Skip to content

Commit

Permalink
feat: added support OutputResult in ExportAssetsResponse. docs: updat…
Browse files Browse the repository at this point in the history
…ed existing docs. (#381)

Clients receive detailed OutputResult in ExportAssetsResponse.

PiperOrigin-RevId: 326582222

Source-Author: Google APIs <noreply@google.com>
Source-Date: Thu Aug 13 20:45:57 2020 -0700
Source-Repo: googleapis/googleapis
Source-Sha: 3a54e988edcbdef1e47c6ac19d3074a87214f667
Source-Link: googleapis/googleapis@3a54e98
  • Loading branch information
yoshi-automation authored Aug 14, 2020
1 parent 68b19fe commit 42b9d2c
Show file tree
Hide file tree
Showing 7 changed files with 1,163 additions and 397 deletions.

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ syntax = "proto3";

package google.cloud.asset.v1;

import "google/api/annotations.proto";
import "google/api/resource.proto";
import "google/cloud/orgpolicy/v1/orgpolicy.proto";
import "google/iam/v1/policy.proto";
Expand All @@ -27,6 +26,7 @@ import "google/protobuf/any.proto";
import "google/protobuf/struct.proto";
import "google/protobuf/timestamp.proto";
import "google/rpc/code.proto";
import "google/api/annotations.proto";

option cc_enable_arenas = true;
option csharp_namespace = "Google.Cloud.Asset.V1";
Expand Down Expand Up @@ -150,8 +150,7 @@ message Asset {

// Please also refer to the [service perimeter user
// guide](https://cloud.google.com/vpc-service-controls/docs/overview).
google.identity.accesscontextmanager.v1.ServicePerimeter service_perimeter =
9;
google.identity.accesscontextmanager.v1.ServicePerimeter service_perimeter = 9;
}

// The ancestry path of an asset in Google Cloud [resource
Expand Down Expand Up @@ -215,7 +214,7 @@ message Resource {
string location = 8;
}

// A result of Resource Search, containing information of a cloud resoure.
// A result of Resource Search, containing information of a cloud resource.
message ResourceSearchResult {
// The full resource name of this resource. Example:
// `//compute.googleapis.com/projects/my_project_123/zones/zone1/instances/instance1`.
Expand All @@ -225,8 +224,8 @@ message ResourceSearchResult {
//
// To search against the `name`:
//
// * use a field query. Example: `name : "instance1"`
// * use a free text query. Example: `"instance1"`
// * use a field query. Example: `name:instance1`
// * use a free text query. Example: `instance1`
string name = 1;

// The type of this resource. Example: `compute.googleapis.com/Disk`.
Expand All @@ -248,7 +247,7 @@ message ResourceSearchResult {
//
// To search against the `display_name`:
//
// * use a field query. Example: `displayName : "My Instance"`
// * use a field query. Example: `displayName:"My Instance"`
// * use a free text query. Example: `"My Instance"`
string display_name = 4;

Expand All @@ -257,7 +256,7 @@ message ResourceSearchResult {
//
// To search against the `description`:
//
// * use a field query. Example: `description : "*important instance*"`
// * use a field query. Example: `description:"*important instance*"`
// * use a free text query. Example: `"*important instance*"`
string description = 5;

Expand All @@ -266,8 +265,8 @@ message ResourceSearchResult {
//
// To search against the `location`:
//
// * use a field query. Example: `location : "us-west*"`
// * use a free text query. Example: `"us-west*"`
// * use a field query. Example: `location:us-west*`
// * use a free text query. Example: `us-west*`
string location = 6;

// Labels associated with this resource. See [Labelling and grouping GCP
Expand All @@ -276,11 +275,11 @@ message ResourceSearchResult {
//
// To search against the `labels`:
//
// * use a field query, as following:
// - query on any label's key or value. Example: `labels : "prod"`
// - query by a given label. Example: `labels.env : "prod"`
// - query by a given label'sexistence. Example: `labels.env : *`
// * use a free text query. Example: `"prod"`
// * use a field query:
// - query on any label's key or value. Example: `labels:prod`
// - query by a given label. Example: `labels.env:prod`
// - query by a given label's existence. Example: `labels.env:*`
// * use a free text query. Example: `prod`
map<string, string> labels = 7;

// Network tags associated with this resource. Like labels, network tags are a
Expand All @@ -290,19 +289,29 @@ message ResourceSearchResult {
//
// To search against the `network_tags`:
//
// * use a field query. Example: `networkTags : "internal"`
// * use a free text query. Example: `"internal"`
// * use a field query. Example: `networkTags:internal`
// * use a free text query. Example: `internal`
repeated string network_tags = 8;

// The additional attributes of this resource. The attributes may vary from
// one resource type to another. Examples: `projectId` for Project,
// `dnsName` for DNS ManagedZone.
// The additional searchable attributes of this resource. The attributes may
// vary from one resource type to another. Examples: `projectId` for Project,
// `dnsName` for DNS ManagedZone. This field contains a subset of the resource
// metadata fields that are returned by the List or Get APIs provided by the
// corresponding GCP service (e.g., Compute Engine). see [API references and
// supported searchable
// attributes](https://cloud.google.com/asset-inventory/docs/supported-asset-types#searchable_asset_types)
// for more information.
//
// You can search values of these fields through free text search. However,
// you should not consume the field programically as the field names and
// values may change as the GCP service updates to a new incompatible API
// version.
//
// To search against the `additional_attributes`:
//
// * use a free text query to match the attributes values. Example: to search
// `additional_attributes = { dnsName: "foobar" }`, you can issue a query
// `"foobar"`.
// `foobar`.
google.protobuf.Struct additional_attributes = 9;
}

Expand All @@ -318,7 +327,7 @@ message IamPolicySearchResult {

// The map from roles to their included permissions that match the
// permission query (i.e., a query containing `policy.role.permissions:`).
// Example: if query `policy.role.permissions : "compute.disk.get"`
// Example: if query `policy.role.permissions:compute.disk.get`
// matches a policy binding that contains owner role, the
// matched_permissions will be `{"roles/owner": ["compute.disk.get"]}`. The
// roles can also be found in the returned `policy` bindings. Note that the
Expand All @@ -335,7 +344,7 @@ message IamPolicySearchResult {
//
// To search against the `resource`:
//
// * use a field query. Example: `resource : "organizations/123"`
// * use a field query. Example: `resource:organizations/123`
string resource = 1;

// The project that the associated GCP resource belongs to, in the form of
Expand All @@ -356,13 +365,13 @@ message IamPolicySearchResult {
//
// To search against the `policy` bindings:
//
// * use a field query, as following:
// * use a field query:
// - query by the policy contained members. Example:
// `policy : "amy@gmail.com"`
// `policy:amy@gmail.com`
// - query by the policy contained roles. Example:
// `policy : "roles/compute.admin"`
// - query by the policy contained roles' implied permissions. Example:
// `policy.role.permissions : "compute.instances.create"`
// `policy:roles/compute.admin`
// - query by the policy contained roles' included permissions. Example:
// `policy.role.permissions:compute.instances.create`
google.iam.v1.Policy policy = 3;

// Explanation about the IAM policy search result. It contains additional
Expand Down
189 changes: 189 additions & 0 deletions packages/google-cloud-asset/protos/protos.d.ts

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit 42b9d2c

Please sign in to comment.