google-apis-policysimulator_v1 0.3.0 → 0.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7d597ad84b0cc0355041883f664edd19129c21e454db621cdf7e52e96c5c4f9d
4
- data.tar.gz: e6826304be2a3b72ac6401089dd1d734f5af782e00a522a1e479e66bc54b88a7
3
+ metadata.gz: '099fe2c56d8b4436e11fdccfe955fd07000ecd463931dfd18a8992cd7dd3a9df'
4
+ data.tar.gz: 53ae97ea9968e9bb8492eb13c67f594d6c14a6c03132abee346764110e0a2a46
5
5
  SHA512:
6
- metadata.gz: 351318488ae3895a7f3d3ca1f315f8b1b58e1c7ed43994a2e12e6f87a64e5f4ba21cd0962f115136bcead14927bac749d5ef02d0d9430e5eaf0931a380fca2d2
7
- data.tar.gz: '0591166ace95b2a04f58132c665cfe1a5b711e0d158f2fdde29ec61fb723864cfde9cc8d40e22c6cc80b891e96b42afc962132cc313bd9d1b3083ed529e47d72'
6
+ metadata.gz: 06cd709945dc556bd5fcac0c768a988579edc0222cac8553719d23992a24a2ad0a720d2b792f71d8599070ae0d0413f35b3ae4fc367a7815f546a55f556039f1
7
+ data.tar.gz: 45e3291c22209264f8a1298379278bc4de88faf441902f1ad13d8b5c74ccfdc1d1adfaa62d3d854893f60499db8f46d757d9b475be5910bdabec68a8fa53e761
data/CHANGELOG.md CHANGED
@@ -1,5 +1,21 @@
1
1
  # Release history for google-apis-policysimulator_v1
2
2
 
3
+ ### v0.7.0 (2021-10-14)
4
+
5
+ * Regenerated from discovery document revision 20211008
6
+
7
+ ### v0.6.0 (2021-10-06)
8
+
9
+ * Regenerated from discovery document revision 20211002
10
+
11
+ ### v0.5.0 (2021-09-01)
12
+
13
+ * Regenerated from discovery document revision 20210813
14
+
15
+ ### v0.4.0 (2021-06-29)
16
+
17
+ * Regenerated using generator version 0.4.0
18
+
3
19
  ### v0.3.0 (2021-06-24)
4
20
 
5
21
  * Regenerated using generator version 0.3.0
@@ -22,13 +22,13 @@ module Google
22
22
  module Apis
23
23
  module PolicysimulatorV1
24
24
 
25
- # A summary and comparison of the member's access under the current (baseline)
25
+ # A summary and comparison of the principal's access under the current (baseline)
26
26
  # policies and the proposed (simulated) policies for a single access tuple.
27
27
  class GoogleCloudPolicysimulatorV1AccessStateDiff
28
28
  include Google::Apis::Core::Hashable
29
29
 
30
- # How the member's access, specified in the AccessState field, changed between
31
- # the current (baseline) policies and proposed (simulated) policies.
30
+ # How the principal's access, specified in the AccessState field, changed
31
+ # between the current (baseline) policies and proposed (simulated) policies.
32
32
  # Corresponds to the JSON property `accessChange`
33
33
  # @return [String]
34
34
  attr_accessor :access_change
@@ -57,7 +57,7 @@ module Google
57
57
  end
58
58
  end
59
59
 
60
- # Information about the member, resource, and permission to check.
60
+ # Information about the principal, resource, and permission to check.
61
61
  class GoogleCloudPolicysimulatorV1AccessTuple
62
62
  include Google::Apis::Core::Hashable
63
63
 
@@ -69,7 +69,7 @@ module Google
69
69
  # @return [String]
70
70
  attr_accessor :full_resource_name
71
71
 
72
- # Required. The IAM permission to check for the specified member and resource.
72
+ # Required. The IAM permission to check for the specified principal and resource.
73
73
  # For a complete list of IAM permissions, see https://cloud.google.com/iam/help/
74
74
  # permissions/reference. For a complete list of predefined IAM roles and the
75
75
  # permissions in each role, see https://cloud.google.com/iam/help/roles/
@@ -78,11 +78,11 @@ module Google
78
78
  # @return [String]
79
79
  attr_accessor :permission
80
80
 
81
- # Required. The member, or principal, whose access you want to check, in the
82
- # form of the email address that represents that member. For example, `alice@
83
- # example.com` or `my-service-account@my-project.iam.gserviceaccount.com`. The
84
- # member must be a Google Account or a service account. Other types of members
85
- # are not supported.
81
+ # Required. The principal whose access you want to check, in the form of the
82
+ # email address that represents that principal. For example, `alice@example.com`
83
+ # or `my-service-account@my-project.iam.gserviceaccount.com`. The principal must
84
+ # be a Google Account or a service account. Other types of principals are not
85
+ # supported.
86
86
  # Corresponds to the JSON property `principal`
87
87
  # @return [String]
88
88
  attr_accessor :principal
@@ -99,17 +99,17 @@ module Google
99
99
  end
100
100
  end
101
101
 
102
- # Details about how a binding in a policy affects a member's ability to use a
102
+ # Details about how a binding in a policy affects a principal's ability to use a
103
103
  # permission.
104
104
  class GoogleCloudPolicysimulatorV1BindingExplanation
105
105
  include Google::Apis::Core::Hashable
106
106
 
107
107
  # Required. Indicates whether _this binding_ provides the specified permission
108
- # to the specified member for the specified resource. This field does _not_
109
- # indicate whether the member actually has the permission for the resource.
108
+ # to the specified principal for the specified resource. This field does _not_
109
+ # indicate whether the principal actually has the permission for the resource.
110
110
  # There might be another binding that overrides this binding. To determine
111
- # whether the member actually has the permission, use the `access` field in the
112
- # TroubleshootIamPolicyResponse.
111
+ # whether the principal actually has the permission, use the `access` field in
112
+ # the TroubleshootIamPolicyResponse.
113
113
  # Corresponds to the JSON property `access`
114
114
  # @return [String]
115
115
  attr_accessor :access
@@ -133,17 +133,18 @@ module Google
133
133
  # @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
134
134
  attr_accessor :condition
135
135
 
136
- # Indicates whether each member in the binding includes the member specified in
137
- # the request, either directly or indirectly. Each key identifies a member in
138
- # the binding, and each value indicates whether the member in the binding
139
- # includes the member in the request. For example, suppose that a binding
140
- # includes the following members: * `user:alice@example.com` * `group:product-
141
- # eng@example.com` The member in the replayed access tuple is `user:bob@example.
142
- # com`. This user is a member of the group `group:product-eng@example.com`. For
143
- # the first member in the binding, the key is `user:alice@example.com`, and the `
144
- # membership` field in the value is set to `MEMBERSHIP_NOT_INCLUDED`. For the
145
- # second member in the binding, the key is `group:product-eng@example.com`, and
146
- # the `membership` field in the value is set to `MEMBERSHIP_INCLUDED`.
136
+ # Indicates whether each principal in the binding includes the principal
137
+ # specified in the request, either directly or indirectly. Each key identifies a
138
+ # principal in the binding, and each value indicates whether the principal in
139
+ # the binding includes the principal in the request. For example, suppose that a
140
+ # binding includes the following principals: * `user:alice@example.com` * `group:
141
+ # product-eng@example.com` The principal in the replayed access tuple is `user:
142
+ # bob@example.com`. This user is a principal of the group `group:product-eng@
143
+ # example.com`. For the first principal in the binding, the key is `user:alice@
144
+ # example.com`, and the `membership` field in the value is set to `
145
+ # MEMBERSHIP_NOT_INCLUDED`. For the second principal in the binding, the key is `
146
+ # group:product-eng@example.com`, and the `membership` field in the value is set
147
+ # to `MEMBERSHIP_INCLUDED`.
147
148
  # Corresponds to the JSON property `memberships`
148
149
  # @return [Hash<String,Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1BindingExplanationAnnotatedMembership>]
149
150
  attr_accessor :memberships
@@ -189,16 +190,16 @@ module Google
189
190
  end
190
191
  end
191
192
 
192
- # Details about whether the binding includes the member.
193
+ # Details about whether the binding includes the principal.
193
194
  class GoogleCloudPolicysimulatorV1BindingExplanationAnnotatedMembership
194
195
  include Google::Apis::Core::Hashable
195
196
 
196
- # Indicates whether the binding includes the member.
197
+ # Indicates whether the binding includes the principal.
197
198
  # Corresponds to the JSON property `membership`
198
199
  # @return [String]
199
200
  attr_accessor :membership
200
201
 
201
- # The relevance of the member's status to the overall determination for the
202
+ # The relevance of the principal's status to the overall determination for the
202
203
  # binding.
203
204
  # Corresponds to the JSON property `relevance`
204
205
  # @return [String]
@@ -220,8 +221,8 @@ module Google
220
221
  class GoogleCloudPolicysimulatorV1ExplainedAccess
221
222
  include Google::Apis::Core::Hashable
222
223
 
223
- # Whether the member in the access tuple has permission to access the resource
224
- # in the access tuple under the given policies.
224
+ # Whether the principal in the access tuple has permission to access the
225
+ # resource in the access tuple under the given policies.
225
226
  # Corresponds to the JSON property `accessState`
226
227
  # @return [String]
227
228
  attr_accessor :access_state
@@ -257,18 +258,18 @@ module Google
257
258
  include Google::Apis::Core::Hashable
258
259
 
259
260
  # Indicates whether _this policy_ provides the specified permission to the
260
- # specified member for the specified resource. This field does _not_ indicate
261
- # whether the member actually has the permission for the resource. There might
262
- # be another policy that overrides this policy. To determine whether the member
263
- # actually has the permission, use the `access` field in the
261
+ # specified principal for the specified resource. This field does _not_ indicate
262
+ # whether the principal actually has the permission for the resource. There
263
+ # might be another policy that overrides this policy. To determine whether the
264
+ # principal actually has the permission, use the `access` field in the
264
265
  # TroubleshootIamPolicyResponse.
265
266
  # Corresponds to the JSON property `access`
266
267
  # @return [String]
267
268
  attr_accessor :access
268
269
 
269
- # Details about how each binding in the policy affects the member's ability, or
270
- # inability, to use the permission for the resource. If the user who created the
271
- # Replay does not have access to the policy, this field is omitted.
270
+ # Details about how each binding in the policy affects the principal's ability,
271
+ # or inability, to use the permission for the resource. If the user who created
272
+ # the Replay does not have access to the policy, this field is omitted.
272
273
  # Corresponds to the JSON property `bindingExplanations`
273
274
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1BindingExplanation>]
274
275
  attr_accessor :binding_explanations
@@ -285,31 +286,31 @@ module Google
285
286
 
286
287
  # An Identity and Access Management (IAM) policy, which specifies access
287
288
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
288
- # A `binding` binds one or more `members` to a single `role`. Members can be
289
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
290
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
291
- # role or a user-created custom role. For some types of Google Cloud resources,
292
- # a `binding` can also specify a `condition`, which is a logical expression that
293
- # allows access to a resource only if the expression evaluates to `true`. A
294
- # condition can add constraints based on attributes of the request, the resource,
295
- # or both. To learn which resources support conditions in their IAM policies,
296
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
297
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
298
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
299
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
300
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
301
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
302
- # title": "expirable access", "description": "Does not grant access after Sep
303
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
304
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
305
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
306
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
307
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
308
- # roles/resourcemanager.organizationViewer condition: title: expirable access
309
- # description: Does not grant access after Sep 2020 expression: request.time <
310
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
311
- # description of IAM and its features, see the [IAM documentation](https://cloud.
312
- # google.com/iam/docs/).
289
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
290
+ # Principals can be user accounts, service accounts, Google groups, and domains (
291
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
292
+ # an IAM predefined role or a user-created custom role. For some types of Google
293
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
294
+ # logical expression that allows access to a resource only if the expression
295
+ # evaluates to `true`. A condition can add constraints based on attributes of
296
+ # the request, the resource, or both. To learn which resources support
297
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
298
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
299
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
300
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
301
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
302
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
303
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
304
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
305
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
306
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
307
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
308
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
309
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
310
+ # access description: Does not grant access after Sep 2020 expression: request.
311
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
312
+ # a description of IAM and its features, see the [IAM documentation](https://
313
+ # cloud.google.com/iam/docs/).
313
314
  # Corresponds to the JSON property `policy`
314
315
  # @return [Google::Apis::PolicysimulatorV1::GoogleIamV1Policy]
315
316
  attr_accessor :policy
@@ -437,12 +438,12 @@ module Google
437
438
 
438
439
  # The difference between the results of evaluating an access tuple under the
439
440
  # current (baseline) policies and under the proposed (simulated) policies. This
440
- # difference explains how a member's access could change if the proposed
441
+ # difference explains how a principal's access could change if the proposed
441
442
  # policies were applied.
442
443
  class GoogleCloudPolicysimulatorV1ReplayDiff
443
444
  include Google::Apis::Core::Hashable
444
445
 
445
- # A summary and comparison of the member's access under the current (baseline)
446
+ # A summary and comparison of the principal's access under the current (baseline)
446
447
  # policies and the proposed (simulated) policies for a single access tuple.
447
448
  # Corresponds to the JSON property `accessDiff`
448
449
  # @return [Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1AccessStateDiff]
@@ -481,14 +482,14 @@ module Google
481
482
  class GoogleCloudPolicysimulatorV1ReplayResult
482
483
  include Google::Apis::Core::Hashable
483
484
 
484
- # Information about the member, resource, and permission to check.
485
+ # Information about the principal, resource, and permission to check.
485
486
  # Corresponds to the JSON property `accessTuple`
486
487
  # @return [Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1AccessTuple]
487
488
  attr_accessor :access_tuple
488
489
 
489
490
  # The difference between the results of evaluating an access tuple under the
490
491
  # current (baseline) policies and under the proposed (simulated) policies. This
491
- # difference explains how a member's access could change if the proposed
492
+ # difference explains how a principal's access could change if the proposed
492
493
  # policies were applied.
493
494
  # Corresponds to the JSON property `diff`
494
495
  # @return [Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1ReplayDiff]
@@ -840,7 +841,7 @@ module Google
840
841
  end
841
842
  end
842
843
 
843
- # Associates `members` with a `role`.
844
+ # Associates `members`, or principals, with a `role`.
844
845
  class GoogleIamV1Binding
845
846
  include Google::Apis::Core::Hashable
846
847
 
@@ -863,7 +864,7 @@ module Google
863
864
  # @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
864
865
  attr_accessor :condition
865
866
 
866
- # Specifies the identities requesting access for a Cloud Platform resource. `
867
+ # Specifies the principals requesting access for a Cloud Platform resource. `
867
868
  # members` can have the following values: * `allUsers`: A special identifier
868
869
  # that represents anyone who is on the internet; with or without a Google
869
870
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -893,8 +894,8 @@ module Google
893
894
  # @return [Array<String>]
894
895
  attr_accessor :members
895
896
 
896
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
897
- # , or `roles/owner`.
897
+ # Role that is assigned to the list of `members`, or principals. For example, `
898
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
898
899
  # Corresponds to the JSON property `role`
899
900
  # @return [String]
900
901
  attr_accessor :role
@@ -913,31 +914,31 @@ module Google
913
914
 
914
915
  # An Identity and Access Management (IAM) policy, which specifies access
915
916
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
916
- # A `binding` binds one or more `members` to a single `role`. Members can be
917
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
918
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
919
- # role or a user-created custom role. For some types of Google Cloud resources,
920
- # a `binding` can also specify a `condition`, which is a logical expression that
921
- # allows access to a resource only if the expression evaluates to `true`. A
922
- # condition can add constraints based on attributes of the request, the resource,
923
- # or both. To learn which resources support conditions in their IAM policies,
924
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
925
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
926
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
927
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
928
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
929
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
930
- # title": "expirable access", "description": "Does not grant access after Sep
931
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
932
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
933
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
934
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
935
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
936
- # roles/resourcemanager.organizationViewer condition: title: expirable access
937
- # description: Does not grant access after Sep 2020 expression: request.time <
938
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
939
- # description of IAM and its features, see the [IAM documentation](https://cloud.
940
- # google.com/iam/docs/).
917
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
918
+ # Principals can be user accounts, service accounts, Google groups, and domains (
919
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
920
+ # an IAM predefined role or a user-created custom role. For some types of Google
921
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
922
+ # logical expression that allows access to a resource only if the expression
923
+ # evaluates to `true`. A condition can add constraints based on attributes of
924
+ # the request, the resource, or both. To learn which resources support
925
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
926
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
927
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
928
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
929
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
930
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
931
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
932
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
933
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
934
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
935
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
936
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
937
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
938
+ # access description: Does not grant access after Sep 2020 expression: request.
939
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
940
+ # a description of IAM and its features, see the [IAM documentation](https://
941
+ # cloud.google.com/iam/docs/).
941
942
  class GoogleIamV1Policy
942
943
  include Google::Apis::Core::Hashable
943
944
 
@@ -946,9 +947,14 @@ module Google
946
947
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1AuditConfig>]
947
948
  attr_accessor :audit_configs
948
949
 
949
- # Associates a list of `members` to a `role`. Optionally, may specify a `
950
- # condition` that determines how and when the `bindings` are applied. Each of
951
- # the `bindings` must contain at least one member.
950
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
951
+ # specify a `condition` that determines how and when the `bindings` are applied.
952
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
953
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
954
+ # can be Google groups. Each occurrence of a principal counts towards these
955
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
956
+ # example.com`, and not to any other principal, then you can add another 1,450
957
+ # principals to the `bindings` in the `Policy`.
952
958
  # Corresponds to the JSON property `bindings`
953
959
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1Binding>]
954
960
  attr_accessor :bindings
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module PolicysimulatorV1
18
18
  # Version of the google-apis-policysimulator_v1 gem
19
- GEM_VERSION = "0.3.0"
19
+ GEM_VERSION = "0.7.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
- GENERATOR_VERSION = "0.3.0"
22
+ GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210330"
25
+ REVISION = "20211008"
26
26
  end
27
27
  end
28
28
  end
@@ -35,7 +35,7 @@ module Google
35
35
  # This is NOT the gem version.
36
36
  VERSION = 'V1'
37
37
 
38
- # See, edit, configure, and delete your Google Cloud Platform data
38
+ # See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account.
39
39
  AUTH_CLOUD_PLATFORM = 'https://www.googleapis.com/auth/cloud-platform'
40
40
  end
41
41
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-policysimulator_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.3.0
4
+ version: 0.7.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-06-28 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '0.3'
19
+ version: '0.4'
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '0.3'
29
+ version: '0.4'
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.3.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.7.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1
63
63
  post_install_message:
64
64
  rdoc_options: []