google-apis-binaryauthorization_v1 0.9.0 → 0.13.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 90cb8ff5a619e39e8e922b280760033fbf45ae45f8a0d209dd3b34539c4b837f
4
- data.tar.gz: e6754753a1faf9e42409b0cd4530220fc3de9850490a46e8aed5cd565d6dfe73
3
+ metadata.gz: 4a7db06167dc6fa00bcd941111e2175b08871864554b1cd04308d9849b2691f8
4
+ data.tar.gz: e2dc5c18a40995be898a1732095665512e484d72224b57c6e2e183b8aacc3475
5
5
  SHA512:
6
- metadata.gz: 90bf928de8f9d749d2028cc18ff79e8a07a02198b6658698a9c4a6c227f66a7576949a31465b4d286043955927852edebe810a711ac1bf752cb71163f5cef33e
7
- data.tar.gz: 4e150fa99e2433a143436f5c898c0ee03b4389731555d11150fd1e6c5386e03b3b24d78bbef566f147c89181ee09b9ce9cb90b5944846144441c1ecf6c108ddc
6
+ metadata.gz: 8b19c3bf49fa73d4a36a0f5c401e48386fe75247a6ae9685f24faa752d66fc5fc5431085cdfccab35338da0cddf28515095d047b4394df5c86e7fc31caa860c7
7
+ data.tar.gz: f4e2a298fff65015f9491bcc4371682217f1aa8d7a58e5fd4204186a155ba2e82a047e848e5318b7f7356e2602315b095f7d01d8aa0abd1465ec388086649db2
data/CHANGELOG.md CHANGED
@@ -1,5 +1,22 @@
1
1
  # Release history for google-apis-binaryauthorization_v1
2
2
 
3
+ ### v0.13.0 (2021-12-14)
4
+
5
+ * Unspecified changes
6
+
7
+ ### v0.12.0 (2021-11-20)
8
+
9
+ * Regenerated from discovery document revision 20211112
10
+
11
+ ### v0.11.0 (2021-11-13)
12
+
13
+ * Regenerated from discovery document revision 20211105
14
+
15
+ ### v0.10.0 (2021-10-23)
16
+
17
+ * Regenerated from discovery document revision 20211015
18
+ * Unspecified changes
19
+
3
20
  ### v0.9.0 (2021-08-21)
4
21
 
5
22
  * Regenerated from discovery document revision 20210813
data/OVERVIEW.md CHANGED
@@ -51,7 +51,7 @@ require "google/apis/binaryauthorization_v1"
51
51
  client = Google::Apis::BinaryauthorizationV1::BinaryAuthorizationService.new
52
52
 
53
53
  # Authenticate calls
54
- client.authentication = # ... use the googleauth gem to create credentials
54
+ client.authorization = # ... use the googleauth gem to create credentials
55
55
  ```
56
56
 
57
57
  See the class reference docs for information on the methods you can call from a client.
@@ -60,8 +60,8 @@ See the class reference docs for information on the methods you can call from a
60
60
 
61
61
  More detailed descriptions of the Google simple REST clients are available in two documents.
62
62
 
63
- * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
- * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
63
+ * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
+ * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
65
65
 
66
66
  (Note: the above documents are written for the simple REST clients in general, and their examples may not reflect the Binaryauthorization service in particular.)
67
67
 
@@ -221,7 +221,7 @@ module Google
221
221
  end
222
222
  end
223
223
 
224
- # Associates `members` with a `role`.
224
+ # Associates `members`, or principals, with a `role`.
225
225
  class Binding
226
226
  include Google::Apis::Core::Hashable
227
227
 
@@ -244,7 +244,7 @@ module Google
244
244
  # @return [Google::Apis::BinaryauthorizationV1::Expr]
245
245
  attr_accessor :condition
246
246
 
247
- # Specifies the identities requesting access for a Cloud Platform resource. `
247
+ # Specifies the principals requesting access for a Cloud Platform resource. `
248
248
  # members` can have the following values: * `allUsers`: A special identifier
249
249
  # that represents anyone who is on the internet; with or without a Google
250
250
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -274,8 +274,8 @@ module Google
274
274
  # @return [Array<String>]
275
275
  attr_accessor :members
276
276
 
277
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
278
- # , or `roles/owner`.
277
+ # Role that is assigned to the list of `members`, or principals. For example, `
278
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
279
279
  # Corresponds to the JSON property `role`
280
280
  # @return [String]
281
281
  attr_accessor :role
@@ -365,37 +365,42 @@ module Google
365
365
 
366
366
  # An Identity and Access Management (IAM) policy, which specifies access
367
367
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
368
- # A `binding` binds one or more `members` to a single `role`. Members can be
369
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
370
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
371
- # role or a user-created custom role. For some types of Google Cloud resources,
372
- # a `binding` can also specify a `condition`, which is a logical expression that
373
- # allows access to a resource only if the expression evaluates to `true`. A
374
- # condition can add constraints based on attributes of the request, the resource,
375
- # or both. To learn which resources support conditions in their IAM policies,
376
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
377
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
378
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
379
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
380
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
381
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
382
- # title": "expirable access", "description": "Does not grant access after Sep
383
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
384
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
385
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
386
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
387
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
388
- # roles/resourcemanager.organizationViewer condition: title: expirable access
389
- # description: Does not grant access after Sep 2020 expression: request.time <
390
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
391
- # description of IAM and its features, see the [IAM documentation](https://cloud.
392
- # google.com/iam/docs/).
368
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
369
+ # Principals can be user accounts, service accounts, Google groups, and domains (
370
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
371
+ # an IAM predefined role or a user-created custom role. For some types of Google
372
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
373
+ # logical expression that allows access to a resource only if the expression
374
+ # evaluates to `true`. A condition can add constraints based on attributes of
375
+ # the request, the resource, or both. To learn which resources support
376
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
377
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
378
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
379
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
380
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
381
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
382
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
383
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
384
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
385
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
386
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
387
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
388
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
389
+ # access description: Does not grant access after Sep 2020 expression: request.
390
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
391
+ # a description of IAM and its features, see the [IAM documentation](https://
392
+ # cloud.google.com/iam/docs/).
393
393
  class IamPolicy
394
394
  include Google::Apis::Core::Hashable
395
395
 
396
- # Associates a list of `members` to a `role`. Optionally, may specify a `
397
- # condition` that determines how and when the `bindings` are applied. Each of
398
- # the `bindings` must contain at least one member.
396
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
397
+ # specify a `condition` that determines how and when the `bindings` are applied.
398
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
399
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
400
+ # can be Google groups. Each occurrence of a principal counts towards these
401
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
402
+ # example.com`, and not to any other principal, then you can add another 1,450
403
+ # principals to the `bindings` in the `Policy`.
399
404
  # Corresponds to the JSON property `bindings`
400
405
  # @return [Array<Google::Apis::BinaryauthorizationV1::Binding>]
401
406
  attr_accessor :bindings
@@ -569,20 +574,20 @@ module Google
569
574
  attr_accessor :global_policy_evaluation_mode
570
575
 
571
576
  # Optional. Per-istio-service-identity admission rules. Istio service identity
572
- # spec format: spiffe:///ns//sa/ or /ns//sa/ e.g. spiffe://example.com/ns/test-
573
- # ns/sa/default
577
+ # spec format: `spiffe:///ns//sa/` or `/ns//sa/` e.g. `spiffe://example.com/ns/
578
+ # test-ns/sa/default`
574
579
  # Corresponds to the JSON property `istioServiceIdentityAdmissionRules`
575
580
  # @return [Hash<String,Google::Apis::BinaryauthorizationV1::AdmissionRule>]
576
581
  attr_accessor :istio_service_identity_admission_rules
577
582
 
578
583
  # Optional. Per-kubernetes-namespace admission rules. K8s namespace spec format:
579
- # [a-z.-]+, e.g. 'some-namespace'
584
+ # `[a-z.-]+`, e.g. `some-namespace`
580
585
  # Corresponds to the JSON property `kubernetesNamespaceAdmissionRules`
581
586
  # @return [Hash<String,Google::Apis::BinaryauthorizationV1::AdmissionRule>]
582
587
  attr_accessor :kubernetes_namespace_admission_rules
583
588
 
584
589
  # Optional. Per-kubernetes-service-account admission rules. Service account spec
585
- # format: `namespace:serviceaccount`. e.g. 'test-ns:default'
590
+ # format: `namespace:serviceaccount`. e.g. `test-ns:default`
586
591
  # Corresponds to the JSON property `kubernetesServiceAccountAdmissionRules`
587
592
  # @return [Hash<String,Google::Apis::BinaryauthorizationV1::AdmissionRule>]
588
593
  attr_accessor :kubernetes_service_account_admission_rules
@@ -623,31 +628,31 @@ module Google
623
628
 
624
629
  # An Identity and Access Management (IAM) policy, which specifies access
625
630
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
626
- # A `binding` binds one or more `members` to a single `role`. Members can be
627
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
628
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
629
- # role or a user-created custom role. For some types of Google Cloud resources,
630
- # a `binding` can also specify a `condition`, which is a logical expression that
631
- # allows access to a resource only if the expression evaluates to `true`. A
632
- # condition can add constraints based on attributes of the request, the resource,
633
- # or both. To learn which resources support conditions in their IAM policies,
634
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
635
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
636
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
637
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
638
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
639
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
640
- # title": "expirable access", "description": "Does not grant access after Sep
641
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
642
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
643
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
644
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
645
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
646
- # roles/resourcemanager.organizationViewer condition: title: expirable access
647
- # description: Does not grant access after Sep 2020 expression: request.time <
648
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
649
- # description of IAM and its features, see the [IAM documentation](https://cloud.
650
- # google.com/iam/docs/).
631
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
632
+ # Principals can be user accounts, service accounts, Google groups, and domains (
633
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
634
+ # an IAM predefined role or a user-created custom role. For some types of Google
635
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
636
+ # logical expression that allows access to a resource only if the expression
637
+ # evaluates to `true`. A condition can add constraints based on attributes of
638
+ # the request, the resource, or both. To learn which resources support
639
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
640
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
641
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
642
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
643
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
644
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
645
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
646
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
647
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
648
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
649
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
650
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
651
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
652
+ # access description: Does not grant access after Sep 2020 expression: request.
653
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
654
+ # a description of IAM and its features, see the [IAM documentation](https://
655
+ # cloud.google.com/iam/docs/).
651
656
  # Corresponds to the JSON property `policy`
652
657
  # @return [Google::Apis::BinaryauthorizationV1::IamPolicy]
653
658
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module BinaryauthorizationV1
18
18
  # Version of the google-apis-binaryauthorization_v1 gem
19
- GEM_VERSION = "0.9.0"
19
+ GEM_VERSION = "0.13.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210813"
25
+ REVISION = "20211112"
26
26
  end
27
27
  end
28
28
  end
@@ -22,8 +22,9 @@ module Google
22
22
  module BinaryauthorizationV1
23
23
  # Binary Authorization API
24
24
  #
25
- # The management interface for Binary Authorization, a system providing policy
26
- # control for images deployed to Kubernetes Engine clusters.
25
+ # The management interface for Binary Authorization, a service that provides
26
+ # policy-based deployment validation and control for images deployed to Google
27
+ # Kubernetes Engine (GKE), Anthos Service Mesh, Anthos Clusters, and Cloud Run.
27
28
  #
28
29
  # @example
29
30
  # require 'google/apis/binaryauthorization_v1'
@@ -228,13 +229,16 @@ module Google
228
229
  # REQUIRED: The resource for which the policy is being requested. See the
229
230
  # operation documentation for the appropriate value for this field.
230
231
  # @param [Fixnum] options_requested_policy_version
231
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
232
- # 3. Requests specifying an invalid value will be rejected. Requests for
233
- # policies with any conditional bindings must specify version 3. Policies
234
- # without any conditional bindings may specify any valid value or leave the
235
- # field unset. To learn which resources support conditions in their IAM policies,
236
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
237
- # resource-policies).
232
+ # Optional. The maximum policy version that will be used to format the policy.
233
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
234
+ # rejected. Requests for policies with any conditional role bindings must
235
+ # specify version 3. Policies with no conditional role bindings may specify any
236
+ # valid value or leave the field unset. The policy in the response might use the
237
+ # policy version that you specified, or it might use a lower policy version. For
238
+ # example, if you specify version 3, but the policy has no conditional role
239
+ # bindings, the response uses version 1. To learn which resources support
240
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
241
+ # google.com/iam/help/conditions/resource-policies).
238
242
  # @param [String] fields
239
243
  # Selector specifying which fields to include in a partial response.
240
244
  # @param [String] quota_user
@@ -452,13 +456,16 @@ module Google
452
456
  # REQUIRED: The resource for which the policy is being requested. See the
453
457
  # operation documentation for the appropriate value for this field.
454
458
  # @param [Fixnum] options_requested_policy_version
455
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
456
- # 3. Requests specifying an invalid value will be rejected. Requests for
457
- # policies with any conditional bindings must specify version 3. Policies
458
- # without any conditional bindings may specify any valid value or leave the
459
- # field unset. To learn which resources support conditions in their IAM policies,
460
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
461
- # resource-policies).
459
+ # Optional. The maximum policy version that will be used to format the policy.
460
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
461
+ # rejected. Requests for policies with any conditional role bindings must
462
+ # specify version 3. Policies with no conditional role bindings may specify any
463
+ # valid value or leave the field unset. The policy in the response might use the
464
+ # policy version that you specified, or it might use a lower policy version. For
465
+ # example, if you specify version 3, but the policy has no conditional role
466
+ # bindings, the response uses version 1. To learn which resources support
467
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
468
+ # google.com/iam/help/conditions/resource-policies).
462
469
  # @param [String] fields
463
470
  # Selector specifying which fields to include in a partial response.
464
471
  # @param [String] quota_user
@@ -21,8 +21,9 @@ module Google
21
21
  module Apis
22
22
  # Binary Authorization API
23
23
  #
24
- # The management interface for Binary Authorization, a system providing policy
25
- # control for images deployed to Kubernetes Engine clusters.
24
+ # The management interface for Binary Authorization, a service that provides
25
+ # policy-based deployment validation and control for images deployed to Google
26
+ # Kubernetes Engine (GKE), Anthos Service Mesh, Anthos Clusters, and Cloud Run.
26
27
  #
27
28
  # @see https://cloud.google.com/binary-authorization/
28
29
  module BinaryauthorizationV1
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-binaryauthorization_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.9.0
4
+ version: 0.13.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-08-23 00:00:00.000000000 Z
11
+ date: 2022-01-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -57,9 +57,9 @@ licenses:
57
57
  - Apache-2.0
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
- changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-binaryauthorization_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1/v0.9.0
62
- source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-binaryauthorization_v1
60
+ changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1/CHANGELOG.md
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1/v0.13.0
62
+ source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1
63
63
  post_install_message:
64
64
  rdoc_options: []
65
65
  require_paths:
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
75
75
  - !ruby/object:Gem::Version
76
76
  version: '0'
77
77
  requirements: []
78
- rubygems_version: 3.2.17
78
+ rubygems_version: 3.3.4
79
79
  signing_key:
80
80
  specification_version: 4
81
81
  summary: Simple REST client for Binary Authorization API V1