| OLD | NEW |
| 1 // This is a generated file (see the discoveryapis_generator project). | 1 // This is a generated file (see the discoveryapis_generator project). |
| 2 | 2 |
| 3 library googleapis.sourcerepo.v1; | 3 library googleapis.sourcerepo.v1; |
| 4 | 4 |
| 5 import 'dart:core' as core; | 5 import 'dart:core' as core; |
| 6 import 'dart:async' as async; | 6 import 'dart:async' as async; |
| 7 import 'dart:convert' as convert; | 7 import 'dart:convert' as convert; |
| 8 | 8 |
| 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; | 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; |
| 10 import 'package:http/http.dart' as http; | 10 import 'package:http/http.dart' as http; |
| (...skipping 355 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 366 /** | 366 /** |
| 367 * Specifies the audit configuration for a service. | 367 * Specifies the audit configuration for a service. |
| 368 * The configuration determines which permission types are logged, and what | 368 * The configuration determines which permission types are logged, and what |
| 369 * identities, if any, are exempted from logging. | 369 * identities, if any, are exempted from logging. |
| 370 * An AuditConifg must have one or more AuditLogConfigs. | 370 * An AuditConifg must have one or more AuditLogConfigs. |
| 371 * | 371 * |
| 372 * If there are AuditConfigs for both `allServices` and a specific service, | 372 * If there are AuditConfigs for both `allServices` and a specific service, |
| 373 * the union of the two AuditConfigs is used for that service: the log_types | 373 * the union of the two AuditConfigs is used for that service: the log_types |
| 374 * specified in each AuditConfig are enabled, and the exempted_members in each | 374 * specified in each AuditConfig are enabled, and the exempted_members in each |
| 375 * AuditConfig are exempted. | 375 * AuditConfig are exempted. |
| 376 * |
| 376 * Example Policy with multiple AuditConfigs: | 377 * Example Policy with multiple AuditConfigs: |
| 377 * { | 378 * |
| 378 * "audit_configs": [ | |
| 379 * { | 379 * { |
| 380 * "service": "allServices" | 380 * "audit_configs": [ |
| 381 * "audit_log_configs": [ | |
| 382 * { | 381 * { |
| 383 * "log_type": "DATA_READ", | 382 * "service": "allServices" |
| 384 * "exempted_members": [ | 383 * "audit_log_configs": [ |
| 385 * "user:foo@gmail.com" | 384 * { |
| 385 * "log_type": "DATA_READ", |
| 386 * "exempted_members": [ |
| 387 * "user:foo@gmail.com" |
| 388 * ] |
| 389 * }, |
| 390 * { |
| 391 * "log_type": "DATA_WRITE", |
| 392 * }, |
| 393 * { |
| 394 * "log_type": "ADMIN_READ", |
| 395 * } |
| 386 * ] | 396 * ] |
| 387 * }, | 397 * }, |
| 388 * { | 398 * { |
| 389 * "log_type": "DATA_WRITE", | 399 * "service": "fooservice.googleapis.com" |
| 390 * }, | 400 * "audit_log_configs": [ |
| 391 * { | 401 * { |
| 392 * "log_type": "ADMIN_READ", | 402 * "log_type": "DATA_READ", |
| 393 * } | 403 * }, |
| 394 * ] | 404 * { |
| 395 * }, | 405 * "log_type": "DATA_WRITE", |
| 396 * { | 406 * "exempted_members": [ |
| 397 * "service": "fooservice@googleapis.com" | 407 * "user:bar@gmail.com" |
| 398 * "audit_log_configs": [ | 408 * ] |
| 399 * { | 409 * } |
| 400 * "log_type": "DATA_READ", | |
| 401 * }, | |
| 402 * { | |
| 403 * "log_type": "DATA_WRITE", | |
| 404 * "exempted_members": [ | |
| 405 * "user:bar@gmail.com" | |
| 406 * ] | 410 * ] |
| 407 * } | 411 * } |
| 408 * ] | 412 * ] |
| 409 * } | 413 * } |
| 410 * ] | 414 * |
| 411 * } | |
| 412 * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ | 415 * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ |
| 413 * logging. It also exempts foo@gmail.com from DATA_READ logging, and | 416 * logging. It also exempts foo@gmail.com from DATA_READ logging, and |
| 414 * bar@gmail.com from DATA_WRITE logging. | 417 * bar@gmail.com from DATA_WRITE logging. |
| 415 */ | 418 */ |
| 416 class AuditConfig { | 419 class AuditConfig { |
| 417 /** | 420 /** |
| 418 * The configuration for logging of each type of permission. | 421 * The configuration for logging of each type of permission. |
| 419 * Next ID: 4 | 422 * Next ID: 4 |
| 420 */ | 423 */ |
| 421 core.List<AuditLogConfig> auditLogConfigs; | 424 core.List<AuditLogConfig> auditLogConfigs; |
| (...skipping 812 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1234 } | 1237 } |
| 1235 | 1238 |
| 1236 core.Map toJson() { | 1239 core.Map toJson() { |
| 1237 var _json = new core.Map(); | 1240 var _json = new core.Map(); |
| 1238 if (permissions != null) { | 1241 if (permissions != null) { |
| 1239 _json["permissions"] = permissions; | 1242 _json["permissions"] = permissions; |
| 1240 } | 1243 } |
| 1241 return _json; | 1244 return _json; |
| 1242 } | 1245 } |
| 1243 } | 1246 } |
| OLD | NEW |