| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 1 | <html><body> | 
 | 2 | <style> | 
 | 3 |  | 
 | 4 | body, h1, h2, h3, div, span, p, pre, a { | 
 | 5 |   margin: 0; | 
 | 6 |   padding: 0; | 
 | 7 |   border: 0; | 
 | 8 |   font-weight: inherit; | 
 | 9 |   font-style: inherit; | 
 | 10 |   font-size: 100%; | 
 | 11 |   font-family: inherit; | 
 | 12 |   vertical-align: baseline; | 
 | 13 | } | 
 | 14 |  | 
 | 15 | body { | 
 | 16 |   font-size: 13px; | 
 | 17 |   padding: 1em; | 
 | 18 | } | 
 | 19 |  | 
 | 20 | h1 { | 
 | 21 |   font-size: 26px; | 
 | 22 |   margin-bottom: 1em; | 
 | 23 | } | 
 | 24 |  | 
 | 25 | h2 { | 
 | 26 |   font-size: 24px; | 
 | 27 |   margin-bottom: 1em; | 
 | 28 | } | 
 | 29 |  | 
 | 30 | h3 { | 
 | 31 |   font-size: 20px; | 
 | 32 |   margin-bottom: 1em; | 
 | 33 |   margin-top: 1em; | 
 | 34 | } | 
 | 35 |  | 
 | 36 | pre, code { | 
 | 37 |   line-height: 1.5; | 
 | 38 |   font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace; | 
 | 39 | } | 
 | 40 |  | 
 | 41 | pre { | 
 | 42 |   margin-top: 0.5em; | 
 | 43 | } | 
 | 44 |  | 
 | 45 | h1, h2, h3, p { | 
 | 46 |   font-family: Arial, sans serif; | 
 | 47 | } | 
 | 48 |  | 
 | 49 | h1, h2, h3 { | 
 | 50 |   border-bottom: solid #CCC 1px; | 
 | 51 | } | 
 | 52 |  | 
 | 53 | .toc_element { | 
 | 54 |   margin-top: 0.5em; | 
 | 55 | } | 
 | 56 |  | 
 | 57 | .firstline { | 
 | 58 |   margin-left: 2 em; | 
 | 59 | } | 
 | 60 |  | 
 | 61 | .method  { | 
 | 62 |   margin-top: 1em; | 
 | 63 |   border: solid 1px #CCC; | 
 | 64 |   padding: 1em; | 
 | 65 |   background: #EEE; | 
 | 66 | } | 
 | 67 |  | 
 | 68 | .details { | 
 | 69 |   font-weight: bold; | 
 | 70 |   font-size: 14px; | 
 | 71 | } | 
 | 72 |  | 
 | 73 | </style> | 
 | 74 |  | 
 | 75 | <h1><a href="accesscontextmanager_v1.html">Access Context Manager API</a> . <a href="accesscontextmanager_v1.accessPolicies.html">accessPolicies</a> . <a href="accesscontextmanager_v1.accessPolicies.servicePerimeters.html">servicePerimeters</a></h1> | 
 | 76 | <h2>Instance Methods</h2> | 
 | 77 | <p class="toc_element"> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 78 |   <code><a href="#commit">commit(parent, body=None, x__xgafv=None)</a></code></p> | 
 | 79 | <p class="firstline">Commit the dry-run spec for all the Service Perimeters in an</p> | 
 | 80 | <p class="toc_element"> | 
 | 81 |   <code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p> | 
 | 82 | <p class="firstline">Create a Service Perimeter. The</p> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 83 | <p class="toc_element"> | 
 | 84 |   <code><a href="#delete">delete(name, x__xgafv=None)</a></code></p> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 85 | <p class="firstline">Delete a Service Perimeter by resource</p> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 86 | <p class="toc_element"> | 
 | 87 |   <code><a href="#get">get(name, x__xgafv=None)</a></code></p> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 88 | <p class="firstline">Get a Service Perimeter by resource</p> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 89 | <p class="toc_element"> | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 90 |   <code><a href="#list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</a></code></p> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 91 | <p class="firstline">List all Service Perimeters for an</p> | 
 | 92 | <p class="toc_element"> | 
 | 93 |   <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p> | 
 | 94 | <p class="firstline">Retrieves the next page of results.</p> | 
 | 95 | <p class="toc_element"> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 96 |   <code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p> | 
 | 97 | <p class="firstline">Update a Service Perimeter. The</p> | 
 | 98 | <p class="toc_element"> | 
 | 99 |   <code><a href="#replaceAll">replaceAll(parent, body=None, x__xgafv=None)</a></code></p> | 
 | 100 | <p class="firstline">Replace all existing Service Perimeters in an</p> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 101 | <h3>Method Details</h3> | 
 | 102 | <div class="method"> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 103 |     <code class="details" id="commit">commit(parent, body=None, x__xgafv=None)</code> | 
 | 104 |   <pre>Commit the dry-run spec for all the Service Perimeters in an | 
 | 105 | Access Policy. | 
 | 106 | A commit operation on a Service Perimeter involves copying its `spec` field | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 107 | to that Service Perimeter's `status` field. Only Service Perimeters with | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 108 | `use_explicit_dry_run_spec` field set to true are affected by a commit | 
 | 109 | operation. The longrunning operation from this RPC will have a successful | 
 | 110 | status once the dry-run specs for all the Service Perimeters have been | 
 | 111 | committed. If a commit fails, it will cause the longrunning operation to | 
 | 112 | return an error response and the entire commit operation will be cancelled. | 
 | 113 | When successful, Operation.response field will contain | 
 | 114 | CommitServicePerimetersResponse. The `dry_run` and the `spec` fields will | 
 | 115 | be cleared after a successful commit operation. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 116 |  | 
 | 117 | Args: | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 118 |   parent: string, Required. Resource name for the parent Access Policy which owns all | 
 | 119 | Service Perimeters in scope for | 
 | 120 | the commit operation. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 121 |  | 
 | 122 | Format: `accessPolicies/{policy_id}` (required) | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 123 |   body: object, The request body. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 124 |     The object takes the form of: | 
 | 125 |  | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 126 | { # A request to commit dry-run specs in all Service Perimeters belonging to | 
 | 127 |       # an Access Policy. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 128 |     "etag": "A String", # Optional. The etag for the version of the Access Policy that this | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 129 |         # commit operation is to be performed on. If, at the time of commit, the | 
 | 130 |         # etag for the Access Policy stored in Access Context Manager is different | 
 | 131 |         # from the specified etag, then the commit operation will not be performed | 
 | 132 |         # and the call will fail. This field is not required. If etag is not | 
 | 133 |         # provided, the operation will be performed as if a valid etag is provided. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 134 |   } | 
 | 135 |  | 
 | 136 |   x__xgafv: string, V1 error format. | 
 | 137 |     Allowed values | 
 | 138 |       1 - v1 error format | 
 | 139 |       2 - v2 error format | 
 | 140 |  | 
 | 141 | Returns: | 
 | 142 |   An object of the form: | 
 | 143 |  | 
 | 144 |     { # This resource represents a long-running operation that is the result of a | 
 | 145 |       # network API call. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 146 |     "name": "A String", # The server-assigned name, which is only unique within the same service that | 
 | 147 |         # originally returns it. If you use the default HTTP mapping, the | 
 | 148 |         # `name` should be a resource name ending with `operations/{unique_id}`. | 
 | 149 |     "error": { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation. | 
 | 150 |         # different programming environments, including REST APIs and RPC APIs. It is | 
 | 151 |         # used by [gRPC](https://github.com/grpc). Each `Status` message contains | 
 | 152 |         # three pieces of data: error code, error message, and error details. | 
 | 153 |         # | 
 | 154 |         # You can find out more about this error model and how to work with it in the | 
 | 155 |         # [API Design Guide](https://cloud.google.com/apis/design/errors). | 
 | 156 |       "message": "A String", # A developer-facing error message, which should be in English. Any | 
 | 157 |           # user-facing error message should be localized and sent in the | 
 | 158 |           # google.rpc.Status.details field, or localized by the client. | 
 | 159 |       "details": [ # A list of messages that carry the error details.  There is a common set of | 
 | 160 |           # message types for APIs to use. | 
 | 161 |         { | 
 | 162 |           "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 163 |         }, | 
 | 164 |       ], | 
 | 165 |       "code": 42, # The status code, which should be an enum value of google.rpc.Code. | 
 | 166 |     }, | 
 | 167 |     "metadata": { # Service-specific metadata associated with the operation.  It typically | 
 | 168 |         # contains progress information and common metadata such as create time. | 
 | 169 |         # Some services might not provide such metadata.  Any method that returns a | 
 | 170 |         # long-running operation should document the metadata type, if any. | 
 | 171 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 172 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 173 |     "done": True or False, # If the value is `false`, it means the operation is still in progress. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 174 |         # If `true`, the operation is completed, and either `error` or `response` is | 
 | 175 |         # available. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 176 |     "response": { # The normal response of the operation in case of success.  If the original | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 177 |         # method returns no data on success, such as `Delete`, the response is | 
 | 178 |         # `google.protobuf.Empty`.  If the original method is standard | 
 | 179 |         # `Get`/`Create`/`Update`, the response should be the resource.  For other | 
 | 180 |         # methods, the response should have the type `XxxResponse`, where `Xxx` | 
 | 181 |         # is the original method name.  For example, if the original method name | 
 | 182 |         # is `TakeSnapshot()`, the inferred response type is | 
 | 183 |         # `TakeSnapshotResponse`. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 184 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 185 |     }, | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 186 |   }</pre> | 
 | 187 | </div> | 
 | 188 |  | 
 | 189 | <div class="method"> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 190 |     <code class="details" id="create">create(parent, body=None, x__xgafv=None)</code> | 
 | 191 |   <pre>Create a Service Perimeter. The | 
 | 192 | longrunning operation from this RPC will have a successful status once the | 
 | 193 | Service Perimeter has | 
 | 194 | propagated to long-lasting storage. Service Perimeters containing | 
 | 195 | errors will result in an error response for the first error encountered. | 
 | 196 |  | 
 | 197 | Args: | 
 | 198 |   parent: string, Required. Resource name for the access policy which owns this Service | 
 | 199 | Perimeter. | 
 | 200 |  | 
 | 201 | Format: `accessPolicies/{policy_id}` (required) | 
 | 202 |   body: object, The request body. | 
 | 203 |     The object takes the form of: | 
 | 204 |  | 
 | 205 | { # `ServicePerimeter` describes a set of Google Cloud resources which can freely | 
 | 206 |     # import and export data amongst themselves, but not export outside of the | 
 | 207 |     # `ServicePerimeter`. If a request with a source within this `ServicePerimeter` | 
 | 208 |     # has a target outside of the `ServicePerimeter`, the request will be blocked. | 
 | 209 |     # Otherwise the request is allowed. There are two types of Service Perimeter - | 
 | 210 |     # Regular and Bridge. Regular Service Perimeters cannot overlap, a single | 
 | 211 |     # Google Cloud project can only belong to a single regular Service Perimeter. | 
 | 212 |     # Service Perimeter Bridges can contain only Google Cloud projects as members, | 
 | 213 |     # a single Google Cloud project may belong to multiple Service Perimeter | 
 | 214 |     # Bridges. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 215 |   "name": "A String", # Required. Resource name for the ServicePerimeter.  The `short_name` | 
 | 216 |       # component must begin with a letter and only include alphanumeric and '_'. | 
 | 217 |       # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` | 
 | 218 |   "perimeterType": "A String", # Perimeter type indicator. A single project is | 
 | 219 |       # allowed to be a member of single regular perimeter, but multiple service | 
 | 220 |       # perimeter bridges. A project cannot be a included in a perimeter bridge | 
 | 221 |       # without being included in regular perimeter. For perimeter bridges, | 
 | 222 |       # the restricted service list as well as access level lists must be | 
 | 223 |       # empty. | 
 | 224 |   "title": "A String", # Human readable title. Must be unique within the Policy. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 225 |   "useExplicitDryRunSpec": True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly | 
 | 226 |       # exists  for all Service Perimeters, and that spec is identical to the | 
 | 227 |       # status for those Service Perimeters. When this flag is set, it inhibits the | 
 | 228 |       # generation of the implicit spec, thereby allowing the user to explicitly | 
 | 229 |       # provide a configuration ("spec") to use in a dry-run version of the Service | 
 | 230 |       # Perimeter. This allows the user to test changes to the enforced config | 
 | 231 |       # ("status") without actually enforcing them. This testing is done through | 
 | 232 |       # analyzing the differences between currently enforced and suggested | 
 | 233 |       # restrictions. use_explicit_dry_run_spec must bet set to True if any of the | 
 | 234 |       # fields in the spec are set to non-default values. | 
 | 235 |   "description": "A String", # Description of the `ServicePerimeter` and its use. Does not affect | 
 | 236 |       # behavior. | 
 | 237 |   "status": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 238 |       # restricted services and access levels that determine perimeter | 
 | 239 |       # content and boundaries. | 
 | 240 |       # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 241 |     "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 242 |         # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 243 |       "A String", | 
 | 244 |     ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 245 |     "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 246 |         # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 247 |         # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 248 |         # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 249 |         # listed, resources within the perimeter can only be accessed via Google | 
 | 250 |         # Cloud calls with request origins within the perimeter. Example: | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 251 |         # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 252 |         # For Service Perimeter Bridge, must be empty. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 253 |       "A String", | 
 | 254 |     ], | 
 | 255 |     "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 256 |         # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 257 |         # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 258 |         # access restrictions. | 
 | 259 |       "A String", | 
 | 260 |     ], | 
 | 261 |     "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 262 |         # Perimeter. | 
 | 263 |       "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 264 |           # APIs specified in 'allowed_services'. | 
 | 265 |       "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 266 |           # unless 'enable_restriction' is True. | 
 | 267 |         "A String", | 
 | 268 |       ], | 
 | 269 |     }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 270 |   }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 271 |   "spec": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration | 
 | 272 |       # allows to specify and test ServicePerimeter configuration without enforcing | 
 | 273 |       # actual access restrictions. Only allowed to be set when the | 
 | 274 |       # "use_explicit_dry_run_spec" flag is set. | 
 | 275 |       # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 276 |     "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 277 |         # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 278 |       "A String", | 
 | 279 |     ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 280 |     "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
 | 281 |         # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 282 |         # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 283 |         # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 284 |         # listed, resources within the perimeter can only be accessed via Google | 
 | 285 |         # Cloud calls with request origins within the perimeter. Example: | 
 | 286 |         # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
 | 287 |         # For Service Perimeter Bridge, must be empty. | 
 | 288 |       "A String", | 
 | 289 |     ], | 
 | 290 |     "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 291 |         # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 292 |         # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 293 |         # access restrictions. | 
 | 294 |       "A String", | 
 | 295 |     ], | 
 | 296 |     "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 297 |         # Perimeter. | 
 | 298 |       "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 299 |           # APIs specified in 'allowed_services'. | 
 | 300 |       "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 301 |           # unless 'enable_restriction' is True. | 
 | 302 |         "A String", | 
 | 303 |       ], | 
 | 304 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 305 |   }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 306 | } | 
 | 307 |  | 
 | 308 |   x__xgafv: string, V1 error format. | 
 | 309 |     Allowed values | 
 | 310 |       1 - v1 error format | 
 | 311 |       2 - v2 error format | 
 | 312 |  | 
 | 313 | Returns: | 
 | 314 |   An object of the form: | 
 | 315 |  | 
 | 316 |     { # This resource represents a long-running operation that is the result of a | 
 | 317 |       # network API call. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 318 |     "name": "A String", # The server-assigned name, which is only unique within the same service that | 
 | 319 |         # originally returns it. If you use the default HTTP mapping, the | 
 | 320 |         # `name` should be a resource name ending with `operations/{unique_id}`. | 
 | 321 |     "error": { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation. | 
 | 322 |         # different programming environments, including REST APIs and RPC APIs. It is | 
 | 323 |         # used by [gRPC](https://github.com/grpc). Each `Status` message contains | 
 | 324 |         # three pieces of data: error code, error message, and error details. | 
 | 325 |         # | 
 | 326 |         # You can find out more about this error model and how to work with it in the | 
 | 327 |         # [API Design Guide](https://cloud.google.com/apis/design/errors). | 
 | 328 |       "message": "A String", # A developer-facing error message, which should be in English. Any | 
 | 329 |           # user-facing error message should be localized and sent in the | 
 | 330 |           # google.rpc.Status.details field, or localized by the client. | 
 | 331 |       "details": [ # A list of messages that carry the error details.  There is a common set of | 
 | 332 |           # message types for APIs to use. | 
 | 333 |         { | 
 | 334 |           "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 335 |         }, | 
 | 336 |       ], | 
 | 337 |       "code": 42, # The status code, which should be an enum value of google.rpc.Code. | 
 | 338 |     }, | 
 | 339 |     "metadata": { # Service-specific metadata associated with the operation.  It typically | 
 | 340 |         # contains progress information and common metadata such as create time. | 
 | 341 |         # Some services might not provide such metadata.  Any method that returns a | 
 | 342 |         # long-running operation should document the metadata type, if any. | 
 | 343 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 344 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 345 |     "done": True or False, # If the value is `false`, it means the operation is still in progress. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 346 |         # If `true`, the operation is completed, and either `error` or `response` is | 
 | 347 |         # available. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 348 |     "response": { # The normal response of the operation in case of success.  If the original | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 349 |         # method returns no data on success, such as `Delete`, the response is | 
 | 350 |         # `google.protobuf.Empty`.  If the original method is standard | 
 | 351 |         # `Get`/`Create`/`Update`, the response should be the resource.  For other | 
 | 352 |         # methods, the response should have the type `XxxResponse`, where `Xxx` | 
 | 353 |         # is the original method name.  For example, if the original method name | 
 | 354 |         # is `TakeSnapshot()`, the inferred response type is | 
 | 355 |         # `TakeSnapshotResponse`. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 356 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 357 |     }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 358 |   }</pre> | 
 | 359 | </div> | 
 | 360 |  | 
 | 361 | <div class="method"> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 362 |     <code class="details" id="delete">delete(name, x__xgafv=None)</code> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 363 |   <pre>Delete a Service Perimeter by resource | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 364 | name. The longrunning operation from this RPC will have a successful status | 
 | 365 | once the Service Perimeter has been | 
 | 366 | removed from long-lasting storage. | 
 | 367 |  | 
 | 368 | Args: | 
 | 369 |   name: string, Required. Resource name for the Service Perimeter. | 
 | 370 |  | 
 | 371 | Format: | 
 | 372 | `accessPolicies/{policy_id}/servicePerimeters/{service_perimeter_id}` (required) | 
 | 373 |   x__xgafv: string, V1 error format. | 
 | 374 |     Allowed values | 
 | 375 |       1 - v1 error format | 
 | 376 |       2 - v2 error format | 
 | 377 |  | 
 | 378 | Returns: | 
 | 379 |   An object of the form: | 
 | 380 |  | 
 | 381 |     { # This resource represents a long-running operation that is the result of a | 
 | 382 |       # network API call. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 383 |     "name": "A String", # The server-assigned name, which is only unique within the same service that | 
 | 384 |         # originally returns it. If you use the default HTTP mapping, the | 
 | 385 |         # `name` should be a resource name ending with `operations/{unique_id}`. | 
 | 386 |     "error": { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation. | 
 | 387 |         # different programming environments, including REST APIs and RPC APIs. It is | 
 | 388 |         # used by [gRPC](https://github.com/grpc). Each `Status` message contains | 
 | 389 |         # three pieces of data: error code, error message, and error details. | 
 | 390 |         # | 
 | 391 |         # You can find out more about this error model and how to work with it in the | 
 | 392 |         # [API Design Guide](https://cloud.google.com/apis/design/errors). | 
 | 393 |       "message": "A String", # A developer-facing error message, which should be in English. Any | 
 | 394 |           # user-facing error message should be localized and sent in the | 
 | 395 |           # google.rpc.Status.details field, or localized by the client. | 
 | 396 |       "details": [ # A list of messages that carry the error details.  There is a common set of | 
 | 397 |           # message types for APIs to use. | 
 | 398 |         { | 
 | 399 |           "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 400 |         }, | 
 | 401 |       ], | 
 | 402 |       "code": 42, # The status code, which should be an enum value of google.rpc.Code. | 
 | 403 |     }, | 
 | 404 |     "metadata": { # Service-specific metadata associated with the operation.  It typically | 
 | 405 |         # contains progress information and common metadata such as create time. | 
 | 406 |         # Some services might not provide such metadata.  Any method that returns a | 
 | 407 |         # long-running operation should document the metadata type, if any. | 
 | 408 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 409 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 410 |     "done": True or False, # If the value is `false`, it means the operation is still in progress. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 411 |         # If `true`, the operation is completed, and either `error` or `response` is | 
 | 412 |         # available. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 413 |     "response": { # The normal response of the operation in case of success.  If the original | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 414 |         # method returns no data on success, such as `Delete`, the response is | 
 | 415 |         # `google.protobuf.Empty`.  If the original method is standard | 
 | 416 |         # `Get`/`Create`/`Update`, the response should be the resource.  For other | 
 | 417 |         # methods, the response should have the type `XxxResponse`, where `Xxx` | 
 | 418 |         # is the original method name.  For example, if the original method name | 
 | 419 |         # is `TakeSnapshot()`, the inferred response type is | 
 | 420 |         # `TakeSnapshotResponse`. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 421 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 422 |     }, | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 423 |   }</pre> | 
 | 424 | </div> | 
 | 425 |  | 
 | 426 | <div class="method"> | 
 | 427 |     <code class="details" id="get">get(name, x__xgafv=None)</code> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 428 |   <pre>Get a Service Perimeter by resource | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 429 | name. | 
 | 430 |  | 
 | 431 | Args: | 
 | 432 |   name: string, Required. Resource name for the Service Perimeter. | 
 | 433 |  | 
 | 434 | Format: | 
 | 435 | `accessPolicies/{policy_id}/servicePerimeters/{service_perimeters_id}` (required) | 
 | 436 |   x__xgafv: string, V1 error format. | 
 | 437 |     Allowed values | 
 | 438 |       1 - v1 error format | 
 | 439 |       2 - v2 error format | 
 | 440 |  | 
 | 441 | Returns: | 
 | 442 |   An object of the form: | 
 | 443 |  | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 444 |     { # `ServicePerimeter` describes a set of Google Cloud resources which can freely | 
 | 445 |       # import and export data amongst themselves, but not export outside of the | 
 | 446 |       # `ServicePerimeter`. If a request with a source within this `ServicePerimeter` | 
 | 447 |       # has a target outside of the `ServicePerimeter`, the request will be blocked. | 
 | 448 |       # Otherwise the request is allowed. There are two types of Service Perimeter - | 
 | 449 |       # Regular and Bridge. Regular Service Perimeters cannot overlap, a single | 
 | 450 |       # Google Cloud project can only belong to a single regular Service Perimeter. | 
 | 451 |       # Service Perimeter Bridges can contain only Google Cloud projects as members, | 
 | 452 |       # a single Google Cloud project may belong to multiple Service Perimeter | 
 | 453 |       # Bridges. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 454 |     "name": "A String", # Required. Resource name for the ServicePerimeter.  The `short_name` | 
 | 455 |         # component must begin with a letter and only include alphanumeric and '_'. | 
 | 456 |         # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` | 
 | 457 |     "perimeterType": "A String", # Perimeter type indicator. A single project is | 
 | 458 |         # allowed to be a member of single regular perimeter, but multiple service | 
 | 459 |         # perimeter bridges. A project cannot be a included in a perimeter bridge | 
 | 460 |         # without being included in regular perimeter. For perimeter bridges, | 
 | 461 |         # the restricted service list as well as access level lists must be | 
 | 462 |         # empty. | 
 | 463 |     "title": "A String", # Human readable title. Must be unique within the Policy. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 464 |     "useExplicitDryRunSpec": True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly | 
 | 465 |         # exists  for all Service Perimeters, and that spec is identical to the | 
 | 466 |         # status for those Service Perimeters. When this flag is set, it inhibits the | 
 | 467 |         # generation of the implicit spec, thereby allowing the user to explicitly | 
 | 468 |         # provide a configuration ("spec") to use in a dry-run version of the Service | 
 | 469 |         # Perimeter. This allows the user to test changes to the enforced config | 
 | 470 |         # ("status") without actually enforcing them. This testing is done through | 
 | 471 |         # analyzing the differences between currently enforced and suggested | 
 | 472 |         # restrictions. use_explicit_dry_run_spec must bet set to True if any of the | 
 | 473 |         # fields in the spec are set to non-default values. | 
 | 474 |     "description": "A String", # Description of the `ServicePerimeter` and its use. Does not affect | 
 | 475 |         # behavior. | 
 | 476 |     "status": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 477 |         # restricted services and access levels that determine perimeter | 
 | 478 |         # content and boundaries. | 
 | 479 |         # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 480 |       "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 481 |           # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 482 |         "A String", | 
 | 483 |       ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 484 |       "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 485 |           # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 486 |           # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 487 |           # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 488 |           # listed, resources within the perimeter can only be accessed via Google | 
 | 489 |           # Cloud calls with request origins within the perimeter. Example: | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 490 |           # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 491 |           # For Service Perimeter Bridge, must be empty. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 492 |         "A String", | 
 | 493 |       ], | 
 | 494 |       "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 495 |           # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 496 |           # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 497 |           # access restrictions. | 
 | 498 |         "A String", | 
 | 499 |       ], | 
 | 500 |       "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 501 |           # Perimeter. | 
 | 502 |         "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 503 |             # APIs specified in 'allowed_services'. | 
 | 504 |         "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 505 |             # unless 'enable_restriction' is True. | 
 | 506 |           "A String", | 
 | 507 |         ], | 
 | 508 |       }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 509 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 510 |     "spec": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration | 
 | 511 |         # allows to specify and test ServicePerimeter configuration without enforcing | 
 | 512 |         # actual access restrictions. Only allowed to be set when the | 
 | 513 |         # "use_explicit_dry_run_spec" flag is set. | 
 | 514 |         # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 515 |       "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 516 |           # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 517 |         "A String", | 
 | 518 |       ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 519 |       "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
 | 520 |           # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 521 |           # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 522 |           # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 523 |           # listed, resources within the perimeter can only be accessed via Google | 
 | 524 |           # Cloud calls with request origins within the perimeter. Example: | 
 | 525 |           # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
 | 526 |           # For Service Perimeter Bridge, must be empty. | 
 | 527 |         "A String", | 
 | 528 |       ], | 
 | 529 |       "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 530 |           # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 531 |           # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 532 |           # access restrictions. | 
 | 533 |         "A String", | 
 | 534 |       ], | 
 | 535 |       "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 536 |           # Perimeter. | 
 | 537 |         "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 538 |             # APIs specified in 'allowed_services'. | 
 | 539 |         "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 540 |             # unless 'enable_restriction' is True. | 
 | 541 |           "A String", | 
 | 542 |         ], | 
 | 543 |       }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 544 |     }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 545 |   }</pre> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 546 | </div> | 
 | 547 |  | 
 | 548 | <div class="method"> | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 549 |     <code class="details" id="list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</code> | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 550 |   <pre>List all Service Perimeters for an | 
 | 551 | access policy. | 
 | 552 |  | 
 | 553 | Args: | 
 | 554 |   parent: string, Required. Resource name for the access policy to list Service Perimeters from. | 
 | 555 |  | 
 | 556 | Format: | 
 | 557 | `accessPolicies/{policy_id}` (required) | 
 | 558 |   pageToken: string, Next page token for the next batch of Service Perimeter instances. | 
 | 559 | Defaults to the first page of results. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 560 |   pageSize: integer, Number of Service Perimeters to include | 
 | 561 | in the list. Default 100. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 562 |   x__xgafv: string, V1 error format. | 
 | 563 |     Allowed values | 
 | 564 |       1 - v1 error format | 
 | 565 |       2 - v2 error format | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 566 |  | 
 | 567 | Returns: | 
 | 568 |   An object of the form: | 
 | 569 |  | 
 | 570 |     { # A response to `ListServicePerimetersRequest`. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 571 |     "servicePerimeters": [ # List of the Service Perimeter instances. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 572 |       { # `ServicePerimeter` describes a set of Google Cloud resources which can freely | 
 | 573 |           # import and export data amongst themselves, but not export outside of the | 
 | 574 |           # `ServicePerimeter`. If a request with a source within this `ServicePerimeter` | 
 | 575 |           # has a target outside of the `ServicePerimeter`, the request will be blocked. | 
 | 576 |           # Otherwise the request is allowed. There are two types of Service Perimeter - | 
 | 577 |           # Regular and Bridge. Regular Service Perimeters cannot overlap, a single | 
 | 578 |           # Google Cloud project can only belong to a single regular Service Perimeter. | 
 | 579 |           # Service Perimeter Bridges can contain only Google Cloud projects as members, | 
 | 580 |           # a single Google Cloud project may belong to multiple Service Perimeter | 
 | 581 |           # Bridges. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 582 |         "name": "A String", # Required. Resource name for the ServicePerimeter.  The `short_name` | 
 | 583 |             # component must begin with a letter and only include alphanumeric and '_'. | 
 | 584 |             # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` | 
 | 585 |         "perimeterType": "A String", # Perimeter type indicator. A single project is | 
 | 586 |             # allowed to be a member of single regular perimeter, but multiple service | 
 | 587 |             # perimeter bridges. A project cannot be a included in a perimeter bridge | 
 | 588 |             # without being included in regular perimeter. For perimeter bridges, | 
 | 589 |             # the restricted service list as well as access level lists must be | 
 | 590 |             # empty. | 
 | 591 |         "title": "A String", # Human readable title. Must be unique within the Policy. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 592 |         "useExplicitDryRunSpec": True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly | 
 | 593 |             # exists  for all Service Perimeters, and that spec is identical to the | 
 | 594 |             # status for those Service Perimeters. When this flag is set, it inhibits the | 
 | 595 |             # generation of the implicit spec, thereby allowing the user to explicitly | 
 | 596 |             # provide a configuration ("spec") to use in a dry-run version of the Service | 
 | 597 |             # Perimeter. This allows the user to test changes to the enforced config | 
 | 598 |             # ("status") without actually enforcing them. This testing is done through | 
 | 599 |             # analyzing the differences between currently enforced and suggested | 
 | 600 |             # restrictions. use_explicit_dry_run_spec must bet set to True if any of the | 
 | 601 |             # fields in the spec are set to non-default values. | 
 | 602 |         "description": "A String", # Description of the `ServicePerimeter` and its use. Does not affect | 
 | 603 |             # behavior. | 
 | 604 |         "status": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 605 |             # restricted services and access levels that determine perimeter | 
 | 606 |             # content and boundaries. | 
 | 607 |             # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 608 |           "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 609 |               # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 610 |             "A String", | 
 | 611 |           ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 612 |           "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 613 |               # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 614 |               # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 615 |               # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 616 |               # listed, resources within the perimeter can only be accessed via Google | 
 | 617 |               # Cloud calls with request origins within the perimeter. Example: | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 618 |               # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 619 |               # For Service Perimeter Bridge, must be empty. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 620 |             "A String", | 
 | 621 |           ], | 
 | 622 |           "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 623 |               # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 624 |               # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 625 |               # access restrictions. | 
 | 626 |             "A String", | 
 | 627 |           ], | 
 | 628 |           "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 629 |               # Perimeter. | 
 | 630 |             "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 631 |                 # APIs specified in 'allowed_services'. | 
 | 632 |             "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 633 |                 # unless 'enable_restriction' is True. | 
 | 634 |               "A String", | 
 | 635 |             ], | 
 | 636 |           }, | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 637 |         }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 638 |         "spec": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration | 
 | 639 |             # allows to specify and test ServicePerimeter configuration without enforcing | 
 | 640 |             # actual access restrictions. Only allowed to be set when the | 
 | 641 |             # "use_explicit_dry_run_spec" flag is set. | 
 | 642 |             # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 643 |           "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 644 |               # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 645 |             "A String", | 
 | 646 |           ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 647 |           "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
 | 648 |               # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 649 |               # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 650 |               # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 651 |               # listed, resources within the perimeter can only be accessed via Google | 
 | 652 |               # Cloud calls with request origins within the perimeter. Example: | 
 | 653 |               # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
 | 654 |               # For Service Perimeter Bridge, must be empty. | 
 | 655 |             "A String", | 
 | 656 |           ], | 
 | 657 |           "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 658 |               # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 659 |               # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 660 |               # access restrictions. | 
 | 661 |             "A String", | 
 | 662 |           ], | 
 | 663 |           "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 664 |               # Perimeter. | 
 | 665 |             "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 666 |                 # APIs specified in 'allowed_services'. | 
 | 667 |             "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 668 |                 # unless 'enable_restriction' is True. | 
 | 669 |               "A String", | 
 | 670 |             ], | 
 | 671 |           }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 672 |         }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 673 |       }, | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 674 |     ], | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 675 |     "nextPageToken": "A String", # The pagination token to retrieve the next page of results. If the value is | 
 | 676 |         # empty, no further results remain. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 677 |   }</pre> | 
 | 678 | </div> | 
 | 679 |  | 
 | 680 | <div class="method"> | 
 | 681 |     <code class="details" id="list_next">list_next(previous_request, previous_response)</code> | 
 | 682 |   <pre>Retrieves the next page of results. | 
 | 683 |  | 
 | 684 | Args: | 
 | 685 |   previous_request: The request for the previous page. (required) | 
 | 686 |   previous_response: The response from the request for the previous page. (required) | 
 | 687 |  | 
 | 688 | Returns: | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 689 |   A request object that you can call 'execute()' on to request the next | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 690 |   page. Returns None if there are no more items in the collection. | 
 | 691 |     </pre> | 
 | 692 | </div> | 
 | 693 |  | 
 | 694 | <div class="method"> | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 695 |     <code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code> | 
 | 696 |   <pre>Update a Service Perimeter. The | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 697 | longrunning operation from this RPC will have a successful status once the | 
 | 698 | changes to the Service Perimeter have | 
 | 699 | propagated to long-lasting storage. Service Perimeter containing | 
 | 700 | errors will result in an error response for the first error encountered. | 
 | 701 |  | 
 | 702 | Args: | 
 | 703 |   name: string, Required. Resource name for the ServicePerimeter.  The `short_name` | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 704 | component must begin with a letter and only include alphanumeric and '_'. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 705 | Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` (required) | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 706 |   body: object, The request body. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 707 |     The object takes the form of: | 
 | 708 |  | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 709 | { # `ServicePerimeter` describes a set of Google Cloud resources which can freely | 
 | 710 |     # import and export data amongst themselves, but not export outside of the | 
 | 711 |     # `ServicePerimeter`. If a request with a source within this `ServicePerimeter` | 
 | 712 |     # has a target outside of the `ServicePerimeter`, the request will be blocked. | 
 | 713 |     # Otherwise the request is allowed. There are two types of Service Perimeter - | 
 | 714 |     # Regular and Bridge. Regular Service Perimeters cannot overlap, a single | 
 | 715 |     # Google Cloud project can only belong to a single regular Service Perimeter. | 
 | 716 |     # Service Perimeter Bridges can contain only Google Cloud projects as members, | 
 | 717 |     # a single Google Cloud project may belong to multiple Service Perimeter | 
 | 718 |     # Bridges. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 719 |   "name": "A String", # Required. Resource name for the ServicePerimeter.  The `short_name` | 
 | 720 |       # component must begin with a letter and only include alphanumeric and '_'. | 
 | 721 |       # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` | 
 | 722 |   "perimeterType": "A String", # Perimeter type indicator. A single project is | 
 | 723 |       # allowed to be a member of single regular perimeter, but multiple service | 
 | 724 |       # perimeter bridges. A project cannot be a included in a perimeter bridge | 
 | 725 |       # without being included in regular perimeter. For perimeter bridges, | 
 | 726 |       # the restricted service list as well as access level lists must be | 
 | 727 |       # empty. | 
 | 728 |   "title": "A String", # Human readable title. Must be unique within the Policy. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 729 |   "useExplicitDryRunSpec": True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly | 
 | 730 |       # exists  for all Service Perimeters, and that spec is identical to the | 
 | 731 |       # status for those Service Perimeters. When this flag is set, it inhibits the | 
 | 732 |       # generation of the implicit spec, thereby allowing the user to explicitly | 
 | 733 |       # provide a configuration ("spec") to use in a dry-run version of the Service | 
 | 734 |       # Perimeter. This allows the user to test changes to the enforced config | 
 | 735 |       # ("status") without actually enforcing them. This testing is done through | 
 | 736 |       # analyzing the differences between currently enforced and suggested | 
 | 737 |       # restrictions. use_explicit_dry_run_spec must bet set to True if any of the | 
 | 738 |       # fields in the spec are set to non-default values. | 
 | 739 |   "description": "A String", # Description of the `ServicePerimeter` and its use. Does not affect | 
 | 740 |       # behavior. | 
 | 741 |   "status": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 742 |       # restricted services and access levels that determine perimeter | 
 | 743 |       # content and boundaries. | 
 | 744 |       # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 745 |     "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 746 |         # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 747 |       "A String", | 
 | 748 |     ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 749 |     "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 750 |         # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 751 |         # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 752 |         # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 753 |         # listed, resources within the perimeter can only be accessed via Google | 
 | 754 |         # Cloud calls with request origins within the perimeter. Example: | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 755 |         # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 756 |         # For Service Perimeter Bridge, must be empty. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 757 |       "A String", | 
 | 758 |     ], | 
 | 759 |     "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 760 |         # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 761 |         # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 762 |         # access restrictions. | 
 | 763 |       "A String", | 
 | 764 |     ], | 
 | 765 |     "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 766 |         # Perimeter. | 
 | 767 |       "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 768 |           # APIs specified in 'allowed_services'. | 
 | 769 |       "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 770 |           # unless 'enable_restriction' is True. | 
 | 771 |         "A String", | 
 | 772 |       ], | 
 | 773 |     }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 774 |   }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 775 |   "spec": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration | 
 | 776 |       # allows to specify and test ServicePerimeter configuration without enforcing | 
 | 777 |       # actual access restrictions. Only allowed to be set when the | 
 | 778 |       # "use_explicit_dry_run_spec" flag is set. | 
 | 779 |       # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 780 |     "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 781 |         # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 782 |       "A String", | 
 | 783 |     ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 784 |     "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
 | 785 |         # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 786 |         # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 787 |         # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 788 |         # listed, resources within the perimeter can only be accessed via Google | 
 | 789 |         # Cloud calls with request origins within the perimeter. Example: | 
 | 790 |         # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
 | 791 |         # For Service Perimeter Bridge, must be empty. | 
 | 792 |       "A String", | 
 | 793 |     ], | 
 | 794 |     "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 795 |         # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 796 |         # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 797 |         # access restrictions. | 
 | 798 |       "A String", | 
 | 799 |     ], | 
 | 800 |     "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 801 |         # Perimeter. | 
 | 802 |       "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 803 |           # APIs specified in 'allowed_services'. | 
 | 804 |       "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 805 |           # unless 'enable_restriction' is True. | 
 | 806 |         "A String", | 
 | 807 |       ], | 
 | 808 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 809 |   }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 810 | } | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 811 |  | 
 | 812 |   updateMask: string, Required. Mask to control which fields get updated. Must be non-empty. | 
 | 813 |   x__xgafv: string, V1 error format. | 
 | 814 |     Allowed values | 
 | 815 |       1 - v1 error format | 
 | 816 |       2 - v2 error format | 
 | 817 |  | 
 | 818 | Returns: | 
 | 819 |   An object of the form: | 
 | 820 |  | 
 | 821 |     { # This resource represents a long-running operation that is the result of a | 
 | 822 |       # network API call. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 823 |     "name": "A String", # The server-assigned name, which is only unique within the same service that | 
 | 824 |         # originally returns it. If you use the default HTTP mapping, the | 
 | 825 |         # `name` should be a resource name ending with `operations/{unique_id}`. | 
 | 826 |     "error": { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation. | 
 | 827 |         # different programming environments, including REST APIs and RPC APIs. It is | 
 | 828 |         # used by [gRPC](https://github.com/grpc). Each `Status` message contains | 
 | 829 |         # three pieces of data: error code, error message, and error details. | 
 | 830 |         # | 
 | 831 |         # You can find out more about this error model and how to work with it in the | 
 | 832 |         # [API Design Guide](https://cloud.google.com/apis/design/errors). | 
 | 833 |       "message": "A String", # A developer-facing error message, which should be in English. Any | 
 | 834 |           # user-facing error message should be localized and sent in the | 
 | 835 |           # google.rpc.Status.details field, or localized by the client. | 
 | 836 |       "details": [ # A list of messages that carry the error details.  There is a common set of | 
 | 837 |           # message types for APIs to use. | 
 | 838 |         { | 
 | 839 |           "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 840 |         }, | 
 | 841 |       ], | 
 | 842 |       "code": 42, # The status code, which should be an enum value of google.rpc.Code. | 
 | 843 |     }, | 
 | 844 |     "metadata": { # Service-specific metadata associated with the operation.  It typically | 
 | 845 |         # contains progress information and common metadata such as create time. | 
 | 846 |         # Some services might not provide such metadata.  Any method that returns a | 
 | 847 |         # long-running operation should document the metadata type, if any. | 
 | 848 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 849 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 850 |     "done": True or False, # If the value is `false`, it means the operation is still in progress. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 851 |         # If `true`, the operation is completed, and either `error` or `response` is | 
 | 852 |         # available. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 853 |     "response": { # The normal response of the operation in case of success.  If the original | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 854 |         # method returns no data on success, such as `Delete`, the response is | 
 | 855 |         # `google.protobuf.Empty`.  If the original method is standard | 
 | 856 |         # `Get`/`Create`/`Update`, the response should be the resource.  For other | 
 | 857 |         # methods, the response should have the type `XxxResponse`, where `Xxx` | 
 | 858 |         # is the original method name.  For example, if the original method name | 
 | 859 |         # is `TakeSnapshot()`, the inferred response type is | 
 | 860 |         # `TakeSnapshotResponse`. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 861 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 862 |     }, | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 863 |   }</pre> | 
 | 864 | </div> | 
 | 865 |  | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 866 | <div class="method"> | 
 | 867 |     <code class="details" id="replaceAll">replaceAll(parent, body=None, x__xgafv=None)</code> | 
 | 868 |   <pre>Replace all existing Service Perimeters in an | 
 | 869 | Access Policy | 
 | 870 | with the Service Perimeters provided. | 
 | 871 | This is done atomically. The longrunning operation from this | 
 | 872 | RPC will have a successful status once all replacements have propagated to | 
 | 873 | long-lasting storage. Replacements containing errors will result in an | 
 | 874 | error response for the first error encountered. Replacement will be | 
 | 875 | cancelled on error, existing Service Perimeters will not be | 
 | 876 | affected. Operation.response field will contain | 
 | 877 | ReplaceServicePerimetersResponse. | 
 | 878 |  | 
 | 879 | Args: | 
 | 880 |   parent: string, Required. Resource name for the access policy which owns these | 
 | 881 | Service Perimeters. | 
 | 882 |  | 
 | 883 | Format: `accessPolicies/{policy_id}` (required) | 
 | 884 |   body: object, The request body. | 
 | 885 |     The object takes the form of: | 
 | 886 |  | 
 | 887 | { # A request to replace all existing Service Perimeters in an Access Policy | 
 | 888 |       # with the Service Perimeters provided. This is done atomically. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 889 |     "servicePerimeters": [ # Required. The desired Service Perimeters that should | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 890 |         # replace all existing Service Perimeters in the | 
 | 891 |         # Access Policy. | 
 | 892 |       { # `ServicePerimeter` describes a set of Google Cloud resources which can freely | 
 | 893 |           # import and export data amongst themselves, but not export outside of the | 
 | 894 |           # `ServicePerimeter`. If a request with a source within this `ServicePerimeter` | 
 | 895 |           # has a target outside of the `ServicePerimeter`, the request will be blocked. | 
 | 896 |           # Otherwise the request is allowed. There are two types of Service Perimeter - | 
 | 897 |           # Regular and Bridge. Regular Service Perimeters cannot overlap, a single | 
 | 898 |           # Google Cloud project can only belong to a single regular Service Perimeter. | 
 | 899 |           # Service Perimeter Bridges can contain only Google Cloud projects as members, | 
 | 900 |           # a single Google Cloud project may belong to multiple Service Perimeter | 
 | 901 |           # Bridges. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 902 |         "name": "A String", # Required. Resource name for the ServicePerimeter.  The `short_name` | 
 | 903 |             # component must begin with a letter and only include alphanumeric and '_'. | 
 | 904 |             # Format: `accessPolicies/{policy_id}/servicePerimeters/{short_name}` | 
 | 905 |         "perimeterType": "A String", # Perimeter type indicator. A single project is | 
 | 906 |             # allowed to be a member of single regular perimeter, but multiple service | 
 | 907 |             # perimeter bridges. A project cannot be a included in a perimeter bridge | 
 | 908 |             # without being included in regular perimeter. For perimeter bridges, | 
 | 909 |             # the restricted service list as well as access level lists must be | 
 | 910 |             # empty. | 
 | 911 |         "title": "A String", # Human readable title. Must be unique within the Policy. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 912 |         "useExplicitDryRunSpec": True or False, # Use explicit dry run spec flag. Ordinarily, a dry-run spec implicitly | 
 | 913 |             # exists  for all Service Perimeters, and that spec is identical to the | 
 | 914 |             # status for those Service Perimeters. When this flag is set, it inhibits the | 
 | 915 |             # generation of the implicit spec, thereby allowing the user to explicitly | 
 | 916 |             # provide a configuration ("spec") to use in a dry-run version of the Service | 
 | 917 |             # Perimeter. This allows the user to test changes to the enforced config | 
 | 918 |             # ("status") without actually enforcing them. This testing is done through | 
 | 919 |             # analyzing the differences between currently enforced and suggested | 
 | 920 |             # restrictions. use_explicit_dry_run_spec must bet set to True if any of the | 
 | 921 |             # fields in the spec are set to non-default values. | 
 | 922 |         "description": "A String", # Description of the `ServicePerimeter` and its use. Does not affect | 
 | 923 |             # behavior. | 
 | 924 |         "status": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Current ServicePerimeter configuration. Specifies sets of resources, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 925 |             # restricted services and access levels that determine perimeter | 
 | 926 |             # content and boundaries. | 
 | 927 |             # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 928 |           "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 929 |               # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 930 |             "A String", | 
 | 931 |           ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 932 |           "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 933 |               # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 934 |               # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 935 |               # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 936 |               # listed, resources within the perimeter can only be accessed via Google | 
 | 937 |               # Cloud calls with request origins within the perimeter. Example: | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 938 |               # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 939 |               # For Service Perimeter Bridge, must be empty. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 940 |             "A String", | 
 | 941 |           ], | 
 | 942 |           "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 943 |               # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 944 |               # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 945 |               # access restrictions. | 
 | 946 |             "A String", | 
 | 947 |           ], | 
 | 948 |           "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 949 |               # Perimeter. | 
 | 950 |             "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 951 |                 # APIs specified in 'allowed_services'. | 
 | 952 |             "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 953 |                 # unless 'enable_restriction' is True. | 
 | 954 |               "A String", | 
 | 955 |             ], | 
 | 956 |           }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 957 |         }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 958 |         "spec": { # `ServicePerimeterConfig` specifies a set of Google Cloud resources that # Proposed (or dry run) ServicePerimeter configuration. This configuration | 
 | 959 |             # allows to specify and test ServicePerimeter configuration without enforcing | 
 | 960 |             # actual access restrictions. Only allowed to be set when the | 
 | 961 |             # "use_explicit_dry_run_spec" flag is set. | 
 | 962 |             # describe specific Service Perimeter configuration. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 963 |           "resources": [ # A list of Google Cloud resources that are inside of the service perimeter. | 
 | 964 |               # Currently only projects are allowed. Format: `projects/{project_number}` | 
 | 965 |             "A String", | 
 | 966 |           ], | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 967 |           "accessLevels": [ # A list of `AccessLevel` resource names that allow resources within the | 
 | 968 |               # `ServicePerimeter` to be accessed from the internet. `AccessLevels` listed | 
 | 969 |               # must be in the same policy as this `ServicePerimeter`. Referencing a | 
 | 970 |               # nonexistent `AccessLevel` is a syntax error. If no `AccessLevel` names are | 
 | 971 |               # listed, resources within the perimeter can only be accessed via Google | 
 | 972 |               # Cloud calls with request origins within the perimeter. Example: | 
 | 973 |               # `"accessPolicies/MY_POLICY/accessLevels/MY_LEVEL"`. | 
 | 974 |               # For Service Perimeter Bridge, must be empty. | 
 | 975 |             "A String", | 
 | 976 |           ], | 
 | 977 |           "restrictedServices": [ # Google Cloud services that are subject to the Service Perimeter | 
 | 978 |               # restrictions. For example, if `storage.googleapis.com` is specified, access | 
 | 979 |               # to the storage buckets inside the perimeter must meet the perimeter's | 
 | 980 |               # access restrictions. | 
 | 981 |             "A String", | 
 | 982 |           ], | 
 | 983 |           "vpcAccessibleServices": { # Specifies how APIs are allowed to communicate within the Service # Configuration for APIs allowed within Perimeter. | 
 | 984 |               # Perimeter. | 
 | 985 |             "enableRestriction": True or False, # Whether to restrict API calls within the Service Perimeter to the list of | 
 | 986 |                 # APIs specified in 'allowed_services'. | 
 | 987 |             "allowedServices": [ # The list of APIs usable within the Service Perimeter. Must be empty | 
 | 988 |                 # unless 'enable_restriction' is True. | 
 | 989 |               "A String", | 
 | 990 |             ], | 
 | 991 |           }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 992 |         }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 993 |       }, | 
 | 994 |     ], | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 995 |     "etag": "A String", # Optional. The etag for the version of the Access Policy that this | 
 | 996 |         # replace operation is to be performed on. If, at the time of replace, the | 
 | 997 |         # etag for the Access Policy stored in Access Context Manager is different | 
 | 998 |         # from the specified etag, then the replace operation will not be performed | 
 | 999 |         # and the call will fail. This field is not required. If etag is not | 
 | 1000 |         # provided, the operation will be performed as if a valid etag is provided. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 1001 |   } | 
 | 1002 |  | 
 | 1003 |   x__xgafv: string, V1 error format. | 
 | 1004 |     Allowed values | 
 | 1005 |       1 - v1 error format | 
 | 1006 |       2 - v2 error format | 
 | 1007 |  | 
 | 1008 | Returns: | 
 | 1009 |   An object of the form: | 
 | 1010 |  | 
 | 1011 |     { # This resource represents a long-running operation that is the result of a | 
 | 1012 |       # network API call. | 
| Bu Sun Kim | 4ed7d3f | 2020-05-27 12:20:54 -0700 | [diff] [blame] | 1013 |     "name": "A String", # The server-assigned name, which is only unique within the same service that | 
 | 1014 |         # originally returns it. If you use the default HTTP mapping, the | 
 | 1015 |         # `name` should be a resource name ending with `operations/{unique_id}`. | 
 | 1016 |     "error": { # The `Status` type defines a logical error model that is suitable for # The error result of the operation in case of failure or cancellation. | 
 | 1017 |         # different programming environments, including REST APIs and RPC APIs. It is | 
 | 1018 |         # used by [gRPC](https://github.com/grpc). Each `Status` message contains | 
 | 1019 |         # three pieces of data: error code, error message, and error details. | 
 | 1020 |         # | 
 | 1021 |         # You can find out more about this error model and how to work with it in the | 
 | 1022 |         # [API Design Guide](https://cloud.google.com/apis/design/errors). | 
 | 1023 |       "message": "A String", # A developer-facing error message, which should be in English. Any | 
 | 1024 |           # user-facing error message should be localized and sent in the | 
 | 1025 |           # google.rpc.Status.details field, or localized by the client. | 
 | 1026 |       "details": [ # A list of messages that carry the error details.  There is a common set of | 
 | 1027 |           # message types for APIs to use. | 
 | 1028 |         { | 
 | 1029 |           "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 1030 |         }, | 
 | 1031 |       ], | 
 | 1032 |       "code": 42, # The status code, which should be an enum value of google.rpc.Code. | 
 | 1033 |     }, | 
 | 1034 |     "metadata": { # Service-specific metadata associated with the operation.  It typically | 
 | 1035 |         # contains progress information and common metadata such as create time. | 
 | 1036 |         # Some services might not provide such metadata.  Any method that returns a | 
 | 1037 |         # long-running operation should document the metadata type, if any. | 
 | 1038 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
 | 1039 |     }, | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 1040 |     "done": True or False, # If the value is `false`, it means the operation is still in progress. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 1041 |         # If `true`, the operation is completed, and either `error` or `response` is | 
 | 1042 |         # available. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 1043 |     "response": { # The normal response of the operation in case of success.  If the original | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 1044 |         # method returns no data on success, such as `Delete`, the response is | 
 | 1045 |         # `google.protobuf.Empty`.  If the original method is standard | 
 | 1046 |         # `Get`/`Create`/`Update`, the response should be the resource.  For other | 
 | 1047 |         # methods, the response should have the type `XxxResponse`, where `Xxx` | 
 | 1048 |         # is the original method name.  For example, if the original method name | 
 | 1049 |         # is `TakeSnapshot()`, the inferred response type is | 
 | 1050 |         # `TakeSnapshotResponse`. | 
| Bu Sun Kim | 6502091 | 2020-05-20 12:08:20 -0700 | [diff] [blame] | 1051 |       "a_key": "", # Properties of the object. Contains field @type with type URL. | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 1052 |     }, | 
| Dan O'Meara | dd49464 | 2020-05-01 07:42:23 -0700 | [diff] [blame] | 1053 |   }</pre> | 
 | 1054 | </div> | 
 | 1055 |  | 
| Bu Sun Kim | 715bd7f | 2019-06-14 16:50:42 -0700 | [diff] [blame] | 1056 | </body></html> |