📂 File Browser

AgentAI/vendor/google/apiclient-services/src/CloudAsset
🌙 Dark Mode
🎯 Quick Launch:

📁 Directories

📁 Resource/ 🔓 Open

📄 Files

🐘 AccessSelector.php
▶ Open 📄 View Source
🐘 AnalyzeIamPolicyLongrunningMetadata.php
▶ Open 📄 View Source
🐘 AnalyzeIamPolicyLongrunningRequest.php
▶ Open 📄 View Source
🐘 AnalyzeIamPolicyLongrunningResponse.php
▶ Open 📄 View Source
🐘 AnalyzeIamPolicyResponse.php
▶ Open 📄 View Source
🐘 AnalyzeMoveResponse.php
▶ Open 📄 View Source
🐘 AnalyzeOrgPoliciesResponse.php
▶ Open 📄 View Source
🐘 AnalyzeOrgPolicyGovernedAssetsResponse.php
▶ Open 📄 View Source
🐘 AnalyzeOrgPolicyGovernedContainersResponse.php
▶ Open 📄 View Source
🐘 AnalyzerOrgPolicy.php
▶ Open 📄 View Source
🐘 AnalyzerOrgPolicyConstraint.php
▶ Open 📄 View Source
🐘 Asset.php
▶ Open 📄 View Source
🐘 AssetEnrichment.php
▶ Open 📄 View Source
🐘 AssetException.php
▶ Open 📄 View Source
🐘 AttachedResource.php
▶ Open 📄 View Source
🐘 AuditConfig.php
▶ Open 📄 View Source
🐘 AuditLogConfig.php
▶ Open 📄 View Source
🐘 BatchGetAssetsHistoryResponse.php
▶ Open 📄 View Source
🐘 BatchGetEffectiveIamPoliciesResponse.php
▶ Open 📄 View Source
🐘 BigQueryDestination.php
▶ Open 📄 View Source
🐘 Binding.php
▶ Open 📄 View Source
🐘 CancelOperationRequest.php
▶ Open 📄 View Source
🐘 CloudassetEmpty.php
▶ Open 📄 View Source
🐘 CloudassetResource.php
▶ Open 📄 View Source
🐘 ConditionContext.php
▶ Open 📄 View Source
🐘 ConditionEvaluation.php
▶ Open 📄 View Source
🐘 CreateFeedRequest.php
▶ Open 📄 View Source
🐘 Date.php
▶ Open 📄 View Source
🐘 DeniedAccess.php
▶ Open 📄 View Source
🐘 EffectiveIamPolicy.php
▶ Open 📄 View Source
🐘 EffectiveTagDetails.php
▶ Open 📄 View Source
🐘 Explanation.php
▶ Open 📄 View Source
🐘 ExportAssetsRequest.php
▶ Open 📄 View Source
🐘 Expr.php
▶ Open 📄 View Source
🐘 Feed.php
▶ Open 📄 View Source
🐘 FeedOutputConfig.php
▶ Open 📄 View Source
🐘 GcsDestination.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1Access.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1AccessControlList.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1AnalyzeOrgPolicyGovernedAssetsResponseGovernedAsset.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1AnalyzeOrgPolicyGovernedAssetsResponseGovernedIamPolicy.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1AnalyzeOrgPolicyGovernedAssetsResponseGovernedResource.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1BigQueryDestination.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1BooleanConstraint.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1Constraint.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1CustomConstraint.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1DeniedAccessAccess.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1DeniedAccessAccessTuple.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1DeniedAccessDenyDetail.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1DeniedAccessIdentity.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1DeniedAccessResource.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1Edge.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1GcsDestination.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1GovernedContainer.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1Identity.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1IdentityList.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1ListConstraint.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1QueryAssetsOutputConfigBigQueryDestination.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1Resource.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1Rule.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1StringValues.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1p7beta1Asset.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1p7beta1RelatedAsset.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1p7beta1RelatedAssets.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1p7beta1RelationshipAttributes.php
▶ Open 📄 View Source
🐘 GoogleCloudAssetV1p7beta1Resource.php
▶ Open 📄 View Source
🐘 GoogleCloudOrgpolicyV1BooleanPolicy.php
▶ Open 📄 View Source
🐘 GoogleCloudOrgpolicyV1ListPolicy.php
▶ Open 📄 View Source
🐘 GoogleCloudOrgpolicyV1Policy.php
▶ Open 📄 View Source
🐘 GoogleCloudOrgpolicyV1RestoreDefault.php
▶ Open 📄 View Source
🐘 GoogleIamV2DenyRule.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1AccessLevel.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1AccessPolicy.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1ApiOperation.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1BasicLevel.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1Condition.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1CustomLevel.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1DevicePolicy.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1EgressFrom.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1EgressPolicy.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1EgressSource.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1EgressTo.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1IngressFrom.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1IngressPolicy.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1IngressSource.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1IngressTo.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1MethodSelector.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1OsConstraint.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1ServicePerimeter.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1ServicePerimeterConfig.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1VpcAccessibleServices.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1VpcNetworkSource.php
▶ Open 📄 View Source
🐘 GoogleIdentityAccesscontextmanagerV1VpcSubNetwork.php
▶ Open 📄 View Source
🐘 IamPolicyAnalysis.php
▶ Open 📄 View Source
🐘 IamPolicyAnalysisOutputConfig.php
▶ Open 📄 View Source
🐘 IamPolicyAnalysisQuery.php
▶ Open 📄 View Source
🐘 IamPolicyAnalysisResult.php
▶ Open 📄 View Source
🐘 IamPolicyAnalysisState.php
▶ Open 📄 View Source
🐘 IamPolicySearchResult.php
▶ Open 📄 View Source
🐘 IdentitySelector.php
▶ Open 📄 View Source
🐘 Inventory.php
▶ Open 📄 View Source
🐘 Item.php
▶ Open 📄 View Source
🐘 ListAssetsResponse.php
▶ Open 📄 View Source
🐘 ListFeedsResponse.php
▶ Open 📄 View Source
🐘 ListSavedQueriesResponse.php
▶ Open 📄 View Source
🐘 MoveAnalysis.php
▶ Open 📄 View Source
🐘 MoveAnalysisResult.php
▶ Open 📄 View Source
🐘 MoveImpact.php
▶ Open 📄 View Source
🐘 Operation.php
▶ Open 📄 View Source
🐘 Options.php
▶ Open 📄 View Source
🐘 OrgPolicyResult.php
▶ Open 📄 View Source
🐘 OsInfo.php
▶ Open 📄 View Source
🐘 OutputConfig.php
▶ Open 📄 View Source
🐘 PartitionSpec.php
▶ Open 📄 View Source
🐘 Permissions.php
▶ Open 📄 View Source
🐘 Policy.php
▶ Open 📄 View Source
🐘 PolicyInfo.php
▶ Open 📄 View Source
🐘 PubsubDestination.php
▶ Open 📄 View Source
🐘 QueryAssetsOutputConfig.php
▶ Open 📄 View Source
🐘 QueryAssetsRequest.php
▶ Open 📄 View Source
🐘 QueryAssetsResponse.php
▶ Open 📄 View Source
🐘 QueryContent.php
▶ Open 📄 View Source
🐘 QueryResult.php
▶ Open 📄 View Source
🐘 RelatedAsset.php
▶ Open 📄 View Source
🐘 RelatedAssets.php
▶ Open 📄 View Source
🐘 RelatedResource.php
▶ Open 📄 View Source
🐘 RelatedResources.php
▶ Open 📄 View Source
🐘 RelationshipAttributes.php
▶ Open 📄 View Source
🐘 ResourceOwners.php
▶ Open 📄 View Source
🐘 ResourceSearchResult.php
▶ Open 📄 View Source
🐘 ResourceSelector.php
▶ Open 📄 View Source
🐘 SavedQuery.php
▶ Open 📄 View Source
🐘 SearchAllIamPoliciesResponse.php
▶ Open 📄 View Source
🐘 SearchAllResourcesResponse.php
▶ Open 📄 View Source
🐘 SoftwarePackage.php
▶ Open 📄 View Source
🐘 Status.php
▶ Open 📄 View Source
🐘 TableFieldSchema.php
▶ Open 📄 View Source
🐘 TableSchema.php
▶ Open 📄 View Source
🐘 Tag.php
▶ Open 📄 View Source
🐘 TemporalAsset.php
▶ Open 📄 View Source
🐘 TimeWindow.php
▶ Open 📄 View Source
🐘 UpdateFeedRequest.php
▶ Open 📄 View Source
🐘 VersionedPackage.php
▶ Open 📄 View Source
🐘 VersionedResource.php
▶ Open 📄 View Source
🐘 WindowsApplication.php
▶ Open 📄 View Source
🐘 WindowsQuickFixEngineeringPackage.php
▶ Open 📄 View Source
🐘 WindowsUpdateCategory.php
▶ Open 📄 View Source
🐘 WindowsUpdatePackage.php
▶ Open 📄 View Source
🐘 ZypperPatch.php
▶ Open 📄 View Source

📄 Source: GoogleIdentityAccesscontextmanagerV1AccessPolicy.php

<?php
/*
 * Copyright 2014 Google Inc.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */

namespace Google\Service\CloudAsset;

class GoogleIdentityAccesscontextmanagerV1AccessPolicy extends \Google\Collection
{
  protected $collection_key = 'scopes';
  /**
   * Output only. An opaque identifier for the current version of the
   * `AccessPolicy`. This will always be a strongly validated etag, meaning that
   * two Access Policies will be identical if and only if their etags are
   * identical. Clients should not expect this to be in any specific format.
   *
   * @var string
   */
  public $etag;
  /**
   * Output only. Identifier. Resource name of the `AccessPolicy`. Format:
   * `accessPolicies/{access_policy}`
   *
   * @var string
   */
  public $name;
  /**
   * Required. The parent of this `AccessPolicy` in the Cloud Resource
   * Hierarchy. Currently immutable once created. Format:
   * `organizations/{organization_id}`
   *
   * @var string
   */
  public $parent;
  /**
   * The scopes of the AccessPolicy. Scopes define which resources a policy can
   * restrict and where its resources can be referenced. For example, policy A
   * with `scopes=["folders/123"]` has the following behavior: -
   * ServicePerimeter can only restrict projects within `folders/123`. -
   * ServicePerimeter within policy A can only reference access levels defined
   * within policy A. - Only one policy can include a given scope; thus,
   * attempting to create a second policy which includes `folders/123` will
   * result in an error. If no scopes are provided, then any resource within the
   * organization can be restricted. Scopes cannot be modified after a policy is
   * created. Policies can only have a single scope. Format: list of
   * `folders/{folder_number}` or `projects/{project_number}`
   *
   * @var string[]
   */
  public $scopes;
  /**
   * Required. Human readable title. Does not affect behavior.
   *
   * @var string
   */
  public $title;

  /**
   * Output only. An opaque identifier for the current version of the
   * `AccessPolicy`. This will always be a strongly validated etag, meaning that
   * two Access Policies will be identical if and only if their etags are
   * identical. Clients should not expect this to be in any specific format.
   *
   * @param string $etag
   */
  public function setEtag($etag)
  {
    $this->etag = $etag;
  }
  /**
   * @return string
   */
  public function getEtag()
  {
    return $this->etag;
  }
  /**
   * Output only. Identifier. Resource name of the `AccessPolicy`. Format:
   * `accessPolicies/{access_policy}`
   *
   * @param string $name
   */
  public function setName($name)
  {
    $this->name = $name;
  }
  /**
   * @return string
   */
  public function getName()
  {
    return $this->name;
  }
  /**
   * Required. The parent of this `AccessPolicy` in the Cloud Resource
   * Hierarchy. Currently immutable once created. Format:
   * `organizations/{organization_id}`
   *
   * @param string $parent
   */
  public function setParent($parent)
  {
    $this->parent = $parent;
  }
  /**
   * @return string
   */
  public function getParent()
  {
    return $this->parent;
  }
  /**
   * The scopes of the AccessPolicy. Scopes define which resources a policy can
   * restrict and where its resources can be referenced. For example, policy A
   * with `scopes=["folders/123"]` has the following behavior: -
   * ServicePerimeter can only restrict projects within `folders/123`. -
   * ServicePerimeter within policy A can only reference access levels defined
   * within policy A. - Only one policy can include a given scope; thus,
   * attempting to create a second policy which includes `folders/123` will
   * result in an error. If no scopes are provided, then any resource within the
   * organization can be restricted. Scopes cannot be modified after a policy is
   * created. Policies can only have a single scope. Format: list of
   * `folders/{folder_number}` or `projects/{project_number}`
   *
   * @param string[] $scopes
   */
  public function setScopes($scopes)
  {
    $this->scopes = $scopes;
  }
  /**
   * @return string[]
   */
  public function getScopes()
  {
    return $this->scopes;
  }
  /**
   * Required. Human readable title. Does not affect behavior.
   *
   * @param string $title
   */
  public function setTitle($title)
  {
    $this->title = $title;
  }
  /**
   * @return string
   */
  public function getTitle()
  {
    return $this->title;
  }
}

// Adding a class alias for backwards compatibility with the previous class name.
class_alias(GoogleIdentityAccesscontextmanagerV1AccessPolicy::class, 'Google_Service_CloudAsset_GoogleIdentityAccesscontextmanagerV1AccessPolicy');
← Back