google-apis-policysimulator_v1beta1 0.9.0 → 0.10.0
Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 51ff6a68a7cf7e149b000e3b7cd2e4d97de12bb8e4c47a5692f4d0c6de2741e5
|
4
|
+
data.tar.gz: a34a2e6b893c75709d59808d18dd61e29b0c8fcf490e7ed117275529dfab4ca3
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8b2fb70475a68f2b6ee26cd29cea275a06c91831e97bbe66b4180c64a6f1538ed471e787ac3228f7b615bf2375896e60db1b5c6ba6a9abda629edf2135796872
|
7
|
+
data.tar.gz: cb233e99c4670380d2872f76c38010abd382cd52efa4992ec6b3e1a7823586b653e9633fb5038d6fd3edbd3bc62be5f6eb6b11a4b3eda58ffd74341dc054e3f4
|
data/CHANGELOG.md
CHANGED
@@ -444,31 +444,31 @@ module Google
|
|
444
444
|
|
445
445
|
# An Identity and Access Management (IAM) policy, which specifies access
|
446
446
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
447
|
-
# A `binding` binds one or more `members
|
448
|
-
# user accounts, service accounts, Google groups, and domains (
|
449
|
-
# A `role` is a named list of permissions; each `role` can be
|
450
|
-
# role or a user-created custom role. For some types of Google
|
451
|
-
# a `binding` can also specify a `condition`, which is a
|
452
|
-
# allows access to a resource only if the expression
|
453
|
-
# condition can add constraints based on attributes of
|
454
|
-
# or both. To learn which resources support
|
455
|
-
# see the [IAM documentation](https://cloud.
|
456
|
-
# resource-policies). **JSON example:** ` "
|
457
|
-
# resourcemanager.organizationAdmin", "members": [
|
458
|
-
# group:admins@example.com", "domain:google.com", "
|
459
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
460
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
461
|
-
# title": "expirable access", "description": "Does not grant
|
462
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
463
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
464
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
465
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
466
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
467
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
468
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
469
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
470
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
471
|
-
# google.com/iam/docs/).
|
447
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
448
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
449
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
450
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
451
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
452
|
+
# logical expression that allows access to a resource only if the expression
|
453
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
454
|
+
# the request, the resource, or both. To learn which resources support
|
455
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
456
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
457
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
458
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
459
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
460
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
461
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
462
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
463
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
464
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
465
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
466
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
467
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
468
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
469
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
470
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
471
|
+
# cloud.google.com/iam/docs/).
|
472
472
|
# Corresponds to the JSON property `policy`
|
473
473
|
# @return [Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Policy]
|
474
474
|
attr_accessor :policy
|
@@ -841,7 +841,7 @@ module Google
|
|
841
841
|
end
|
842
842
|
end
|
843
843
|
|
844
|
-
# Associates `members
|
844
|
+
# Associates `members`, or principals, with a `role`.
|
845
845
|
class GoogleIamV1Binding
|
846
846
|
include Google::Apis::Core::Hashable
|
847
847
|
|
@@ -864,7 +864,7 @@ module Google
|
|
864
864
|
# @return [Google::Apis::PolicysimulatorV1beta1::GoogleTypeExpr]
|
865
865
|
attr_accessor :condition
|
866
866
|
|
867
|
-
# Specifies the
|
867
|
+
# Specifies the principals requesting access for a Cloud Platform resource. `
|
868
868
|
# members` can have the following values: * `allUsers`: A special identifier
|
869
869
|
# that represents anyone who is on the internet; with or without a Google
|
870
870
|
# account. * `allAuthenticatedUsers`: A special identifier that represents
|
@@ -894,8 +894,8 @@ module Google
|
|
894
894
|
# @return [Array<String>]
|
895
895
|
attr_accessor :members
|
896
896
|
|
897
|
-
# Role that is assigned to `members
|
898
|
-
#
|
897
|
+
# Role that is assigned to the list of `members`, or principals. For example, `
|
898
|
+
# roles/viewer`, `roles/editor`, or `roles/owner`.
|
899
899
|
# Corresponds to the JSON property `role`
|
900
900
|
# @return [String]
|
901
901
|
attr_accessor :role
|
@@ -914,31 +914,31 @@ module Google
|
|
914
914
|
|
915
915
|
# An Identity and Access Management (IAM) policy, which specifies access
|
916
916
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
917
|
-
# A `binding` binds one or more `members
|
918
|
-
# user accounts, service accounts, Google groups, and domains (
|
919
|
-
# A `role` is a named list of permissions; each `role` can be
|
920
|
-
# role or a user-created custom role. For some types of Google
|
921
|
-
# a `binding` can also specify a `condition`, which is a
|
922
|
-
# allows access to a resource only if the expression
|
923
|
-
# condition can add constraints based on attributes of
|
924
|
-
# or both. To learn which resources support
|
925
|
-
# see the [IAM documentation](https://cloud.
|
926
|
-
# resource-policies). **JSON example:** ` "
|
927
|
-
# resourcemanager.organizationAdmin", "members": [
|
928
|
-
# group:admins@example.com", "domain:google.com", "
|
929
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
930
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
931
|
-
# title": "expirable access", "description": "Does not grant
|
932
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
933
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
934
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
935
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
936
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
937
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
938
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
939
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
940
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
941
|
-
# google.com/iam/docs/).
|
917
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
918
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
919
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
920
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
921
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
922
|
+
# logical expression that allows access to a resource only if the expression
|
923
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
924
|
+
# the request, the resource, or both. To learn which resources support
|
925
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
926
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
927
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
928
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
929
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
930
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
931
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
932
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
933
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
934
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
935
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
936
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
937
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
938
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
939
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
940
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
941
|
+
# cloud.google.com/iam/docs/).
|
942
942
|
class GoogleIamV1Policy
|
943
943
|
include Google::Apis::Core::Hashable
|
944
944
|
|
@@ -947,14 +947,14 @@ module Google
|
|
947
947
|
# @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1AuditConfig>]
|
948
948
|
attr_accessor :audit_configs
|
949
949
|
|
950
|
-
# Associates a list of `members
|
951
|
-
# condition` that determines how and when the `bindings` are applied.
|
952
|
-
# the `bindings` must contain at least one
|
953
|
-
# can refer to up to 1,500
|
954
|
-
# groups. Each occurrence of a
|
955
|
-
# if the `bindings` grant 50 different roles to `user:alice@
|
956
|
-
# not to any other
|
957
|
-
# bindings` in the `Policy`.
|
950
|
+
# Associates a list of `members`, or principals, with a `role`. Optionally, may
|
951
|
+
# specify a `condition` that determines how and when the `bindings` are applied.
|
952
|
+
# Each of the `bindings` must contain at least one principal. The `bindings` in
|
953
|
+
# a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
|
954
|
+
# can be Google groups. Each occurrence of a principal counts towards these
|
955
|
+
# limits. For example, if the `bindings` grant 50 different roles to `user:alice@
|
956
|
+
# example.com`, and not to any other principal, then you can add another 1,450
|
957
|
+
# principals to the `bindings` in the `Policy`.
|
958
958
|
# Corresponds to the JSON property `bindings`
|
959
959
|
# @return [Array<Google::Apis::PolicysimulatorV1beta1::GoogleIamV1Binding>]
|
960
960
|
attr_accessor :bindings
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module PolicysimulatorV1beta1
|
18
18
|
# Version of the google-apis-policysimulator_v1beta1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.10.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
22
|
GENERATOR_VERSION = "0.4.0"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20211008"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-policysimulator_v1beta1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.10.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-10-
|
11
|
+
date: 2021-10-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-policysimulator_v1beta1/v0.10.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-policysimulator_v1beta1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|