OLD | NEW |
1 { | 1 { |
2 "auth": { | 2 "auth": { |
3 "oauth2": { | 3 "oauth2": { |
4 "scopes": { | 4 "scopes": { |
5 "https://www.googleapis.com/auth/cloud-platform": { | 5 "https://www.googleapis.com/auth/cloud-platform": { |
6 "description": "View and manage your data across Google Clou
d Platform services" | 6 "description": "View and manage your data across Google Clou
d Platform services" |
7 } | 7 } |
8 } | 8 } |
9 } | 9 } |
10 }, | 10 }, |
11 "basePath": "", | 11 "basePath": "", |
12 "baseUrl": "https://sourcerepo.googleapis.com/", | 12 "baseUrl": "https://sourcerepo.googleapis.com/", |
13 "batchPath": "batch", | 13 "batchPath": "batch", |
14 "canonicalName": "Cloud Source Repositories", | 14 "canonicalName": "Cloud Source Repositories", |
15 "description": "Access source code repositories hosted by Google.", | 15 "description": "Access source code repositories hosted by Google.", |
16 "discoveryVersion": "v1", | 16 "discoveryVersion": "v1", |
17 "documentationLink": "https://cloud.google.com/eap/cloud-repositories/cloud-
sourcerepo-api", | 17 "documentationLink": "https://cloud.google.com/eap/cloud-repositories/cloud-
sourcerepo-api", |
18 "icons": { | 18 "icons": { |
19 "x16": "http://www.google.com/images/icons/product/search-16.gif", | 19 "x16": "http://www.google.com/images/icons/product/search-16.gif", |
20 "x32": "http://www.google.com/images/icons/product/search-32.gif" | 20 "x32": "http://www.google.com/images/icons/product/search-32.gif" |
21 }, | 21 }, |
22 "id": "sourcerepo:v1", | 22 "id": "sourcerepo:v1", |
23 "kind": "discovery#restDescription", | 23 "kind": "discovery#restDescription", |
24 "name": "sourcerepo", | 24 "name": "sourcerepo", |
25 "ownerDomain": "google.com", | 25 "ownerDomain": "google.com", |
26 "ownerName": "Google", | 26 "ownerName": "Google", |
27 "parameters": { | 27 "parameters": { |
28 "bearer_token": { | |
29 "description": "OAuth bearer token.", | |
30 "location": "query", | |
31 "type": "string" | |
32 }, | |
33 "oauth_token": { | |
34 "description": "OAuth 2.0 token for the current user.", | |
35 "location": "query", | |
36 "type": "string" | |
37 }, | |
38 "upload_protocol": { | 28 "upload_protocol": { |
39 "description": "Upload protocol for media (e.g. \"raw\", \"multipart
\").", | 29 "description": "Upload protocol for media (e.g. \"raw\", \"multipart
\").", |
40 "location": "query", | 30 "location": "query", |
41 "type": "string" | 31 "type": "string" |
42 }, | 32 }, |
43 "prettyPrint": { | 33 "prettyPrint": { |
44 "default": "true", | 34 "default": "true", |
45 "description": "Returns response with indentations and line breaks."
, | 35 "description": "Returns response with indentations and line breaks."
, |
46 "location": "query", | 36 "location": "query", |
47 "type": "boolean" | 37 "type": "boolean" |
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
103 "quotaUser": { | 93 "quotaUser": { |
104 "description": "Available to use for quota purposes for server-side
applications. Can be any arbitrary string assigned to a user, but should not exc
eed 40 characters.", | 94 "description": "Available to use for quota purposes for server-side
applications. Can be any arbitrary string assigned to a user, but should not exc
eed 40 characters.", |
105 "location": "query", | 95 "location": "query", |
106 "type": "string" | 96 "type": "string" |
107 }, | 97 }, |
108 "pp": { | 98 "pp": { |
109 "default": "true", | 99 "default": "true", |
110 "description": "Pretty-print response.", | 100 "description": "Pretty-print response.", |
111 "location": "query", | 101 "location": "query", |
112 "type": "boolean" | 102 "type": "boolean" |
| 103 }, |
| 104 "bearer_token": { |
| 105 "description": "OAuth bearer token.", |
| 106 "location": "query", |
| 107 "type": "string" |
| 108 }, |
| 109 "oauth_token": { |
| 110 "description": "OAuth 2.0 token for the current user.", |
| 111 "location": "query", |
| 112 "type": "string" |
113 } | 113 } |
114 }, | 114 }, |
115 "protocol": "rest", | 115 "protocol": "rest", |
116 "resources": { | 116 "resources": { |
117 "projects": { | 117 "projects": { |
118 "resources": { | 118 "resources": { |
119 "repos": { | 119 "repos": { |
120 "methods": { | 120 "methods": { |
| 121 "delete": { |
| 122 "description": "Deletes a repo.", |
| 123 "httpMethod": "DELETE", |
| 124 "id": "sourcerepo.projects.repos.delete", |
| 125 "parameterOrder": [ |
| 126 "name" |
| 127 ], |
| 128 "parameters": { |
| 129 "name": { |
| 130 "description": "The name of the repo to dele
te. Values are of the form\n`projects/<project>/repos/<repo>`.", |
| 131 "location": "path", |
| 132 "pattern": "^projects/[^/]+/repos/.+$", |
| 133 "required": true, |
| 134 "type": "string" |
| 135 } |
| 136 }, |
| 137 "path": "v1/{+name}", |
| 138 "response": { |
| 139 "$ref": "Empty" |
| 140 }, |
| 141 "scopes": [ |
| 142 "https://www.googleapis.com/auth/cloud-platform" |
| 143 ] |
| 144 }, |
121 "list": { | 145 "list": { |
122 "description": "Returns all repos belonging to a pro
ject.", | 146 "description": "Returns all repos belonging to a pro
ject.", |
123 "httpMethod": "GET", | 147 "httpMethod": "GET", |
124 "id": "sourcerepo.projects.repos.list", | 148 "id": "sourcerepo.projects.repos.list", |
125 "parameterOrder": [ | 149 "parameterOrder": [ |
126 "name" | 150 "name" |
127 ], | 151 ], |
128 "parameters": { | 152 "parameters": { |
129 "name": { | 153 "name": { |
130 "description": "The project ID whose repos s
hould be listed. Values are of the form\n`projects/<project>`.", | 154 "description": "The project ID whose repos s
hould be listed. Values are of the form\n`projects/<project>`.", |
(...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
263 "path": "v1/{+resource}:testIamPermissions", | 287 "path": "v1/{+resource}:testIamPermissions", |
264 "request": { | 288 "request": { |
265 "$ref": "TestIamPermissionsRequest" | 289 "$ref": "TestIamPermissionsRequest" |
266 }, | 290 }, |
267 "response": { | 291 "response": { |
268 "$ref": "TestIamPermissionsResponse" | 292 "$ref": "TestIamPermissionsResponse" |
269 }, | 293 }, |
270 "scopes": [ | 294 "scopes": [ |
271 "https://www.googleapis.com/auth/cloud-platform" | 295 "https://www.googleapis.com/auth/cloud-platform" |
272 ] | 296 ] |
273 }, | |
274 "delete": { | |
275 "description": "Deletes a repo.", | |
276 "httpMethod": "DELETE", | |
277 "id": "sourcerepo.projects.repos.delete", | |
278 "parameterOrder": [ | |
279 "name" | |
280 ], | |
281 "parameters": { | |
282 "name": { | |
283 "description": "The name of the repo to dele
te. Values are of the form\n`projects/<project>/repos/<repo>`.", | |
284 "location": "path", | |
285 "pattern": "^projects/[^/]+/repos/.+$", | |
286 "required": true, | |
287 "type": "string" | |
288 } | |
289 }, | |
290 "path": "v1/{+name}", | |
291 "response": { | |
292 "$ref": "Empty" | |
293 }, | |
294 "scopes": [ | |
295 "https://www.googleapis.com/auth/cloud-platform" | |
296 ] | |
297 } | 297 } |
298 } | 298 } |
299 } | 299 } |
300 } | 300 } |
301 } | 301 } |
302 }, | 302 }, |
303 "revision": "20170321", | 303 "revision": "20170410", |
304 "rootUrl": "https://sourcerepo.googleapis.com/", | 304 "rootUrl": "https://sourcerepo.googleapis.com/", |
305 "schemas": { | 305 "schemas": { |
306 "SetIamPolicyRequest": { | 306 "SetIamPolicyRequest": { |
307 "description": "Request message for `SetIamPolicy` method.", | 307 "description": "Request message for `SetIamPolicy` method.", |
308 "id": "SetIamPolicyRequest", | 308 "id": "SetIamPolicyRequest", |
309 "properties": { | 309 "properties": { |
| 310 "policy": { |
| 311 "$ref": "Policy", |
| 312 "description": "REQUIRED: The complete policy to be applied
to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An emp
ty policy is a\nvalid policy but certain Cloud Platform services (such as Projec
ts)\nmight reject them." |
| 313 }, |
310 "updateMask": { | 314 "updateMask": { |
311 "description": "OPTIONAL: A FieldMask specifying which field
s of the policy to modify. Only\nthe fields in the mask will be modified. If no
mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\
"\nThis field is only used by Cloud IAM.", | 315 "description": "OPTIONAL: A FieldMask specifying which field
s of the policy to modify. Only\nthe fields in the mask will be modified. If no
mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\
"\nThis field is only used by Cloud IAM.", |
312 "format": "google-fieldmask", | 316 "format": "google-fieldmask", |
313 "type": "string" | 317 "type": "string" |
314 }, | |
315 "policy": { | |
316 "$ref": "Policy", | |
317 "description": "REQUIRED: The complete policy to be applied
to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An emp
ty policy is a\nvalid policy but certain Cloud Platform services (such as Projec
ts)\nmight reject them." | |
318 } | 318 } |
319 }, | 319 }, |
320 "type": "object" | 320 "type": "object" |
321 }, | 321 }, |
322 "CloudAuditOptions": { | 322 "CloudAuditOptions": { |
323 "description": "Write a Cloud Audit log", | 323 "description": "Write a Cloud Audit log", |
324 "id": "CloudAuditOptions", | 324 "id": "CloudAuditOptions", |
325 "properties": {}, | 325 "properties": {}, |
326 "type": "object" | 326 "type": "object" |
327 }, | 327 }, |
(...skipping 18 matching lines...) Expand all Loading... |
346 "Empty": { | 346 "Empty": { |
347 "description": "A generic empty message that you can re-use to avoid
defining duplicated\nempty messages in your APIs. A typical example is to use i
t as the request\nor the response type of an API method. For instance:\n\n se
rvice Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty
);\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.", | 347 "description": "A generic empty message that you can re-use to avoid
defining duplicated\nempty messages in your APIs. A typical example is to use i
t as the request\nor the response type of an API method. For instance:\n\n se
rvice Foo {\n rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty
);\n }\n\nThe JSON representation for `Empty` is empty JSON object `{}`.", |
348 "id": "Empty", | 348 "id": "Empty", |
349 "properties": {}, | 349 "properties": {}, |
350 "type": "object" | 350 "type": "object" |
351 }, | 351 }, |
352 "MirrorConfig": { | 352 "MirrorConfig": { |
353 "description": "Configuration to automatically mirror a repository f
rom another\nhosting service, for example GitHub or BitBucket.", | 353 "description": "Configuration to automatically mirror a repository f
rom another\nhosting service, for example GitHub or BitBucket.", |
354 "id": "MirrorConfig", | 354 "id": "MirrorConfig", |
355 "properties": { | 355 "properties": { |
356 "deployKeyId": { | |
357 "description": "ID of the SSH deploy key at the other hostin
g service.\nRemoving this key from the other service would deauthorize\nGoogle C
loud Source Repositories from mirroring.", | |
358 "type": "string" | |
359 }, | |
360 "url": { | 356 "url": { |
361 "description": "URL of the main repository at the other host
ing service.", | 357 "description": "URL of the main repository at the other host
ing service.", |
362 "type": "string" | 358 "type": "string" |
363 }, | 359 }, |
364 "webhookId": { | 360 "webhookId": { |
365 "description": "ID of the webhook listening to updates to tr
igger mirroring.\nRemoving this webook from the other hosting service will stop\
nGoogle Cloud Source Repositories from receiving notifications,\nand thereby dis
abling mirroring.", | 361 "description": "ID of the webhook listening to updates to tr
igger mirroring.\nRemoving this webook from the other hosting service will stop\
nGoogle Cloud Source Repositories from receiving notifications,\nand thereby dis
abling mirroring.", |
366 "type": "string" | 362 "type": "string" |
| 363 }, |
| 364 "deployKeyId": { |
| 365 "description": "ID of the SSH deploy key at the other hostin
g service.\nRemoving this key from the other service would deauthorize\nGoogle C
loud Source Repositories from mirroring.", |
| 366 "type": "string" |
367 } | 367 } |
368 }, | 368 }, |
369 "type": "object" | 369 "type": "object" |
370 }, | 370 }, |
371 "Repo": { | 371 "Repo": { |
372 "description": "A repository (or repo) is a Git repository storing v
ersioned source content.", | 372 "description": "A repository (or repo) is a Git repository storing v
ersioned source content.", |
373 "id": "Repo", | 373 "id": "Repo", |
374 "properties": { | 374 "properties": { |
375 "mirrorConfig": { | 375 "mirrorConfig": { |
376 "$ref": "MirrorConfig", | 376 "$ref": "MirrorConfig", |
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
417 }, | 417 }, |
418 "type": "array" | 418 "type": "array" |
419 } | 419 } |
420 }, | 420 }, |
421 "type": "object" | 421 "type": "object" |
422 }, | 422 }, |
423 "Condition": { | 423 "Condition": { |
424 "description": "A condition to be met.", | 424 "description": "A condition to be met.", |
425 "id": "Condition", | 425 "id": "Condition", |
426 "properties": { | 426 "properties": { |
427 "values": { | |
428 "description": "The objects of the condition. This is mutual
ly exclusive with 'value'.", | |
429 "items": { | |
430 "type": "string" | |
431 }, | |
432 "type": "array" | |
433 }, | |
434 "iam": { | |
435 "description": "Trusted attributes supplied by the IAM syste
m.", | |
436 "enum": [ | |
437 "NO_ATTR", | |
438 "AUTHORITY", | |
439 "ATTRIBUTION", | |
440 "APPROVER", | |
441 "JUSTIFICATION_TYPE" | |
442 ], | |
443 "enumDescriptions": [ | |
444 "Default non-attribute.", | |
445 "Either principal or (if present) authority selector.", | |
446 "The principal (even if an authority selector is present
), which\nmust only be used for attribution, not authorization.", | |
447 "An approver (distinct from the requester) that has auth
orized this\nrequest.\nWhen used with IN, the condition indicates that one of th
e approvers\nassociated with the request matches the specified principal, or is
a\nmember of the specified group. Approvers can only grant additional\naccess, a
nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT
_IN).\nSee: go/rpc-security-policy-dynamicauth.", | |
448 "What types of justifications have been supplied with th
is request.\nString values should match enum names from tech.iam.JustificationTy
pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *
absence* of a justification, so justification conditions can only\nbe used in a
\"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications
, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported.
" | |
449 ], | |
450 "type": "string" | |
451 }, | |
452 "op": { | 427 "op": { |
453 "description": "An operator to apply the subject with.", | 428 "description": "An operator to apply the subject with.", |
454 "enum": [ | 429 "enum": [ |
455 "NO_OP", | 430 "NO_OP", |
456 "EQUALS", | 431 "EQUALS", |
457 "NOT_EQUALS", | 432 "NOT_EQUALS", |
458 "IN", | 433 "IN", |
459 "NOT_IN", | 434 "NOT_IN", |
460 "DISCHARGED" | 435 "DISCHARGED" |
461 ], | 436 ], |
(...skipping 25 matching lines...) Expand all Loading... |
487 "IP" | 462 "IP" |
488 ], | 463 ], |
489 "enumDescriptions": [ | 464 "enumDescriptions": [ |
490 "Default non-attribute type", | 465 "Default non-attribute type", |
491 "Region of the resource", | 466 "Region of the resource", |
492 "Service name", | 467 "Service name", |
493 "Resource name", | 468 "Resource name", |
494 "IP address of the caller" | 469 "IP address of the caller" |
495 ], | 470 ], |
496 "type": "string" | 471 "type": "string" |
| 472 }, |
| 473 "iam": { |
| 474 "description": "Trusted attributes supplied by the IAM syste
m.", |
| 475 "enum": [ |
| 476 "NO_ATTR", |
| 477 "AUTHORITY", |
| 478 "ATTRIBUTION", |
| 479 "APPROVER", |
| 480 "JUSTIFICATION_TYPE" |
| 481 ], |
| 482 "enumDescriptions": [ |
| 483 "Default non-attribute.", |
| 484 "Either principal or (if present) authority selector.", |
| 485 "The principal (even if an authority selector is present
), which\nmust only be used for attribution, not authorization.", |
| 486 "An approver (distinct from the requester) that has auth
orized this\nrequest.\nWhen used with IN, the condition indicates that one of th
e approvers\nassociated with the request matches the specified principal, or is
a\nmember of the specified group. Approvers can only grant additional\naccess, a
nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT
_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
| 487 "What types of justifications have been supplied with th
is request.\nString values should match enum names from tech.iam.JustificationTy
pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *
absence* of a justification, so justification conditions can only\nbe used in a
\"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications
, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported.
" |
| 488 ], |
| 489 "type": "string" |
| 490 }, |
| 491 "values": { |
| 492 "description": "The objects of the condition. This is mutual
ly exclusive with 'value'.", |
| 493 "items": { |
| 494 "type": "string" |
| 495 }, |
| 496 "type": "array" |
497 } | 497 } |
498 }, | 498 }, |
499 "type": "object" | 499 "type": "object" |
500 }, | 500 }, |
501 "CounterOptions": { | 501 "CounterOptions": { |
502 "description": "Options for counters", | 502 "description": "Options for counters", |
503 "id": "CounterOptions", | 503 "id": "CounterOptions", |
504 "properties": { | 504 "properties": { |
505 "metric": { | 505 "metric": { |
506 "description": "The metric to update.", | 506 "description": "The metric to update.", |
507 "type": "string" | 507 "type": "string" |
508 }, | 508 }, |
509 "field": { | 509 "field": { |
510 "description": "The field value to attribute.", | 510 "description": "The field value to attribute.", |
511 "type": "string" | 511 "type": "string" |
512 } | 512 } |
513 }, | 513 }, |
514 "type": "object" | 514 "type": "object" |
515 }, | 515 }, |
516 "AuditLogConfig": { | 516 "AuditLogConfig": { |
517 "description": "Provides the configuration for logging a type of per
missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n
\"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n
\"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type
\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and '
DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", | 517 "description": "Provides the configuration for logging a type of per
missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n
\"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n
\"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type
\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and '
DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
518 "id": "AuditLogConfig", | 518 "id": "AuditLogConfig", |
519 "properties": { | 519 "properties": { |
| 520 "exemptedMembers": { |
| 521 "description": "Specifies the identities that do not cause l
ogging for this type of\npermission.\nFollows the same format of Binding.members
.", |
| 522 "items": { |
| 523 "type": "string" |
| 524 }, |
| 525 "type": "array" |
| 526 }, |
520 "logType": { | 527 "logType": { |
521 "description": "The log type that this config enables.", | 528 "description": "The log type that this config enables.", |
522 "enum": [ | 529 "enum": [ |
523 "LOG_TYPE_UNSPECIFIED", | 530 "LOG_TYPE_UNSPECIFIED", |
524 "ADMIN_READ", | 531 "ADMIN_READ", |
525 "DATA_WRITE", | 532 "DATA_WRITE", |
526 "DATA_READ" | 533 "DATA_READ" |
527 ], | 534 ], |
528 "enumDescriptions": [ | 535 "enumDescriptions": [ |
529 "Default case. Should never be this.", | 536 "Default case. Should never be this.", |
530 "Admin reads. Example: CloudIAM getIamPolicy", | 537 "Admin reads. Example: CloudIAM getIamPolicy", |
531 "Data writes. Example: CloudSQL Users create", | 538 "Data writes. Example: CloudSQL Users create", |
532 "Data reads. Example: CloudSQL Users list" | 539 "Data reads. Example: CloudSQL Users list" |
533 ], | 540 ], |
534 "type": "string" | 541 "type": "string" |
535 }, | |
536 "exemptedMembers": { | |
537 "description": "Specifies the identities that do not cause l
ogging for this type of\npermission.\nFollows the same format of Binding.members
.", | |
538 "items": { | |
539 "type": "string" | |
540 }, | |
541 "type": "array" | |
542 } | 542 } |
543 }, | 543 }, |
544 "type": "object" | 544 "type": "object" |
545 }, | 545 }, |
546 "Rule": { | 546 "Rule": { |
547 "description": "A rule to be applied in a Policy.", | 547 "description": "A rule to be applied in a Policy.", |
548 "id": "Rule", | 548 "id": "Rule", |
549 "properties": { | 549 "properties": { |
| 550 "conditions": { |
| 551 "description": "Additional restrictions that must be met", |
| 552 "items": { |
| 553 "$ref": "Condition" |
| 554 }, |
| 555 "type": "array" |
| 556 }, |
550 "logConfig": { | 557 "logConfig": { |
551 "description": "The config returned to callers of tech.iam.I
AM.CheckPolicy for any entries\nthat match the LOG action.", | 558 "description": "The config returned to callers of tech.iam.I
AM.CheckPolicy for any entries\nthat match the LOG action.", |
552 "items": { | 559 "items": { |
553 "$ref": "LogConfig" | 560 "$ref": "LogConfig" |
554 }, | 561 }, |
555 "type": "array" | 562 "type": "array" |
556 }, | 563 }, |
557 "in": { | 564 "in": { |
558 "description": "If one or more 'in' clauses are specified, t
he rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these
entries.", | 565 "description": "If one or more 'in' clauses are specified, t
he rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these
entries.", |
559 "items": { | 566 "items": { |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
591 "notIn": { | 598 "notIn": { |
592 "description": "If one or more 'not_in' clauses are specifie
d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri
es.\nThe format for in and not_in entries is the same as for members in a\nBindi
ng (see google/iam/v1/policy.proto).", | 599 "description": "If one or more 'not_in' clauses are specifie
d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri
es.\nThe format for in and not_in entries is the same as for members in a\nBindi
ng (see google/iam/v1/policy.proto).", |
593 "items": { | 600 "items": { |
594 "type": "string" | 601 "type": "string" |
595 }, | 602 }, |
596 "type": "array" | 603 "type": "array" |
597 }, | 604 }, |
598 "description": { | 605 "description": { |
599 "description": "Human-readable description of the rule.", | 606 "description": "Human-readable description of the rule.", |
600 "type": "string" | 607 "type": "string" |
601 }, | |
602 "conditions": { | |
603 "description": "Additional restrictions that must be met", | |
604 "items": { | |
605 "$ref": "Condition" | |
606 }, | |
607 "type": "array" | |
608 } | 608 } |
609 }, | 609 }, |
610 "type": "object" | 610 "type": "object" |
611 }, | 611 }, |
612 "LogConfig": { | 612 "LogConfig": { |
613 "description": "Specifies what kind of log the caller must write", | 613 "description": "Specifies what kind of log the caller must write", |
614 "id": "LogConfig", | 614 "id": "LogConfig", |
615 "properties": { | 615 "properties": { |
| 616 "cloudAudit": { |
| 617 "$ref": "CloudAuditOptions", |
| 618 "description": "Cloud audit options." |
| 619 }, |
616 "counter": { | 620 "counter": { |
617 "$ref": "CounterOptions", | 621 "$ref": "CounterOptions", |
618 "description": "Counter options." | 622 "description": "Counter options." |
619 }, | 623 }, |
620 "dataAccess": { | 624 "dataAccess": { |
621 "$ref": "DataAccessOptions", | 625 "$ref": "DataAccessOptions", |
622 "description": "Data access options." | 626 "description": "Data access options." |
623 }, | |
624 "cloudAudit": { | |
625 "$ref": "CloudAuditOptions", | |
626 "description": "Cloud audit options." | |
627 } | 627 } |
628 }, | 628 }, |
629 "type": "object" | 629 "type": "object" |
630 }, | 630 }, |
631 "TestIamPermissionsRequest": { | 631 "TestIamPermissionsRequest": { |
632 "description": "Request message for `TestIamPermissions` method.", | 632 "description": "Request message for `TestIamPermissions` method.", |
633 "id": "TestIamPermissionsRequest", | 633 "id": "TestIamPermissionsRequest", |
634 "properties": { | 634 "properties": { |
635 "permissions": { | 635 "permissions": { |
636 "description": "The set of permissions to check for the `res
ource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed
. For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/ov
erview#permissions).", | 636 "description": "The set of permissions to check for the `res
ource`. Permissions with\nwildcards (such as '*' or 'storage.*') are not allowed
. For more\ninformation see\n[IAM Overview](https://cloud.google.com/iam/docs/ov
erview#permissions).", |
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
683 }, | 683 }, |
684 "type": "object" | 684 "type": "object" |
685 }, | 685 }, |
686 "DataAccessOptions": { | 686 "DataAccessOptions": { |
687 "description": "Write a Data Access (Gin) log", | 687 "description": "Write a Data Access (Gin) log", |
688 "id": "DataAccessOptions", | 688 "id": "DataAccessOptions", |
689 "properties": {}, | 689 "properties": {}, |
690 "type": "object" | 690 "type": "object" |
691 }, | 691 }, |
692 "AuditConfig": { | 692 "AuditConfig": { |
693 "description": "Specifies the audit configuration for a service.\nTh
e configuration determines which permission types are logged, and what\nidentiti
es, if any, are exempted from logging.\nAn AuditConifg must have one or more Aud
itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific
service,\nthe union of the two AuditConfigs is used for that service: the log_t
ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac
h\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \
"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_lo
g_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"e
xempted_members\": [\n \"user:foo@gmail.com\"\n ]\n }
,\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n
\"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n
\"service\": \"fooservice@googleapis.com\"\n \"audit_log_configs\": [\n
{\n \"log_type\": \"DATA_READ\",\n },\n {\n
\"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"
user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooser
vice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also
exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRIT
E logging.", | 693 "description": "Specifies the audit configuration for a service.\nTh
e configuration determines which permission types are logged, and what\nidentiti
es, if any, are exempted from logging.\nAn AuditConifg must have one or more Aud
itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific
service,\nthe union of the two AuditConfigs is used for that service: the log_t
ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac
h\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n
{\n \"audit_configs\": [\n {\n \"service\": \"allServices
\"\n \"audit_log_configs\": [\n {\n \"log_type\
": \"DATA_READ\",\n \"exempted_members\": [\n \"user
:foo@gmail.com\"\n ]\n },\n {\n
\"log_type\": \"DATA_WRITE\",\n },\n {\n \"lo
g_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n
\"service\": \"fooservice.googleapis.com\"\n \"audit_log_config
s\": [\n {\n \"log_type\": \"DATA_READ\",\n }
,\n {\n \"log_type\": \"DATA_WRITE\",\n \"e
xempted_members\": [\n \"user:bar@gmail.com\"\n ]\n
}\n ]\n }\n ]\n }\n\nFor fooservice, this pol
icy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@g
mail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
694 "id": "AuditConfig", | 694 "id": "AuditConfig", |
695 "properties": { | 695 "properties": { |
696 "service": { | 696 "service": { |
697 "description": "Specifies a service that will be enabled for
audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com
`.\n`allServices` is a special value that covers all services.", | 697 "description": "Specifies a service that will be enabled for
audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com
`.\n`allServices` is a special value that covers all services.", |
698 "type": "string" | 698 "type": "string" |
699 }, | 699 }, |
700 "auditLogConfigs": { | 700 "auditLogConfigs": { |
701 "description": "The configuration for logging of each type o
f permission.\nNext ID: 4", | 701 "description": "The configuration for logging of each type o
f permission.\nNext ID: 4", |
702 "items": { | 702 "items": { |
703 "$ref": "AuditLogConfig" | 703 "$ref": "AuditLogConfig" |
704 }, | 704 }, |
705 "type": "array" | 705 "type": "array" |
706 }, | 706 }, |
707 "exemptedMembers": { | 707 "exemptedMembers": { |
708 "items": { | 708 "items": { |
709 "type": "string" | 709 "type": "string" |
710 }, | 710 }, |
711 "type": "array" | 711 "type": "array" |
712 } | 712 } |
713 }, | 713 }, |
714 "type": "object" | 714 "type": "object" |
715 } | 715 } |
716 }, | 716 }, |
717 "servicePath": "", | 717 "servicePath": "", |
718 "title": "Cloud Source Repositories API", | 718 "title": "Cloud Source Repositories API", |
719 "version": "v1" | 719 "version": "v1" |
720 } | 720 } |
OLD | NEW |