google-apis-cloudtasks_v2beta3 0.10.0 → 0.11.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 8c7db9df953c114984fc6b866bf2e20517c72dc321c3a5ccca7ef11d865593d2
4
- data.tar.gz: 39bb2fac55c2e3bdf11e50d871196eff0ce5fc15f86ce90a9066d1412d3efa75
3
+ metadata.gz: f67e21d6acd0b9568cb3273ffd157f5eee08039b793433dc4a706cd44f923bac
4
+ data.tar.gz: 109a9c95f3c80b490ce73a0e4034ec9dee3994ddf27186cecdebbf36a0050a68
5
5
  SHA512:
6
- metadata.gz: 38ec5964fb207472c5f4b799bf7fa4c712feb55c07271c48b542bf665612edc3a49d09a76e28d840acc262f171c92aaf56b50a1c4b2fe84e2f2298512cf4ec00
7
- data.tar.gz: d04c5cf6700a2e859a53e2174f0b2909934b9e1360f2d70f7ad83ed95082de0503c35c5357e1025749f151b7f1b0db018fb1dc297689d6ffaabe6783e44aae61
6
+ metadata.gz: 55c249c9122e115580a7cd4e6252f81c7ff3b1446caf3915922b5de4c13bcfbdb7abb138de6f96cd6ed79b7aa854160758c17e4d6db42c52e307cbf890c3d138
7
+ data.tar.gz: 84aff59a79ab706bebdc68e2ffb6523b95dd16badc016fab1ce34159fc9aebe682df7aa1b93885774d898ec73a02e155c4423363fa43daacfc99b9a182f88307
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-cloudtasks_v2beta3
2
2
 
3
+ ### v0.11.0 (2021-10-28)
4
+
5
+ * Regenerated from discovery document revision 20211015
6
+
3
7
  ### v0.10.0 (2021-10-20)
4
8
 
5
9
  * Unspecified changes
@@ -285,7 +285,7 @@ module Google
285
285
  end
286
286
  end
287
287
 
288
- # Associates `members` with a `role`.
288
+ # Associates `members`, or principals, with a `role`.
289
289
  class Binding
290
290
  include Google::Apis::Core::Hashable
291
291
 
@@ -308,7 +308,7 @@ module Google
308
308
  # @return [Google::Apis::CloudtasksV2beta3::Expr]
309
309
  attr_accessor :condition
310
310
 
311
- # Specifies the identities requesting access for a Cloud Platform resource. `
311
+ # Specifies the principals requesting access for a Cloud Platform resource. `
312
312
  # members` can have the following values: * `allUsers`: A special identifier
313
313
  # that represents anyone who is on the internet; with or without a Google
314
314
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -338,8 +338,8 @@ module Google
338
338
  # @return [Array<String>]
339
339
  attr_accessor :members
340
340
 
341
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
342
- # , or `roles/owner`.
341
+ # Role that is assigned to the list of `members`, or principals. For example, `
342
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
343
343
  # Corresponds to the JSON property `role`
344
344
  # @return [String]
345
345
  attr_accessor :role
@@ -797,37 +797,42 @@ module Google
797
797
 
798
798
  # An Identity and Access Management (IAM) policy, which specifies access
799
799
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
800
- # A `binding` binds one or more `members` to a single `role`. Members can be
801
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
802
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
803
- # role or a user-created custom role. For some types of Google Cloud resources,
804
- # a `binding` can also specify a `condition`, which is a logical expression that
805
- # allows access to a resource only if the expression evaluates to `true`. A
806
- # condition can add constraints based on attributes of the request, the resource,
807
- # or both. To learn which resources support conditions in their IAM policies,
808
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
809
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
810
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
811
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
812
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
813
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
814
- # title": "expirable access", "description": "Does not grant access after Sep
815
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
816
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
817
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
818
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
819
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
820
- # roles/resourcemanager.organizationViewer condition: title: expirable access
821
- # description: Does not grant access after Sep 2020 expression: request.time <
822
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
823
- # description of IAM and its features, see the [IAM documentation](https://cloud.
824
- # google.com/iam/docs/).
800
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
801
+ # Principals can be user accounts, service accounts, Google groups, and domains (
802
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
803
+ # an IAM predefined role or a user-created custom role. For some types of Google
804
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
805
+ # logical expression that allows access to a resource only if the expression
806
+ # evaluates to `true`. A condition can add constraints based on attributes of
807
+ # the request, the resource, or both. To learn which resources support
808
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
809
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
810
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
811
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
812
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
813
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
814
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
815
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
816
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
817
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
818
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
819
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
820
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
821
+ # access description: Does not grant access after Sep 2020 expression: request.
822
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
823
+ # a description of IAM and its features, see the [IAM documentation](https://
824
+ # cloud.google.com/iam/docs/).
825
825
  class Policy
826
826
  include Google::Apis::Core::Hashable
827
827
 
828
- # Associates a list of `members` to a `role`. Optionally, may specify a `
829
- # condition` that determines how and when the `bindings` are applied. Each of
830
- # the `bindings` must contain at least one member.
828
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
829
+ # specify a `condition` that determines how and when the `bindings` are applied.
830
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
831
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
832
+ # can be Google groups. Each occurrence of a principal counts towards these
833
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
834
+ # example.com`, and not to any other principal, then you can add another 1,450
835
+ # principals to the `bindings` in the `Policy`.
831
836
  # Corresponds to the JSON property `bindings`
832
837
  # @return [Array<Google::Apis::CloudtasksV2beta3::Binding>]
833
838
  attr_accessor :bindings
@@ -1285,31 +1290,31 @@ module Google
1285
1290
 
1286
1291
  # An Identity and Access Management (IAM) policy, which specifies access
1287
1292
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1288
- # A `binding` binds one or more `members` to a single `role`. Members can be
1289
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1290
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1291
- # role or a user-created custom role. For some types of Google Cloud resources,
1292
- # a `binding` can also specify a `condition`, which is a logical expression that
1293
- # allows access to a resource only if the expression evaluates to `true`. A
1294
- # condition can add constraints based on attributes of the request, the resource,
1295
- # or both. To learn which resources support conditions in their IAM policies,
1296
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1297
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1298
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1299
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1300
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1301
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1302
- # title": "expirable access", "description": "Does not grant access after Sep
1303
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1304
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1305
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1306
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1307
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1308
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1309
- # description: Does not grant access after Sep 2020 expression: request.time <
1310
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1311
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1312
- # google.com/iam/docs/).
1293
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1294
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1295
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1296
+ # an IAM predefined role or a user-created custom role. For some types of Google
1297
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1298
+ # logical expression that allows access to a resource only if the expression
1299
+ # evaluates to `true`. A condition can add constraints based on attributes of
1300
+ # the request, the resource, or both. To learn which resources support
1301
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1302
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1303
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1304
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1305
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1306
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1307
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1308
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1309
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1310
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1311
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1312
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1313
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1314
+ # access description: Does not grant access after Sep 2020 expression: request.
1315
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1316
+ # a description of IAM and its features, see the [IAM documentation](https://
1317
+ # cloud.google.com/iam/docs/).
1313
1318
  # Corresponds to the JSON property `policy`
1314
1319
  # @return [Google::Apis::CloudtasksV2beta3::Policy]
1315
1320
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module CloudtasksV2beta3
18
18
  # Version of the google-apis-cloudtasks_v2beta3 gem
19
- GEM_VERSION = "0.10.0"
19
+ GEM_VERSION = "0.11.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210830"
25
+ REVISION = "20211015"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-cloudtasks_v2beta3
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.10.0
4
+ version: 0.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-27 00:00:00.000000000 Z
11
+ date: 2021-11-01 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-cloudtasks_v2beta3/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-cloudtasks_v2beta3/v0.10.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-cloudtasks_v2beta3/v0.11.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-cloudtasks_v2beta3
63
63
  post_install_message:
64
64
  rdoc_options: []