google-apis-secretmanager_v1 0.14.0 → 0.18.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6e4f650150025b24ec1e979bb22cab6d29e8d961b24e012c0363b219c3fa3918
4
- data.tar.gz: 976b17b9903af45e73e14d2906a49dc06ce9bdf615eeb5ec3f721fac12194ae2
3
+ metadata.gz: 33291661dc4ffa3fed1819c0b9336e605113e7382e59a591e476730ebf3dd20d
4
+ data.tar.gz: a8da8f75ab3b4e1202846d22841c32b63625f5569538b0e76770cebf16ebb524
5
5
  SHA512:
6
- metadata.gz: db00c1d2ee3109cc09fec6ce97cdcc60a9849f3191b11d0629abab6183af5ee78830b21250d7ff41fa5bbbb4e5fc9b34e4ad9e816aadb88ba5c504dc5609d117
7
- data.tar.gz: 0af295b309e3685042de4d2e93270a439ed593fa8f223956a9ebaacf6e28cb5b6c454a489fb7c472fe740c6bada2cfa4dc1e628a01a287f0b4d4d006f056663c
6
+ metadata.gz: 21bb7b776757785d2570bbcb07a6a02be2cec371ef9e45807b4dfe7e078de4e345e5e09a37176e6d052fc11ed4a08ff8da503a5c4260e7c24dd3330d9303101d
7
+ data.tar.gz: db2729016eb575956fa1b528b0260ede5a695694d58ca396d479835cb172e6a3890992a948c503b07d2bcc275e6fa98e270d491d2fb1521f00b7bee20856f370
data/CHANGELOG.md CHANGED
@@ -1,5 +1,22 @@
1
1
  # Release history for google-apis-secretmanager_v1
2
2
 
3
+ ### v0.18.0 (2021-12-16)
4
+
5
+ * Unspecified changes
6
+
7
+ ### v0.17.0 (2021-11-12)
8
+
9
+ * Regenerated from discovery document revision 20211105
10
+
11
+ ### v0.16.0 (2021-10-22)
12
+
13
+ * Regenerated from discovery document revision 20211015
14
+ * Unspecified changes
15
+
16
+ ### v0.15.0 (2021-10-08)
17
+
18
+ * Regenerated from discovery document revision 20211001
19
+
3
20
  ### v0.14.0 (2021-09-01)
4
21
 
5
22
  * Regenerated from discovery document revision 20210813
data/OVERVIEW.md CHANGED
@@ -51,7 +51,7 @@ require "google/apis/secretmanager_v1"
51
51
  client = Google::Apis::SecretmanagerV1::SecretManagerService.new
52
52
 
53
53
  # Authenticate calls
54
- client.authentication = # ... use the googleauth gem to create credentials
54
+ client.authorization = # ... use the googleauth gem to create credentials
55
55
  ```
56
56
 
57
57
  See the class reference docs for information on the methods you can call from a client.
@@ -60,8 +60,8 @@ See the class reference docs for information on the methods you can call from a
60
60
 
61
61
  More detailed descriptions of the Google simple REST clients are available in two documents.
62
62
 
63
- * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
- * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
63
+ * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
+ * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
65
65
 
66
66
  (Note: the above documents are written for the simple REST clients in general, and their examples may not reflect the Secretmanager service in particular.)
67
67
 
@@ -181,7 +181,7 @@ module Google
181
181
  end
182
182
  end
183
183
 
184
- # Associates `members` with a `role`.
184
+ # Associates `members`, or principals, with a `role`.
185
185
  class Binding
186
186
  include Google::Apis::Core::Hashable
187
187
 
@@ -204,7 +204,7 @@ module Google
204
204
  # @return [Google::Apis::SecretmanagerV1::Expr]
205
205
  attr_accessor :condition
206
206
 
207
- # Specifies the identities requesting access for a Cloud Platform resource. `
207
+ # Specifies the principals requesting access for a Cloud Platform resource. `
208
208
  # members` can have the following values: * `allUsers`: A special identifier
209
209
  # that represents anyone who is on the internet; with or without a Google
210
210
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -234,8 +234,8 @@ module Google
234
234
  # @return [Array<String>]
235
235
  attr_accessor :members
236
236
 
237
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
238
- # , or `roles/owner`.
237
+ # Role that is assigned to the list of `members`, or principals. For example, `
238
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
239
239
  # Corresponds to the JSON property `role`
240
240
  # @return [String]
241
241
  attr_accessor :role
@@ -570,31 +570,31 @@ module Google
570
570
 
571
571
  # An Identity and Access Management (IAM) policy, which specifies access
572
572
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
573
- # A `binding` binds one or more `members` to a single `role`. Members can be
574
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
575
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
576
- # role or a user-created custom role. For some types of Google Cloud resources,
577
- # a `binding` can also specify a `condition`, which is a logical expression that
578
- # allows access to a resource only if the expression evaluates to `true`. A
579
- # condition can add constraints based on attributes of the request, the resource,
580
- # or both. To learn which resources support conditions in their IAM policies,
581
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
582
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
583
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
584
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
585
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
586
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
587
- # title": "expirable access", "description": "Does not grant access after Sep
588
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
589
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
590
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
591
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
592
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
593
- # roles/resourcemanager.organizationViewer condition: title: expirable access
594
- # description: Does not grant access after Sep 2020 expression: request.time <
595
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
596
- # description of IAM and its features, see the [IAM documentation](https://cloud.
597
- # google.com/iam/docs/).
573
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
574
+ # Principals can be user accounts, service accounts, Google groups, and domains (
575
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
576
+ # an IAM predefined role or a user-created custom role. For some types of Google
577
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
578
+ # logical expression that allows access to a resource only if the expression
579
+ # evaluates to `true`. A condition can add constraints based on attributes of
580
+ # the request, the resource, or both. To learn which resources support
581
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
582
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
583
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
584
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
585
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
586
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
587
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
588
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
589
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
590
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
591
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
592
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
593
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
594
+ # access description: Does not grant access after Sep 2020 expression: request.
595
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
596
+ # a description of IAM and its features, see the [IAM documentation](https://
597
+ # cloud.google.com/iam/docs/).
598
598
  class Policy
599
599
  include Google::Apis::Core::Hashable
600
600
 
@@ -603,9 +603,14 @@ module Google
603
603
  # @return [Array<Google::Apis::SecretmanagerV1::AuditConfig>]
604
604
  attr_accessor :audit_configs
605
605
 
606
- # Associates a list of `members` to a `role`. Optionally, may specify a `
607
- # condition` that determines how and when the `bindings` are applied. Each of
608
- # the `bindings` must contain at least one member.
606
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
607
+ # specify a `condition` that determines how and when the `bindings` are applied.
608
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
609
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
610
+ # can be Google groups. Each occurrence of a principal counts towards these
611
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
612
+ # example.com`, and not to any other principal, then you can add another 1,450
613
+ # principals to the `bindings` in the `Policy`.
609
614
  # Corresponds to the JSON property `bindings`
610
615
  # @return [Array<Google::Apis::SecretmanagerV1::Binding>]
611
616
  attr_accessor :bindings
@@ -955,31 +960,31 @@ module Google
955
960
 
956
961
  # An Identity and Access Management (IAM) policy, which specifies access
957
962
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
958
- # A `binding` binds one or more `members` to a single `role`. Members can be
959
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
960
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
961
- # role or a user-created custom role. For some types of Google Cloud resources,
962
- # a `binding` can also specify a `condition`, which is a logical expression that
963
- # allows access to a resource only if the expression evaluates to `true`. A
964
- # condition can add constraints based on attributes of the request, the resource,
965
- # or both. To learn which resources support conditions in their IAM policies,
966
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
967
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
968
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
969
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
970
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
971
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
972
- # title": "expirable access", "description": "Does not grant access after Sep
973
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
974
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
975
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
976
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
977
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
978
- # roles/resourcemanager.organizationViewer condition: title: expirable access
979
- # description: Does not grant access after Sep 2020 expression: request.time <
980
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
981
- # description of IAM and its features, see the [IAM documentation](https://cloud.
982
- # google.com/iam/docs/).
963
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
964
+ # Principals can be user accounts, service accounts, Google groups, and domains (
965
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
966
+ # an IAM predefined role or a user-created custom role. For some types of Google
967
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
968
+ # logical expression that allows access to a resource only if the expression
969
+ # evaluates to `true`. A condition can add constraints based on attributes of
970
+ # the request, the resource, or both. To learn which resources support
971
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
972
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
973
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
974
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
975
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
976
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
977
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
978
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
979
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
980
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
981
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
982
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
983
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
984
+ # access description: Does not grant access after Sep 2020 expression: request.
985
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
986
+ # a description of IAM and its features, see the [IAM documentation](https://
987
+ # cloud.google.com/iam/docs/).
983
988
  # Corresponds to the JSON property `policy`
984
989
  # @return [Google::Apis::SecretmanagerV1::Policy]
985
990
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecretmanagerV1
18
18
  # Version of the google-apis-secretmanager_v1 gem
19
- GEM_VERSION = "0.14.0"
19
+ GEM_VERSION = "0.18.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210813"
25
+ REVISION = "20211105"
26
26
  end
27
27
  end
28
28
  end
@@ -270,13 +270,16 @@ module Google
270
270
  # REQUIRED: The resource for which the policy is being requested. See the
271
271
  # operation documentation for the appropriate value for this field.
272
272
  # @param [Fixnum] options_requested_policy_version
273
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
274
- # 3. Requests specifying an invalid value will be rejected. Requests for
275
- # policies with any conditional bindings must specify version 3. Policies
276
- # without any conditional bindings may specify any valid value or leave the
277
- # field unset. To learn which resources support conditions in their IAM policies,
278
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
279
- # resource-policies).
273
+ # Optional. The maximum policy version that will be used to format the policy.
274
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
275
+ # rejected. Requests for policies with any conditional role bindings must
276
+ # specify version 3. Policies with no conditional role bindings may specify any
277
+ # valid value or leave the field unset. The policy in the response might use the
278
+ # policy version that you specified, or it might use a lower policy version. For
279
+ # example, if you specify version 3, but the policy has no conditional role
280
+ # bindings, the response uses version 1. To learn which resources support
281
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
282
+ # google.com/iam/help/conditions/resource-policies).
280
283
  # @param [String] fields
281
284
  # Selector specifying which fields to include in a partial response.
282
285
  # @param [String] quota_user
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-secretmanager_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.14.0
4
+ version: 0.18.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-09-06 00:00:00.000000000 Z
11
+ date: 2022-01-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -57,9 +57,9 @@ licenses:
57
57
  - Apache-2.0
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
- changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-secretmanager_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-secretmanager_v1/v0.14.0
62
- source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-secretmanager_v1
60
+ changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-secretmanager_v1/CHANGELOG.md
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-secretmanager_v1/v0.18.0
62
+ source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-secretmanager_v1
63
63
  post_install_message:
64
64
  rdoc_options: []
65
65
  require_paths:
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
75
75
  - !ruby/object:Gem::Version
76
76
  version: '0'
77
77
  requirements: []
78
- rubygems_version: 3.2.17
78
+ rubygems_version: 3.3.4
79
79
  signing_key:
80
80
  specification_version: 4
81
81
  summary: Simple REST client for Secret Manager API V1