google-apis-policysimulator_v1 0.6.0 → 0.7.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e0286afd18f202aee5046f798b550d9d1cbce47536269400edea0ee9ac5960bb
4
- data.tar.gz: db89c8f5cf0439fe884d99b956c2328d220b7dfd0332f4d4230bf705ef9a6441
3
+ metadata.gz: '099fe2c56d8b4436e11fdccfe955fd07000ecd463931dfd18a8992cd7dd3a9df'
4
+ data.tar.gz: 53ae97ea9968e9bb8492eb13c67f594d6c14a6c03132abee346764110e0a2a46
5
5
  SHA512:
6
- metadata.gz: 41859fac92f82b2164b922ab3118cbc90b0ef53822fa84c044eb053cc328452eabbe4eb992a67bcf38c04ffd5fc6dd1a4f7daf36be54b26f9b4a00d268a4280a
7
- data.tar.gz: aafb8eca9ed5fb964d589147b00c41165d53ab7c5d2612e0bf7c5c1d2ac5443148a173108509982d81ae90c7f12f83a2e2025d91b27a9cf9de8d38b4718314e7
6
+ metadata.gz: 06cd709945dc556bd5fcac0c768a988579edc0222cac8553719d23992a24a2ad0a720d2b792f71d8599070ae0d0413f35b3ae4fc367a7815f546a55f556039f1
7
+ data.tar.gz: 45e3291c22209264f8a1298379278bc4de88faf441902f1ad13d8b5c74ccfdc1d1adfaa62d3d854893f60499db8f46d757d9b475be5910bdabec68a8fa53e761
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-policysimulator_v1
2
2
 
3
+ ### v0.7.0 (2021-10-14)
4
+
5
+ * Regenerated from discovery document revision 20211008
6
+
3
7
  ### v0.6.0 (2021-10-06)
4
8
 
5
9
  * Regenerated from discovery document revision 20211002
@@ -286,31 +286,31 @@ module Google
286
286
 
287
287
  # An Identity and Access Management (IAM) policy, which specifies access
288
288
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
289
- # A `binding` binds one or more `members` to a single `role`. Members can be
290
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
291
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
292
- # role or a user-created custom role. For some types of Google Cloud resources,
293
- # a `binding` can also specify a `condition`, which is a logical expression that
294
- # allows access to a resource only if the expression evaluates to `true`. A
295
- # condition can add constraints based on attributes of the request, the resource,
296
- # or both. To learn which resources support conditions in their IAM policies,
297
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
298
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
299
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
300
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
301
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
302
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
303
- # title": "expirable access", "description": "Does not grant access after Sep
304
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
305
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
306
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
307
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
308
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
309
- # roles/resourcemanager.organizationViewer condition: title: expirable access
310
- # description: Does not grant access after Sep 2020 expression: request.time <
311
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
312
- # description of IAM and its features, see the [IAM documentation](https://cloud.
313
- # google.com/iam/docs/).
289
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
290
+ # Principals can be user accounts, service accounts, Google groups, and domains (
291
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
292
+ # an IAM predefined role or a user-created custom role. For some types of Google
293
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
294
+ # logical expression that allows access to a resource only if the expression
295
+ # evaluates to `true`. A condition can add constraints based on attributes of
296
+ # the request, the resource, or both. To learn which resources support
297
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
298
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
299
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
300
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
301
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
302
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
303
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
304
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
305
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
306
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
307
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
308
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
309
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
310
+ # access description: Does not grant access after Sep 2020 expression: request.
311
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
312
+ # a description of IAM and its features, see the [IAM documentation](https://
313
+ # cloud.google.com/iam/docs/).
314
314
  # Corresponds to the JSON property `policy`
315
315
  # @return [Google::Apis::PolicysimulatorV1::GoogleIamV1Policy]
316
316
  attr_accessor :policy
@@ -841,7 +841,7 @@ module Google
841
841
  end
842
842
  end
843
843
 
844
- # Associates `members` with a `role`.
844
+ # Associates `members`, or principals, with a `role`.
845
845
  class GoogleIamV1Binding
846
846
  include Google::Apis::Core::Hashable
847
847
 
@@ -864,7 +864,7 @@ module Google
864
864
  # @return [Google::Apis::PolicysimulatorV1::GoogleTypeExpr]
865
865
  attr_accessor :condition
866
866
 
867
- # Specifies the identities requesting access for a Cloud Platform resource. `
867
+ # Specifies the principals requesting access for a Cloud Platform resource. `
868
868
  # members` can have the following values: * `allUsers`: A special identifier
869
869
  # that represents anyone who is on the internet; with or without a Google
870
870
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -894,8 +894,8 @@ module Google
894
894
  # @return [Array<String>]
895
895
  attr_accessor :members
896
896
 
897
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
898
- # , or `roles/owner`.
897
+ # Role that is assigned to the list of `members`, or principals. For example, `
898
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
899
899
  # Corresponds to the JSON property `role`
900
900
  # @return [String]
901
901
  attr_accessor :role
@@ -914,31 +914,31 @@ module Google
914
914
 
915
915
  # An Identity and Access Management (IAM) policy, which specifies access
916
916
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
917
- # A `binding` binds one or more `members` to a single `role`. Members can be
918
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
919
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
920
- # role or a user-created custom role. For some types of Google Cloud resources,
921
- # a `binding` can also specify a `condition`, which is a logical expression that
922
- # allows access to a resource only if the expression evaluates to `true`. A
923
- # condition can add constraints based on attributes of the request, the resource,
924
- # or both. To learn which resources support conditions in their IAM policies,
925
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
926
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
927
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
928
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
929
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
930
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
931
- # title": "expirable access", "description": "Does not grant access after Sep
932
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
933
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
934
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
935
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
936
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
937
- # roles/resourcemanager.organizationViewer condition: title: expirable access
938
- # description: Does not grant access after Sep 2020 expression: request.time <
939
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
940
- # description of IAM and its features, see the [IAM documentation](https://cloud.
941
- # google.com/iam/docs/).
917
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
918
+ # Principals can be user accounts, service accounts, Google groups, and domains (
919
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
920
+ # an IAM predefined role or a user-created custom role. For some types of Google
921
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
922
+ # logical expression that allows access to a resource only if the expression
923
+ # evaluates to `true`. A condition can add constraints based on attributes of
924
+ # the request, the resource, or both. To learn which resources support
925
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
926
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
927
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
928
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
929
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
930
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
931
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
932
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
933
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
934
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
935
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
936
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
937
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
938
+ # access description: Does not grant access after Sep 2020 expression: request.
939
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
940
+ # a description of IAM and its features, see the [IAM documentation](https://
941
+ # cloud.google.com/iam/docs/).
942
942
  class GoogleIamV1Policy
943
943
  include Google::Apis::Core::Hashable
944
944
 
@@ -947,14 +947,14 @@ module Google
947
947
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1AuditConfig>]
948
948
  attr_accessor :audit_configs
949
949
 
950
- # Associates a list of `members` to a `role`. Optionally, may specify a `
951
- # condition` that determines how and when the `bindings` are applied. Each of
952
- # the `bindings` must contain at least one member. The `bindings` in a `Policy`
953
- # can refer to up to 1,500 members; up to 250 of these members can be Google
954
- # groups. Each occurrence of a member counts towards these limits. For example,
955
- # if the `bindings` grant 50 different roles to `user:alice@example.com`, and
956
- # not to any other member, then you can add another 1,450 members to the `
957
- # bindings` in the `Policy`.
950
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
951
+ # specify a `condition` that determines how and when the `bindings` are applied.
952
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
953
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
954
+ # can be Google groups. Each occurrence of a principal counts towards these
955
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
956
+ # example.com`, and not to any other principal, then you can add another 1,450
957
+ # principals to the `bindings` in the `Policy`.
958
958
  # Corresponds to the JSON property `bindings`
959
959
  # @return [Array<Google::Apis::PolicysimulatorV1::GoogleIamV1Binding>]
960
960
  attr_accessor :bindings
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module PolicysimulatorV1
18
18
  # Version of the google-apis-policysimulator_v1 gem
19
- GEM_VERSION = "0.6.0"
19
+ GEM_VERSION = "0.7.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20211002"
25
+ REVISION = "20211008"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-policysimulator_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.6.0
4
+ version: 0.7.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-11 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.6.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1/v0.7.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1
63
63
  post_install_message:
64
64
  rdoc_options: []