Skip to content
This repository has been archived by the owner on Jul 6, 2023. It is now read-only.

Commit

Permalink
fix: updating metadata messages for all long running operations (#57)
Browse files Browse the repository at this point in the history
* fix!: updating metadata messages for all long running operations

This change might be breaking for client libraries in some languages.

PiperOrigin-RevId: 419931787

Source-Link: googleapis/googleapis@060a1d3

Source-Link: googleapis/googleapis-gen@7cd2e70
Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiN2NkMmU3MGEzOTc1MDJhYzA0ZTdhMWNlYTVmNTM1OGE2ZWUzMjg4ZiJ9

* 🦉 Updates from OwlBot

See https://github.com/googleapis/repo-automation-bots/blob/main/packages/owl-bot/README.md

Co-authored-by: Owl Bot <gcf-owl-bot[bot]@users.noreply.github.com>
Co-authored-by: Anthonios Partheniou <partheniou@google.com>
  • Loading branch information
3 people committed Jan 9, 2022
1 parent 517c7f8 commit 7adc601
Show file tree
Hide file tree
Showing 6 changed files with 51 additions and 28 deletions.
Expand Up @@ -57,7 +57,10 @@


class NetworkSecurityAsyncClient:
""""""
"""Network Security API provides resources to configure
authentication and authorization policies. Refer to per API
resource documentation for more information.
"""

_client: NetworkSecurityClient

Expand Down
Expand Up @@ -93,7 +93,10 @@ def get_transport_class(cls, label: str = None,) -> Type[NetworkSecurityTranspor


class NetworkSecurityClient(metaclass=NetworkSecurityClientMeta):
""""""
"""Network Security API provides resources to configure
authentication and authorization policies. Refer to per API
resource documentation for more information.
"""

@staticmethod
def _get_default_mtls_endpoint(api_endpoint):
Expand Down
Expand Up @@ -44,6 +44,10 @@
class NetworkSecurityGrpcTransport(NetworkSecurityTransport):
"""gRPC backend transport for NetworkSecurity.
Network Security API provides resources to configure
authentication and authorization policies. Refer to per API
resource documentation for more information.
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
and call it.
Expand Down
Expand Up @@ -45,6 +45,10 @@
class NetworkSecurityGrpcAsyncIOTransport(NetworkSecurityTransport):
"""gRPC AsyncIO backend transport for NetworkSecurity.
Network Security API provides resources to configure
authentication and authorization policies. Refer to per API
resource documentation for more information.
This class defines the same methods as the primary client, so the
primary client can load the underlying transport implementation
and call it.
Expand Down
Expand Up @@ -104,12 +104,18 @@ class Source(proto.Message):
authorization. At least one principal should match. Each
peer can be an exact match, or a prefix match (example,
"namespace/*") or a suffix match (example, //
*/service-account") or a presence match "*".
*/service-account") or a presence match "*". Authorization
based on the principal name without certificate validation
(configured by ServerTlsPolicy resource) is considered
insecure.
ip_blocks (Sequence[str]):
Optional. List of CIDR ranges to match based
on source IP address. At least one IP block
should match. Single IP (e.g., "1.2.3.4") and
CIDR (e.g., "1.2.3.0/24") are supported.
Authorization based on source IP alone should be
avoided. The IP addresses of any load balancers
or proxies should be considered untrusted.
"""

principals = proto.RepeatedField(proto.STRING, number=1,)
Expand All @@ -120,11 +126,11 @@ class Destination(proto.Message):
Attributes:
hosts (Sequence[str]):
Required. List of host names to match. Matched against HOST
header in http requests. At least one host should match.
Each host can be an exact match, or a prefix match (example
"mydomain.*") or a suffix match (example // *.myorg.com") or
a presence(any) match "*".
Required. List of host names to match. Matched against the
":authority" header in http requests. At least one host
should match. Each host can be an exact match, or a prefix
match (example "mydomain.*") or a suffix match (example //
*.myorg.com") or a presence(any) match "*".
ports (Sequence[int]):
Required. List of destination ports to match.
At least one port should match.
Expand All @@ -136,7 +142,11 @@ class Destination(proto.Message):
Optional. Match against key:value pair in
http header. Provides a flexible match based on
HTTP headers, for potentially advanced use
cases. At least one header should match.
cases. At least one header should match. Avoid
using header matches to make authorization
decisions unless there is a strong guarantee
that requests arrive through a trusted client or
proxy.
"""

class HttpHeaderMatch(proto.Message):
Expand Down
37 changes: 18 additions & 19 deletions google/cloud/network_security_v1beta1/types/server_tls_policy.py
Expand Up @@ -46,45 +46,44 @@ class ServerTlsPolicy(proto.Message):
the pattern
``projects/*/locations/{location}/serverTlsPolicies/{server_tls_policy}``
description (str):
Optional. Free-text description of the
resource.
Free-text description of the resource.
create_time (google.protobuf.timestamp_pb2.Timestamp):
Output only. The timestamp when the resource
was created.
update_time (google.protobuf.timestamp_pb2.Timestamp):
Output only. The timestamp when the resource
was updated.
labels (Sequence[google.cloud.network_security_v1beta1.types.ServerTlsPolicy.LabelsEntry]):
Optional. Set of label tags associated with
the resource.
Set of label tags associated with the
resource.
allow_open (bool):
Optional. Determines if server allows plaintext connections.
If set to true, server allows plain text connections. By
default, it is set to false. This setting is not exclusive
of other encryption modes. For example, if allow_open and
mtls_policy are set, server allows both plain text and mTLS
connections. See documentation of other encryption modes to
confirm compatibility.
Determines if server allows plaintext connections. If set to
true, server allows plain text connections. By default, it
is set to false. This setting is not exclusive of other
encryption modes. For example, if ``allow_open`` and
``mtls_policy`` are set, server allows both plain text and
mTLS connections. See documentation of other encryption
modes to confirm compatibility.
server_certificate (google.cloud.network_security_v1beta1.types.CertificateProvider):
Optional. Defines a mechanism to provision server identity
(public and private keys). Cannot be combined with
allow_open as a permissive mode that allows both plain text
and TLS is not supported.
Defines a mechanism to provision server identity (public and
private keys). Cannot be combined with ``allow_open`` as a
permissive mode that allows both plain text and TLS is not
supported.
mtls_policy (google.cloud.network_security_v1beta1.types.ServerTlsPolicy.MTLSPolicy):
Optional. Defines a mechanism to provision peer validation
Defines a mechanism to provision peer validation
certificates for peer to peer authentication (Mutual TLS -
mTLS). If not specified, client certificate will not be
requested. The connection is treated as TLS and not mTLS. If
allow_open and mtls_policy are set, server allows both plain
text and mTLS connections.
``allow_open`` and ``mtls_policy`` are set, server allows
both plain text and mTLS connections.
"""

class MTLSPolicy(proto.Message):
r"""Specification of the MTLSPolicy.
Attributes:
client_validation_ca (Sequence[google.cloud.network_security_v1beta1.types.ValidationCA]):
Required. Defines the mechanism to obtain the
Defines the mechanism to obtain the
Certificate Authority certificate to validate
the client certificate.
"""
Expand Down

0 comments on commit 7adc601

Please sign in to comment.