Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(225)

Side by Side Diff: discovery/googleapis/sourcerepo__v1.json

Issue 2779563003: Api-roll 47: 2017-03-27 (Closed)
Patch Set: Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « discovery/googleapis/slides__v1.json ('k') | discovery/googleapis/spanner__v1.json » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 { 1 {
2 "auth": { 2 "auth": {
3 "oauth2": { 3 "oauth2": {
4 "scopes": { 4 "scopes": {
5 "https://www.googleapis.com/auth/cloud-platform": { 5 "https://www.googleapis.com/auth/cloud-platform": {
6 "description": "View and manage your data across Google Clou d Platform services" 6 "description": "View and manage your data across Google Clou d Platform services"
7 } 7 }
8 } 8 }
9 } 9 }
10 }, 10 },
11 "basePath": "", 11 "basePath": "",
12 "baseUrl": "https://sourcerepo.googleapis.com/", 12 "baseUrl": "https://sourcerepo.googleapis.com/",
13 "batchPath": "batch", 13 "batchPath": "batch",
14 "canonicalName": "Cloud Source Repositories", 14 "canonicalName": "Cloud Source Repositories",
15 "description": "Access source code repositories hosted by Google.", 15 "description": "Access source code repositories hosted by Google.",
16 "discoveryVersion": "v1", 16 "discoveryVersion": "v1",
17 "documentationLink": "https://cloud.google.com/eap/cloud-repositories/cloud- sourcerepo-api", 17 "documentationLink": "https://cloud.google.com/eap/cloud-repositories/cloud- sourcerepo-api",
18 "icons": { 18 "icons": {
19 "x16": "http://www.google.com/images/icons/product/search-16.gif", 19 "x16": "http://www.google.com/images/icons/product/search-16.gif",
20 "x32": "http://www.google.com/images/icons/product/search-32.gif" 20 "x32": "http://www.google.com/images/icons/product/search-32.gif"
21 }, 21 },
22 "id": "sourcerepo:v1", 22 "id": "sourcerepo:v1",
23 "kind": "discovery#restDescription", 23 "kind": "discovery#restDescription",
24 "name": "sourcerepo", 24 "name": "sourcerepo",
25 "ownerDomain": "google.com", 25 "ownerDomain": "google.com",
26 "ownerName": "Google", 26 "ownerName": "Google",
27 "parameters": { 27 "parameters": {
28 "quotaUser": {
29 "description": "Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exc eed 40 characters.",
30 "location": "query",
31 "type": "string"
32 },
33 "pp": {
34 "default": "true",
35 "description": "Pretty-print response.",
36 "location": "query",
37 "type": "boolean"
38 },
39 "bearer_token": { 28 "bearer_token": {
40 "description": "OAuth bearer token.", 29 "description": "OAuth bearer token.",
41 "location": "query", 30 "location": "query",
42 "type": "string" 31 "type": "string"
43 }, 32 },
44 "oauth_token": { 33 "oauth_token": {
45 "description": "OAuth 2.0 token for the current user.", 34 "description": "OAuth 2.0 token for the current user.",
46 "location": "query", 35 "location": "query",
47 "type": "string" 36 "type": "string"
48 }, 37 },
49 "upload_protocol": { 38 "upload_protocol": {
50 "description": "Upload protocol for media (e.g. \"raw\", \"multipart \").", 39 "description": "Upload protocol for media (e.g. \"raw\", \"multipart \").",
51 "location": "query", 40 "location": "query",
52 "type": "string" 41 "type": "string"
53 }, 42 },
54 "prettyPrint": { 43 "prettyPrint": {
55 "default": "true", 44 "default": "true",
56 "description": "Returns response with indentations and line breaks." , 45 "description": "Returns response with indentations and line breaks." ,
57 "location": "query", 46 "location": "query",
58 "type": "boolean" 47 "type": "boolean"
59 }, 48 },
49 "fields": {
50 "description": "Selector specifying which fields to include in a par tial response.",
51 "location": "query",
52 "type": "string"
53 },
60 "uploadType": { 54 "uploadType": {
61 "description": "Legacy upload protocol for media (e.g. \"media\", \" multipart\").", 55 "description": "Legacy upload protocol for media (e.g. \"media\", \" multipart\").",
62 "location": "query", 56 "location": "query",
63 "type": "string" 57 "type": "string"
64 }, 58 },
65 "fields": {
66 "description": "Selector specifying which fields to include in a par tial response.",
67 "location": "query",
68 "type": "string"
69 },
70 "callback": { 59 "callback": {
71 "description": "JSONP", 60 "description": "JSONP",
72 "location": "query", 61 "location": "query",
73 "type": "string" 62 "type": "string"
74 }, 63 },
75 "$.xgafv": { 64 "$.xgafv": {
76 "description": "V1 error format.", 65 "description": "V1 error format.",
77 "enum": [ 66 "enum": [
78 "1", 67 "1",
79 "2" 68 "2"
(...skipping 23 matching lines...) Expand all
103 }, 92 },
104 "key": { 93 "key": {
105 "description": "API key. Your API key identifies your project and pr ovides you with API access, quota, and reports. Required unless you provide an O Auth 2.0 token.", 94 "description": "API key. Your API key identifies your project and pr ovides you with API access, quota, and reports. Required unless you provide an O Auth 2.0 token.",
106 "location": "query", 95 "location": "query",
107 "type": "string" 96 "type": "string"
108 }, 97 },
109 "access_token": { 98 "access_token": {
110 "description": "OAuth access token.", 99 "description": "OAuth access token.",
111 "location": "query", 100 "location": "query",
112 "type": "string" 101 "type": "string"
102 },
103 "quotaUser": {
104 "description": "Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exc eed 40 characters.",
105 "location": "query",
106 "type": "string"
107 },
108 "pp": {
109 "default": "true",
110 "description": "Pretty-print response.",
111 "location": "query",
112 "type": "boolean"
113 } 113 }
114 }, 114 },
115 "protocol": "rest", 115 "protocol": "rest",
116 "resources": { 116 "resources": {
117 "projects": { 117 "projects": {
118 "resources": { 118 "resources": {
119 "repos": { 119 "repos": {
120 "methods": { 120 "methods": {
121 "list": { 121 "list": {
122 "description": "Returns all repos belonging to a pro ject.", 122 "description": "Returns all repos belonging to a pro ject.",
(...skipping 12 matching lines...) Expand all
135 } 135 }
136 }, 136 },
137 "path": "v1/{+name}/repos", 137 "path": "v1/{+name}/repos",
138 "response": { 138 "response": {
139 "$ref": "ListReposResponse" 139 "$ref": "ListReposResponse"
140 }, 140 },
141 "scopes": [ 141 "scopes": [
142 "https://www.googleapis.com/auth/cloud-platform" 142 "https://www.googleapis.com/auth/cloud-platform"
143 ] 143 ]
144 }, 144 },
145 "create": {
146 "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` re turns\n`ALREADY_EXISTS`.",
147 "httpMethod": "POST",
148 "id": "sourcerepo.projects.repos.create",
149 "parameterOrder": [
150 "parent"
151 ],
152 "parameters": {
153 "parent": {
154 "description": "The project in which to crea te the repo. Values are of the form\n`projects/<project>`.",
155 "location": "path",
156 "pattern": "^projects/[^/]+$",
157 "required": true,
158 "type": "string"
159 }
160 },
161 "path": "v1/{+parent}/repos",
162 "request": {
163 "$ref": "Repo"
164 },
165 "response": {
166 "$ref": "Repo"
167 },
168 "scopes": [
169 "https://www.googleapis.com/auth/cloud-platform"
170 ]
171 },
145 "setIamPolicy": { 172 "setIamPolicy": {
146 "description": "Sets the access control policy on th e specified resource. Replaces any\nexisting policy.", 173 "description": "Sets the access control policy on th e specified resource. Replaces any\nexisting policy.",
147 "httpMethod": "POST", 174 "httpMethod": "POST",
148 "id": "sourcerepo.projects.repos.setIamPolicy", 175 "id": "sourcerepo.projects.repos.setIamPolicy",
149 "parameterOrder": [ 176 "parameterOrder": [
150 "resource" 177 "resource"
151 ], 178 ],
152 "parameters": { 179 "parameters": {
153 "resource": { 180 "resource": {
154 "description": "REQUIRED: The resource for w hich the policy is being specified.\nSee the operation documentation for the app ropriate value for this field.", 181 "description": "REQUIRED: The resource for w hich the policy is being specified.\nSee the operation documentation for the app ropriate value for this field.",
155 "location": "path", 182 "location": "path",
156 "pattern": "^projects/[^/]+/repos/.+$", 183 "pattern": "^projects/[^/]+/repos/.+$",
157 "required": true, 184 "required": true,
158 "type": "string" 185 "type": "string"
159 } 186 }
160 }, 187 },
161 "path": "v1/{+resource}:setIamPolicy", 188 "path": "v1/{+resource}:setIamPolicy",
162 "request": { 189 "request": {
163 "$ref": "SetIamPolicyRequest" 190 "$ref": "SetIamPolicyRequest"
164 }, 191 },
165 "response": { 192 "response": {
166 "$ref": "Policy" 193 "$ref": "Policy"
167 }, 194 },
168 "scopes": [ 195 "scopes": [
169 "https://www.googleapis.com/auth/cloud-platform" 196 "https://www.googleapis.com/auth/cloud-platform"
170 ]
171 },
172 "create": {
173 "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` re turns\n`ALREADY_EXISTS`.",
174 "httpMethod": "POST",
175 "id": "sourcerepo.projects.repos.create",
176 "parameterOrder": [
177 "parent"
178 ],
179 "parameters": {
180 "parent": {
181 "description": "The project in which to crea te the repo. Values are of the form\n`projects/<project>`.",
182 "location": "path",
183 "pattern": "^projects/[^/]+$",
184 "required": true,
185 "type": "string"
186 }
187 },
188 "path": "v1/{+parent}/repos",
189 "request": {
190 "$ref": "Repo"
191 },
192 "response": {
193 "$ref": "Repo"
194 },
195 "scopes": [
196 "https://www.googleapis.com/auth/cloud-platform"
197 ] 197 ]
198 }, 198 },
199 "getIamPolicy": { 199 "getIamPolicy": {
200 "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a p olicy\nset.", 200 "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a p olicy\nset.",
201 "httpMethod": "GET", 201 "httpMethod": "GET",
202 "id": "sourcerepo.projects.repos.getIamPolicy", 202 "id": "sourcerepo.projects.repos.getIamPolicy",
203 "parameterOrder": [ 203 "parameterOrder": [
204 "resource" 204 "resource"
205 ], 205 ],
206 "parameters": { 206 "parameters": {
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after
293 }, 293 },
294 "scopes": [ 294 "scopes": [
295 "https://www.googleapis.com/auth/cloud-platform" 295 "https://www.googleapis.com/auth/cloud-platform"
296 ] 296 ]
297 } 297 }
298 } 298 }
299 } 299 }
300 } 300 }
301 } 301 }
302 }, 302 },
303 "revision": "20170228", 303 "revision": "20170321",
304 "rootUrl": "https://sourcerepo.googleapis.com/", 304 "rootUrl": "https://sourcerepo.googleapis.com/",
305 "schemas": { 305 "schemas": {
306 "AuditLogConfig": { 306 "SetIamPolicyRequest": {
307 "description": "Provides the configuration for logging a type of per missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type \": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and ' DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", 307 "description": "Request message for `SetIamPolicy` method.",
308 "id": "AuditLogConfig", 308 "id": "SetIamPolicyRequest",
309 "properties": { 309 "properties": {
310 "logType": { 310 "updateMask": {
311 "description": "The log type that this config enables.", 311 "description": "OPTIONAL: A FieldMask specifying which field s of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\ "\nThis field is only used by Cloud IAM.",
312 "enum": [ 312 "format": "google-fieldmask",
313 "LOG_TYPE_UNSPECIFIED",
314 "ADMIN_READ",
315 "DATA_WRITE",
316 "DATA_READ"
317 ],
318 "enumDescriptions": [
319 "Default case. Should never be this.",
320 "Admin reads. Example: CloudIAM getIamPolicy",
321 "Data writes. Example: CloudSQL Users create",
322 "Data reads. Example: CloudSQL Users list"
323 ],
324 "type": "string" 313 "type": "string"
325 }, 314 },
326 "exemptedMembers": { 315 "policy": {
327 "description": "Specifies the identities that do not cause l ogging for this type of\npermission.\nFollows the same format of Binding.members .", 316 "$ref": "Policy",
328 "items": { 317 "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An emp ty policy is a\nvalid policy but certain Cloud Platform services (such as Projec ts)\nmight reject them."
329 "type": "string"
330 },
331 "type": "array"
332 } 318 }
333 }, 319 },
334 "type": "object" 320 "type": "object"
335 }, 321 },
336 "Rule": { 322 "CloudAuditOptions": {
337 "description": "A rule to be applied in a Policy.", 323 "description": "Write a Cloud Audit log",
338 "id": "Rule", 324 "id": "CloudAuditOptions",
325 "properties": {},
326 "type": "object"
327 },
328 "Binding": {
329 "description": "Associates `members` with a `role`.",
330 "id": "Binding",
339 "properties": { 331 "properties": {
340 "description": { 332 "members": {
341 "description": "Human-readable description of the rule.", 333 "description": "Specifies the identities requesting access f or a Cloud Platform resource.\n`members` can have the following values:\n\n* `al lUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special ident ifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a spec ific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\ n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{e mailid}`: An email address that represents a Google group.\n For example, `adm ins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represe nts all the\n users of that domain. For example, `google.com` or `example.com` .\n\n",
342 "type": "string"
343 },
344 "conditions": {
345 "description": "Additional restrictions that must be met",
346 "items": {
347 "$ref": "Condition"
348 },
349 "type": "array"
350 },
351 "logConfig": {
352 "description": "The config returned to callers of tech.iam.I AM.CheckPolicy for any entries\nthat match the LOG action.",
353 "items": {
354 "$ref": "LogConfig"
355 },
356 "type": "array"
357 },
358 "in": {
359 "description": "If one or more 'in' clauses are specified, t he rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.",
360 "items": { 334 "items": {
361 "type": "string" 335 "type": "string"
362 }, 336 },
363 "type": "array" 337 "type": "array"
364 }, 338 },
365 "permissions": { 339 "role": {
366 "description": "A permission is a string of form '<service>. <resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.", 340 "description": "Role that is assigned to `members`.\nFor exa mple, `roles/viewer`, `roles/editor`, or `roles/owner`.\nRequired",
367 "items": {
368 "type": "string"
369 },
370 "type": "array"
371 },
372 "action": {
373 "description": "Required",
374 "enum": [
375 "NO_ACTION",
376 "ALLOW",
377 "ALLOW_WITH_LOG",
378 "DENY",
379 "DENY_WITH_LOG",
380 "LOG"
381 ],
382 "enumDescriptions": [
383 "Default no action.",
384 "Matching 'Entries' grant access.",
385 "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.",
386 "Matching 'Entries' deny access.",
387 "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.",
388 "Matching 'Entries' tell IAM.Check callers to generate l ogs."
389 ],
390 "type": "string" 341 "type": "string"
391 },
392 "notIn": {
393 "description": "If one or more 'not_in' clauses are specifie d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri es.\nThe format for in and not_in entries is the same as for members in a\nBindi ng (see google/iam/v1/policy.proto).",
394 "items": {
395 "type": "string"
396 },
397 "type": "array"
398 } 342 }
399 }, 343 },
400 "type": "object" 344 "type": "object"
401 }, 345 },
402 "LogConfig": { 346 "Empty": {
403 "description": "Specifies what kind of log the caller must write\nIn crement a streamz counter with the specified metric and field names.\n\nMetric n ames should start with a '/', generally be lowercase-only,\nand end in \"_count\ ". Field names should not contain an initial slash.\nThe actual exported metric names will have \"/iam/policy\" prepended.\n\nField names correspond to IAM requ est parameters and field values are\ntheir respective values.\n\nAt present the only supported field names are\n - \"iam_principal\", corresponding to IAMCont ext.principal;\n - \"\" (empty string), resulting in one aggretated counter wi th no field.\n\nExamples:\n counter { metric: \"/debug_access_count\" field: \ "iam_principal\" }\n ==> increment counter /iam/policy/backend_debug_access_cou nt\n {iam_principal=[value of IAMContext.principal]}\n\nA t this time we do not support:\n* multiple field names (though this may be suppo rted in the future)\n* decrementing the counter\n* incrementing it by anything o ther than 1", 347 "description": "A generic empty message that you can re-use to avoid defining duplicated\nempty messages in your APIs. A typical example is to use i t as the request\nor the response type of an API method. For instance:\n\n se rvice Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty );\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.",
404 "id": "LogConfig", 348 "id": "Empty",
349 "properties": {},
350 "type": "object"
351 },
352 "MirrorConfig": {
353 "description": "Configuration to automatically mirror a repository f rom another\nhosting service, for example GitHub or BitBucket.",
354 "id": "MirrorConfig",
405 "properties": { 355 "properties": {
406 "cloudAudit": { 356 "deployKeyId": {
407 "$ref": "CloudAuditOptions", 357 "description": "ID of the SSH deploy key at the other hostin g service.\nRemoving this key from the other service would deauthorize\nGoogle C loud Source Repositories from mirroring.",
408 "description": "Cloud audit options." 358 "type": "string"
409 }, 359 },
410 "counter": { 360 "url": {
411 "$ref": "CounterOptions", 361 "description": "URL of the main repository at the other host ing service.",
412 "description": "Counter options." 362 "type": "string"
413 }, 363 },
414 "dataAccess": { 364 "webhookId": {
415 "$ref": "DataAccessOptions", 365 "description": "ID of the webhook listening to updates to tr igger mirroring.\nRemoving this webook from the other hosting service will stop\ nGoogle Cloud Source Repositories from receiving notifications,\nand thereby dis abling mirroring.",
416 "description": "Data access options." 366 "type": "string"
417 } 367 }
418 }, 368 },
419 "type": "object" 369 "type": "object"
420 }, 370 },
421 "TestIamPermissionsRequest": { 371 "Repo": {
422 "description": "Request message for `TestIamPermissions` method.", 372 "description": "A repository (or repo) is a Git repository storing v ersioned source content.",
423 "id": "TestIamPermissionsRequest", 373 "id": "Repo",
374 "properties": {
375 "mirrorConfig": {
376 "$ref": "MirrorConfig",
377 "description": "How this repository mirrors a repository man aged by another service."
378 },
379 "url": {
380 "description": "URL to clone the repository from Google Clou d Source Repositories.",
381 "type": "string"
382 },
383 "size": {
384 "description": "The size in bytes of the repo.",
385 "format": "int64",
386 "type": "string"
387 },
388 "name": {
389 "description": "Resource name of the repository, of the form \n`projects/<project>/repos/<repo>`.",
390 "type": "string"
391 }
392 },
393 "type": "object"
394 },
395 "TestIamPermissionsResponse": {
396 "description": "Response message for `TestIamPermissions` method.",
397 "id": "TestIamPermissionsResponse",
424 "properties": { 398 "properties": {
425 "permissions": { 399 "permissions": {
426 "description": "The set of permissions to check for the `res ource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed . For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/ov erview#permissions).", 400 "description": "A subset of `TestPermissionsRequest.permissi ons` that the caller is\nallowed.",
427 "items": { 401 "items": {
428 "type": "string" 402 "type": "string"
429 }, 403 },
430 "type": "array" 404 "type": "array"
431 } 405 }
432 }, 406 },
433 "type": "object" 407 "type": "object"
434 }, 408 },
435 "Policy": {
436 "description": "Defines an Identity and Access Management (IAM) poli cy. It is used to\nspecify access control policies for Cloud Platform resources. \n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n `members` to a `role`, where the members can be user accounts, Google groups,\nG oogle domains, and service accounts. A `role` is a named list of permissions\nde fined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike @example.com\",\n \"group:admins@example.com\",\n \"domain :google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccoun t.com\",\n ]\n },\n {\n \"role\": \"roles/viewer \",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide ](https://cloud.google.com/iam).",
437 "id": "Policy",
438 "properties": {
439 "etag": {
440 "description": "`etag` is used for optimistic concurrency co ntrol as a way to help\nprevent simultaneous updates of a policy from overwritin g each other.\nIt is strongly suggested that systems make use of the `etag` in t he\nread-modify-write cycle to perform policy updates in order to avoid race\nco nditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that t heir change will be applied to the same version of the policy.\n\nIf no `etag` i s provided in the call to `setIamPolicy`, then the existing\npolicy is overwritt en blindly.",
441 "format": "byte",
442 "type": "string"
443 },
444 "iamOwned": {
445 "type": "boolean"
446 },
447 "rules": {
448 "description": "If more than one rule is specified, the rule s are applied in the following\nmanner:\n- All matching LOG rules are always app lied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Loggin g will be applied if one or more matching rule requires logging.\n- Otherwise, i f any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging wi ll be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
449 "items": {
450 "$ref": "Rule"
451 },
452 "type": "array"
453 },
454 "version": {
455 "description": "Version of the `Policy`. The default version is 0.",
456 "format": "int32",
457 "type": "integer"
458 },
459 "auditConfigs": {
460 "description": "Specifies cloud audit logging configuration for this policy.",
461 "items": {
462 "$ref": "AuditConfig"
463 },
464 "type": "array"
465 },
466 "bindings": {
467 "description": "Associates a list of `members` to a `role`.\ nMultiple `bindings` must not be specified for the same `role`.\n`bindings` with no members will result in an error.",
468 "items": {
469 "$ref": "Binding"
470 },
471 "type": "array"
472 }
473 },
474 "type": "object"
475 },
476 "DataAccessOptions": {
477 "description": "Write a Data Access (Gin) log",
478 "id": "DataAccessOptions",
479 "properties": {},
480 "type": "object"
481 },
482 "AuditConfig": {
483 "description": "Specifies the audit configuration for a service.\nIt consists of which permission types are logged, and what identities, if\nany, ar e exempted from logging.\nAn AuditConifg must have one or more AuditLogConfigs.\ n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecifie d in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \"audit_configs \": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [ \n {\n \"log_type\": \"DATA_READ\",\n \"exempted_member s\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_ type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \ "fooservice@googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail .com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooservice, this pol icy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@g mail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.",
484 "id": "AuditConfig",
485 "properties": {
486 "service": {
487 "description": "Specifies a service that will be enabled for audit logging.\nFor example, `resourcemanager`, `storage`, `compute`.\n`allServ ices` is a special value that covers all services.",
488 "type": "string"
489 },
490 "auditLogConfigs": {
491 "description": "The configuration for logging of each type o f permission.\nNext ID: 4",
492 "items": {
493 "$ref": "AuditLogConfig"
494 },
495 "type": "array"
496 },
497 "exemptedMembers": {
498 "items": {
499 "type": "string"
500 },
501 "type": "array"
502 }
503 },
504 "type": "object"
505 },
506 "SetIamPolicyRequest": {
507 "description": "Request message for `SetIamPolicy` method.",
508 "id": "SetIamPolicyRequest",
509 "properties": {
510 "updateMask": {
511 "description": "OPTIONAL: A FieldMask specifying which field s of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, a default\nmask is used:\npaths: \"bindings, etag\"\nThis fiel d is only used by Cloud IAM.",
512 "format": "google-fieldmask",
513 "type": "string"
514 },
515 "policy": {
516 "$ref": "Policy",
517 "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An emp ty policy is a\nvalid policy but certain Cloud Platform services (such as Projec ts)\nmight reject them."
518 }
519 },
520 "type": "object"
521 },
522 "CloudAuditOptions": {
523 "description": "Write a Cloud Audit log",
524 "id": "CloudAuditOptions",
525 "properties": {},
526 "type": "object"
527 },
528 "Binding": {
529 "description": "Associates `members` with a `role`.",
530 "id": "Binding",
531 "properties": {
532 "members": {
533 "description": "Specifies the identities requesting access f or a Cloud Platform resource.\n`members` can have the following values:\n\n* `al lUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special ident ifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a spec ific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\ n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{e mailid}`: An email address that represents a Google group.\n For example, `adm ins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represe nts all the\n users of that domain. For example, `google.com` or `example.com` .\n\n",
534 "items": {
535 "type": "string"
536 },
537 "type": "array"
538 },
539 "role": {
540 "description": "Role that is assigned to `members`.\nFor exa mple, `roles/viewer`, `roles/editor`, or `roles/owner`.\nRequired",
541 "type": "string"
542 }
543 },
544 "type": "object"
545 },
546 "Empty": {
547 "description": "A generic empty message that you can re-use to avoid defining duplicated\nempty messages in your APIs. A typical example is to use i t as the request\nor the response type of an API method. For instance:\n\n se rvice Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty );\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.",
548 "id": "Empty",
549 "properties": {},
550 "type": "object"
551 },
552 "MirrorConfig": {
553 "description": "Configuration to automatically mirror a repository f rom another\nhosting service, for example GitHub or BitBucket.",
554 "id": "MirrorConfig",
555 "properties": {
556 "deployKeyId": {
557 "description": "ID of the SSH deploy key at the other hostin g service.\nRemoving this key from the other service would deauthorize\nGoogle C loud Source Repositories from mirroring.",
558 "type": "string"
559 },
560 "url": {
561 "description": "URL of the main repository at the other host ing service.",
562 "type": "string"
563 },
564 "webhookId": {
565 "description": "ID of the webhook listening to updates to tr igger mirroring.\nRemoving this webook from the other hosting service will stop\ nGoogle Cloud Source Repositories from receiving notifications,\nand thereby dis abling mirroring.",
566 "type": "string"
567 }
568 },
569 "type": "object"
570 },
571 "Repo": {
572 "description": "A repository (or repo) is a Git repository storing v ersioned source content.",
573 "id": "Repo",
574 "properties": {
575 "size": {
576 "description": "The size in bytes of the repo.",
577 "format": "int64",
578 "type": "string"
579 },
580 "name": {
581 "description": "Resource name of the repository, of the form \n`projects/<project>/repos/<repo>`.",
582 "type": "string"
583 },
584 "mirrorConfig": {
585 "$ref": "MirrorConfig",
586 "description": "How this repository mirrors a repository man aged by another service."
587 },
588 "url": {
589 "description": "URL to clone the repository from Google Clou d Source Repositories.",
590 "type": "string"
591 }
592 },
593 "type": "object"
594 },
595 "ListReposResponse": { 409 "ListReposResponse": {
596 "description": "Response for ListRepos.", 410 "description": "Response for ListRepos.",
597 "id": "ListReposResponse", 411 "id": "ListReposResponse",
598 "properties": { 412 "properties": {
599 "repos": { 413 "repos": {
600 "description": "The listed repos.", 414 "description": "The listed repos.",
601 "items": { 415 "items": {
602 "$ref": "Repo" 416 "$ref": "Repo"
603 }, 417 },
604 "type": "array" 418 "type": "array"
605 } 419 }
606 }, 420 },
607 "type": "object" 421 "type": "object"
608 }, 422 },
609 "TestIamPermissionsResponse": { 423 "Condition": {
610 "description": "Response message for `TestIamPermissions` method.", 424 "description": "A condition to be met.",
611 "id": "TestIamPermissionsResponse", 425 "id": "Condition",
612 "properties": { 426 "properties": {
613 "permissions": { 427 "values": {
614 "description": "A subset of `TestPermissionsRequest.permissi ons` that the caller is\nallowed.", 428 "description": "The objects of the condition. This is mutual ly exclusive with 'value'.",
615 "items": { 429 "items": {
616 "type": "string" 430 "type": "string"
617 }, 431 },
618 "type": "array" 432 "type": "array"
619 } 433 },
620 }, 434 "iam": {
621 "type": "object" 435 "description": "Trusted attributes supplied by the IAM syste m.",
622 }, 436 "enum": [
623 "Condition": { 437 "NO_ATTR",
624 "description": "A condition to be met.", 438 "AUTHORITY",
625 "id": "Condition", 439 "ATTRIBUTION",
626 "properties": { 440 "APPROVER",
441 "JUSTIFICATION_TYPE"
442 ],
443 "enumDescriptions": [
444 "Default non-attribute.",
445 "Either principal or (if present) authority selector.",
446 "The principal (even if an authority selector is present ), which\nmust only be used for attribution, not authorization.",
447 "An approver (distinct from the requester) that has auth orized this\nrequest.\nWhen used with IN, the condition indicates that one of th e approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, a nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT _IN).\nSee: go/rpc-security-policy-dynamicauth.",
448 "What types of justifications have been supplied with th is request.\nString values should match enum names from tech.iam.JustificationTy pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe * absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications , e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported. "
449 ],
450 "type": "string"
451 },
627 "op": { 452 "op": {
628 "description": "An operator to apply the subject with.", 453 "description": "An operator to apply the subject with.",
629 "enum": [ 454 "enum": [
630 "NO_OP", 455 "NO_OP",
631 "EQUALS", 456 "EQUALS",
632 "NOT_EQUALS", 457 "NOT_EQUALS",
633 "IN", 458 "IN",
634 "NOT_IN", 459 "NOT_IN",
635 "DISCHARGED" 460 "DISCHARGED"
636 ], 461 ],
637 "enumDescriptions": [ 462 "enumDescriptions": [
638 "Default no-op.", 463 "Default no-op.",
639 "DEPRECATED. Use IN instead.", 464 "DEPRECATED. Use IN instead.",
640 "DEPRECATED. Use NOT_IN instead.", 465 "DEPRECATED. Use NOT_IN instead.",
641 "The condition is true if the subject (or any element of it if it is\na set) matches any of the supplied values.", 466 "The condition is true if the subject (or any element of it if it is\na set) matches any of the supplied values.",
642 "The condition is true if the subject (or every element of it if it is\na set) matches none of the supplied values.", 467 "The condition is true if the subject (or every element of it if it is\na set) matches none of the supplied values.",
643 "Subject is discharged" 468 "Subject is discharged"
644 ], 469 ],
645 "type": "string" 470 "type": "string"
646 }, 471 },
647 "svc": { 472 "svc": {
648 "description": "Trusted attributes discharged by the service .", 473 "description": "Trusted attributes discharged by the service .",
649 "type": "string" 474 "type": "string"
650 }, 475 },
476 "value": {
477 "description": "DEPRECATED. Use 'values' instead.",
478 "type": "string"
479 },
651 "sys": { 480 "sys": {
652 "description": "Trusted attributes supplied by any service t hat owns resources and uses\nthe IAM system for access control.", 481 "description": "Trusted attributes supplied by any service t hat owns resources and uses\nthe IAM system for access control.",
653 "enum": [ 482 "enum": [
654 "NO_ATTR", 483 "NO_ATTR",
655 "REGION", 484 "REGION",
656 "SERVICE", 485 "SERVICE",
657 "NAME", 486 "NAME",
658 "IP" 487 "IP"
659 ], 488 ],
660 "enumDescriptions": [ 489 "enumDescriptions": [
661 "Default non-attribute type", 490 "Default non-attribute type",
662 "Region of the resource", 491 "Region of the resource",
663 "Service name", 492 "Service name",
664 "Resource name", 493 "Resource name",
665 "IP address of the caller" 494 "IP address of the caller"
666 ], 495 ],
667 "type": "string" 496 "type": "string"
668 },
669 "value": {
670 "description": "DEPRECATED. Use 'values' instead.",
671 "type": "string"
672 },
673 "values": {
674 "description": "The objects of the condition. This is mutual ly exclusive with 'value'.",
675 "items": {
676 "type": "string"
677 },
678 "type": "array"
679 },
680 "iam": {
681 "description": "Trusted attributes supplied by the IAM syste m.",
682 "enum": [
683 "NO_ATTR",
684 "AUTHORITY",
685 "ATTRIBUTION",
686 "APPROVER",
687 "JUSTIFICATION_TYPE"
688 ],
689 "enumDescriptions": [
690 "Default non-attribute.",
691 "Either principal or (if present) authority selector.",
692 "The principal (even if an authority selector is present ), which\nmust only be used for attribution, not authorization.",
693 "An approver (distinct from the requester) that has auth orized this\nrequest.\nWhen used with IN, the condition indicates that one of th e approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, a nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT _IN).\nSee: go/rpc-security-policy-dynamicauth.",
694 "What types of justifications have been supplied with th is request.\nString values should match enum names from tech.iam.JustificationTy pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe * absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications , e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported. "
695 ],
696 "type": "string"
697 } 497 }
698 }, 498 },
699 "type": "object" 499 "type": "object"
700 }, 500 },
701 "CounterOptions": { 501 "CounterOptions": {
702 "description": "Options for counters", 502 "description": "Options for counters",
703 "id": "CounterOptions", 503 "id": "CounterOptions",
704 "properties": { 504 "properties": {
705 "metric": { 505 "metric": {
706 "description": "The metric to update.", 506 "description": "The metric to update.",
707 "type": "string" 507 "type": "string"
708 }, 508 },
709 "field": { 509 "field": {
710 "description": "The field value to attribute.", 510 "description": "The field value to attribute.",
711 "type": "string" 511 "type": "string"
712 } 512 }
713 }, 513 },
714 "type": "object" 514 "type": "object"
515 },
516 "AuditLogConfig": {
517 "description": "Provides the configuration for logging a type of per missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type \": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and ' DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.",
518 "id": "AuditLogConfig",
519 "properties": {
520 "logType": {
521 "description": "The log type that this config enables.",
522 "enum": [
523 "LOG_TYPE_UNSPECIFIED",
524 "ADMIN_READ",
525 "DATA_WRITE",
526 "DATA_READ"
527 ],
528 "enumDescriptions": [
529 "Default case. Should never be this.",
530 "Admin reads. Example: CloudIAM getIamPolicy",
531 "Data writes. Example: CloudSQL Users create",
532 "Data reads. Example: CloudSQL Users list"
533 ],
534 "type": "string"
535 },
536 "exemptedMembers": {
537 "description": "Specifies the identities that do not cause l ogging for this type of\npermission.\nFollows the same format of Binding.members .",
538 "items": {
539 "type": "string"
540 },
541 "type": "array"
542 }
543 },
544 "type": "object"
545 },
546 "Rule": {
547 "description": "A rule to be applied in a Policy.",
548 "id": "Rule",
549 "properties": {
550 "logConfig": {
551 "description": "The config returned to callers of tech.iam.I AM.CheckPolicy for any entries\nthat match the LOG action.",
552 "items": {
553 "$ref": "LogConfig"
554 },
555 "type": "array"
556 },
557 "in": {
558 "description": "If one or more 'in' clauses are specified, t he rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.",
559 "items": {
560 "type": "string"
561 },
562 "type": "array"
563 },
564 "permissions": {
565 "description": "A permission is a string of form '<service>. <resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.",
566 "items": {
567 "type": "string"
568 },
569 "type": "array"
570 },
571 "action": {
572 "description": "Required",
573 "enum": [
574 "NO_ACTION",
575 "ALLOW",
576 "ALLOW_WITH_LOG",
577 "DENY",
578 "DENY_WITH_LOG",
579 "LOG"
580 ],
581 "enumDescriptions": [
582 "Default no action.",
583 "Matching 'Entries' grant access.",
584 "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.",
585 "Matching 'Entries' deny access.",
586 "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.",
587 "Matching 'Entries' tell IAM.Check callers to generate l ogs."
588 ],
589 "type": "string"
590 },
591 "notIn": {
592 "description": "If one or more 'not_in' clauses are specifie d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri es.\nThe format for in and not_in entries is the same as for members in a\nBindi ng (see google/iam/v1/policy.proto).",
593 "items": {
594 "type": "string"
595 },
596 "type": "array"
597 },
598 "description": {
599 "description": "Human-readable description of the rule.",
600 "type": "string"
601 },
602 "conditions": {
603 "description": "Additional restrictions that must be met",
604 "items": {
605 "$ref": "Condition"
606 },
607 "type": "array"
608 }
609 },
610 "type": "object"
611 },
612 "LogConfig": {
613 "description": "Specifies what kind of log the caller must write",
614 "id": "LogConfig",
615 "properties": {
616 "counter": {
617 "$ref": "CounterOptions",
618 "description": "Counter options."
619 },
620 "dataAccess": {
621 "$ref": "DataAccessOptions",
622 "description": "Data access options."
623 },
624 "cloudAudit": {
625 "$ref": "CloudAuditOptions",
626 "description": "Cloud audit options."
627 }
628 },
629 "type": "object"
630 },
631 "TestIamPermissionsRequest": {
632 "description": "Request message for `TestIamPermissions` method.",
633 "id": "TestIamPermissionsRequest",
634 "properties": {
635 "permissions": {
636 "description": "The set of permissions to check for the `res ource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed . For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/ov erview#permissions).",
637 "items": {
638 "type": "string"
639 },
640 "type": "array"
641 }
642 },
643 "type": "object"
644 },
645 "Policy": {
646 "description": "Defines an Identity and Access Management (IAM) poli cy. It is used to\nspecify access control policies for Cloud Platform resources. \n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n `members` to a `role`, where the members can be user accounts, Google groups,\nG oogle domains, and service accounts. A `role` is a named list of permissions\nde fined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike @example.com\",\n \"group:admins@example.com\",\n \"domain :google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccoun t.com\",\n ]\n },\n {\n \"role\": \"roles/viewer \",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide ](https://cloud.google.com/iam).",
647 "id": "Policy",
648 "properties": {
649 "etag": {
650 "description": "`etag` is used for optimistic concurrency co ntrol as a way to help\nprevent simultaneous updates of a policy from overwritin g each other.\nIt is strongly suggested that systems make use of the `etag` in t he\nread-modify-write cycle to perform policy updates in order to avoid race\nco nditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that t heir change will be applied to the same version of the policy.\n\nIf no `etag` i s provided in the call to `setIamPolicy`, then the existing\npolicy is overwritt en blindly.",
651 "format": "byte",
652 "type": "string"
653 },
654 "iamOwned": {
655 "type": "boolean"
656 },
657 "rules": {
658 "description": "If more than one rule is specified, the rule s are applied in the following\nmanner:\n- All matching LOG rules are always app lied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Loggin g will be applied if one or more matching rule requires logging.\n- Otherwise, i f any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging wi ll be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
659 "items": {
660 "$ref": "Rule"
661 },
662 "type": "array"
663 },
664 "version": {
665 "description": "Version of the `Policy`. The default version is 0.",
666 "format": "int32",
667 "type": "integer"
668 },
669 "auditConfigs": {
670 "description": "Specifies cloud audit logging configuration for this policy.",
671 "items": {
672 "$ref": "AuditConfig"
673 },
674 "type": "array"
675 },
676 "bindings": {
677 "description": "Associates a list of `members` to a `role`.\ nMultiple `bindings` must not be specified for the same `role`.\n`bindings` with no members will result in an error.",
678 "items": {
679 "$ref": "Binding"
680 },
681 "type": "array"
682 }
683 },
684 "type": "object"
685 },
686 "DataAccessOptions": {
687 "description": "Write a Data Access (Gin) log",
688 "id": "DataAccessOptions",
689 "properties": {},
690 "type": "object"
691 },
692 "AuditConfig": {
693 "description": "Specifies the audit configuration for a service.\nTh e configuration determines which permission types are logged, and what\nidentiti es, if any, are exempted from logging.\nAn AuditConifg must have one or more Aud itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_t ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac h\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \ "audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_lo g_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"e xempted_members\": [\n \"user:foo@gmail.com\"\n ]\n } ,\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice@googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \" user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooser vice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRIT E logging.",
694 "id": "AuditConfig",
695 "properties": {
696 "service": {
697 "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com `.\n`allServices` is a special value that covers all services.",
698 "type": "string"
699 },
700 "auditLogConfigs": {
701 "description": "The configuration for logging of each type o f permission.\nNext ID: 4",
702 "items": {
703 "$ref": "AuditLogConfig"
704 },
705 "type": "array"
706 },
707 "exemptedMembers": {
708 "items": {
709 "type": "string"
710 },
711 "type": "array"
712 }
713 },
714 "type": "object"
715 } 715 }
716 }, 716 },
717 "servicePath": "", 717 "servicePath": "",
718 "title": "Cloud Source Repositories API", 718 "title": "Cloud Source Repositories API",
719 "version": "v1" 719 "version": "v1"
720 } 720 }
OLDNEW
« no previous file with comments | « discovery/googleapis/slides__v1.json ('k') | discovery/googleapis/spanner__v1.json » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698