Skip to content

Commit

Permalink
feat(servicemanagement)!: update the API
Browse files Browse the repository at this point in the history
BREAKING CHANGE: This release has breaking changes.
#### servicemanagement:v1
The following keys were deleted:
- schemas.Binding.properties.bindingId.type

The following keys were changed:
- schemas.AuthProvider.properties.jwksUri.description
  • Loading branch information
yoshi-automation authored and sofisl committed Nov 11, 2020
1 parent a9cce23 commit 997750d
Show file tree
Hide file tree
Showing 2 changed files with 3 additions and 7 deletions.
7 changes: 2 additions & 5 deletions discovery/servicemanagement-v1.json
Original file line number Diff line number Diff line change
Expand Up @@ -857,7 +857,7 @@
}
}
},
"revision": "20201103",
"revision": "20201106",
"rootUrl": "https://servicemanagement.googleapis.com/",
"schemas": {
"Advice": {
Expand Down Expand Up @@ -992,7 +992,7 @@
"type": "string"
},
"jwksUri": {
"description": "URL of the provider's public key set to validate signature of the JWT. See [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). Optional if the key set document: - can be retrieved from [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html of the issuer. - can be inferred from the email domain of the issuer (e.g. a Google service account). Example: https://www.googleapis.com/oauth2/v1/certs",
"description": "URL of the provider's public key set to validate signature of the JWT. See [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). Optional if the key set document: - can be retrieved from [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html) of the issuer. - can be inferred from the email domain of the issuer (e.g. a Google service account). Example: https://www.googleapis.com/oauth2/v1/certs",
"type": "string"
},
"jwtLocations": {
Expand Down Expand Up @@ -1172,9 +1172,6 @@
"description": "Associates `members` with a `role`.",
"id": "Binding",
"properties": {
"bindingId": {
"type": "string"
},
"condition": {
"$ref": "Expr",
"description": "The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies)."
Expand Down
3 changes: 1 addition & 2 deletions src/apis/servicemanagement/v1.ts
Original file line number Diff line number Diff line change
Expand Up @@ -248,7 +248,7 @@ export namespace servicemanagement_v1 {
*/
issuer?: string | null;
/**
* URL of the provider's public key set to validate signature of the JWT. See [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). Optional if the key set document: - can be retrieved from [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html of the issuer. - can be inferred from the email domain of the issuer (e.g. a Google service account). Example: https://www.googleapis.com/oauth2/v1/certs
* URL of the provider's public key set to validate signature of the JWT. See [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). Optional if the key set document: - can be retrieved from [OpenID Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html) of the issuer. - can be inferred from the email domain of the issuer (e.g. a Google service account). Example: https://www.googleapis.com/oauth2/v1/certs
*/
jwksUri?: string | null;
/**
Expand Down Expand Up @@ -342,7 +342,6 @@ export namespace servicemanagement_v1 {
* Associates `members` with a `role`.
*/
export interface Schema$Binding {
bindingId?: string | null;
/**
* The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
*/
Expand Down

0 comments on commit 997750d

Please sign in to comment.