google-apis-dlp_v2 0.10.0 → 0.11.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 98f484e42d66678561df737d43478fb54f120644cf465c90d0f2af1295ac66cc
4
- data.tar.gz: 51731aec8428f15e9661f623a0dc48026a2bca666c1a7ab08dcc80dfae4c6b9a
3
+ metadata.gz: de531b5fb151d6da27538331205c79279b0a77a1a0b4aff0cffa9c572dda15ac
4
+ data.tar.gz: 0151ae789fda93215eb2b5df42d39b2fc180e993582e9541c5524d643fade0cb
5
5
  SHA512:
6
- metadata.gz: 6c224b54564bd530f612dae6667b4d36f7031139b8591a2c35bf19c382de2d9079b6757a0f9823b1d3014cd8e0a5054677b1174561ac512b475922e84f535589
7
- data.tar.gz: 70c1243eed3dab4047edc1f5158ab88088ffaf34590aaa929836333fe378f38239fdabf47a5e10e6c05b77f93a5bdf855e8eaecb00e6c903b8e4d1f797629ee1
6
+ metadata.gz: cd2e17e3cfd132882cca2b37d04ce7417a1695d9f8721f627317049175463721dbe96a7f86168b4dbc3daac3de10500e04259ef9cbe73f84451f357cf37cab80
7
+ data.tar.gz: 639b59da9c25b35da4fdac1de53cef00d04ce70487e3f0e8bb5924f86c01c8b3fabca89725d91577c640687730e681be2d5e6349483d1e6266f37b86195bcd2f
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-dlp_v2
2
2
 
3
+ ### v0.11.0 (2021-07-28)
4
+
5
+ * Regenerated from discovery document revision 20210723
6
+
3
7
  ### v0.10.0 (2021-06-29)
4
8
 
5
9
  * Regenerated using generator version 0.4.0
@@ -1295,9 +1295,9 @@ module Google
1295
1295
  attr_accessor :context
1296
1296
 
1297
1297
  # This is a data encryption key (DEK) (as opposed to a key encryption key (KEK)
1298
- # stored by KMS). When using KMS to wrap/unwrap DEKs, be sure to set an
1299
- # appropriate IAM policy on the KMS CryptoKey (KEK) to ensure an attacker cannot
1300
- # unwrap the data crypto key.
1298
+ # stored by Cloud Key Management Service (Cloud KMS). When using Cloud KMS to
1299
+ # wrap or unwrap a DEK, be sure to set an appropriate IAM policy on the KEK to
1300
+ # ensure an attacker cannot unwrap the DEK.
1301
1301
  # Corresponds to the JSON property `cryptoKey`
1302
1302
  # @return [Google::Apis::DlpV2::GooglePrivacyDlpV2CryptoKey]
1303
1303
  attr_accessor :crypto_key
@@ -1329,9 +1329,9 @@ module Google
1329
1329
  include Google::Apis::Core::Hashable
1330
1330
 
1331
1331
  # This is a data encryption key (DEK) (as opposed to a key encryption key (KEK)
1332
- # stored by KMS). When using KMS to wrap/unwrap DEKs, be sure to set an
1333
- # appropriate IAM policy on the KMS CryptoKey (KEK) to ensure an attacker cannot
1334
- # unwrap the data crypto key.
1332
+ # stored by Cloud Key Management Service (Cloud KMS). When using Cloud KMS to
1333
+ # wrap or unwrap a DEK, be sure to set an appropriate IAM policy on the KEK to
1334
+ # ensure an attacker cannot unwrap the DEK.
1335
1335
  # Corresponds to the JSON property `cryptoKey`
1336
1336
  # @return [Google::Apis::DlpV2::GooglePrivacyDlpV2CryptoKey]
1337
1337
  attr_accessor :crypto_key
@@ -1347,9 +1347,9 @@ module Google
1347
1347
  end
1348
1348
 
1349
1349
  # This is a data encryption key (DEK) (as opposed to a key encryption key (KEK)
1350
- # stored by KMS). When using KMS to wrap/unwrap DEKs, be sure to set an
1351
- # appropriate IAM policy on the KMS CryptoKey (KEK) to ensure an attacker cannot
1352
- # unwrap the data crypto key.
1350
+ # stored by Cloud Key Management Service (Cloud KMS). When using Cloud KMS to
1351
+ # wrap or unwrap a DEK, be sure to set an appropriate IAM policy on the KEK to
1352
+ # ensure an attacker cannot unwrap the DEK.
1353
1353
  class GooglePrivacyDlpV2CryptoKey
1354
1354
  include Google::Apis::Core::Hashable
1355
1355
 
@@ -1357,7 +1357,9 @@ module Google
1357
1357
  # must be a 128-, 192-, or 256-bit key. Authorization requires the following IAM
1358
1358
  # permissions when sending a request to perform a crypto transformation using a
1359
1359
  # KMS-wrapped crypto key: dlp.kms.encrypt For more information, see [Creating a
1360
- # wrapped key] (https://cloud.google.com/dlp/docs/create-wrapped-key).
1360
+ # wrapped key] (https://cloud.google.com/dlp/docs/create-wrapped-key). Note:
1361
+ # When you use Cloud KMS for cryptographic operations, [charges apply](https://
1362
+ # cloud.google.com/kms/pricing).
1361
1363
  # Corresponds to the JSON property `kmsWrapped`
1362
1364
  # @return [Google::Apis::DlpV2::GooglePrivacyDlpV2KmsWrappedCryptoKey]
1363
1365
  attr_accessor :kms_wrapped
@@ -1411,9 +1413,9 @@ module Google
1411
1413
  attr_accessor :context
1412
1414
 
1413
1415
  # This is a data encryption key (DEK) (as opposed to a key encryption key (KEK)
1414
- # stored by KMS). When using KMS to wrap/unwrap DEKs, be sure to set an
1415
- # appropriate IAM policy on the KMS CryptoKey (KEK) to ensure an attacker cannot
1416
- # unwrap the data crypto key.
1416
+ # stored by Cloud Key Management Service (Cloud KMS). When using Cloud KMS to
1417
+ # wrap or unwrap a DEK, be sure to set an appropriate IAM policy on the KEK to
1418
+ # ensure an attacker cannot unwrap the DEK.
1417
1419
  # Corresponds to the JSON property `cryptoKey`
1418
1420
  # @return [Google::Apis::DlpV2::GooglePrivacyDlpV2CryptoKey]
1419
1421
  attr_accessor :crypto_key
@@ -1604,9 +1606,9 @@ module Google
1604
1606
  attr_accessor :context
1605
1607
 
1606
1608
  # This is a data encryption key (DEK) (as opposed to a key encryption key (KEK)
1607
- # stored by KMS). When using KMS to wrap/unwrap DEKs, be sure to set an
1608
- # appropriate IAM policy on the KMS CryptoKey (KEK) to ensure an attacker cannot
1609
- # unwrap the data crypto key.
1609
+ # stored by Cloud Key Management Service (Cloud KMS). When using Cloud KMS to
1610
+ # wrap or unwrap a DEK, be sure to set an appropriate IAM policy on the KEK to
1611
+ # ensure an attacker cannot unwrap the DEK.
1610
1612
  # Corresponds to the JSON property `cryptoKey`
1611
1613
  # @return [Google::Apis::DlpV2::GooglePrivacyDlpV2CryptoKey]
1612
1614
  attr_accessor :crypto_key
@@ -3850,7 +3852,9 @@ module Google
3850
3852
  # must be a 128-, 192-, or 256-bit key. Authorization requires the following IAM
3851
3853
  # permissions when sending a request to perform a crypto transformation using a
3852
3854
  # KMS-wrapped crypto key: dlp.kms.encrypt For more information, see [Creating a
3853
- # wrapped key] (https://cloud.google.com/dlp/docs/create-wrapped-key).
3855
+ # wrapped key] (https://cloud.google.com/dlp/docs/create-wrapped-key). Note:
3856
+ # When you use Cloud KMS for cryptographic operations, [charges apply](https://
3857
+ # cloud.google.com/kms/pricing).
3854
3858
  class GooglePrivacyDlpV2KmsWrappedCryptoKey
3855
3859
  include Google::Apis::Core::Hashable
3856
3860
 
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module DlpV2
18
18
  # Version of the google-apis-dlp_v2 gem
19
- GEM_VERSION = "0.10.0"
19
+ GEM_VERSION = "0.11.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210604"
25
+ REVISION = "20210723"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-dlp_v2
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.10.0
4
+ version: 0.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-07-05 00:00:00.000000000 Z
11
+ date: 2021-08-02 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-dlp_v2/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-dlp_v2/v0.10.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-dlp_v2/v0.11.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-dlp_v2
63
63
  post_install_message:
64
64
  rdoc_options: []