Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 269e6aa

Browse files
committedMar 18, 2025
feat(binaryauthorization): update the api
#### binaryauthorization:v1 The following keys were added: - schemas.VerificationRule.properties.customConstraints.type (Total Keys: 1)
1 parent d8ecf8d commit 269e6aa

File tree

2 files changed

+11
-1
lines changed

2 files changed

+11
-1
lines changed
 

‎docs/dyn/binaryauthorization_v1.projects.platforms.policies.html

+6
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,7 @@ <h3>Method Details</h3>
170170
],
171171
},
172172
&quot;configBasedBuildRequired&quot;: True or False, # If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.
173+
&quot;customConstraints&quot;: &quot;A String&quot;, # Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.
173174
&quot;trustedBuilder&quot;: &quot;A String&quot;, # Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don&#x27;t need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
174175
&quot;trustedSourceRepoPatterns&quot;: [ # List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. `https://`). The patterns must not include schemes. For example, the pattern `source.cloud.google.com/my-project/my-repo-name` matches the following URLs: - `source.cloud.google.com/my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A pattern matches a URL either exactly or with `*` wildcards. `*` can be used in only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2. trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be used as wildcards and can only occur at the end of the pattern after a `/`. (So it&#x27;s not possible to match a URL that contains literal `*`.) For example: - `github.com/my-project/my-repo` is valid to match a single repo - `github.com/my-project/*` will match all direct repos in `my-project` - `github.com/**` matches all repos in GitHub
175176
&quot;A String&quot;,
@@ -288,6 +289,7 @@ <h3>Method Details</h3>
288289
],
289290
},
290291
&quot;configBasedBuildRequired&quot;: True or False, # If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.
292+
&quot;customConstraints&quot;: &quot;A String&quot;, # Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.
291293
&quot;trustedBuilder&quot;: &quot;A String&quot;, # Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don&#x27;t need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
292294
&quot;trustedSourceRepoPatterns&quot;: [ # List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. `https://`). The patterns must not include schemes. For example, the pattern `source.cloud.google.com/my-project/my-repo-name` matches the following URLs: - `source.cloud.google.com/my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A pattern matches a URL either exactly or with `*` wildcards. `*` can be used in only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2. trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be used as wildcards and can only occur at the end of the pattern after a `/`. (So it&#x27;s not possible to match a URL that contains literal `*`.) For example: - `github.com/my-project/my-repo` is valid to match a single repo - `github.com/my-project/*` will match all direct repos in `my-project` - `github.com/**` matches all repos in GitHub
293295
&quot;A String&quot;,
@@ -431,6 +433,7 @@ <h3>Method Details</h3>
431433
],
432434
},
433435
&quot;configBasedBuildRequired&quot;: True or False, # If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.
436+
&quot;customConstraints&quot;: &quot;A String&quot;, # Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.
434437
&quot;trustedBuilder&quot;: &quot;A String&quot;, # Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don&#x27;t need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
435438
&quot;trustedSourceRepoPatterns&quot;: [ # List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. `https://`). The patterns must not include schemes. For example, the pattern `source.cloud.google.com/my-project/my-repo-name` matches the following URLs: - `source.cloud.google.com/my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A pattern matches a URL either exactly or with `*` wildcards. `*` can be used in only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2. trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be used as wildcards and can only occur at the end of the pattern after a `/`. (So it&#x27;s not possible to match a URL that contains literal `*`.) For example: - `github.com/my-project/my-repo` is valid to match a single repo - `github.com/my-project/*` will match all direct repos in `my-project` - `github.com/**` matches all repos in GitHub
436439
&quot;A String&quot;,
@@ -560,6 +563,7 @@ <h3>Method Details</h3>
560563
],
561564
},
562565
&quot;configBasedBuildRequired&quot;: True or False, # If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.
566+
&quot;customConstraints&quot;: &quot;A String&quot;, # Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.
563567
&quot;trustedBuilder&quot;: &quot;A String&quot;, # Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don&#x27;t need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
564568
&quot;trustedSourceRepoPatterns&quot;: [ # List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. `https://`). The patterns must not include schemes. For example, the pattern `source.cloud.google.com/my-project/my-repo-name` matches the following URLs: - `source.cloud.google.com/my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A pattern matches a URL either exactly or with `*` wildcards. `*` can be used in only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2. trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be used as wildcards and can only occur at the end of the pattern after a `/`. (So it&#x27;s not possible to match a URL that contains literal `*`.) For example: - `github.com/my-project/my-repo` is valid to match a single repo - `github.com/my-project/*` will match all direct repos in `my-project` - `github.com/**` matches all repos in GitHub
565569
&quot;A String&quot;,
@@ -695,6 +699,7 @@ <h3>Method Details</h3>
695699
],
696700
},
697701
&quot;configBasedBuildRequired&quot;: True or False, # If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.
702+
&quot;customConstraints&quot;: &quot;A String&quot;, # Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.
698703
&quot;trustedBuilder&quot;: &quot;A String&quot;, # Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don&#x27;t need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
699704
&quot;trustedSourceRepoPatterns&quot;: [ # List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. `https://`). The patterns must not include schemes. For example, the pattern `source.cloud.google.com/my-project/my-repo-name` matches the following URLs: - `source.cloud.google.com/my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A pattern matches a URL either exactly or with `*` wildcards. `*` can be used in only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2. trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be used as wildcards and can only occur at the end of the pattern after a `/`. (So it&#x27;s not possible to match a URL that contains literal `*`.) For example: - `github.com/my-project/my-repo` is valid to match a single repo - `github.com/my-project/*` will match all direct repos in `my-project` - `github.com/**` matches all repos in GitHub
700705
&quot;A String&quot;,
@@ -812,6 +817,7 @@ <h3>Method Details</h3>
812817
],
813818
},
814819
&quot;configBasedBuildRequired&quot;: True or False, # If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.
820+
&quot;customConstraints&quot;: &quot;A String&quot;, # Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.
815821
&quot;trustedBuilder&quot;: &quot;A String&quot;, # Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don&#x27;t need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
816822
&quot;trustedSourceRepoPatterns&quot;: [ # List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. `https://`). The patterns must not include schemes. For example, the pattern `source.cloud.google.com/my-project/my-repo-name` matches the following URLs: - `source.cloud.google.com/my-project/my-repo-name` - `git+ssh://source.cloud.google.com/my-project/my-repo-name` - `https://source.cloud.google.com/my-project/my-repo-name` A pattern matches a URL either exactly or with `*` wildcards. `*` can be used in only two ways: 1. trailing `*` after hosturi/ to match varying endings; 2. trailing `**` after hosturi/ to match `/` as well. `*` and `**` can only be used as wildcards and can only occur at the end of the pattern after a `/`. (So it&#x27;s not possible to match a URL that contains literal `*`.) For example: - `github.com/my-project/my-repo` is valid to match a single repo - `github.com/my-project/*` will match all direct repos in `my-project` - `github.com/**` matches all repos in GitHub
817823
&quot;A String&quot;,

‎googleapiclient/discovery_cache/documents/binaryauthorization.v1.json

+5-1
Original file line numberDiff line numberDiff line change
@@ -747,7 +747,7 @@
747747
}
748748
}
749749
},
750-
"revision": "20250117",
750+
"revision": "20250311",
751751
"rootUrl": "https://binaryauthorization.googleapis.com/",
752752
"schemas": {
753753
"AdmissionRule": {
@@ -1820,6 +1820,10 @@
18201820
"description": "If true, require the image to be built from a top-level configuration. `trusted_source_repo_patterns` specifies the repositories containing this configuration.",
18211821
"type": "boolean"
18221822
},
1823+
"customConstraints": {
1824+
"description": "Optional. A CEL expression for specifying custom constraints on the provenance payload. This can be used when users want to specify expectations on provenance fields that are not covered by the general check. For example, users can use this field to require that certain parameters should never be used during the build process.",
1825+
"type": "string"
1826+
},
18231827
"trustedBuilder": {
18241828
"description": "Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).",
18251829
"enum": [

0 commit comments

Comments
 (0)
Please sign in to comment.