google-apis-policysimulator_v1beta1 0.7.0 → 0.11.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 42b614803fed640be6c67bf2310b8ddc63330e521d380f3ca70226591b94611c
4
- data.tar.gz: fb9ba561b67dae197b7bb44fcb0a5087af7e6047c35f6c8d5cf5be7a297f1375
3
+ metadata.gz: '09c7ebf58a4ffef9f7e62bd324e556089441feaf8a07c222c36be5246a0f8817'
4
+ data.tar.gz: d5c544f3a5552e88d06f90e34e5feab430d49f24ce3ef1452d825ee7a57b39d2
5
5
  SHA512:
6
- metadata.gz: 6be3d7bb7dae123a6c50d7c1c9c556812ce5d155ece290e0853b0808596610f87c61963833af80d8516ca26318d09f63fb74b52b749ebbf09f8389736b4d2b69
7
- data.tar.gz: b7a5342f7aa57a1359d99a9a01bf9071368041b4d93d915ba4a94b235dd3e128c87d8ec011aa1f1cac97871b9f20345836c2171fb12d70a2ee8aae7efc0db328
6
+ metadata.gz: a1e8a0e65fc7a04dceefc317e215e8a4bd93621587cc21e968aab6cc410807b7925098ea5e33ea20782811888a4f9fbc279a7c71047f4cf16212194f59ffa660
7
+ data.tar.gz: 881898838e11aef024271144abc7d23b7696ae835904a117a5b9ac1222d8d8a6d491e8ab3c24eaa5acf7b52d86a8d8557309f4e6498fe00edb67a43b4efe563a
data/CHANGELOG.md CHANGED
@@ -1,5 +1,21 @@
1
1
  # Release history for google-apis-policysimulator_v1beta1
2
2
 
3
+ ### v0.11.0 (2021-10-20)
4
+
5
+ * Unspecified changes
6
+
7
+ ### v0.10.0 (2021-10-14)
8
+
9
+ * Regenerated from discovery document revision 20211008
10
+
11
+ ### v0.9.0 (2021-10-06)
12
+
13
+ * Regenerated from discovery document revision 20211002
14
+
15
+ ### v0.8.0 (2021-09-01)
16
+
17
+ * Regenerated from discovery document revision 20210813
18
+
3
19
  ### v0.7.0 (2021-06-29)
4
20
 
5
21
  * Regenerated using generator version 0.4.0
data/OVERVIEW.md CHANGED
@@ -60,8 +60,8 @@ See the class reference docs for information on the methods you can call from a
60
60
 
61
61
  More detailed descriptions of the Google simple REST clients are available in two documents.
62
62
 
63
- * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
- * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
63
+ * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
+ * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
65
65
 
66
66
  (Note: the above documents are written for the simple REST clients in general, and their examples may not reflect the Policysimulator service in particular.)
67
67
 
@@ -215,7 +215,7 @@ module Google
215
215
  end
216
216
  end
217
217
 
218
- # Information about the member, resource, and permission to check.
218
+ # Information about the principal, resource, and permission to check.
219
219
  class GoogleCloudPolicysimulatorV1beta1AccessTuple
220
220
  include Google::Apis::Core::Hashable
221
221
 
@@ -227,7 +227,7 @@ module Google
227
227
  # @return [String]
228
228
  attr_accessor :full_resource_name
229
229
 
230
- # Required. The IAM permission to check for the specified member and resource.
230
+ # Required. The IAM permission to check for the specified principal and resource.
231
231
  # For a complete list of IAM permissions, see https://cloud.google.com/iam/help/
232
232
  # permissions/reference. For a complete list of predefined IAM roles and the
233
233
  # permissions in each role, see https://cloud.google.com/iam/help/roles/
@@ -236,11 +236,11 @@ module Google
236
236
  # @return [String]
237
237
  attr_accessor :permission
238
238
 
239
- # Required. The member, or principal, whose access you want to check, in the
240
- # form of the email address that represents that member. For example, `alice@
241
- # example.com` or `my-service-account@my-project.iam.gserviceaccount.com`. The
242
- # member must be a Google Account or a service account. Other types of members
243
- # are not supported.
239
+ # Required. The principal whose access you want to check, in the form of the
240
+ # email address that represents that principal. For example, `alice@example.com`
241
+ # or `my-service-account@my-project.iam.gserviceaccount.com`. The principal must
242
+ # be a Google Account or a service account. Other types of principals are not
243
+ # supported.
244
244
  # Corresponds to the JSON property `principal`
245
245
  # @return [String]
246
246
  attr_accessor :principal
@@ -257,17 +257,17 @@ module Google
257
257
  end
258
258
  end
259
259
 
260
- # Details about how a binding in a policy affects a member's ability to use a
260
+ # Details about how a binding in a policy affects a principal's ability to use a
261
261
  # permission.
262
262
  class GoogleCloudPolicysimulatorV1beta1BindingExplanation
263
263
  include Google::Apis::Core::Hashable
264
264
 
265
265
  # Required. Indicates whether _this binding_ provides the specified permission
266
- # to the specified member for the specified resource. This field does _not_
267
- # indicate whether the member actually has the permission for the resource.
266
+ # to the specified principal for the specified resource. This field does _not_
267
+ # indicate whether the principal actually has the permission for the resource.
268
268
  # There might be another binding that overrides this binding. To determine
269
- # whether the member actually has the permission, use the `access` field in the
270
- # TroubleshootIamPolicyResponse.
269
+ # whether the principal actually has the permission, use the `access` field in
270
+ # the TroubleshootIamPolicyResponse.
271
271
  # Corresponds to the JSON property `access`
272
272
  # @return [String]
273
273
  attr_accessor :access
@@ -291,17 +291,18 @@ module Google
291
291
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleTypeExpr]
292
292
  attr_accessor :condition
293
293
 
294
- # Indicates whether each member in the binding includes the member specified in
295
- # the request, either directly or indirectly. Each key identifies a member in
296
- # the binding, and each value indicates whether the member in the binding
297
- # includes the member in the request. For example, suppose that a binding
298
- # includes the following members: * `user:alice@example.com` * `group:product-
299
- # eng@example.com` The member in the replayed access tuple is `user:bob@example.
300
- # com`. This user is a member of the group `group:product-eng@example.com`. For
301
- # the first member in the binding, the key is `user:alice@example.com`, and the `
302
- # membership` field in the value is set to `MEMBERSHIP_NOT_INCLUDED`. For the
303
- # second member in the binding, the key is `group:product-eng@example.com`, and
304
- # the `membership` field in the value is set to `MEMBERSHIP_INCLUDED`.
294
+ # Indicates whether each principal in the binding includes the principal
295
+ # specified in the request, either directly or indirectly. Each key identifies a
296
+ # principal in the binding, and each value indicates whether the principal in
297
+ # the binding includes the principal in the request. For example, suppose that a
298
+ # binding includes the following principals: * `user:alice@example.com` * `group:
299
+ # product-eng@example.com` The principal in the replayed access tuple is `user:
300
+ # bob@example.com`. This user is a principal of the group `group:product-eng@
301
+ # example.com`. For the first principal in the binding, the key is `user:alice@
302
+ # example.com`, and the `membership` field in the value is set to `
303
+ # MEMBERSHIP_NOT_INCLUDED`. For the second principal in the binding, the key is `
304
+ # group:product-eng@example.com`, and the `membership` field in the value is set
305
+ # to `MEMBERSHIP_INCLUDED`.
305
306
  # Corresponds to the JSON property `memberships`
306
307
  # @return [Hash<String,Google::Apis::PolicysimulatorV1beta1::GoogleCloudPolicysimulatorV1beta1BindingExplanationAnnotatedMembership>]
307
308
  attr_accessor :memberships
@@ -347,16 +348,16 @@ module Google
347
348
  end
348
349
  end
349
350
 
350
- # Details about whether the binding includes the member.
351
+ # Details about whether the binding includes the principal.
351
352
  class GoogleCloudPolicysimulatorV1beta1BindingExplanationAnnotatedMembership
352
353
  include Google::Apis::Core::Hashable
353
354
 
354
- # Indicates whether the binding includes the member.
355
+ # Indicates whether the binding includes the principal.
355
356
  # Corresponds to the JSON property `membership`
356
357
  # @return [String]
357
358
  attr_accessor :membership
358
359
 
359
- # The relevance of the member's status to the overall determination for the
360
+ # The relevance of the principal's status to the overall determination for the
360
361
  # binding.
361
362
  # Corresponds to the JSON property `relevance`
362
363
  # @return [String]
@@ -415,18 +416,18 @@ module Google
415
416
  include Google::Apis::Core::Hashable
416
417
 
417
418
  # Indicates whether _this policy_ provides the specified permission to the
418
- # specified member for the specified resource. This field does _not_ indicate
419
- # whether the member actually has the permission for the resource. There might
420
- # be another policy that overrides this policy. To determine whether the member
421
- # actually has the permission, use the `access` field in the
419
+ # specified principal for the specified resource. This field does _not_ indicate
420
+ # whether the principal actually has the permission for the resource. There
421
+ # might be another policy that overrides this policy. To determine whether the
422
+ # principal actually has the permission, use the `access` field in the
422
423
  # TroubleshootIamPolicyResponse.
423
424
  # Corresponds to the JSON property `access`
424
425
  # @return [String]
425
426
  attr_accessor :access
426
427
 
427
- # Details about how each binding in the policy affects the member's ability, or
428
- # inability, to use the permission for the resource. If the user who created the
429
- # Replay does not have access to the policy, this field is omitted.
428
+ # Details about how each binding in the policy affects the principal's ability,
429
+ # or inability, to use the permission for the resource. If the user who created
430
+ # the Replay does not have access to the policy, this field is omitted.
430
431
  # Corresponds to the JSON property `bindingExplanations`
431
432
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleCloudPolicysimulatorV1beta1BindingExplanation>]
432
433
  attr_accessor :binding_explanations
@@ -443,31 +444,31 @@ module Google
443
444
 
444
445
  # An Identity and Access Management (IAM) policy, which specifies access
445
446
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
446
- # A `binding` binds one or more `members` to a single `role`. Members can be
447
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
448
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
449
- # role or a user-created custom role. For some types of Google Cloud resources,
450
- # a `binding` can also specify a `condition`, which is a logical expression that
451
- # allows access to a resource only if the expression evaluates to `true`. A
452
- # condition can add constraints based on attributes of the request, the resource,
453
- # or both. To learn which resources support conditions in their IAM policies,
454
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
455
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
456
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
457
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
458
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
459
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
460
- # title": "expirable access", "description": "Does not grant access after Sep
461
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
462
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
463
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
464
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
465
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
466
- # roles/resourcemanager.organizationViewer condition: title: expirable access
467
- # description: Does not grant access after Sep 2020 expression: request.time <
468
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
469
- # description of IAM and its features, see the [IAM documentation](https://cloud.
470
- # google.com/iam/docs/).
447
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
448
+ # Principals can be user accounts, service accounts, Google groups, and domains (
449
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
450
+ # an IAM predefined role or a user-created custom role. For some types of Google
451
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
452
+ # logical expression that allows access to a resource only if the expression
453
+ # evaluates to `true`. A condition can add constraints based on attributes of
454
+ # the request, the resource, or both. To learn which resources support
455
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
456
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
457
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
458
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
459
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
460
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
461
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
462
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
463
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
464
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
465
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
466
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
467
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
468
+ # access description: Does not grant access after Sep 2020 expression: request.
469
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
470
+ # a description of IAM and its features, see the [IAM documentation](https://
471
+ # cloud.google.com/iam/docs/).
471
472
  # Corresponds to the JSON property `policy`
472
473
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Policy]
473
474
  attr_accessor :policy
@@ -639,7 +640,7 @@ module Google
639
640
  class GoogleCloudPolicysimulatorV1beta1ReplayResult
640
641
  include Google::Apis::Core::Hashable
641
642
 
642
- # Information about the member, resource, and permission to check.
643
+ # Information about the principal, resource, and permission to check.
643
644
  # Corresponds to the JSON property `accessTuple`
644
645
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleCloudPolicysimulatorV1beta1AccessTuple]
645
646
  attr_accessor :access_tuple
@@ -840,7 +841,7 @@ module Google
840
841
  end
841
842
  end
842
843
 
843
- # Associates `members` with a `role`.
844
+ # Associates `members`, or principals, with a `role`.
844
845
  class GoogleIamV1Binding
845
846
  include Google::Apis::Core::Hashable
846
847
 
@@ -863,7 +864,7 @@ module Google
863
864
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleTypeExpr]
864
865
  attr_accessor :condition
865
866
 
866
- # Specifies the identities requesting access for a Cloud Platform resource. `
867
+ # Specifies the principals requesting access for a Cloud Platform resource. `
867
868
  # members` can have the following values: * `allUsers`: A special identifier
868
869
  # that represents anyone who is on the internet; with or without a Google
869
870
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -893,8 +894,8 @@ module Google
893
894
  # @return [Array<String>]
894
895
  attr_accessor :members
895
896
 
896
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
897
- # , or `roles/owner`.
897
+ # Role that is assigned to the list of `members`, or principals. For example, `
898
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
898
899
  # Corresponds to the JSON property `role`
899
900
  # @return [String]
900
901
  attr_accessor :role
@@ -913,31 +914,31 @@ module Google
913
914
 
914
915
  # An Identity and Access Management (IAM) policy, which specifies access
915
916
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
916
- # A `binding` binds one or more `members` to a single `role`. Members can be
917
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
918
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
919
- # role or a user-created custom role. For some types of Google Cloud resources,
920
- # a `binding` can also specify a `condition`, which is a logical expression that
921
- # allows access to a resource only if the expression evaluates to `true`. A
922
- # condition can add constraints based on attributes of the request, the resource,
923
- # or both. To learn which resources support conditions in their IAM policies,
924
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
925
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
926
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
927
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
928
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
929
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
930
- # title": "expirable access", "description": "Does not grant access after Sep
931
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
932
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
933
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
934
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
935
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
936
- # roles/resourcemanager.organizationViewer condition: title: expirable access
937
- # description: Does not grant access after Sep 2020 expression: request.time <
938
- # timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
939
- # description of IAM and its features, see the [IAM documentation](https://cloud.
940
- # google.com/iam/docs/).
917
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
918
+ # Principals can be user accounts, service accounts, Google groups, and domains (
919
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
920
+ # an IAM predefined role or a user-created custom role. For some types of Google
921
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
922
+ # logical expression that allows access to a resource only if the expression
923
+ # evaluates to `true`. A condition can add constraints based on attributes of
924
+ # the request, the resource, or both. To learn which resources support
925
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
926
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
927
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
928
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
929
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
930
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
931
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
932
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
933
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
934
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
935
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
936
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
937
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
938
+ # access description: Does not grant access after Sep 2020 expression: request.
939
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
940
+ # a description of IAM and its features, see the [IAM documentation](https://
941
+ # cloud.google.com/iam/docs/).
941
942
  class GoogleIamV1Policy
942
943
  include Google::Apis::Core::Hashable
943
944
 
@@ -946,9 +947,14 @@ module Google
946
947
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1AuditConfig>]
947
948
  attr_accessor :audit_configs
948
949
 
949
- # Associates a list of `members` to a `role`. Optionally, may specify a `
950
- # condition` that determines how and when the `bindings` are applied. Each of
951
- # the `bindings` must contain at least one member.
950
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
951
+ # specify a `condition` that determines how and when the `bindings` are applied.
952
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
953
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
954
+ # can be Google groups. Each occurrence of a principal counts towards these
955
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
956
+ # example.com`, and not to any other principal, then you can add another 1,450
957
+ # principals to the `bindings` in the `Policy`.
952
958
  # Corresponds to the JSON property `bindings`
953
959
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Binding>]
954
960
  attr_accessor :bindings
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module PolicysimulatorV1beta1
18
18
  # Version of the google-apis-policysimulator_v1beta1 gem
19
- GEM_VERSION = "0.7.0"
19
+ GEM_VERSION = "0.11.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210319"
25
+ REVISION = "20211008"
26
26
  end
27
27
  end
28
28
  end
@@ -35,7 +35,7 @@ module Google
35
35
  # This is NOT the gem version.
36
36
  VERSION = 'V1beta1'
37
37
 
38
- # See, edit, configure, and delete your Google Cloud Platform data
38
+ # See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account.
39
39
  AUTH_CLOUD_PLATFORM = 'https://www.googleapis.com/auth/cloud-platform'
40
40
  end
41
41
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-policysimulator_v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.7.0
4
+ version: 0.11.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-07-05 00:00:00.000000000 Z
11
+ date: 2021-10-27 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -57,9 +57,9 @@ licenses:
57
57
  - Apache-2.0
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
- changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.7.0
62
- source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1
60
+ changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-policysimulator_v1beta1/CHANGELOG.md
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.11.0
62
+ source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-policysimulator_v1beta1
63
63
  post_install_message:
64
64
  rdoc_options: []
65
65
  require_paths: