Skip to content

Commit

Permalink
feat(policytroubleshooter)!: update the API
Browse files Browse the repository at this point in the history
BREAKING CHANGE: This release has breaking changes.
#### policytroubleshooter:v1beta
The following keys were deleted:
- schemas.GoogleIamV1Binding.properties.bindingId.type

#### policytroubleshooter:v1
The following keys were deleted:
- schemas.GoogleIamV1Binding.properties.bindingId.type
  • Loading branch information
yoshi-automation authored and sofisl committed Nov 11, 2020
1 parent 1eb31e0 commit 0517ae9
Show file tree
Hide file tree
Showing 4 changed files with 2 additions and 10 deletions.
5 changes: 1 addition & 4 deletions discovery/policytroubleshooter-v1.json
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@
}
}
},
"revision": "20201031",
"revision": "20201107",
"rootUrl": "https://policytroubleshooter.googleapis.com/",
"schemas": {
"GoogleCloudPolicytroubleshooterV1AccessTuple": {
Expand Down Expand Up @@ -422,9 +422,6 @@
"description": "Associates `members` with a `role`.",
"id": "GoogleIamV1Binding",
"properties": {
"bindingId": {
"type": "string"
},
"condition": {
"$ref": "GoogleTypeExpr",
"description": "The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies)."
Expand Down
5 changes: 1 addition & 4 deletions discovery/policytroubleshooter-v1beta.json
Original file line number Diff line number Diff line change
Expand Up @@ -128,7 +128,7 @@
}
}
},
"revision": "20201031",
"revision": "20201107",
"rootUrl": "https://policytroubleshooter.googleapis.com/",
"schemas": {
"GoogleCloudPolicytroubleshooterV1betaAccessTuple": {
Expand Down Expand Up @@ -422,9 +422,6 @@
"description": "Associates `members` with a `role`.",
"id": "GoogleIamV1Binding",
"properties": {
"bindingId": {
"type": "string"
},
"condition": {
"$ref": "GoogleTypeExpr",
"description": "The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies)."
Expand Down
1 change: 0 additions & 1 deletion src/apis/policytroubleshooter/v1.ts
Original file line number Diff line number Diff line change
Expand Up @@ -267,7 +267,6 @@ export namespace policytroubleshooter_v1 {
* Associates `members` with a `role`.
*/
export interface Schema$GoogleIamV1Binding {
bindingId?: string | null;
/**
* The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
*/
Expand Down
1 change: 0 additions & 1 deletion src/apis/policytroubleshooter/v1beta.ts
Original file line number Diff line number Diff line change
Expand Up @@ -267,7 +267,6 @@ export namespace policytroubleshooter_v1beta {
* Associates `members` with a `role`.
*/
export interface Schema$GoogleIamV1Binding {
bindingId?: string | null;
/**
* The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
*/
Expand Down

0 comments on commit 0517ae9

Please sign in to comment.