google-apis-policysimulator_v1beta1 0.6.0 → 0.10.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e41876c624e0eeeb867f48ea2ae5c239f04910749d900601e881080b41c90d55
4
- data.tar.gz: c1839b1dd6a88a477965cff59b71f2b073073fc28ee84ca3160bc96d45d001e9
3
+ metadata.gz: 51ff6a68a7cf7e149b000e3b7cd2e4d97de12bb8e4c47a5692f4d0c6de2741e5
4
+ data.tar.gz: a34a2e6b893c75709d59808d18dd61e29b0c8fcf490e7ed117275529dfab4ca3
5
5
  SHA512:
6
- metadata.gz: 4bbf53b5c1fb6182d63ecbb96da804dd60ddc18ddb7c7cf65de77b9e047d67f48f8e00a6b56dc5169559422f4ab220983e98b4f4a6a33c157465f0b67a5fdee8
7
- data.tar.gz: '06489f43c3b049a19d1d813635fc1a65e5fefb77ae82cb4f642c1ebef46fd94aa05a6b0aa6982bb80d813e953db4312f9397a996f91e02098c4fc6ae799711d1'
6
+ metadata.gz: 8b2fb70475a68f2b6ee26cd29cea275a06c91831e97bbe66b4180c64a6f1538ed471e787ac3228f7b615bf2375896e60db1b5c6ba6a9abda629edf2135796872
7
+ data.tar.gz: cb233e99c4670380d2872f76c38010abd382cd52efa4992ec6b3e1a7823586b653e9633fb5038d6fd3edbd3bc62be5f6eb6b11a4b3eda58ffd74341dc054e3f4
data/CHANGELOG.md CHANGED
@@ -1,5 +1,21 @@
1
1
  # Release history for google-apis-policysimulator_v1beta1
2
2
 
3
+ ### v0.10.0 (2021-10-14)
4
+
5
+ * Regenerated from discovery document revision 20211008
6
+
7
+ ### v0.9.0 (2021-10-06)
8
+
9
+ * Regenerated from discovery document revision 20211002
10
+
11
+ ### v0.8.0 (2021-09-01)
12
+
13
+ * Regenerated from discovery document revision 20210813
14
+
15
+ ### v0.7.0 (2021-06-29)
16
+
17
+ * Regenerated using generator version 0.4.0
18
+
3
19
  ### v0.6.0 (2021-06-24)
4
20
 
5
21
  * Regenerated using generator version 0.3.0
@@ -215,7 +215,7 @@ module Google
215
215
  end
216
216
  end
217
217
 
218
- # Information about the member, resource, and permission to check.
218
+ # Information about the principal, resource, and permission to check.
219
219
  class GoogleCloudPolicysimulatorV1beta1AccessTuple
220
220
  include Google::Apis::Core::Hashable
221
221
 
@@ -227,7 +227,7 @@ module Google
227
227
  # @return [String]
228
228
  attr_accessor :full_resource_name
229
229
 
230
- # Required. The IAM permission to check for the specified member and resource.
230
+ # Required. The IAM permission to check for the specified principal and resource.
231
231
  # For a complete list of IAM permissions, see https://cloud.google.com/iam/help/
232
232
  # permissions/reference. For a complete list of predefined IAM roles and the
233
233
  # permissions in each role, see https://cloud.google.com/iam/help/roles/
@@ -236,11 +236,11 @@ module Google
236
236
  # @return [String]
237
237
  attr_accessor :permission
238
238
 
239
- # Required. The member, or principal, whose access you want to check, in the
240
- # form of the email address that represents that member. For example, `alice@
241
- # example.com` or `my-service-account@my-project.iam.gserviceaccount.com`. The
242
- # member must be a Google Account or a service account. Other types of members
243
- # are not supported.
239
+ # Required. The principal whose access you want to check, in the form of the
240
+ # email address that represents that principal. For example, `alice@example.com`
241
+ # or `my-service-account@my-project.iam.gserviceaccount.com`. The principal must
242
+ # be a Google Account or a service account. Other types of principals are not
243
+ # supported.
244
244
  # Corresponds to the JSON property `principal`
245
245
  # @return [String]
246
246
  attr_accessor :principal
@@ -257,17 +257,17 @@ module Google
257
257
  end
258
258
  end
259
259
 
260
- # Details about how a binding in a policy affects a member's ability to use a
260
+ # Details about how a binding in a policy affects a principal's ability to use a
261
261
  # permission.
262
262
  class GoogleCloudPolicysimulatorV1beta1BindingExplanation
263
263
  include Google::Apis::Core::Hashable
264
264
 
265
265
  # Required. Indicates whether _this binding_ provides the specified permission
266
- # to the specified member for the specified resource. This field does _not_
267
- # indicate whether the member actually has the permission for the resource.
266
+ # to the specified principal for the specified resource. This field does _not_
267
+ # indicate whether the principal actually has the permission for the resource.
268
268
  # There might be another binding that overrides this binding. To determine
269
- # whether the member actually has the permission, use the `access` field in the
270
- # TroubleshootIamPolicyResponse.
269
+ # whether the principal actually has the permission, use the `access` field in
270
+ # the TroubleshootIamPolicyResponse.
271
271
  # Corresponds to the JSON property `access`
272
272
  # @return [String]
273
273
  attr_accessor :access
@@ -291,17 +291,18 @@ module Google
291
291
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleTypeExpr]
292
292
  attr_accessor :condition
293
293
 
294
- # Indicates whether each member in the binding includes the member specified in
295
- # the request, either directly or indirectly. Each key identifies a member in
296
- # the binding, and each value indicates whether the member in the binding
297
- # includes the member in the request. For example, suppose that a binding
298
- # includes the following members: * `user:alice@example.com` * `group:product-
299
- # eng@example.com` The member in the replayed access tuple is `user:bob@example.
300
- # com`. This user is a member of the group `group:product-eng@example.com`. For
301
- # the first member in the binding, the key is `user:alice@example.com`, and the `
302
- # membership` field in the value is set to `MEMBERSHIP_NOT_INCLUDED`. For the
303
- # second member in the binding, the key is `group:product-eng@example.com`, and
304
- # the `membership` field in the value is set to `MEMBERSHIP_INCLUDED`.
294
+ # Indicates whether each principal in the binding includes the principal
295
+ # specified in the request, either directly or indirectly. Each key identifies a
296
+ # principal in the binding, and each value indicates whether the principal in
297
+ # the binding includes the principal in the request. For example, suppose that a
298
+ # binding includes the following principals: * `user:alice@example.com` * `group:
299
+ # product-eng@example.com` The principal in the replayed access tuple is `user:
300
+ # bob@example.com`. This user is a principal of the group `group:product-eng@
301
+ # example.com`. For the first principal in the binding, the key is `user:alice@
302
+ # example.com`, and the `membership` field in the value is set to `
303
+ # MEMBERSHIP_NOT_INCLUDED`. For the second principal in the binding, the key is `
304
+ # group:product-eng@example.com`, and the `membership` field in the value is set
305
+ # to `MEMBERSHIP_INCLUDED`.
305
306
  # Corresponds to the JSON property `memberships`
306
307
  # @return [Hash<String,Google::Apis::PolicysimulatorV1beta1::GoogleCloudPolicysimulatorV1beta1BindingExplanationAnnotatedMembership>]
307
308
  attr_accessor :memberships
@@ -347,16 +348,16 @@ module Google
347
348
  end
348
349
  end
349
350
 
350
- # Details about whether the binding includes the member.
351
+ # Details about whether the binding includes the principal.
351
352
  class GoogleCloudPolicysimulatorV1beta1BindingExplanationAnnotatedMembership
352
353
  include Google::Apis::Core::Hashable
353
354
 
354
- # Indicates whether the binding includes the member.
355
+ # Indicates whether the binding includes the principal.
355
356
  # Corresponds to the JSON property `membership`
356
357
  # @return [String]
357
358
  attr_accessor :membership
358
359
 
359
- # The relevance of the member's status to the overall determination for the
360
+ # The relevance of the principal's status to the overall determination for the
360
361
  # binding.
361
362
  # Corresponds to the JSON property `relevance`
362
363
  # @return [String]
@@ -415,18 +416,18 @@ module Google
415
416
  include Google::Apis::Core::Hashable
416
417
 
417
418
  # Indicates whether _this policy_ provides the specified permission to the
418
- # specified member for the specified resource. This field does _not_ indicate
419
- # whether the member actually has the permission for the resource. There might
420
- # be another policy that overrides this policy. To determine whether the member
421
- # actually has the permission, use the `access` field in the
419
+ # specified principal for the specified resource. This field does _not_ indicate
420
+ # whether the principal actually has the permission for the resource. There
421
+ # might be another policy that overrides this policy. To determine whether the
422
+ # principal actually has the permission, use the `access` field in the
422
423
  # TroubleshootIamPolicyResponse.
423
424
  # Corresponds to the JSON property `access`
424
425
  # @return [String]
425
426
  attr_accessor :access
426
427
 
427
- # Details about how each binding in the policy affects the member's ability, or
428
- # inability, to use the permission for the resource. If the user who created the
429
- # Replay does not have access to the policy, this field is omitted.
428
+ # Details about how each binding in the policy affects the principal's ability,
429
+ # or inability, to use the permission for the resource. If the user who created
430
+ # the Replay does not have access to the policy, this field is omitted.
430
431
  # Corresponds to the JSON property `bindingExplanations`
431
432
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleCloudPolicysimulatorV1beta1BindingExplanation>]
432
433
  attr_accessor :binding_explanations
@@ -443,31 +444,31 @@ module Google
443
444
 
444
445
  # An Identity and Access Management (IAM) policy, which specifies access
445
446
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
446
- # A `binding` binds one or more `members` to a single `role`. Members can be
447
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
448
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
449
- # role or a user-created custom role. For some types of Google Cloud resources,
450
- # a `binding` can also specify a `condition`, which is a logical expression that
451
- # allows access to a resource only if the expression evaluates to `true`. A
452
- # condition can add constraints based on attributes of the request, the resource,
453
- # or both. To learn which resources support conditions in their IAM policies,
454
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
455
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
456
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
457
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
458
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
459
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
460
- # title": "expirable access", "description": "Does not grant access after Sep
461
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
462
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
463
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
464
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
465
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
466
- # roles/resourcemanager.organizationViewer condition: title: expirable access
467
- # description: Does not grant access after Sep 2020 expression: request.time <
468
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
469
- # description of IAM and its features, see the [IAM documentation](https://cloud.
470
- # google.com/iam/docs/).
447
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
448
+ # Principals can be user accounts, service accounts, Google groups, and domains (
449
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
450
+ # an IAM predefined role or a user-created custom role. For some types of Google
451
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
452
+ # logical expression that allows access to a resource only if the expression
453
+ # evaluates to `true`. A condition can add constraints based on attributes of
454
+ # the request, the resource, or both. To learn which resources support
455
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
456
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
457
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
458
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
459
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
460
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
461
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
462
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
463
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
464
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
465
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
466
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
467
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
468
+ # access description: Does not grant access after Sep 2020 expression: request.
469
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
470
+ # a description of IAM and its features, see the [IAM documentation](https://
471
+ # cloud.google.com/iam/docs/).
471
472
  # Corresponds to the JSON property `policy`
472
473
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Policy]
473
474
  attr_accessor :policy
@@ -639,7 +640,7 @@ module Google
639
640
  class GoogleCloudPolicysimulatorV1beta1ReplayResult
640
641
  include Google::Apis::Core::Hashable
641
642
 
642
- # Information about the member, resource, and permission to check.
643
+ # Information about the principal, resource, and permission to check.
643
644
  # Corresponds to the JSON property `accessTuple`
644
645
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleCloudPolicysimulatorV1beta1AccessTuple]
645
646
  attr_accessor :access_tuple
@@ -840,7 +841,7 @@ module Google
840
841
  end
841
842
  end
842
843
 
843
- # Associates `members` with a `role`.
844
+ # Associates `members`, or principals, with a `role`.
844
845
  class GoogleIamV1Binding
845
846
  include Google::Apis::Core::Hashable
846
847
 
@@ -863,7 +864,7 @@ module Google
863
864
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleTypeExpr]
864
865
  attr_accessor :condition
865
866
 
866
- # Specifies the identities requesting access for a Cloud Platform resource. `
867
+ # Specifies the principals requesting access for a Cloud Platform resource. `
867
868
  # members` can have the following values: * `allUsers`: A special identifier
868
869
  # that represents anyone who is on the internet; with or without a Google
869
870
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -893,8 +894,8 @@ module Google
893
894
  # @return [Array<String>]
894
895
  attr_accessor :members
895
896
 
896
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
897
- # , or `roles/owner`.
897
+ # Role that is assigned to the list of `members`, or principals. For example, `
898
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
898
899
  # Corresponds to the JSON property `role`
899
900
  # @return [String]
900
901
  attr_accessor :role
@@ -913,31 +914,31 @@ module Google
913
914
 
914
915
  # An Identity and Access Management (IAM) policy, which specifies access
915
916
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
916
- # A `binding` binds one or more `members` to a single `role`. Members can be
917
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
918
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
919
- # role or a user-created custom role. For some types of Google Cloud resources,
920
- # a `binding` can also specify a `condition`, which is a logical expression that
921
- # allows access to a resource only if the expression evaluates to `true`. A
922
- # condition can add constraints based on attributes of the request, the resource,
923
- # or both. To learn which resources support conditions in their IAM policies,
924
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
925
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
926
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
927
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
928
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
929
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
930
- # title": "expirable access", "description": "Does not grant access after Sep
931
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
932
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
933
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
934
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
935
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
936
- # roles/resourcemanager.organizationViewer condition: title: expirable access
937
- # description: Does not grant access after Sep 2020 expression: request.time <
938
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
939
- # description of IAM and its features, see the [IAM documentation](https://cloud.
940
- # google.com/iam/docs/).
917
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
918
+ # Principals can be user accounts, service accounts, Google groups, and domains (
919
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
920
+ # an IAM predefined role or a user-created custom role. For some types of Google
921
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
922
+ # logical expression that allows access to a resource only if the expression
923
+ # evaluates to `true`. A condition can add constraints based on attributes of
924
+ # the request, the resource, or both. To learn which resources support
925
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
926
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
927
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
928
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
929
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
930
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
931
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
932
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
933
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
934
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
935
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
936
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
937
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
938
+ # access description: Does not grant access after Sep 2020 expression: request.
939
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
940
+ # a description of IAM and its features, see the [IAM documentation](https://
941
+ # cloud.google.com/iam/docs/).
941
942
  class GoogleIamV1Policy
942
943
  include Google::Apis::Core::Hashable
943
944
 
@@ -946,9 +947,14 @@ module Google
946
947
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1AuditConfig>]
947
948
  attr_accessor :audit_configs
948
949
 
949
- # Associates a list of `members` to a `role`. Optionally, may specify a `
950
- # condition` that determines how and when the `bindings` are applied. Each of
951
- # the `bindings` must contain at least one member.
950
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
951
+ # specify a `condition` that determines how and when the `bindings` are applied.
952
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
953
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
954
+ # can be Google groups. Each occurrence of a principal counts towards these
955
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
956
+ # example.com`, and not to any other principal, then you can add another 1,450
957
+ # principals to the `bindings` in the `Policy`.
952
958
  # Corresponds to the JSON property `bindings`
953
959
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Binding>]
954
960
  attr_accessor :bindings
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module PolicysimulatorV1beta1
18
18
  # Version of the google-apis-policysimulator_v1beta1 gem
19
- GEM_VERSION = "0.6.0"
19
+ GEM_VERSION = "0.10.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
- GENERATOR_VERSION = "0.3.0"
22
+ GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210319"
25
+ REVISION = "20211008"
26
26
  end
27
27
  end
28
28
  end
@@ -35,7 +35,7 @@ module Google
35
35
  # This is NOT the gem version.
36
36
  VERSION = 'V1beta1'
37
37
 
38
- # See, edit, configure, and delete your Google Cloud Platform data
38
+ # See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account.
39
39
  AUTH_CLOUD_PLATFORM = 'https://www.googleapis.com/auth/cloud-platform'
40
40
  end
41
41
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-policysimulator_v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.6.0
4
+ version: 0.10.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-06-28 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -16,7 +16,7 @@ dependencies:
16
16
  requirements:
17
17
  - - ">="
18
18
  - !ruby/object:Gem::Version
19
- version: '0.3'
19
+ version: '0.4'
20
20
  - - "<"
21
21
  - !ruby/object:Gem::Version
22
22
  version: 2.a
@@ -26,7 +26,7 @@ dependencies:
26
26
  requirements:
27
27
  - - ">="
28
28
  - !ruby/object:Gem::Version
29
- version: '0.3'
29
+ version: '0.4'
30
30
  - - "<"
31
31
  - !ruby/object:Gem::Version
32
32
  version: 2.a
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.6.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.10.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1
63
63
  post_install_message:
64
64
  rdoc_options: []