google-apis-securitycenter_v1 0.12.0 → 0.13.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/lib/google/apis/securitycenter_v1/classes.rb +62 -62
- data/lib/google/apis/securitycenter_v1/gem_version.rb +2 -2
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: d7a62353a2a9285185bbade980756274c54738aebcb6d066fb4cc79fca8b61c9
|
4
|
+
data.tar.gz: ec5529b7c9f206f59daeb0d32f7f6d3dc28f6021fa252eb209c72463b76ae76d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 42d5fced72d0ef9777a1118e80ff1140b525c06c765669aff6641f442e924cfbe895c2be56800141b6d1330720c27b9004dd71b510532c2a9f76dc98aac17de4
|
7
|
+
data.tar.gz: eca66a7f886e6fbfd892fe1f7447510fbd5e5fa6bb1067363d45777a2eff96326c0348512e5819cf9c840f0cd4a1c08583ec213d45f9770ec4f1a23076535339
|
data/CHANGELOG.md
CHANGED
@@ -202,7 +202,7 @@ module Google
|
|
202
202
|
end
|
203
203
|
end
|
204
204
|
|
205
|
-
# Associates `members
|
205
|
+
# Associates `members`, or principals, with a `role`.
|
206
206
|
class Binding
|
207
207
|
include Google::Apis::Core::Hashable
|
208
208
|
|
@@ -225,7 +225,7 @@ module Google
|
|
225
225
|
# @return [Google::Apis::SecuritycenterV1::Expr]
|
226
226
|
attr_accessor :condition
|
227
227
|
|
228
|
-
# Specifies the
|
228
|
+
# Specifies the principals requesting access for a Cloud Platform resource. `
|
229
229
|
# members` can have the following values: * `allUsers`: A special identifier
|
230
230
|
# that represents anyone who is on the internet; with or without a Google
|
231
231
|
# account. * `allAuthenticatedUsers`: A special identifier that represents
|
@@ -255,8 +255,8 @@ module Google
|
|
255
255
|
# @return [Array<String>]
|
256
256
|
attr_accessor :members
|
257
257
|
|
258
|
-
# Role that is assigned to `members
|
259
|
-
#
|
258
|
+
# Role that is assigned to the list of `members`, or principals. For example, `
|
259
|
+
# roles/viewer`, `roles/editor`, or `roles/owner`.
|
260
260
|
# Corresponds to the JSON property `role`
|
261
261
|
# @return [String]
|
262
262
|
attr_accessor :role
|
@@ -1841,31 +1841,31 @@ module Google
|
|
1841
1841
|
|
1842
1842
|
# An Identity and Access Management (IAM) policy, which specifies access
|
1843
1843
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
1844
|
-
# A `binding` binds one or more `members
|
1845
|
-
# user accounts, service accounts, Google groups, and domains (
|
1846
|
-
# A `role` is a named list of permissions; each `role` can be
|
1847
|
-
# role or a user-created custom role. For some types of Google
|
1848
|
-
# a `binding` can also specify a `condition`, which is a
|
1849
|
-
# allows access to a resource only if the expression
|
1850
|
-
# condition can add constraints based on attributes of
|
1851
|
-
# or both. To learn which resources support
|
1852
|
-
# see the [IAM documentation](https://cloud.
|
1853
|
-
# resource-policies). **JSON example:** ` "
|
1854
|
-
# resourcemanager.organizationAdmin", "members": [
|
1855
|
-
# group:admins@example.com", "domain:google.com", "
|
1856
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
1857
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
1858
|
-
# title": "expirable access", "description": "Does not grant
|
1859
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
1860
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
1861
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
1862
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
1863
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
1864
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
1865
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
1866
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
1867
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
1868
|
-
# google.com/iam/docs/).
|
1844
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
1845
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
1846
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
1847
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
1848
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
1849
|
+
# logical expression that allows access to a resource only if the expression
|
1850
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
1851
|
+
# the request, the resource, or both. To learn which resources support
|
1852
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
1853
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
1854
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
1855
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
1856
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
1857
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
1858
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
1859
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
1860
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
1861
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
1862
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
1863
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
1864
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
1865
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
1866
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
1867
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
1868
|
+
# cloud.google.com/iam/docs/).
|
1869
1869
|
class Policy
|
1870
1870
|
include Google::Apis::Core::Hashable
|
1871
1871
|
|
@@ -1874,14 +1874,14 @@ module Google
|
|
1874
1874
|
# @return [Array<Google::Apis::SecuritycenterV1::AuditConfig>]
|
1875
1875
|
attr_accessor :audit_configs
|
1876
1876
|
|
1877
|
-
# Associates a list of `members
|
1878
|
-
# condition` that determines how and when the `bindings` are applied.
|
1879
|
-
# the `bindings` must contain at least one
|
1880
|
-
# can refer to up to 1,500
|
1881
|
-
# groups. Each occurrence of a
|
1882
|
-
# if the `bindings` grant 50 different roles to `user:alice@
|
1883
|
-
# not to any other
|
1884
|
-
# bindings` in the `Policy`.
|
1877
|
+
# Associates a list of `members`, or principals, with a `role`. Optionally, may
|
1878
|
+
# specify a `condition` that determines how and when the `bindings` are applied.
|
1879
|
+
# Each of the `bindings` must contain at least one principal. The `bindings` in
|
1880
|
+
# a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
|
1881
|
+
# can be Google groups. Each occurrence of a principal counts towards these
|
1882
|
+
# limits. For example, if the `bindings` grant 50 different roles to `user:alice@
|
1883
|
+
# example.com`, and not to any other principal, then you can add another 1,450
|
1884
|
+
# principals to the `bindings` in the `Policy`.
|
1885
1885
|
# Corresponds to the JSON property `bindings`
|
1886
1886
|
# @return [Array<Google::Apis::SecuritycenterV1::Binding>]
|
1887
1887
|
attr_accessor :bindings
|
@@ -2180,31 +2180,31 @@ module Google
|
|
2180
2180
|
|
2181
2181
|
# An Identity and Access Management (IAM) policy, which specifies access
|
2182
2182
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
2183
|
-
# A `binding` binds one or more `members
|
2184
|
-
# user accounts, service accounts, Google groups, and domains (
|
2185
|
-
# A `role` is a named list of permissions; each `role` can be
|
2186
|
-
# role or a user-created custom role. For some types of Google
|
2187
|
-
# a `binding` can also specify a `condition`, which is a
|
2188
|
-
# allows access to a resource only if the expression
|
2189
|
-
# condition can add constraints based on attributes of
|
2190
|
-
# or both. To learn which resources support
|
2191
|
-
# see the [IAM documentation](https://cloud.
|
2192
|
-
# resource-policies). **JSON example:** ` "
|
2193
|
-
# resourcemanager.organizationAdmin", "members": [
|
2194
|
-
# group:admins@example.com", "domain:google.com", "
|
2195
|
-
# appspot.gserviceaccount.com" ] `, ` "role": "
|
2196
|
-
# organizationViewer", "members": [ "user:eve@example.com"
|
2197
|
-
# title": "expirable access", "description": "Does not grant
|
2198
|
-
# 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
2199
|
-
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
2200
|
-
# members: - user:mike@example.com - group:admins@example.com -
|
2201
|
-
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
2202
|
-
# resourcemanager.organizationAdmin - members: - user:eve@example.
|
2203
|
-
# roles/resourcemanager.organizationViewer condition: title: expirable
|
2204
|
-
# description: Does not grant access after Sep 2020 expression: request.
|
2205
|
-
# timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
2206
|
-
# description of IAM and its features, see the [IAM documentation](https://
|
2207
|
-
# google.com/iam/docs/).
|
2183
|
+
# A `binding` binds one or more `members`, or principals, to a single `role`.
|
2184
|
+
# Principals can be user accounts, service accounts, Google groups, and domains (
|
2185
|
+
# such as G Suite). A `role` is a named list of permissions; each `role` can be
|
2186
|
+
# an IAM predefined role or a user-created custom role. For some types of Google
|
2187
|
+
# Cloud resources, a `binding` can also specify a `condition`, which is a
|
2188
|
+
# logical expression that allows access to a resource only if the expression
|
2189
|
+
# evaluates to `true`. A condition can add constraints based on attributes of
|
2190
|
+
# the request, the resource, or both. To learn which resources support
|
2191
|
+
# conditions in their IAM policies, see the [IAM documentation](https://cloud.
|
2192
|
+
# google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
|
2193
|
+
# bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
|
2194
|
+
# "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
|
2195
|
+
# serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
|
2196
|
+
# roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
|
2197
|
+
# ], "condition": ` "title": "expirable access", "description": "Does not grant
|
2198
|
+
# access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
|
2199
|
+
# 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
|
2200
|
+
# bindings: - members: - user:mike@example.com - group:admins@example.com -
|
2201
|
+
# domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
|
2202
|
+
# role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
|
2203
|
+
# com role: roles/resourcemanager.organizationViewer condition: title: expirable
|
2204
|
+
# access description: Does not grant access after Sep 2020 expression: request.
|
2205
|
+
# time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
|
2206
|
+
# a description of IAM and its features, see the [IAM documentation](https://
|
2207
|
+
# cloud.google.com/iam/docs/).
|
2208
2208
|
# Corresponds to the JSON property `policy`
|
2209
2209
|
# @return [Google::Apis::SecuritycenterV1::Policy]
|
2210
2210
|
attr_accessor :policy
|
@@ -16,13 +16,13 @@ module Google
|
|
16
16
|
module Apis
|
17
17
|
module SecuritycenterV1
|
18
18
|
# Version of the google-apis-securitycenter_v1 gem
|
19
|
-
GEM_VERSION = "0.
|
19
|
+
GEM_VERSION = "0.13.0"
|
20
20
|
|
21
21
|
# Version of the code generator used to generate this client
|
22
22
|
GENERATOR_VERSION = "0.4.0"
|
23
23
|
|
24
24
|
# Revision of the discovery document this client was generated from
|
25
|
-
REVISION = "
|
25
|
+
REVISION = "20211007"
|
26
26
|
end
|
27
27
|
end
|
28
28
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-apis-securitycenter_v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.13.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-10-
|
11
|
+
date: 2021-10-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: google-apis-core
|
@@ -58,7 +58,7 @@ licenses:
|
|
58
58
|
metadata:
|
59
59
|
bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
|
60
60
|
changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1/CHANGELOG.md
|
61
|
-
documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1/v0.
|
61
|
+
documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1/v0.13.0
|
62
62
|
source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1
|
63
63
|
post_install_message:
|
64
64
|
rdoc_options: []
|