google-apis-managedidentities_v1 0.16.0 → 0.17.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 022465d28753c63f423334d46b88f7c09f5b5f47be54c87534efcbbc5417885f
4
- data.tar.gz: 329dbf5f7316cb8ccc6c38dab3c185c079e65632475a81413bdd9c2c71a066a5
3
+ metadata.gz: c4aa029e73de5e32f9fd420e30d1ddcd1ee4a03ae8a0dcc76c4372e423fffa04
4
+ data.tar.gz: 68fd5dba2768296b7b9676789328c5c83e97a319fc375a0db6a9bb9537d07b68
5
5
  SHA512:
6
- metadata.gz: 885f775413bbbbcb4f6a824eaac7d82fb4aa277b8336ed21900414fed9493afa67f62fe46fdbd381c3830476896d4a8c3bcd0046deef31d064ae520d5b630165
7
- data.tar.gz: b21c4211a7cebd817b6a605822936a18f7b7bcb157431e2cb7df0f58e0e7610cfd942880a0e6704c1eb532f39c6b57e991153c2d5d5293bda3ba5844aea1d30a
6
+ metadata.gz: f27db3bd5b20fb709bdef3b123dcc13fbecb729728d84597820cda23d47e963cce190bbfda5346162f7d491b8956ff6775fbee4b5be407b7667213537b81088b
7
+ data.tar.gz: 4a7596085dea953769a7ccdf1ba5fe6181954829cbed610a4fdf4d007ba026a79bc1dcdfe1b900dce899fd54100abc4443f01cacd390c922c9e95410d2182efc
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-managedidentities_v1
2
2
 
3
+ ### v0.17.0 (2021-11-14)
4
+
5
+ * Regenerated from discovery document revision 20211108
6
+
3
7
  ### v0.16.0 (2021-10-21)
4
8
 
5
9
  * Unspecified changes
@@ -44,7 +44,7 @@ module Google
44
44
  end
45
45
  end
46
46
 
47
- # Associates `members` with a `role`.
47
+ # Associates `members`, or principals, with a `role`.
48
48
  class Binding
49
49
  include Google::Apis::Core::Hashable
50
50
 
@@ -67,7 +67,7 @@ module Google
67
67
  # @return [Google::Apis::ManagedidentitiesV1::Expr]
68
68
  attr_accessor :condition
69
69
 
70
- # Specifies the identities requesting access for a Cloud Platform resource. `
70
+ # Specifies the principals requesting access for a Cloud Platform resource. `
71
71
  # members` can have the following values: * `allUsers`: A special identifier
72
72
  # that represents anyone who is on the internet; with or without a Google
73
73
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -97,8 +97,8 @@ module Google
97
97
  # @return [Array<String>]
98
98
  attr_accessor :members
99
99
 
100
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
101
- # , or `roles/owner`.
100
+ # Role that is assigned to the list of `members`, or principals. For example, `
101
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
102
102
  # Corresponds to the JSON property `role`
103
103
  # @return [String]
104
104
  attr_accessor :role
@@ -1568,42 +1568,42 @@ module Google
1568
1568
 
1569
1569
  # An Identity and Access Management (IAM) policy, which specifies access
1570
1570
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1571
- # A `binding` binds one or more `members` to a single `role`. Members can be
1572
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1573
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1574
- # role or a user-created custom role. For some types of Google Cloud resources,
1575
- # a `binding` can also specify a `condition`, which is a logical expression that
1576
- # allows access to a resource only if the expression evaluates to `true`. A
1577
- # condition can add constraints based on attributes of the request, the resource,
1578
- # or both. To learn which resources support conditions in their IAM policies,
1579
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1580
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1581
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1582
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1583
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1584
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1585
- # title": "expirable access", "description": "Does not grant access after Sep
1586
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1587
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1588
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1589
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1590
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1591
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1592
- # description: Does not grant access after Sep 2020 expression: request.time <
1593
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1594
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1595
- # google.com/iam/docs/).
1571
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1572
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1573
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1574
+ # an IAM predefined role or a user-created custom role. For some types of Google
1575
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1576
+ # logical expression that allows access to a resource only if the expression
1577
+ # evaluates to `true`. A condition can add constraints based on attributes of
1578
+ # the request, the resource, or both. To learn which resources support
1579
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1580
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1581
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1582
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1583
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1584
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1585
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1586
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1587
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1588
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1589
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1590
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1591
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1592
+ # access description: Does not grant access after Sep 2020 expression: request.
1593
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1594
+ # a description of IAM and its features, see the [IAM documentation](https://
1595
+ # cloud.google.com/iam/docs/).
1596
1596
  class Policy
1597
1597
  include Google::Apis::Core::Hashable
1598
1598
 
1599
- # Associates a list of `members` to a `role`. Optionally, may specify a `
1600
- # condition` that determines how and when the `bindings` are applied. Each of
1601
- # the `bindings` must contain at least one member. The `bindings` in a `Policy`
1602
- # can refer to up to 1,500 members; up to 250 of these members can be Google
1603
- # groups. Each occurrence of a member counts towards these limits. For example,
1604
- # if the `bindings` grant 50 different roles to `user:alice@example.com`, and
1605
- # not to any other member, then you can add another 1,450 members to the `
1606
- # bindings` in the `Policy`.
1599
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
1600
+ # specify a `condition` that determines how and when the `bindings` are applied.
1601
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
1602
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
1603
+ # can be Google groups. Each occurrence of a principal counts towards these
1604
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
1605
+ # example.com`, and not to any other principal, then you can add another 1,450
1606
+ # principals to the `bindings` in the `Policy`.
1607
1607
  # Corresponds to the JSON property `bindings`
1608
1608
  # @return [Array<Google::Apis::ManagedidentitiesV1::Binding>]
1609
1609
  attr_accessor :bindings
@@ -1753,31 +1753,31 @@ module Google
1753
1753
 
1754
1754
  # An Identity and Access Management (IAM) policy, which specifies access
1755
1755
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1756
- # A `binding` binds one or more `members` to a single `role`. Members can be
1757
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1758
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1759
- # role or a user-created custom role. For some types of Google Cloud resources,
1760
- # a `binding` can also specify a `condition`, which is a logical expression that
1761
- # allows access to a resource only if the expression evaluates to `true`. A
1762
- # condition can add constraints based on attributes of the request, the resource,
1763
- # or both. To learn which resources support conditions in their IAM policies,
1764
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1765
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1766
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1767
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1768
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1769
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1770
- # title": "expirable access", "description": "Does not grant access after Sep
1771
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1772
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1773
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1774
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1775
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1776
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1777
- # description: Does not grant access after Sep 2020 expression: request.time <
1778
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1779
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1780
- # google.com/iam/docs/).
1756
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1757
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1758
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1759
+ # an IAM predefined role or a user-created custom role. For some types of Google
1760
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1761
+ # logical expression that allows access to a resource only if the expression
1762
+ # evaluates to `true`. A condition can add constraints based on attributes of
1763
+ # the request, the resource, or both. To learn which resources support
1764
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1765
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1766
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1767
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1768
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1769
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1770
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1771
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1772
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1773
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1774
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1775
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1776
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1777
+ # access description: Does not grant access after Sep 2020 expression: request.
1778
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1779
+ # a description of IAM and its features, see the [IAM documentation](https://
1780
+ # cloud.google.com/iam/docs/).
1781
1781
  # Corresponds to the JSON property `policy`
1782
1782
  # @return [Google::Apis::ManagedidentitiesV1::Policy]
1783
1783
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module ManagedidentitiesV1
18
18
  # Version of the google-apis-managedidentities_v1 gem
19
- GEM_VERSION = "0.16.0"
19
+ GEM_VERSION = "0.17.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20211004"
25
+ REVISION = "20211108"
26
26
  end
27
27
  end
28
28
  end
@@ -302,13 +302,16 @@ module Google
302
302
  # REQUIRED: The resource for which the policy is being requested. See the
303
303
  # operation documentation for the appropriate value for this field.
304
304
  # @param [Fixnum] options_requested_policy_version
305
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
306
- # 3. Requests specifying an invalid value will be rejected. Requests for
307
- # policies with any conditional bindings must specify version 3. Policies
308
- # without any conditional bindings may specify any valid value or leave the
309
- # field unset. To learn which resources support conditions in their IAM policies,
310
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
311
- # resource-policies).
305
+ # Optional. The maximum policy version that will be used to format the policy.
306
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
307
+ # rejected. Requests for policies with any conditional role bindings must
308
+ # specify version 3. Policies with no conditional role bindings may specify any
309
+ # valid value or leave the field unset. The policy in the response might use the
310
+ # policy version that you specified, or it might use a lower policy version. For
311
+ # example, if you specify version 3, but the policy has no conditional role
312
+ # bindings, the response uses version 1. To learn which resources support
313
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
314
+ # google.com/iam/help/conditions/resource-policies).
312
315
  # @param [String] fields
313
316
  # Selector specifying which fields to include in a partial response.
314
317
  # @param [String] quota_user
@@ -1009,13 +1012,16 @@ module Google
1009
1012
  # REQUIRED: The resource for which the policy is being requested. See the
1010
1013
  # operation documentation for the appropriate value for this field.
1011
1014
  # @param [Fixnum] options_requested_policy_version
1012
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
1013
- # 3. Requests specifying an invalid value will be rejected. Requests for
1014
- # policies with any conditional bindings must specify version 3. Policies
1015
- # without any conditional bindings may specify any valid value or leave the
1016
- # field unset. To learn which resources support conditions in their IAM policies,
1017
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1018
- # resource-policies).
1015
+ # Optional. The maximum policy version that will be used to format the policy.
1016
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
1017
+ # rejected. Requests for policies with any conditional role bindings must
1018
+ # specify version 3. Policies with no conditional role bindings may specify any
1019
+ # valid value or leave the field unset. The policy in the response might use the
1020
+ # policy version that you specified, or it might use a lower policy version. For
1021
+ # example, if you specify version 3, but the policy has no conditional role
1022
+ # bindings, the response uses version 1. To learn which resources support
1023
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1024
+ # google.com/iam/help/conditions/resource-policies).
1019
1025
  # @param [String] fields
1020
1026
  # Selector specifying which fields to include in a partial response.
1021
1027
  # @param [String] quota_user
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-managedidentities_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.16.0
4
+ version: 0.17.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-27 00:00:00.000000000 Z
11
+ date: 2021-11-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -59,7 +59,7 @@ licenses:
59
59
  metadata:
60
60
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
61
61
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-managedidentities_v1/CHANGELOG.md
62
- documentation_uri: https://googleapis.dev/ruby/google-apis-managedidentities_v1/v0.16.0
62
+ documentation_uri: https://googleapis.dev/ruby/google-apis-managedidentities_v1/v0.17.0
63
63
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-managedidentities_v1
64
64
  post_install_message:
65
65
  rdoc_options: []