Skip to content

Commit

Permalink
chore: Update discovery artifacts (#2551)
Browse files Browse the repository at this point in the history
## Deleted keys were detected in the following stable discovery artifacts:
aiplatform v1 https://togithub.com/googleapis/google-api-python-client/commit/24228d48862449405aa3486cf812a2fc5208ab32
androidenterprise v1 https://togithub.com/googleapis/google-api-python-client/commit/b7865bd3ff77dbfa296d3e9682623d048cc6b66d
displayvideo v2 https://togithub.com/googleapis/google-api-python-client/commit/63b01f3147d6520061c67d4540701deac665c33b
file v1 https://togithub.com/googleapis/google-api-python-client/commit/e7bf3e1cc7df45ec600553b433da3dc7ca4e2b6f
gkehub v1 https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44
gkehub v2 https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44

## Deleted keys were detected in the following pre-stable discovery artifacts:
aiplatform v1beta1 https://togithub.com/googleapis/google-api-python-client/commit/24228d48862449405aa3486cf812a2fc5208ab32
file v1beta1 https://togithub.com/googleapis/google-api-python-client/commit/e7bf3e1cc7df45ec600553b433da3dc7ca4e2b6f
gkehub v1alpha https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44
gkehub v1beta https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44
gkehub v2alpha https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44
gkehub v2beta https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44

## Discovery Artifact Change Summary:
feat(accesscontextmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/8b40ee693835e6f737b06d121394e8a0b485a9b8
feat(adsenseplatform): update the api https://togithub.com/googleapis/google-api-python-client/commit/04355c7c7c184536c4f808ab27f0e97448845683
feat(aiplatform): update the api https://togithub.com/googleapis/google-api-python-client/commit/24228d48862449405aa3486cf812a2fc5208ab32
feat(analyticsadmin): update the api https://togithub.com/googleapis/google-api-python-client/commit/dff2a84a823c6af6d59cb98d257d18aa4f39256c
feat(analyticshub): update the api https://togithub.com/googleapis/google-api-python-client/commit/0208b0b0288c703b0a344e0789675d3660caae2b
feat(androidenterprise): update the api https://togithub.com/googleapis/google-api-python-client/commit/b7865bd3ff77dbfa296d3e9682623d048cc6b66d
feat(classroom): update the api https://togithub.com/googleapis/google-api-python-client/commit/ef72b5f7f95abea4e3d851ee8807f628183a240f
feat(cloudbuild): update the api https://togithub.com/googleapis/google-api-python-client/commit/41e76d1b7e678c5b8ec344dd1b6be9eb01820c03
feat(compute): update the api https://togithub.com/googleapis/google-api-python-client/commit/48c508dffa1ed1df4e02d7d2238542b6eb8840f7
feat(dialogflow): update the api https://togithub.com/googleapis/google-api-python-client/commit/6c3ff8511522ff8fec923ef5a41384e0e3f1ee7b
feat(discoveryengine): update the api https://togithub.com/googleapis/google-api-python-client/commit/9afd49fbbf75e9088910a1f0a643579a67ea2b06
feat(displayvideo): update the api https://togithub.com/googleapis/google-api-python-client/commit/63b01f3147d6520061c67d4540701deac665c33b
feat(file): update the api https://togithub.com/googleapis/google-api-python-client/commit/e7bf3e1cc7df45ec600553b433da3dc7ca4e2b6f
feat(gkehub): update the api https://togithub.com/googleapis/google-api-python-client/commit/aa81a39a6f952997b010d8804a37c09e767b9b44
feat(integrations): update the api https://togithub.com/googleapis/google-api-python-client/commit/da21dd8bebbd0eb4ca584b09df8f0ad78abf2fb5
feat(merchantapi): update the api https://togithub.com/googleapis/google-api-python-client/commit/c66e25ffad13cd34d42b0a0e40898688563d44af
feat(migrationcenter): update the api https://togithub.com/googleapis/google-api-python-client/commit/06c1759266fb5c72cbb1cc5aebebe26d6bbd5a6b
feat(monitoring): update the api https://togithub.com/googleapis/google-api-python-client/commit/6d1dc833753d7c076d966c3fb8bb105b618b22ec
feat(netapp): update the api https://togithub.com/googleapis/google-api-python-client/commit/628b723392cd62e63fa668f9602b398fb0474ec7
feat(networkmanagement): update the api https://togithub.com/googleapis/google-api-python-client/commit/45d70c19e93b8edb0b52ca80e5235c0540cc1463
feat(redis): update the api https://togithub.com/googleapis/google-api-python-client/commit/a866933256348e166064a7ed1aee2d92a42630a9
fix(secretmanager): update the api https://togithub.com/googleapis/google-api-python-client/commit/477de50ccc8bc597101c3c8ac80505565674f6ac
feat(spanner): update the api https://togithub.com/googleapis/google-api-python-client/commit/9540ac50fcb9506cfaf204f2746f3da047cc2c08
feat(websecurityscanner): update the api https://togithub.com/googleapis/google-api-python-client/commit/5eae43739b774edf6fb5b91bd5807a1154533180
  • Loading branch information
yoshi-code-bot authored Jan 21, 2025
1 parent f4b3014 commit 165d3b5
Show file tree
Hide file tree
Showing 274 changed files with 4,821 additions and 4,150 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -181,6 +181,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -267,6 +268,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -440,6 +442,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -526,6 +529,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -641,6 +645,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -727,6 +732,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -848,6 +854,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -934,6 +941,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -1071,6 +1079,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down Expand Up @@ -1157,6 +1166,7 @@ <h3>Method Details</h3>
&quot;sources&quot;: [ # Sources that this EgressPolicy authorizes access from. If this field is not empty, then `source_restriction` must be set to `SOURCE_RESTRICTION_ENABLED`.
{ # The source that EgressPolicy authorizes access from inside the ServicePerimeter to somewhere outside the ServicePerimeter boundaries.
&quot;accessLevel&quot;: &quot;A String&quot;, # An AccessLevel resource name that allows protected resources inside the ServicePerimeters to access outside the ServicePerimeter boundaries. AccessLevels listed must be in the same policy as this ServicePerimeter. Referencing a nonexistent AccessLevel will cause an error. If an AccessLevel name is not specified, only resources within the perimeter can be accessed through Google Cloud calls with request origins within the perimeter. Example: `accessPolicies/MY_POLICY/accessLevels/MY_LEVEL`. If a single `*` is specified for `access_level`, then all EgressSources will be allowed.
&quot;resource&quot;: &quot;A String&quot;, # A Google Cloud resource that you want to allow to egress the perimeter. These resources can access data outside the perimeter. This field only supports projects. The project format is `projects/{project_number}`. The resource can be in any Google Cloud organization, not just the organization where the perimeter is defined. You can&#x27;t use `*` in this field to allow all Google Cloud resources.
},
],
},
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
<html><body>
<style>

body, h1, h2, h3, div, span, p, pre, a {
margin: 0;
padding: 0;
border: 0;
font-weight: inherit;
font-style: inherit;
font-size: 100%;
font-family: inherit;
vertical-align: baseline;
}

body {
font-size: 13px;
padding: 1em;
}

h1 {
font-size: 26px;
margin-bottom: 1em;
}

h2 {
font-size: 24px;
margin-bottom: 1em;
}

h3 {
font-size: 20px;
margin-bottom: 1em;
margin-top: 1em;
}

pre, code {
line-height: 1.5;
font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}

pre {
margin-top: 0.5em;
}

h1, h2, h3, p {
font-family: Arial, sans serif;
}

h1, h2, h3 {
border-bottom: solid #CCC 1px;
}

.toc_element {
margin-top: 0.5em;
}

.firstline {
margin-left: 2 em;
}

.method {
margin-top: 1em;
border: solid 1px #CCC;
padding: 1em;
background: #EEE;
}

.details {
font-weight: bold;
font-size: 14px;
}

</style>

<h1><a href="adsenseplatform_v1alpha.html">AdSense Platform API</a> . <a href="adsenseplatform_v1alpha.accounts.html">accounts</a> . <a href="adsenseplatform_v1alpha.accounts.platforms.html">platforms</a> . <a href="adsenseplatform_v1alpha.accounts.platforms.childAccounts.html">childAccounts</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
<code><a href="adsenseplatform_v1alpha.accounts.platforms.childAccounts.sites.html">sites()</a></code>
</p>
<p class="firstline">Returns the sites Resource.</p>

<p class="toc_element">
<code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<h3>Method Details</h3>
<div class="method">
<code class="details" id="close">close()</code>
<pre>Close httplib2 connections.</pre>
</div>

</body></html>
Loading

0 comments on commit 165d3b5

Please sign in to comment.