Index: discovery/googleapis/sourcerepo__v1.json |
diff --git a/discovery/googleapis/sourcerepo__v1.json b/discovery/googleapis/sourcerepo__v1.json |
index c8781a1cd19818b21b3e2010e7bd0174bbd33fe6..81c63780835fac23b1316e519282b77420cfcc44 100644 |
--- a/discovery/googleapis/sourcerepo__v1.json |
+++ b/discovery/googleapis/sourcerepo__v1.json |
@@ -25,17 +25,6 @@ |
"ownerDomain": "google.com", |
"ownerName": "Google", |
"parameters": { |
- "quotaUser": { |
- "description": "Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters.", |
- "location": "query", |
- "type": "string" |
- }, |
- "pp": { |
- "default": "true", |
- "description": "Pretty-print response.", |
- "location": "query", |
- "type": "boolean" |
- }, |
"bearer_token": { |
"description": "OAuth bearer token.", |
"location": "query", |
@@ -57,13 +46,13 @@ |
"location": "query", |
"type": "boolean" |
}, |
- "uploadType": { |
- "description": "Legacy upload protocol for media (e.g. \"media\", \"multipart\").", |
+ "fields": { |
+ "description": "Selector specifying which fields to include in a partial response.", |
"location": "query", |
"type": "string" |
}, |
- "fields": { |
- "description": "Selector specifying which fields to include in a partial response.", |
+ "uploadType": { |
+ "description": "Legacy upload protocol for media (e.g. \"media\", \"multipart\").", |
"location": "query", |
"type": "string" |
}, |
@@ -110,6 +99,17 @@ |
"description": "OAuth access token.", |
"location": "query", |
"type": "string" |
+ }, |
+ "quotaUser": { |
+ "description": "Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exceed 40 characters.", |
+ "location": "query", |
+ "type": "string" |
+ }, |
+ "pp": { |
+ "default": "true", |
+ "description": "Pretty-print response.", |
+ "location": "query", |
+ "type": "boolean" |
} |
}, |
"protocol": "rest", |
@@ -142,55 +142,55 @@ |
"https://www.googleapis.com/auth/cloud-platform" |
] |
}, |
- "setIamPolicy": { |
- "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.", |
+ "create": { |
+ "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.", |
"httpMethod": "POST", |
- "id": "sourcerepo.projects.repos.setIamPolicy", |
+ "id": "sourcerepo.projects.repos.create", |
"parameterOrder": [ |
- "resource" |
+ "parent" |
], |
"parameters": { |
- "resource": { |
- "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.", |
+ "parent": { |
+ "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.", |
"location": "path", |
- "pattern": "^projects/[^/]+/repos/.+$", |
+ "pattern": "^projects/[^/]+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+resource}:setIamPolicy", |
+ "path": "v1/{+parent}/repos", |
"request": { |
- "$ref": "SetIamPolicyRequest" |
+ "$ref": "Repo" |
}, |
"response": { |
- "$ref": "Policy" |
+ "$ref": "Repo" |
}, |
"scopes": [ |
"https://www.googleapis.com/auth/cloud-platform" |
] |
}, |
- "create": { |
- "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.", |
+ "setIamPolicy": { |
+ "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.", |
"httpMethod": "POST", |
- "id": "sourcerepo.projects.repos.create", |
+ "id": "sourcerepo.projects.repos.setIamPolicy", |
"parameterOrder": [ |
- "parent" |
+ "resource" |
], |
"parameters": { |
- "parent": { |
- "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.", |
+ "resource": { |
+ "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.", |
"location": "path", |
- "pattern": "^projects/[^/]+$", |
+ "pattern": "^projects/[^/]+/repos/.+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+parent}/repos", |
+ "path": "v1/{+resource}:setIamPolicy", |
"request": { |
- "$ref": "Repo" |
+ "$ref": "SetIamPolicyRequest" |
}, |
"response": { |
- "$ref": "Repo" |
+ "$ref": "Policy" |
}, |
"scopes": [ |
"https://www.googleapis.com/auth/cloud-platform" |
@@ -300,130 +300,104 @@ |
} |
} |
}, |
- "revision": "20170228", |
+ "revision": "20170321", |
"rootUrl": "https://sourcerepo.googleapis.com/", |
"schemas": { |
- "AuditLogConfig": { |
- "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
- "id": "AuditLogConfig", |
+ "SetIamPolicyRequest": { |
+ "description": "Request message for `SetIamPolicy` method.", |
+ "id": "SetIamPolicyRequest", |
"properties": { |
- "logType": { |
- "description": "The log type that this config enables.", |
- "enum": [ |
- "LOG_TYPE_UNSPECIFIED", |
- "ADMIN_READ", |
- "DATA_WRITE", |
- "DATA_READ" |
- ], |
- "enumDescriptions": [ |
- "Default case. Should never be this.", |
- "Admin reads. Example: CloudIAM getIamPolicy", |
- "Data writes. Example: CloudSQL Users create", |
- "Data reads. Example: CloudSQL Users list" |
- ], |
+ "updateMask": { |
+ "description": "OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\"\nThis field is only used by Cloud IAM.", |
+ "format": "google-fieldmask", |
"type": "string" |
}, |
- "exemptedMembers": { |
- "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
+ "policy": { |
+ "$ref": "Policy", |
+ "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them." |
} |
}, |
"type": "object" |
}, |
- "Rule": { |
- "description": "A rule to be applied in a Policy.", |
- "id": "Rule", |
+ "CloudAuditOptions": { |
+ "description": "Write a Cloud Audit log", |
+ "id": "CloudAuditOptions", |
+ "properties": {}, |
+ "type": "object" |
+ }, |
+ "Binding": { |
+ "description": "Associates `members` with a `role`.", |
+ "id": "Binding", |
"properties": { |
- "description": { |
- "description": "Human-readable description of the rule.", |
- "type": "string" |
- }, |
- "conditions": { |
- "description": "Additional restrictions that must be met", |
- "items": { |
- "$ref": "Condition" |
- }, |
- "type": "array" |
- }, |
- "logConfig": { |
- "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.", |
- "items": { |
- "$ref": "LogConfig" |
- }, |
- "type": "array" |
- }, |
- "in": { |
- "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.", |
+ "members": { |
+ "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n", |
"items": { |
"type": "string" |
}, |
"type": "array" |
}, |
- "permissions": { |
- "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
+ "role": { |
+ "description": "Role that is assigned to `members`.\nFor example, `roles/viewer`, `roles/editor`, or `roles/owner`.\nRequired", |
+ "type": "string" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "Empty": { |
+ "description": "A generic empty message that you can re-use to avoid defining duplicated\nempty messages in your APIs. A typical example is to use it as the request\nor the response type of an API method. For instance:\n\n service Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty);\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.", |
+ "id": "Empty", |
+ "properties": {}, |
+ "type": "object" |
+ }, |
+ "MirrorConfig": { |
+ "description": "Configuration to automatically mirror a repository from another\nhosting service, for example GitHub or BitBucket.", |
+ "id": "MirrorConfig", |
+ "properties": { |
+ "deployKeyId": { |
+ "description": "ID of the SSH deploy key at the other hosting service.\nRemoving this key from the other service would deauthorize\nGoogle Cloud Source Repositories from mirroring.", |
+ "type": "string" |
}, |
- "action": { |
- "description": "Required", |
- "enum": [ |
- "NO_ACTION", |
- "ALLOW", |
- "ALLOW_WITH_LOG", |
- "DENY", |
- "DENY_WITH_LOG", |
- "LOG" |
- ], |
- "enumDescriptions": [ |
- "Default no action.", |
- "Matching 'Entries' grant access.", |
- "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.", |
- "Matching 'Entries' deny access.", |
- "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.", |
- "Matching 'Entries' tell IAM.Check callers to generate logs." |
- ], |
+ "url": { |
+ "description": "URL of the main repository at the other hosting service.", |
"type": "string" |
}, |
- "notIn": { |
- "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
+ "webhookId": { |
+ "description": "ID of the webhook listening to updates to trigger mirroring.\nRemoving this webook from the other hosting service will stop\nGoogle Cloud Source Repositories from receiving notifications,\nand thereby disabling mirroring.", |
+ "type": "string" |
} |
}, |
"type": "object" |
}, |
- "LogConfig": { |
- "description": "Specifies what kind of log the caller must write\nIncrement a streamz counter with the specified metric and field names.\n\nMetric names should start with a '/', generally be lowercase-only,\nand end in \"_count\". Field names should not contain an initial slash.\nThe actual exported metric names will have \"/iam/policy\" prepended.\n\nField names correspond to IAM request parameters and field values are\ntheir respective values.\n\nAt present the only supported field names are\n - \"iam_principal\", corresponding to IAMContext.principal;\n - \"\" (empty string), resulting in one aggretated counter with no field.\n\nExamples:\n counter { metric: \"/debug_access_count\" field: \"iam_principal\" }\n ==> increment counter /iam/policy/backend_debug_access_count\n {iam_principal=[value of IAMContext.principal]}\n\nAt this time we do not support:\n* multiple field names (though this may be supported in the future)\n* decrementing the counter\n* incrementing it by anything other than 1", |
- "id": "LogConfig", |
+ "Repo": { |
+ "description": "A repository (or repo) is a Git repository storing versioned source content.", |
+ "id": "Repo", |
"properties": { |
- "cloudAudit": { |
- "$ref": "CloudAuditOptions", |
- "description": "Cloud audit options." |
+ "mirrorConfig": { |
+ "$ref": "MirrorConfig", |
+ "description": "How this repository mirrors a repository managed by another service." |
}, |
- "counter": { |
- "$ref": "CounterOptions", |
- "description": "Counter options." |
+ "url": { |
+ "description": "URL to clone the repository from Google Cloud Source Repositories.", |
+ "type": "string" |
}, |
- "dataAccess": { |
- "$ref": "DataAccessOptions", |
- "description": "Data access options." |
+ "size": { |
+ "description": "The size in bytes of the repo.", |
+ "format": "int64", |
+ "type": "string" |
+ }, |
+ "name": { |
+ "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`.", |
+ "type": "string" |
} |
}, |
"type": "object" |
}, |
- "TestIamPermissionsRequest": { |
- "description": "Request message for `TestIamPermissions` method.", |
- "id": "TestIamPermissionsRequest", |
+ "TestIamPermissionsResponse": { |
+ "description": "Response message for `TestIamPermissions` method.", |
+ "id": "TestIamPermissionsResponse", |
"properties": { |
"permissions": { |
- "description": "The set of permissions to check for the `resource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed. For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/overview#permissions).", |
+ "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.", |
"items": { |
"type": "string" |
}, |
@@ -432,198 +406,49 @@ |
}, |
"type": "object" |
}, |
- "Policy": { |
- "description": "Defines an Identity and Access Management (IAM) policy. It is used to\nspecify access control policies for Cloud Platform resources.\n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n`members` to a `role`, where the members can be user accounts, Google groups,\nGoogle domains, and service accounts. A `role` is a named list of permissions\ndefined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike@example.com\",\n \"group:admins@example.com\",\n \"domain:google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccount.com\",\n ]\n },\n {\n \"role\": \"roles/viewer\",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide](https://cloud.google.com/iam).", |
- "id": "Policy", |
+ "ListReposResponse": { |
+ "description": "Response for ListRepos.", |
+ "id": "ListReposResponse", |
"properties": { |
- "etag": { |
- "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.", |
- "format": "byte", |
- "type": "string" |
- }, |
- "iamOwned": { |
- "type": "boolean" |
- }, |
- "rules": { |
- "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.", |
+ "repos": { |
+ "description": "The listed repos.", |
"items": { |
- "$ref": "Rule" |
- }, |
- "type": "array" |
- }, |
- "version": { |
- "description": "Version of the `Policy`. The default version is 0.", |
- "format": "int32", |
- "type": "integer" |
- }, |
- "auditConfigs": { |
- "description": "Specifies cloud audit logging configuration for this policy.", |
- "items": { |
- "$ref": "AuditConfig" |
- }, |
- "type": "array" |
- }, |
- "bindings": { |
- "description": "Associates a list of `members` to a `role`.\nMultiple `bindings` must not be specified for the same `role`.\n`bindings` with no members will result in an error.", |
- "items": { |
- "$ref": "Binding" |
+ "$ref": "Repo" |
}, |
"type": "array" |
} |
}, |
"type": "object" |
}, |
- "DataAccessOptions": { |
- "description": "Write a Data Access (Gin) log", |
- "id": "DataAccessOptions", |
- "properties": {}, |
- "type": "object" |
- }, |
- "AuditConfig": { |
- "description": "Specifies the audit configuration for a service.\nIt consists of which permission types are logged, and what identities, if\nany, are exempted from logging.\nAn AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice@googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
- "id": "AuditConfig", |
- "properties": { |
- "service": { |
- "description": "Specifies a service that will be enabled for audit logging.\nFor example, `resourcemanager`, `storage`, `compute`.\n`allServices` is a special value that covers all services.", |
- "type": "string" |
- }, |
- "auditLogConfigs": { |
- "description": "The configuration for logging of each type of permission.\nNext ID: 4", |
- "items": { |
- "$ref": "AuditLogConfig" |
- }, |
- "type": "array" |
- }, |
- "exemptedMembers": { |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- } |
- }, |
- "type": "object" |
- }, |
- "SetIamPolicyRequest": { |
- "description": "Request message for `SetIamPolicy` method.", |
- "id": "SetIamPolicyRequest", |
- "properties": { |
- "updateMask": { |
- "description": "OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, a default\nmask is used:\npaths: \"bindings, etag\"\nThis field is only used by Cloud IAM.", |
- "format": "google-fieldmask", |
- "type": "string" |
- }, |
- "policy": { |
- "$ref": "Policy", |
- "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them." |
- } |
- }, |
- "type": "object" |
- }, |
- "CloudAuditOptions": { |
- "description": "Write a Cloud Audit log", |
- "id": "CloudAuditOptions", |
- "properties": {}, |
- "type": "object" |
- }, |
- "Binding": { |
- "description": "Associates `members` with a `role`.", |
- "id": "Binding", |
+ "Condition": { |
+ "description": "A condition to be met.", |
+ "id": "Condition", |
"properties": { |
- "members": { |
- "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n", |
+ "values": { |
+ "description": "The objects of the condition. This is mutually exclusive with 'value'.", |
"items": { |
"type": "string" |
}, |
"type": "array" |
}, |
- "role": { |
- "description": "Role that is assigned to `members`.\nFor example, `roles/viewer`, `roles/editor`, or `roles/owner`.\nRequired", |
- "type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "Empty": { |
- "description": "A generic empty message that you can re-use to avoid defining duplicated\nempty messages in your APIs. A typical example is to use it as the request\nor the response type of an API method. For instance:\n\n service Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty);\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.", |
- "id": "Empty", |
- "properties": {}, |
- "type": "object" |
- }, |
- "MirrorConfig": { |
- "description": "Configuration to automatically mirror a repository from another\nhosting service, for example GitHub or BitBucket.", |
- "id": "MirrorConfig", |
- "properties": { |
- "deployKeyId": { |
- "description": "ID of the SSH deploy key at the other hosting service.\nRemoving this key from the other service would deauthorize\nGoogle Cloud Source Repositories from mirroring.", |
- "type": "string" |
- }, |
- "url": { |
- "description": "URL of the main repository at the other hosting service.", |
- "type": "string" |
- }, |
- "webhookId": { |
- "description": "ID of the webhook listening to updates to trigger mirroring.\nRemoving this webook from the other hosting service will stop\nGoogle Cloud Source Repositories from receiving notifications,\nand thereby disabling mirroring.", |
- "type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "Repo": { |
- "description": "A repository (or repo) is a Git repository storing versioned source content.", |
- "id": "Repo", |
- "properties": { |
- "size": { |
- "description": "The size in bytes of the repo.", |
- "format": "int64", |
- "type": "string" |
- }, |
- "name": { |
- "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`.", |
+ "iam": { |
+ "description": "Trusted attributes supplied by the IAM system.", |
+ "enum": [ |
+ "NO_ATTR", |
+ "AUTHORITY", |
+ "ATTRIBUTION", |
+ "APPROVER", |
+ "JUSTIFICATION_TYPE" |
+ ], |
+ "enumDescriptions": [ |
+ "Default non-attribute.", |
+ "Either principal or (if present) authority selector.", |
+ "The principal (even if an authority selector is present), which\nmust only be used for attribution, not authorization.", |
+ "An approver (distinct from the requester) that has authorized this\nrequest.\nWhen used with IN, the condition indicates that one of the approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, and are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
+ "What types of justifications have been supplied with this request.\nString values should match enum names from tech.iam.JustificationType,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported." |
+ ], |
"type": "string" |
}, |
- "mirrorConfig": { |
- "$ref": "MirrorConfig", |
- "description": "How this repository mirrors a repository managed by another service." |
- }, |
- "url": { |
- "description": "URL to clone the repository from Google Cloud Source Repositories.", |
- "type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "ListReposResponse": { |
- "description": "Response for ListRepos.", |
- "id": "ListReposResponse", |
- "properties": { |
- "repos": { |
- "description": "The listed repos.", |
- "items": { |
- "$ref": "Repo" |
- }, |
- "type": "array" |
- } |
- }, |
- "type": "object" |
- }, |
- "TestIamPermissionsResponse": { |
- "description": "Response message for `TestIamPermissions` method.", |
- "id": "TestIamPermissionsResponse", |
- "properties": { |
- "permissions": { |
- "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- } |
- }, |
- "type": "object" |
- }, |
- "Condition": { |
- "description": "A condition to be met.", |
- "id": "Condition", |
- "properties": { |
"op": { |
"description": "An operator to apply the subject with.", |
"enum": [ |
@@ -648,6 +473,10 @@ |
"description": "Trusted attributes discharged by the service.", |
"type": "string" |
}, |
+ "value": { |
+ "description": "DEPRECATED. Use 'values' instead.", |
+ "type": "string" |
+ }, |
"sys": { |
"description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.", |
"enum": [ |
@@ -665,50 +494,221 @@ |
"IP address of the caller" |
], |
"type": "string" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "CounterOptions": { |
+ "description": "Options for counters", |
+ "id": "CounterOptions", |
+ "properties": { |
+ "metric": { |
+ "description": "The metric to update.", |
+ "type": "string" |
}, |
- "value": { |
- "description": "DEPRECATED. Use 'values' instead.", |
+ "field": { |
+ "description": "The field value to attribute.", |
+ "type": "string" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "AuditLogConfig": { |
+ "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
+ "id": "AuditLogConfig", |
+ "properties": { |
+ "logType": { |
+ "description": "The log type that this config enables.", |
+ "enum": [ |
+ "LOG_TYPE_UNSPECIFIED", |
+ "ADMIN_READ", |
+ "DATA_WRITE", |
+ "DATA_READ" |
+ ], |
+ "enumDescriptions": [ |
+ "Default case. Should never be this.", |
+ "Admin reads. Example: CloudIAM getIamPolicy", |
+ "Data writes. Example: CloudSQL Users create", |
+ "Data reads. Example: CloudSQL Users list" |
+ ], |
"type": "string" |
}, |
- "values": { |
- "description": "The objects of the condition. This is mutually exclusive with 'value'.", |
+ "exemptedMembers": { |
+ "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
"items": { |
"type": "string" |
}, |
"type": "array" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "Rule": { |
+ "description": "A rule to be applied in a Policy.", |
+ "id": "Rule", |
+ "properties": { |
+ "logConfig": { |
+ "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.", |
+ "items": { |
+ "$ref": "LogConfig" |
+ }, |
+ "type": "array" |
}, |
- "iam": { |
- "description": "Trusted attributes supplied by the IAM system.", |
+ "in": { |
+ "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "permissions": { |
+ "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "action": { |
+ "description": "Required", |
"enum": [ |
- "NO_ATTR", |
- "AUTHORITY", |
- "ATTRIBUTION", |
- "APPROVER", |
- "JUSTIFICATION_TYPE" |
+ "NO_ACTION", |
+ "ALLOW", |
+ "ALLOW_WITH_LOG", |
+ "DENY", |
+ "DENY_WITH_LOG", |
+ "LOG" |
], |
"enumDescriptions": [ |
- "Default non-attribute.", |
- "Either principal or (if present) authority selector.", |
- "The principal (even if an authority selector is present), which\nmust only be used for attribution, not authorization.", |
- "An approver (distinct from the requester) that has authorized this\nrequest.\nWhen used with IN, the condition indicates that one of the approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, and are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
- "What types of justifications have been supplied with this request.\nString values should match enum names from tech.iam.JustificationType,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported." |
+ "Default no action.", |
+ "Matching 'Entries' grant access.", |
+ "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.", |
+ "Matching 'Entries' deny access.", |
+ "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.", |
+ "Matching 'Entries' tell IAM.Check callers to generate logs." |
], |
"type": "string" |
+ }, |
+ "notIn": { |
+ "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "description": { |
+ "description": "Human-readable description of the rule.", |
+ "type": "string" |
+ }, |
+ "conditions": { |
+ "description": "Additional restrictions that must be met", |
+ "items": { |
+ "$ref": "Condition" |
+ }, |
+ "type": "array" |
} |
}, |
"type": "object" |
}, |
- "CounterOptions": { |
- "description": "Options for counters", |
- "id": "CounterOptions", |
+ "LogConfig": { |
+ "description": "Specifies what kind of log the caller must write", |
+ "id": "LogConfig", |
"properties": { |
- "metric": { |
- "description": "The metric to update.", |
+ "counter": { |
+ "$ref": "CounterOptions", |
+ "description": "Counter options." |
+ }, |
+ "dataAccess": { |
+ "$ref": "DataAccessOptions", |
+ "description": "Data access options." |
+ }, |
+ "cloudAudit": { |
+ "$ref": "CloudAuditOptions", |
+ "description": "Cloud audit options." |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "TestIamPermissionsRequest": { |
+ "description": "Request message for `TestIamPermissions` method.", |
+ "id": "TestIamPermissionsRequest", |
+ "properties": { |
+ "permissions": { |
+ "description": "The set of permissions to check for the `resource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed. For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/overview#permissions).", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "Policy": { |
+ "description": "Defines an Identity and Access Management (IAM) policy. It is used to\nspecify access control policies for Cloud Platform resources.\n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n`members` to a `role`, where the members can be user accounts, Google groups,\nGoogle domains, and service accounts. A `role` is a named list of permissions\ndefined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike@example.com\",\n \"group:admins@example.com\",\n \"domain:google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccount.com\",\n ]\n },\n {\n \"role\": \"roles/viewer\",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide](https://cloud.google.com/iam).", |
+ "id": "Policy", |
+ "properties": { |
+ "etag": { |
+ "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.", |
+ "format": "byte", |
"type": "string" |
}, |
- "field": { |
- "description": "The field value to attribute.", |
+ "iamOwned": { |
+ "type": "boolean" |
+ }, |
+ "rules": { |
+ "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.", |
+ "items": { |
+ "$ref": "Rule" |
+ }, |
+ "type": "array" |
+ }, |
+ "version": { |
+ "description": "Version of the `Policy`. The default version is 0.", |
+ "format": "int32", |
+ "type": "integer" |
+ }, |
+ "auditConfigs": { |
+ "description": "Specifies cloud audit logging configuration for this policy.", |
+ "items": { |
+ "$ref": "AuditConfig" |
+ }, |
+ "type": "array" |
+ }, |
+ "bindings": { |
+ "description": "Associates a list of `members` to a `role`.\nMultiple `bindings` must not be specified for the same `role`.\n`bindings` with no members will result in an error.", |
+ "items": { |
+ "$ref": "Binding" |
+ }, |
+ "type": "array" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "DataAccessOptions": { |
+ "description": "Write a Data Access (Gin) log", |
+ "id": "DataAccessOptions", |
+ "properties": {}, |
+ "type": "object" |
+ }, |
+ "AuditConfig": { |
+ "description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice@googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
+ "id": "AuditConfig", |
+ "properties": { |
+ "service": { |
+ "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.", |
"type": "string" |
+ }, |
+ "auditLogConfigs": { |
+ "description": "The configuration for logging of each type of permission.\nNext ID: 4", |
+ "items": { |
+ "$ref": "AuditLogConfig" |
+ }, |
+ "type": "array" |
+ }, |
+ "exemptedMembers": { |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
} |
}, |
"type": "object" |