an error response and the entire commit operation will be cancelled.
113When successful, Operation.response field will contain
114CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will
115be cleared after a successful commit operation.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700116
117Args:
Dan O'Mearadd494642020-05-01 07:42:23 -0700118 parent: string, Required. Resource name for the parent Access Policy which owns all
119Service Perimeters in scope for
120the commit operation.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700121
122Format: `accessPolicies/{policy_id}` (required)
Dan O'Mearadd494642020-05-01 07:42:23 -0700123 body: object, The request body.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700124 The object takes the form of:
125
Dan O'Mearadd494642020-05-01 07:42:23 -0700126{ # A request to commit dry-run specs in all Service Perimeters belonging to
127 # an Access Policy.
Bu Sun Kim65020912020-05-20 12:08:20 -0700128 &quot;etag&quot;: &quot;A String&quot;, # Optional. The etag for the version of the Access Policy that this
Dan O'Mearadd494642020-05-01 07:42:23 -0700129 # commit operation is to be performed on. If, at the time of commit, the
130 # etag for the Access Policy stored in Access Context Manager is different
131 # from the specified etag, then the commit operation will not be performed
132 # and the call will fail. This field is not required. If etag is not
133 # provided, the operation will be performed as if a valid etag is provided.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700134 }
135
136 x__xgafv: string, V1 error format.
137 Allowed values
138 1 - v1 error format
139 2 - v2 error format
140
141Returns:
142 An object of the form:
143
144 { # This resource represents a long-running operation that is the result of a
145 # network API call.
Bu Sun Kim65020912020-05-20 12:08:20 -0700146 &quot;done&quot;: True or False, # If the value is `false`, it means the operation is still in progress.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700147 # If `true`, the operation is completed, and either `error` or `response` is
148 # available.
Bu Sun Kim65020912020-05-20 12:08:20 -0700149 &quot;response&quot;: { # The normal response of the operation in case of success. If the original
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700150 # method returns no data on success, such as `Delete`, the response is
151 # `google.protobuf.Empty`. If the original method is standard
152 # `Get`/`Create`/`Update`, the response should be the resource. For other
153 # methods, the response should have the type `XxxResponse`, where `Xxx`
154 # is the original method name. For example, if the original method name
155 # is `TakeSnapshot()`, the inferred response type is
156 # `TakeSnapshotResponse`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700157 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700158 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700159 &quot;name&quot;: &quot;A String&quot;, # The server-assigned name, which is only unique within the same service that
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700160 # originally returns it. If you use the default HTTP mapping, the
161 # `name` should be a resource name ending with `operations/{unique_id}`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700162 &quot;error&quot;: { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation.
163 # different programming environments, including REST APIs and RPC APIs. It is
164 # used by [gRPC](https://github.com/grpc). Each `Status` message contains
165 # three pieces of data: error code, error message, and error details.
166 #
167 # You can find out more about this error model and how to work with it in the
168 # [API Design Guide](https://cloud.google.com/apis/design/errors).
169 &quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
170 &quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any
171 # user-facing error message should be localized and sent in the
172 # google.rpc.Status.details field, or localized by the client.
173 &quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of
174 # message types for APIs to use.
175 {
176 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
177 },
178 ],
179 },
180 &quot;metadata&quot;: { # Service-specific metadata associated with the operation. It typically
181 # contains progress information and common metadata such as create time.
182 # Some services might not provide such metadata. Any method that returns a
183 # long-running operation should document the metadata type, if any.
184 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
185 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700186 }</pre>
187</div>
188
189<div class="method">
Dan O'Mearadd494642020-05-01 07:42:23 -0700190 <code class="details" id="create">create(parent, body=None, x__xgafv=None)</code>
191 <pre>Create a Service Perimeter. The
192longrunning operation from this RPC will have a successful status once the
193Service Perimeter has
194propagated to long-lasting storage. Service Perimeters containing
195errors will result in an error response for the first error encountered.
196
197Args:
198 parent: string, Required. Resource name for the access policy which owns this Service
199Perimeter.
200
201Format: `accessPolicies/{policy_id}` (required)
202 body: object, The request body.
203 The object takes the form of:
204
205{ # `ServicePerimeter` describes a set of Google Cloud resources which can freely
206 # import and export data amongst themselves, but not export outside of the
207 # `ServicePerimeter`. If a request with a source within this `ServicePerimeter`
208 # has a target outside of the `ServicePerimeter`, the request will be blocked.
209 # Otherwise the request is allowed. There are two types of Service Perimeter -
210 # Regular and Bridge. Regular Service Perimeters cannot overlap, a single
211 # Google Cloud project can only belong to a single regular Service Perimeter.
212 # Service Perimeter Bridges can contain only Google Cloud projects as members,
213 # a single Google Cloud project may belong to multiple Service Perimeter
214 # Bridges.
Bu Sun Kim65020912020-05-20 12:08:20 -0700215 &quot;useExplicitDryRunSpec&quot;: True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly
216 # exists for all Service Perimeters, and that spec is identical to the
217 # status for those Service Perimeters. When this flag is set, it inhibits the
218 # generation of the implicit spec, thereby allowing the user to explicitly
219 # provide a configuration (&quot;spec&quot;) to use in a dry-run version of the Service
220 # Perimeter. This allows the user to test changes to the enforced config
221 # (&quot;status&quot;) without actually enforcing them. This testing is done through
222 # analyzing the differences between currently enforced and suggested
223 # restrictions. use_explicit_dry_run_spec must bet set to True if any of the
224 # fields in the spec are set to non-default values.
225 &quot;description&quot;: &quot;A String&quot;, # Description of the `ServicePerimeter` and its use. Does not affect
226 # behavior.
227 &quot;status&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources,
Dan O'Mearadd494642020-05-01 07:42:23 -0700228 # restricted services and access levels that determine perimeter
229 # content and boundaries.
230 # describe specific Service Perimeter configuration.
Bu Sun Kim65020912020-05-20 12:08:20 -0700231 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
Dan O'Mearadd494642020-05-01 07:42:23 -0700232 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
233 # must be in the same policy as this `ServicePerimeter`. Referencing a
234 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
235 # listed, resources within the perimeter can only be accessed via Google
236 # Cloud calls with request origins within the perimeter. Example:
Bu Sun Kim65020912020-05-20 12:08:20 -0700237 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700238 # For Service Perimeter Bridge, must be empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700239 &quot;A String&quot;,
240 ],
241 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
242 # restrictions. For example, if `storage.googleapis.com` is specified, access
243 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
244 # access restrictions.
245 &quot;A String&quot;,
246 ],
247 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
248 # Perimeter.
249 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
250 # APIs specified in &#x27;allowed_services&#x27;.
251 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
252 # unless &#x27;enable_restriction&#x27; is True.
253 &quot;A String&quot;,
254 ],
255 },
256 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
257 # Currently only projects are allowed. Format: `projects/{project_number}`
258 &quot;A String&quot;,
Dan O'Mearadd494642020-05-01 07:42:23 -0700259 ],
260 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700261 &quot;spec&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration
262 # allows to specify and test ServicePerimeter configuration without enforcing
263 # actual access restrictions. Only allowed to be set when the
264 # &quot;use_explicit_dry_run_spec&quot; flag is set.
265 # describe specific Service Perimeter configuration.
266 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
267 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
268 # must be in the same policy as this `ServicePerimeter`. Referencing a
269 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
270 # listed, resources within the perimeter can only be accessed via Google
271 # Cloud calls with request origins within the perimeter. Example:
272 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
273 # For Service Perimeter Bridge, must be empty.
274 &quot;A String&quot;,
275 ],
276 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
277 # restrictions. For example, if `storage.googleapis.com` is specified, access
278 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
279 # access restrictions.
280 &quot;A String&quot;,
281 ],
282 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
283 # Perimeter.
284 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
285 # APIs specified in &#x27;allowed_services&#x27;.
286 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
287 # unless &#x27;enable_restriction&#x27; is True.
288 &quot;A String&quot;,
289 ],
290 },
291 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
292 # Currently only projects are allowed. Format: `projects/{project_number}`
293 &quot;A String&quot;,
294 ],
295 },
296 &quot;name&quot;: &quot;A String&quot;, # Required. Resource name for the ServicePerimeter. The `short_name`
297 # component must begin with a letter and only include alphanumeric and &#x27;_&#x27;.
298 # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}`
299 &quot;perimeterType&quot;: &quot;A String&quot;, # Perimeter type indicator. A single project is
Dan O'Mearadd494642020-05-01 07:42:23 -0700300 # allowed to be a member of single regular perimeter, but multiple service
301 # perimeter bridges. A project cannot be a included in a perimeter bridge
302 # without being included in regular perimeter. For perimeter bridges,
303 # the restricted service list as well as access level lists must be
304 # empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700305 &quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
Dan O'Mearadd494642020-05-01 07:42:23 -0700306}
307
308 x__xgafv: string, V1 error format.
309 Allowed values
310 1 - v1 error format
311 2 - v2 error format
312
313Returns:
314 An object of the form:
315
316 { # This resource represents a long-running operation that is the result of a
317 # network API call.
Bu Sun Kim65020912020-05-20 12:08:20 -0700318 &quot;done&quot;: True or False, # If the value is `false`, it means the operation is still in progress.
Dan O'Mearadd494642020-05-01 07:42:23 -0700319 # If `true`, the operation is completed, and either `error` or `response` is
320 # available.
Bu Sun Kim65020912020-05-20 12:08:20 -0700321 &quot;response&quot;: { # The normal response of the operation in case of success. If the original
Dan O'Mearadd494642020-05-01 07:42:23 -0700322 # method returns no data on success, such as `Delete`, the response is
323 # `google.protobuf.Empty`. If the original method is standard
324 # `Get`/`Create`/`Update`, the response should be the resource. For other
325 # methods, the response should have the type `XxxResponse`, where `Xxx`
326 # is the original method name. For example, if the original method name
327 # is `TakeSnapshot()`, the inferred response type is
328 # `TakeSnapshotResponse`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700329 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
Dan O'Mearadd494642020-05-01 07:42:23 -0700330 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700331 &quot;name&quot;: &quot;A String&quot;, # The server-assigned name, which is only unique within the same service that
Dan O'Mearadd494642020-05-01 07:42:23 -0700332 # originally returns it. If you use the default HTTP mapping, the
333 # `name` should be a resource name ending with `operations/{unique_id}`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700334 &quot;error&quot;: { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation.
335 # different programming environments, including REST APIs and RPC APIs. It is
336 # used by [gRPC](https://github.com/grpc). Each `Status` message contains
337 # three pieces of data: error code, error message, and error details.
338 #
339 # You can find out more about this error model and how to work with it in the
340 # [API Design Guide](https://cloud.google.com/apis/design/errors).
341 &quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
342 &quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any
343 # user-facing error message should be localized and sent in the
344 # google.rpc.Status.details field, or localized by the client.
345 &quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of
346 # message types for APIs to use.
347 {
348 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
349 },
350 ],
351 },
352 &quot;metadata&quot;: { # Service-specific metadata associated with the operation. It typically
353 # contains progress information and common metadata such as create time.
354 # Some services might not provide such metadata. Any method that returns a
355 # long-running operation should document the metadata type, if any.
356 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
357 },
Dan O'Mearadd494642020-05-01 07:42:23 -0700358 }</pre>
359</div>
360
361<div class="method">
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700362 <code class="details" id="delete">delete(name, x__xgafv=None)</code>
Dan O'Mearadd494642020-05-01 07:42:23 -0700363 <pre>Delete a Service Perimeter by resource
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700364name. The longrunning operation from this RPC will have a successful status
365once the Service Perimeter has been
366removed from long-lasting storage.
367
368Args:
369 name: string, Required. Resource name for the Service Perimeter.
370
371Format:
372`accessPolicies/{policy_id}/servicePerimeters/{service_perimeter_id}` (required)
373 x__xgafv: string, V1 error format.
374 Allowed values
375 1 - v1 error format
376 2 - v2 error format
377
378Returns:
379 An object of the form:
380
381 { # This resource represents a long-running operation that is the result of a
382 # network API call.
Bu Sun Kim65020912020-05-20 12:08:20 -0700383 &quot;done&quot;: True or False, # If the value is `false`, it means the operation is still in progress.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700384 # If `true`, the operation is completed, and either `error` or `response` is
385 # available.
Bu Sun Kim65020912020-05-20 12:08:20 -0700386 &quot;response&quot;: { # The normal response of the operation in case of success. If the original
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700387 # method returns no data on success, such as `Delete`, the response is
388 # `google.protobuf.Empty`. If the original method is standard
389 # `Get`/`Create`/`Update`, the response should be the resource. For other
390 # methods, the response should have the type `XxxResponse`, where `Xxx`
391 # is the original method name. For example, if the original method name
392 # is `TakeSnapshot()`, the inferred response type is
393 # `TakeSnapshotResponse`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700394 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700395 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700396 &quot;name&quot;: &quot;A String&quot;, # The server-assigned name, which is only unique within the same service that
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700397 # originally returns it. If you use the default HTTP mapping, the
398 # `name` should be a resource name ending with `operations/{unique_id}`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700399 &quot;error&quot;: { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation.
400 # different programming environments, including REST APIs and RPC APIs. It is
401 # used by [gRPC](https://github.com/grpc). Each `Status` message contains
402 # three pieces of data: error code, error message, and error details.
403 #
404 # You can find out more about this error model and how to work with it in the
405 # [API Design Guide](https://cloud.google.com/apis/design/errors).
406 &quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
407 &quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any
408 # user-facing error message should be localized and sent in the
409 # google.rpc.Status.details field, or localized by the client.
410 &quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of
411 # message types for APIs to use.
412 {
413 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
414 },
415 ],
416 },
417 &quot;metadata&quot;: { # Service-specific metadata associated with the operation. It typically
418 # contains progress information and common metadata such as create time.
419 # Some services might not provide such metadata. Any method that returns a
420 # long-running operation should document the metadata type, if any.
421 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
422 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700423 }</pre>
424</div>
425
426<div class="method">
427 <code class="details" id="get">get(name, x__xgafv=None)</code>
Dan O'Mearadd494642020-05-01 07:42:23 -0700428 <pre>Get a Service Perimeter by resource
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700429name.
430
431Args:
432 name: string, Required. Resource name for the Service Perimeter.
433
434Format:
435`accessPolicies/{policy_id}/servicePerimeters/{service_perimeters_id}` (required)
436 x__xgafv: string, V1 error format.
437 Allowed values
438 1 - v1 error format
439 2 - v2 error format
440
441Returns:
442 An object of the form:
443
Dan O'Mearadd494642020-05-01 07:42:23 -0700444 { # `ServicePerimeter` describes a set of Google Cloud resources which can freely
445 # import and export data amongst themselves, but not export outside of the
446 # `ServicePerimeter`. If a request with a source within this `ServicePerimeter`
447 # has a target outside of the `ServicePerimeter`, the request will be blocked.
448 # Otherwise the request is allowed. There are two types of Service Perimeter -
449 # Regular and Bridge. Regular Service Perimeters cannot overlap, a single
450 # Google Cloud project can only belong to a single regular Service Perimeter.
451 # Service Perimeter Bridges can contain only Google Cloud projects as members,
452 # a single Google Cloud project may belong to multiple Service Perimeter
453 # Bridges.
Bu Sun Kim65020912020-05-20 12:08:20 -0700454 &quot;useExplicitDryRunSpec&quot;: True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly
455 # exists for all Service Perimeters, and that spec is identical to the
456 # status for those Service Perimeters. When this flag is set, it inhibits the
457 # generation of the implicit spec, thereby allowing the user to explicitly
458 # provide a configuration (&quot;spec&quot;) to use in a dry-run version of the Service
459 # Perimeter. This allows the user to test changes to the enforced config
460 # (&quot;status&quot;) without actually enforcing them. This testing is done through
461 # analyzing the differences between currently enforced and suggested
462 # restrictions. use_explicit_dry_run_spec must bet set to True if any of the
463 # fields in the spec are set to non-default values.
464 &quot;description&quot;: &quot;A String&quot;, # Description of the `ServicePerimeter` and its use. Does not affect
465 # behavior.
466 &quot;status&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources,
Dan O'Mearadd494642020-05-01 07:42:23 -0700467 # restricted services and access levels that determine perimeter
468 # content and boundaries.
469 # describe specific Service Perimeter configuration.
Bu Sun Kim65020912020-05-20 12:08:20 -0700470 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
Dan O'Mearadd494642020-05-01 07:42:23 -0700471 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
472 # must be in the same policy as this `ServicePerimeter`. Referencing a
473 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
474 # listed, resources within the perimeter can only be accessed via Google
475 # Cloud calls with request origins within the perimeter. Example:
Bu Sun Kim65020912020-05-20 12:08:20 -0700476 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700477 # For Service Perimeter Bridge, must be empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700478 &quot;A String&quot;,
479 ],
480 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
481 # restrictions. For example, if `storage.googleapis.com` is specified, access
482 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
483 # access restrictions.
484 &quot;A String&quot;,
485 ],
486 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
487 # Perimeter.
488 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
489 # APIs specified in &#x27;allowed_services&#x27;.
490 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
491 # unless &#x27;enable_restriction&#x27; is True.
492 &quot;A String&quot;,
493 ],
494 },
495 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
496 # Currently only projects are allowed. Format: `projects/{project_number}`
497 &quot;A String&quot;,
Dan O'Mearadd494642020-05-01 07:42:23 -0700498 ],
499 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700500 &quot;spec&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration
501 # allows to specify and test ServicePerimeter configuration without enforcing
502 # actual access restrictions. Only allowed to be set when the
503 # &quot;use_explicit_dry_run_spec&quot; flag is set.
504 # describe specific Service Perimeter configuration.
505 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
506 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
507 # must be in the same policy as this `ServicePerimeter`. Referencing a
508 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
509 # listed, resources within the perimeter can only be accessed via Google
510 # Cloud calls with request origins within the perimeter. Example:
511 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
512 # For Service Perimeter Bridge, must be empty.
513 &quot;A String&quot;,
514 ],
515 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
516 # restrictions. For example, if `storage.googleapis.com` is specified, access
517 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
518 # access restrictions.
519 &quot;A String&quot;,
520 ],
521 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
522 # Perimeter.
523 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
524 # APIs specified in &#x27;allowed_services&#x27;.
525 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
526 # unless &#x27;enable_restriction&#x27; is True.
527 &quot;A String&quot;,
528 ],
529 },
530 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
531 # Currently only projects are allowed. Format: `projects/{project_number}`
532 &quot;A String&quot;,
533 ],
534 },
535 &quot;name&quot;: &quot;A String&quot;, # Required. Resource name for the ServicePerimeter. The `short_name`
536 # component must begin with a letter and only include alphanumeric and &#x27;_&#x27;.
537 # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}`
538 &quot;perimeterType&quot;: &quot;A String&quot;, # Perimeter type indicator. A single project is
Dan O'Mearadd494642020-05-01 07:42:23 -0700539 # allowed to be a member of single regular perimeter, but multiple service
540 # perimeter bridges. A project cannot be a included in a perimeter bridge
541 # without being included in regular perimeter. For perimeter bridges,
542 # the restricted service list as well as access level lists must be
543 # empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700544 &quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
Dan O'Mearadd494642020-05-01 07:42:23 -0700545 }</pre>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700546</div>
547
548<div class="method">
Bu Sun Kim65020912020-05-20 12:08:20 -0700549 <code class="details" id="list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</code>
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700550 <pre>List all Service Perimeters for an
551access policy.
552
553Args:
554 parent: string, Required. Resource name for the access policy to list Service Perimeters from.
555
556Format:
557`accessPolicies/{policy_id}` (required)
558 pageToken: string, Next page token for the next batch of Service Perimeter instances.
559Defaults to the first page of results.
Bu Sun Kim65020912020-05-20 12:08:20 -0700560 pageSize: integer, Number of Service Perimeters to include
561in the list. Default 100.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700562 x__xgafv: string, V1 error format.
563 Allowed values
564 1 - v1 error format
565 2 - v2 error format
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700566
567Returns:
568 An object of the form:
569
570 { # A response to `ListServicePerimetersRequest`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700571 &quot;nextPageToken&quot;: &quot;A String&quot;, # The pagination token to retrieve the next page of results. If the value is
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700572 # empty, no further results remain.
Bu Sun Kim65020912020-05-20 12:08:20 -0700573 &quot;servicePerimeters&quot;: [ # List of the Service Perimeter instances.
Dan O'Mearadd494642020-05-01 07:42:23 -0700574 { # `ServicePerimeter` describes a set of Google Cloud resources which can freely
575 # import and export data amongst themselves, but not export outside of the
576 # `ServicePerimeter`. If a request with a source within this `ServicePerimeter`
577 # has a target outside of the `ServicePerimeter`, the request will be blocked.
578 # Otherwise the request is allowed. There are two types of Service Perimeter -
579 # Regular and Bridge. Regular Service Perimeters cannot overlap, a single
580 # Google Cloud project can only belong to a single regular Service Perimeter.
581 # Service Perimeter Bridges can contain only Google Cloud projects as members,
582 # a single Google Cloud project may belong to multiple Service Perimeter
583 # Bridges.
Bu Sun Kim65020912020-05-20 12:08:20 -0700584 &quot;useExplicitDryRunSpec&quot;: True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly
585 # exists for all Service Perimeters, and that spec is identical to the
586 # status for those Service Perimeters. When this flag is set, it inhibits the
587 # generation of the implicit spec, thereby allowing the user to explicitly
588 # provide a configuration (&quot;spec&quot;) to use in a dry-run version of the Service
589 # Perimeter. This allows the user to test changes to the enforced config
590 # (&quot;status&quot;) without actually enforcing them. This testing is done through
591 # analyzing the differences between currently enforced and suggested
592 # restrictions. use_explicit_dry_run_spec must bet set to True if any of the
593 # fields in the spec are set to non-default values.
594 &quot;description&quot;: &quot;A String&quot;, # Description of the `ServicePerimeter` and its use. Does not affect
595 # behavior.
596 &quot;status&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources,
Dan O'Mearadd494642020-05-01 07:42:23 -0700597 # restricted services and access levels that determine perimeter
598 # content and boundaries.
599 # describe specific Service Perimeter configuration.
Bu Sun Kim65020912020-05-20 12:08:20 -0700600 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
Dan O'Mearadd494642020-05-01 07:42:23 -0700601 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
602 # must be in the same policy as this `ServicePerimeter`. Referencing a
603 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
604 # listed, resources within the perimeter can only be accessed via Google
605 # Cloud calls with request origins within the perimeter. Example:
Bu Sun Kim65020912020-05-20 12:08:20 -0700606 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700607 # For Service Perimeter Bridge, must be empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700608 &quot;A String&quot;,
609 ],
610 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
611 # restrictions. For example, if `storage.googleapis.com` is specified, access
612 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
613 # access restrictions.
614 &quot;A String&quot;,
615 ],
616 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
617 # Perimeter.
618 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
619 # APIs specified in &#x27;allowed_services&#x27;.
620 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
621 # unless &#x27;enable_restriction&#x27; is True.
622 &quot;A String&quot;,
623 ],
624 },
625 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
626 # Currently only projects are allowed. Format: `projects/{project_number}`
627 &quot;A String&quot;,
Dan O'Mearadd494642020-05-01 07:42:23 -0700628 ],
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700629 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700630 &quot;spec&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration
631 # allows to specify and test ServicePerimeter configuration without enforcing
632 # actual access restrictions. Only allowed to be set when the
633 # &quot;use_explicit_dry_run_spec&quot; flag is set.
634 # describe specific Service Perimeter configuration.
635 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
636 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
637 # must be in the same policy as this `ServicePerimeter`. Referencing a
638 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
639 # listed, resources within the perimeter can only be accessed via Google
640 # Cloud calls with request origins within the perimeter. Example:
641 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
642 # For Service Perimeter Bridge, must be empty.
643 &quot;A String&quot;,
644 ],
645 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
646 # restrictions. For example, if `storage.googleapis.com` is specified, access
647 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
648 # access restrictions.
649 &quot;A String&quot;,
650 ],
651 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
652 # Perimeter.
653 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
654 # APIs specified in &#x27;allowed_services&#x27;.
655 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
656 # unless &#x27;enable_restriction&#x27; is True.
657 &quot;A String&quot;,
658 ],
659 },
660 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
661 # Currently only projects are allowed. Format: `projects/{project_number}`
662 &quot;A String&quot;,
663 ],
664 },
665 &quot;name&quot;: &quot;A String&quot;, # Required. Resource name for the ServicePerimeter. The `short_name`
666 # component must begin with a letter and only include alphanumeric and &#x27;_&#x27;.
667 # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}`
668 &quot;perimeterType&quot;: &quot;A String&quot;, # Perimeter type indicator. A single project is
Dan O'Mearadd494642020-05-01 07:42:23 -0700669 # allowed to be a member of single regular perimeter, but multiple service
670 # perimeter bridges. A project cannot be a included in a perimeter bridge
671 # without being included in regular perimeter. For perimeter bridges,
672 # the restricted service list as well as access level lists must be
673 # empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700674 &quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
Dan O'Mearadd494642020-05-01 07:42:23 -0700675 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700676 ],
677 }</pre>
678</div>
679
680<div class="method">
681 <code class="details" id="list_next">list_next(previous_request, previous_response)</code>
682 <pre>Retrieves the next page of results.
683
684Args:
685 previous_request: The request for the previous page. (required)
686 previous_response: The response from the request for the previous page. (required)
687
688Returns:
Bu Sun Kim65020912020-05-20 12:08:20 -0700689 A request object that you can call &#x27;execute()&#x27; on to request the next
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700690 page. Returns None if there are no more items in the collection.
691 </pre>
692</div>
693
694<div class="method">
Dan O'Mearadd494642020-05-01 07:42:23 -0700695 <code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code>
696 <pre>Update a Service Perimeter. The
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700697longrunning operation from this RPC will have a successful status once the
698changes to the Service Perimeter have
699propagated to long-lasting storage. Service Perimeter containing
700errors will result in an error response for the first error encountered.
701
702Args:
703 name: string, Required. Resource name for the ServicePerimeter. The `short_name`
Bu Sun Kim65020912020-05-20 12:08:20 -0700704component must begin with a letter and only include alphanumeric and &#x27;_&#x27;.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700705Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` (required)
Dan O'Mearadd494642020-05-01 07:42:23 -0700706 body: object, The request body.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700707 The object takes the form of:
708
Dan O'Mearadd494642020-05-01 07:42:23 -0700709{ # `ServicePerimeter` describes a set of Google Cloud resources which can freely
710 # import and export data amongst themselves, but not export outside of the
711 # `ServicePerimeter`. If a request with a source within this `ServicePerimeter`
712 # has a target outside of the `ServicePerimeter`, the request will be blocked.
713 # Otherwise the request is allowed. There are two types of Service Perimeter -
714 # Regular and Bridge. Regular Service Perimeters cannot overlap, a single
715 # Google Cloud project can only belong to a single regular Service Perimeter.
716 # Service Perimeter Bridges can contain only Google Cloud projects as members,
717 # a single Google Cloud project may belong to multiple Service Perimeter
718 # Bridges.
Bu Sun Kim65020912020-05-20 12:08:20 -0700719 &quot;useExplicitDryRunSpec&quot;: True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly
720 # exists for all Service Perimeters, and that spec is identical to the
721 # status for those Service Perimeters. When this flag is set, it inhibits the
722 # generation of the implicit spec, thereby allowing the user to explicitly
723 # provide a configuration (&quot;spec&quot;) to use in a dry-run version of the Service
724 # Perimeter. This allows the user to test changes to the enforced config
725 # (&quot;status&quot;) without actually enforcing them. This testing is done through
726 # analyzing the differences between currently enforced and suggested
727 # restrictions. use_explicit_dry_run_spec must bet set to True if any of the
728 # fields in the spec are set to non-default values.
729 &quot;description&quot;: &quot;A String&quot;, # Description of the `ServicePerimeter` and its use. Does not affect
730 # behavior.
731 &quot;status&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources,
Dan O'Mearadd494642020-05-01 07:42:23 -0700732 # restricted services and access levels that determine perimeter
733 # content and boundaries.
734 # describe specific Service Perimeter configuration.
Bu Sun Kim65020912020-05-20 12:08:20 -0700735 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
Dan O'Mearadd494642020-05-01 07:42:23 -0700736 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
737 # must be in the same policy as this `ServicePerimeter`. Referencing a
738 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
739 # listed, resources within the perimeter can only be accessed via Google
740 # Cloud calls with request origins within the perimeter. Example:
Bu Sun Kim65020912020-05-20 12:08:20 -0700741 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700742 # For Service Perimeter Bridge, must be empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700743 &quot;A String&quot;,
744 ],
745 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
746 # restrictions. For example, if `storage.googleapis.com` is specified, access
747 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
748 # access restrictions.
749 &quot;A String&quot;,
750 ],
751 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
752 # Perimeter.
753 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
754 # APIs specified in &#x27;allowed_services&#x27;.
755 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
756 # unless &#x27;enable_restriction&#x27; is True.
757 &quot;A String&quot;,
758 ],
759 },
760 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
761 # Currently only projects are allowed. Format: `projects/{project_number}`
762 &quot;A String&quot;,
Dan O'Mearadd494642020-05-01 07:42:23 -0700763 ],
764 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700765 &quot;spec&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration
766 # allows to specify and test ServicePerimeter configuration without enforcing
767 # actual access restrictions. Only allowed to be set when the
768 # &quot;use_explicit_dry_run_spec&quot; flag is set.
769 # describe specific Service Perimeter configuration.
770 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
771 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
772 # must be in the same policy as this `ServicePerimeter`. Referencing a
773 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
774 # listed, resources within the perimeter can only be accessed via Google
775 # Cloud calls with request origins within the perimeter. Example:
776 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
777 # For Service Perimeter Bridge, must be empty.
778 &quot;A String&quot;,
779 ],
780 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
781 # restrictions. For example, if `storage.googleapis.com` is specified, access
782 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
783 # access restrictions.
784 &quot;A String&quot;,
785 ],
786 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
787 # Perimeter.
788 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
789 # APIs specified in &#x27;allowed_services&#x27;.
790 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
791 # unless &#x27;enable_restriction&#x27; is True.
792 &quot;A String&quot;,
793 ],
794 },
795 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
796 # Currently only projects are allowed. Format: `projects/{project_number}`
797 &quot;A String&quot;,
798 ],
799 },
800 &quot;name&quot;: &quot;A String&quot;, # Required. Resource name for the ServicePerimeter. The `short_name`
801 # component must begin with a letter and only include alphanumeric and &#x27;_&#x27;.
802 # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}`
803 &quot;perimeterType&quot;: &quot;A String&quot;, # Perimeter type indicator. A single project is
Dan O'Mearadd494642020-05-01 07:42:23 -0700804 # allowed to be a member of single regular perimeter, but multiple service
805 # perimeter bridges. A project cannot be a included in a perimeter bridge
806 # without being included in regular perimeter. For perimeter bridges,
807 # the restricted service list as well as access level lists must be
808 # empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700809 &quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
Dan O'Mearadd494642020-05-01 07:42:23 -0700810}
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700811
812 updateMask: string, Required. Mask to control which fields get updated. Must be non-empty.
813 x__xgafv: string, V1 error format.
814 Allowed values
815 1 - v1 error format
816 2 - v2 error format
817
818Returns:
819 An object of the form:
820
821 { # This resource represents a long-running operation that is the result of a
822 # network API call.
Bu Sun Kim65020912020-05-20 12:08:20 -0700823 &quot;done&quot;: True or False, # If the value is `false`, it means the operation is still in progress.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700824 # If `true`, the operation is completed, and either `error` or `response` is
825 # available.
Bu Sun Kim65020912020-05-20 12:08:20 -0700826 &quot;response&quot;: { # The normal response of the operation in case of success. If the original
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700827 # method returns no data on success, such as `Delete`, the response is
828 # `google.protobuf.Empty`. If the original method is standard
829 # `Get`/`Create`/`Update`, the response should be the resource. For other
830 # methods, the response should have the type `XxxResponse`, where `Xxx`
831 # is the original method name. For example, if the original method name
832 # is `TakeSnapshot()`, the inferred response type is
833 # `TakeSnapshotResponse`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700834 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700835 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700836 &quot;name&quot;: &quot;A String&quot;, # The server-assigned name, which is only unique within the same service that
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700837 # originally returns it. If you use the default HTTP mapping, the
838 # `name` should be a resource name ending with `operations/{unique_id}`.
Bu Sun Kim65020912020-05-20 12:08:20 -0700839 &quot;error&quot;: { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation.
840 # different programming environments, including REST APIs and RPC APIs. It is
841 # used by [gRPC](https://github.com/grpc). Each `Status` message contains
842 # three pieces of data: error code, error message, and error details.
843 #
844 # You can find out more about this error model and how to work with it in the
845 # [API Design Guide](https://cloud.google.com/apis/design/errors).
846 &quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
847 &quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any
848 # user-facing error message should be localized and sent in the
849 # google.rpc.Status.details field, or localized by the client.
850 &quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of
851 # message types for APIs to use.
852 {
853 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
854 },
855 ],
856 },
857 &quot;metadata&quot;: { # Service-specific metadata associated with the operation. It typically
858 # contains progress information and common metadata such as create time.
859 # Some services might not provide such metadata. Any method that returns a
860 # long-running operation should document the metadata type, if any.
861 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
862 },
Bu Sun Kim715bd7f2019-06-14 16:50:42 -0700863 }</pre>
864</div>
865
Dan O'Mearadd494642020-05-01 07:42:23 -0700866<div class="method">
867 <code class="details" id="replaceAll">replaceAll(parent, body=None, x__xgafv=None)</code>
868 <pre>Replace all existing Service Perimeters in an
869Access Policy
870with the Service Perimeters provided.
871This is done atomically. The longrunning operation from this
872RPC will have a successful status once all replacements have propagated to
873long-lasting storage. Replacements containing errors will result in an
874error response for the first error encountered. Replacement will be
875cancelled on error, existing Service Perimeters will not be
876affected. Operation.response field will contain
877ReplaceServicePerimetersResponse.
878
879Args:
880 parent: string, Required. Resource name for the access policy which owns these
881Service Perimeters.
882
883Format: `accessPolicies/{policy_id}` (required)
884 body: object, The request body.
885 The object takes the form of:
886
887{ # A request to replace all existing Service Perimeters in an Access Policy
888 # with the Service Perimeters provided. This is done atomically.
Bu Sun Kim65020912020-05-20 12:08:20 -0700889 &quot;etag&quot;: &quot;A String&quot;, # Optional. The etag for the version of the Access Policy that this
Dan O'Mearadd494642020-05-01 07:42:23 -0700890 # replace operation is to be performed on. If, at the time of replace, the
891 # etag for the Access Policy stored in Access Context Manager is different
892 # from the specified etag, then the replace operation will not be performed
893 # and the call will fail. This field is not required. If etag is not
894 # provided, the operation will be performed as if a valid etag is provided.
Bu Sun Kim65020912020-05-20 12:08:20 -0700895 &quot;servicePerimeters&quot;: [ # Required. The desired Service Perimeters that should
Dan O'Mearadd494642020-05-01 07:42:23 -0700896 # replace all existing Service Perimeters in the
897 # Access Policy.
898 { # `ServicePerimeter` describes a set of Google Cloud resources which can freely
899 # import and export data amongst themselves, but not export outside of the
900 # `ServicePerimeter`. If a request with a source within this `ServicePerimeter`
901 # has a target outside of the `ServicePerimeter`, the request will be blocked.
902 # Otherwise the request is allowed. There are two types of Service Perimeter -
903 # Regular and Bridge. Regular Service Perimeters cannot overlap, a single
904 # Google Cloud project can only belong to a single regular Service Perimeter.
905 # Service Perimeter Bridges can contain only Google Cloud projects as members,
906 # a single Google Cloud project may belong to multiple Service Perimeter
907 # Bridges.
Bu Sun Kim65020912020-05-20 12:08:20 -0700908 &quot;useExplicitDryRunSpec&quot;: True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly
909 # exists for all Service Perimeters, and that spec is identical to the
910 # status for those Service Perimeters. When this flag is set, it inhibits the
911 # generation of the implicit spec, thereby allowing the user to explicitly
912 # provide a configuration (&quot;spec&quot;) to use in a dry-run version of the Service
913 # Perimeter. This allows the user to test changes to the enforced config
914 # (&quot;status&quot;) without actually enforcing them. This testing is done through
915 # analyzing the differences between currently enforced and suggested
916 # restrictions. use_explicit_dry_run_spec must bet set to True if any of the
917 # fields in the spec are set to non-default values.
918 &quot;description&quot;: &quot;A String&quot;, # Description of the `ServicePerimeter` and its use. Does not affect
919 # behavior.
920 &quot;status&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources,
Dan O'Mearadd494642020-05-01 07:42:23 -0700921 # restricted services and access levels that determine perimeter
922 # content and boundaries.
923 # describe specific Service Perimeter configuration.
Bu Sun Kim65020912020-05-20 12:08:20 -0700924 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
Dan O'Mearadd494642020-05-01 07:42:23 -0700925 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
926 # must be in the same policy as this `ServicePerimeter`. Referencing a
927 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
928 # listed, resources within the perimeter can only be accessed via Google
929 # Cloud calls with request origins within the perimeter. Example:
Bu Sun Kim65020912020-05-20 12:08:20 -0700930 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
Dan O'Mearadd494642020-05-01 07:42:23 -0700931 # For Service Perimeter Bridge, must be empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700932 &quot;A String&quot;,
933 ],
934 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
935 # restrictions. For example, if `storage.googleapis.com` is specified, access
936 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
937 # access restrictions.
938 &quot;A String&quot;,
939 ],
940 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
941 # Perimeter.
942 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
943 # APIs specified in &#x27;allowed_services&#x27;.
944 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
945 # unless &#x27;enable_restriction&#x27; is True.
946 &quot;A String&quot;,
947 ],
948 },
949 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
950 # Currently only projects are allowed. Format: `projects/{project_number}`
951 &quot;A String&quot;,
Dan O'Mearadd494642020-05-01 07:42:23 -0700952 ],
953 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700954 &quot;spec&quot;: { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration
955 # allows to specify and test ServicePerimeter configuration without enforcing
956 # actual access restrictions. Only allowed to be set when the
957 # &quot;use_explicit_dry_run_spec&quot; flag is set.
958 # describe specific Service Perimeter configuration.
959 &quot;accessLevels&quot;: [ # A list of `AccessLevel` resource names that allow resources within the
960 # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed
961 # must be in the same policy as this `ServicePerimeter`. Referencing a
962 # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are
963 # listed, resources within the perimeter can only be accessed via Google
964 # Cloud calls with request origins within the perimeter. Example:
965 # `&quot;accessPolicies/MY_POLICY/accessLevels/MY_LEVEL&quot;`.
966 # For Service Perimeter Bridge, must be empty.
967 &quot;A String&quot;,
968 ],
969 &quot;restrictedServices&quot;: [ # Google Cloud services that are subject to the Service Perimeter
970 # restrictions. For example, if `storage.googleapis.com` is specified, access
971 # to the storage buckets inside the perimeter must meet the perimeter&#x27;s
972 # access restrictions.
973 &quot;A String&quot;,
974 ],
975 &quot;vpcAccessibleServices&quot;: { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter.
976 # Perimeter.
977 &quot;enableRestriction&quot;: True or False, # Whether to restrict API calls within the Service Perimeter to the list of
978 # APIs specified in &#x27;allowed_services&#x27;.
979 &quot;allowedServices&quot;: [ # The list of APIs usable within the Service Perimeter. Must be empty
980 # unless &#x27;enable_restriction&#x27; is True.
981 &quot;A String&quot;,
982 ],
983 },
984 &quot;resources&quot;: [ # A list of Google Cloud resources that are inside of the service perimeter.
985 # Currently only projects are allowed. Format: `projects/{project_number}`
986 &quot;A String&quot;,
987 ],
988 },
989 &quot;name&quot;: &quot;A String&quot;, # Required. Resource name for the ServicePerimeter. The `short_name`
990 # component must begin with a letter and only include alphanumeric and &#x27;_&#x27;.
991 # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}`
992 &quot;perimeterType&quot;: &quot;A String&quot;, # Perimeter type indicator. A single project is
Dan O'Mearadd494642020-05-01 07:42:23 -0700993 # allowed to be a member of single regular perimeter, but multiple service
994 # perimeter bridges. A project cannot be a included in a perimeter bridge
995 # without being included in regular perimeter. For perimeter bridges,
996 # the restricted service list as well as access level lists must be
997 # empty.
Bu Sun Kim65020912020-05-20 12:08:20 -0700998 &quot;title&quot;: &quot;A String&quot;, # Human readable title. Must be unique within the Policy.
Dan O'Mearadd494642020-05-01 07:42:23 -0700999 },
1000 ],
1001 }
1002
1003 x__xgafv: string, V1 error format.
1004 Allowed values
1005 1 - v1 error format
1006 2 - v2 error format
1007
1008Returns:
1009 An object of the form:
1010
1011 { # This resource represents a long-running operation that is the result of a
1012 # network API call.
Bu Sun Kim65020912020-05-20 12:08:20 -07001013 &quot;done&quot;: True or False, # If the value is `false`, it means the operation is still in progress.
Dan O'Mearadd494642020-05-01 07:42:23 -07001014 # If `true`, the operation is completed, and either `error` or `response` is
1015 # available.
Bu Sun Kim65020912020-05-20 12:08:20 -07001016 &quot;response&quot;: { # The normal response of the operation in case of success. If the original
Dan O'Mearadd494642020-05-01 07:42:23 -07001017 # method returns no data on success, such as `Delete`, the response is
1018 # `google.protobuf.Empty`. If the original method is standard
1019 # `Get`/`Create`/`Update`, the response should be the resource. For other
1020 # methods, the response should have the type `XxxResponse`, where `Xxx`
1021 # is the original method name. For example, if the original method name
1022 # is `TakeSnapshot()`, the inferred response type is
1023 # `TakeSnapshotResponse`.
Bu Sun Kim65020912020-05-20 12:08:20 -07001024 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
Dan O'Mearadd494642020-05-01 07:42:23 -07001025 },
Bu Sun Kim65020912020-05-20 12:08:20 -07001026 &quot;name&quot;: &quot;A String&quot;, # The server-assigned name, which is only unique within the same service that
Dan O'Mearadd494642020-05-01 07:42:23 -07001027 # originally returns it. If you use the default HTTP mapping, the
1028 # `name` should be a resource name ending with `operations/{unique_id}`.
Bu Sun Kim65020912020-05-20 12:08:20 -07001029 &quot;error&quot;: { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation.
1030 # different programming environments, including REST APIs and RPC APIs. It is
1031 # used by [gRPC](https://github.com/grpc). Each `Status` message contains
1032 # three pieces of data: error code, error message, and error details.
1033 #
1034 # You can find out more about this error model and how to work with it in the
1035 # [API Design Guide](https://cloud.google.com/apis/design/errors).
1036 &quot;code&quot;: 42, # The status code, which should be an enum value of google.rpc.Code.
1037 &quot;message&quot;: &quot;A String&quot;, # A developer-facing error message, which should be in English. Any
1038 # user-facing error message should be localized and sent in the
1039 # google.rpc.Status.details field, or localized by the client.
1040 &quot;details&quot;: [ # A list of messages that carry the error details. There is a common set of
1041 # message types for APIs to use.
1042 {
1043 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
1044 },
1045 ],
1046 },
1047 &quot;metadata&quot;: { # Service-specific metadata associated with the operation. It typically
1048 # contains progress information and common metadata such as create time.
1049 # Some services might not provide such metadata. Any method that returns a
1050 # long-running operation should document the metadata type, if any.
1051 &quot;a_key&quot;: &quot;&quot;, # Properties of the object. Contains field @type with type URL.
1052 },
Dan O'Mearadd494642020-05-01 07:42:23 -07001053 }</pre>
1054</div>
1055
Bu Sun Kim715bd7f2019-06-14 16:50:42 -07001056</body></html>