diff --git a/clients/cloud_asset/README.md b/clients/cloud_asset/README.md index aa41d83ca8..68fb9b4652 100644 --- a/clients/cloud_asset/README.md +++ b/clients/cloud_asset/README.md @@ -11,7 +11,7 @@ Install this package from [Hex](https://hex.pm) by adding ```elixir def deps do - [{:google_api_cloud_asset, "~> 0.41"}] + [{:google_api_cloud_asset, "~> 0.42"}] end ``` diff --git a/clients/cloud_asset/lib/google_api/cloud_asset/v1/metadata.ex b/clients/cloud_asset/lib/google_api/cloud_asset/v1/metadata.ex index 0cfae10025..bf091c0974 100644 --- a/clients/cloud_asset/lib/google_api/cloud_asset/v1/metadata.ex +++ b/clients/cloud_asset/lib/google_api/cloud_asset/v1/metadata.ex @@ -20,7 +20,7 @@ defmodule GoogleApi.CloudAsset.V1 do API client metadata for GoogleApi.CloudAsset.V1. """ - @discovery_revision "20241211" + @discovery_revision "20250104" def discovery_revision(), do: @discovery_revision end diff --git a/clients/cloud_asset/lib/google_api/cloud_asset/v1/model/google_identity_accesscontextmanager_v1_egress_source.ex b/clients/cloud_asset/lib/google_api/cloud_asset/v1/model/google_identity_accesscontextmanager_v1_egress_source.ex index da61ddcdc6..d29668d592 100644 --- a/clients/cloud_asset/lib/google_api/cloud_asset/v1/model/google_identity_accesscontextmanager_v1_egress_source.ex +++ b/clients/cloud_asset/lib/google_api/cloud_asset/v1/model/google_identity_accesscontextmanager_v1_egress_source.ex @@ -22,15 +22,18 @@ defmodule GoogleApi.CloudAsset.V1.Model.GoogleIdentityAccesscontextmanagerV1Egre ## Attributes * `accessLevel` (*type:* `String.t`, *default:* `nil`) - An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed. + * `resource` (*type:* `String.t`, *default:* `nil`) - A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can't use `*` in this field to allow all Google Cloud resources. """ use GoogleApi.Gax.ModelBase @type t :: %__MODULE__{ - :accessLevel => String.t() | nil + :accessLevel => String.t() | nil, + :resource => String.t() | nil } field(:accessLevel) + field(:resource) end defimpl Poison.Decoder, diff --git a/clients/cloud_asset/mix.exs b/clients/cloud_asset/mix.exs index 92538f4c1c..c24ab9f871 100644 --- a/clients/cloud_asset/mix.exs +++ b/clients/cloud_asset/mix.exs @@ -18,7 +18,7 @@ defmodule GoogleApi.CloudAsset.Mixfile do use Mix.Project - @version "0.41.0" + @version "0.42.0" def project() do [