google-apis-policysimulator_v1 0.6.0 → 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/lib/google/apis/policysimulator_v1/classes.rb +62 -62
- data/lib/google/apis/policysimulator_v1/gem_version.rb +2 -2
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: '099fe2c56d8b4436e11fdccfe955fd07000ecd463931dfd18a8992cd7dd3a9df'
|
4
|
+
data.tar.gz: 53ae97ea9968e9bb8492eb13c67f594d6c14a6c03132abee346764110e0a2a46
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 06cd709945dc556bd5fcac0c768a988579edc0222cac8553719d23992a24a2ad0a720d2b792f71d8599070ae0d0413f35b3ae4fc367a7815f546a55f556039f1
|
7
|
+
data.tar.gz: 45e3291c22209264f8a1298379278bc4de88faf441902f1ad13d8b5c74ccfdc1d1adfaa62d3d854893f60499db8f46d757d9b475be5910bdabec68a8fa53e761
|
data/CHANGELOG.md
CHANGED
@@ -286,31 +286,31 @@ module Google
|
|
286
286
|
|
287
287
|
# An Identity and Access Management (IAM) policy, which specifies access
|
288
288
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
289
|
-
# A `binding` binds one or more `members
|
290
|
-
# user accounts, service accounts, Google groups, and domains (
|
291
|
-
# A `role` is a named list of permissions; each `role` can be
|
292
|
-
# role or a user-created custom role. For some types of Google
|
293
|
-
# a `binding` can also specify a `condition`, which is a
|
294
|
-
# allows access to a resource only if the expression
|
295
|
-
# condition can add constraints based on attributes of
|
296
|
-
# or both. To learn which resources support
|
297
|
-
# see the [IAM documentation](https://cloud.
|
298
|
-
# resource-policies). **JSON example:** ` "
|
299
|
-
# resourcemanager.organizationAdmin", "members": [
|
300
|
-
# group:admins@example.com", "domain:google.com", "
|
301
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
302
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
303
|
-
# title": "expirable access", "description": "Does not grant
|
304
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
305
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
306
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
307
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
308
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
309
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
310
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
311
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
312
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
313
|
-
# google.com/iam/docs/).
|
289
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
290
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
291
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
292
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
293
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
294
|
+
# logical expression that allows access to a resource only if the expression
|
295
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
296
|
+
# the request, the resource, or both. To learn which resources support
|
297
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
298
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
299
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
300
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
301
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
302
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
303
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
304
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
305
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
306
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
307
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
308
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
309
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
310
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
311
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
312
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
313
|
+
# cloud.google.com/iam/docs/).
|
314
314
|
# Corresponds to the JSON property `policy`
|
315
315
|
# @return [Google::Apis::PolicysimulatorV1::GoogleIamV1Policy]
|
316
316
|
attr_accessor :policy
|
@@ -841,7 +841,7 @@ module Google
|
|
841
841
|
end
|
842
842
|
end
|
843
843
|
|
844
|
-
# Associates `members
|
844
|
+
# Associates `members`, or principals, with a `role`.
|
845
845
|
class GoogleIamV1Binding
|
846
846
|
include Google::Apis::Core::Hashable
|
847
847
|
|
@@ -864,7 +864,7 @@ module Google
|
|
864
864
|
# @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
|
865
865
|
attr_accessor :condition
|
866
866
|
|
867
|
-
# Specifies the
|
867
|
+
# Specifies the principals requesting access for a Cloud Platform resource. `
|
868
868
|
# members` can have the following values: * `allUsers`: A special identifier
|
869
869
|
# that represents anyone who is on the internet; with or without a Google
|
870
870
|
# account. * `allAuthenticatedUsers`: A special identifier that represents
|
@@ -894,8 +894,8 @@ module Google
|
|
894
894
|
# @return [Array<String>]
|
895
895
|
attr_accessor :members
|
896
896
|
|
897
|
-
# Role that is assigned to `members
|
898
|
-
#
|
897
|
+
# Role that is assigned to the list of `members`, or principals. For example, `
|
898
|
+
# roles/viewer`, `roles/editor`, or `roles/owner`.
|
899
899
|
# Corresponds to the JSON property `role`
|
900
900
|
# @return [String]
|
901
901
|
attr_accessor :role
|
@@ -914,31 +914,31 @@ module Google
|
|
914
914
|
|
915
915
|
# An Identity and Access Management (IAM) policy, which specifies access
|
916
916
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
917
|
-
# A `binding` binds one or more `members
|
918
|
-
# user accounts, service accounts, Google groups, and domains (
|
919
|
-
# A `role` is a named list of permissions; each `role` can be
|
920
|
-
# role or a user-created custom role. For some types of Google
|
921
|
-
# a `binding` can also specify a `condition`, which is a
|
922
|
-
# allows access to a resource only if the expression
|
923
|
-
# condition can add constraints based on attributes of
|
924
|
-
# or both. To learn which resources support
|
925
|
-
# see the [IAM documentation](https://cloud.
|
926
|
-
# resource-policies). **JSON example:** ` "
|
927
|
-
# resourcemanager.organizationAdmin", "members": [
|
928
|
-
# group:admins@example.com", "domain:google.com", "
|
929
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
930
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
931
|
-
# title": "expirable access", "description": "Does not grant
|
932
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
933
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
934
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
935
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
936
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
937
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
938
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
939
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
940
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
941
|
-
# google.com/iam/docs/).
|
917
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
918
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
919
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
920
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
921
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
922
|
+
# logical expression that allows access to a resource only if the expression
|
923
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
924
|
+
# the request, the resource, or both. To learn which resources support
|
925
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
926
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
927
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
928
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
929
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
930
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
931
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
932
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
933
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
934
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
935
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
936
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
937
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
938
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
939
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
940
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
941
|
+
# cloud.google.com/iam/docs/).
|
942
942
|
class GoogleIamV1Policy
|
943
943
|
include Google::Apis::Core::Hashable
|
944
944
|
|
@@ -947,14 +947,14 @@ module Google
|
|
947
947
|
# @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1AuditConfig>]
|
948
948
|
attr_accessor :audit_configs
|
949
949
|
|
950
|
-
# Associates a list of `members
|
951
|
-
# condition` that determines how and when the `bindings` are applied.
|
952
|
-
# the `bindings` must contain at least one
|
953
|
-
# can refer to up to 1,500
|
954
|
-
# groups. Each occurrence of a
|
955
|
-
# if the `bindings` grant 50 different roles to `user:alice@
|
956
|
-
# not to any other
|
957
|
-
# bindings` in the `Policy`.
|
950
|
+
# Associates a list of `members`, or principals, with a `role`. Optionally, may
|
951
|
+
# specify a `condition` that determines how and when the `bindings` are applied.
|
952
|
+
# Each of the `bindings` must contain at least one principal. The `bindings` in
|
953
|
+
# a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
|
954
|
+
# can be Google groups. Each occurrence of a principal counts towards these
|
955
|
+
# limits. For example, if the `bindings` grant 50 different roles to `user:alice@
|
956
|
+
# example.com`, and not to any other principal, then you can add another 1,450
|
957
|
+
# principals to the `bindings` in the `Policy`.
|
958
958
|
# Corresponds to the JSON property `bindings`
|
959
959
|
# @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1Binding>]
|
960
960
|
attr_accessor :bindings
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module PolicysimulatorV1
|
18
18
|
# Version of the google-apis-policysimulator_v1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.7.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
22
|
GENERATOR_VERSION = "0.4.0"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20211008"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-policysimulator_v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.7.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-10-
|
11
|
+
date: 2021-10-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.7.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|