google-apis-binaryauthorization_v1beta1 0.10.0 → 0.14.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 364e3024001791687429b568acb78b5b69e790ce7276aa64d8fc9e37c81848df
4
- data.tar.gz: 823a40d809b48b76be6d9d1b1c8f5c43dd477b15d1bbb951e0bf87692c19dd69
3
+ metadata.gz: cbd12d7da03e96572fb895350c4f904503dc8901b594f3a53a1907fda4d54996
4
+ data.tar.gz: 247bc40af8d326cb9c4b29a70ebbb0011d278e97e24f38516c2ca97499ae4866
5
5
  SHA512:
6
- metadata.gz: b3beaf6ba67cbdcddc098f0a7bcbab2b802aa9abe7ee96874f3e2a58568213c6c8ad0832f23e2a15c410a924730951e1bb33e89563e0856275ada793c7013e99
7
- data.tar.gz: e053db6efd469f6217ed73c26cf1c3f909bdbe53779fa19e27b3e17c31b37c6ad6c9106603cc94c76a8868babf6dba13ce2f1495bf553a0a42f280e2a305cdc9
6
+ metadata.gz: 7f1c491966be7121258ce0f78736777620de7411511e0fb5d338915651bbeb77382b4b7fdbbe17e40457fc51df67942c795ce8c6943c8426719d77a1bdb78f70
7
+ data.tar.gz: 03ffafc9725bb0a92ed13082ec8d666b8f135d1790487e15c44583e484d478bc792b5b9b57e1b76e1821cf2db2496ef36ff607fcecb4ebe73c2986ce3c8a4472
data/CHANGELOG.md CHANGED
@@ -1,5 +1,22 @@
1
1
  # Release history for google-apis-binaryauthorization_v1beta1
2
2
 
3
+ ### v0.14.0 (2021-12-14)
4
+
5
+ * Unspecified changes
6
+
7
+ ### v0.13.0 (2021-11-20)
8
+
9
+ * Regenerated from discovery document revision 20211112
10
+
11
+ ### v0.12.0 (2021-11-13)
12
+
13
+ * Regenerated from discovery document revision 20211105
14
+
15
+ ### v0.11.0 (2021-10-22)
16
+
17
+ * Regenerated from discovery document revision 20211015
18
+ * Unspecified changes
19
+
3
20
  ### v0.10.0 (2021-08-28)
4
21
 
5
22
  * Regenerated from discovery document revision 20210820
data/OVERVIEW.md CHANGED
@@ -51,7 +51,7 @@ require "google/apis/binaryauthorization_v1beta1"
51
51
  client = Google::Apis::BinaryauthorizationV1beta1::BinaryAuthorizationService.new
52
52
 
53
53
  # Authenticate calls
54
- client.authentication = # ... use the googleauth gem to create credentials
54
+ client.authorization = # ... use the googleauth gem to create credentials
55
55
  ```
56
56
 
57
57
  See the class reference docs for information on the methods you can call from a client.
@@ -60,8 +60,8 @@ See the class reference docs for information on the methods you can call from a
60
60
 
61
61
  More detailed descriptions of the Google simple REST clients are available in two documents.
62
62
 
63
- * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
- * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
63
+ * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
+ * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
65
65
 
66
66
  (Note: the above documents are written for the simple REST clients in general, and their examples may not reflect the Binaryauthorization service in particular.)
67
67
 
@@ -68,10 +68,10 @@ module Google
68
68
 
69
69
  # An image name pattern to allowlist, in the form `registry/path/to/image`. This
70
70
  # supports a trailing `*` as a wildcard, but this is allowed only in text after
71
- # the `registry/` part. `*` wildcard does not match `/`, i.e., gcr.io/nginx*
72
- # matches gcr.io/nginx@latest, but it does not match gcr.io/nginx/image. This
73
- # also supports a trailing `**` wildcard which matches subdirectories, i.e., gcr.
74
- # io/nginx** matches gcr.io/nginx/image.
71
+ # the `registry/` part. `*` wildcard does not match `/`, i.e., `gcr.io/nginx*`
72
+ # matches `gcr.io/nginx@latest`, but it does not match `gcr.io/nginx/image`.
73
+ # This also supports a trailing `**` wildcard which matches subdirectories, i.e.,
74
+ # `gcr.io/nginx**` matches `gcr.io/nginx/image`.
75
75
  # Corresponds to the JSON property `namePattern`
76
76
  # @return [String]
77
77
  attr_accessor :name_pattern
@@ -223,7 +223,7 @@ module Google
223
223
  end
224
224
  end
225
225
 
226
- # Associates `members` with a `role`.
226
+ # Associates `members`, or principals, with a `role`.
227
227
  class Binding
228
228
  include Google::Apis::Core::Hashable
229
229
 
@@ -246,7 +246,7 @@ module Google
246
246
  # @return [Google::Apis::BinaryauthorizationV1beta1::Expr]
247
247
  attr_accessor :condition
248
248
 
249
- # Specifies the identities requesting access for a Cloud Platform resource. `
249
+ # Specifies the principals requesting access for a Cloud Platform resource. `
250
250
  # members` can have the following values: * `allUsers`: A special identifier
251
251
  # that represents anyone who is on the internet; with or without a Google
252
252
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -276,8 +276,8 @@ module Google
276
276
  # @return [Array<String>]
277
277
  attr_accessor :members
278
278
 
279
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
280
- # , or `roles/owner`.
279
+ # Role that is assigned to the list of `members`, or principals. For example, `
280
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
281
281
  # Corresponds to the JSON property `role`
282
282
  # @return [String]
283
283
  attr_accessor :role
@@ -367,37 +367,42 @@ module Google
367
367
 
368
368
  # An Identity and Access Management (IAM) policy, which specifies access
369
369
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
370
- # A `binding` binds one or more `members` to a single `role`. Members can be
371
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
372
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
373
- # role or a user-created custom role. For some types of Google Cloud resources,
374
- # a `binding` can also specify a `condition`, which is a logical expression that
375
- # allows access to a resource only if the expression evaluates to `true`. A
376
- # condition can add constraints based on attributes of the request, the resource,
377
- # or both. To learn which resources support conditions in their IAM policies,
378
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
379
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
380
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
381
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
382
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
383
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
384
- # title": "expirable access", "description": "Does not grant access after Sep
385
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
386
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
387
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
388
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
389
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
390
- # roles/resourcemanager.organizationViewer condition: title: expirable access
391
- # description: Does not grant access after Sep 2020 expression: request.time <
392
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
393
- # description of IAM and its features, see the [IAM documentation](https://cloud.
394
- # google.com/iam/docs/).
370
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
371
+ # Principals can be user accounts, service accounts, Google groups, and domains (
372
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
373
+ # an IAM predefined role or a user-created custom role. For some types of Google
374
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
375
+ # logical expression that allows access to a resource only if the expression
376
+ # evaluates to `true`. A condition can add constraints based on attributes of
377
+ # the request, the resource, or both. To learn which resources support
378
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
379
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
380
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
381
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
382
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
383
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
384
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
385
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
386
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
387
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
388
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
389
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
390
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
391
+ # access description: Does not grant access after Sep 2020 expression: request.
392
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
393
+ # a description of IAM and its features, see the [IAM documentation](https://
394
+ # cloud.google.com/iam/docs/).
395
395
  class IamPolicy
396
396
  include Google::Apis::Core::Hashable
397
397
 
398
- # Associates a list of `members` to a `role`. Optionally, may specify a `
399
- # condition` that determines how and when the `bindings` are applied. Each of
400
- # the `bindings` must contain at least one member.
398
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
399
+ # specify a `condition` that determines how and when the `bindings` are applied.
400
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
401
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
402
+ # can be Google groups. Each occurrence of a principal counts towards these
403
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
404
+ # example.com`, and not to any other principal, then you can add another 1,450
405
+ # principals to the `bindings` in the `Policy`.
401
406
  # Corresponds to the JSON property `bindings`
402
407
  # @return [Array<Google::Apis::BinaryauthorizationV1beta1::Binding>]
403
408
  attr_accessor :bindings
@@ -571,20 +576,20 @@ module Google
571
576
  attr_accessor :global_policy_evaluation_mode
572
577
 
573
578
  # Optional. Per-istio-service-identity admission rules. Istio service identity
574
- # spec format: spiffe:///ns//sa/ or /ns//sa/ e.g. spiffe://example.com/ns/test-
575
- # ns/sa/default
579
+ # spec format: `spiffe:///ns//sa/` or `/ns//sa/` e.g. `spiffe://example.com/ns/
580
+ # test-ns/sa/default`
576
581
  # Corresponds to the JSON property `istioServiceIdentityAdmissionRules`
577
582
  # @return [Hash<String,Google::Apis::BinaryauthorizationV1beta1::AdmissionRule>]
578
583
  attr_accessor :istio_service_identity_admission_rules
579
584
 
580
585
  # Optional. Per-kubernetes-namespace admission rules. K8s namespace spec format:
581
- # [a-z.-]+, e.g. 'some-namespace'
586
+ # `[a-z.-]+`, e.g. `some-namespace`
582
587
  # Corresponds to the JSON property `kubernetesNamespaceAdmissionRules`
583
588
  # @return [Hash<String,Google::Apis::BinaryauthorizationV1beta1::AdmissionRule>]
584
589
  attr_accessor :kubernetes_namespace_admission_rules
585
590
 
586
591
  # Optional. Per-kubernetes-service-account admission rules. Service account spec
587
- # format: `namespace:serviceaccount`. e.g. 'test-ns:default'
592
+ # format: `namespace:serviceaccount`. e.g. `test-ns:default`
588
593
  # Corresponds to the JSON property `kubernetesServiceAccountAdmissionRules`
589
594
  # @return [Hash<String,Google::Apis::BinaryauthorizationV1beta1::AdmissionRule>]
590
595
  attr_accessor :kubernetes_service_account_admission_rules
@@ -625,31 +630,31 @@ module Google
625
630
 
626
631
  # An Identity and Access Management (IAM) policy, which specifies access
627
632
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
628
- # A `binding` binds one or more `members` to a single `role`. Members can be
629
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
630
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
631
- # role or a user-created custom role. For some types of Google Cloud resources,
632
- # a `binding` can also specify a `condition`, which is a logical expression that
633
- # allows access to a resource only if the expression evaluates to `true`. A
634
- # condition can add constraints based on attributes of the request, the resource,
635
- # or both. To learn which resources support conditions in their IAM policies,
636
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
637
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
638
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
639
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
640
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
641
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
642
- # title": "expirable access", "description": "Does not grant access after Sep
643
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
644
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
645
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
646
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
647
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
648
- # roles/resourcemanager.organizationViewer condition: title: expirable access
649
- # description: Does not grant access after Sep 2020 expression: request.time <
650
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
651
- # description of IAM and its features, see the [IAM documentation](https://cloud.
652
- # google.com/iam/docs/).
633
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
634
+ # Principals can be user accounts, service accounts, Google groups, and domains (
635
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
636
+ # an IAM predefined role or a user-created custom role. For some types of Google
637
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
638
+ # logical expression that allows access to a resource only if the expression
639
+ # evaluates to `true`. A condition can add constraints based on attributes of
640
+ # the request, the resource, or both. To learn which resources support
641
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
642
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
643
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
644
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
645
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
646
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
647
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
648
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
649
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
650
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
651
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
652
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
653
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
654
+ # access description: Does not grant access after Sep 2020 expression: request.
655
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
656
+ # a description of IAM and its features, see the [IAM documentation](https://
657
+ # cloud.google.com/iam/docs/).
653
658
  # Corresponds to the JSON property `policy`
654
659
  # @return [Google::Apis::BinaryauthorizationV1beta1::IamPolicy]
655
660
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module BinaryauthorizationV1beta1
18
18
  # Version of the google-apis-binaryauthorization_v1beta1 gem
19
- GEM_VERSION = "0.10.0"
19
+ GEM_VERSION = "0.14.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210820"
25
+ REVISION = "20211112"
26
26
  end
27
27
  end
28
28
  end
@@ -22,8 +22,9 @@ module Google
22
22
  module BinaryauthorizationV1beta1
23
23
  # Binary Authorization API
24
24
  #
25
- # The management interface for Binary Authorization, a system providing policy
26
- # control for images deployed to Kubernetes Engine clusters.
25
+ # The management interface for Binary Authorization, a service that provides
26
+ # policy-based deployment validation and control for images deployed to Google
27
+ # Kubernetes Engine (GKE), Anthos Service Mesh, Anthos Clusters, and Cloud Run.
27
28
  #
28
29
  # @example
29
30
  # require 'google/apis/binaryauthorization_v1beta1'
@@ -228,13 +229,16 @@ module Google
228
229
  # REQUIRED: The resource for which the policy is being requested. See the
229
230
  # operation documentation for the appropriate value for this field.
230
231
  # @param [Fixnum] options_requested_policy_version
231
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
232
- # 3. Requests specifying an invalid value will be rejected. Requests for
233
- # policies with any conditional bindings must specify version 3. Policies
234
- # without any conditional bindings may specify any valid value or leave the
235
- # field unset. To learn which resources support conditions in their IAM policies,
236
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
237
- # resource-policies).
232
+ # Optional. The maximum policy version that will be used to format the policy.
233
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
234
+ # rejected. Requests for policies with any conditional role bindings must
235
+ # specify version 3. Policies with no conditional role bindings may specify any
236
+ # valid value or leave the field unset. The policy in the response might use the
237
+ # policy version that you specified, or it might use a lower policy version. For
238
+ # example, if you specify version 3, but the policy has no conditional role
239
+ # bindings, the response uses version 1. To learn which resources support
240
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
241
+ # google.com/iam/help/conditions/resource-policies).
238
242
  # @param [String] fields
239
243
  # Selector specifying which fields to include in a partial response.
240
244
  # @param [String] quota_user
@@ -452,13 +456,16 @@ module Google
452
456
  # REQUIRED: The resource for which the policy is being requested. See the
453
457
  # operation documentation for the appropriate value for this field.
454
458
  # @param [Fixnum] options_requested_policy_version
455
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
456
- # 3. Requests specifying an invalid value will be rejected. Requests for
457
- # policies with any conditional bindings must specify version 3. Policies
458
- # without any conditional bindings may specify any valid value or leave the
459
- # field unset. To learn which resources support conditions in their IAM policies,
460
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
461
- # resource-policies).
459
+ # Optional. The maximum policy version that will be used to format the policy.
460
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
461
+ # rejected. Requests for policies with any conditional role bindings must
462
+ # specify version 3. Policies with no conditional role bindings may specify any
463
+ # valid value or leave the field unset. The policy in the response might use the
464
+ # policy version that you specified, or it might use a lower policy version. For
465
+ # example, if you specify version 3, but the policy has no conditional role
466
+ # bindings, the response uses version 1. To learn which resources support
467
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
468
+ # google.com/iam/help/conditions/resource-policies).
462
469
  # @param [String] fields
463
470
  # Selector specifying which fields to include in a partial response.
464
471
  # @param [String] quota_user
@@ -21,8 +21,9 @@ module Google
21
21
  module Apis
22
22
  # Binary Authorization API
23
23
  #
24
- # The management interface for Binary Authorization, a system providing policy
25
- # control for images deployed to Kubernetes Engine clusters.
24
+ # The management interface for Binary Authorization, a service that provides
25
+ # policy-based deployment validation and control for images deployed to Google
26
+ # Kubernetes Engine (GKE), Anthos Service Mesh, Anthos Clusters, and Cloud Run.
26
27
  #
27
28
  # @see https://cloud.google.com/binary-authorization/
28
29
  module BinaryauthorizationV1beta1
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-binaryauthorization_v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.10.0
4
+ version: 0.14.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-08-30 00:00:00.000000000 Z
11
+ date: 2022-01-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -57,9 +57,9 @@ licenses:
57
57
  - Apache-2.0
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
- changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-binaryauthorization_v1beta1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1beta1/v0.10.0
62
- source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-binaryauthorization_v1beta1
60
+ changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1beta1/CHANGELOG.md
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-binaryauthorization_v1beta1/v0.14.0
62
+ source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-binaryauthorization_v1beta1
63
63
  post_install_message:
64
64
  rdoc_options: []
65
65
  require_paths:
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
75
75
  - !ruby/object:Gem::Version
76
76
  version: '0'
77
77
  requirements: []
78
- rubygems_version: 3.2.17
78
+ rubygems_version: 3.3.4
79
79
  signing_key:
80
80
  specification_version: 4
81
81
  summary: Simple REST client for Binary Authorization API V1beta1