OLD | NEW |
1 // This is a generated file (see the discoveryapis_generator project). | 1 // This is a generated file (see the discoveryapis_generator project). |
2 | 2 |
3 library googleapis.sourcerepo.v1; | 3 library googleapis.sourcerepo.v1; |
4 | 4 |
5 import 'dart:core' as core; | 5 import 'dart:core' as core; |
6 import 'dart:async' as async; | 6 import 'dart:async' as async; |
7 import 'dart:convert' as convert; | 7 import 'dart:convert' as convert; |
8 | 8 |
9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; | 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; |
10 import 'package:http/http.dart' as http; | 10 import 'package:http/http.dart' as http; |
(...skipping 355 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
366 /** | 366 /** |
367 * Specifies the audit configuration for a service. | 367 * Specifies the audit configuration for a service. |
368 * The configuration determines which permission types are logged, and what | 368 * The configuration determines which permission types are logged, and what |
369 * identities, if any, are exempted from logging. | 369 * identities, if any, are exempted from logging. |
370 * An AuditConifg must have one or more AuditLogConfigs. | 370 * An AuditConifg must have one or more AuditLogConfigs. |
371 * | 371 * |
372 * If there are AuditConfigs for both `allServices` and a specific service, | 372 * If there are AuditConfigs for both `allServices` and a specific service, |
373 * the union of the two AuditConfigs is used for that service: the log_types | 373 * the union of the two AuditConfigs is used for that service: the log_types |
374 * specified in each AuditConfig are enabled, and the exempted_members in each | 374 * specified in each AuditConfig are enabled, and the exempted_members in each |
375 * AuditConfig are exempted. | 375 * AuditConfig are exempted. |
| 376 * |
376 * Example Policy with multiple AuditConfigs: | 377 * Example Policy with multiple AuditConfigs: |
377 * { | 378 * |
378 * "audit_configs": [ | |
379 * { | 379 * { |
380 * "service": "allServices" | 380 * "audit_configs": [ |
381 * "audit_log_configs": [ | |
382 * { | 381 * { |
383 * "log_type": "DATA_READ", | 382 * "service": "allServices" |
384 * "exempted_members": [ | 383 * "audit_log_configs": [ |
385 * "user:foo@gmail.com" | 384 * { |
| 385 * "log_type": "DATA_READ", |
| 386 * "exempted_members": [ |
| 387 * "user:foo@gmail.com" |
| 388 * ] |
| 389 * }, |
| 390 * { |
| 391 * "log_type": "DATA_WRITE", |
| 392 * }, |
| 393 * { |
| 394 * "log_type": "ADMIN_READ", |
| 395 * } |
386 * ] | 396 * ] |
387 * }, | 397 * }, |
388 * { | 398 * { |
389 * "log_type": "DATA_WRITE", | 399 * "service": "fooservice.googleapis.com" |
390 * }, | 400 * "audit_log_configs": [ |
391 * { | 401 * { |
392 * "log_type": "ADMIN_READ", | 402 * "log_type": "DATA_READ", |
393 * } | 403 * }, |
394 * ] | 404 * { |
395 * }, | 405 * "log_type": "DATA_WRITE", |
396 * { | 406 * "exempted_members": [ |
397 * "service": "fooservice@googleapis.com" | 407 * "user:bar@gmail.com" |
398 * "audit_log_configs": [ | 408 * ] |
399 * { | 409 * } |
400 * "log_type": "DATA_READ", | |
401 * }, | |
402 * { | |
403 * "log_type": "DATA_WRITE", | |
404 * "exempted_members": [ | |
405 * "user:bar@gmail.com" | |
406 * ] | 410 * ] |
407 * } | 411 * } |
408 * ] | 412 * ] |
409 * } | 413 * } |
410 * ] | 414 * |
411 * } | |
412 * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ | 415 * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ |
413 * logging. It also exempts foo@gmail.com from DATA_READ logging, and | 416 * logging. It also exempts foo@gmail.com from DATA_READ logging, and |
414 * bar@gmail.com from DATA_WRITE logging. | 417 * bar@gmail.com from DATA_WRITE logging. |
415 */ | 418 */ |
416 class AuditConfig { | 419 class AuditConfig { |
417 /** | 420 /** |
418 * The configuration for logging of each type of permission. | 421 * The configuration for logging of each type of permission. |
419 * Next ID: 4 | 422 * Next ID: 4 |
420 */ | 423 */ |
421 core.List<AuditLogConfig> auditLogConfigs; | 424 core.List<AuditLogConfig> auditLogConfigs; |
(...skipping 812 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1234 } | 1237 } |
1235 | 1238 |
1236 core.Map toJson() { | 1239 core.Map toJson() { |
1237 var _json = new core.Map(); | 1240 var _json = new core.Map(); |
1238 if (permissions != null) { | 1241 if (permissions != null) { |
1239 _json["permissions"] = permissions; | 1242 _json["permissions"] = permissions; |
1240 } | 1243 } |
1241 return _json; | 1244 return _json; |
1242 } | 1245 } |
1243 } | 1246 } |
OLD | NEW |