google-apis-cloudtasks_v2beta2 0.10.0 → 0.11.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: eb9020bb775209c9b8e9e10858d65d7c58289adea4ce8074811787e7c331c1a4
4
- data.tar.gz: 9bf3d32debe8884bb23bf44574cee01662efbf545fdaea13d44b2b220f6e7f6c
3
+ metadata.gz: df4e08e26f1379e3db3431802b9195af7d13f85dac59d039a77d0c37b5b7757e
4
+ data.tar.gz: 58855e25e8756fec397ad69a0c98ca8a5a05ecde08faa26e9b8efc1e52755db2
5
5
  SHA512:
6
- metadata.gz: 37b54086960f7a0b1d1aefdc82b77d76fcfbaa44b92f19f4350fdc263d8dd53699029f704977edb96b65e62b29d62b0af31067c1105f50616e85a07ec31a8d9e
7
- data.tar.gz: 14f2f2dc14dd9c7ea69b047a8e7bd2684532cf1165038910e99a198bbf857cc9bc752a4fda981a13d11cd3667afce85d969d1530f8e375a6e3cb78eb0cc4972b
6
+ metadata.gz: bf13cd43474a9c9748b54467389f45336de594b0b472f5fb2eeedd55f0a00c8310939068a77585e6cf7cfc104e7c03239f98b0e5afd25fb60b0a0a4ab5e16638
7
+ data.tar.gz: 2cd6e8730369619a99adcdf4f7b0fbfcb7a1ad930c9b115f2d4616da87dfaaa2fa75f4bf4a323a26e05d5d46e13f621b2156d34b7c72f4f69f3d082c2453dd51
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-cloudtasks_v2beta2
2
2
 
3
+ ### v0.11.0 (2021-10-28)
4
+
5
+ * Regenerated from discovery document revision 20211015
6
+
3
7
  ### v0.10.0 (2021-10-20)
4
8
 
5
9
  * Unspecified changes
@@ -326,7 +326,7 @@ module Google
326
326
  end
327
327
  end
328
328
 
329
- # Associates `members` with a `role`.
329
+ # Associates `members`, or principals, with a `role`.
330
330
  class Binding
331
331
  include Google::Apis::Core::Hashable
332
332
 
@@ -349,7 +349,7 @@ module Google
349
349
  # @return [Google::Apis::CloudtasksV2beta2::Expr]
350
350
  attr_accessor :condition
351
351
 
352
- # Specifies the identities requesting access for a Cloud Platform resource. `
352
+ # Specifies the principals requesting access for a Cloud Platform resource. `
353
353
  # members` can have the following values: * `allUsers`: A special identifier
354
354
  # that represents anyone who is on the internet; with or without a Google
355
355
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -379,8 +379,8 @@ module Google
379
379
  # @return [Array<String>]
380
380
  attr_accessor :members
381
381
 
382
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
383
- # , or `roles/owner`.
382
+ # Role that is assigned to the list of `members`, or principals. For example, `
383
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
384
384
  # Corresponds to the JSON property `role`
385
385
  # @return [String]
386
386
  attr_accessor :role
@@ -800,37 +800,42 @@ module Google
800
800
 
801
801
  # An Identity and Access Management (IAM) policy, which specifies access
802
802
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
803
- # A `binding` binds one or more `members` to a single `role`. Members can be
804
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
805
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
806
- # role or a user-created custom role. For some types of Google Cloud resources,
807
- # a `binding` can also specify a `condition`, which is a logical expression that
808
- # allows access to a resource only if the expression evaluates to `true`. A
809
- # condition can add constraints based on attributes of the request, the resource,
810
- # or both. To learn which resources support conditions in their IAM policies,
811
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
812
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
813
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
814
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
815
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
816
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
817
- # title": "expirable access", "description": "Does not grant access after Sep
818
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
819
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
820
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
821
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
822
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
823
- # roles/resourcemanager.organizationViewer condition: title: expirable access
824
- # description: Does not grant access after Sep 2020 expression: request.time <
825
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
826
- # description of IAM and its features, see the [IAM documentation](https://cloud.
827
- # google.com/iam/docs/).
803
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
804
+ # Principals can be user accounts, service accounts, Google groups, and domains (
805
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
806
+ # an IAM predefined role or a user-created custom role. For some types of Google
807
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
808
+ # logical expression that allows access to a resource only if the expression
809
+ # evaluates to `true`. A condition can add constraints based on attributes of
810
+ # the request, the resource, or both. To learn which resources support
811
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
812
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
813
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
814
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
815
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
816
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
817
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
818
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
819
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
820
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
821
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
822
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
823
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
824
+ # access description: Does not grant access after Sep 2020 expression: request.
825
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
826
+ # a description of IAM and its features, see the [IAM documentation](https://
827
+ # cloud.google.com/iam/docs/).
828
828
  class Policy
829
829
  include Google::Apis::Core::Hashable
830
830
 
831
- # Associates a list of `members` to a `role`. Optionally, may specify a `
832
- # condition` that determines how and when the `bindings` are applied. Each of
833
- # the `bindings` must contain at least one member.
831
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
832
+ # specify a `condition` that determines how and when the `bindings` are applied.
833
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
834
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
835
+ # can be Google groups. Each occurrence of a principal counts towards these
836
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
837
+ # example.com`, and not to any other principal, then you can add another 1,450
838
+ # principals to the `bindings` in the `Policy`.
834
839
  # Corresponds to the JSON property `bindings`
835
840
  # @return [Array<Google::Apis::CloudtasksV2beta2::Binding>]
836
841
  attr_accessor :bindings
@@ -1344,31 +1349,31 @@ module Google
1344
1349
 
1345
1350
  # An Identity and Access Management (IAM) policy, which specifies access
1346
1351
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1347
- # A `binding` binds one or more `members` to a single `role`. Members can be
1348
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1349
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1350
- # role or a user-created custom role. For some types of Google Cloud resources,
1351
- # a `binding` can also specify a `condition`, which is a logical expression that
1352
- # allows access to a resource only if the expression evaluates to `true`. A
1353
- # condition can add constraints based on attributes of the request, the resource,
1354
- # or both. To learn which resources support conditions in their IAM policies,
1355
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1356
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1357
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1358
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1359
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1360
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1361
- # title": "expirable access", "description": "Does not grant access after Sep
1362
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1363
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1364
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1365
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1366
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1367
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1368
- # description: Does not grant access after Sep 2020 expression: request.time <
1369
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1370
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1371
- # google.com/iam/docs/).
1352
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1353
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1354
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1355
+ # an IAM predefined role or a user-created custom role. For some types of Google
1356
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1357
+ # logical expression that allows access to a resource only if the expression
1358
+ # evaluates to `true`. A condition can add constraints based on attributes of
1359
+ # the request, the resource, or both. To learn which resources support
1360
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1361
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1362
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1363
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1364
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1365
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1366
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1367
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1368
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1369
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1370
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1371
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1372
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1373
+ # access description: Does not grant access after Sep 2020 expression: request.
1374
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1375
+ # a description of IAM and its features, see the [IAM documentation](https://
1376
+ # cloud.google.com/iam/docs/).
1372
1377
  # Corresponds to the JSON property `policy`
1373
1378
  # @return [Google::Apis::CloudtasksV2beta2::Policy]
1374
1379
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module CloudtasksV2beta2
18
18
  # Version of the google-apis-cloudtasks_v2beta2 gem
19
- GEM_VERSION = "0.10.0"
19
+ GEM_VERSION = "0.11.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210830"
25
+ REVISION = "20211015"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-cloudtasks_v2beta2
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.10.0
4
+ version: 0.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-27 00:00:00.000000000 Z
11
+ date: 2021-11-01 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-cloudtasks_v2beta2/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-cloudtasks_v2beta2/v0.10.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-cloudtasks_v2beta2/v0.11.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-cloudtasks_v2beta2
63
63
  post_install_message:
64
64
  rdoc_options: []