google-apis-binaryauthorization_v1 0.27.0 → 0.29.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 94fbd1a8b383bdc8a6efee555b0b87e44c3b1ba3273600cb3ee2715c3945fff8
4
- data.tar.gz: de005458c987eb9cf58b9314839258ababcd2591f6dde2d3b5e22e29205d2048
3
+ metadata.gz: c249395e992d074e8b7a3e14ac2882b4cc7c4b1d6d919fe36fcc36e5a8d9cfac
4
+ data.tar.gz: 8da185576f2f34a1f5ad6fb06cef1eb73786c6b84201f0d931d056ca9f45c818
5
5
  SHA512:
6
- metadata.gz: 8f7ea44fba93760efaf2daadc54436cecde027882efa46ebd1eb47a99049fbc3616bfa01d63a0f43025ea45af1efee32d72ab80a93c9fcf4258dfe8241d9cfff
7
- data.tar.gz: 67cb793b872e71287ae047056a0de87d55c68f8cfdceda5d35bd0d8317e60c57f94d20029dd97cb51d7eba98bffd06b33fbc856f705953308ad2e1556cd9bd71
6
+ metadata.gz: e957866e22f4eb5d3b7b8db270a7f9df9e72c01f1f1e5f1625b2de6ccbfd39e19edbb358daebc67e7cdbd05abb65ac35b22358876f42d5473b6d382a483ed4e2
7
+ data.tar.gz: ecf741f9548b58b68be8298f0c99eb631e3faf88a06d7d2c9d091b40863a4b7d7866f99beeb73c0f5d6ff696cfc884810bf1a8806d8cde0f17cad33f774ce4dd
data/CHANGELOG.md CHANGED
@@ -1,5 +1,13 @@
1
1
  # Release history for google-apis-binaryauthorization_v1
2
2
 
3
+ ### v0.29.0 (2023-10-08)
4
+
5
+ * Regenerated from discovery document revision 20230929
6
+
7
+ ### v0.28.0 (2023-09-10)
8
+
9
+ * Regenerated from discovery document revision 20230901
10
+
3
11
  ### v0.27.0 (2023-08-13)
4
12
 
5
13
  * Regenerated from discovery document revision 20230804
@@ -44,8 +44,8 @@ module Google
44
44
  # image, in the format `projects/*/attestors/*`. Each attestor must exist before
45
45
  # a policy can reference it. To add an attestor to a policy the principal
46
46
  # issuing the policy change request must be able to read the attestor resource.
47
- # Note: this field must be non-empty when the evaluation_mode field specifies
48
- # REQUIRE_ATTESTATION, otherwise it must be empty.
47
+ # Note: this field must be non-empty when the `evaluation_mode` field specifies `
48
+ # REQUIRE_ATTESTATION`, otherwise it must be empty.
49
49
  # Corresponds to the JSON property `requireAttestationsBy`
50
50
  # @return [Array<String>]
51
51
  attr_accessor :require_attestations_by
@@ -94,7 +94,7 @@ module Google
94
94
  class AttestationAuthenticator
95
95
  include Google::Apis::Core::Hashable
96
96
 
97
- # Optional. A user-provided name for this AttestationAuthenticator. This field
97
+ # Optional. A user-provided name for this `AttestationAuthenticator`. This field
98
98
  # has no effect on the policy evaluation behavior except to improve readability
99
99
  # of messages in evaluation results.
100
100
  # Corresponds to the JSON property `displayName`
@@ -102,8 +102,9 @@ module Google
102
102
  attr_accessor :display_name
103
103
 
104
104
  # A bundle of PKIX public keys, used to authenticate attestation signatures.
105
- # Generally, a signature is considered to be authenticated by a PkixPublicKeySet
106
- # if any of the public keys verify it (i.e. it is an "OR" of the keys).
105
+ # Generally, a signature is considered to be authenticated by a `
106
+ # PkixPublicKeySet` if any of the public keys verify it (i.e. it is an "OR" of
107
+ # the keys).
107
108
  # Corresponds to the JSON property `pkixPublicKeySet`
108
109
  # @return [Google::Apis::BinaryauthorizationV1::PkixPublicKeySet]
109
110
  attr_accessor :pkix_public_key_set
@@ -170,8 +171,8 @@ module Google
170
171
  class AttestationSource
171
172
  include Google::Apis::Core::Hashable
172
173
 
173
- # The ids of the GCP projects storing the SLSA attestations as container
174
- # analysis Occurrences.
174
+ # The IDs of the GCP projects storing the SLSA attestations as Container
175
+ # Analysis Occurrences.
175
176
  # Corresponds to the JSON property `containerAnalysisAttestationProjects`
176
177
  # @return [Array<String>]
177
178
  attr_accessor :container_analysis_attestation_projects
@@ -242,10 +243,11 @@ module Google
242
243
 
243
244
  # ASCII-armored representation of a PGP public key, as the entire output by the
244
245
  # command `gpg --export --armor foo@example.com` (either LF or CRLF line endings)
245
- # . When using this field, `id` should be left blank. The BinAuthz API handlers
246
- # will calculate the ID and fill it in automatically. BinAuthz computes this ID
247
- # as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. If `id`
248
- # is provided by the caller, it will be overwritten by the API-calculated ID.
246
+ # . When using this field, `id` should be left blank. The Binary Authorization
247
+ # API handlers will calculate the ID and fill it in automatically. Binary
248
+ # Authorization computes this ID as the OpenPGP RFC4880 V4 fingerprint,
249
+ # represented as upper-case hex. If `id` is provided by the caller, it will be
250
+ # overwritten by the API-calculated ID.
249
251
  # Corresponds to the JSON property `asciiArmoredPgpPublicKey`
250
252
  # @return [String]
251
253
  attr_accessor :ascii_armored_pgp_public_key
@@ -255,18 +257,18 @@ module Google
255
257
  # @return [String]
256
258
  attr_accessor :comment
257
259
 
258
- # The ID of this public key. Signatures verified by BinAuthz must include the ID
259
- # of the public key that can be used to verify them, and that ID must match the
260
- # contents of this field exactly. Additional restrictions on this field can be
261
- # imposed based on which public key type is encapsulated. See the documentation
262
- # on `public_key` cases below for details.
260
+ # The ID of this public key. Signatures verified by Binary Authorization must
261
+ # include the ID of the public key that can be used to verify them, and that ID
262
+ # must match the contents of this field exactly. Additional restrictions on this
263
+ # field can be imposed based on which public key type is encapsulated. See the
264
+ # documentation on `public_key` cases below for details.
263
265
  # Corresponds to the JSON property `id`
264
266
  # @return [String]
265
267
  attr_accessor :id
266
268
 
267
- # A public key in the PkixPublicKey format (see https://tools.ietf.org/html/
268
- # rfc5280#section-4.1.2.7 for details). Public keys of this type are typically
269
- # textually encoded using the PEM format.
269
+ # A public key in the PkixPublicKey [format](https://tools.ietf.org/html/rfc5280#
270
+ # section-4.1.2.7). Public keys of this type are typically textually encoded
271
+ # using the PEM format.
270
272
  # Corresponds to the JSON property `pkixPublicKey`
271
273
  # @return [Google::Apis::BinaryauthorizationV1::PkixPublicKey]
272
274
  attr_accessor :pkix_public_key
@@ -360,21 +362,21 @@ module Google
360
362
  end
361
363
  end
362
364
 
363
- # A single check to perform against a Pod. Checks are grouped into CheckSets,
364
- # which are defined by the top-level policy.
365
+ # A single check to perform against a Pod. Checks are grouped into `CheckSet`
366
+ # objects, which are defined by the top-level policy.
365
367
  class Check
366
368
  include Google::Apis::Core::Hashable
367
369
 
368
370
  # Optional. A special-case check that always denies. Note that this still only
369
- # applies when the scope of the CheckSet applies and the image isn't exempted by
370
- # an image allowlist. This check is primarily useful for testing, or to set the
371
- # default behavior for all unmatched scopes to "deny".
371
+ # applies when the scope of the `CheckSet` applies and the image isn't exempted
372
+ # by an image allowlist. This check is primarily useful for testing, or to set
373
+ # the default behavior for all unmatched scopes to "deny".
372
374
  # Corresponds to the JSON property `alwaysDeny`
373
375
  # @return [Boolean]
374
376
  attr_accessor :always_deny
375
377
  alias_method :always_deny?, :always_deny
376
378
 
377
- # Optional. A user-provided name for this Check. This field has no effect on the
379
+ # Optional. A user-provided name for this check. This field has no effect on the
378
380
  # policy evaluation behavior except to improve readability of messages in
379
381
  # evaluation results.
380
382
  # Corresponds to the JSON property `displayName`
@@ -434,22 +436,22 @@ module Google
434
436
  end
435
437
 
436
438
  # A conjunction of policy checks, scoped to a particular namespace or Kubernetes
437
- # service account. In order for evaluation of a CheckSet to return "allowed" for
438
- # a given image in a given Pod, one of the following conditions must be
439
+ # service account. In order for evaluation of a `CheckSet` to return "allowed"
440
+ # for a given image in a given Pod, one of the following conditions must be
439
441
  # satisfied: * The image is explicitly exempted by an entry in `image_allowlist`,
440
442
  # OR * ALL of the `checks` evaluate to "allowed".
441
443
  class CheckSet
442
444
  include Google::Apis::Core::Hashable
443
445
 
444
446
  # Optional. The checks to apply. The ultimate result of evaluating the check set
445
- # will be "allow" if and only if every check in 'checks' evaluates to "allow".
447
+ # will be "allow" if and only if every check in `checks` evaluates to "allow".
446
448
  # If `checks` is empty, the default behavior is "always allow".
447
449
  # Corresponds to the JSON property `checks`
448
450
  # @return [Array<Google::Apis::BinaryauthorizationV1::Check>]
449
451
  attr_accessor :checks
450
452
 
451
- # Optional. A user-provided name for this CheckSet. This field has no effect on
452
- # the policy evaluation behavior except to improve readability of messages in
453
+ # Optional. A user-provided name for this `CheckSet`. This field has no effect
454
+ # on the policy evaluation behavior except to improve readability of messages in
453
455
  # evaluation results.
454
456
  # Corresponds to the JSON property `displayName`
455
457
  # @return [String]
@@ -460,7 +462,7 @@ module Google
460
462
  # @return [Google::Apis::BinaryauthorizationV1::ImageAllowlist]
461
463
  attr_accessor :image_allowlist
462
464
 
463
- # A scope specifier for CheckSets.
465
+ # A scope specifier for `CheckSet` objects.
464
466
  # Corresponds to the JSON property `scope`
465
467
  # @return [Google::Apis::BinaryauthorizationV1::Scope]
466
468
  attr_accessor :scope
@@ -553,21 +555,22 @@ module Google
553
555
  class GkePolicy
554
556
  include Google::Apis::Core::Hashable
555
557
 
556
- # Optional. The CheckSets to apply, scoped by namespace or namespace and service
557
- # account. Exactly one CheckSet will be evaluated for a given Pod (unless the
558
- # list is empty, in which case the behavior is "always allow"). If multiple
559
- # CheckSets have scopes that match the namespace and service account of the Pod
560
- # being evaluated, only the CheckSet with the MOST SPECIFIC scope will match.
561
- # CheckSets must be listed in order of decreasing specificity, i.e. if a scope
562
- # matches a given service account (which must include the namespace), it must
563
- # come before a CheckSet with a scope matching just that namespace. This
564
- # property is enforced by server-side validation. The purpose of this
565
- # restriction is to ensure that if more than one CheckSet matches a given Pod,
566
- # the CheckSet that will be evaluated will always be the first in the list to
567
- # match (because if any other matches, it must be less specific). If `check_sets`
568
- # is empty, the default behavior is to allow all images. If `check_sets` is non-
569
- # empty, the last `check_sets` entry must always be a CheckSet with no scope set,
570
- # i.e. a catchall to handle any situation not caught by the preceding CheckSets.
558
+ # Optional. The `CheckSet` objects to apply, scoped by namespace or namespace
559
+ # and service account. Exactly one `CheckSet` will be evaluated for a given Pod (
560
+ # unless the list is empty, in which case the behavior is "always allow"). If
561
+ # multiple `CheckSet` objects have scopes that match the namespace and service
562
+ # account of the Pod being evaluated, only the `CheckSet` with the MOST SPECIFIC
563
+ # scope will match. `CheckSet` objects must be listed in order of decreasing
564
+ # specificity, i.e. if a scope matches a given service account (which must
565
+ # include the namespace), it must come before a `CheckSet` with a scope matching
566
+ # just that namespace. This property is enforced by server-side validation. The
567
+ # purpose of this restriction is to ensure that if more than one `CheckSet`
568
+ # matches a given Pod, the `CheckSet` that will be evaluated will always be the
569
+ # first in the list to match (because if any other matches, it must be less
570
+ # specific). If `check_sets` is empty, the default behavior is to allow all
571
+ # images. If `check_sets` is non-empty, the last `check_sets` entry must always
572
+ # be a `CheckSet` with no scope set, i.e. a catchall to handle any situation not
573
+ # caught by the preceding `CheckSet` objects.
571
574
  # Corresponds to the JSON property `checkSets`
572
575
  # @return [Array<Google::Apis::BinaryauthorizationV1::CheckSet>]
573
576
  attr_accessor :check_sets
@@ -739,7 +742,7 @@ module Google
739
742
  end
740
743
  end
741
744
 
742
- # Response message for BinauthzManagementService.ListAttestors.
745
+ # Response message for BinauthzManagementServiceV1.ListAttestors.
743
746
  class ListAttestorsResponse
744
747
  include Google::Apis::Core::Hashable
745
748
 
@@ -793,12 +796,27 @@ module Google
793
796
  end
794
797
  end
795
798
 
796
- # A public key in the PkixPublicKey format (see https://tools.ietf.org/html/
797
- # rfc5280#section-4.1.2.7 for details). Public keys of this type are typically
798
- # textually encoded using the PEM format.
799
+ # A public key in the PkixPublicKey [format](https://tools.ietf.org/html/rfc5280#
800
+ # section-4.1.2.7). Public keys of this type are typically textually encoded
801
+ # using the PEM format.
799
802
  class PkixPublicKey
800
803
  include Google::Apis::Core::Hashable
801
804
 
805
+ # Optional. The ID of this public key. Signatures verified by Binary
806
+ # Authorization must include the ID of the public key that can be used to verify
807
+ # them, and that ID must match the contents of this field exactly. This may be
808
+ # explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If `
809
+ # key_id` is left blank and this `PkixPublicKey` is not used in the context of a
810
+ # wrapper (see next paragraph), a default key ID will be computed based on the
811
+ # digest of the DER encoding of the public key. If this `PkixPublicKey` is used
812
+ # in the context of a wrapper that has its own notion of key ID (e.g. `
813
+ # AttestorPublicKey`), then this field can either: * Match that value exactly. *
814
+ # Or be left blank, in which case it behaves exactly as though it is equal to
815
+ # that wrapper value.
816
+ # Corresponds to the JSON property `keyId`
817
+ # @return [String]
818
+ attr_accessor :key_id
819
+
802
820
  # A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#
803
821
  # section-13
804
822
  # Corresponds to the JSON property `publicKeyPem`
@@ -819,14 +837,16 @@ module Google
819
837
 
820
838
  # Update properties of this object
821
839
  def update!(**args)
840
+ @key_id = args[:key_id] if args.key?(:key_id)
822
841
  @public_key_pem = args[:public_key_pem] if args.key?(:public_key_pem)
823
842
  @signature_algorithm = args[:signature_algorithm] if args.key?(:signature_algorithm)
824
843
  end
825
844
  end
826
845
 
827
846
  # A bundle of PKIX public keys, used to authenticate attestation signatures.
828
- # Generally, a signature is considered to be authenticated by a PkixPublicKeySet
829
- # if any of the public keys verify it (i.e. it is an "OR" of the keys).
847
+ # Generally, a signature is considered to be authenticated by a `
848
+ # PkixPublicKeySet` if any of the public keys verify it (i.e. it is an "OR" of
849
+ # the keys).
830
850
  class PkixPublicKeySet
831
851
  include Google::Apis::Core::Hashable
832
852
 
@@ -860,8 +880,8 @@ module Google
860
880
  # @return [Google::Apis::BinaryauthorizationV1::GkePolicy]
861
881
  attr_accessor :gke_policy
862
882
 
863
- # Output only. The relative resource name of the BinAuthz platform policy, in
864
- # the form of `projects/*/platforms/*/policies/*`.
883
+ # Output only. The relative resource name of the Binary Authorization platform
884
+ # policy, in the form of `projects/*/platforms/*/policies/*`.
865
885
  # Corresponds to the JSON property `name`
866
886
  # @return [String]
867
887
  attr_accessor :name
@@ -983,7 +1003,7 @@ module Google
983
1003
  end
984
1004
  end
985
1005
 
986
- # A scope specifier for CheckSets.
1006
+ # A scope specifier for `CheckSet` objects.
987
1007
  class Scope
988
1008
  include Google::Apis::Core::Hashable
989
1009
 
@@ -993,8 +1013,8 @@ module Google
993
1013
  # @return [String]
994
1014
  attr_accessor :kubernetes_namespace
995
1015
 
996
- # Optional. Matches a single Kubernetes service account, e.g. 'my-namespace:my-
997
- # service-account'. `kubernetes_service_account` scope is always more specific
1016
+ # Optional. Matches a single Kubernetes service account, e.g. `my-namespace:my-
1017
+ # service-account`. `kubernetes_service_account` scope is always more specific
998
1018
  # than `kubernetes_namespace` scope for the same namespace.
999
1019
  # Corresponds to the JSON property `kubernetesServiceAccount`
1000
1020
  # @return [String]
@@ -1216,19 +1236,20 @@ module Google
1216
1236
 
1217
1237
  # Required. List of trusted directory patterns. A pattern is in the form "
1218
1238
  # registry/path/to/directory". The registry domain part is defined as two or
1219
- # more dot-separated words, e.g., us.pkg.dev, or gcr.io. Additionally, * can be
1220
- # used in three ways as wildcards: 1. leading * to match varying prefixes in
1221
- # registry subdomain (useful for location prefixes); 2. trailing * after
1222
- # registry/ to match varying endings; 3. trailing ** after registry/ to match "/"
1223
- # as well. For example: -- gcr.io/my-project/my-repo is valid to match a single
1224
- # directory -- *-docker.pkg.dev/my-project/my-repo or *.gcr.io/my-project are
1225
- # valid to match varying prefixes -- gcr.io/my-project/* will match all direct
1226
- # directories in my-project -- gcr.io/my-project/** would match all directories
1227
- # in my-project -- gcr.i* is not allowed since the registry is not completely
1228
- # specified -- sub*domain.gcr.io/nginx is not valid because only leading * or
1229
- # trailing * are allowed. -- *pkg.dev/my-project/my-repo is not valid because
1230
- # leading * can only match subdomain -- **-docker.pkg.dev is not valid because
1231
- # one leading * is allowed, and that it cannot match "/"
1239
+ # more dot-separated words, e.g., `us.pkg.dev`, or `gcr.io`. Additionally, `*`
1240
+ # can be used in three ways as wildcards: 1. leading `*` to match varying
1241
+ # prefixes in registry subdomain (useful for location prefixes); 2. trailing `*`
1242
+ # after registry/ to match varying endings; 3. trailing `**` after registry/ to
1243
+ # match "/" as well. For example: -- `gcr.io/my-project/my-repo` is valid to
1244
+ # match a single directory -- `*-docker.pkg.dev/my-project/my-repo` or `*.gcr.io/
1245
+ # my-project` are valid to match varying prefixes -- `gcr.io/my-project/*` will
1246
+ # match all direct directories in `my-project` -- `gcr.io/my-project/**` would
1247
+ # match all directories in `my-project` -- `gcr.i*` is not allowed since the
1248
+ # registry is not completely specified -- `sub*domain.gcr.io/nginx` is not valid
1249
+ # because only leading `*` or trailing `*` are allowed. -- `*pkg.dev/my-project/
1250
+ # my-repo` is not valid because leading `*` can only match subdomain -- `**-
1251
+ # docker.pkg.dev` is not valid because one leading `*` is allowed, and that it
1252
+ # cannot match `/`
1232
1253
  # Corresponds to the JSON property `trustedDirPatterns`
1233
1254
  # @return [Array<String>]
1234
1255
  attr_accessor :trusted_dir_patterns
@@ -1249,11 +1270,11 @@ module Google
1249
1270
  include Google::Apis::Core::Hashable
1250
1271
 
1251
1272
  # Output only. This field will contain the service account email address that
1252
- # this Attestor will use as the principal when querying Container Analysis.
1273
+ # this attestor will use as the principal when querying Container Analysis.
1253
1274
  # Attestor administrators must grant this service account the IAM role needed to
1254
1275
  # read attestations from the note_reference in Container Analysis (`
1255
1276
  # containeranalysis.notes.occurrences.viewer`). This email address is fixed for
1256
- # the lifetime of the Attestor, but callers should not make any other
1277
+ # the lifetime of the attestor, but callers should not make any other
1257
1278
  # assumptions about the service account email; future versions may use an email
1258
1279
  # based on a different naming pattern.
1259
1280
  # Corresponds to the JSON property `delegationServiceAccountEmail`
@@ -1367,8 +1388,8 @@ module Google
1367
1388
  # @return [Google::Apis::BinaryauthorizationV1::AttestationSource]
1368
1389
  attr_accessor :attestation_source
1369
1390
 
1370
- # If true, require the image to be built from a top-level configuration.
1371
- # trusted_source_repo patterns specifies the repositories containing this
1391
+ # If true, require the image to be built from a top-level configuration. `
1392
+ # trusted_source_repo_patterns` specifies the repositories containing this
1372
1393
  # configuration.
1373
1394
  # Corresponds to the JSON property `configBasedBuildRequired`
1374
1395
  # @return [Boolean]
@@ -1385,19 +1406,19 @@ module Google
1385
1406
  attr_accessor :trusted_builder
1386
1407
 
1387
1408
  # List of trusted source code repository URL patterns. These patterns match the
1388
- # full repository URL without its scheme (e.g. "https://"). The patterns must
1389
- # not include schemes. For example, the pattern "source.cloud.google.com/my-
1390
- # project/my-repo-name" matches the following URLs: - "source.cloud.google.com/
1391
- # my-project/my-repo-name" - "git+ssh://source.cloud.google.com/my-project/my-
1392
- # repo-name" - "https://source.cloud.google.com/my-project/my-repo-name" A
1393
- # pattern matches a URL either exactly or with * wildcards. * can be used in
1394
- # only two ways: 1. trailing * after hosturi/ to match varying endings; 2.
1395
- # trailing ** after hosturi/ to match "/" as well. * and ** can only be used as
1396
- # wildcards and can only occur at the end of the pattern after a /. (So it's not
1397
- # possible to match a URL that contains literal *.) For example: - "github.com/
1398
- # my-project/my-repo" is valid to match a single repo - "github.com/my-project/*"
1399
- # will match all direct repos in my-project - "github.com/**" matches all repos
1400
- # in GitHub
1409
+ # full repository URL without its scheme (e.g. `https://`). The patterns must
1410
+ # not include schemes. For example, the pattern `source.cloud.google.com/my-
1411
+ # project/my-repo-name` matches the following URLs: - `source.cloud.google.com/
1412
+ # my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-
1413
+ # repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A
1414
+ # pattern matches a URL either exactly or with `*` wildcards. `*` can be used in
1415
+ # only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2.
1416
+ # trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be
1417
+ # used as wildcards and can only occur at the end of the pattern after a `/`. (
1418
+ # So it's not possible to match a URL that contains literal `*`.) For example: -
1419
+ # `github.com/my-project/my-repo` is valid to match a single repo - `github.com/
1420
+ # my-project/*` will match all direct repos in `my-project` - `github.com/**`
1421
+ # matches all repos in GitHub
1401
1422
  # Corresponds to the JSON property `trustedSourceRepoPatterns`
1402
1423
  # @return [Array<String>]
1403
1424
  attr_accessor :trusted_source_repo_patterns
@@ -1421,33 +1442,33 @@ module Google
1421
1442
  include Google::Apis::Core::Hashable
1422
1443
 
1423
1444
  # Optional. A list of specific CVEs to ignore even if the vulnerability level
1424
- # violates maximumUnfixableSeverity or maximumFixableSeverity. CVEs are listed
1425
- # in the format of Container Analysis note id. For example: - CVE-2021-20305 -
1426
- # CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.
1427
- # g., an entry of `CVE-2021-20305` will allow vulnerabilities with a note name
1428
- # of either `projects/goog-vulnz/notes/CVE-2021-20305` or `projects/CUSTOM-
1429
- # PROJECT/notes/CVE-2021-20305`.
1445
+ # violates `maximumUnfixableSeverity` or `maximumFixableSeverity`. CVEs are
1446
+ # listed in the format of Container Analysis note id. For example: - CVE-2021-
1447
+ # 20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider
1448
+ # project, e.g., an entry of `CVE-2021-20305` will allow vulnerabilities with a
1449
+ # note name of either `projects/goog-vulnz/notes/CVE-2021-20305` or `projects/
1450
+ # CUSTOM-PROJECT/notes/CVE-2021-20305`.
1430
1451
  # Corresponds to the JSON property `allowedCves`
1431
1452
  # @return [Array<String>]
1432
1453
  attr_accessor :allowed_cves
1433
1454
 
1434
1455
  # Optional. A list of specific CVEs to always raise warnings about even if the
1435
- # vulnerability level meets maximumUnfixableSeverity or maximumFixableSeverity.
1436
- # CVEs are listed in the format of Container Analysis note id. For example: -
1437
- # CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note
1438
- # provider project, e.g., an entry of `CVE-2021-20305` will block
1439
- # vulnerabilities with a note name of either `projects/goog-vulnz/notes/CVE-2021-
1440
- # 20305` or `projects/CUSTOM-PROJECT/notes/CVE-2021-20305`.
1456
+ # vulnerability level meets `maximumUnfixableSeverity` or `
1457
+ # maximumFixableSeverity`. CVEs are listed in the format of Container Analysis
1458
+ # note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are
1459
+ # applicable regardless of note provider project, e.g., an entry of `CVE-2021-
1460
+ # 20305` will block vulnerabilities with a note name of either `projects/goog-
1461
+ # vulnz/notes/CVE-2021-20305` or `projects/CUSTOM-PROJECT/notes/CVE-2021-20305`.
1441
1462
  # Corresponds to the JSON property `blockedCves`
1442
1463
  # @return [Array<String>]
1443
1464
  attr_accessor :blocked_cves
1444
1465
 
1445
1466
  # Optional. The projects where vulnerabilities are stored as Container Analysis
1446
1467
  # Occurrences. Each project is expressed in the resource format of `projects/[
1447
- # PROJECT_ID]`, e.g., projects/my-gcp-project. An attempt will be made for each
1448
- # project to fetch vulnerabilities, and all valid vulnerabilities will be used
1449
- # to check against the vulnerability policy. If no valid scan is found in all
1450
- # projects configured here, an error will be returned for the check.
1468
+ # PROJECT_ID]`, e.g., `projects/my-gcp-project`. An attempt will be made for
1469
+ # each project to fetch vulnerabilities, and all valid vulnerabilities will be
1470
+ # used to check against the vulnerability policy. If no valid scan is found in
1471
+ # all projects configured here, an error will be returned for the check.
1451
1472
  # Corresponds to the JSON property `containerAnalysisVulnerabilityProjects`
1452
1473
  # @return [Array<String>]
1453
1474
  attr_accessor :container_analysis_vulnerability_projects
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module BinaryauthorizationV1
18
18
  # Version of the google-apis-binaryauthorization_v1 gem
19
- GEM_VERSION = "0.27.0"
19
+ GEM_VERSION = "0.29.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.12.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20230804"
25
+ REVISION = "20230929"
26
26
  end
27
27
  end
28
28
  end
@@ -425,6 +425,7 @@ module Google
425
425
  class PkixPublicKey
426
426
  # @private
427
427
  class Representation < Google::Apis::Core::JsonRepresentation
428
+ property :key_id, as: 'keyId'
428
429
  property :public_key_pem, as: 'publicKeyPem'
429
430
  property :signature_algorithm, as: 'signatureAlgorithm'
430
431
  end
@@ -88,8 +88,8 @@ module Google
88
88
 
89
89
  # Creates or updates a project's policy, and returns a copy of the new policy. A
90
90
  # policy is always updated as a whole, to avoid race conditions with concurrent
91
- # policy enforcement (or management!) requests. Returns NOT_FOUND if the project
92
- # does not exist, INVALID_ARGUMENT if the request is malformed.
91
+ # policy enforcement (or management!) requests. Returns `NOT_FOUND` if the
92
+ # project does not exist, `INVALID_ARGUMENT` if the request is malformed.
93
93
  # @param [String] name
94
94
  # Output only. The resource name, in the format `projects/*/policy`. There is at
95
95
  # most one policy per project.
@@ -123,9 +123,9 @@ module Google
123
123
  execute_or_queue_command(command, &block)
124
124
  end
125
125
 
126
- # Creates an attestor, and returns a copy of the new attestor. Returns NOT_FOUND
127
- # if the project does not exist, INVALID_ARGUMENT if the request is malformed,
128
- # ALREADY_EXISTS if the attestor already exists.
126
+ # Creates an attestor, and returns a copy of the new attestor. Returns `
127
+ # NOT_FOUND` if the project does not exist, `INVALID_ARGUMENT` if the request is
128
+ # malformed, `ALREADY_EXISTS` if the attestor already exists.
129
129
  # @param [String] parent
130
130
  # Required. The parent of this attestor.
131
131
  # @param [Google::Apis::BinaryauthorizationV1::Attestor] attestor_object
@@ -161,7 +161,7 @@ module Google
161
161
  execute_or_queue_command(command, &block)
162
162
  end
163
163
 
164
- # Deletes an attestor. Returns NOT_FOUND if the attestor does not exist.
164
+ # Deletes an attestor. Returns `NOT_FOUND` if the attestor does not exist.
165
165
  # @param [String] name
166
166
  # Required. The name of the attestors to delete, in the format `projects/*/
167
167
  # attestors/*`.
@@ -192,7 +192,7 @@ module Google
192
192
  execute_or_queue_command(command, &block)
193
193
  end
194
194
 
195
- # Gets an attestor. Returns NOT_FOUND if the attestor does not exist.
195
+ # Gets an attestor. Returns `NOT_FOUND` if the attestor does not exist.
196
196
  # @param [String] name
197
197
  # Required. The name of the attestor to retrieve, in the format `projects/*/
198
198
  # attestors/*`.
@@ -268,7 +268,7 @@ module Google
268
268
  execute_or_queue_command(command, &block)
269
269
  end
270
270
 
271
- # Lists attestors. Returns INVALID_ARGUMENT if the project does not exist.
271
+ # Lists attestors. Returns `INVALID_ARGUMENT` if the project does not exist.
272
272
  # @param [String] parent
273
273
  # Required. The resource name of the project associated with the attestors, in
274
274
  # the format `projects/*`.
@@ -384,7 +384,7 @@ module Google
384
384
  execute_or_queue_command(command, &block)
385
385
  end
386
386
 
387
- # Updates an attestor. Returns NOT_FOUND if the attestor does not exist.
387
+ # Updates an attestor. Returns `NOT_FOUND` if the attestor does not exist.
388
388
  # @param [String] name
389
389
  # Required. The resource name, in the format: `projects/*/attestors/*`. This
390
390
  # field may not be updated.
@@ -418,8 +418,8 @@ module Google
418
418
  execute_or_queue_command(command, &block)
419
419
  end
420
420
 
421
- # Returns whether the given Attestation for the given image URI was signed by
422
- # the given Attestor
421
+ # Returns whether the given `Attestation` for the given image URI was signed by
422
+ # the given `Attestor`
423
423
  # @param [String] attestor
424
424
  # Required. The resource name of the Attestor of the occurrence, in the format `
425
425
  # projects/*/attestors/*`.
@@ -453,11 +453,11 @@ module Google
453
453
  execute_or_queue_command(command, &block)
454
454
  end
455
455
 
456
- # Creates a platform policy, and returns a copy of it. Returns NOT_FOUND if the
457
- # project or platform doesn't exist, INVALID_ARGUMENT if the request is
458
- # malformed, ALREADY_EXISTS if the policy already exists, and INVALID_ARGUMENT
459
- # if the policy contains a platform-specific policy that does not match the
460
- # platform value specified in the URL.
456
+ # Creates a platform policy, and returns a copy of it. Returns `NOT_FOUND` if
457
+ # the project or platform doesn't exist, `INVALID_ARGUMENT` if the request is
458
+ # malformed, `ALREADY_EXISTS` if the policy already exists, and `
459
+ # INVALID_ARGUMENT` if the policy contains a platform-specific policy that does
460
+ # not match the platform value specified in the URL.
461
461
  # @param [String] parent
462
462
  # Required. The parent of this platform policy.
463
463
  # @param [Google::Apis::BinaryauthorizationV1::PlatformPolicy] platform_policy_object
@@ -493,7 +493,7 @@ module Google
493
493
  execute_or_queue_command(command, &block)
494
494
  end
495
495
 
496
- # Deletes a platform policy. Returns NOT_FOUND if the policy doesn't exist.
496
+ # Deletes a platform policy. Returns `NOT_FOUND` if the policy doesn't exist.
497
497
  # @param [String] name
498
498
  # Required. The name of the platform policy to delete, in the format `projects/*/
499
499
  # platforms/*/policies/*`.
@@ -524,7 +524,7 @@ module Google
524
524
  execute_or_queue_command(command, &block)
525
525
  end
526
526
 
527
- # Gets a platform policy. Returns NOT_FOUND if the policy doesn't exist.
527
+ # Gets a platform policy. Returns `NOT_FOUND` if the policy doesn't exist.
528
528
  # @param [String] name
529
529
  # Required. The name of the platform policy to retrieve in the format `projects/*
530
530
  # /platforms/*/policies/*`.
@@ -555,8 +555,8 @@ module Google
555
555
  execute_or_queue_command(command, &block)
556
556
  end
557
557
 
558
- # Lists platform policies owned by a project in the specified platform. Returns
559
- # INVALID_ARGUMENT if the project or the platform doesn't exist.
558
+ # Lists platform policies owned by a project in the specified platform. Returns `
559
+ # INVALID_ARGUMENT` if the project or the platform doesn't exist.
560
560
  # @param [String] parent
561
561
  # Required. The resource name of the platform associated with the platform
562
562
  # policies using the format `projects/*/platforms/*`.
@@ -596,10 +596,10 @@ module Google
596
596
  execute_or_queue_command(command, &block)
597
597
  end
598
598
 
599
- # Replaces a platform policy. Returns NOT_FOUND if the policy doesn't exist.
599
+ # Replaces a platform policy. Returns `NOT_FOUND` if the policy doesn't exist.
600
600
  # @param [String] name
601
- # Output only. The relative resource name of the BinAuthz platform policy, in
602
- # the form of `projects/*/platforms/*/policies/*`.
601
+ # Output only. The relative resource name of the Binary Authorization platform
602
+ # policy, in the form of `projects/*/platforms/*/policies/*`.
603
603
  # @param [Google::Apis::BinaryauthorizationV1::PlatformPolicy] platform_policy_object
604
604
  # @param [String] fields
605
605
  # Selector specifying which fields to include in a partial response.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-binaryauthorization_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.27.0
4
+ version: 0.29.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-08-13 00:00:00.000000000 Z
11
+ date: 2023-10-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1/v0.27.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1/v0.29.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1
63
63
  post_install_message:
64
64
  rdoc_options: []
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
75
75
  - !ruby/object:Gem::Version
76
76
  version: '0'
77
77
  requirements: []
78
- rubygems_version: 3.4.2
78
+ rubygems_version: 3.4.19
79
79
  signing_key:
80
80
  specification_version: 4
81
81
  summary: Simple REST client for Binary Authorization API V1