google-cloud-asset 0.8.0 → 0.8.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7e59422bf47d4425f73d8d59dd7df5c8bd70a84329d62710630af7504f5c2f6f
4
- data.tar.gz: 81799e8c6ee4c14e9fdcafa8551e63bad3f94569d24660edd4e3ac1e7f1f3c1e
3
+ metadata.gz: b23e1c37b2cf4e37d7059ac5072c05e478b7a8b392718ff43c741fa27bea4da1
4
+ data.tar.gz: 8d666247dc812ec1ae7795f3ea99f09764578a4eb91364ec64242799c71f7a83
5
5
  SHA512:
6
- metadata.gz: 77eb3fa5f53d89a90049254f489bb867056495fbf9fa8f2d2d92022bb43348ad4053732e659db9b4e9483b5a7522953d7e9070f173563653913e4240d4cd1cb6
7
- data.tar.gz: 4d88e2b2e383ca35f2866588c30aaae9a5e725dee27dc883a8c2108a0295c6717dcb082c6746b532d79273f28d6cb8b8f3ba346b3f42af0ddbc257ae2f242eb5
6
+ metadata.gz: 380cd4741d89ecb4b822d6f009e7eaf7e3e4deff13a69415f9e79a818a164299ca9a77a1eb18c54d5b34b0a5722c1fdaa3794ef0260b173537c32e5607514eec
7
+ data.tar.gz: bd42fceb8151f4c7d4e030925e6774bb73178fefa9dffa030482c011daf0ec9c3c8d643d42048a5d4cdaf9621f3f4b51a6988dc50d3c0fb95981ccb11ae1db85
@@ -16,7 +16,7 @@
16
16
  module Google
17
17
  module Cloud
18
18
  module Asset
19
- VERSION = "0.8.0".freeze
19
+ VERSION = "0.8.1".freeze
20
20
  end
21
21
  end
22
22
  end
@@ -129,7 +129,7 @@ module Google
129
129
  # `constraints/serviceuser.services`, which has a `constraint_type` of
130
130
  # `list_constraint`, and with `constraint_default` set to `ALLOW`.
131
131
  # Suppose that at the Organization level, a `Policy` is applied that
132
- # restricts the allowed API activations to \\\{`E1`, `E2`\}. Then, if a
132
+ # restricts the allowed API activations to \\{`E1`, `E2`}. Then, if a
133
133
  # `Policy` is applied to a project below the Organization that has
134
134
  # `inherit_from_parent` set to `false` and field all_values set to DENY,
135
135
  # then an attempt to activate any API will be denied.
@@ -139,33 +139,33 @@ module Google
139
139
  #
140
140
  # Example 1 (no inherited values):
141
141
  # `organizations/foo` has a `Policy` with values:
142
- # \\\{allowed_values: "E1" allowed_values:"E2"\}
142
+ # \\{allowed_values: "E1" allowed_values:"E2"}
143
143
  # `projects/bar` has `inherit_from_parent` `false` and values:
144
- # \\\{allowed_values: "E3" allowed_values: "E4"\}
144
+ # \\{allowed_values: "E3" allowed_values: "E4"}
145
145
  # The accepted values at `organizations/foo` are `E1`, `E2`.
146
146
  # The accepted values at `projects/bar` are `E3`, and `E4`.
147
147
  #
148
148
  # Example 2 (inherited values):
149
149
  # `organizations/foo` has a `Policy` with values:
150
- # \\\{allowed_values: "E1" allowed_values:"E2"\}
150
+ # \\{allowed_values: "E1" allowed_values:"E2"}
151
151
  # `projects/bar` has a `Policy` with values:
152
- # \\\{value: "E3" value: "E4" inherit_from_parent: true\}
152
+ # \\{value: "E3" value: "E4" inherit_from_parent: true}
153
153
  # The accepted values at `organizations/foo` are `E1`, `E2`.
154
154
  # The accepted values at `projects/bar` are `E1`, `E2`, `E3`, and `E4`.
155
155
  #
156
156
  # Example 3 (inheriting both allowed and denied values):
157
157
  # `organizations/foo` has a `Policy` with values:
158
- # \\\{allowed_values: "E1" allowed_values: "E2"\}
158
+ # \\{allowed_values: "E1" allowed_values: "E2"}
159
159
  # `projects/bar` has a `Policy` with:
160
- # \\\{denied_values: "E1"\}
160
+ # \\{denied_values: "E1"}
161
161
  # The accepted values at `organizations/foo` are `E1`, `E2`.
162
162
  # The value accepted at `projects/bar` is `E2`.
163
163
  #
164
164
  # Example 4 (RestoreDefault):
165
165
  # `organizations/foo` has a `Policy` with values:
166
- # \\\{allowed_values: "E1" allowed_values:"E2"\}
166
+ # \\{allowed_values: "E1" allowed_values:"E2"}
167
167
  # `projects/bar` has a `Policy` with values:
168
- # \\\{RestoreDefault: \\\{\}\}
168
+ # \\{RestoreDefault: \\{}}
169
169
  # The accepted values at `organizations/foo` are `E1`, `E2`.
170
170
  # The accepted values at `projects/bar` are either all or none depending on
171
171
  # the value of `constraint_default` (if `ALLOW`, all; if
@@ -180,28 +180,28 @@ module Google
180
180
  #
181
181
  # Example 6 (ListConstraint allowing all):
182
182
  # `organizations/foo` has a `Policy` with values:
183
- # \\\{allowed_values: "E1" allowed_values: "E2"\}
183
+ # \\{allowed_values: "E1" allowed_values: "E2"}
184
184
  # `projects/bar` has a `Policy` with:
185
- # \\\{all: ALLOW\}
185
+ # \\{all: ALLOW}
186
186
  # The accepted values at `organizations/foo` are `E1`, E2`.
187
187
  # Any value is accepted at `projects/bar`.
188
188
  #
189
189
  # Example 7 (ListConstraint allowing none):
190
190
  # `organizations/foo` has a `Policy` with values:
191
- # \\\{allowed_values: "E1" allowed_values: "E2"\}
191
+ # \\{allowed_values: "E1" allowed_values: "E2"}
192
192
  # `projects/bar` has a `Policy` with:
193
- # \\\{all: DENY\}
193
+ # \\{all: DENY}
194
194
  # The accepted values at `organizations/foo` are `E1`, E2`.
195
195
  # No value is accepted at `projects/bar`.
196
196
  #
197
197
  # Example 10 (allowed and denied subtrees of Resource Manager hierarchy):
198
198
  # Given the following resource hierarchy
199
- # O1->\\\{F1, F2\}; F1->\\\{P1\}; F2->\\\{P2, P3\},
199
+ # O1->\\{F1, F2}; F1->\\{P1}; F2->\\{P2, P3},
200
200
  # `organizations/foo` has a `Policy` with values:
201
- # \\\{allowed_values: "under:organizations/O1"\}
201
+ # \\{allowed_values: "under:organizations/O1"}
202
202
  # `projects/bar` has a `Policy` with:
203
- # \\\{allowed_values: "under:projects/P3"\}
204
- # \\\{denied_values: "under:folders/F2"\}
203
+ # \\{allowed_values: "under:projects/P3"}
204
+ # \\{denied_values: "under:folders/F2"}
205
205
  # The accepted values at `organizations/foo` are `organizations/O1`,
206
206
  # `folders/F1`, `folders/F2`, `projects/P1`, `projects/P2`,
207
207
  # `projects/P3`.
@@ -259,24 +259,24 @@ module Google
259
259
  #
260
260
  # Example 1 (nearest `Constraint` wins):
261
261
  # `organizations/foo` has a `Policy` with:
262
- # \\\{enforced: false\}
262
+ # \\{enforced: false}
263
263
  # `projects/bar` has no `Policy` set.
264
264
  # The constraint at `projects/bar` and `organizations/foo` will not be
265
265
  # enforced.
266
266
  #
267
267
  # Example 2 (enforcement gets replaced):
268
268
  # `organizations/foo` has a `Policy` with:
269
- # \\\{enforced: false\}
269
+ # \\{enforced: false}
270
270
  # `projects/bar` has a `Policy` with:
271
- # \\\{enforced: true\}
271
+ # \\{enforced: true}
272
272
  # The constraint at `organizations/foo` is not enforced.
273
273
  # The constraint at `projects/bar` is enforced.
274
274
  #
275
275
  # Example 3 (RestoreDefault):
276
276
  # `organizations/foo` has a `Policy` with:
277
- # \\\{enforced: true\}
277
+ # \\{enforced: true}
278
278
  # `projects/bar` has a `Policy` with:
279
- # \\\{RestoreDefault: \\\{\}\}
279
+ # \\{RestoreDefault: \\{}}
280
280
  # The constraint at `organizations/foo` is enforced.
281
281
  # The constraint at `projects/bar` is not enforced, because
282
282
  # `constraint_default` for the `Constraint` is `ALLOW`.
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-asset
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.8.0
4
+ version: 0.8.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-03-11 00:00:00.000000000 Z
11
+ date: 2020-03-17 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-gax