Bump version to 1.0.9; update JSON schemas; add new APIs

This commit is contained in:
Sebastian Thiel
2019-07-05 11:32:35 +08:00
parent 99e97ceece
commit e42ebc0c2b
2442 changed files with 190984 additions and 71186 deletions

View File

@@ -4,12 +4,12 @@
[package]
name = "google-binaryauthorization1_beta1"
version = "1.0.8+20190322"
version = "1.0.9+20190628"
authors = ["Sebastian Thiel <byronimo@gmail.com>"]
description = "A complete library to interact with Binary Authorization (protocol v1beta1)"
repository = "https://github.com/Byron/google-apis-rs/tree/master/gen/binaryauthorization1_beta1"
homepage = "https://cloud.google.com/binary-authorization/"
documentation = "https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322"
documentation = "https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628"
license = "MIT"
keywords = ["binaryauthorization", "google", "protocol", "web", "api"]
autobins = false

View File

@@ -6,7 +6,7 @@ DO NOT EDIT !
The MIT License (MIT)
=====================
Copyright © `2015-2016` `Sebastian Thiel`
Copyright © `2015-2019` `Sebastian Thiel`
Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation

View File

@@ -5,16 +5,16 @@ DO NOT EDIT !
-->
The `google-binaryauthorization1_beta1` library allows access to all features of the *Google Binary Authorization* service.
This documentation was generated from *Binary Authorization* crate version *1.0.8+20190322*, where *20190322* is the exact revision of the *binaryauthorization:v1beta1* schema built by the [mako](http://www.makotemplates.org/) code generator *v1.0.8*.
This documentation was generated from *Binary Authorization* crate version *1.0.9+20190628*, where *20190628* is the exact revision of the *binaryauthorization:v1beta1* schema built by the [mako](http://www.makotemplates.org/) code generator *v1.0.9*.
Everything else about the *Binary Authorization* *v1_beta1* API can be found at the
[official documentation site](https://cloud.google.com/binary-authorization/).
# Features
Handle the following *Resources* with ease from the central [hub](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.BinaryAuthorization.html) ...
Handle the following *Resources* with ease from the central [hub](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.BinaryAuthorization.html) ...
* projects
* [*attestors create*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorCreateCall.html), [*attestors delete*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorDeleteCall.html), [*attestors get*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorGetCall.html), [*attestors get iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorGetIamPolicyCall.html), [*attestors list*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorListCall.html), [*attestors set iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorSetIamPolicyCall.html), [*attestors test iam permissions*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorTestIamPermissionCall.html), [*attestors update*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectAttestorUpdateCall.html), [*get policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectGetPolicyCall.html), [*policy get iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectPolicyGetIamPolicyCall.html), [*policy set iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectPolicySetIamPolicyCall.html), [*policy test iam permissions*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectPolicyTestIamPermissionCall.html) and [*update policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.ProjectUpdatePolicyCall.html)
* [*attestors create*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorCreateCall.html), [*attestors delete*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorDeleteCall.html), [*attestors get*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorGetCall.html), [*attestors get iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorGetIamPolicyCall.html), [*attestors list*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorListCall.html), [*attestors set iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorSetIamPolicyCall.html), [*attestors test iam permissions*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorTestIamPermissionCall.html), [*attestors update*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectAttestorUpdateCall.html), [*get policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectGetPolicyCall.html), [*policy get iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectPolicyGetIamPolicyCall.html), [*policy set iam policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectPolicySetIamPolicyCall.html), [*policy test iam permissions*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectPolicyTestIamPermissionCall.html) and [*update policy*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.ProjectUpdatePolicyCall.html)
@@ -23,17 +23,17 @@ Handle the following *Resources* with ease from the central [hub](https://docs.r
The API is structured into the following primary items:
* **[Hub](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/struct.BinaryAuthorization.html)**
* **[Hub](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/struct.BinaryAuthorization.html)**
* a central object to maintain state and allow accessing all *Activities*
* creates [*Method Builders*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.MethodsBuilder.html) which in turn
allow access to individual [*Call Builders*](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.CallBuilder.html)
* **[Resources](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.Resource.html)**
* creates [*Method Builders*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.MethodsBuilder.html) which in turn
allow access to individual [*Call Builders*](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.CallBuilder.html)
* **[Resources](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.Resource.html)**
* primary types that you can apply *Activities* to
* a collection of properties and *Parts*
* **[Parts](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.Part.html)**
* **[Parts](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.Part.html)**
* a collection of properties
* never directly used in *Activities*
* **[Activities](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.CallBuilder.html)**
* **[Activities](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.CallBuilder.html)**
* operations to apply to *Resources*
All *structures* are marked with applicable traits to further categorize them and ease browsing.
@@ -133,17 +133,17 @@ match result {
```
## Handling Errors
All errors produced by the system are provided either as [Result](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/enum.Result.html) enumeration as return value of
All errors produced by the system are provided either as [Result](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/enum.Result.html) enumeration as return value of
the doit() methods, or handed as possibly intermediate results to either the
[Hub Delegate](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.Delegate.html), or the [Authenticator Delegate](https://docs.rs/yup-oauth2/*/yup_oauth2/trait.AuthenticatorDelegate.html).
[Hub Delegate](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.Delegate.html), or the [Authenticator Delegate](https://docs.rs/yup-oauth2/*/yup_oauth2/trait.AuthenticatorDelegate.html).
When delegates handle errors or intermediate values, they may have a chance to instruct the system to retry. This
makes the system potentially resilient to all kinds of errors.
## Uploads and Downloads
If a method supports downloads, the response body, which is part of the [Result](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/enum.Result.html), should be
If a method supports downloads, the response body, which is part of the [Result](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/enum.Result.html), should be
read by you to obtain the media.
If such a method also supports a [Response Result](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.ResponseResult.html), it will return that by default.
If such a method also supports a [Response Result](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.ResponseResult.html), it will return that by default.
You can see it as meta-data for the actual media. To trigger a media download, you will have to set up the builder by making
this call: `.param("alt", "media")`.
@@ -153,29 +153,29 @@ Methods supporting uploads can do so using up to 2 different protocols:
## Customization and Callbacks
You may alter the way an `doit()` method is called by providing a [delegate](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.Delegate.html) to the
[Method Builder](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.CallBuilder.html) before making the final `doit()` call.
You may alter the way an `doit()` method is called by providing a [delegate](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.Delegate.html) to the
[Method Builder](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.CallBuilder.html) before making the final `doit()` call.
Respective methods will be called to provide progress information, as well as determine whether the system should
retry on failure.
The [delegate trait](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.Delegate.html) is default-implemented, allowing you to customize it with minimal effort.
The [delegate trait](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.Delegate.html) is default-implemented, allowing you to customize it with minimal effort.
## Optional Parts in Server-Requests
All structures provided by this library are made to be [enocodable](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.RequestValue.html) and
[decodable](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.ResponseResult.html) via *json*. Optionals are used to indicate that partial requests are responses
All structures provided by this library are made to be [enocodable](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.RequestValue.html) and
[decodable](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.ResponseResult.html) via *json*. Optionals are used to indicate that partial requests are responses
are valid.
Most optionals are are considered [Parts](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.Part.html) which are identifiable by name, which will be sent to
Most optionals are are considered [Parts](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.Part.html) which are identifiable by name, which will be sent to
the server to indicate either the set parts of the request or the desired parts in the response.
## Builder Arguments
Using [method builders](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.CallBuilder.html), you are able to prepare an action call by repeatedly calling it's methods.
Using [method builders](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.CallBuilder.html), you are able to prepare an action call by repeatedly calling it's methods.
These will always take a single argument, for which the following statements are true.
* [PODs][wiki-pod] are handed by copy
* strings are passed as `&str`
* [request values](https://docs.rs/google-binaryauthorization1_beta1/1.0.8+20190322/google_binaryauthorization1_beta1/trait.RequestValue.html) are moved
* [request values](https://docs.rs/google-binaryauthorization1_beta1/1.0.9+20190628/google_binaryauthorization1_beta1/trait.RequestValue.html) are moved
Arguments will always be copied or cloned into the builder, to make them independent of their original life times.

View File

@@ -748,6 +748,17 @@ pub fn remove_json_null_values(value: &mut json::value::Value) {
map.remove(key);
}
}
json::value::Value::Array(ref mut arr) => {
let mut i = 0;
while i < arr.len() {
if arr[i].is_null() {
arr.remove(i);
} else {
remove_json_null_values(&mut arr[i]);
i += 1;
}
}
}
_ => {}
}
}

View File

@@ -2,7 +2,7 @@
// This file was generated automatically from 'src/mako/api/lib.rs.mako'
// DO NOT EDIT !
//! This documentation was generated from *Binary Authorization* crate version *1.0.8+20190322*, where *20190322* is the exact revision of the *binaryauthorization:v1beta1* schema built by the [mako](http://www.makotemplates.org/) code generator *v1.0.8*.
//! This documentation was generated from *Binary Authorization* crate version *1.0.9+20190628*, where *20190628* is the exact revision of the *binaryauthorization:v1beta1* schema built by the [mako](http://www.makotemplates.org/) code generator *v1.0.9*.
//!
//! Everything else about the *Binary Authorization* *v1_beta1* API can be found at the
//! [official documentation site](https://cloud.google.com/binary-authorization/).
@@ -220,9 +220,7 @@ use std::mem;
use std::thread::sleep;
use std::time::Duration;
pub use cmn::{MultiPartReader, ToParts, MethodInfo, Result, Error, CallBuilder, Hub, ReadSeek, Part,
ResponseResult, RequestValue, NestedType, Delegate, DefaultDelegate, MethodsBuilder,
Resource, ErrorResponse, remove_json_null_values};
pub use cmn::*;
// ##############
@@ -334,7 +332,7 @@ impl<'a, C, A> BinaryAuthorization<C, A>
BinaryAuthorization {
client: RefCell::new(client),
auth: RefCell::new(authenticator),
_user_agent: "google-api-rust-client/1.0.8".to_string(),
_user_agent: "google-api-rust-client/1.0.9".to_string(),
_base_url: "https://binaryauthorization.googleapis.com/".to_string(),
_root_url: "https://binaryauthorization.googleapis.com/".to_string(),
}
@@ -345,7 +343,7 @@ impl<'a, C, A> BinaryAuthorization<C, A>
}
/// Set the user-agent header field to use in all requests to the server.
/// It defaults to `google-api-rust-client/1.0.8`.
/// It defaults to `google-api-rust-client/1.0.9`.
///
/// Returns the previously set user-agent.
pub fn user_agent(&mut self, agent_name: String) -> String {
@@ -514,7 +512,7 @@ pub struct Binding {
/// For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
pub role: Option<String>,
/// The condition that is associated with this binding.
/// NOTE: an unsatisfied condition will not allow user access via current
/// NOTE: An unsatisfied condition will not allow user access via current
/// binding. Different bindings, including their conditions, are examined
/// independently.
pub condition: Option<Expr>,
@@ -1027,6 +1025,7 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
ProjectPolicyGetIamPolicyCall {
hub: self.hub,
_resource: resource.to_string(),
_options_requested_policy_version: Default::default(),
_delegate: Default::default(),
_scopes: Default::default(),
_additional_params: Default::default(),
@@ -1054,6 +1053,11 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
/// Create a builder to help you perform the following task:
///
/// A policy specifies the attestors that must attest to
/// a container image, before the project is allowed to deploy that
/// image. There is at most one policy per project. All image admission
/// requests are permitted if a project has no policy.
///
/// Gets the policy for this project. Returns a default
/// policy if the project does not have one.
///
@@ -1085,6 +1089,7 @@ impl<'a, C, A> ProjectMethods<'a, C, A> {
ProjectAttestorGetIamPolicyCall {
hub: self.hub,
_resource: resource.to_string(),
_options_requested_policy_version: Default::default(),
_delegate: Default::default(),
_scopes: Default::default(),
_additional_params: Default::default(),
@@ -2379,6 +2384,7 @@ impl<'a, C, A> ProjectAttestorTestIamPermissionCall<'a, C, A> where C: BorrowMut
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.projects().policy_get_iam_policy("resource")
/// .options_requested_policy_version(-81)
/// .doit();
/// # }
/// ```
@@ -2387,6 +2393,7 @@ pub struct ProjectPolicyGetIamPolicyCall<'a, C, A>
hub: &'a BinaryAuthorization<C, A>,
_resource: String,
_options_requested_policy_version: Option<i32>,
_delegate: Option<&'a mut Delegate>,
_additional_params: HashMap<String, String>,
_scopes: BTreeMap<String, ()>
@@ -2409,9 +2416,12 @@ impl<'a, C, A> ProjectPolicyGetIamPolicyCall<'a, C, A> where C: BorrowMut<hyper:
};
dlg.begin(MethodInfo { id: "binaryauthorization.projects.policy.getIamPolicy",
http_method: hyper::method::Method::Get });
let mut params: Vec<(&str, String)> = Vec::with_capacity(3 + self._additional_params.len());
let mut params: Vec<(&str, String)> = Vec::with_capacity(4 + self._additional_params.len());
params.push(("resource", self._resource.to_string()));
for &field in ["alt", "resource"].iter() {
if let Some(value) = self._options_requested_policy_version {
params.push(("options.requestedPolicyVersion", value.to_string()));
}
for &field in ["alt", "resource", "options.requestedPolicyVersion"].iter() {
if self._additional_params.contains_key(field) {
dlg.finished(false);
return Err(Error::FieldClash(field));
@@ -2537,6 +2547,16 @@ impl<'a, C, A> ProjectPolicyGetIamPolicyCall<'a, C, A> where C: BorrowMut<hyper:
self._resource = new_value.to_string();
self
}
/// Optional. The policy format version to be returned.
/// Acceptable values are 0 and 1.
/// If the value is 0, or the field is omitted, policy format version 1 will be
/// returned.
///
/// Sets the *options.requested policy version* query property to the given value.
pub fn options_requested_policy_version(mut self, new_value: i32) -> ProjectPolicyGetIamPolicyCall<'a, C, A> {
self._options_requested_policy_version = Some(new_value);
self
}
/// The delegate implementation is consulted whenever there is an intermediate result, or if something goes wrong
/// while executing the actual API request.
///
@@ -2850,6 +2870,11 @@ impl<'a, C, A> ProjectAttestorGetCall<'a, C, A> where C: BorrowMut<hyper::Client
}
/// A policy specifies the attestors that must attest to
/// a container image, before the project is allowed to deploy that
/// image. There is at most one policy per project. All image admission
/// requests are permitted if a project has no policy.
///
/// Gets the policy for this project. Returns a default
/// policy if the project does not have one.
///
@@ -3130,6 +3155,7 @@ impl<'a, C, A> ProjectGetPolicyCall<'a, C, A> where C: BorrowMut<hyper::Client>,
/// // execute the final call using `doit()`.
/// // Values shown here are possibly random and not representative !
/// let result = hub.projects().attestors_get_iam_policy("resource")
/// .options_requested_policy_version(-19)
/// .doit();
/// # }
/// ```
@@ -3138,6 +3164,7 @@ pub struct ProjectAttestorGetIamPolicyCall<'a, C, A>
hub: &'a BinaryAuthorization<C, A>,
_resource: String,
_options_requested_policy_version: Option<i32>,
_delegate: Option<&'a mut Delegate>,
_additional_params: HashMap<String, String>,
_scopes: BTreeMap<String, ()>
@@ -3160,9 +3187,12 @@ impl<'a, C, A> ProjectAttestorGetIamPolicyCall<'a, C, A> where C: BorrowMut<hype
};
dlg.begin(MethodInfo { id: "binaryauthorization.projects.attestors.getIamPolicy",
http_method: hyper::method::Method::Get });
let mut params: Vec<(&str, String)> = Vec::with_capacity(3 + self._additional_params.len());
let mut params: Vec<(&str, String)> = Vec::with_capacity(4 + self._additional_params.len());
params.push(("resource", self._resource.to_string()));
for &field in ["alt", "resource"].iter() {
if let Some(value) = self._options_requested_policy_version {
params.push(("options.requestedPolicyVersion", value.to_string()));
}
for &field in ["alt", "resource", "options.requestedPolicyVersion"].iter() {
if self._additional_params.contains_key(field) {
dlg.finished(false);
return Err(Error::FieldClash(field));
@@ -3288,6 +3318,16 @@ impl<'a, C, A> ProjectAttestorGetIamPolicyCall<'a, C, A> where C: BorrowMut<hype
self._resource = new_value.to_string();
self
}
/// Optional. The policy format version to be returned.
/// Acceptable values are 0 and 1.
/// If the value is 0, or the field is omitted, policy format version 1 will be
/// returned.
///
/// Sets the *options.requested policy version* query property to the given value.
pub fn options_requested_policy_version(mut self, new_value: i32) -> ProjectAttestorGetIamPolicyCall<'a, C, A> {
self._options_requested_policy_version = Some(new_value);
self
}
/// The delegate implementation is consulted whenever there is an intermediate result, or if something goes wrong
/// while executing the actual API request.
///