google-apis-securitycenter_v1 0.12.0 → 0.13.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 212a5f12aa30bc2ab473d3ce00237cdd03ea8857e809f26fdd8d3688a7f4f991
4
- data.tar.gz: a55536a245c7d5eeef6ec714463bb02fed4ec387258983b4192aa7b6452c28bc
3
+ metadata.gz: d7a62353a2a9285185bbade980756274c54738aebcb6d066fb4cc79fca8b61c9
4
+ data.tar.gz: ec5529b7c9f206f59daeb0d32f7f6d3dc28f6021fa252eb209c72463b76ae76d
5
5
  SHA512:
6
- metadata.gz: 2d780277522510ea075bd8373afc34d31679eb688455b296d627affec2b9200a36cfe1a687f28bb009844c6cdaf123da9bd1c3885d494238ba6afc43ae4ce161
7
- data.tar.gz: f6b22b1e7905b32f877f8e72c13bf02bf76da01cd3224af80ffa37d51a04d4e0925214a3f6f7d575bbfae21130089f35b6af3e4bd273c23668a532bd79baee87
6
+ metadata.gz: 42d5fced72d0ef9777a1118e80ff1140b525c06c765669aff6641f442e924cfbe895c2be56800141b6d1330720c27b9004dd71b510532c2a9f76dc98aac17de4
7
+ data.tar.gz: eca66a7f886e6fbfd892fe1f7447510fbd5e5fa6bb1067363d45777a2eff96326c0348512e5819cf9c840f0cd4a1c08583ec213d45f9770ec4f1a23076535339
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-securitycenter_v1
2
2
 
3
+ ### v0.13.0 (2021-10-12)
4
+
5
+ * Regenerated from discovery document revision 20211007
6
+
3
7
  ### v0.12.0 (2021-10-05)
4
8
 
5
9
  * Regenerated from discovery document revision 20210930
@@ -202,7 +202,7 @@ module Google
202
202
  end
203
203
  end
204
204
 
205
- # Associates `members` with a `role`.
205
+ # Associates `members`, or principals, with a `role`.
206
206
  class Binding
207
207
  include Google::Apis::Core::Hashable
208
208
 
@@ -225,7 +225,7 @@ module Google
225
225
  # @return [Google::Apis::SecuritycenterV1::Expr]
226
226
  attr_accessor :condition
227
227
 
228
- # Specifies the identities requesting access for a Cloud Platform resource. `
228
+ # Specifies the principals requesting access for a Cloud Platform resource. `
229
229
  # members` can have the following values: * `allUsers`: A special identifier
230
230
  # that represents anyone who is on the internet; with or without a Google
231
231
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -255,8 +255,8 @@ module Google
255
255
  # @return [Array<String>]
256
256
  attr_accessor :members
257
257
 
258
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
259
- # , or `roles/owner`.
258
+ # Role that is assigned to the list of `members`, or principals. For example, `
259
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
260
260
  # Corresponds to the JSON property `role`
261
261
  # @return [String]
262
262
  attr_accessor :role
@@ -1841,31 +1841,31 @@ module Google
1841
1841
 
1842
1842
  # An Identity and Access Management (IAM) policy, which specifies access
1843
1843
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1844
- # A `binding` binds one or more `members` to a single `role`. Members can be
1845
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1846
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1847
- # role or a user-created custom role. For some types of Google Cloud resources,
1848
- # a `binding` can also specify a `condition`, which is a logical expression that
1849
- # allows access to a resource only if the expression evaluates to `true`. A
1850
- # condition can add constraints based on attributes of the request, the resource,
1851
- # or both. To learn which resources support conditions in their IAM policies,
1852
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1853
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1854
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1855
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1856
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1857
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1858
- # title": "expirable access", "description": "Does not grant access after Sep
1859
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1860
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1861
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1862
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1863
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1864
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1865
- # description: Does not grant access after Sep 2020 expression: request.time <
1866
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1867
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1868
- # google.com/iam/docs/).
1844
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1845
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1846
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1847
+ # an IAM predefined role or a user-created custom role. For some types of Google
1848
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1849
+ # logical expression that allows access to a resource only if the expression
1850
+ # evaluates to `true`. A condition can add constraints based on attributes of
1851
+ # the request, the resource, or both. To learn which resources support
1852
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1853
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1854
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1855
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1856
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1857
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1858
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1859
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1860
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1861
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1862
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1863
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1864
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1865
+ # access description: Does not grant access after Sep 2020 expression: request.
1866
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1867
+ # a description of IAM and its features, see the [IAM documentation](https://
1868
+ # cloud.google.com/iam/docs/).
1869
1869
  class Policy
1870
1870
  include Google::Apis::Core::Hashable
1871
1871
 
@@ -1874,14 +1874,14 @@ module Google
1874
1874
  # @return [Array<Google::Apis::SecuritycenterV1::AuditConfig>]
1875
1875
  attr_accessor :audit_configs
1876
1876
 
1877
- # Associates a list of `members` to a `role`. Optionally, may specify a `
1878
- # condition` that determines how and when the `bindings` are applied. Each of
1879
- # the `bindings` must contain at least one member. The `bindings` in a `Policy`
1880
- # can refer to up to 1,500 members; up to 250 of these members can be Google
1881
- # groups. Each occurrence of a member counts towards these limits. For example,
1882
- # if the `bindings` grant 50 different roles to `user:alice@example.com`, and
1883
- # not to any other member, then you can add another 1,450 members to the `
1884
- # bindings` in the `Policy`.
1877
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
1878
+ # specify a `condition` that determines how and when the `bindings` are applied.
1879
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
1880
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
1881
+ # can be Google groups. Each occurrence of a principal counts towards these
1882
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
1883
+ # example.com`, and not to any other principal, then you can add another 1,450
1884
+ # principals to the `bindings` in the `Policy`.
1885
1885
  # Corresponds to the JSON property `bindings`
1886
1886
  # @return [Array<Google::Apis::SecuritycenterV1::Binding>]
1887
1887
  attr_accessor :bindings
@@ -2180,31 +2180,31 @@ module Google
2180
2180
 
2181
2181
  # An Identity and Access Management (IAM) policy, which specifies access
2182
2182
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
2183
- # A `binding` binds one or more `members` to a single `role`. Members can be
2184
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
2185
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
2186
- # role or a user-created custom role. For some types of Google Cloud resources,
2187
- # a `binding` can also specify a `condition`, which is a logical expression that
2188
- # allows access to a resource only if the expression evaluates to `true`. A
2189
- # condition can add constraints based on attributes of the request, the resource,
2190
- # or both. To learn which resources support conditions in their IAM policies,
2191
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
2192
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
2193
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
2194
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
2195
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
2196
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
2197
- # title": "expirable access", "description": "Does not grant access after Sep
2198
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
2199
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
2200
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
2201
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
2202
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
2203
- # roles/resourcemanager.organizationViewer condition: title: expirable access
2204
- # description: Does not grant access after Sep 2020 expression: request.time <
2205
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
2206
- # description of IAM and its features, see the [IAM documentation](https://cloud.
2207
- # google.com/iam/docs/).
2183
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
2184
+ # Principals can be user accounts, service accounts, Google groups, and domains (
2185
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
2186
+ # an IAM predefined role or a user-created custom role. For some types of Google
2187
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
2188
+ # logical expression that allows access to a resource only if the expression
2189
+ # evaluates to `true`. A condition can add constraints based on attributes of
2190
+ # the request, the resource, or both. To learn which resources support
2191
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
2192
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
2193
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
2194
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
2195
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
2196
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
2197
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
2198
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
2199
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
2200
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
2201
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
2202
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
2203
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
2204
+ # access description: Does not grant access after Sep 2020 expression: request.
2205
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
2206
+ # a description of IAM and its features, see the [IAM documentation](https://
2207
+ # cloud.google.com/iam/docs/).
2208
2208
  # Corresponds to the JSON property `policy`
2209
2209
  # @return [Google::Apis::SecuritycenterV1::Policy]
2210
2210
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecuritycenterV1
18
18
  # Version of the google-apis-securitycenter_v1 gem
19
- GEM_VERSION = "0.12.0"
19
+ GEM_VERSION = "0.13.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210930"
25
+ REVISION = "20211007"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-securitycenter_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.12.0
4
+ version: 0.13.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-11 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1/v0.12.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1/v0.13.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1
63
63
  post_install_message:
64
64
  rdoc_options: []