| OLD | NEW |
| 1 // This is a generated file (see the discoveryapis_generator project). | 1 // This is a generated file (see the discoveryapis_generator project). |
| 2 | 2 |
| 3 library googleapis.sourcerepo.v1; | 3 library googleapis.sourcerepo.v1; |
| 4 | 4 |
| 5 import 'dart:core' as core; | 5 import 'dart:core' as core; |
| 6 import 'dart:async' as async; | 6 import 'dart:async' as async; |
| 7 import 'dart:convert' as convert; | 7 import 'dart:convert' as convert; |
| 8 | 8 |
| 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; | 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; |
| 10 import 'package:http/http.dart' as http; | 10 import 'package:http/http.dart' as http; |
| (...skipping 347 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 358 downloadOptions: _downloadOptions); | 358 downloadOptions: _downloadOptions); |
| 359 return _response.then((data) => new TestIamPermissionsResponse.fromJson(data
)); | 359 return _response.then((data) => new TestIamPermissionsResponse.fromJson(data
)); |
| 360 } | 360 } |
| 361 | 361 |
| 362 } | 362 } |
| 363 | 363 |
| 364 | 364 |
| 365 | 365 |
| 366 /** | 366 /** |
| 367 * Specifies the audit configuration for a service. | 367 * Specifies the audit configuration for a service. |
| 368 * It consists of which permission types are logged, and what identities, if | 368 * The configuration determines which permission types are logged, and what |
| 369 * any, are exempted from logging. | 369 * identities, if any, are exempted from logging. |
| 370 * An AuditConifg must have one or more AuditLogConfigs. | 370 * An AuditConifg must have one or more AuditLogConfigs. |
| 371 * | 371 * |
| 372 * If there are AuditConfigs for both `allServices` and a specific service, | 372 * If there are AuditConfigs for both `allServices` and a specific service, |
| 373 * the union of the two AuditConfigs is used for that service: the log_types | 373 * the union of the two AuditConfigs is used for that service: the log_types |
| 374 * specified in each AuditConfig are enabled, and the exempted_members in each | 374 * specified in each AuditConfig are enabled, and the exempted_members in each |
| 375 * AuditConfig are exempted. | 375 * AuditConfig are exempted. |
| 376 * Example Policy with multiple AuditConfigs: | 376 * Example Policy with multiple AuditConfigs: |
| 377 * { | 377 * { |
| 378 * "audit_configs": [ | 378 * "audit_configs": [ |
| 379 * { | 379 * { |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 415 */ | 415 */ |
| 416 class AuditConfig { | 416 class AuditConfig { |
| 417 /** | 417 /** |
| 418 * The configuration for logging of each type of permission. | 418 * The configuration for logging of each type of permission. |
| 419 * Next ID: 4 | 419 * Next ID: 4 |
| 420 */ | 420 */ |
| 421 core.List<AuditLogConfig> auditLogConfigs; | 421 core.List<AuditLogConfig> auditLogConfigs; |
| 422 core.List<core.String> exemptedMembers; | 422 core.List<core.String> exemptedMembers; |
| 423 /** | 423 /** |
| 424 * Specifies a service that will be enabled for audit logging. | 424 * Specifies a service that will be enabled for audit logging. |
| 425 * For example, `resourcemanager`, `storage`, `compute`. | 425 * For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. |
| 426 * `allServices` is a special value that covers all services. | 426 * `allServices` is a special value that covers all services. |
| 427 */ | 427 */ |
| 428 core.String service; | 428 core.String service; |
| 429 | 429 |
| 430 AuditConfig(); | 430 AuditConfig(); |
| 431 | 431 |
| 432 AuditConfig.fromJson(core.Map _json) { | 432 AuditConfig.fromJson(core.Map _json) { |
| 433 if (_json.containsKey("auditLogConfigs")) { | 433 if (_json.containsKey("auditLogConfigs")) { |
| 434 auditLogConfigs = _json["auditLogConfigs"].map((value) => new AuditLogConf
ig.fromJson(value)).toList(); | 434 auditLogConfigs = _json["auditLogConfigs"].map((value) => new AuditLogConf
ig.fromJson(value)).toList(); |
| 435 } | 435 } |
| (...skipping 344 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 780 | 780 |
| 781 core.Map toJson() { | 781 core.Map toJson() { |
| 782 var _json = new core.Map(); | 782 var _json = new core.Map(); |
| 783 if (repos != null) { | 783 if (repos != null) { |
| 784 _json["repos"] = repos.map((value) => (value).toJson()).toList(); | 784 _json["repos"] = repos.map((value) => (value).toJson()).toList(); |
| 785 } | 785 } |
| 786 return _json; | 786 return _json; |
| 787 } | 787 } |
| 788 } | 788 } |
| 789 | 789 |
| 790 /** | 790 /** Specifies what kind of log the caller must write */ |
| 791 * Specifies what kind of log the caller must write | |
| 792 * Increment a streamz counter with the specified metric and field names. | |
| 793 * | |
| 794 * Metric names should start with a '/', generally be lowercase-only, | |
| 795 * and end in "_count". Field names should not contain an initial slash. | |
| 796 * The actual exported metric names will have "/iam/policy" prepended. | |
| 797 * | |
| 798 * Field names correspond to IAM request parameters and field values are | |
| 799 * their respective values. | |
| 800 * | |
| 801 * At present the only supported field names are | |
| 802 * - "iam_principal", corresponding to IAMContext.principal; | |
| 803 * - "" (empty string), resulting in one aggretated counter with no field. | |
| 804 * | |
| 805 * Examples: | |
| 806 * counter { metric: "/debug_access_count" field: "iam_principal" } | |
| 807 * ==> increment counter /iam/policy/backend_debug_access_count | |
| 808 * {iam_principal=[value of IAMContext.principal]} | |
| 809 * | |
| 810 * At this time we do not support: | |
| 811 * * multiple field names (though this may be supported in the future) | |
| 812 * * decrementing the counter | |
| 813 * * incrementing it by anything other than 1 | |
| 814 */ | |
| 815 class LogConfig { | 791 class LogConfig { |
| 816 /** Cloud audit options. */ | 792 /** Cloud audit options. */ |
| 817 CloudAuditOptions cloudAudit; | 793 CloudAuditOptions cloudAudit; |
| 818 /** Counter options. */ | 794 /** Counter options. */ |
| 819 CounterOptions counter; | 795 CounterOptions counter; |
| 820 /** Data access options. */ | 796 /** Data access options. */ |
| 821 DataAccessOptions dataAccess; | 797 DataAccessOptions dataAccess; |
| 822 | 798 |
| 823 LogConfig(); | 799 LogConfig(); |
| 824 | 800 |
| (...skipping 352 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1177 class SetIamPolicyRequest { | 1153 class SetIamPolicyRequest { |
| 1178 /** | 1154 /** |
| 1179 * REQUIRED: The complete policy to be applied to the `resource`. The size of | 1155 * REQUIRED: The complete policy to be applied to the `resource`. The size of |
| 1180 * the policy is limited to a few 10s of KB. An empty policy is a | 1156 * the policy is limited to a few 10s of KB. An empty policy is a |
| 1181 * valid policy but certain Cloud Platform services (such as Projects) | 1157 * valid policy but certain Cloud Platform services (such as Projects) |
| 1182 * might reject them. | 1158 * might reject them. |
| 1183 */ | 1159 */ |
| 1184 Policy policy; | 1160 Policy policy; |
| 1185 /** | 1161 /** |
| 1186 * OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only | 1162 * OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only |
| 1187 * the fields in the mask will be modified. If no mask is provided, a default | 1163 * the fields in the mask will be modified. If no mask is provided, the |
| 1188 * mask is used: | 1164 * following default mask is used: |
| 1189 * paths: "bindings, etag" | 1165 * paths: "bindings, etag" |
| 1190 * This field is only used by Cloud IAM. | 1166 * This field is only used by Cloud IAM. |
| 1191 */ | 1167 */ |
| 1192 core.String updateMask; | 1168 core.String updateMask; |
| 1193 | 1169 |
| 1194 SetIamPolicyRequest(); | 1170 SetIamPolicyRequest(); |
| 1195 | 1171 |
| 1196 SetIamPolicyRequest.fromJson(core.Map _json) { | 1172 SetIamPolicyRequest.fromJson(core.Map _json) { |
| 1197 if (_json.containsKey("policy")) { | 1173 if (_json.containsKey("policy")) { |
| 1198 policy = new Policy.fromJson(_json["policy"]); | 1174 policy = new Policy.fromJson(_json["policy"]); |
| (...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1258 } | 1234 } |
| 1259 | 1235 |
| 1260 core.Map toJson() { | 1236 core.Map toJson() { |
| 1261 var _json = new core.Map(); | 1237 var _json = new core.Map(); |
| 1262 if (permissions != null) { | 1238 if (permissions != null) { |
| 1263 _json["permissions"] = permissions; | 1239 _json["permissions"] = permissions; |
| 1264 } | 1240 } |
| 1265 return _json; | 1241 return _json; |
| 1266 } | 1242 } |
| 1267 } | 1243 } |
| OLD | NEW |