google-apis-securitycenter_v1beta1 0.9.0 → 0.10.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: '088ade5974ee8938244b2c1ddb42a66e7010c7ad2cb359f07832ff3d224df466'
4
- data.tar.gz: 7d63a9a8585392a8d8119ec5a32c5fd8774de14996f48ecd8629225c42edd237
3
+ metadata.gz: d3a296981cdf1bf4c7b68a6856a992db36b7938cb62cfa3f2458a0c86ddc122e
4
+ data.tar.gz: ee18de0c0571645df270a74bdfb06b04fd51e90e49268a33a7cbf5640586825b
5
5
  SHA512:
6
- metadata.gz: b6544ad4b8a0d77652bca6f690fc814fc15e54628f1c7377b73f9e324a11ec94f7ccbc496e147349d4afc4b810f3fcbe0f6d9612ce9fd3069facc4c9c1e1e326
7
- data.tar.gz: 191dcf7197cfd3a5e69e3d7e321fe961173e0254d1759d65eae1642d819f1e2905923bbe618aa247950b13e26437e2c6492c5acb59be5e8299763cab1e0cdf70
6
+ metadata.gz: faa67e8d8ca37e2c85775d7646e8031fa86ad07f2b52685dcc304facf210cb26ca4926d913f56ecef5e48567c692519a7aa3997425f1f1a0b79645be90733c21
7
+ data.tar.gz: fb1faddf809272760ac0ec39e0e3e122038a2c7d0f9dffa609d2a53ad8affc4eac250ce7295765b8c51733288ee0b87c56d89d3b2a4845e06a9e028b2411456a
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-securitycenter_v1beta1
2
2
 
3
+ ### v0.10.0 (2021-10-12)
4
+
5
+ * Regenerated from discovery document revision 20211007
6
+
3
7
  ### v0.9.0 (2021-10-05)
4
8
 
5
9
  * Regenerated from discovery document revision 20210930
@@ -179,7 +179,7 @@ module Google
179
179
  end
180
180
  end
181
181
 
182
- # Associates `members` with a `role`.
182
+ # Associates `members`, or principals, with a `role`.
183
183
  class Binding
184
184
  include Google::Apis::Core::Hashable
185
185
 
@@ -202,7 +202,7 @@ module Google
202
202
  # @return [Google::Apis::SecuritycenterV1beta1::Expr]
203
203
  attr_accessor :condition
204
204
 
205
- # Specifies the identities requesting access for a Cloud Platform resource. `
205
+ # Specifies the principals requesting access for a Cloud Platform resource. `
206
206
  # members` can have the following values: * `allUsers`: A special identifier
207
207
  # that represents anyone who is on the internet; with or without a Google
208
208
  # account. * `allAuthenticatedUsers`: A special identifier that represents
@@ -232,8 +232,8 @@ module Google
232
232
  # @return [Array<String>]
233
233
  attr_accessor :members
234
234
 
235
- # Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
236
- # , or `roles/owner`.
235
+ # Role that is assigned to the list of `members`, or principals. For example, `
236
+ # roles/viewer`, `roles/editor`, or `roles/owner`.
237
237
  # Corresponds to the JSON property `role`
238
238
  # @return [String]
239
239
  attr_accessor :role
@@ -1752,31 +1752,31 @@ module Google
1752
1752
 
1753
1753
  # An Identity and Access Management (IAM) policy, which specifies access
1754
1754
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
1755
- # A `binding` binds one or more `members` to a single `role`. Members can be
1756
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
1757
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
1758
- # role or a user-created custom role. For some types of Google Cloud resources,
1759
- # a `binding` can also specify a `condition`, which is a logical expression that
1760
- # allows access to a resource only if the expression evaluates to `true`. A
1761
- # condition can add constraints based on attributes of the request, the resource,
1762
- # or both. To learn which resources support conditions in their IAM policies,
1763
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
1764
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
1765
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
1766
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
1767
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
1768
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
1769
- # title": "expirable access", "description": "Does not grant access after Sep
1770
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
1771
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
1772
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
1773
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
1774
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
1775
- # roles/resourcemanager.organizationViewer condition: title: expirable access
1776
- # description: Does not grant access after Sep 2020 expression: request.time <
1777
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
1778
- # description of IAM and its features, see the [IAM documentation](https://cloud.
1779
- # google.com/iam/docs/).
1755
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
1756
+ # Principals can be user accounts, service accounts, Google groups, and domains (
1757
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
1758
+ # an IAM predefined role or a user-created custom role. For some types of Google
1759
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
1760
+ # logical expression that allows access to a resource only if the expression
1761
+ # evaluates to `true`. A condition can add constraints based on attributes of
1762
+ # the request, the resource, or both. To learn which resources support
1763
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
1764
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
1765
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
1766
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
1767
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
1768
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
1769
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
1770
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
1771
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
1772
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
1773
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
1774
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
1775
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
1776
+ # access description: Does not grant access after Sep 2020 expression: request.
1777
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
1778
+ # a description of IAM and its features, see the [IAM documentation](https://
1779
+ # cloud.google.com/iam/docs/).
1780
1780
  class Policy
1781
1781
  include Google::Apis::Core::Hashable
1782
1782
 
@@ -1785,14 +1785,14 @@ module Google
1785
1785
  # @return [Array<Google::Apis::SecuritycenterV1beta1::AuditConfig>]
1786
1786
  attr_accessor :audit_configs
1787
1787
 
1788
- # Associates a list of `members` to a `role`. Optionally, may specify a `
1789
- # condition` that determines how and when the `bindings` are applied. Each of
1790
- # the `bindings` must contain at least one member. The `bindings` in a `Policy`
1791
- # can refer to up to 1,500 members; up to 250 of these members can be Google
1792
- # groups. Each occurrence of a member counts towards these limits. For example,
1793
- # if the `bindings` grant 50 different roles to `user:alice@example.com`, and
1794
- # not to any other member, then you can add another 1,450 members to the `
1795
- # bindings` in the `Policy`.
1788
+ # Associates a list of `members`, or principals, with a `role`. Optionally, may
1789
+ # specify a `condition` that determines how and when the `bindings` are applied.
1790
+ # Each of the `bindings` must contain at least one principal. The `bindings` in
1791
+ # a `Policy` can refer to up to 1,500 principals; up to 250 of these principals
1792
+ # can be Google groups. Each occurrence of a principal counts towards these
1793
+ # limits. For example, if the `bindings` grant 50 different roles to `user:alice@
1794
+ # example.com`, and not to any other principal, then you can add another 1,450
1795
+ # principals to the `bindings` in the `Policy`.
1796
1796
  # Corresponds to the JSON property `bindings`
1797
1797
  # @return [Array<Google::Apis::SecuritycenterV1beta1::Binding>]
1798
1798
  attr_accessor :bindings
@@ -2012,31 +2012,31 @@ module Google
2012
2012
 
2013
2013
  # An Identity and Access Management (IAM) policy, which specifies access
2014
2014
  # controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
2015
- # A `binding` binds one or more `members` to a single `role`. Members can be
2016
- # user accounts, service accounts, Google groups, and domains (such as G Suite).
2017
- # A `role` is a named list of permissions; each `role` can be an IAM predefined
2018
- # role or a user-created custom role. For some types of Google Cloud resources,
2019
- # a `binding` can also specify a `condition`, which is a logical expression that
2020
- # allows access to a resource only if the expression evaluates to `true`. A
2021
- # condition can add constraints based on attributes of the request, the resource,
2022
- # or both. To learn which resources support conditions in their IAM policies,
2023
- # see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
2024
- # resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
2025
- # resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
2026
- # group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
2027
- # appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
2028
- # organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
2029
- # title": "expirable access", "description": "Does not grant access after Sep
2030
- # 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
2031
- # ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
2032
- # members: - user:mike@example.com - group:admins@example.com - domain:google.
2033
- # com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
2034
- # resourcemanager.organizationAdmin - members: - user:eve@example.com role:
2035
- # roles/resourcemanager.organizationViewer condition: title: expirable access
2036
- # description: Does not grant access after Sep 2020 expression: request.time <
2037
- # timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a
2038
- # description of IAM and its features, see the [IAM documentation](https://cloud.
2039
- # google.com/iam/docs/).
2015
+ # A `binding` binds one or more `members`, or principals, to a single `role`.
2016
+ # Principals can be user accounts, service accounts, Google groups, and domains (
2017
+ # such as G Suite). A `role` is a named list of permissions; each `role` can be
2018
+ # an IAM predefined role or a user-created custom role. For some types of Google
2019
+ # Cloud resources, a `binding` can also specify a `condition`, which is a
2020
+ # logical expression that allows access to a resource only if the expression
2021
+ # evaluates to `true`. A condition can add constraints based on attributes of
2022
+ # the request, the resource, or both. To learn which resources support
2023
+ # conditions in their IAM policies, see the [IAM documentation](https://cloud.
2024
+ # google.com/iam/help/conditions/resource-policies). **JSON example:** ` "
2025
+ # bindings": [ ` "role": "roles/resourcemanager.organizationAdmin", "members": [
2026
+ # "user:mike@example.com", "group:admins@example.com", "domain:google.com", "
2027
+ # serviceAccount:my-project-id@appspot.gserviceaccount.com" ] `, ` "role": "
2028
+ # roles/resourcemanager.organizationViewer", "members": [ "user:eve@example.com"
2029
+ # ], "condition": ` "title": "expirable access", "description": "Does not grant
2030
+ # access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:
2031
+ # 00:00.000Z')", ` ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:**
2032
+ # bindings: - members: - user:mike@example.com - group:admins@example.com -
2033
+ # domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com
2034
+ # role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.
2035
+ # com role: roles/resourcemanager.organizationViewer condition: title: expirable
2036
+ # access description: Does not grant access after Sep 2020 expression: request.
2037
+ # time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For
2038
+ # a description of IAM and its features, see the [IAM documentation](https://
2039
+ # cloud.google.com/iam/docs/).
2040
2040
  # Corresponds to the JSON property `policy`
2041
2041
  # @return [Google::Apis::SecuritycenterV1beta1::Policy]
2042
2042
  attr_accessor :policy
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SecuritycenterV1beta1
18
18
  # Version of the google-apis-securitycenter_v1beta1 gem
19
- GEM_VERSION = "0.9.0"
19
+ GEM_VERSION = "0.10.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.4.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20210930"
25
+ REVISION = "20211007"
26
26
  end
27
27
  end
28
28
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-securitycenter_v1beta1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.9.0
4
+ version: 0.10.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-10-11 00:00:00.000000000 Z
11
+ date: 2021-10-18 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1beta1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta1/v0.9.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-securitycenter_v1beta1/v0.10.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/master/generated/google-apis-securitycenter_v1beta1
63
63
  post_install_message:
64
64
  rdoc_options: []