google-apis-policysimulator_v1beta1 0.9.0 → 0.10.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1961eb98afe829054350d7e03f186ca7cd774417c4a009894fc5b9b2274f647d
4
- data.tar.gz: 8e95d58e74f85224890d7a63be2669a087edb2ae1dc2a79545d2cb127162fa5c
3
+ metadata.gz: 51ff6a68a7cf7e149b000e3b7cd2e4d97de12bb8e4c47a5692f4d0c6de2741e5
4
+ data.tar.gz: a34a2e6b893c75709d59808d18dd61e29b0c8fcf490e7ed117275529dfab4ca3
5
5
  SHA512:
6
- metadata.gz: 32e9c84dadfbf2135a64ed05a2b055b9ce0de6a472d585d3f5aca92da0dd6d7329a4b575db8287dd713f031e2ea03d4411c26b6d63681d0d7e832781375d1293
7
- data.tar.gz: 7d39994a8e4fc323cfddb512feea1ec21f333a4d015a024319dbd43b53a9487dc3e7072545591fb5faa037308751b63431b71072d197b0bee74ecd2145136af7
6
+ metadata.gz: 8b2fb70475a68f2b6ee26cd29cea275a06c91831e97bbe66b4180c64a6f1538ed471e787ac3228f7b615bf2375896e60db1b5c6ba6a9abda629edf2135796872
7
+ data.tar.gz: cb233e99c4670380d2872f76c38010abd382cd52efa4992ec6b3e1a7823586b653e9633fb5038d6fd3edbd3bc62be5f6eb6b11a4b3eda58ffd74341dc054e3f4
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-policysimulator_v1beta1
2
2
 
3
+ ### v0.10.0 (2021-10-14)
4
+
5
+ * Regenerated from discovery document revision 20211008
6
+
3
7
  ### v0.9.0 (2021-10-06)
4
8
 
5
9
  * Regenerated from discovery document revision 20211002
@@ -444,31 +444,31 @@ module Google
444
444
 
445
445
  # An Identity and Access Management (IAM) policy, which specifies access
446
446
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
447
- # A `binding` binds one or more `members` to a single `role`. Members can be
448
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
449
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
450
- # role or a user-created custom role. For some types of Google Cloud resources,
451
- # a `binding` can also specify a `condition`, which is a logical expression that
452
- # allows access to a resource only if the expression evaluates to `true`. A
453
- # condition can add constraints based on attributes of the request, the resource,
454
- # or both. To learn which resources support conditions in their IAM policies,
455
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
456
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
457
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
458
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
459
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
460
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
461
- # title": "expirable access", "description": "Does not grant access after Sep
462
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
463
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
464
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
465
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
466
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
467
- # roles/resourcemanager.organizationViewer condition: title: expirable access
468
- # description: Does not grant access after Sep 2020 expression: request.time <
469
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
470
- # description of IAM and its features, see the [IAM documentation](https://cloud.
471
- # google.com/iam/docs/).
447
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
448
+ # Principals can be user accounts, service accounts, Google groups, and domains (
449
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
450
+ # an IAM predefined role or a user-created custom role. For some types of Google
451
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
452
+ # logical expression that allows access to a resource only if the expression
453
+ # evaluates to `true`. A condition can add constraints based on attributes of
454
+ # the request, the resource, or both. To learn which resources support
455
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
456
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
457
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
458
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
459
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
460
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
461
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
462
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
463
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
464
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
465
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
466
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
467
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
468
+ # access description: Does not grant access after Sep 2020 expression: request.
469
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
470
+ # a description of IAM and its features, see the [IAM documentation](https://
471
+ # cloud.google.com/iam/docs/).
472
472
  # Corresponds to the JSON property `policy`
473
473
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Policy]
474
474
  attr_accessor :policy
@@ -841,7 +841,7 @@ module Google
841
841
  end
842
842
  end
843
843
 
844
- # Associates `members` with a `role`.
844
+ # Associates `members`, or principals, with a `role`.
845
845
  class GoogleIamV1Binding
846
846
  include Google::Apis::Core::Hashable
847
847
 
@@ -864,7 +864,7 @@ module Google
864
864
  # @return [Google::Apis::PolicysimulatorV1beta1::GoogleTypeExpr]
865
865
  attr_accessor :condition
866
866
 
867
- # Specifies the identities requesting access for a Cloud Platform resource. `
867
+ # Specifies the principals requesting access for a Cloud Platform resource. `
868
868
  # members` can have the following values: * `allUsers`: A special identifier
869
869
  # that represents anyone who is on the internet; with or without a Google
870
870
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -894,8 +894,8 @@ module Google
894
894
  # @return [Array<String>]
895
895
  attr_accessor :members
896
896
 
897
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
898
- # , or `roles/owner`.
897
+ # Role that is assigned to the list of `members`, or principals. For example, `
898
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
899
899
  # Corresponds to the JSON property `role`
900
900
  # @return [String]
901
901
  attr_accessor :role
@@ -914,31 +914,31 @@ module Google
914
914
 
915
915
  # An Identity and Access Management (IAM) policy, which specifies access
916
916
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
917
- # A `binding` binds one or more `members` to a single `role`. Members can be
918
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
919
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
920
- # role or a user-created custom role. For some types of Google Cloud resources,
921
- # a `binding` can also specify a `condition`, which is a logical expression that
922
- # allows access to a resource only if the expression evaluates to `true`. A
923
- # condition can add constraints based on attributes of the request, the resource,
924
- # or both. To learn which resources support conditions in their IAM policies,
925
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
926
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
927
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
928
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
929
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
930
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
931
- # title": "expirable access", "description": "Does not grant access after Sep
932
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
933
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
934
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
935
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
936
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
937
- # roles/resourcemanager.organizationViewer condition: title: expirable access
938
- # description: Does not grant access after Sep 2020 expression: request.time <
939
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
940
- # description of IAM and its features, see the [IAM documentation](https://cloud.
941
- # google.com/iam/docs/).
917
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
918
+ # Principals can be user accounts, service accounts, Google groups, and domains (
919
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
920
+ # an IAM predefined role or a user-created custom role. For some types of Google
921
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
922
+ # logical expression that allows access to a resource only if the expression
923
+ # evaluates to `true`. A condition can add constraints based on attributes of
924
+ # the request, the resource, or both. To learn which resources support
925
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
926
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
927
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
928
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
929
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
930
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
931
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
932
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
933
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
934
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
935
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
936
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
937
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
938
+ # access description: Does not grant access after Sep 2020 expression: request.
939
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
940
+ # a description of IAM and its features, see the [IAM documentation](https://
941
+ # cloud.google.com/iam/docs/).
942
942
  class GoogleIamV1Policy
943
943
  include Google::Apis::Core::Hashable
944
944
 
@@ -947,14 +947,14 @@ module Google
947
947
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1AuditConfig>]
948
948
  attr_accessor :audit_configs
949
949
 
950
- # Associates a list of `members` to a `role`. Optionally, may specify a `
951
- # condition` that determines how and when the `bindings` are applied. Each of
952
- # the `bindings` must contain at least one member. The `bindings` in a `Policy`
953
- # can refer to up to 1,500 members; up to 250 of these members can be Google
954
- # groups. Each occurrence of a member counts towards these limits. For example,
955
- # if the `bindings` grant 50 different roles to `user:alice@example.com`, and
956
- # not to any other member, then you can add another 1,450 members to the `
957
- # bindings` in the `Policy`.
950
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
951
+ # specify a `condition` that determines how and when the `bindings` are applied.
952
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
953
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
954
+ # can be Google groups. Each occurrence of a principal counts towards these
955
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
956
+ # example.com`, and not to any other principal, then you can add another 1,450
957
+ # principals to the `bindings` in the `Policy`.
958
958
  # Corresponds to the JSON property `bindings`
959
959
  # @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Binding>]
960
960
  attr_accessor :bindings
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module PolicysimulatorV1beta1
18
18
  # Version of the google-apis-policysimulator_v1beta1 gem
19
- GEM_VERSION = "0.9.0"
19
+ GEM_VERSION = "0.10.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20211002"
25
+ REVISION = "20211008"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-policysimulator_v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.9.0
4
+ version: 0.10.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-11 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.9.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.10.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1
63
63
  post_install_message:
64
64
  rdoc_options: []