google-apis-securitycenter_v1 0.12.0 → 0.13.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 212a5f12aa30bc2ab473d3ce00237cdd03ea8857e809f26fdd8d3688a7f4f991
4
- data.tar.gz: a55536a245c7d5eeef6ec714463bb02fed4ec387258983b4192aa7b6452c28bc
3
+ metadata.gz: d7a62353a2a9285185bbade980756274c54738aebcb6d066fb4cc79fca8b61c9
4
+ data.tar.gz: ec5529b7c9f206f59daeb0d32f7f6d3dc28f6021fa252eb209c72463b76ae76d
5
5
  SHA512:
6
- metadata.gz: 2d780277522510ea075bd8373afc34d31679eb688455b296d627affec2b9200a36cfe1a687f28bb009844c6cdaf123da9bd1c3885d494238ba6afc43ae4ce161
7
- data.tar.gz: f6b22b1e7905b32f877f8e72c13bf02bf76da01cd3224af80ffa37d51a04d4e0925214a3f6f7d575bbfae21130089f35b6af3e4bd273c23668a532bd79baee87
6
+ metadata.gz: 42d5fced72d0ef9777a1118e80ff1140b525c06c765669aff6641f442e924cfbe895c2be56800141b6d1330720c27b9004dd71b510532c2a9f76dc98aac17de4
7
+ data.tar.gz: eca66a7f886e6fbfd892fe1f7447510fbd5e5fa6bb1067363d45777a2eff96326c0348512e5819cf9c840f0cd4a1c08583ec213d45f9770ec4f1a23076535339
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-securitycenter_v1
2
2
 
3
+ ### v0.13.0 (2021-10-12)
4
+
5
+ * Regenerated from discovery document revision 20211007
6
+
3
7
  ### v0.12.0 (2021-10-05)
4
8
 
5
9
  * Regenerated from discovery document revision 20210930
@@ -202,7 +202,7 @@ module Google
202
202
  end
203
203
  end
204
204
 
205
- # Associates `members` with a `role`.
205
+ # Associates `members`, or principals, with a `role`.
206
206
  class Binding
207
207
  include Google::Apis::Core::Hashable
208
208
 
@@ -225,7 +225,7 @@ module Google
225
225
  # @return [Google::Apis::SecuritycenterV1::Expr]
226
226
  attr_accessor :condition
227
227
 
228
- # Specifies the identities requesting access for a Cloud Platform resource. `
228
+ # Specifies the principals requesting access for a Cloud Platform resource. `
229
229
  # members` can have the following values: * `allUsers`: A special identifier
230
230
  # that represents anyone who is on the internet; with or without a Google
231
231
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -255,8 +255,8 @@ module Google
255
255
  # @return [Array<String>]
256
256
  attr_accessor :members
257
257
 
258
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
259
- # , or `roles/owner`.
258
+ # Role that is assigned to the list of `members`, or principals. For example, `
259
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
260
260
  # Corresponds to the JSON property `role`
261
261
  # @return [String]
262
262
  attr_accessor :role
@@ -1841,31 +1841,31 @@ module Google
1841
1841
 
1842
1842
  # An Identity and Access Management (IAM) policy, which specifies access
1843
1843
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1844
- # A `binding` binds one or more `members` to a single `role`. Members can be
1845
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1846
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1847
- # role or a user-created custom role. For some types of Google Cloud resources,
1848
- # a `binding` can also specify a `condition`, which is a logical expression that
1849
- # allows access to a resource only if the expression evaluates to `true`. A
1850
- # condition can add constraints based on attributes of the request, the resource,
1851
- # or both. To learn which resources support conditions in their IAM policies,
1852
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1853
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1854
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1855
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1856
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1857
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1858
- # title": "expirable access", "description": "Does not grant access after Sep
1859
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1860
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1861
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1862
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1863
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1864
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1865
- # description: Does not grant access after Sep 2020 expression: request.time <
1866
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1867
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1868
- # google.com/iam/docs/).
1844
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1845
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1846
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1847
+ # an IAM predefined role or a user-created custom role. For some types of Google
1848
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1849
+ # logical expression that allows access to a resource only if the expression
1850
+ # evaluates to `true`. A condition can add constraints based on attributes of
1851
+ # the request, the resource, or both. To learn which resources support
1852
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1853
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1854
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1855
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1856
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1857
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1858
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1859
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1860
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1861
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1862
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1863
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1864
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1865
+ # access description: Does not grant access after Sep 2020 expression: request.
1866
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1867
+ # a description of IAM and its features, see the [IAM documentation](https://
1868
+ # cloud.google.com/iam/docs/).
1869
1869
  class Policy
1870
1870
  include Google::Apis::Core::Hashable
1871
1871
 
@@ -1874,14 +1874,14 @@ module Google
1874
1874
  # @return [Array<Google::Apis::SecuritycenterV1::AuditConfig>]
1875
1875
  attr_accessor :audit_configs
1876
1876
 
1877
- # Associates a list of `members` to a `role`. Optionally, may specify a `
1878
- # condition` that determines how and when the `bindings` are applied. Each of
1879
- # the `bindings` must contain at least one member. The `bindings` in a `Policy`
1880
- # can refer to up to 1,500 members; up to 250 of these members can be Google
1881
- # groups. Each occurrence of a member counts towards these limits. For example,
1882
- # if the `bindings` grant 50 different roles to `user:alice@example.com`, and
1883
- # not to any other member, then you can add another 1,450 members to the `
1884
- # bindings` in the `Policy`.
1877
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
1878
+ # specify a `condition` that determines how and when the `bindings` are applied.
1879
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
1880
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
1881
+ # can be Google groups. Each occurrence of a principal counts towards these
1882
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
1883
+ # example.com`, and not to any other principal, then you can add another 1,450
1884
+ # principals to the `bindings` in the `Policy`.
1885
1885
  # Corresponds to the JSON property `bindings`
1886
1886
  # @return [Array<Google::Apis::SecuritycenterV1::Binding>]
1887
1887
  attr_accessor :bindings
@@ -2180,31 +2180,31 @@ module Google
2180
2180
 
2181
2181
  # An Identity and Access Management (IAM) policy, which specifies access
2182
2182
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
2183
- # A `binding` binds one or more `members` to a single `role`. Members can be
2184
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
2185
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
2186
- # role or a user-created custom role. For some types of Google Cloud resources,
2187
- # a `binding` can also specify a `condition`, which is a logical expression that
2188
- # allows access to a resource only if the expression evaluates to `true`. A
2189
- # condition can add constraints based on attributes of the request, the resource,
2190
- # or both. To learn which resources support conditions in their IAM policies,
2191
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
2192
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
2193
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
2194
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
2195
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
2196
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
2197
- # title": "expirable access", "description": "Does not grant access after Sep
2198
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
2199
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
2200
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
2201
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
2202
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
2203
- # roles/resourcemanager.organizationViewer condition: title: expirable access
2204
- # description: Does not grant access after Sep 2020 expression: request.time <
2205
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
2206
- # description of IAM and its features, see the [IAM documentation](https://cloud.
2207
- # google.com/iam/docs/).
2183
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
2184
+ # Principals can be user accounts, service accounts, Google groups, and domains (
2185
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
2186
+ # an IAM predefined role or a user-created custom role. For some types of Google
2187
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
2188
+ # logical expression that allows access to a resource only if the expression
2189
+ # evaluates to `true`. A condition can add constraints based on attributes of
2190
+ # the request, the resource, or both. To learn which resources support
2191
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
2192
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
2193
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
2194
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
2195
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
2196
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
2197
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
2198
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
2199
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
2200
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
2201
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
2202
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
2203
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
2204
+ # access description: Does not grant access after Sep 2020 expression: request.
2205
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
2206
+ # a description of IAM and its features, see the [IAM documentation](https://
2207
+ # cloud.google.com/iam/docs/).
2208
2208
  # Corresponds to the JSON property `policy`
2209
2209
  # @return [Google::Apis::SecuritycenterV1::Policy]
2210
2210
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecuritycenterV1
18
18
  # Version of the google-apis-securitycenter_v1 gem
19
- GEM_VERSION = "0.12.0"
19
+ GEM_VERSION = "0.13.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210930"
25
+ REVISION = "20211007"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-securitycenter_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.12.0
4
+ version: 0.13.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-11 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1/v0.12.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1/v0.13.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1
63
63
  post_install_message:
64
64
  rdoc_options: []