google-apis-policysimulator_v1 0.6.0 → 0.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/lib/google/apis/policysimulator_v1/classes.rb +62 -62
- data/lib/google/apis/policysimulator_v1/gem_version.rb +2 -2
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '099fe2c56d8b4436e11fdccfe955fd07000ecd463931dfd18a8992cd7dd3a9df'
|
4
|
+
data.tar.gz: 53ae97ea9968e9bb8492eb13c67f594d6c14a6c03132abee346764110e0a2a46
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 06cd709945dc556bd5fcac0c768a988579edc0222cac8553719d23992a24a2ad0a720d2b792f71d8599070ae0d0413f35b3ae4fc367a7815f546a55f556039f1
|
7
|
+
data.tar.gz: 45e3291c22209264f8a1298379278bc4de88faf441902f1ad13d8b5c74ccfdc1d1adfaa62d3d854893f60499db8f46d757d9b475be5910bdabec68a8fa53e761
|
data/CHANGELOG.md
CHANGED
@@ -286,31 +286,31 @@ module Google
|
|
286
286
|
|
287
287
|
# An Identity and Access Management (IAM) policy, which specifies access
|
288
288
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
289
|
-
# A `binding` binds one or more `members
|
290
|
-
# user accounts, service accounts, Google groups, and domains (
|
291
|
-
# A `role` is a named list of permissions; each `role` can be
|
292
|
-
# role or a user-created custom role. For some types of Google
|
293
|
-
# a `binding` can also specify a `condition`, which is a
|
294
|
-
# allows access to a resource only if the expression
|
295
|
-
# condition can add constraints based on attributes of
|
296
|
-
# or both. To learn which resources support
|
297
|
-
# see the [IAM documentation](https://cloud.
|
298
|
-
# resource-policies). **JSON example:** ` "
|
299
|
-
# resourcemanager.organizationAdmin", "members": [
|
300
|
-
# group:admins@example.com", "domain:google.com", "
|
301
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
302
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
303
|
-
# title": "expirable access", "description": "Does not grant
|
304
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
305
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
306
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
307
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
308
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
309
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
310
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
311
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
312
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
313
|
-
# google.com/iam/docs/).
|
289
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
290
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
291
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
292
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
293
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
294
|
+
# logical expression that allows access to a resource only if the expression
|
295
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
296
|
+
# the request, the resource, or both. To learn which resources support
|
297
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
298
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
299
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
300
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
301
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
302
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
303
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
304
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
305
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
306
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
307
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
308
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
309
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
310
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
311
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
312
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
313
|
+
# cloud.google.com/iam/docs/).
|
314
314
|
# Corresponds to the JSON property `policy`
|
315
315
|
# @return [Google::Apis::PolicysimulatorV1::GoogleIamV1Policy]
|
316
316
|
attr_accessor :policy
|
@@ -841,7 +841,7 @@ module Google
|
|
841
841
|
end
|
842
842
|
end
|
843
843
|
|
844
|
-
# Associates `members
|
844
|
+
# Associates `members`, or principals, with a `role`.
|
845
845
|
class GoogleIamV1Binding
|
846
846
|
include Google::Apis::Core::Hashable
|
847
847
|
|
@@ -864,7 +864,7 @@ module Google
|
|
864
864
|
# @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
|
865
865
|
attr_accessor :condition
|
866
866
|
|
867
|
-
# Specifies the
|
867
|
+
# Specifies the principals requesting access for a Cloud Platform resource. `
|
868
868
|
# members` can have the following values: * `allUsers`: A special identifier
|
869
869
|
# that represents anyone who is on the internet; with or without a Google
|
870
870
|
# account. * `allAuthenticatedUsers`: A special identifier that represents
|
@@ -894,8 +894,8 @@ module Google
|
|
894
894
|
# @return [Array<String>]
|
895
895
|
attr_accessor :members
|
896
896
|
|
897
|
-
# Role that is assigned to `members
|
898
|
-
#
|
897
|
+
# Role that is assigned to the list of `members`, or principals. For example, `
|
898
|
+
# roles/viewer`, `roles/editor`, or `roles/owner`.
|
899
899
|
# Corresponds to the JSON property `role`
|
900
900
|
# @return [String]
|
901
901
|
attr_accessor :role
|
@@ -914,31 +914,31 @@ module Google
|
|
914
914
|
|
915
915
|
# An Identity and Access Management (IAM) policy, which specifies access
|
916
916
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
917
|
-
# A `binding` binds one or more `members
|
918
|
-
# user accounts, service accounts, Google groups, and domains (
|
919
|
-
# A `role` is a named list of permissions; each `role` can be
|
920
|
-
# role or a user-created custom role. For some types of Google
|
921
|
-
# a `binding` can also specify a `condition`, which is a
|
922
|
-
# allows access to a resource only if the expression
|
923
|
-
# condition can add constraints based on attributes of
|
924
|
-
# or both. To learn which resources support
|
925
|
-
# see the [IAM documentation](https://cloud.
|
926
|
-
# resource-policies). **JSON example:** ` "
|
927
|
-
# resourcemanager.organizationAdmin", "members": [
|
928
|
-
# group:admins@example.com", "domain:google.com", "
|
929
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
930
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
931
|
-
# title": "expirable access", "description": "Does not grant
|
932
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
933
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
934
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
935
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
936
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
937
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
938
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
939
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
940
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
941
|
-
# google.com/iam/docs/).
|
917
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
918
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
919
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
920
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
921
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
922
|
+
# logical expression that allows access to a resource only if the expression
|
923
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
924
|
+
# the request, the resource, or both. To learn which resources support
|
925
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
926
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
927
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
928
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
929
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
930
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
931
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
932
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
933
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
934
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
935
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
936
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
937
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
938
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
939
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
940
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
941
|
+
# cloud.google.com/iam/docs/).
|
942
942
|
class GoogleIamV1Policy
|
943
943
|
include Google::Apis::Core::Hashable
|
944
944
|
|
@@ -947,14 +947,14 @@ module Google
|
|
947
947
|
# @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1AuditConfig>]
|
948
948
|
attr_accessor :audit_configs
|
949
949
|
|
950
|
-
# Associates a list of `members
|
951
|
-
# condition` that determines how and when the `bindings` are applied.
|
952
|
-
# the `bindings` must contain at least one
|
953
|
-
# can refer to up to 1,500
|
954
|
-
# groups. Each occurrence of a
|
955
|
-
# if the `bindings` grant 50 different roles to `user:alice@
|
956
|
-
# not to any other
|
957
|
-
# bindings` in the `Policy`.
|
950
|
+
# Associates a list of `members`, or principals, with a `role`. Optionally, may
|
951
|
+
# specify a `condition` that determines how and when the `bindings` are applied.
|
952
|
+
# Each of the `bindings` must contain at least one principal. The `bindings` in
|
953
|
+
# a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
|
954
|
+
# can be Google groups. Each occurrence of a principal counts towards these
|
955
|
+
# limits. For example, if the `bindings` grant 50 different roles to `user:alice@
|
956
|
+
# example.com`, and not to any other principal, then you can add another 1,450
|
957
|
+
# principals to the `bindings` in the `Policy`.
|
958
958
|
# Corresponds to the JSON property `bindings`
|
959
959
|
# @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1Binding>]
|
960
960
|
attr_accessor :bindings
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module PolicysimulatorV1
|
18
18
|
# Version of the google-apis-policysimulator_v1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.7.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
22
|
GENERATOR_VERSION = "0.4.0"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20211008"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-policysimulator_v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.7.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-10-
|
11
|
+
date: 2021-10-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.7.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|