| OLD | NEW |
| 1 { | 1 { |
| 2 "auth": { | 2 "auth": { |
| 3 "oauth2": { | 3 "oauth2": { |
| 4 "scopes": { | 4 "scopes": { |
| 5 "https://www.googleapis.com/auth/cloud-platform": { | 5 "https://www.googleapis.com/auth/cloud-platform": { |
| 6 "description": "View and manage your data across Google Clou
d Platform services" | 6 "description": "View and manage your data across Google Clou
d Platform services" |
| 7 } | 7 } |
| 8 } | 8 } |
| 9 } | 9 } |
| 10 }, | 10 }, |
| 11 "basePath": "", | 11 "basePath": "", |
| 12 "baseUrl": "https://sourcerepo.googleapis.com/", | 12 "baseUrl": "https://sourcerepo.googleapis.com/", |
| 13 "batchPath": "batch", | 13 "batchPath": "batch", |
| 14 "canonicalName": "Cloud Source Repositories", | 14 "canonicalName": "Cloud Source Repositories", |
| 15 "description": "Access source code repositories hosted by Google.", | 15 "description": "Access source code repositories hosted by Google.", |
| 16 "discoveryVersion": "v1", | 16 "discoveryVersion": "v1", |
| 17 "documentationLink": "https://cloud.google.com/eap/cloud-repositories/cloud-
sourcerepo-api", | 17 "documentationLink": "https://cloud.google.com/eap/cloud-repositories/cloud-
sourcerepo-api", |
| 18 "icons": { | 18 "icons": { |
| 19 "x16": "http://www.google.com/images/icons/product/search-16.gif", | 19 "x16": "http://www.google.com/images/icons/product/search-16.gif", |
| 20 "x32": "http://www.google.com/images/icons/product/search-32.gif" | 20 "x32": "http://www.google.com/images/icons/product/search-32.gif" |
| 21 }, | 21 }, |
| 22 "id": "sourcerepo:v1", | 22 "id": "sourcerepo:v1", |
| 23 "kind": "discovery#restDescription", | 23 "kind": "discovery#restDescription", |
| 24 "name": "sourcerepo", | 24 "name": "sourcerepo", |
| 25 "ownerDomain": "google.com", | 25 "ownerDomain": "google.com", |
| 26 "ownerName": "Google", | 26 "ownerName": "Google", |
| 27 "parameters": { | 27 "parameters": { |
| 28 "bearer_token": { | |
| 29 "description": "OAuth bearer token.", | |
| 30 "location": "query", | |
| 31 "type": "string" | |
| 32 }, | |
| 33 "oauth_token": { | |
| 34 "description": "OAuth 2.0 token for the current user.", | |
| 35 "location": "query", | |
| 36 "type": "string" | |
| 37 }, | |
| 38 "upload_protocol": { | 28 "upload_protocol": { |
| 39 "description": "Upload protocol for media (e.g. \"raw\", \"multipart
\").", | 29 "description": "Upload protocol for media (e.g. \"raw\", \"multipart
\").", |
| 40 "location": "query", | 30 "location": "query", |
| 41 "type": "string" | 31 "type": "string" |
| 42 }, | 32 }, |
| 43 "prettyPrint": { | 33 "prettyPrint": { |
| 44 "default": "true", | 34 "default": "true", |
| 45 "description": "Returns response with indentations and line breaks."
, | 35 "description": "Returns response with indentations and line breaks."
, |
| 46 "location": "query", | 36 "location": "query", |
| 47 "type": "boolean" | 37 "type": "boolean" |
| (...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 103 "quotaUser": { | 93 "quotaUser": { |
| 104 "description": "Available to use for quota purposes for server-side
applications. Can be any arbitrary string assigned to a user, but should not exc
eed 40 characters.", | 94 "description": "Available to use for quota purposes for server-side
applications. Can be any arbitrary string assigned to a user, but should not exc
eed 40 characters.", |
| 105 "location": "query", | 95 "location": "query", |
| 106 "type": "string" | 96 "type": "string" |
| 107 }, | 97 }, |
| 108 "pp": { | 98 "pp": { |
| 109 "default": "true", | 99 "default": "true", |
| 110 "description": "Pretty-print response.", | 100 "description": "Pretty-print response.", |
| 111 "location": "query", | 101 "location": "query", |
| 112 "type": "boolean" | 102 "type": "boolean" |
| 103 }, |
| 104 "bearer_token": { |
| 105 "description": "OAuth bearer token.", |
| 106 "location": "query", |
| 107 "type": "string" |
| 108 }, |
| 109 "oauth_token": { |
| 110 "description": "OAuth 2.0 token for the current user.", |
| 111 "location": "query", |
| 112 "type": "string" |
| 113 } | 113 } |
| 114 }, | 114 }, |
| 115 "protocol": "rest", | 115 "protocol": "rest", |
| 116 "resources": { | 116 "resources": { |
| 117 "projects": { | 117 "projects": { |
| 118 "resources": { | 118 "resources": { |
| 119 "repos": { | 119 "repos": { |
| 120 "methods": { | 120 "methods": { |
| 121 "delete": { |
| 122 "description": "Deletes a repo.", |
| 123 "httpMethod": "DELETE", |
| 124 "id": "sourcerepo.projects.repos.delete", |
| 125 "parameterOrder": [ |
| 126 "name" |
| 127 ], |
| 128 "parameters": { |
| 129 "name": { |
| 130 "description": "The name of the repo to dele
te. Values are of the form\n`projects/<project>/repos/<repo>`.", |
| 131 "location": "path", |
| 132 "pattern": "^projects/[^/]+/repos/.+$", |
| 133 "required": true, |
| 134 "type": "string" |
| 135 } |
| 136 }, |
| 137 "path": "v1/{+name}", |
| 138 "response": { |
| 139 "$ref": "Empty" |
| 140 }, |
| 141 "scopes": [ |
| 142 "https://www.googleapis.com/auth/cloud-platform" |
| 143 ] |
| 144 }, |
| 121 "list": { | 145 "list": { |
| 122 "description": "Returns all repos belonging to a pro
ject.", | 146 "description": "Returns all repos belonging to a pro
ject.", |
| 123 "httpMethod": "GET", | 147 "httpMethod": "GET", |
| 124 "id": "sourcerepo.projects.repos.list", | 148 "id": "sourcerepo.projects.repos.list", |
| 125 "parameterOrder": [ | 149 "parameterOrder": [ |
| 126 "name" | 150 "name" |
| 127 ], | 151 ], |
| 128 "parameters": { | 152 "parameters": { |
| 129 "name": { | 153 "name": { |
| 130 "description": "The project ID whose repos s
hould be listed. Values are of the form\n`projects/<project>`.", | 154 "description": "The project ID whose repos s
hould be listed. Values are of the form\n`projects/<project>`.", |
| (...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 263 "path": "v1/{+resource}:testIamPermissions", | 287 "path": "v1/{+resource}:testIamPermissions", |
| 264 "request": { | 288 "request": { |
| 265 "$ref": "TestIamPermissionsRequest" | 289 "$ref": "TestIamPermissionsRequest" |
| 266 }, | 290 }, |
| 267 "response": { | 291 "response": { |
| 268 "$ref": "TestIamPermissionsResponse" | 292 "$ref": "TestIamPermissionsResponse" |
| 269 }, | 293 }, |
| 270 "scopes": [ | 294 "scopes": [ |
| 271 "https://www.googleapis.com/auth/cloud-platform" | 295 "https://www.googleapis.com/auth/cloud-platform" |
| 272 ] | 296 ] |
| 273 }, | |
| 274 "delete": { | |
| 275 "description": "Deletes a repo.", | |
| 276 "httpMethod": "DELETE", | |
| 277 "id": "sourcerepo.projects.repos.delete", | |
| 278 "parameterOrder": [ | |
| 279 "name" | |
| 280 ], | |
| 281 "parameters": { | |
| 282 "name": { | |
| 283 "description": "The name of the repo to dele
te. Values are of the form\n`projects/<project>/repos/<repo>`.", | |
| 284 "location": "path", | |
| 285 "pattern": "^projects/[^/]+/repos/.+$", | |
| 286 "required": true, | |
| 287 "type": "string" | |
| 288 } | |
| 289 }, | |
| 290 "path": "v1/{+name}", | |
| 291 "response": { | |
| 292 "$ref": "Empty" | |
| 293 }, | |
| 294 "scopes": [ | |
| 295 "https://www.googleapis.com/auth/cloud-platform" | |
| 296 ] | |
| 297 } | 297 } |
| 298 } | 298 } |
| 299 } | 299 } |
| 300 } | 300 } |
| 301 } | 301 } |
| 302 }, | 302 }, |
| 303 "revision": "20170321", | 303 "revision": "20170410", |
| 304 "rootUrl": "https://sourcerepo.googleapis.com/", | 304 "rootUrl": "https://sourcerepo.googleapis.com/", |
| 305 "schemas": { | 305 "schemas": { |
| 306 "SetIamPolicyRequest": { | 306 "SetIamPolicyRequest": { |
| 307 "description": "Request message for `SetIamPolicy` method.", | 307 "description": "Request message for `SetIamPolicy` method.", |
| 308 "id": "SetIamPolicyRequest", | 308 "id": "SetIamPolicyRequest", |
| 309 "properties": { | 309 "properties": { |
| 310 "policy": { |
| 311 "$ref": "Policy", |
| 312 "description": "REQUIRED: The complete policy to be applied
to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An emp
ty policy is a\nvalid policy but certain Cloud Platform services (such as Projec
ts)\nmight reject them." |
| 313 }, |
| 310 "updateMask": { | 314 "updateMask": { |
| 311 "description": "OPTIONAL: A FieldMask specifying which field
s of the policy to modify. Only\nthe fields in the mask will be modified. If no
mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\
"\nThis field is only used by Cloud IAM.", | 315 "description": "OPTIONAL: A FieldMask specifying which field
s of the policy to modify. Only\nthe fields in the mask will be modified. If no
mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\
"\nThis field is only used by Cloud IAM.", |
| 312 "format": "google-fieldmask", | 316 "format": "google-fieldmask", |
| 313 "type": "string" | 317 "type": "string" |
| 314 }, | |
| 315 "policy": { | |
| 316 "$ref": "Policy", | |
| 317 "description": "REQUIRED: The complete policy to be applied
to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An emp
ty policy is a\nvalid policy but certain Cloud Platform services (such as Projec
ts)\nmight reject them." | |
| 318 } | 318 } |
| 319 }, | 319 }, |
| 320 "type": "object" | 320 "type": "object" |
| 321 }, | 321 }, |
| 322 "CloudAuditOptions": { | 322 "CloudAuditOptions": { |
| 323 "description": "Write a Cloud Audit log", | 323 "description": "Write a Cloud Audit log", |
| 324 "id": "CloudAuditOptions", | 324 "id": "CloudAuditOptions", |
| 325 "properties": {}, | 325 "properties": {}, |
| 326 "type": "object" | 326 "type": "object" |
| 327 }, | 327 }, |
| (...skipping 18 matching lines...) Expand all Loading... |
| 346 "Empty": { | 346 "Empty": { |
| 347 "description": "A generic empty message that you can re-use to avoid
defining duplicated\nempty messages in your APIs. A typical example is to use i
t as the request\nor the response type of an API method. For instance:\n\n se
rvice Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty
);\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.", | 347 "description": "A generic empty message that you can re-use to avoid
defining duplicated\nempty messages in your APIs. A typical example is to use i
t as the request\nor the response type of an API method. For instance:\n\n se
rvice Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty
);\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.", |
| 348 "id": "Empty", | 348 "id": "Empty", |
| 349 "properties": {}, | 349 "properties": {}, |
| 350 "type": "object" | 350 "type": "object" |
| 351 }, | 351 }, |
| 352 "MirrorConfig": { | 352 "MirrorConfig": { |
| 353 "description": "Configuration to automatically mirror a repository f
rom another\nhosting service, for example GitHub or BitBucket.", | 353 "description": "Configuration to automatically mirror a repository f
rom another\nhosting service, for example GitHub or BitBucket.", |
| 354 "id": "MirrorConfig", | 354 "id": "MirrorConfig", |
| 355 "properties": { | 355 "properties": { |
| 356 "deployKeyId": { | |
| 357 "description": "ID of the SSH deploy key at the other hostin
g service.\nRemoving this key from the other service would deauthorize\nGoogle C
loud Source Repositories from mirroring.", | |
| 358 "type": "string" | |
| 359 }, | |
| 360 "url": { | 356 "url": { |
| 361 "description": "URL of the main repository at the other host
ing service.", | 357 "description": "URL of the main repository at the other host
ing service.", |
| 362 "type": "string" | 358 "type": "string" |
| 363 }, | 359 }, |
| 364 "webhookId": { | 360 "webhookId": { |
| 365 "description": "ID of the webhook listening to updates to tr
igger mirroring.\nRemoving this webook from the other hosting service will stop\
nGoogle Cloud Source Repositories from receiving notifications,\nand thereby dis
abling mirroring.", | 361 "description": "ID of the webhook listening to updates to tr
igger mirroring.\nRemoving this webook from the other hosting service will stop\
nGoogle Cloud Source Repositories from receiving notifications,\nand thereby dis
abling mirroring.", |
| 366 "type": "string" | 362 "type": "string" |
| 363 }, |
| 364 "deployKeyId": { |
| 365 "description": "ID of the SSH deploy key at the other hostin
g service.\nRemoving this key from the other service would deauthorize\nGoogle C
loud Source Repositories from mirroring.", |
| 366 "type": "string" |
| 367 } | 367 } |
| 368 }, | 368 }, |
| 369 "type": "object" | 369 "type": "object" |
| 370 }, | 370 }, |
| 371 "Repo": { | 371 "Repo": { |
| 372 "description": "A repository (or repo) is a Git repository storing v
ersioned source content.", | 372 "description": "A repository (or repo) is a Git repository storing v
ersioned source content.", |
| 373 "id": "Repo", | 373 "id": "Repo", |
| 374 "properties": { | 374 "properties": { |
| 375 "mirrorConfig": { | 375 "mirrorConfig": { |
| 376 "$ref": "MirrorConfig", | 376 "$ref": "MirrorConfig", |
| (...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 417 }, | 417 }, |
| 418 "type": "array" | 418 "type": "array" |
| 419 } | 419 } |
| 420 }, | 420 }, |
| 421 "type": "object" | 421 "type": "object" |
| 422 }, | 422 }, |
| 423 "Condition": { | 423 "Condition": { |
| 424 "description": "A condition to be met.", | 424 "description": "A condition to be met.", |
| 425 "id": "Condition", | 425 "id": "Condition", |
| 426 "properties": { | 426 "properties": { |
| 427 "values": { | |
| 428 "description": "The objects of the condition. This is mutual
ly exclusive with 'value'.", | |
| 429 "items": { | |
| 430 "type": "string" | |
| 431 }, | |
| 432 "type": "array" | |
| 433 }, | |
| 434 "iam": { | |
| 435 "description": "Trusted attributes supplied by the IAM syste
m.", | |
| 436 "enum": [ | |
| 437 "NO_ATTR", | |
| 438 "AUTHORITY", | |
| 439 "ATTRIBUTION", | |
| 440 "APPROVER", | |
| 441 "JUSTIFICATION_TYPE" | |
| 442 ], | |
| 443 "enumDescriptions": [ | |
| 444 "Default non-attribute.", | |
| 445 "Either principal or (if present) authority selector.", | |
| 446 "The principal (even if an authority selector is present
), which\nmust only be used for attribution, not authorization.", | |
| 447 "An approver (distinct from the requester) that has auth
orized this\nrequest.\nWhen used with IN, the condition indicates that one of th
e approvers\nassociated with the request matches the specified principal, or is
a\nmember of the specified group. Approvers can only grant additional\naccess, a
nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT
_IN).\nSee: go/rpc-security-policy-dynamicauth.", | |
| 448 "What types of justifications have been supplied with th
is request.\nString values should match enum names from tech.iam.JustificationTy
pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *
absence* of a justification, so justification conditions can only\nbe used in a
\"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications
, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported.
" | |
| 449 ], | |
| 450 "type": "string" | |
| 451 }, | |
| 452 "op": { | 427 "op": { |
| 453 "description": "An operator to apply the subject with.", | 428 "description": "An operator to apply the subject with.", |
| 454 "enum": [ | 429 "enum": [ |
| 455 "NO_OP", | 430 "NO_OP", |
| 456 "EQUALS", | 431 "EQUALS", |
| 457 "NOT_EQUALS", | 432 "NOT_EQUALS", |
| 458 "IN", | 433 "IN", |
| 459 "NOT_IN", | 434 "NOT_IN", |
| 460 "DISCHARGED" | 435 "DISCHARGED" |
| 461 ], | 436 ], |
| (...skipping 25 matching lines...) Expand all Loading... |
| 487 "IP" | 462 "IP" |
| 488 ], | 463 ], |
| 489 "enumDescriptions": [ | 464 "enumDescriptions": [ |
| 490 "Default non-attribute type", | 465 "Default non-attribute type", |
| 491 "Region of the resource", | 466 "Region of the resource", |
| 492 "Service name", | 467 "Service name", |
| 493 "Resource name", | 468 "Resource name", |
| 494 "IP address of the caller" | 469 "IP address of the caller" |
| 495 ], | 470 ], |
| 496 "type": "string" | 471 "type": "string" |
| 472 }, |
| 473 "iam": { |
| 474 "description": "Trusted attributes supplied by the IAM syste
m.", |
| 475 "enum": [ |
| 476 "NO_ATTR", |
| 477 "AUTHORITY", |
| 478 "ATTRIBUTION", |
| 479 "APPROVER", |
| 480 "JUSTIFICATION_TYPE" |
| 481 ], |
| 482 "enumDescriptions": [ |
| 483 "Default non-attribute.", |
| 484 "Either principal or (if present) authority selector.", |
| 485 "The principal (even if an authority selector is present
), which\nmust only be used for attribution, not authorization.", |
| 486 "An approver (distinct from the requester) that has auth
orized this\nrequest.\nWhen used with IN, the condition indicates that one of th
e approvers\nassociated with the request matches the specified principal, or is
a\nmember of the specified group. Approvers can only grant additional\naccess, a
nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT
_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
| 487 "What types of justifications have been supplied with th
is request.\nString values should match enum names from tech.iam.JustificationTy
pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *
absence* of a justification, so justification conditions can only\nbe used in a
\"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications
, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported.
" |
| 488 ], |
| 489 "type": "string" |
| 490 }, |
| 491 "values": { |
| 492 "description": "The objects of the condition. This is mutual
ly exclusive with 'value'.", |
| 493 "items": { |
| 494 "type": "string" |
| 495 }, |
| 496 "type": "array" |
| 497 } | 497 } |
| 498 }, | 498 }, |
| 499 "type": "object" | 499 "type": "object" |
| 500 }, | 500 }, |
| 501 "CounterOptions": { | 501 "CounterOptions": { |
| 502 "description": "Options for counters", | 502 "description": "Options for counters", |
| 503 "id": "CounterOptions", | 503 "id": "CounterOptions", |
| 504 "properties": { | 504 "properties": { |
| 505 "metric": { | 505 "metric": { |
| 506 "description": "The metric to update.", | 506 "description": "The metric to update.", |
| 507 "type": "string" | 507 "type": "string" |
| 508 }, | 508 }, |
| 509 "field": { | 509 "field": { |
| 510 "description": "The field value to attribute.", | 510 "description": "The field value to attribute.", |
| 511 "type": "string" | 511 "type": "string" |
| 512 } | 512 } |
| 513 }, | 513 }, |
| 514 "type": "object" | 514 "type": "object" |
| 515 }, | 515 }, |
| 516 "AuditLogConfig": { | 516 "AuditLogConfig": { |
| 517 "description": "Provides the configuration for logging a type of per
missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n
\"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n
\"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type
\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and '
DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", | 517 "description": "Provides the configuration for logging a type of per
missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n
\"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n
\"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type
\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and '
DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
| 518 "id": "AuditLogConfig", | 518 "id": "AuditLogConfig", |
| 519 "properties": { | 519 "properties": { |
| 520 "exemptedMembers": { |
| 521 "description": "Specifies the identities that do not cause l
ogging for this type of\npermission.\nFollows the same format of Binding.members
.", |
| 522 "items": { |
| 523 "type": "string" |
| 524 }, |
| 525 "type": "array" |
| 526 }, |
| 520 "logType": { | 527 "logType": { |
| 521 "description": "The log type that this config enables.", | 528 "description": "The log type that this config enables.", |
| 522 "enum": [ | 529 "enum": [ |
| 523 "LOG_TYPE_UNSPECIFIED", | 530 "LOG_TYPE_UNSPECIFIED", |
| 524 "ADMIN_READ", | 531 "ADMIN_READ", |
| 525 "DATA_WRITE", | 532 "DATA_WRITE", |
| 526 "DATA_READ" | 533 "DATA_READ" |
| 527 ], | 534 ], |
| 528 "enumDescriptions": [ | 535 "enumDescriptions": [ |
| 529 "Default case. Should never be this.", | 536 "Default case. Should never be this.", |
| 530 "Admin reads. Example: CloudIAM getIamPolicy", | 537 "Admin reads. Example: CloudIAM getIamPolicy", |
| 531 "Data writes. Example: CloudSQL Users create", | 538 "Data writes. Example: CloudSQL Users create", |
| 532 "Data reads. Example: CloudSQL Users list" | 539 "Data reads. Example: CloudSQL Users list" |
| 533 ], | 540 ], |
| 534 "type": "string" | 541 "type": "string" |
| 535 }, | |
| 536 "exemptedMembers": { | |
| 537 "description": "Specifies the identities that do not cause l
ogging for this type of\npermission.\nFollows the same format of Binding.members
.", | |
| 538 "items": { | |
| 539 "type": "string" | |
| 540 }, | |
| 541 "type": "array" | |
| 542 } | 542 } |
| 543 }, | 543 }, |
| 544 "type": "object" | 544 "type": "object" |
| 545 }, | 545 }, |
| 546 "Rule": { | 546 "Rule": { |
| 547 "description": "A rule to be applied in a Policy.", | 547 "description": "A rule to be applied in a Policy.", |
| 548 "id": "Rule", | 548 "id": "Rule", |
| 549 "properties": { | 549 "properties": { |
| 550 "conditions": { |
| 551 "description": "Additional restrictions that must be met", |
| 552 "items": { |
| 553 "$ref": "Condition" |
| 554 }, |
| 555 "type": "array" |
| 556 }, |
| 550 "logConfig": { | 557 "logConfig": { |
| 551 "description": "The config returned to callers of tech.iam.I
AM.CheckPolicy for any entries\nthat match the LOG action.", | 558 "description": "The config returned to callers of tech.iam.I
AM.CheckPolicy for any entries\nthat match the LOG action.", |
| 552 "items": { | 559 "items": { |
| 553 "$ref": "LogConfig" | 560 "$ref": "LogConfig" |
| 554 }, | 561 }, |
| 555 "type": "array" | 562 "type": "array" |
| 556 }, | 563 }, |
| 557 "in": { | 564 "in": { |
| 558 "description": "If one or more 'in' clauses are specified, t
he rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these
entries.", | 565 "description": "If one or more 'in' clauses are specified, t
he rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these
entries.", |
| 559 "items": { | 566 "items": { |
| (...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 591 "notIn": { | 598 "notIn": { |
| 592 "description": "If one or more 'not_in' clauses are specifie
d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri
es.\nThe format for in and not_in entries is the same as for members in a\nBindi
ng (see google/iam/v1/policy.proto).", | 599 "description": "If one or more 'not_in' clauses are specifie
d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri
es.\nThe format for in and not_in entries is the same as for members in a\nBindi
ng (see google/iam/v1/policy.proto).", |
| 593 "items": { | 600 "items": { |
| 594 "type": "string" | 601 "type": "string" |
| 595 }, | 602 }, |
| 596 "type": "array" | 603 "type": "array" |
| 597 }, | 604 }, |
| 598 "description": { | 605 "description": { |
| 599 "description": "Human-readable description of the rule.", | 606 "description": "Human-readable description of the rule.", |
| 600 "type": "string" | 607 "type": "string" |
| 601 }, | |
| 602 "conditions": { | |
| 603 "description": "Additional restrictions that must be met", | |
| 604 "items": { | |
| 605 "$ref": "Condition" | |
| 606 }, | |
| 607 "type": "array" | |
| 608 } | 608 } |
| 609 }, | 609 }, |
| 610 "type": "object" | 610 "type": "object" |
| 611 }, | 611 }, |
| 612 "LogConfig": { | 612 "LogConfig": { |
| 613 "description": "Specifies what kind of log the caller must write", | 613 "description": "Specifies what kind of log the caller must write", |
| 614 "id": "LogConfig", | 614 "id": "LogConfig", |
| 615 "properties": { | 615 "properties": { |
| 616 "cloudAudit": { |
| 617 "$ref": "CloudAuditOptions", |
| 618 "description": "Cloud audit options." |
| 619 }, |
| 616 "counter": { | 620 "counter": { |
| 617 "$ref": "CounterOptions", | 621 "$ref": "CounterOptions", |
| 618 "description": "Counter options." | 622 "description": "Counter options." |
| 619 }, | 623 }, |
| 620 "dataAccess": { | 624 "dataAccess": { |
| 621 "$ref": "DataAccessOptions", | 625 "$ref": "DataAccessOptions", |
| 622 "description": "Data access options." | 626 "description": "Data access options." |
| 623 }, | |
| 624 "cloudAudit": { | |
| 625 "$ref": "CloudAuditOptions", | |
| 626 "description": "Cloud audit options." | |
| 627 } | 627 } |
| 628 }, | 628 }, |
| 629 "type": "object" | 629 "type": "object" |
| 630 }, | 630 }, |
| 631 "TestIamPermissionsRequest": { | 631 "TestIamPermissionsRequest": { |
| 632 "description": "Request message for `TestIamPermissions` method.", | 632 "description": "Request message for `TestIamPermissions` method.", |
| 633 "id": "TestIamPermissionsRequest", | 633 "id": "TestIamPermissionsRequest", |
| 634 "properties": { | 634 "properties": { |
| 635 "permissions": { | 635 "permissions": { |
| 636 "description": "The set of permissions to check for the `res
ource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed
. For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/ov
erview#permissions).", | 636 "description": "The set of permissions to check for the `res
ource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed
. For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/ov
erview#permissions).", |
| (...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 683 }, | 683 }, |
| 684 "type": "object" | 684 "type": "object" |
| 685 }, | 685 }, |
| 686 "DataAccessOptions": { | 686 "DataAccessOptions": { |
| 687 "description": "Write a Data Access (Gin) log", | 687 "description": "Write a Data Access (Gin) log", |
| 688 "id": "DataAccessOptions", | 688 "id": "DataAccessOptions", |
| 689 "properties": {}, | 689 "properties": {}, |
| 690 "type": "object" | 690 "type": "object" |
| 691 }, | 691 }, |
| 692 "AuditConfig": { | 692 "AuditConfig": { |
| 693 "description": "Specifies the audit configuration for a service.\nTh
e configuration determines which permission types are logged, and what\nidentiti
es, if any, are exempted from logging.\nAn AuditConifg must have one or more Aud
itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific
service,\nthe union of the two AuditConfigs is used for that service: the log_t
ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac
h\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \
"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_lo
g_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"e
xempted_members\": [\n \"user:foo@gmail.com\"\n ]\n }
,\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n
\"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n
\"service\": \"fooservice@googleapis.com\"\n \"audit_log_configs\": [\n
{\n \"log_type\": \"DATA_READ\",\n },\n {\n
\"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"
user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooser
vice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also
exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRIT
E logging.", | 693 "description": "Specifies the audit configuration for a service.\nTh
e configuration determines which permission types are logged, and what\nidentiti
es, if any, are exempted from logging.\nAn AuditConifg must have one or more Aud
itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific
service,\nthe union of the two AuditConfigs is used for that service: the log_t
ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac
h\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n
{\n \"audit_configs\": [\n {\n \"service\": \"allServices
\"\n \"audit_log_configs\": [\n {\n \"log_type\
": \"DATA_READ\",\n \"exempted_members\": [\n \"user
:foo@gmail.com\"\n ]\n },\n {\n
\"log_type\": \"DATA_WRITE\",\n },\n {\n \"lo
g_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n
\"service\": \"fooservice.googleapis.com\"\n \"audit_log_config
s\": [\n {\n \"log_type\": \"DATA_READ\",\n }
,\n {\n \"log_type\": \"DATA_WRITE\",\n \"e
xempted_members\": [\n \"user:bar@gmail.com\"\n ]\n
}\n ]\n }\n ]\n }\n\nFor fooservice, this pol
icy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@g
mail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
| 694 "id": "AuditConfig", | 694 "id": "AuditConfig", |
| 695 "properties": { | 695 "properties": { |
| 696 "service": { | 696 "service": { |
| 697 "description": "Specifies a service that will be enabled for
audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com
`.\n`allServices` is a special value that covers all services.", | 697 "description": "Specifies a service that will be enabled for
audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com
`.\n`allServices` is a special value that covers all services.", |
| 698 "type": "string" | 698 "type": "string" |
| 699 }, | 699 }, |
| 700 "auditLogConfigs": { | 700 "auditLogConfigs": { |
| 701 "description": "The configuration for logging of each type o
f permission.\nNext ID: 4", | 701 "description": "The configuration for logging of each type o
f permission.\nNext ID: 4", |
| 702 "items": { | 702 "items": { |
| 703 "$ref": "AuditLogConfig" | 703 "$ref": "AuditLogConfig" |
| 704 }, | 704 }, |
| 705 "type": "array" | 705 "type": "array" |
| 706 }, | 706 }, |
| 707 "exemptedMembers": { | 707 "exemptedMembers": { |
| 708 "items": { | 708 "items": { |
| 709 "type": "string" | 709 "type": "string" |
| 710 }, | 710 }, |
| 711 "type": "array" | 711 "type": "array" |
| 712 } | 712 } |
| 713 }, | 713 }, |
| 714 "type": "object" | 714 "type": "object" |
| 715 } | 715 } |
| 716 }, | 716 }, |
| 717 "servicePath": "", | 717 "servicePath": "", |
| 718 "title": "Cloud Source Repositories API", | 718 "title": "Cloud Source Repositories API", |
| 719 "version": "v1" | 719 "version": "v1" |
| 720 } | 720 } |
| OLD | NEW |