2018-08-22 21:14:52 +00:00
|
|
|
# Copyright 2015 Google Inc.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
require 'date'
|
|
|
|
require 'google/apis/core/base_service'
|
|
|
|
require 'google/apis/core/json_representation'
|
|
|
|
require 'google/apis/core/hashable'
|
|
|
|
require 'google/apis/errors'
|
|
|
|
|
|
|
|
module Google
|
|
|
|
module Apis
|
|
|
|
module BinaryauthorizationV1beta1
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An admission rule specifies either that all container images used in a pod
|
|
|
|
# creation request must be attested to by one or more attestors, that all pod
|
|
|
|
# creations will be allowed, or that all pod creations will be denied. Images
|
|
|
|
# matching an admission whitelist pattern are exempted from admission rules and
|
|
|
|
# will never block a pod creation.
|
2018-08-22 21:14:52 +00:00
|
|
|
class AdmissionRule
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# Required. The action when a pod creation is denied by the admission rule.
|
|
|
|
# Corresponds to the JSON property `enforcementMode`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :enforcement_mode
|
|
|
|
|
|
|
|
# Required. How this admission rule will be evaluated.
|
|
|
|
# Corresponds to the JSON property `evaluationMode`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :evaluation_mode
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. The resource names of the attestors that must attest to a container
|
|
|
|
# image, in the format `projects/*/attestors/*`. Each attestor must exist before
|
|
|
|
# a policy can reference it. To add an attestor to a policy the principal
|
|
|
|
# issuing the policy change request must be able to read the attestor resource.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Note: this field must be non-empty when the evaluation_mode field specifies
|
|
|
|
# REQUIRE_ATTESTATION, otherwise it must be empty.
|
|
|
|
# Corresponds to the JSON property `requireAttestationsBy`
|
|
|
|
# @return [Array<String>]
|
|
|
|
attr_accessor :require_attestations_by
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@enforcement_mode = args[:enforcement_mode] if args.key?(:enforcement_mode)
|
|
|
|
@evaluation_mode = args[:evaluation_mode] if args.key?(:evaluation_mode)
|
|
|
|
@require_attestations_by = args[:require_attestations_by] if args.key?(:require_attestations_by)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An admission whitelist pattern exempts images from checks by admission rules.
|
2018-08-22 21:14:52 +00:00
|
|
|
class AdmissionWhitelistPattern
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
feat: Automated regeneration of binaryauthorization v1beta1 client (#1279)
This PR was generated using Autosynth. :rainbow:
<details><summary>Log from Synthtool</summary>
```
2020-10-24 01:44:58,190 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/google-api-ruby-client/synth.py.
On branch autosynth-binaryauthorization-v1beta1
nothing to commit, working tree clean
2020-10-24 01:44:58,221 synthtool [DEBUG] > Running: docker run --rm -v/home/kbuilder/.cache/synthtool/google-api-ruby-client:/workspace -v/var/run/docker.sock:/var/run/docker.sock -w /workspace --entrypoint script/synth.rb gcr.io/cloud-devrel-kokoro-resources/yoshi-ruby/autosynth binaryauthorization v1beta1
DEBUG:synthtool:Running: docker run --rm -v/home/kbuilder/.cache/synthtool/google-api-ruby-client:/workspace -v/var/run/docker.sock:/var/run/docker.sock -w /workspace --entrypoint script/synth.rb gcr.io/cloud-devrel-kokoro-resources/yoshi-ruby/autosynth binaryauthorization v1beta1
bundle install
Don't run Bundler as root. Bundler can ask for sudo if it is needed, and
installing your bundle as root will break this application for all non-root
users on this machine.
The dependency jruby-openssl (>= 0) will be unused by any of the platforms Bundler is installing for. Bundler is installing for ruby but the dependency is only for java. To add those platforms to the bundle, run `bundle lock --add-platform java`.
Fetching gem metadata from https://rubygems.org/.........
Fetching gem metadata from https://rubygems.org/.
Resolving dependencies...
Fetching rake 11.3.0
Installing rake 11.3.0
Fetching concurrent-ruby 1.1.7
Installing concurrent-ruby 1.1.7
Fetching i18n 1.8.5
Installing i18n 1.8.5
Fetching minitest 5.14.2
Installing minitest 5.14.2
Fetching thread_safe 0.3.6
Installing thread_safe 0.3.6
Fetching tzinfo 1.2.7
Installing tzinfo 1.2.7
Fetching activesupport 5.0.7.2
Installing activesupport 5.0.7.2
Fetching public_suffix 4.0.6
Installing public_suffix 4.0.6
Fetching addressable 2.7.0
Installing addressable 2.7.0
Fetching ast 2.4.1
Installing ast 2.4.1
Using bundler 2.1.4
Fetching byebug 11.1.3
Installing byebug 11.1.3 with native extensions
Fetching coderay 1.1.3
Installing coderay 1.1.3
Fetching json 2.3.1
Installing json 2.3.1 with native extensions
Fetching docile 1.3.2
Installing docile 1.3.2
Fetching simplecov-html 0.10.2
Installing simplecov-html 0.10.2
Fetching simplecov 0.16.1
Installing simplecov 0.16.1
Using sync 0.5.0
Fetching tins 1.26.0
Installing tins 1.26.0
Fetching term-ansicolor 1.7.1
Installing term-ansicolor 1.7.1
Fetching thor 0.20.3
Installing thor 0.20.3
Fetching coveralls 0.8.23
Installing coveralls 0.8.23
Fetching crack 0.4.4
Installing crack 0.4.4
Fetching declarative 0.0.20
Installing declarative 0.0.20
Fetching declarative-option 0.1.0
Installing declarative-option 0.1.0
Fetching diff-lcs 1.4.4
Installing diff-lcs 1.4.4
Fetching dotenv 2.7.6
Installing dotenv 2.7.6
Fetching fakefs 0.20.1
Installing fakefs 0.20.1
Fetching multipart-post 2.1.1
Installing multipart-post 2.1.1
Fetching ruby2_keywords 0.0.2
Installing ruby2_keywords 0.0.2
Fetching faraday 1.1.0
Installing faraday 1.1.0
Fetching github-markup 1.7.0
Installing github-markup 1.7.0
Fetching jwt 2.2.2
Installing jwt 2.2.2
Fetching memoist 0.16.2
Installing memoist 0.16.2
Fetching multi_json 1.15.0
Installing multi_json 1.15.0
Fetching os 0.9.6
Installing os 0.9.6
Fetching signet 0.14.0
Installing signet 0.14.0
Fetching googleauth 0.14.0
Installing googleauth 0.14.0
Fetching httpclient 2.8.3
Installing httpclient 2.8.3
Fetching mini_mime 1.0.2
Installing mini_mime 1.0.2
Fetching uber 0.1.0
Installing uber 0.1.0
Fetching representable 3.0.4
Installing representable 3.0.4
Fetching retriable 3.1.2
Installing retriable 3.1.2
Fetching rexml 3.2.4
Installing rexml 3.2.4
Using google-api-client 0.46.2 from source at `.`
Fetching google-id-token 1.4.2
Installing google-id-token 1.4.2
Fetching hashdiff 1.0.1
Installing hashdiff 1.0.1
Fetching mime-types-data 3.2020.0512
Installing mime-types-data 3.2020.0512
Fetching mime-types 3.3.1
Installing mime-types 3.3.1
Fetching multi_xml 0.6.0
Installing multi_xml 0.6.0
Fetching httparty 0.18.1
Installing httparty 0.18.1
Fetching rspec-support 3.9.4
Installing rspec-support 3.9.4
Fetching rspec-core 3.9.3
Installing rspec-core 3.9.3
Fetching rspec-expectations 3.9.3
Installing rspec-expectations 3.9.3
Fetching rspec-mocks 3.9.1
Installing rspec-mocks 3.9.1
Fetching rspec 3.9.0
Installing rspec 3.9.0
Fetching json_spec 1.1.5
Installing json_spec 1.1.5
Fetching launchy 2.5.0
Installing launchy 2.5.0
Fetching little-plugger 1.1.4
Installing little-plugger 1.1.4
Fetching logging 2.3.0
Installing logging 2.3.0
Fetching method_source 1.0.0
Installing method_source 1.0.0
Fetching opencensus 0.5.0
Installing opencensus 0.5.0
Fetching parallel 1.19.2
Installing parallel 1.19.2
Fetching parser 2.7.2.0
Installing parser 2.7.2.0
Fetching powerpack 0.1.2
Installing powerpack 0.1.2
Fetching pry 0.13.1
Installing pry 0.13.1
Fetching pry-byebug 3.9.0
Installing pry-byebug 3.9.0
Fetching yard 0.9.25
Installing yard 0.9.25
Fetching pry-doc 0.13.5
Installing pry-doc 0.13.5
Fetching rainbow 2.2.2
Installing rainbow 2.2.2 with native extensions
Fetching redcarpet 3.5.0
Installing redcarpet 3.5.0 with native extensions
Fetching redis 3.3.5
Installing redis 3.3.5
Fetching rmail 1.1.4
Installing rmail 1.1.4
Fetching ruby-progressbar 1.10.1
Installing ruby-progressbar 1.10.1
Fetching unicode-display_width 1.7.0
Installing unicode-display_width 1.7.0
Fetching rubocop 0.49.1
Installing rubocop 0.49.1
Fetching webmock 2.3.2
Installing webmock 2.3.2
Bundle complete! 30 Gemfile dependencies, 77 gems now installed.
Use `bundle info [gemname]` to see where a bundled gem is installed.
Post-install message from i18n:
HEADS UP! i18n 1.1 changed fallbacks to exclude default locale.
But that may break your application.
If you are upgrading your Rails application from an older version of Rails:
Please check your Rails app for 'config.i18n.fallbacks = true'.
If you're using I18n (>= 1.1.0) and Rails (< 5.2.2), this should be
'config.i18n.fallbacks = [I18n.default_locale]'.
If not, fallbacks will be broken in your app by I18n 1.1.x.
If you are starting a NEW Rails application, you can ignore this notice.
For more info see:
https://github.com/svenfuchs/i18n/releases/tag/v1.1.0
Post-install message from httparty:
When you HTTParty, you must party hard!
echo a | bundle exec bin/generate-api gen generated --api=binaryauthorization.v1beta1 --names-out=/workspace/api_names_out.yaml
Loading binaryauthorization, version v1beta1 from https://raw.githubusercontent.com/googleapis/discovery-artifact-manager/master/discoveries/binaryauthorization.v1beta1.json
conflict google/apis/binaryauthorization_v1beta1.rb
<ization_v1beta1.rb? (enter "h" for help) [Ynaqdhm] a
force google/apis/binaryauthorization_v1beta1.rb
identical google/apis/binaryauthorization_v1beta1/service.rb
conflict google/apis/binaryauthorization_v1beta1/classes.rb
force google/apis/binaryauthorization_v1beta1/classes.rb
identical google/apis/binaryauthorization_v1beta1/representations.rb
identical /workspace/api_names_out.yaml
2020-10-24 01:45:23,897 synthtool [DEBUG] > Wrote metadata to generated/google/apis/binaryauthorization_v1beta1/synth.metadata.
DEBUG:synthtool:Wrote metadata to generated/google/apis/binaryauthorization_v1beta1/synth.metadata.
```
</details>
Full log will be available here:
https://source.cloud.google.com/results/invocations/1a309532-b0b0-4f86-bcca-e4db8655a4b4/targets
- [ ] To automatically regenerate this PR, check this box.
2020-10-24 08:58:02 +00:00
|
|
|
# An image name pattern to allowlist, in the form `registry/path/to/image`. This
|
2020-08-13 00:39:19 +00:00
|
|
|
# supports a trailing `*` as a wildcard, but this is allowed only in text after
|
feat: Automated regeneration of binaryauthorization v1beta1 client (#1578)
This PR was generated using Autosynth. :rainbow:
<details><summary>Log from Synthtool</summary>
```
2020-11-20 01:47:01,251 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/google-api-ruby-client/synth.py.
On branch autosynth-binaryauthorization-v1beta1
nothing to commit, working tree clean
2020-11-20 01:47:01,282 synthtool [DEBUG] > Running: docker run --rm -v/home/kbuilder/.cache/synthtool/google-api-ruby-client:/workspace -v/var/run/docker.sock:/var/run/docker.sock -w /workspace --entrypoint script/synth.rb gcr.io/cloud-devrel-kokoro-resources/yoshi-ruby/autosynth binaryauthorization v1beta1
DEBUG:synthtool:Running: docker run --rm -v/home/kbuilder/.cache/synthtool/google-api-ruby-client:/workspace -v/var/run/docker.sock:/var/run/docker.sock -w /workspace --entrypoint script/synth.rb gcr.io/cloud-devrel-kokoro-resources/yoshi-ruby/autosynth binaryauthorization v1beta1
bundle install
Don't run Bundler as root. Bundler can ask for sudo if it is needed, and
installing your bundle as root will break this application for all non-root
users on this machine.
The dependency jruby-openssl (>= 0) will be unused by any of the platforms Bundler is installing for. Bundler is installing for ruby but the dependency is only for java. To add those platforms to the bundle, run `bundle lock --add-platform java`.
Fetching gem metadata from https://rubygems.org/.........
Fetching gem metadata from https://rubygems.org/.
Resolving dependencies...
Fetching rake 11.3.0
Installing rake 11.3.0
Fetching concurrent-ruby 1.1.7
Installing concurrent-ruby 1.1.7
Fetching i18n 1.8.5
Installing i18n 1.8.5
Fetching minitest 5.14.2
Installing minitest 5.14.2
Fetching thread_safe 0.3.6
Installing thread_safe 0.3.6
Fetching tzinfo 1.2.8
Installing tzinfo 1.2.8
Fetching activesupport 5.0.7.2
Installing activesupport 5.0.7.2
Fetching public_suffix 4.0.6
Installing public_suffix 4.0.6
Fetching addressable 2.7.0
Installing addressable 2.7.0
Fetching ast 2.4.1
Installing ast 2.4.1
Using bundler 2.1.4
Fetching byebug 11.1.3
Installing byebug 11.1.3 with native extensions
Fetching coderay 1.1.3
Installing coderay 1.1.3
Fetching json 2.3.1
Installing json 2.3.1 with native extensions
Fetching docile 1.3.2
Installing docile 1.3.2
Fetching simplecov-html 0.10.2
Installing simplecov-html 0.10.2
Fetching simplecov 0.16.1
Installing simplecov 0.16.1
Using sync 0.5.0
Fetching tins 1.26.0
Installing tins 1.26.0
Fetching term-ansicolor 1.7.1
Installing term-ansicolor 1.7.1
Fetching thor 0.20.3
Installing thor 0.20.3
Fetching coveralls 0.8.23
Installing coveralls 0.8.23
Fetching crack 0.4.4
Installing crack 0.4.4
Fetching declarative 0.0.20
Installing declarative 0.0.20
Fetching declarative-option 0.1.0
Installing declarative-option 0.1.0
Fetching diff-lcs 1.4.4
Installing diff-lcs 1.4.4
Fetching dotenv 2.7.6
Installing dotenv 2.7.6
Fetching fakefs 0.20.1
Installing fakefs 0.20.1
Fetching multipart-post 2.1.1
Installing multipart-post 2.1.1
Fetching ruby2_keywords 0.0.2
Installing ruby2_keywords 0.0.2
Fetching faraday 1.1.0
Installing faraday 1.1.0
Fetching gems 1.2.0
Installing gems 1.2.0
Fetching github-markup 1.7.0
Installing github-markup 1.7.0
Fetching jwt 2.2.2
Installing jwt 2.2.2
Fetching memoist 0.16.2
Installing memoist 0.16.2
Fetching multi_json 1.15.0
Installing multi_json 1.15.0
Fetching os 0.9.6
Installing os 0.9.6
Fetching signet 0.14.0
Installing signet 0.14.0
Fetching googleauth 0.14.0
Installing googleauth 0.14.0
Fetching httpclient 2.8.3
Installing httpclient 2.8.3
Fetching mini_mime 1.0.2
Installing mini_mime 1.0.2
Fetching uber 0.1.0
Installing uber 0.1.0
Fetching representable 3.0.4
Installing representable 3.0.4
Fetching retriable 3.1.2
Installing retriable 3.1.2
Fetching rexml 3.2.4
Installing rexml 3.2.4
Using google-api-client 0.50.0 from source at `.`
Fetching google-id-token 1.4.2
Installing google-id-token 1.4.2
Fetching hashdiff 1.0.1
Installing hashdiff 1.0.1
Fetching mime-types-data 3.2020.1104
Installing mime-types-data 3.2020.1104
Fetching mime-types 3.3.1
Installing mime-types 3.3.1
Fetching multi_xml 0.6.0
Installing multi_xml 0.6.0
Fetching httparty 0.18.1
Installing httparty 0.18.1
Fetching rspec-support 3.10.0
Installing rspec-support 3.10.0
Fetching rspec-core 3.10.0
Installing rspec-core 3.10.0
Fetching rspec-expectations 3.10.0
Installing rspec-expectations 3.10.0
Fetching rspec-mocks 3.10.0
Installing rspec-mocks 3.10.0
Fetching rspec 3.10.0
Installing rspec 3.10.0
Fetching json_spec 1.1.5
Installing json_spec 1.1.5
Fetching launchy 2.5.0
Installing launchy 2.5.0
Fetching little-plugger 1.1.4
Installing little-plugger 1.1.4
Fetching logging 2.3.0
Installing logging 2.3.0
Fetching method_source 1.0.0
Installing method_source 1.0.0
Fetching opencensus 0.5.0
Installing opencensus 0.5.0
Fetching parallel 1.20.0
Installing parallel 1.20.0
Fetching parser 2.7.2.0
Installing parser 2.7.2.0
Fetching powerpack 0.1.3
Installing powerpack 0.1.3
Fetching pry 0.13.1
Installing pry 0.13.1
Fetching pry-byebug 3.9.0
Installing pry-byebug 3.9.0
Fetching yard 0.9.25
Installing yard 0.9.25
Fetching pry-doc 0.13.5
Installing pry-doc 0.13.5
Fetching rainbow 2.2.2
Installing rainbow 2.2.2 with native extensions
Fetching redcarpet 3.5.0
Installing redcarpet 3.5.0 with native extensions
Fetching redis 3.3.5
Installing redis 3.3.5
Fetching rmail 1.1.4
Installing rmail 1.1.4
Fetching ruby-progressbar 1.10.1
Installing ruby-progressbar 1.10.1
Fetching unicode-display_width 1.7.0
Installing unicode-display_width 1.7.0
Fetching rubocop 0.49.1
Installing rubocop 0.49.1
Fetching webmock 2.3.2
Installing webmock 2.3.2
Bundle complete! 31 Gemfile dependencies, 78 gems now installed.
Use `bundle info [gemname]` to see where a bundled gem is installed.
Post-install message from i18n:
HEADS UP! i18n 1.1 changed fallbacks to exclude default locale.
But that may break your application.
If you are upgrading your Rails application from an older version of Rails:
Please check your Rails app for 'config.i18n.fallbacks = true'.
If you're using I18n (>= 1.1.0) and Rails (< 5.2.2), this should be
'config.i18n.fallbacks = [I18n.default_locale]'.
If not, fallbacks will be broken in your app by I18n 1.1.x.
If you are starting a NEW Rails application, you can ignore this notice.
For more info see:
https://github.com/svenfuchs/i18n/releases/tag/v1.1.0
Post-install message from httparty:
When you HTTParty, you must party hard!
echo a | bundle exec bin/generate-api gen generated --api=binaryauthorization.v1beta1 --names-out=/workspace/api_names_out.yaml
Loading binaryauthorization, version v1beta1 from https://raw.githubusercontent.com/googleapis/discovery-artifact-manager/master/discoveries/binaryauthorization.v1beta1.json
conflict google/apis/binaryauthorization_v1beta1.rb
<ization_v1beta1.rb? (enter "h" for help) [Ynaqdhm] a
force google/apis/binaryauthorization_v1beta1.rb
identical google/apis/binaryauthorization_v1beta1/service.rb
conflict google/apis/binaryauthorization_v1beta1/classes.rb
force google/apis/binaryauthorization_v1beta1/classes.rb
conflict google/apis/binaryauthorization_v1beta1/representations.rb
force google/apis/binaryauthorization_v1beta1/representations.rb
identical /workspace/api_names_out.yaml
2020-11-20 01:47:27,257 synthtool [DEBUG] > Wrote metadata to generated/google/apis/binaryauthorization_v1beta1/synth.metadata.
DEBUG:synthtool:Wrote metadata to generated/google/apis/binaryauthorization_v1beta1/synth.metadata.
```
</details>
Full log will be available here:
https://source.cloud.google.com/results/invocations/b5f831ab-8c8a-46eb-99da-ecea9021c44b/targets
- [ ] To automatically regenerate this PR, check this box.
2020-11-20 10:02:03 +00:00
|
|
|
# the `registry/` part. Also wildcards do not match `/`, i.e., gcr.io/nginx*
|
|
|
|
# matches gcr.io/nginx@latest, but it does not match gcr.io/nginx/image.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `namePattern`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :name_pattern
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@name_pattern = args[:name_pattern] if args.key?(:name_pattern)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-25 00:38:43 +00:00
|
|
|
# Occurrence that represents a single "attestation". The authenticity of an
|
|
|
|
# attestation can be verified using the attached signature. If the verifier
|
|
|
|
# trusts the public key of the signer, then verifying the signature is
|
|
|
|
# sufficient to establish trust. In this circumstance, the authority to which
|
|
|
|
# this attestation is attached is primarily useful for lookup (how to find this
|
|
|
|
# attestation if you already know the authority and artifact to be verified) and
|
|
|
|
# intent (for which authority this attestation was intended to sign.
|
|
|
|
class AttestationOccurrence
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# One or more JWTs encoding a self-contained attestation. Each JWT encodes the
|
|
|
|
# payload that it verifies within the JWT itself. Verifier implementation SHOULD
|
|
|
|
# ignore the `serialized_payload` field when verifying these JWTs. If only JWTs
|
|
|
|
# are present on this AttestationOccurrence, then the `serialized_payload`
|
|
|
|
# SHOULD be left empty. Each JWT SHOULD encode a claim specific to the `
|
|
|
|
# resource_uri` of this Occurrence, but this is not validated by Grafeas
|
|
|
|
# metadata API implementations. The JWT itself is opaque to Grafeas.
|
|
|
|
# Corresponds to the JSON property `jwts`
|
|
|
|
# @return [Array<Google::Apis::BinaryauthorizationV1beta1::Jwt>]
|
|
|
|
attr_accessor :jwts
|
|
|
|
|
|
|
|
# Required. The serialized payload that is verified by one or more `signatures`.
|
|
|
|
# Corresponds to the JSON property `serializedPayload`
|
|
|
|
# NOTE: Values are automatically base64 encoded/decoded in the client library.
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :serialized_payload
|
|
|
|
|
|
|
|
# One or more signatures over `serialized_payload`. Verifier implementations
|
|
|
|
# should consider this attestation message verified if at least one `signature`
|
|
|
|
# verifies `serialized_payload`. See `Signature` in common.proto for more
|
|
|
|
# details on signature structure and verification.
|
|
|
|
# Corresponds to the JSON property `signatures`
|
|
|
|
# @return [Array<Google::Apis::BinaryauthorizationV1beta1::Signature>]
|
|
|
|
attr_accessor :signatures
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@jwts = args[:jwts] if args.key?(:jwts)
|
|
|
|
@serialized_payload = args[:serialized_payload] if args.key?(:serialized_payload)
|
|
|
|
@signatures = args[:signatures] if args.key?(:signatures)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An attestor that attests to container image artifacts. An existing attestor
|
|
|
|
# cannot be modified except where indicated.
|
2018-08-22 21:14:52 +00:00
|
|
|
class Attestor
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. A descriptive comment. This field may be updated. The field may be
|
|
|
|
# displayed in chooser dialogs.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `description`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :description
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Required. The resource name, in the format: `projects/*/attestors/*`. This
|
|
|
|
# field may not be updated.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `name`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :name
|
|
|
|
|
|
|
|
# Output only. Time when the attestor was last updated.
|
|
|
|
# Corresponds to the JSON property `updateTime`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :update_time
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An user owned drydock note references a Drydock ATTESTATION_AUTHORITY Note
|
|
|
|
# created by the user.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `userOwnedDrydockNote`
|
|
|
|
# @return [Google::Apis::BinaryauthorizationV1beta1::UserOwnedDrydockNote]
|
|
|
|
attr_accessor :user_owned_drydock_note
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@description = args[:description] if args.key?(:description)
|
|
|
|
@name = args[:name] if args.key?(:name)
|
|
|
|
@update_time = args[:update_time] if args.key?(:update_time)
|
|
|
|
@user_owned_drydock_note = args[:user_owned_drydock_note] if args.key?(:user_owned_drydock_note)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An attestor public key that will be used to verify attestations signed by this
|
|
|
|
# attestor.
|
2018-08-22 21:14:52 +00:00
|
|
|
class AttestorPublicKey
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# ASCII-armored representation of a PGP public key, as the entire output by the
|
|
|
|
# command `gpg --export --armor foo@example.com` (either LF or CRLF line endings)
|
|
|
|
# . When using this field, `id` should be left blank. The BinAuthz API handlers
|
|
|
|
# will calculate the ID and fill it in automatically. BinAuthz computes this ID
|
|
|
|
# as the OpenPGP RFC4880 V4 fingerprint, represented as upper-case hex. If `id`
|
|
|
|
# is provided by the caller, it will be overwritten by the API-calculated ID.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `asciiArmoredPgpPublicKey`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :ascii_armored_pgp_public_key
|
|
|
|
|
|
|
|
# Optional. A descriptive comment. This field may be updated.
|
|
|
|
# Corresponds to the JSON property `comment`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :comment
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# The ID of this public key. Signatures verified by BinAuthz must include the ID
|
|
|
|
# of the public key that can be used to verify them, and that ID must match the
|
|
|
|
# contents of this field exactly. Additional restrictions on this field can be
|
|
|
|
# imposed based on which public key type is encapsulated. See the documentation
|
|
|
|
# on `public_key` cases below for details.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `id`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :id
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# A public key in the PkixPublicKey format (see https://tools.ietf.org/html/
|
|
|
|
# rfc5280#section-4.1.2.7 for details). Public keys of this type are typically
|
|
|
|
# textually encoded using the PEM format.
|
2019-03-21 00:37:30 +00:00
|
|
|
# Corresponds to the JSON property `pkixPublicKey`
|
|
|
|
# @return [Google::Apis::BinaryauthorizationV1beta1::PkixPublicKey]
|
|
|
|
attr_accessor :pkix_public_key
|
|
|
|
|
2018-08-22 21:14:52 +00:00
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@ascii_armored_pgp_public_key = args[:ascii_armored_pgp_public_key] if args.key?(:ascii_armored_pgp_public_key)
|
|
|
|
@comment = args[:comment] if args.key?(:comment)
|
|
|
|
@id = args[:id] if args.key?(:id)
|
2019-03-21 00:37:30 +00:00
|
|
|
@pkix_public_key = args[:pkix_public_key] if args.key?(:pkix_public_key)
|
2018-08-22 21:14:52 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Associates `members` with a `role`.
|
|
|
|
class Binding
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Represents a textual expression in the Common Expression Language (CEL) syntax.
|
|
|
|
# CEL is a C-like expression language. The syntax and semantics of CEL are
|
|
|
|
# documented at https://github.com/google/cel-spec. Example (Comparison): title:
|
|
|
|
# "Summary size limit" description: "Determines if a summary is less than 100
|
|
|
|
# chars" expression: "document.summary.size() < 100" Example (Equality): title: "
|
|
|
|
# Requestor is owner" description: "Determines if requestor is the document
|
|
|
|
# owner" expression: "document.owner == request.auth.claims.email" Example (
|
|
|
|
# Logic): title: "Public documents" description: "Determine whether the document
|
|
|
|
# should be publicly visible" expression: "document.type != 'private' &&
|
|
|
|
# document.type != 'internal'" Example (Data Manipulation): title: "Notification
|
|
|
|
# string" description: "Create a notification string with a timestamp."
|
|
|
|
# expression: "'New message received at ' + string(document.create_time)" The
|
|
|
|
# exact variables and functions that may be referenced within an expression are
|
|
|
|
# determined by the service that evaluates it. See the service documentation for
|
|
|
|
# additional information.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `condition`
|
|
|
|
# @return [Google::Apis::BinaryauthorizationV1beta1::Expr]
|
|
|
|
attr_accessor :condition
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Specifies the identities requesting access for a Cloud Platform resource. `
|
|
|
|
# members` can have the following values: * `allUsers`: A special identifier
|
|
|
|
# that represents anyone who is on the internet; with or without a Google
|
|
|
|
# account. * `allAuthenticatedUsers`: A special identifier that represents
|
|
|
|
# anyone who is authenticated with a Google account or a service account. * `
|
|
|
|
# user:`emailid``: An email address that represents a specific Google account.
|
|
|
|
# For example, `alice@example.com` . * `serviceAccount:`emailid``: An email
|
|
|
|
# address that represents a service account. For example, `my-other-app@appspot.
|
|
|
|
# gserviceaccount.com`. * `group:`emailid``: An email address that represents a
|
|
|
|
# Google group. For example, `admins@example.com`. * `deleted:user:`emailid`?uid=
|
|
|
|
# `uniqueid``: An email address (plus unique identifier) representing a user
|
|
|
|
# that has been recently deleted. For example, `alice@example.com?uid=
|
|
|
|
# 123456789012345678901`. If the user is recovered, this value reverts to `user:`
|
|
|
|
# emailid`` and the recovered user retains the role in the binding. * `deleted:
|
|
|
|
# serviceAccount:`emailid`?uid=`uniqueid``: An email address (plus unique
|
|
|
|
# identifier) representing a service account that has been recently deleted. For
|
|
|
|
# example, `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
|
|
|
|
# If the service account is undeleted, this value reverts to `serviceAccount:`
|
|
|
|
# emailid`` and the undeleted service account retains the role in the binding. *
|
|
|
|
# `deleted:group:`emailid`?uid=`uniqueid``: An email address (plus unique
|
|
|
|
# identifier) representing a Google group that has been recently deleted. For
|
|
|
|
# example, `admins@example.com?uid=123456789012345678901`. If the group is
|
|
|
|
# recovered, this value reverts to `group:`emailid`` and the recovered group
|
|
|
|
# retains the role in the binding. * `domain:`domain``: The G Suite domain (
|
|
|
|
# primary) that represents all the users of that domain. For example, `google.
|
|
|
|
# com` or `example.com`.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `members`
|
|
|
|
# @return [Array<String>]
|
|
|
|
attr_accessor :members
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`
|
|
|
|
# , or `roles/owner`.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `role`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :role
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@condition = args[:condition] if args.key?(:condition)
|
|
|
|
@members = args[:members] if args.key?(:members)
|
|
|
|
@role = args[:role] if args.key?(:role)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# A generic empty message that you can re-use to avoid defining duplicated empty
|
|
|
|
# messages in your APIs. A typical example is to use it as the request or the
|
|
|
|
# response type of an API method. For instance: service Foo ` rpc Bar(google.
|
|
|
|
# protobuf.Empty) returns (google.protobuf.Empty); ` The JSON representation for
|
|
|
|
# `Empty` is empty JSON object ````.
|
2018-08-22 21:14:52 +00:00
|
|
|
class Empty
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Represents a textual expression in the Common Expression Language (CEL) syntax.
|
|
|
|
# CEL is a C-like expression language. The syntax and semantics of CEL are
|
|
|
|
# documented at https://github.com/google/cel-spec. Example (Comparison): title:
|
|
|
|
# "Summary size limit" description: "Determines if a summary is less than 100
|
|
|
|
# chars" expression: "document.summary.size() < 100" Example (Equality): title: "
|
|
|
|
# Requestor is owner" description: "Determines if requestor is the document
|
|
|
|
# owner" expression: "document.owner == request.auth.claims.email" Example (
|
|
|
|
# Logic): title: "Public documents" description: "Determine whether the document
|
|
|
|
# should be publicly visible" expression: "document.type != 'private' &&
|
|
|
|
# document.type != 'internal'" Example (Data Manipulation): title: "Notification
|
|
|
|
# string" description: "Create a notification string with a timestamp."
|
|
|
|
# expression: "'New message received at ' + string(document.create_time)" The
|
|
|
|
# exact variables and functions that may be referenced within an expression are
|
|
|
|
# determined by the service that evaluates it. See the service documentation for
|
|
|
|
# additional information.
|
2018-08-22 21:14:52 +00:00
|
|
|
class Expr
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. Description of the expression. This is a longer text which describes
|
|
|
|
# the expression, e.g. when hovered over it in a UI.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `description`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :description
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Textual representation of an expression in Common Expression Language syntax.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `expression`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :expression
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. String indicating the location of the expression for error reporting,
|
|
|
|
# e.g. a file name and a position in the file.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `location`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :location
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. Title for the expression, i.e. a short string describing its purpose.
|
|
|
|
# This can be used e.g. in UIs which allow to enter the expression.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `title`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :title
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@description = args[:description] if args.key?(:description)
|
|
|
|
@expression = args[:expression] if args.key?(:expression)
|
|
|
|
@location = args[:location] if args.key?(:location)
|
|
|
|
@title = args[:title] if args.key?(:title)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-12-10 00:36:47 +00:00
|
|
|
# An Identity and Access Management (IAM) policy, which specifies access
|
2020-08-13 00:39:19 +00:00
|
|
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
|
|
|
# A `binding` binds one or more `members` to a single `role`. Members can be
|
|
|
|
# user accounts, service accounts, Google groups, and domains (such as G Suite).
|
|
|
|
# A `role` is a named list of permissions; each `role` can be an IAM predefined
|
|
|
|
# role or a user-created custom role. For some types of Google Cloud resources,
|
|
|
|
# a `binding` can also specify a `condition`, which is a logical expression that
|
|
|
|
# allows access to a resource only if the expression evaluates to `true`. A
|
|
|
|
# condition can add constraints based on attributes of the request, the resource,
|
|
|
|
# or both. To learn which resources support conditions in their IAM policies,
|
|
|
|
# see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
|
|
|
|
# resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
|
|
|
|
# resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
|
|
|
|
# group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
|
|
|
|
# appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
|
|
|
|
# organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
|
|
|
|
# title": "expirable access", "description": "Does not grant access after Sep
|
|
|
|
# 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
|
|
|
|
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
|
|
|
|
# members: - user:mike@example.com - group:admins@example.com - domain:google.
|
|
|
|
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
|
|
|
|
# resourcemanager.organizationAdmin - members: - user:eve@example.com role:
|
|
|
|
# roles/resourcemanager.organizationViewer condition: title: expirable access
|
|
|
|
# description: Does not grant access after Sep 2020 expression: request.time <
|
|
|
|
# timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
|
|
|
|
# description of IAM and its features, see the [IAM documentation](https://cloud.
|
|
|
|
# google.com/iam/docs/).
|
2018-08-22 21:14:52 +00:00
|
|
|
class IamPolicy
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Associates a list of `members` to a `role`. Optionally, may specify a `
|
|
|
|
# condition` that determines how and when the `bindings` are applied. Each of
|
|
|
|
# the `bindings` must contain at least one member.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `bindings`
|
|
|
|
# @return [Array<Google::Apis::BinaryauthorizationV1beta1::Binding>]
|
|
|
|
attr_accessor :bindings
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# `etag` is used for optimistic concurrency control as a way to help prevent
|
|
|
|
# simultaneous updates of a policy from overwriting each other. It is strongly
|
|
|
|
# suggested that systems make use of the `etag` in the read-modify-write cycle
|
|
|
|
# to perform policy updates in order to avoid race conditions: An `etag` is
|
|
|
|
# returned in the response to `getIamPolicy`, and systems are expected to put
|
|
|
|
# that etag in the request to `setIamPolicy` to ensure that their change will be
|
|
|
|
# applied to the same version of the policy. **Important:** If you use IAM
|
|
|
|
# Conditions, you must include the `etag` field whenever you call `setIamPolicy`.
|
|
|
|
# If you omit this field, then IAM allows you to overwrite a version `3` policy
|
|
|
|
# with a version `1` policy, and all of the conditions in the version `3` policy
|
|
|
|
# are lost.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `etag`
|
|
|
|
# NOTE: Values are automatically base64 encoded/decoded in the client library.
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :etag
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Specifies the format of the policy. Valid values are `0`, `1`, and `3`.
|
|
|
|
# Requests that specify an invalid value are rejected. Any operation that
|
|
|
|
# affects conditional role bindings must specify version `3`. This requirement
|
|
|
|
# applies to the following operations: * Getting a policy that includes a
|
|
|
|
# conditional role binding * Adding a conditional role binding to a policy *
|
|
|
|
# Changing a conditional role binding in a policy * Removing any role binding,
|
|
|
|
# with or without a condition, from a policy that includes conditions **
|
|
|
|
# Important:** If you use IAM Conditions, you must include the `etag` field
|
|
|
|
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows you
|
|
|
|
# to overwrite a version `3` policy with a version `1` policy, and all of the
|
|
|
|
# conditions in the version `3` policy are lost. If a policy does not include
|
|
|
|
# any conditions, operations on that policy may specify any valid version or
|
|
|
|
# leave the field unset. To learn which resources support conditions in their
|
|
|
|
# IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/
|
|
|
|
# conditions/resource-policies).
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `version`
|
|
|
|
# @return [Fixnum]
|
|
|
|
attr_accessor :version
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@bindings = args[:bindings] if args.key?(:bindings)
|
|
|
|
@etag = args[:etag] if args.key?(:etag)
|
|
|
|
@version = args[:version] if args.key?(:version)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-25 00:38:43 +00:00
|
|
|
#
|
|
|
|
class Jwt
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# The compact encoding of a JWS, which is always three base64 encoded strings
|
|
|
|
# joined by periods. For details, see: https://tools.ietf.org/html/rfc7515.html#
|
|
|
|
# section-3.1
|
|
|
|
# Corresponds to the JSON property `compactJwt`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :compact_jwt
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@compact_jwt = args[:compact_jwt] if args.key?(:compact_jwt)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-22 21:14:52 +00:00
|
|
|
# Response message for BinauthzManagementService.ListAttestors.
|
|
|
|
class ListAttestorsResponse
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# The list of attestors.
|
|
|
|
# Corresponds to the JSON property `attestors`
|
|
|
|
# @return [Array<Google::Apis::BinaryauthorizationV1beta1::Attestor>]
|
|
|
|
attr_accessor :attestors
|
|
|
|
|
|
|
|
# A token to retrieve the next page of results. Pass this value in the
|
2020-08-13 00:39:19 +00:00
|
|
|
# ListAttestorsRequest.page_token field in the subsequent call to the `
|
|
|
|
# ListAttestors` method to retrieve the next page of results.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `nextPageToken`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :next_page_token
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@attestors = args[:attestors] if args.key?(:attestors)
|
|
|
|
@next_page_token = args[:next_page_token] if args.key?(:next_page_token)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# A public key in the PkixPublicKey format (see https://tools.ietf.org/html/
|
|
|
|
# rfc5280#section-4.1.2.7 for details). Public keys of this type are typically
|
|
|
|
# textually encoded using the PEM format.
|
2019-03-21 00:37:30 +00:00
|
|
|
class PkixPublicKey
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#
|
|
|
|
# section-13
|
2019-03-21 00:37:30 +00:00
|
|
|
# Corresponds to the JSON property `publicKeyPem`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :public_key_pem
|
|
|
|
|
|
|
|
# The signature algorithm used to verify a message against a signature using
|
2020-08-13 00:39:19 +00:00
|
|
|
# this key. These signature algorithm must match the structure and any object
|
|
|
|
# identifiers encoded in `public_key_pem` (i.e. this algorithm must match that
|
|
|
|
# of the public key).
|
2019-03-21 00:37:30 +00:00
|
|
|
# Corresponds to the JSON property `signatureAlgorithm`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :signature_algorithm
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@public_key_pem = args[:public_key_pem] if args.key?(:public_key_pem)
|
|
|
|
@signature_algorithm = args[:signature_algorithm] if args.key?(:signature_algorithm)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-22 21:14:52 +00:00
|
|
|
# A policy for container image binary authorization.
|
|
|
|
class Policy
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
feat: Automated regeneration of binaryauthorization v1beta1 client (#1279)
This PR was generated using Autosynth. :rainbow:
<details><summary>Log from Synthtool</summary>
```
2020-10-24 01:44:58,190 synthtool [DEBUG] > Executing /home/kbuilder/.cache/synthtool/google-api-ruby-client/synth.py.
On branch autosynth-binaryauthorization-v1beta1
nothing to commit, working tree clean
2020-10-24 01:44:58,221 synthtool [DEBUG] > Running: docker run --rm -v/home/kbuilder/.cache/synthtool/google-api-ruby-client:/workspace -v/var/run/docker.sock:/var/run/docker.sock -w /workspace --entrypoint script/synth.rb gcr.io/cloud-devrel-kokoro-resources/yoshi-ruby/autosynth binaryauthorization v1beta1
DEBUG:synthtool:Running: docker run --rm -v/home/kbuilder/.cache/synthtool/google-api-ruby-client:/workspace -v/var/run/docker.sock:/var/run/docker.sock -w /workspace --entrypoint script/synth.rb gcr.io/cloud-devrel-kokoro-resources/yoshi-ruby/autosynth binaryauthorization v1beta1
bundle install
Don't run Bundler as root. Bundler can ask for sudo if it is needed, and
installing your bundle as root will break this application for all non-root
users on this machine.
The dependency jruby-openssl (>= 0) will be unused by any of the platforms Bundler is installing for. Bundler is installing for ruby but the dependency is only for java. To add those platforms to the bundle, run `bundle lock --add-platform java`.
Fetching gem metadata from https://rubygems.org/.........
Fetching gem metadata from https://rubygems.org/.
Resolving dependencies...
Fetching rake 11.3.0
Installing rake 11.3.0
Fetching concurrent-ruby 1.1.7
Installing concurrent-ruby 1.1.7
Fetching i18n 1.8.5
Installing i18n 1.8.5
Fetching minitest 5.14.2
Installing minitest 5.14.2
Fetching thread_safe 0.3.6
Installing thread_safe 0.3.6
Fetching tzinfo 1.2.7
Installing tzinfo 1.2.7
Fetching activesupport 5.0.7.2
Installing activesupport 5.0.7.2
Fetching public_suffix 4.0.6
Installing public_suffix 4.0.6
Fetching addressable 2.7.0
Installing addressable 2.7.0
Fetching ast 2.4.1
Installing ast 2.4.1
Using bundler 2.1.4
Fetching byebug 11.1.3
Installing byebug 11.1.3 with native extensions
Fetching coderay 1.1.3
Installing coderay 1.1.3
Fetching json 2.3.1
Installing json 2.3.1 with native extensions
Fetching docile 1.3.2
Installing docile 1.3.2
Fetching simplecov-html 0.10.2
Installing simplecov-html 0.10.2
Fetching simplecov 0.16.1
Installing simplecov 0.16.1
Using sync 0.5.0
Fetching tins 1.26.0
Installing tins 1.26.0
Fetching term-ansicolor 1.7.1
Installing term-ansicolor 1.7.1
Fetching thor 0.20.3
Installing thor 0.20.3
Fetching coveralls 0.8.23
Installing coveralls 0.8.23
Fetching crack 0.4.4
Installing crack 0.4.4
Fetching declarative 0.0.20
Installing declarative 0.0.20
Fetching declarative-option 0.1.0
Installing declarative-option 0.1.0
Fetching diff-lcs 1.4.4
Installing diff-lcs 1.4.4
Fetching dotenv 2.7.6
Installing dotenv 2.7.6
Fetching fakefs 0.20.1
Installing fakefs 0.20.1
Fetching multipart-post 2.1.1
Installing multipart-post 2.1.1
Fetching ruby2_keywords 0.0.2
Installing ruby2_keywords 0.0.2
Fetching faraday 1.1.0
Installing faraday 1.1.0
Fetching github-markup 1.7.0
Installing github-markup 1.7.0
Fetching jwt 2.2.2
Installing jwt 2.2.2
Fetching memoist 0.16.2
Installing memoist 0.16.2
Fetching multi_json 1.15.0
Installing multi_json 1.15.0
Fetching os 0.9.6
Installing os 0.9.6
Fetching signet 0.14.0
Installing signet 0.14.0
Fetching googleauth 0.14.0
Installing googleauth 0.14.0
Fetching httpclient 2.8.3
Installing httpclient 2.8.3
Fetching mini_mime 1.0.2
Installing mini_mime 1.0.2
Fetching uber 0.1.0
Installing uber 0.1.0
Fetching representable 3.0.4
Installing representable 3.0.4
Fetching retriable 3.1.2
Installing retriable 3.1.2
Fetching rexml 3.2.4
Installing rexml 3.2.4
Using google-api-client 0.46.2 from source at `.`
Fetching google-id-token 1.4.2
Installing google-id-token 1.4.2
Fetching hashdiff 1.0.1
Installing hashdiff 1.0.1
Fetching mime-types-data 3.2020.0512
Installing mime-types-data 3.2020.0512
Fetching mime-types 3.3.1
Installing mime-types 3.3.1
Fetching multi_xml 0.6.0
Installing multi_xml 0.6.0
Fetching httparty 0.18.1
Installing httparty 0.18.1
Fetching rspec-support 3.9.4
Installing rspec-support 3.9.4
Fetching rspec-core 3.9.3
Installing rspec-core 3.9.3
Fetching rspec-expectations 3.9.3
Installing rspec-expectations 3.9.3
Fetching rspec-mocks 3.9.1
Installing rspec-mocks 3.9.1
Fetching rspec 3.9.0
Installing rspec 3.9.0
Fetching json_spec 1.1.5
Installing json_spec 1.1.5
Fetching launchy 2.5.0
Installing launchy 2.5.0
Fetching little-plugger 1.1.4
Installing little-plugger 1.1.4
Fetching logging 2.3.0
Installing logging 2.3.0
Fetching method_source 1.0.0
Installing method_source 1.0.0
Fetching opencensus 0.5.0
Installing opencensus 0.5.0
Fetching parallel 1.19.2
Installing parallel 1.19.2
Fetching parser 2.7.2.0
Installing parser 2.7.2.0
Fetching powerpack 0.1.2
Installing powerpack 0.1.2
Fetching pry 0.13.1
Installing pry 0.13.1
Fetching pry-byebug 3.9.0
Installing pry-byebug 3.9.0
Fetching yard 0.9.25
Installing yard 0.9.25
Fetching pry-doc 0.13.5
Installing pry-doc 0.13.5
Fetching rainbow 2.2.2
Installing rainbow 2.2.2 with native extensions
Fetching redcarpet 3.5.0
Installing redcarpet 3.5.0 with native extensions
Fetching redis 3.3.5
Installing redis 3.3.5
Fetching rmail 1.1.4
Installing rmail 1.1.4
Fetching ruby-progressbar 1.10.1
Installing ruby-progressbar 1.10.1
Fetching unicode-display_width 1.7.0
Installing unicode-display_width 1.7.0
Fetching rubocop 0.49.1
Installing rubocop 0.49.1
Fetching webmock 2.3.2
Installing webmock 2.3.2
Bundle complete! 30 Gemfile dependencies, 77 gems now installed.
Use `bundle info [gemname]` to see where a bundled gem is installed.
Post-install message from i18n:
HEADS UP! i18n 1.1 changed fallbacks to exclude default locale.
But that may break your application.
If you are upgrading your Rails application from an older version of Rails:
Please check your Rails app for 'config.i18n.fallbacks = true'.
If you're using I18n (>= 1.1.0) and Rails (< 5.2.2), this should be
'config.i18n.fallbacks = [I18n.default_locale]'.
If not, fallbacks will be broken in your app by I18n 1.1.x.
If you are starting a NEW Rails application, you can ignore this notice.
For more info see:
https://github.com/svenfuchs/i18n/releases/tag/v1.1.0
Post-install message from httparty:
When you HTTParty, you must party hard!
echo a | bundle exec bin/generate-api gen generated --api=binaryauthorization.v1beta1 --names-out=/workspace/api_names_out.yaml
Loading binaryauthorization, version v1beta1 from https://raw.githubusercontent.com/googleapis/discovery-artifact-manager/master/discoveries/binaryauthorization.v1beta1.json
conflict google/apis/binaryauthorization_v1beta1.rb
<ization_v1beta1.rb? (enter "h" for help) [Ynaqdhm] a
force google/apis/binaryauthorization_v1beta1.rb
identical google/apis/binaryauthorization_v1beta1/service.rb
conflict google/apis/binaryauthorization_v1beta1/classes.rb
force google/apis/binaryauthorization_v1beta1/classes.rb
identical google/apis/binaryauthorization_v1beta1/representations.rb
identical /workspace/api_names_out.yaml
2020-10-24 01:45:23,897 synthtool [DEBUG] > Wrote metadata to generated/google/apis/binaryauthorization_v1beta1/synth.metadata.
DEBUG:synthtool:Wrote metadata to generated/google/apis/binaryauthorization_v1beta1/synth.metadata.
```
</details>
Full log will be available here:
https://source.cloud.google.com/results/invocations/1a309532-b0b0-4f86-bcca-e4db8655a4b4/targets
- [ ] To automatically regenerate this PR, check this box.
2020-10-24 08:58:02 +00:00
|
|
|
# Optional. Admission policy allowlisting. A matching admission request will
|
2020-08-13 00:39:19 +00:00
|
|
|
# always be permitted. This feature is typically used to exclude Google or third-
|
|
|
|
# party infrastructure images from Binary Authorization policies.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `admissionWhitelistPatterns`
|
|
|
|
# @return [Array<Google::Apis::BinaryauthorizationV1beta1::AdmissionWhitelistPattern>]
|
|
|
|
attr_accessor :admission_whitelist_patterns
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. Per-cluster admission rules. Cluster spec format: `location.
|
|
|
|
# clusterId`. There can be at most one admission rule per cluster spec. A `
|
|
|
|
# location` is either a compute zone (e.g. us-central1-a) or a region (e.g. us-
|
|
|
|
# central1). For `clusterId` syntax restrictions see https://cloud.google.com/
|
|
|
|
# container-engine/reference/rest/v1/projects.zones.clusters.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `clusterAdmissionRules`
|
|
|
|
# @return [Hash<String,Google::Apis::BinaryauthorizationV1beta1::AdmissionRule>]
|
|
|
|
attr_accessor :cluster_admission_rules
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An admission rule specifies either that all container images used in a pod
|
|
|
|
# creation request must be attested to by one or more attestors, that all pod
|
|
|
|
# creations will be allowed, or that all pod creations will be denied. Images
|
|
|
|
# matching an admission whitelist pattern are exempted from admission rules and
|
|
|
|
# will never block a pod creation.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `defaultAdmissionRule`
|
|
|
|
# @return [Google::Apis::BinaryauthorizationV1beta1::AdmissionRule]
|
|
|
|
attr_accessor :default_admission_rule
|
|
|
|
|
|
|
|
# Optional. A descriptive comment.
|
|
|
|
# Corresponds to the JSON property `description`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :description
|
|
|
|
|
2019-03-21 00:37:30 +00:00
|
|
|
# Optional. Controls the evaluation of a Google-maintained global admission
|
2020-08-13 00:39:19 +00:00
|
|
|
# policy for common system-level images. Images not covered by the global policy
|
|
|
|
# will be subject to the project admission policy. This setting has no effect
|
|
|
|
# when specified inside a global admission policy.
|
2019-03-21 00:37:30 +00:00
|
|
|
# Corresponds to the JSON property `globalPolicyEvaluationMode`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :global_policy_evaluation_mode
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Output only. The resource name, in the format `projects/*/policy`. There is at
|
|
|
|
# most one policy per project.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `name`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :name
|
|
|
|
|
|
|
|
# Output only. Time when the policy was last updated.
|
|
|
|
# Corresponds to the JSON property `updateTime`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :update_time
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@admission_whitelist_patterns = args[:admission_whitelist_patterns] if args.key?(:admission_whitelist_patterns)
|
|
|
|
@cluster_admission_rules = args[:cluster_admission_rules] if args.key?(:cluster_admission_rules)
|
|
|
|
@default_admission_rule = args[:default_admission_rule] if args.key?(:default_admission_rule)
|
|
|
|
@description = args[:description] if args.key?(:description)
|
2019-03-21 00:37:30 +00:00
|
|
|
@global_policy_evaluation_mode = args[:global_policy_evaluation_mode] if args.key?(:global_policy_evaluation_mode)
|
2018-08-22 21:14:52 +00:00
|
|
|
@name = args[:name] if args.key?(:name)
|
|
|
|
@update_time = args[:update_time] if args.key?(:update_time)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Request message for `SetIamPolicy` method.
|
|
|
|
class SetIamPolicyRequest
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2019-12-10 00:36:47 +00:00
|
|
|
# An Identity and Access Management (IAM) policy, which specifies access
|
2020-08-13 00:39:19 +00:00
|
|
|
# controls for Google Cloud resources. A `Policy` is a collection of `bindings`.
|
|
|
|
# A `binding` binds one or more `members` to a single `role`. Members can be
|
|
|
|
# user accounts, service accounts, Google groups, and domains (such as G Suite).
|
|
|
|
# A `role` is a named list of permissions; each `role` can be an IAM predefined
|
|
|
|
# role or a user-created custom role. For some types of Google Cloud resources,
|
|
|
|
# a `binding` can also specify a `condition`, which is a logical expression that
|
|
|
|
# allows access to a resource only if the expression evaluates to `true`. A
|
|
|
|
# condition can add constraints based on attributes of the request, the resource,
|
|
|
|
# or both. To learn which resources support conditions in their IAM policies,
|
|
|
|
# see the [IAM documentation](https://cloud.google.com/iam/help/conditions/
|
|
|
|
# resource-policies). **JSON example:** ` "bindings": [ ` "role": "roles/
|
|
|
|
# resourcemanager.organizationAdmin", "members": [ "user:mike@example.com", "
|
|
|
|
# group:admins@example.com", "domain:google.com", "serviceAccount:my-project-id@
|
|
|
|
# appspot.gserviceaccount.com" ] `, ` "role": "roles/resourcemanager.
|
|
|
|
# organizationViewer", "members": [ "user:eve@example.com" ], "condition": ` "
|
|
|
|
# title": "expirable access", "description": "Does not grant access after Sep
|
|
|
|
# 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", `
|
|
|
|
# ` ], "etag": "BwWWja0YfJA=", "version": 3 ` **YAML example:** bindings: -
|
|
|
|
# members: - user:mike@example.com - group:admins@example.com - domain:google.
|
|
|
|
# com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/
|
|
|
|
# resourcemanager.organizationAdmin - members: - user:eve@example.com role:
|
|
|
|
# roles/resourcemanager.organizationViewer condition: title: expirable access
|
|
|
|
# description: Does not grant access after Sep 2020 expression: request.time <
|
|
|
|
# timestamp('2020-10-01T00:00:00.000Z') - etag: BwWWja0YfJA= - version: 3 For a
|
|
|
|
# description of IAM and its features, see the [IAM documentation](https://cloud.
|
|
|
|
# google.com/iam/docs/).
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `policy`
|
|
|
|
# @return [Google::Apis::BinaryauthorizationV1beta1::IamPolicy]
|
|
|
|
attr_accessor :policy
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@policy = args[:policy] if args.key?(:policy)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-09-25 00:38:43 +00:00
|
|
|
# Verifiers (e.g. Kritis implementations) MUST verify signatures with respect to
|
|
|
|
# the trust anchors defined in policy (e.g. a Kritis policy). Typically this
|
|
|
|
# means that the verifier has been configured with a map from `public_key_id` to
|
|
|
|
# public key material (and any required parameters, e.g. signing algorithm). In
|
|
|
|
# particular, verification implementations MUST NOT treat the signature `
|
|
|
|
# public_key_id` as anything more than a key lookup hint. The `public_key_id`
|
|
|
|
# DOES NOT validate or authenticate a public key; it only provides a mechanism
|
|
|
|
# for quickly selecting a public key ALREADY CONFIGURED on the verifier through
|
|
|
|
# a trusted channel. Verification implementations MUST reject signatures in any
|
|
|
|
# of the following circumstances: * The `public_key_id` is not recognized by the
|
|
|
|
# verifier. * The public key that `public_key_id` refers to does not verify the
|
|
|
|
# signature with respect to the payload. The `signature` contents SHOULD NOT be "
|
|
|
|
# attached" (where the payload is included with the serialized `signature` bytes)
|
|
|
|
# . Verifiers MUST ignore any "attached" payload and only verify signatures with
|
|
|
|
# respect to explicitly provided payload (e.g. a `payload` field on the proto
|
|
|
|
# message that holds this Signature, or the canonical serialization of the proto
|
|
|
|
# message that holds this signature).
|
|
|
|
class Signature
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# The identifier for the public key that verifies this signature. * The `
|
|
|
|
# public_key_id` is required. * The `public_key_id` SHOULD be an RFC3986
|
|
|
|
# conformant URI. * When possible, the `public_key_id` SHOULD be an immutable
|
|
|
|
# reference, such as a cryptographic digest. Examples of valid `public_key_id`s:
|
|
|
|
# OpenPGP V4 public key fingerprint: * "openpgp4fpr:
|
|
|
|
# 74FAF3B861BDA0870C7B6DEF607E48D2A663AEEA" See https://www.iana.org/assignments/
|
|
|
|
# uri-schemes/prov/openpgp4fpr for more details on this scheme. RFC6920 digest-
|
|
|
|
# named SubjectPublicKeyInfo (digest of the DER serialization): * "ni:///sha-256;
|
|
|
|
# cD9o9Cq6LG3jD0iKXqEi_vdjJGecm_iXkbqVoScViaU" * "nih:///sha-256;
|
|
|
|
# 703f68f42aba2c6de30f488a5ea122fef76324679c9bf89791ba95a1271589a5"
|
|
|
|
# Corresponds to the JSON property `publicKeyId`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :public_key_id
|
|
|
|
|
|
|
|
# The content of the signature, an opaque bytestring. The payload that this
|
|
|
|
# signature verifies MUST be unambiguously provided with the Signature during
|
|
|
|
# verification. A wrapper message might provide the payload explicitly.
|
|
|
|
# Alternatively, a message might have a canonical serialization that can always
|
|
|
|
# be unambiguously computed to derive the payload.
|
|
|
|
# Corresponds to the JSON property `signature`
|
|
|
|
# NOTE: Values are automatically base64 encoded/decoded in the client library.
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :signature
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@public_key_id = args[:public_key_id] if args.key?(:public_key_id)
|
|
|
|
@signature = args[:signature] if args.key?(:signature)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-22 21:14:52 +00:00
|
|
|
# Request message for `TestIamPermissions` method.
|
|
|
|
class TestIamPermissionsRequest
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# The set of permissions to check for the `resource`. Permissions with wildcards
|
|
|
|
# (such as '*' or 'storage.*') are not allowed. For more information see [IAM
|
|
|
|
# Overview](https://cloud.google.com/iam/docs/overview#permissions).
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `permissions`
|
|
|
|
# @return [Array<String>]
|
|
|
|
attr_accessor :permissions
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@permissions = args[:permissions] if args.key?(:permissions)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Response message for `TestIamPermissions` method.
|
|
|
|
class TestIamPermissionsResponse
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# A subset of `TestPermissionsRequest.permissions` that the caller is allowed.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `permissions`
|
|
|
|
# @return [Array<String>]
|
|
|
|
attr_accessor :permissions
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@permissions = args[:permissions] if args.key?(:permissions)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# An user owned drydock note references a Drydock ATTESTATION_AUTHORITY Note
|
|
|
|
# created by the user.
|
2018-08-22 21:14:52 +00:00
|
|
|
class UserOwnedDrydockNote
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Output only. This field will contain the service account email address that
|
|
|
|
# this Attestor will use as the principal when querying Container Analysis.
|
|
|
|
# Attestor administrators must grant this service account the IAM role needed to
|
|
|
|
# read attestations from the note_reference in Container Analysis (`
|
|
|
|
# containeranalysis.notes.occurrences.viewer`). This email address is fixed for
|
|
|
|
# the lifetime of the Attestor, but callers should not make any other
|
|
|
|
# assumptions about the service account email; future versions may use an email
|
|
|
|
# based on a different naming pattern.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `delegationServiceAccountEmail`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :delegation_service_account_email
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Required. The Drydock resource name of a ATTESTATION_AUTHORITY Note, created
|
|
|
|
# by the user, in the format: `projects/*/notes/*` (or the legacy `providers/*/
|
|
|
|
# notes/*`). This field may not be updated. An attestation by this attestor is
|
|
|
|
# stored as a Drydock ATTESTATION_AUTHORITY Occurrence that names a container
|
|
|
|
# image and that links to this Note. Drydock is an external dependency.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `noteReference`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :note_reference
|
|
|
|
|
2020-08-13 00:39:19 +00:00
|
|
|
# Optional. Public keys that verify attestations signed by this attestor. This
|
|
|
|
# field may be updated. If this field is non-empty, one of the specified public
|
|
|
|
# keys must verify that an attestation was signed by this attestor for the image
|
|
|
|
# specified in the admission request. If this field is empty, this attestor
|
|
|
|
# always returns that no valid attestations exist.
|
2018-08-22 21:14:52 +00:00
|
|
|
# Corresponds to the JSON property `publicKeys`
|
|
|
|
# @return [Array<Google::Apis::BinaryauthorizationV1beta1::AttestorPublicKey>]
|
|
|
|
attr_accessor :public_keys
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@delegation_service_account_email = args[:delegation_service_account_email] if args.key?(:delegation_service_account_email)
|
|
|
|
@note_reference = args[:note_reference] if args.key?(:note_reference)
|
|
|
|
@public_keys = args[:public_keys] if args.key?(:public_keys)
|
|
|
|
end
|
|
|
|
end
|
2020-09-25 00:38:43 +00:00
|
|
|
|
|
|
|
# Request message for ValidationHelperV1.ValidateAttestationOccurrence.
|
|
|
|
class ValidateAttestationOccurrenceRequest
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# Occurrence that represents a single "attestation". The authenticity of an
|
|
|
|
# attestation can be verified using the attached signature. If the verifier
|
|
|
|
# trusts the public key of the signer, then verifying the signature is
|
|
|
|
# sufficient to establish trust. In this circumstance, the authority to which
|
|
|
|
# this attestation is attached is primarily useful for lookup (how to find this
|
|
|
|
# attestation if you already know the authority and artifact to be verified) and
|
|
|
|
# intent (for which authority this attestation was intended to sign.
|
|
|
|
# Corresponds to the JSON property `attestation`
|
|
|
|
# @return [Google::Apis::BinaryauthorizationV1beta1::AttestationOccurrence]
|
|
|
|
attr_accessor :attestation
|
|
|
|
|
|
|
|
# Required. The resource name of the Note to which the containing Occurrence is
|
|
|
|
# associated.
|
|
|
|
# Corresponds to the JSON property `occurrenceNote`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :occurrence_note
|
|
|
|
|
|
|
|
# Required. The URI of the artifact (e.g. container image) that is the subject
|
|
|
|
# of the containing Occurrence.
|
|
|
|
# Corresponds to the JSON property `occurrenceResourceUri`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :occurrence_resource_uri
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@attestation = args[:attestation] if args.key?(:attestation)
|
|
|
|
@occurrence_note = args[:occurrence_note] if args.key?(:occurrence_note)
|
|
|
|
@occurrence_resource_uri = args[:occurrence_resource_uri] if args.key?(:occurrence_resource_uri)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Response message for ValidationHelperV1.ValidateAttestationOccurrence.
|
|
|
|
class ValidateAttestationOccurrenceResponse
|
|
|
|
include Google::Apis::Core::Hashable
|
|
|
|
|
|
|
|
# The reason for denial if the Attestation couldn't be validated.
|
|
|
|
# Corresponds to the JSON property `denialReason`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :denial_reason
|
|
|
|
|
|
|
|
# The result of the Attestation validation.
|
|
|
|
# Corresponds to the JSON property `result`
|
|
|
|
# @return [String]
|
|
|
|
attr_accessor :result
|
|
|
|
|
|
|
|
def initialize(**args)
|
|
|
|
update!(**args)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Update properties of this object
|
|
|
|
def update!(**args)
|
|
|
|
@denial_reason = args[:denial_reason] if args.key?(:denial_reason)
|
|
|
|
@result = args[:result] if args.key?(:result)
|
|
|
|
end
|
|
|
|
end
|
2018-08-22 21:14:52 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|