Skip to content

Commit cc26b91

Browse files
feat(iam): update the api
#### iam:v1 The following keys were added: - resources.projects.resources.serviceAccounts.methods.signBlob.deprecated (Total Keys: 1) - resources.projects.resources.serviceAccounts.methods.signJwt.deprecated (Total Keys: 1) - schemas.GoogleIamAdminV1WorkforcePoolProviderOidc.properties.webSsoConfig.$ref (Total Keys: 1) - schemas.GoogleIamAdminV1WorkforcePoolProviderOidcWebSsoConfig (Total Keys: 4)
1 parent ba7c9be commit cc26b91

File tree

5 files changed

+66
-13
lines changed

5 files changed

+66
-13
lines changed

docs/dyn/iam_v1.locations.workforcePools.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ <h3>Method Details</h3>
139139

140140
{ # Represents a collection of external workforces. Provides namespaces for federated users that can be referenced in IAM policies.
141141
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the pool. Cannot exceed 256 characters.
142-
&quot;disabled&quot;: True or False, # Whether the pool is disabled. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
142+
&quot;disabled&quot;: True or False, # Disables the workforce pool. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
143143
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name of the pool in Google Cloud Console. Cannot exceed 32 characters.
144144
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the pool. Format: `locations/{location}/workforcePools/{workforce_pool_id}`
145145
&quot;parent&quot;: &quot;A String&quot;, # Immutable. The resource name of the parent. Format: `organizations/{org-id}`.
@@ -228,7 +228,7 @@ <h3>Method Details</h3>
228228

229229
{ # Represents a collection of external workforces. Provides namespaces for federated users that can be referenced in IAM policies.
230230
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the pool. Cannot exceed 256 characters.
231-
&quot;disabled&quot;: True or False, # Whether the pool is disabled. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
231+
&quot;disabled&quot;: True or False, # Disables the workforce pool. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
232232
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name of the pool in Google Cloud Console. Cannot exceed 32 characters.
233233
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the pool. Format: `locations/{location}/workforcePools/{workforce_pool_id}`
234234
&quot;parent&quot;: &quot;A String&quot;, # Immutable. The resource name of the parent. Format: `organizations/{org-id}`.
@@ -316,7 +316,7 @@ <h3>Method Details</h3>
316316
&quot;workforcePools&quot;: [ # A list of pools.
317317
{ # Represents a collection of external workforces. Provides namespaces for federated users that can be referenced in IAM policies.
318318
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the pool. Cannot exceed 256 characters.
319-
&quot;disabled&quot;: True or False, # Whether the pool is disabled. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
319+
&quot;disabled&quot;: True or False, # Disables the workforce pool. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
320320
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name of the pool in Google Cloud Console. Cannot exceed 32 characters.
321321
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the pool. Format: `locations/{location}/workforcePools/{workforce_pool_id}`
322322
&quot;parent&quot;: &quot;A String&quot;, # Immutable. The resource name of the parent. Format: `organizations/{org-id}`.
@@ -352,7 +352,7 @@ <h3>Method Details</h3>
352352

353353
{ # Represents a collection of external workforces. Provides namespaces for federated users that can be referenced in IAM policies.
354354
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the pool. Cannot exceed 256 characters.
355-
&quot;disabled&quot;: True or False, # Whether the pool is disabled. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
355+
&quot;disabled&quot;: True or False, # Disables the workforce pool. You cannot use a disabled pool to exchange tokens, or use existing tokens to access resources. If the pool is re-enabled, existing tokens grant access again.
356356
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name of the pool in Google Cloud Console. Cannot exceed 32 characters.
357357
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the pool. Format: `locations/{location}/workforcePools/{workforce_pool_id}`
358358
&quot;parent&quot;: &quot;A String&quot;, # Immutable. The resource name of the parent. Format: `organizations/{org-id}`.

docs/dyn/iam_v1.locations.workforcePools.providers.html

Lines changed: 20 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -129,12 +129,16 @@ <h3>Method Details</h3>
129129
&quot;a_key&quot;: &quot;A String&quot;,
130130
},
131131
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the provider. Cannot exceed 256 characters.
132-
&quot;disabled&quot;: True or False, # Whether the provider is disabled. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
132+
&quot;disabled&quot;: True or False, # Disables the workforce pool provider. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
133133
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name for the provider. Cannot exceed 32 characters.
134134
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the provider. Format: `locations/{location}/workforcePools/{workforce_pool_id}/providers/{provider_id}`
135135
&quot;oidc&quot;: { # Represents an OpenId Connect 1.0 identity provider. # An OpenId Connect 1.0 identity provider configuration.
136136
&quot;clientId&quot;: &quot;A String&quot;, # Required. The client ID. Must match the audience claim of the JWT issued by the identity provider.
137137
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URI. Must be a valid URI using the &#x27;https&#x27; scheme.
138+
&quot;webSsoConfig&quot;: { # Configuration for web single sign-on for the OIDC provider. # Required. Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
139+
&quot;assertionClaimsBehavior&quot;: &quot;A String&quot;, # Required. The behavior for how OIDC Claims are included in the `assertion` object used for attribute mapping and attribute condition.
140+
&quot;responseType&quot;: &quot;A String&quot;, # Required. The Response Type to request for in the OIDC Authorization Request for web sign-in.
141+
},
138142
},
139143
&quot;saml&quot;: { # Represents a SAML identity provider. # A SAML identity provider configuration.
140144
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Up to 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at least one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata.
@@ -227,12 +231,16 @@ <h3>Method Details</h3>
227231
&quot;a_key&quot;: &quot;A String&quot;,
228232
},
229233
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the provider. Cannot exceed 256 characters.
230-
&quot;disabled&quot;: True or False, # Whether the provider is disabled. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
234+
&quot;disabled&quot;: True or False, # Disables the workforce pool provider. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
231235
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name for the provider. Cannot exceed 32 characters.
232236
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the provider. Format: `locations/{location}/workforcePools/{workforce_pool_id}/providers/{provider_id}`
233237
&quot;oidc&quot;: { # Represents an OpenId Connect 1.0 identity provider. # An OpenId Connect 1.0 identity provider configuration.
234238
&quot;clientId&quot;: &quot;A String&quot;, # Required. The client ID. Must match the audience claim of the JWT issued by the identity provider.
235239
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URI. Must be a valid URI using the &#x27;https&#x27; scheme.
240+
&quot;webSsoConfig&quot;: { # Configuration for web single sign-on for the OIDC provider. # Required. Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
241+
&quot;assertionClaimsBehavior&quot;: &quot;A String&quot;, # Required. The behavior for how OIDC Claims are included in the `assertion` object used for attribute mapping and attribute condition.
242+
&quot;responseType&quot;: &quot;A String&quot;, # Required. The Response Type to request for in the OIDC Authorization Request for web sign-in.
243+
},
236244
},
237245
&quot;saml&quot;: { # Represents a SAML identity provider. # A SAML identity provider configuration.
238246
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Up to 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at least one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata.
@@ -267,12 +275,16 @@ <h3>Method Details</h3>
267275
&quot;a_key&quot;: &quot;A String&quot;,
268276
},
269277
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the provider. Cannot exceed 256 characters.
270-
&quot;disabled&quot;: True or False, # Whether the provider is disabled. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
278+
&quot;disabled&quot;: True or False, # Disables the workforce pool provider. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
271279
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name for the provider. Cannot exceed 32 characters.
272280
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the provider. Format: `locations/{location}/workforcePools/{workforce_pool_id}/providers/{provider_id}`
273281
&quot;oidc&quot;: { # Represents an OpenId Connect 1.0 identity provider. # An OpenId Connect 1.0 identity provider configuration.
274282
&quot;clientId&quot;: &quot;A String&quot;, # Required. The client ID. Must match the audience claim of the JWT issued by the identity provider.
275283
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URI. Must be a valid URI using the &#x27;https&#x27; scheme.
284+
&quot;webSsoConfig&quot;: { # Configuration for web single sign-on for the OIDC provider. # Required. Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
285+
&quot;assertionClaimsBehavior&quot;: &quot;A String&quot;, # Required. The behavior for how OIDC Claims are included in the `assertion` object used for attribute mapping and attribute condition.
286+
&quot;responseType&quot;: &quot;A String&quot;, # Required. The Response Type to request for in the OIDC Authorization Request for web sign-in.
287+
},
276288
},
277289
&quot;saml&quot;: { # Represents a SAML identity provider. # A SAML identity provider configuration.
278290
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Up to 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at least one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata.
@@ -312,12 +324,16 @@ <h3>Method Details</h3>
312324
&quot;a_key&quot;: &quot;A String&quot;,
313325
},
314326
&quot;description&quot;: &quot;A String&quot;, # A user-specified description of the provider. Cannot exceed 256 characters.
315-
&quot;disabled&quot;: True or False, # Whether the provider is disabled. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
327+
&quot;disabled&quot;: True or False, # Disables the workforce pool provider. You cannot use a disabled provider to exchange tokens. However, existing tokens still grant access.
316328
&quot;displayName&quot;: &quot;A String&quot;, # A user-specified display name for the provider. Cannot exceed 32 characters.
317329
&quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the provider. Format: `locations/{location}/workforcePools/{workforce_pool_id}/providers/{provider_id}`
318330
&quot;oidc&quot;: { # Represents an OpenId Connect 1.0 identity provider. # An OpenId Connect 1.0 identity provider configuration.
319331
&quot;clientId&quot;: &quot;A String&quot;, # Required. The client ID. Must match the audience claim of the JWT issued by the identity provider.
320332
&quot;issuerUri&quot;: &quot;A String&quot;, # Required. The OIDC issuer URI. Must be a valid URI using the &#x27;https&#x27; scheme.
333+
&quot;webSsoConfig&quot;: { # Configuration for web single sign-on for the OIDC provider. # Required. Configuration for web single sign-on for the OIDC provider. Here, web sign-in refers to console sign-in and gcloud sign-in through the browser.
334+
&quot;assertionClaimsBehavior&quot;: &quot;A String&quot;, # Required. The behavior for how OIDC Claims are included in the `assertion` object used for attribute mapping and attribute condition.
335+
&quot;responseType&quot;: &quot;A String&quot;, # Required. The Response Type to request for in the OIDC Authorization Request for web sign-in.
336+
},
321337
},
322338
&quot;saml&quot;: { # Represents a SAML identity provider. # A SAML identity provider configuration.
323339
&quot;idpMetadataXml&quot;: &quot;A String&quot;, # Required. SAML Identity provider configuration metadata xml doc. The xml document should comply with [SAML 2.0 specification](https://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf). The max size of the acceptable xml document will be bounded to 128k characters. The metadata xml document should satisfy the following constraints: 1) Must contain an Identity Provider Entity ID. 2) Must contain at least one non-expired signing key certificate. 3) For each signing key: a) Valid from should be no more than 7 days from now. b) Valid to should be no more than 14 years in the future. 4) Up to 3 IdP signing keys are allowed in the metadata xml. When updating the provider&#x27;s metadata xml, at least one non-expired signing key must overlap with the existing metadata. This requirement is skipped if there are no non-expired signing keys present in the existing metadata.

0 commit comments

Comments
 (0)