mirror of
https://github.com/OMGeeky/google-apis-rs.git
synced 2026-01-21 10:38:25 +01:00
update all code after version update
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
// This file was generated automatically from 'src/mako/api/lib.rs.mako'
|
||||
// DO NOT EDIT !
|
||||
|
||||
//! This documentation was generated from *Binary Authorization* crate version *1.0.13+20200327*, where *20200327* is the exact revision of the *binaryauthorization:v1beta1* schema built by the [mako](http://www.makotemplates.org/) code generator *v1.0.13*.
|
||||
//! This documentation was generated from *Binary Authorization* crate version *1.0.14+20200619*, where *20200619* is the exact revision of the *binaryauthorization:v1beta1* schema built by the [mako](http://www.makotemplates.org/) code generator *v1.0.14*.
|
||||
//!
|
||||
//! Everything else about the *Binary Authorization* *v1_beta1* API can be found at the
|
||||
//! [official documentation site](https://cloud.google.com/binary-authorization/).
|
||||
@@ -332,7 +332,7 @@ impl<'a, C, A> BinaryAuthorization<C, A>
|
||||
BinaryAuthorization {
|
||||
client: RefCell::new(client),
|
||||
auth: RefCell::new(authenticator),
|
||||
_user_agent: "google-api-rust-client/1.0.13".to_string(),
|
||||
_user_agent: "google-api-rust-client/1.0.14".to_string(),
|
||||
_base_url: "https://binaryauthorization.googleapis.com/".to_string(),
|
||||
_root_url: "https://binaryauthorization.googleapis.com/".to_string(),
|
||||
}
|
||||
@@ -343,7 +343,7 @@ impl<'a, C, A> BinaryAuthorization<C, A>
|
||||
}
|
||||
|
||||
/// Set the user-agent header field to use in all requests to the server.
|
||||
/// It defaults to `google-api-rust-client/1.0.13`.
|
||||
/// It defaults to `google-api-rust-client/1.0.14`.
|
||||
///
|
||||
/// Returns the previously set user-agent.
|
||||
pub fn user_agent(&mut self, agent_name: String) -> String {
|
||||
@@ -542,9 +542,17 @@ pub struct Binding {
|
||||
/// For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
|
||||
pub role: Option<String>,
|
||||
/// The condition that is associated with this binding.
|
||||
/// NOTE: An unsatisfied condition will not allow user access via current
|
||||
/// binding. Different bindings, including their conditions, are examined
|
||||
/// independently.
|
||||
///
|
||||
/// If the condition evaluates to `true`, then this binding applies to the
|
||||
/// current request.
|
||||
///
|
||||
/// If the condition evaluates to `false`, then this binding does not apply to
|
||||
/// the current request. However, a different role binding might grant the same
|
||||
/// role to one or more of the members in this binding.
|
||||
///
|
||||
/// To learn which resources support conditions in their IAM policies, see the
|
||||
/// [IAM
|
||||
/// documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
||||
pub condition: Option<Expr>,
|
||||
/// Specifies the identities requesting access for a Cloud Platform resource.
|
||||
/// `members` can have the following values:
|
||||
@@ -605,10 +613,12 @@ impl Part for Binding {}
|
||||
/// permissions; each `role` can be an IAM predefined role or a user-created
|
||||
/// custom role.
|
||||
///
|
||||
/// Optionally, a `binding` can specify a `condition`, which is a logical
|
||||
/// expression that allows access to a resource only if the expression evaluates
|
||||
/// to `true`. A condition can add constraints based on attributes of the
|
||||
/// request, the resource, or both.
|
||||
/// For some types of Google Cloud resources, a `binding` can also specify a
|
||||
/// `condition`, which is a logical expression that allows access to a resource
|
||||
/// only if the expression evaluates to `true`. A condition can add constraints
|
||||
/// based on attributes of the request, the resource, or both. To learn which
|
||||
/// resources support conditions in their IAM policies, see the
|
||||
/// [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
||||
///
|
||||
/// **JSON example:**
|
||||
///
|
||||
@@ -626,7 +636,9 @@ impl Part for Binding {}
|
||||
/// },
|
||||
/// {
|
||||
/// "role": "roles/resourcemanager.organizationViewer",
|
||||
/// "members": ["user:eve@example.com"],
|
||||
/// "members": [
|
||||
/// "user:eve@example.com"
|
||||
/// ],
|
||||
/// "condition": {
|
||||
/// "title": "expirable access",
|
||||
/// "description": "Does not grant access after Sep 2020",
|
||||
@@ -712,6 +724,9 @@ pub struct IamPolicy {
|
||||
///
|
||||
/// If a policy does not include any conditions, operations on that policy may
|
||||
/// specify any valid version or leave the field unset.
|
||||
///
|
||||
/// To learn which resources support conditions in their IAM policies, see the
|
||||
/// [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
||||
pub version: Option<i32>,
|
||||
}
|
||||
|
||||
@@ -1040,7 +1055,7 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
|
||||
/// Sets the access control policy on the specified resource. Replaces any
|
||||
/// existing policy.
|
||||
///
|
||||
/// Can return Public Errors: NOT_FOUND, INVALID_ARGUMENT and PERMISSION_DENIED
|
||||
/// Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors.
|
||||
///
|
||||
/// # Arguments
|
||||
///
|
||||
@@ -1085,7 +1100,7 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
|
||||
///
|
||||
/// Returns permissions that a caller has on the specified resource.
|
||||
/// If the resource does not exist, this will return an empty set of
|
||||
/// permissions, not a NOT_FOUND error.
|
||||
/// permissions, not a `NOT_FOUND` error.
|
||||
///
|
||||
/// Note: This operation is designed to be used for building permission-aware
|
||||
/// UIs and command-line tools, not for authorization checking. This operation
|
||||
@@ -1221,7 +1236,7 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
|
||||
/// Sets the access control policy on the specified resource. Replaces any
|
||||
/// existing policy.
|
||||
///
|
||||
/// Can return Public Errors: NOT_FOUND, INVALID_ARGUMENT and PERMISSION_DENIED
|
||||
/// Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors.
|
||||
///
|
||||
/// # Arguments
|
||||
///
|
||||
@@ -1283,7 +1298,7 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
|
||||
///
|
||||
/// Returns permissions that a caller has on the specified resource.
|
||||
/// If the resource does not exist, this will return an empty set of
|
||||
/// permissions, not a NOT_FOUND error.
|
||||
/// permissions, not a `NOT_FOUND` error.
|
||||
///
|
||||
/// Note: This operation is designed to be used for building permission-aware
|
||||
/// UIs and command-line tools, not for authorization checking. This operation
|
||||
@@ -1600,7 +1615,7 @@ impl<'a, C, A> ProjectAttestorListCall<'a, C, A> where C: BorrowMut<hyper::Clien
|
||||
/// Sets the access control policy on the specified resource. Replaces any
|
||||
/// existing policy.
|
||||
///
|
||||
/// Can return Public Errors: NOT_FOUND, INVALID_ARGUMENT and PERMISSION_DENIED
|
||||
/// Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors.
|
||||
///
|
||||
/// A builder for the *policy.setIamPolicy* method supported by a *project* resource.
|
||||
/// It is not used directly, but through a `ProjectMethods` instance.
|
||||
@@ -2188,7 +2203,7 @@ impl<'a, C, A> ProjectAttestorCreateCall<'a, C, A> where C: BorrowMut<hyper::Cli
|
||||
|
||||
/// Returns permissions that a caller has on the specified resource.
|
||||
/// If the resource does not exist, this will return an empty set of
|
||||
/// permissions, not a NOT_FOUND error.
|
||||
/// permissions, not a `NOT_FOUND` error.
|
||||
///
|
||||
/// Note: This operation is designed to be used for building permission-aware
|
||||
/// UIs and command-line tools, not for authorization checking. This operation
|
||||
@@ -2685,6 +2700,10 @@ impl<'a, C, A> ProjectPolicyGetIamPolicyCall<'a, C, A> where C: BorrowMut<hyper:
|
||||
/// Requests for policies with any conditional bindings must specify version 3.
|
||||
/// Policies without any conditional bindings may specify any valid value or
|
||||
/// leave the field unset.
|
||||
///
|
||||
/// To learn which resources support conditions in their IAM policies, see the
|
||||
/// [IAM
|
||||
/// documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
||||
///
|
||||
/// Sets the *options.requested policy version* query property to the given value.
|
||||
pub fn options_requested_policy_version(mut self, new_value: i32) -> ProjectPolicyGetIamPolicyCall<'a, C, A> {
|
||||
@@ -3478,6 +3497,10 @@ impl<'a, C, A> ProjectAttestorGetIamPolicyCall<'a, C, A> where C: BorrowMut<hype
|
||||
/// Requests for policies with any conditional bindings must specify version 3.
|
||||
/// Policies without any conditional bindings may specify any valid value or
|
||||
/// leave the field unset.
|
||||
///
|
||||
/// To learn which resources support conditions in their IAM policies, see the
|
||||
/// [IAM
|
||||
/// documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
|
||||
///
|
||||
/// Sets the *options.requested policy version* query property to the given value.
|
||||
pub fn options_requested_policy_version(mut self, new_value: i32) -> ProjectAttestorGetIamPolicyCall<'a, C, A> {
|
||||
@@ -3840,7 +3863,7 @@ impl<'a, C, A> ProjectUpdatePolicyCall<'a, C, A> where C: BorrowMut<hyper::Clien
|
||||
/// Sets the access control policy on the specified resource. Replaces any
|
||||
/// existing policy.
|
||||
///
|
||||
/// Can return Public Errors: NOT_FOUND, INVALID_ARGUMENT and PERMISSION_DENIED
|
||||
/// Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors.
|
||||
///
|
||||
/// A builder for the *attestors.setIamPolicy* method supported by a *project* resource.
|
||||
/// It is not used directly, but through a `ProjectMethods` instance.
|
||||
@@ -4671,7 +4694,7 @@ impl<'a, C, A> ProjectAttestorDeleteCall<'a, C, A> where C: BorrowMut<hyper::Cli
|
||||
|
||||
/// Returns permissions that a caller has on the specified resource.
|
||||
/// If the resource does not exist, this will return an empty set of
|
||||
/// permissions, not a NOT_FOUND error.
|
||||
/// permissions, not a `NOT_FOUND` error.
|
||||
///
|
||||
/// Note: This operation is designed to be used for building permission-aware
|
||||
/// UIs and command-line tools, not for authorization checking. This operation
|
||||
|
||||
Reference in New Issue
Block a user