google-apis-policysimulator_v1 0.3.0 → 0.7.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7d597ad84b0cc0355041883f664edd19129c21e454db621cdf7e52e96c5c4f9d
4
- data.tar.gz: e6826304be2a3b72ac6401089dd1d734f5af782e00a522a1e479e66bc54b88a7
3
+ metadata.gz: '099fe2c56d8b4436e11fdccfe955fd07000ecd463931dfd18a8992cd7dd3a9df'
4
+ data.tar.gz: 53ae97ea9968e9bb8492eb13c67f594d6c14a6c03132abee346764110e0a2a46
5
5
  SHA512:
6
- metadata.gz: 351318488ae3895a7f3d3ca1f315f8b1b58e1c7ed43994a2e12e6f87a64e5f4ba21cd0962f115136bcead14927bac749d5ef02d0d9430e5eaf0931a380fca2d2
7
- data.tar.gz: '0591166ace95b2a04f58132c665cfe1a5b711e0d158f2fdde29ec61fb723864cfde9cc8d40e22c6cc80b891e96b42afc962132cc313bd9d1b3083ed529e47d72'
6
+ metadata.gz: 06cd709945dc556bd5fcac0c768a988579edc0222cac8553719d23992a24a2ad0a720d2b792f71d8599070ae0d0413f35b3ae4fc367a7815f546a55f556039f1
7
+ data.tar.gz: 45e3291c22209264f8a1298379278bc4de88faf441902f1ad13d8b5c74ccfdc1d1adfaa62d3d854893f60499db8f46d757d9b475be5910bdabec68a8fa53e761
data/CHANGELOG.md CHANGED
@@ -1,5 +1,21 @@
1
1
  # Release history for google-apis-policysimulator_v1
2
2
 
3
+ ### v0.7.0 (2021-10-14)
4
+
5
+ * Regenerated from discovery document revision 20211008
6
+
7
+ ### v0.6.0 (2021-10-06)
8
+
9
+ * Regenerated from discovery document revision 20211002
10
+
11
+ ### v0.5.0 (2021-09-01)
12
+
13
+ * Regenerated from discovery document revision 20210813
14
+
15
+ ### v0.4.0 (2021-06-29)
16
+
17
+ * Regenerated using generator version 0.4.0
18
+
3
19
  ### v0.3.0 (2021-06-24)
4
20
 
5
21
  * Regenerated using generator version 0.3.0
@@ -22,13 +22,13 @@ module Google
22
22
  module Apis
23
23
  module PolicysimulatorV1
24
24
 
25
- # A summary and comparison of the member's access under the current (baseline)
25
+ # A summary and comparison of the principal's access under the current (baseline)
26
26
  # policies and the proposed (simulated) policies for a single access tuple.
27
27
  class GoogleCloudPolicysimulatorV1AccessStateDiff
28
28
  include Google::Apis::Core::Hashable
29
29
 
30
- # How the member's access, specified in the AccessState field, changed between
31
- # the current (baseline) policies and proposed (simulated) policies.
30
+ # How the principal's access, specified in the AccessState field, changed
31
+ # between the current (baseline) policies and proposed (simulated) policies.
32
32
  # Corresponds to the JSON property `accessChange`
33
33
  # @return [String]
34
34
  attr_accessor :access_change
@@ -57,7 +57,7 @@ module Google
57
57
  end
58
58
  end
59
59
 
60
- # Information about the member, resource, and permission to check.
60
+ # Information about the principal, resource, and permission to check.
61
61
  class GoogleCloudPolicysimulatorV1AccessTuple
62
62
  include Google::Apis::Core::Hashable
63
63
 
@@ -69,7 +69,7 @@ module Google
69
69
  # @return [String]
70
70
  attr_accessor :full_resource_name
71
71
 
72
- # Required. The IAM permission to check for the specified member and resource.
72
+ # Required. The IAM permission to check for the specified principal and resource.
73
73
  # For a complete list of IAM permissions, see https://cloud.google.com/iam/help/
74
74
  # permissions/reference. For a complete list of predefined IAM roles and the
75
75
  # permissions in each role, see https://cloud.google.com/iam/help/roles/
@@ -78,11 +78,11 @@ module Google
78
78
  # @return [String]
79
79
  attr_accessor :permission
80
80
 
81
- # Required. The member, or principal, whose access you want to check, in the
82
- # form of the email address that represents that member. For example, `alice@
83
- # example.com` or `my-service-account@my-project.iam.gserviceaccount.com`. The
84
- # member must be a Google Account or a service account. Other types of members
85
- # are not supported.
81
+ # Required. The principal whose access you want to check, in the form of the
82
+ # email address that represents that principal. For example, `alice@example.com`
83
+ # or `my-service-account@my-project.iam.gserviceaccount.com`. The principal must
84
+ # be a Google Account or a service account. Other types of principals are not
85
+ # supported.
86
86
  # Corresponds to the JSON property `principal`
87
87
  # @return [String]
88
88
  attr_accessor :principal
@@ -99,17 +99,17 @@ module Google
99
99
  end
100
100
  end
101
101
 
102
- # Details about how a binding in a policy affects a member's ability to use a
102
+ # Details about how a binding in a policy affects a principal's ability to use a
103
103
  # permission.
104
104
  class GoogleCloudPolicysimulatorV1BindingExplanation
105
105
  include Google::Apis::Core::Hashable
106
106
 
107
107
  # Required. Indicates whether _this binding_ provides the specified permission
108
- # to the specified member for the specified resource. This field does _not_
109
- # indicate whether the member actually has the permission for the resource.
108
+ # to the specified principal for the specified resource. This field does _not_
109
+ # indicate whether the principal actually has the permission for the resource.
110
110
  # There might be another binding that overrides this binding. To determine
111
- # whether the member actually has the permission, use the `access` field in the
112
- # TroubleshootIamPolicyResponse.
111
+ # whether the principal actually has the permission, use the `access` field in
112
+ # the TroubleshootIamPolicyResponse.
113
113
  # Corresponds to the JSON property `access`
114
114
  # @return [String]
115
115
  attr_accessor :access
@@ -133,17 +133,18 @@ module Google
133
133
  # @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
134
134
  attr_accessor :condition
135
135
 
136
- # Indicates whether each member in the binding includes the member specified in
137
- # the request, either directly or indirectly. Each key identifies a member in
138
- # the binding, and each value indicates whether the member in the binding
139
- # includes the member in the request. For example, suppose that a binding
140
- # includes the following members: * `user:alice@example.com` * `group:product-
141
- # eng@example.com` The member in the replayed access tuple is `user:bob@example.
142
- # com`. This user is a member of the group `group:product-eng@example.com`. For
143
- # the first member in the binding, the key is `user:alice@example.com`, and the `
144
- # membership` field in the value is set to `MEMBERSHIP_NOT_INCLUDED`. For the
145
- # second member in the binding, the key is `group:product-eng@example.com`, and
146
- # the `membership` field in the value is set to `MEMBERSHIP_INCLUDED`.
136
+ # Indicates whether each principal in the binding includes the principal
137
+ # specified in the request, either directly or indirectly. Each key identifies a
138
+ # principal in the binding, and each value indicates whether the principal in
139
+ # the binding includes the principal in the request. For example, suppose that a
140
+ # binding includes the following principals: * `user:alice@example.com` * `group:
141
+ # product-eng@example.com` The principal in the replayed access tuple is `user:
142
+ # bob@example.com`. This user is a principal of the group `group:product-eng@
143
+ # example.com`. For the first principal in the binding, the key is `user:alice@
144
+ # example.com`, and the `membership` field in the value is set to `
145
+ # MEMBERSHIP_NOT_INCLUDED`. For the second principal in the binding, the key is `
146
+ # group:product-eng@example.com`, and the `membership` field in the value is set
147
+ # to `MEMBERSHIP_INCLUDED`.
147
148
  # Corresponds to the JSON property `memberships`
148
149
  # @return [Hash<String,Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1BindingExplanationAnnotatedMembership>]
149
150
  attr_accessor :memberships
@@ -189,16 +190,16 @@ module Google
189
190
  end
190
191
  end
191
192
 
192
- # Details about whether the binding includes the member.
193
+ # Details about whether the binding includes the principal.
193
194
  class GoogleCloudPolicysimulatorV1BindingExplanationAnnotatedMembership
194
195
  include Google::Apis::Core::Hashable
195
196
 
196
- # Indicates whether the binding includes the member.
197
+ # Indicates whether the binding includes the principal.
197
198
  # Corresponds to the JSON property `membership`
198
199
  # @return [String]
199
200
  attr_accessor :membership
200
201
 
201
- # The relevance of the member's status to the overall determination for the
202
+ # The relevance of the principal's status to the overall determination for the
202
203
  # binding.
203
204
  # Corresponds to the JSON property `relevance`
204
205
  # @return [String]
@@ -220,8 +221,8 @@ module Google
220
221
  class GoogleCloudPolicysimulatorV1ExplainedAccess
221
222
  include Google::Apis::Core::Hashable
222
223
 
223
- # Whether the member in the access tuple has permission to access the resource
224
- # in the access tuple under the given policies.
224
+ # Whether the principal in the access tuple has permission to access the
225
+ # resource in the access tuple under the given policies.
225
226
  # Corresponds to the JSON property `accessState`
226
227
  # @return [String]
227
228
  attr_accessor :access_state
@@ -257,18 +258,18 @@ module Google
257
258
  include Google::Apis::Core::Hashable
258
259
 
259
260
  # Indicates whether _this policy_ provides the specified permission to the
260
- # specified member for the specified resource. This field does _not_ indicate
261
- # whether the member actually has the permission for the resource. There might
262
- # be another policy that overrides this policy. To determine whether the member
263
- # actually has the permission, use the `access` field in the
261
+ # specified principal for the specified resource. This field does _not_ indicate
262
+ # whether the principal actually has the permission for the resource. There
263
+ # might be another policy that overrides this policy. To determine whether the
264
+ # principal actually has the permission, use the `access` field in the
264
265
  # TroubleshootIamPolicyResponse.
265
266
  # Corresponds to the JSON property `access`
266
267
  # @return [String]
267
268
  attr_accessor :access
268
269
 
269
- # Details about how each binding in the policy affects the member's ability, or
270
- # inability, to use the permission for the resource. If the user who created the
271
- # Replay does not have access to the policy, this field is omitted.
270
+ # Details about how each binding in the policy affects the principal's ability,
271
+ # or inability, to use the permission for the resource. If the user who created
272
+ # the Replay does not have access to the policy, this field is omitted.
272
273
  # Corresponds to the JSON property `bindingExplanations`
273
274
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1BindingExplanation>]
274
275
  attr_accessor :binding_explanations
@@ -285,31 +286,31 @@ module Google
285
286
 
286
287
  # An Identity and Access Management (IAM) policy, which specifies access
287
288
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
288
- # A `binding` binds one or more `members` to a single `role`. Members can be
289
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
290
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
291
- # role or a user-created custom role. For some types of Google Cloud resources,
292
- # a `binding` can also specify a `condition`, which is a logical expression that
293
- # allows access to a resource only if the expression evaluates to `true`. A
294
- # condition can add constraints based on attributes of the request, the resource,
295
- # or both. To learn which resources support conditions in their IAM policies,
296
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
297
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
298
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
299
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
300
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
301
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
302
- # title": "expirable access", "description": "Does not grant access after Sep
303
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
304
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
305
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
306
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
307
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
308
- # roles/resourcemanager.organizationViewer condition: title: expirable access
309
- # description: Does not grant access after Sep 2020 expression: request.time <
310
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
311
- # description of IAM and its features, see the [IAM documentation](https://cloud.
312
- # google.com/iam/docs/).
289
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
290
+ # Principals can be user accounts, service accounts, Google groups, and domains (
291
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
292
+ # an IAM predefined role or a user-created custom role. For some types of Google
293
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
294
+ # logical expression that allows access to a resource only if the expression
295
+ # evaluates to `true`. A condition can add constraints based on attributes of
296
+ # the request, the resource, or both. To learn which resources support
297
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
298
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
299
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
300
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
301
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
302
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
303
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
304
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
305
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
306
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
307
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
308
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
309
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
310
+ # access description: Does not grant access after Sep 2020 expression: request.
311
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
312
+ # a description of IAM and its features, see the [IAM documentation](https://
313
+ # cloud.google.com/iam/docs/).
313
314
  # Corresponds to the JSON property `policy`
314
315
  # @return [Google::Apis::PolicysimulatorV1::GoogleIamV1Policy]
315
316
  attr_accessor :policy
@@ -437,12 +438,12 @@ module Google
437
438
 
438
439
  # The difference between the results of evaluating an access tuple under the
439
440
  # current (baseline) policies and under the proposed (simulated) policies. This
440
- # difference explains how a member's access could change if the proposed
441
+ # difference explains how a principal's access could change if the proposed
441
442
  # policies were applied.
442
443
  class GoogleCloudPolicysimulatorV1ReplayDiff
443
444
  include Google::Apis::Core::Hashable
444
445
 
445
- # A summary and comparison of the member's access under the current (baseline)
446
+ # A summary and comparison of the principal's access under the current (baseline)
446
447
  # policies and the proposed (simulated) policies for a single access tuple.
447
448
  # Corresponds to the JSON property `accessDiff`
448
449
  # @return [Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1AccessStateDiff]
@@ -481,14 +482,14 @@ module Google
481
482
  class GoogleCloudPolicysimulatorV1ReplayResult
482
483
  include Google::Apis::Core::Hashable
483
484
 
484
- # Information about the member, resource, and permission to check.
485
+ # Information about the principal, resource, and permission to check.
485
486
  # Corresponds to the JSON property `accessTuple`
486
487
  # @return [Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1AccessTuple]
487
488
  attr_accessor :access_tuple
488
489
 
489
490
  # The difference between the results of evaluating an access tuple under the
490
491
  # current (baseline) policies and under the proposed (simulated) policies. This
491
- # difference explains how a member's access could change if the proposed
492
+ # difference explains how a principal's access could change if the proposed
492
493
  # policies were applied.
493
494
  # Corresponds to the JSON property `diff`
494
495
  # @return [Google::Apis::PolicysimulatorV1::GoogleCloudPolicysimulatorV1ReplayDiff]
@@ -840,7 +841,7 @@ module Google
840
841
  end
841
842
  end
842
843
 
843
- # Associates `members` with a `role`.
844
+ # Associates `members`, or principals, with a `role`.
844
845
  class GoogleIamV1Binding
845
846
  include Google::Apis::Core::Hashable
846
847
 
@@ -863,7 +864,7 @@ module Google
863
864
  # @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
864
865
  attr_accessor :condition
865
866
 
866
- # Specifies the identities requesting access for a Cloud Platform resource. `
867
+ # Specifies the principals requesting access for a Cloud Platform resource. `
867
868
  # members` can have the following values: * `allUsers`: A special identifier
868
869
  # that represents anyone who is on the internet; with or without a Google
869
870
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -893,8 +894,8 @@ module Google
893
894
  # @return [Array<String>]
894
895
  attr_accessor :members
895
896
 
896
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
897
- # , or `roles/owner`.
897
+ # Role that is assigned to the list of `members`, or principals. For example, `
898
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
898
899
  # Corresponds to the JSON property `role`
899
900
  # @return [String]
900
901
  attr_accessor :role
@@ -913,31 +914,31 @@ module Google
913
914
 
914
915
  # An Identity and Access Management (IAM) policy, which specifies access
915
916
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
916
- # A `binding` binds one or more `members` to a single `role`. Members can be
917
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
918
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
919
- # role or a user-created custom role. For some types of Google Cloud resources,
920
- # a `binding` can also specify a `condition`, which is a logical expression that
921
- # allows access to a resource only if the expression evaluates to `true`. A
922
- # condition can add constraints based on attributes of the request, the resource,
923
- # or both. To learn which resources support conditions in their IAM policies,
924
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
925
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
926
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
927
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
928
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
929
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
930
- # title": "expirable access", "description": "Does not grant access after Sep
931
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
932
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
933
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
934
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
935
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
936
- # roles/resourcemanager.organizationViewer condition: title: expirable access
937
- # description: Does not grant access after Sep 2020 expression: request.time <
938
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
939
- # description of IAM and its features, see the [IAM documentation](https://cloud.
940
- # google.com/iam/docs/).
917
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
918
+ # Principals can be user accounts, service accounts, Google groups, and domains (
919
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
920
+ # an IAM predefined role or a user-created custom role. For some types of Google
921
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
922
+ # logical expression that allows access to a resource only if the expression
923
+ # evaluates to `true`. A condition can add constraints based on attributes of
924
+ # the request, the resource, or both. To learn which resources support
925
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
926
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
927
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
928
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
929
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
930
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
931
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
932
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
933
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
934
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
935
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
936
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
937
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
938
+ # access description: Does not grant access after Sep 2020 expression: request.
939
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
940
+ # a description of IAM and its features, see the [IAM documentation](https://
941
+ # cloud.google.com/iam/docs/).
941
942
  class GoogleIamV1Policy
942
943
  include Google::Apis::Core::Hashable
943
944
 
@@ -946,9 +947,14 @@ module Google
946
947
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1AuditConfig>]
947
948
  attr_accessor :audit_configs
948
949
 
949
- # Associates a list of `members` to a `role`. Optionally, may specify a `
950
- # condition` that determines how and when the `bindings` are applied. Each of
951
- # the `bindings` must contain at least one member.
950
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
951
+ # specify a `condition` that determines how and when the `bindings` are applied.
952
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
953
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
954
+ # can be Google groups. Each occurrence of a principal counts towards these
955
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
956
+ # example.com`, and not to any other principal, then you can add another 1,450
957
+ # principals to the `bindings` in the `Policy`.
952
958
  # Corresponds to the JSON property `bindings`
953
959
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1Binding>]
954
960
  attr_accessor :bindings
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module PolicysimulatorV1
18
18
  # Version of the google-apis-policysimulator_v1 gem
19
- GEM_VERSION = "0.3.0"
19
+ GEM_VERSION = "0.7.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
- GENERATOR_VERSION = "0.3.0"
22
+ GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210330"
25
+ REVISION = "20211008"
26
26
  end
27
27
  end
28
28
  end
@@ -35,7 +35,7 @@ module Google
35
35
  # This is NOT the gem version.
36
36
  VERSION = 'V1'
37
37
 
38
- # See, edit, configure, and delete your Google Cloud Platform data
38
+ # See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account.
39
39
  AUTH_CLOUD_PLATFORM = 'https://www.googleapis.com/auth/cloud-platform'
40
40
  end
41
41
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-policysimulator_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.3.0
4
+ version: 0.7.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-06-28 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '0.3'
19
+ version: '0.4'
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '0.3'
29
+ version: '0.4'
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.3.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.7.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1
63
63
  post_install_message:
64
64
  rdoc_options: []