| Index: generated/googleapis_beta/lib/cloudkms/v1beta1.dart
|
| diff --git a/generated/googleapis_beta/lib/cloudkms/v1beta1.dart b/generated/googleapis_beta/lib/cloudkms/v1beta1.dart
|
| index cdb194bdd04c6972f1ba633c635e1ea34fce2fe4..45235334ca392a3256ab28754b3aad704565cd64 100644
|
| --- a/generated/googleapis_beta/lib/cloudkms/v1beta1.dart
|
| +++ b/generated/googleapis_beta/lib/cloudkms/v1beta1.dart
|
| @@ -98,12 +98,12 @@ class ProjectsLocationsResourceApi {
|
| * [name] - The resource that owns the locations collection, if applicable.
|
| * Value must have pattern "^projects/[^/]+$".
|
| *
|
| - * [filter] - The standard list filter.
|
| - *
|
| * [pageToken] - The standard list page token.
|
| *
|
| * [pageSize] - The standard list page size.
|
| *
|
| + * [filter] - The standard list filter.
|
| + *
|
| * Completes with a [ListLocationsResponse].
|
| *
|
| * Completes with a [commons.ApiRequestError] if the API endpoint returned an
|
| @@ -112,7 +112,7 @@ class ProjectsLocationsResourceApi {
|
| * If the used [http.Client] completes with an error when making a REST call,
|
| * this method will complete with the same error.
|
| */
|
| - async.Future<ListLocationsResponse> list(core.String name, {core.String filter, core.String pageToken, core.int pageSize}) {
|
| + async.Future<ListLocationsResponse> list(core.String name, {core.String pageToken, core.int pageSize, core.String filter}) {
|
| var _url = null;
|
| var _queryParams = new core.Map();
|
| var _uploadMedia = null;
|
| @@ -123,15 +123,15 @@ class ProjectsLocationsResourceApi {
|
| if (name == null) {
|
| throw new core.ArgumentError("Parameter name is required.");
|
| }
|
| - if (filter != null) {
|
| - _queryParams["filter"] = [filter];
|
| - }
|
| if (pageToken != null) {
|
| _queryParams["pageToken"] = [pageToken];
|
| }
|
| if (pageSize != null) {
|
| _queryParams["pageSize"] = ["${pageSize}"];
|
| }
|
| + if (filter != null) {
|
| + _queryParams["filter"] = [filter];
|
| + }
|
|
|
| _url = 'v1beta1/' + commons.Escaper.ecapeVariableReserved('$name') + '/locations';
|
|
|
| @@ -403,6 +403,10 @@ class ProjectsLocationsKeyRingsResourceApi {
|
| * If the resource does not exist, this will return an empty set of
|
| * permissions, not a NOT_FOUND error.
|
| *
|
| + * Note: This operation is designed to be used for building permission-aware
|
| + * UIs and command-line tools, not for authorization checking. This operation
|
| + * may "fail open" without warning.
|
| + *
|
| * [request] - The metadata request object.
|
| *
|
| * Request parameters:
|
| @@ -863,6 +867,10 @@ class ProjectsLocationsKeyRingsCryptoKeysResourceApi {
|
| * If the resource does not exist, this will return an empty set of
|
| * permissions, not a NOT_FOUND error.
|
| *
|
| + * Note: This operation is designed to be used for building permission-aware
|
| + * UIs and command-line tools, not for authorization checking. This operation
|
| + * may "fail open" without warning.
|
| + *
|
| * [request] - The metadata request object.
|
| *
|
| * Request parameters:
|
| @@ -1292,6 +1300,50 @@ class ProjectsLocationsKeyRingsCryptoKeysCryptoKeyVersionsResourceApi {
|
| * It consists of which permission types are logged, and what identities, if
|
| * any, are exempted from logging.
|
| * An AuditConifg must have one or more AuditLogConfigs.
|
| + *
|
| + * If there are AuditConfigs for both `allServices` and a specific service,
|
| + * the union of the two AuditConfigs is used for that service: the log_types
|
| + * specified in each AuditConfig are enabled, and the exempted_members in each
|
| + * AuditConfig are exempted.
|
| + * Example Policy with multiple AuditConfigs:
|
| + * {
|
| + * "audit_configs": [
|
| + * {
|
| + * "service": "allServices"
|
| + * "audit_log_configs": [
|
| + * {
|
| + * "log_type": "DATA_READ",
|
| + * "exempted_members": [
|
| + * "user:foo@gmail.com"
|
| + * ]
|
| + * },
|
| + * {
|
| + * "log_type": "DATA_WRITE",
|
| + * },
|
| + * {
|
| + * "log_type": "ADMIN_READ",
|
| + * }
|
| + * ]
|
| + * },
|
| + * {
|
| + * "service": "fooservice@googleapis.com"
|
| + * "audit_log_configs": [
|
| + * {
|
| + * "log_type": "DATA_READ",
|
| + * },
|
| + * {
|
| + * "log_type": "DATA_WRITE",
|
| + * "exempted_members": [
|
| + * "user:bar@gmail.com"
|
| + * ]
|
| + * }
|
| + * ]
|
| + * }
|
| + * ]
|
| + * }
|
| + * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
|
| + * logging. It also exempts foo@gmail.com from DATA_READ logging, and
|
| + * bar@gmail.com from DATA_WRITE logging.
|
| */
|
| class AuditConfig {
|
| /**
|
| @@ -1299,12 +1351,6 @@ class AuditConfig {
|
| * Next ID: 4
|
| */
|
| core.List<AuditLogConfig> auditLogConfigs;
|
| - /**
|
| - * Specifies the identities that are exempted from "data access" audit
|
| - * logging for the `service` specified above.
|
| - * Follows the same format of Binding.members.
|
| - * This field is deprecated in favor of per-permission-type exemptions.
|
| - */
|
| core.List<core.String> exemptedMembers;
|
| /**
|
| * Specifies a service that will be enabled for audit logging.
|
| @@ -1483,6 +1529,15 @@ class Condition {
|
| * - "ATTRIBUTION" : The principal (even if an authority selector is present),
|
| * which
|
| * must only be used for attribution, not authorization.
|
| + * - "APPROVER" : An approver (distinct from the requester) that has
|
| + * authorized this
|
| + * request.
|
| + * When used with IN, the condition indicates that one of the approvers
|
| + * associated with the request matches the specified principal, or is a
|
| + * member of the specified group. Approvers can only grant additional
|
| + * access, and are thus only used in a strictly positive context
|
| + * (e.g. ALLOW/IN or DENY/NOT_IN).
|
| + * See: go/rpc-security-policy-dynamicauth.
|
| */
|
| core.String iam;
|
| /**
|
|
|