
Security News
Rust RFC Proposes a Security Tab on crates.io for RustSec Advisories
Rust’s crates.io team is advancing an RFC to add a Security tab that surfaces RustSec vulnerability and unsoundness advisories directly on crate pages.
@maxim_mazurok/gapi.client.accessapproval-v1
Advanced tools
An API for controlling access to data by Google personnel. For detailed description please check documentation.
Install typings for Access Approval API:
npm install @types/gapi.client.accessapproval-v1 --save-dev
You need to initialize Google API client in your code:
gapi.load('client', () => {
// now we can use gapi.client
// ...
});
Then load api client wrapper:
gapi.client.load('https://accessapproval.googleapis.com/$discovery/rest?version=v1', () => {
// now we can use:
// gapi.client.accessapproval
});
// Deprecated, use discovery document URL, see https://github.com/google/google-api-javascript-client/blob/master/docs/reference.md#----gapiclientloadname----version----callback--
gapi.client.load('accessapproval', 'v1', () => {
// now we can use:
// gapi.client.accessapproval
});
Don't forget to authenticate your client before sending any request to resources:
// declare client_id registered in Google Developers Console
var client_id = '',
scope = [
// See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account.
'https://www.googleapis.com/auth/cloud-platform',
],
immediate = true;
// ...
gapi.auth.authorize(
{ client_id: client_id, scope: scope, immediate: immediate },
authResult => {
if (authResult && !authResult.error) {
/* handle successful authorization */
} else {
/* handle authorization error */
}
});
After that you can use Access Approval API resources:
/*
Deletes the settings associated with a project, folder, or organization. This will have the effect of disabling Access Approval for the project, folder, or organization, but only if all ancestors also have Access Approval disabled. If Access Approval is enabled at a higher level of the hierarchy, then Access Approval will still be enabled at this level as the settings are inherited.
*/
await gapi.client.accessapproval.folders.deleteAccessApprovalSettings({ name: "name", });
/*
Gets the settings associated with a project, folder, or organization.
*/
await gapi.client.accessapproval.folders.getAccessApprovalSettings({ name: "name", });
/*
Retrieves the service account that is used by Access Approval to access KMS keys for signing approved approval requests.
*/
await gapi.client.accessapproval.folders.getServiceAccount({ name: "name", });
/*
Updates the settings associated with a project, folder, or organization. Settings to update are determined by the value of field_mask.
*/
await gapi.client.accessapproval.folders.updateAccessApprovalSettings({ name: "name", });
/*
Deletes the settings associated with a project, folder, or organization. This will have the effect of disabling Access Approval for the project, folder, or organization, but only if all ancestors also have Access Approval disabled. If Access Approval is enabled at a higher level of the hierarchy, then Access Approval will still be enabled at this level as the settings are inherited.
*/
await gapi.client.accessapproval.organizations.deleteAccessApprovalSettings({ name: "name", });
/*
Gets the settings associated with a project, folder, or organization.
*/
await gapi.client.accessapproval.organizations.getAccessApprovalSettings({ name: "name", });
/*
Retrieves the service account that is used by Access Approval to access KMS keys for signing approved approval requests.
*/
await gapi.client.accessapproval.organizations.getServiceAccount({ name: "name", });
/*
Updates the settings associated with a project, folder, or organization. Settings to update are determined by the value of field_mask.
*/
await gapi.client.accessapproval.organizations.updateAccessApprovalSettings({ name: "name", });
/*
Deletes the settings associated with a project, folder, or organization. This will have the effect of disabling Access Approval for the project, folder, or organization, but only if all ancestors also have Access Approval disabled. If Access Approval is enabled at a higher level of the hierarchy, then Access Approval will still be enabled at this level as the settings are inherited.
*/
await gapi.client.accessapproval.projects.deleteAccessApprovalSettings({ name: "name", });
/*
Gets the settings associated with a project, folder, or organization.
*/
await gapi.client.accessapproval.projects.getAccessApprovalSettings({ name: "name", });
/*
Retrieves the service account that is used by Access Approval to access KMS keys for signing approved approval requests.
*/
await gapi.client.accessapproval.projects.getServiceAccount({ name: "name", });
/*
Updates the settings associated with a project, folder, or organization. Settings to update are determined by the value of field_mask.
*/
await gapi.client.accessapproval.projects.updateAccessApprovalSettings({ name: "name", });
FAQs
TypeScript typings for Access Approval API v1
The npm package @maxim_mazurok/gapi.client.accessapproval-v1 receives a total of 435 weekly downloads. As such, @maxim_mazurok/gapi.client.accessapproval-v1 popularity was classified as not popular.
We found that @maxim_mazurok/gapi.client.accessapproval-v1 demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Rust’s crates.io team is advancing an RFC to add a Security tab that surfaces RustSec vulnerability and unsoundness advisories directly on crate pages.

Security News
/Research
Socket found a Rust typosquat (finch-rust) that loads sha-rust to steal credentials, using impersonation and an unpinned dependency to auto-deliver updates.

Research
/Security Fundamentals
A pair of typosquatted Go packages posing as Google’s UUID library quietly turn helper functions into encrypted exfiltration channels to a paste site, putting developer and CI data at risk.