google-cloud-asset 0.8.0 → 0.8.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7e59422bf47d4425f73d8d59dd7df5c8bd70a84329d62710630af7504f5c2f6f
4
- data.tar.gz: 81799e8c6ee4c14e9fdcafa8551e63bad3f94569d24660edd4e3ac1e7f1f3c1e
3
+ metadata.gz: b23e1c37b2cf4e37d7059ac5072c05e478b7a8b392718ff43c741fa27bea4da1
4
+ data.tar.gz: 8d666247dc812ec1ae7795f3ea99f09764578a4eb91364ec64242799c71f7a83
5
5
  SHA512:
6
- metadata.gz: 77eb3fa5f53d89a90049254f489bb867056495fbf9fa8f2d2d92022bb43348ad4053732e659db9b4e9483b5a7522953d7e9070f173563653913e4240d4cd1cb6
7
- data.tar.gz: 4d88e2b2e383ca35f2866588c30aaae9a5e725dee27dc883a8c2108a0295c6717dcb082c6746b532d79273f28d6cb8b8f3ba346b3f42af0ddbc257ae2f242eb5
6
+ metadata.gz: 380cd4741d89ecb4b822d6f009e7eaf7e3e4deff13a69415f9e79a818a164299ca9a77a1eb18c54d5b34b0a5722c1fdaa3794ef0260b173537c32e5607514eec
7
+ data.tar.gz: bd42fceb8151f4c7d4e030925e6774bb73178fefa9dffa030482c011daf0ec9c3c8d643d42048a5d4cdaf9621f3f4b51a6988dc50d3c0fb95981ccb11ae1db85
@@ -16,7 +16,7 @@
16
16
  module Google
17
17
  module Cloud
18
18
  module Asset
19
- VERSION = "0.8.0".freeze
19
+ VERSION = "0.8.1".freeze
20
20
  end
21
21
  end
22
22
  end
@@ -129,7 +129,7 @@ module Google
129
129
  # `constraints/serviceuser.services`, which has a `constraint_type` of
130
130
  # `list_constraint`, and with `constraint_default` set to `ALLOW`.
131
131
  # Suppose that at the Organization level, a `Policy` is applied that
132
- # restricts the allowed API activations to \\\{`E1`, `E2`\}. Then, if a
132
+ # restricts the allowed API activations to \\{`E1`, `E2`}. Then, if a
133
133
  # `Policy` is applied to a project below the Organization that has
134
134
  # `inherit_from_parent` set to `false` and field all_values set to DENY,
135
135
  # then an attempt to activate any API will be denied.
@@ -139,33 +139,33 @@ module Google
139
139
  #
140
140
  # Example 1 (no inherited values):
141
141
  # `organizations/foo` has a `Policy` with values:
142
- # \\\{allowed_values: "E1" allowed_values:"E2"\}
142
+ # \\{allowed_values: "E1" allowed_values:"E2"}
143
143
  # `projects/bar` has `inherit_from_parent` `false` and values:
144
- # \\\{allowed_values: "E3" allowed_values: "E4"\}
144
+ # \\{allowed_values: "E3" allowed_values: "E4"}
145
145
  # The accepted values at `organizations/foo` are `E1`, `E2`.
146
146
  # The accepted values at `projects/bar` are `E3`, and `E4`.
147
147
  #
148
148
  # Example 2 (inherited values):
149
149
  # `organizations/foo` has a `Policy` with values:
150
- # \\\{allowed_values: "E1" allowed_values:"E2"\}
150
+ # \\{allowed_values: "E1" allowed_values:"E2"}
151
151
  # `projects/bar` has a `Policy` with values:
152
- # \\\{value: "E3" value: "E4" inherit_from_parent: true\}
152
+ # \\{value: "E3" value: "E4" inherit_from_parent: true}
153
153
  # The accepted values at `organizations/foo` are `E1`, `E2`.
154
154
  # The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`.
155
155
  #
156
156
  # Example 3 (inheriting both allowed and denied values):
157
157
  # `organizations/foo` has a `Policy` with values:
158
- # \\\{allowed_values: "E1" allowed_values: "E2"\}
158
+ # \\{allowed_values: "E1" allowed_values: "E2"}
159
159
  # `projects/bar` has a `Policy` with:
160
- # \\\{denied_values: "E1"\}
160
+ # \\{denied_values: "E1"}
161
161
  # The accepted values at `organizations/foo` are `E1`, `E2`.
162
162
  # The value accepted at `projects/bar` is `E2`.
163
163
  #
164
164
  # Example 4 (RestoreDefault):
165
165
  # `organizations/foo` has a `Policy` with values:
166
- # \\\{allowed_values: "E1" allowed_values:"E2"\}
166
+ # \\{allowed_values: "E1" allowed_values:"E2"}
167
167
  # `projects/bar` has a `Policy` with values:
168
- # \\\{RestoreDefault: \\\{\}\}
168
+ # \\{RestoreDefault: \\{}}
169
169
  # The accepted values at `organizations/foo` are `E1`, `E2`.
170
170
  # The accepted values at `projects/bar` are either all or none depending on
171
171
  # the value of `constraint_default` (if `ALLOW`, all; if
@@ -180,28 +180,28 @@ module Google
180
180
  #
181
181
  # Example 6 (ListConstraint allowing all):
182
182
  # `organizations/foo` has a `Policy` with values:
183
- # \\\{allowed_values: "E1" allowed_values: "E2"\}
183
+ # \\{allowed_values: "E1" allowed_values: "E2"}
184
184
  # `projects/bar` has a `Policy` with:
185
- # \\\{all: ALLOW\}
185
+ # \\{all: ALLOW}
186
186
  # The accepted values at `organizations/foo` are `E1`, E2`.
187
187
  # Any value is accepted at `projects/bar`.
188
188
  #
189
189
  # Example 7 (ListConstraint allowing none):
190
190
  # `organizations/foo` has a `Policy` with values:
191
- # \\\{allowed_values: "E1" allowed_values: "E2"\}
191
+ # \\{allowed_values: "E1" allowed_values: "E2"}
192
192
  # `projects/bar` has a `Policy` with:
193
- # \\\{all: DENY\}
193
+ # \\{all: DENY}
194
194
  # The accepted values at `organizations/foo` are `E1`, E2`.
195
195
  # No value is accepted at `projects/bar`.
196
196
  #
197
197
  # Example 10 (allowed and denied subtrees of Resource Manager hierarchy):
198
198
  # Given the following resource hierarchy
199
- # O1->\\\{F1, F2\}; F1->\\\{P1\}; F2->\\\{P2, P3\},
199
+ # O1->\\{F1, F2}; F1->\\{P1}; F2->\\{P2, P3},
200
200
  # `organizations/foo` has a `Policy` with values:
201
- # \\\{allowed_values: "under:organizations/O1"\}
201
+ # \\{allowed_values: "under:organizations/O1"}
202
202
  # `projects/bar` has a `Policy` with:
203
- # \\\{allowed_values: "under:projects/P3"\}
204
- # \\\{denied_values: "under:folders/F2"\}
203
+ # \\{allowed_values: "under:projects/P3"}
204
+ # \\{denied_values: "under:folders/F2"}
205
205
  # The accepted values at `organizations/foo` are `organizations/O1`,
206
206
  # `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`,
207
207
  # `projects/P3`.
@@ -259,24 +259,24 @@ module Google
259
259
  #
260
260
  # Example 1 (nearest `Constraint` wins):
261
261
  # `organizations/foo` has a `Policy` with:
262
- # \\\{enforced: false\}
262
+ # \\{enforced: false}
263
263
  # `projects/bar` has no `Policy` set.
264
264
  # The constraint at `projects/bar` and `organizations/foo` will not be
265
265
  # enforced.
266
266
  #
267
267
  # Example 2 (enforcement gets replaced):
268
268
  # `organizations/foo` has a `Policy` with:
269
- # \\\{enforced: false\}
269
+ # \\{enforced: false}
270
270
  # `projects/bar` has a `Policy` with:
271
- # \\\{enforced: true\}
271
+ # \\{enforced: true}
272
272
  # The constraint at `organizations/foo` is not enforced.
273
273
  # The constraint at `projects/bar` is enforced.
274
274
  #
275
275
  # Example 3 (RestoreDefault):
276
276
  # `organizations/foo` has a `Policy` with:
277
- # \\\{enforced: true\}
277
+ # \\{enforced: true}
278
278
  # `projects/bar` has a `Policy` with:
279
- # \\\{RestoreDefault: \\\{\}\}
279
+ # \\{RestoreDefault: \\{}}
280
280
  # The constraint at `organizations/foo` is enforced.
281
281
  # The constraint at `projects/bar` is not enforced, because
282
282
  # `constraint_default` for the `Constraint` is `ALLOW`.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-asset
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.8.0
4
+ version: 0.8.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-03-11 00:00:00.000000000 Z
11
+ date: 2020-03-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-gax