google-apis-secretmanager_v1beta1 0.9.0 → 0.13.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 3fe60b860b81c120120a7eca532bd57bc6ae689a26acb1fe695a94743ffff634
4
- data.tar.gz: dca660b4608f7b158db5c272be9e3b501e7864b8ab470a2612d3ce77e103ca41
3
+ metadata.gz: 6d424050bb43f3e7ffec754a65806d775549167a3d2e837054bc7aeee3070077
4
+ data.tar.gz: 3b1969376527888fd1dd12a306c6ddca1bce330b0e0fe7e5c2f3b62cd5cd9487
5
5
  SHA512:
6
- metadata.gz: a253101102448fa237b017b9a90f054f262baeedfa8a0c07387a0aa4c846b0eba691676d18b085d11e41a2c59bed3c4ba36953ac7c83523df530089d92cdc21c
7
- data.tar.gz: 0fb5d4df640c116cc6dc2c4b097bc11f3e56be3d6d9860598a5fdfbe757d3587af095af60fc09434c2a741d559ea8c0cd20483d4851f047674588e737840cbb2
6
+ metadata.gz: 6bc266282b0a215921bebec9205b5f6ba3f3a9bd998f8633a24ab31d4cd0fe12c60a817b2a3265151a2f31892ab164e13797067859ecec16503be1236d177c5b
7
+ data.tar.gz: 2f2d13df7998bc9fffd5cde69d1a23fd45830b9f9c44b7650a1f6f9d2f6275e3e94796000f9e818f115e121db61cd4c2ee42812d58a4e28b9ca4b99b406333f8
data/CHANGELOG.md CHANGED
@@ -1,5 +1,22 @@
1
1
  # Release history for google-apis-secretmanager_v1beta1
2
2
 
3
+ ### v0.13.0 (2021-12-16)
4
+
5
+ * Unspecified changes
6
+
7
+ ### v0.12.0 (2021-11-12)
8
+
9
+ * Regenerated from discovery document revision 20211105
10
+
11
+ ### v0.11.0 (2021-10-22)
12
+
13
+ * Regenerated from discovery document revision 20211015
14
+ * Unspecified changes
15
+
16
+ ### v0.10.0 (2021-10-08)
17
+
18
+ * Regenerated from discovery document revision 20211001
19
+
3
20
  ### v0.9.0 (2021-09-01)
4
21
 
5
22
  * Regenerated from discovery document revision 20210813
data/OVERVIEW.md CHANGED
@@ -51,7 +51,7 @@ require "google/apis/secretmanager_v1beta1"
51
51
  client = Google::Apis::SecretmanagerV1beta1::SecretManagerService.new
52
52
 
53
53
  # Authenticate calls
54
- client.authentication = # ... use the googleauth gem to create credentials
54
+ client.authorization = # ... use the googleauth gem to create credentials
55
55
  ```
56
56
 
57
57
  See the class reference docs for information on the methods you can call from a client.
@@ -60,8 +60,8 @@ See the class reference docs for information on the methods you can call from a
60
60
 
61
61
  More detailed descriptions of the Google simple REST clients are available in two documents.
62
62
 
63
- * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
- * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/master/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
63
+ * The [Usage Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/usage-guide.md) discusses how to make API calls, how to use the provided data structures, and how to work the various features of the client library, including media upload and download, error handling, retries, pagination, and logging.
64
+ * The [Auth Guide](https://github.com/googleapis/google-api-ruby-client/blob/main/docs/auth-guide.md) discusses authentication in the client libraries, including API keys, OAuth 2.0, service accounts, and environment variables.
65
65
 
66
66
  (Note: the above documents are written for the simple REST clients in general, and their examples may not reflect the Secretmanager service in particular.)
67
67
 
@@ -154,7 +154,7 @@ module Google
154
154
  end
155
155
  end
156
156
 
157
- # Associates `members` with a `role`.
157
+ # Associates `members`, or principals, with a `role`.
158
158
  class Binding
159
159
  include Google::Apis::Core::Hashable
160
160
 
@@ -177,7 +177,7 @@ module Google
177
177
  # @return [Google::Apis::SecretmanagerV1beta1::Expr]
178
178
  attr_accessor :condition
179
179
 
180
- # Specifies the identities requesting access for a Cloud Platform resource. `
180
+ # Specifies the principals requesting access for a Cloud Platform resource. `
181
181
  # members` can have the following values: * `allUsers`: A special identifier
182
182
  # that represents anyone who is on the internet; with or without a Google
183
183
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -207,8 +207,8 @@ module Google
207
207
  # @return [Array<String>]
208
208
  attr_accessor :members
209
209
 
210
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
211
- # , or `roles/owner`.
210
+ # Role that is assigned to the list of `members`, or principals. For example, `
211
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
212
212
  # Corresponds to the JSON property `role`
213
213
  # @return [String]
214
214
  attr_accessor :role
@@ -473,31 +473,31 @@ module Google
473
473
 
474
474
  # An Identity and Access Management (IAM) policy, which specifies access
475
475
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
476
- # A `binding` binds one or more `members` to a single `role`. Members can be
477
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
478
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
479
- # role or a user-created custom role. For some types of Google Cloud resources,
480
- # a `binding` can also specify a `condition`, which is a logical expression that
481
- # allows access to a resource only if the expression evaluates to `true`. A
482
- # condition can add constraints based on attributes of the request, the resource,
483
- # or both. To learn which resources support conditions in their IAM policies,
484
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
485
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
486
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
487
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
488
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
489
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
490
- # title": "expirable access", "description": "Does not grant access after Sep
491
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
492
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
493
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
494
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
495
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
496
- # roles/resourcemanager.organizationViewer condition: title: expirable access
497
- # description: Does not grant access after Sep 2020 expression: request.time <
498
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
499
- # description of IAM and its features, see the [IAM documentation](https://cloud.
500
- # google.com/iam/docs/).
476
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
477
+ # Principals can be user accounts, service accounts, Google groups, and domains (
478
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
479
+ # an IAM predefined role or a user-created custom role. For some types of Google
480
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
481
+ # logical expression that allows access to a resource only if the expression
482
+ # evaluates to `true`. A condition can add constraints based on attributes of
483
+ # the request, the resource, or both. To learn which resources support
484
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
485
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
486
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
487
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
488
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
489
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
490
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
491
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
492
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
493
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
494
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
495
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
496
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
497
+ # access description: Does not grant access after Sep 2020 expression: request.
498
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
499
+ # a description of IAM and its features, see the [IAM documentation](https://
500
+ # cloud.google.com/iam/docs/).
501
501
  class Policy
502
502
  include Google::Apis::Core::Hashable
503
503
 
@@ -506,9 +506,14 @@ module Google
506
506
  # @return [Array<Google::Apis::SecretmanagerV1beta1::AuditConfig>]
507
507
  attr_accessor :audit_configs
508
508
 
509
- # Associates a list of `members` to a `role`. Optionally, may specify a `
510
- # condition` that determines how and when the `bindings` are applied. Each of
511
- # the `bindings` must contain at least one member.
509
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
510
+ # specify a `condition` that determines how and when the `bindings` are applied.
511
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
512
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
513
+ # can be Google groups. Each occurrence of a principal counts towards these
514
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
515
+ # example.com`, and not to any other principal, then you can add another 1,450
516
+ # principals to the `bindings` in the `Policy`.
512
517
  # Corresponds to the JSON property `bindings`
513
518
  # @return [Array<Google::Apis::SecretmanagerV1beta1::Binding>]
514
519
  attr_accessor :bindings
@@ -719,31 +724,31 @@ module Google
719
724
 
720
725
  # An Identity and Access Management (IAM) policy, which specifies access
721
726
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
722
- # A `binding` binds one or more `members` to a single `role`. Members can be
723
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
724
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
725
- # role or a user-created custom role. For some types of Google Cloud resources,
726
- # a `binding` can also specify a `condition`, which is a logical expression that
727
- # allows access to a resource only if the expression evaluates to `true`. A
728
- # condition can add constraints based on attributes of the request, the resource,
729
- # or both. To learn which resources support conditions in their IAM policies,
730
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
731
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
732
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
733
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
734
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
735
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
736
- # title": "expirable access", "description": "Does not grant access after Sep
737
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
738
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
739
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
740
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
741
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
742
- # roles/resourcemanager.organizationViewer condition: title: expirable access
743
- # description: Does not grant access after Sep 2020 expression: request.time <
744
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
745
- # description of IAM and its features, see the [IAM documentation](https://cloud.
746
- # google.com/iam/docs/).
727
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
728
+ # Principals can be user accounts, service accounts, Google groups, and domains (
729
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
730
+ # an IAM predefined role or a user-created custom role. For some types of Google
731
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
732
+ # logical expression that allows access to a resource only if the expression
733
+ # evaluates to `true`. A condition can add constraints based on attributes of
734
+ # the request, the resource, or both. To learn which resources support
735
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
736
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
737
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
738
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
739
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
740
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
741
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
742
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
743
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
744
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
745
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
746
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
747
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
748
+ # access description: Does not grant access after Sep 2020 expression: request.
749
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
750
+ # a description of IAM and its features, see the [IAM documentation](https://
751
+ # cloud.google.com/iam/docs/).
747
752
  # Corresponds to the JSON property `policy`
748
753
  # @return [Google::Apis::SecretmanagerV1beta1::Policy]
749
754
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecretmanagerV1beta1
18
18
  # Version of the google-apis-secretmanager_v1beta1 gem
19
- GEM_VERSION = "0.9.0"
19
+ GEM_VERSION = "0.13.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210813"
25
+ REVISION = "20211105"
26
26
  end
27
27
  end
28
28
  end
@@ -265,13 +265,16 @@ module Google
265
265
  # REQUIRED: The resource for which the policy is being requested. See the
266
266
  # operation documentation for the appropriate value for this field.
267
267
  # @param [Fixnum] options_requested_policy_version
268
- # Optional. The policy format version to be returned. Valid values are 0, 1, and
269
- # 3. Requests specifying an invalid value will be rejected. Requests for
270
- # policies with any conditional bindings must specify version 3. Policies
271
- # without any conditional bindings may specify any valid value or leave the
272
- # field unset. To learn which resources support conditions in their IAM policies,
273
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
274
- # resource-policies).
268
+ # Optional. The maximum policy version that will be used to format the policy.
269
+ # Valid values are 0, 1, and 3. Requests specifying an invalid value will be
270
+ # rejected. Requests for policies with any conditional role bindings must
271
+ # specify version 3. Policies with no conditional role bindings may specify any
272
+ # valid value or leave the field unset. The policy in the response might use the
273
+ # policy version that you specified, or it might use a lower policy version. For
274
+ # example, if you specify version 3, but the policy has no conditional role
275
+ # bindings, the response uses version 1. To learn which resources support
276
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
277
+ # google.com/iam/help/conditions/resource-policies).
275
278
  # @param [String] fields
276
279
  # Selector specifying which fields to include in a partial response.
277
280
  # @param [String] quota_user
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-secretmanager_v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.9.0
4
+ version: 0.13.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-09-06 00:00:00.000000000 Z
11
+ date: 2022-01-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -57,9 +57,9 @@ licenses:
57
57
  - Apache-2.0
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
- changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-secretmanager_v1beta1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-secretmanager_v1beta1/v0.9.0
62
- source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-secretmanager_v1beta1
60
+ changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-secretmanager_v1beta1/CHANGELOG.md
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-secretmanager_v1beta1/v0.13.0
62
+ source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-secretmanager_v1beta1
63
63
  post_install_message:
64
64
  rdoc_options: []
65
65
  require_paths:
@@ -75,7 +75,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
75
75
  - !ruby/object:Gem::Version
76
76
  version: '0'
77
77
  requirements: []
78
- rubygems_version: 3.2.17
78
+ rubygems_version: 3.3.4
79
79
  signing_key:
80
80
  specification_version: 4
81
81
  summary: Simple REST client for Secret Manager API V1beta1