Skip to content

Commit 319b5ab

Browse files
feat(all): auto-regenerate discovery clients (#3538)
1 parent 6def284 commit 319b5ab

27 files changed

Lines changed: 415 additions & 111 deletions

admin/reports/v1/admin-api.json

Lines changed: 84 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -681,7 +681,7 @@
681681
}
682682
}
683683
},
684-
"revision": "20260223",
684+
"revision": "20260311",
685685
"rootUrl": "https://admin.googleapis.com/",
686686
"schemas": {
687687
"Activities": {
@@ -1033,6 +1033,17 @@
10331033
},
10341034
"type": "object"
10351035
},
1036+
"CustomerIdentity": {
1037+
"description": "Identity of the Google Workspace customer who owns the resource.",
1038+
"id": "CustomerIdentity",
1039+
"properties": {
1040+
"id": {
1041+
"description": "Customer id.",
1042+
"type": "string"
1043+
}
1044+
},
1045+
"type": "object"
1046+
},
10361047
"Date": {
10371048
"description": "Represents a whole or partial calendar date, such as a birthday. The time of day and time zone are either specified elsewhere or are insignificant. The date is relative to the Gregorian Calendar. This can represent one of the following: * A full date, with non-zero year, month, and day values. * A month and day, with a zero year (for example, an anniversary). * A year on its own, with a zero month and a zero day. * A year and month, with a zero day (for example, a credit card expiration date). Related types: * google.type.TimeOfDay * google.type.DateTime * google.protobuf.Timestamp",
10381049
"id": "Date",
@@ -1191,6 +1202,21 @@
11911202
},
11921203
"type": "object"
11931204
},
1205+
"GroupIdentity": {
1206+
"description": "Identity of the group who owns the resource.",
1207+
"id": "GroupIdentity",
1208+
"properties": {
1209+
"groupEmail": {
1210+
"description": "Group email.",
1211+
"type": "string"
1212+
},
1213+
"id": {
1214+
"description": "Group gaia id.",
1215+
"type": "string"
1216+
}
1217+
},
1218+
"type": "object"
1219+
},
11941220
"NestedParameter": {
11951221
"description": "JSON template for a parameter used in various reports.",
11961222
"id": "NestedParameter",
@@ -1237,6 +1263,43 @@
12371263
},
12381264
"type": "object"
12391265
},
1266+
"OwnerDetails": {
1267+
"description": "Details of the owner of the resource.",
1268+
"id": "OwnerDetails",
1269+
"properties": {
1270+
"ownerIdentity": {
1271+
"description": "Identity details of the owner(s) of the resource.",
1272+
"items": {
1273+
"$ref": "OwnerIdentity"
1274+
},
1275+
"type": "array"
1276+
},
1277+
"ownerType": {
1278+
"description": "Type of the owner of the resource.",
1279+
"type": "string"
1280+
}
1281+
},
1282+
"type": "object"
1283+
},
1284+
"OwnerIdentity": {
1285+
"description": "Identity details of the owner of the resource.",
1286+
"id": "OwnerIdentity",
1287+
"properties": {
1288+
"customerIdentity": {
1289+
"$ref": "CustomerIdentity",
1290+
"description": "Identity of the Google Workspace customer who owns the resource."
1291+
},
1292+
"groupIdentity": {
1293+
"$ref": "GroupIdentity",
1294+
"description": "Identity of the group who owns the resource."
1295+
},
1296+
"userIdentity": {
1297+
"$ref": "UserIdentity",
1298+
"description": "Identity of the user who owns the resource."
1299+
}
1300+
},
1301+
"type": "object"
1302+
},
12401303
"Reason": {
12411304
"description": "The reason why the label/field was applied.",
12421305
"id": "Reason",
@@ -1260,9 +1323,13 @@
12601323
"type": "array"
12611324
},
12621325
"id": {
1263-
"description": "Identifier of the resource.",
1326+
"description": "Identifier of the resource, such as a doc_id for a Drive document, a conference_id for a Meet conference, or a \"gaia_id/rfc2822_message_id\" for an email.",
12641327
"type": "string"
12651328
},
1329+
"ownerDetails": {
1330+
"$ref": "OwnerDetails",
1331+
"description": "Owner details of the resource."
1332+
},
12661333
"relation": {
12671334
"description": "Defines relationship of the resource to the events",
12681335
"type": "string"
@@ -1438,6 +1505,21 @@
14381505
}
14391506
},
14401507
"type": "object"
1508+
},
1509+
"UserIdentity": {
1510+
"description": "Identity of the user who owns the resource.",
1511+
"id": "UserIdentity",
1512+
"properties": {
1513+
"id": {
1514+
"description": "User gaia id.",
1515+
"type": "string"
1516+
},
1517+
"userEmail": {
1518+
"description": "User email.",
1519+
"type": "string"
1520+
}
1521+
},
1522+
"type": "object"
14411523
}
14421524
},
14431525
"servicePath": "",

admin/reports/v1/admin-gen.go

Lines changed: 127 additions & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

androidmanagement/v1/androidmanagement-api.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1265,7 +1265,7 @@
12651265
}
12661266
}
12671267
},
1268-
"revision": "20260310",
1268+
"revision": "20260312",
12691269
"rootUrl": "https://androidmanagement.googleapis.com/",
12701270
"schemas": {
12711271
"AdbShellCommandEvent": {
@@ -2196,7 +2196,7 @@
21962196
"The app is blocked and can't be installed. If the app was installed under a previous policy, it will be uninstalled. This also blocks its instant app functionality.",
21972197
"The app is available to install.",
21982198
"The app is automatically installed and can't be removed by the user and will prevent setup from completion until installation is complete.",
2199-
"The app is automatically installed in kiosk mode: it's set as the preferred home intent and whitelisted for lock task mode. Device setup won't complete until the app is installed. After installation, users won't be able to remove the app. You can only set this installType for one app per policy. When this is present in the policy, status bar will be automatically disabled.If there is any app with KIOSK role, then this install type cannot be set for any app.",
2199+
"The app is automatically installed in kiosk mode: it's set as the preferred home intent and whitelisted for lock task mode. Device setup won't complete until the app is installed. After installation, users won't be able to remove the app. You can only set this installType for one app per policy. When this is present in the policy, status bar will be automatically disabled.On Android 11 and above, when an app has this install type, the user control is disallowed for all apps. The IT admin can set userControlSettings to USER_CONTROL_ALLOWED to allow user control for specific apps.If there is any app with KIOSK role, then this install type cannot be set for any app.",
22002200
"The app can only be installed and updated via AMAPI SDK command (https://developers.google.com/android/management/extensibility-sdk-integration).Note: This only affects fully managed devices. Play related fields minimumVersionCode, accessibleTrackIds, autoUpdateMode, installConstraint and installPriority cannot be set for the app. The app isn't available in the Play Store. The app installed on the device has applicationSource set to CUSTOM. When the current installType is CUSTOM, the signing key certificate fingerprint of the existing custom app on the device must match one of the entries in ApplicationPolicy.signingKeyCerts . Otherwise, a NonComplianceDetail with APP_SIGNING_CERT_MISMATCH is reported. Changing the installType from CUSTOM to another value must match the playstore version of the application signing key certificate fingerprint. Otherwise a NonComplianceDetail with APP_SIGNING_CERT_MISMATCH is reported. Changing the installType to CUSTOM uninstalls the existing app if its signing key certificate fingerprint of the installed app doesn't match the one from the ApplicationPolicy.signingKeyCerts . Removing the app from applications doesn't uninstall the existing app if it conforms to playStoreMode. See also customAppConfig. This is different from the Google Play Custom App Publishing (https://developers.google.com/android/work/play/custom-app-api/get-started) feature."
22012201
],
22022202
"type": "string"
@@ -7133,7 +7133,7 @@
71337133
"enumDescriptions": [
71347134
"The role type is unspecified. This value must not be used.",
71357135
"The role type for companion apps. This role enables the app as a companion app with the capability of interacting with Android Device Policy offline. This is the recommended way to configure an app as a companion app. For legacy way, see extensionConfig.On Android 14 and above, the app with this role is exempted from power and background execution restrictions, suspension and hibernation. On Android 11 and above, the user control is disallowed for the app with this role. userControlSettings cannot be set to USER_CONTROL_ALLOWED for the app with this role.Android Device Policy notifies the companion app of any local command status updates if the app has a service with . See Integrate with the AMAPI SDK (https://developers.google.com/android/management/sdk-integration) guide for more details on the requirements for the service.",
7136-
"The role type for kiosk apps. An app can have this role only if it has installType set to REQUIRED_FOR_SETUP or CUSTOM. Before adding this role to an app with CUSTOM install type, the app must already be installed on the device.The app having this role type is set as the preferred home intent and allowlisted for lock task mode. When there is an app with this role type, status bar will be automatically disabled.This is preferable to setting installType to KIOSK.On Android 11 and above, the user control is disallowed but userControlSettings can be set to USER_CONTROL_ALLOWED to allow user control for the app with this role.",
7136+
"The role type for kiosk apps. An app can have this role only if it has installType set to REQUIRED_FOR_SETUP or CUSTOM. Before adding this role to an app with CUSTOM install type, the app must already be installed on the device.The app having this role type is set as the preferred home intent and allowlisted for lock task mode. When there is an app with this role type, status bar will be automatically disabled.This is preferable to setting installType to KIOSK.On Android 11 and above, when an app has this role, the user control is disallowed for all apps. The IT admin can set userControlSettings to USER_CONTROL_ALLOWED to allow user control for specific apps.",
71377137
"The role type for Mobile Threat Defense (MTD) / Endpoint Detection \u0026 Response (EDR) apps.On Android 14 and above, the app with this role is exempted from power and background execution restrictions, suspension and hibernation. On Android 11 and above, the user control is disallowed and userControlSettings cannot be set to USER_CONTROL_ALLOWED for the app with this role.",
71387138
"The role type for system health monitoring apps.On Android 14 and above, the app with this role is exempted from power and background execution restrictions, suspension and hibernation. On Android 11 and above, the user control is disallowed and userControlSettings cannot be set to USER_CONTROL_ALLOWED for the app with this role."
71397139
],

androidmanagement/v1/androidmanagement-gen.go

Lines changed: 9 additions & 5 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)