Index: discovery/googleapis/sourcerepo__v1.json |
diff --git a/discovery/googleapis/sourcerepo__v1.json b/discovery/googleapis/sourcerepo__v1.json |
index 81c63780835fac23b1316e519282b77420cfcc44..283964523b471fe772f98cfb69b333507830fae8 100644 |
--- a/discovery/googleapis/sourcerepo__v1.json |
+++ b/discovery/googleapis/sourcerepo__v1.json |
@@ -25,16 +25,6 @@ |
"ownerDomain": "google.com", |
"ownerName": "Google", |
"parameters": { |
- "bearer_token": { |
- "description": "OAuth bearer token.", |
- "location": "query", |
- "type": "string" |
- }, |
- "oauth_token": { |
- "description": "OAuth 2.0 token for the current user.", |
- "location": "query", |
- "type": "string" |
- }, |
"upload_protocol": { |
"description": "Upload protocol for media (e.g. \"raw\", \"multipart\").", |
"location": "query", |
@@ -110,6 +100,16 @@ |
"description": "Pretty-print response.", |
"location": "query", |
"type": "boolean" |
+ }, |
+ "bearer_token": { |
+ "description": "OAuth bearer token.", |
+ "location": "query", |
+ "type": "string" |
+ }, |
+ "oauth_token": { |
+ "description": "OAuth 2.0 token for the current user.", |
+ "location": "query", |
+ "type": "string" |
} |
}, |
"protocol": "rest", |
@@ -118,6 +118,30 @@ |
"resources": { |
"repos": { |
"methods": { |
+ "delete": { |
+ "description": "Deletes a repo.", |
+ "httpMethod": "DELETE", |
+ "id": "sourcerepo.projects.repos.delete", |
+ "parameterOrder": [ |
+ "name" |
+ ], |
+ "parameters": { |
+ "name": { |
+ "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.", |
+ "location": "path", |
+ "pattern": "^projects/[^/]+/repos/.+$", |
+ "required": true, |
+ "type": "string" |
+ } |
+ }, |
+ "path": "v1/{+name}", |
+ "response": { |
+ "$ref": "Empty" |
+ }, |
+ "scopes": [ |
+ "https://www.googleapis.com/auth/cloud-platform" |
+ ] |
+ }, |
"list": { |
"description": "Returns all repos belonging to a project.", |
"httpMethod": "GET", |
@@ -270,51 +294,27 @@ |
"scopes": [ |
"https://www.googleapis.com/auth/cloud-platform" |
] |
- }, |
- "delete": { |
- "description": "Deletes a repo.", |
- "httpMethod": "DELETE", |
- "id": "sourcerepo.projects.repos.delete", |
- "parameterOrder": [ |
- "name" |
- ], |
- "parameters": { |
- "name": { |
- "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.", |
- "location": "path", |
- "pattern": "^projects/[^/]+/repos/.+$", |
- "required": true, |
- "type": "string" |
- } |
- }, |
- "path": "v1/{+name}", |
- "response": { |
- "$ref": "Empty" |
- }, |
- "scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
- ] |
} |
} |
} |
} |
} |
}, |
- "revision": "20170321", |
+ "revision": "20170410", |
"rootUrl": "https://sourcerepo.googleapis.com/", |
"schemas": { |
"SetIamPolicyRequest": { |
"description": "Request message for `SetIamPolicy` method.", |
"id": "SetIamPolicyRequest", |
"properties": { |
+ "policy": { |
+ "$ref": "Policy", |
+ "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them." |
+ }, |
"updateMask": { |
"description": "OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\"\nThis field is only used by Cloud IAM.", |
"format": "google-fieldmask", |
"type": "string" |
- }, |
- "policy": { |
- "$ref": "Policy", |
- "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them." |
} |
}, |
"type": "object" |
@@ -353,10 +353,6 @@ |
"description": "Configuration to automatically mirror a repository from another\nhosting service, for example GitHub or BitBucket.", |
"id": "MirrorConfig", |
"properties": { |
- "deployKeyId": { |
- "description": "ID of the SSH deploy key at the other hosting service.\nRemoving this key from the other service would deauthorize\nGoogle Cloud Source Repositories from mirroring.", |
- "type": "string" |
- }, |
"url": { |
"description": "URL of the main repository at the other hosting service.", |
"type": "string" |
@@ -364,6 +360,10 @@ |
"webhookId": { |
"description": "ID of the webhook listening to updates to trigger mirroring.\nRemoving this webook from the other hosting service will stop\nGoogle Cloud Source Repositories from receiving notifications,\nand thereby disabling mirroring.", |
"type": "string" |
+ }, |
+ "deployKeyId": { |
+ "description": "ID of the SSH deploy key at the other hosting service.\nRemoving this key from the other service would deauthorize\nGoogle Cloud Source Repositories from mirroring.", |
+ "type": "string" |
} |
}, |
"type": "object" |
@@ -424,31 +424,6 @@ |
"description": "A condition to be met.", |
"id": "Condition", |
"properties": { |
- "values": { |
- "description": "The objects of the condition. This is mutually exclusive with 'value'.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- }, |
- "iam": { |
- "description": "Trusted attributes supplied by the IAM system.", |
- "enum": [ |
- "NO_ATTR", |
- "AUTHORITY", |
- "ATTRIBUTION", |
- "APPROVER", |
- "JUSTIFICATION_TYPE" |
- ], |
- "enumDescriptions": [ |
- "Default non-attribute.", |
- "Either principal or (if present) authority selector.", |
- "The principal (even if an authority selector is present), which\nmust only be used for attribution, not authorization.", |
- "An approver (distinct from the requester) that has authorized this\nrequest.\nWhen used with IN, the condition indicates that one of the approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, and are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
- "What types of justifications have been supplied with this request.\nString values should match enum names from tech.iam.JustificationType,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported." |
- ], |
- "type": "string" |
- }, |
"op": { |
"description": "An operator to apply the subject with.", |
"enum": [ |
@@ -494,6 +469,31 @@ |
"IP address of the caller" |
], |
"type": "string" |
+ }, |
+ "iam": { |
+ "description": "Trusted attributes supplied by the IAM system.", |
+ "enum": [ |
+ "NO_ATTR", |
+ "AUTHORITY", |
+ "ATTRIBUTION", |
+ "APPROVER", |
+ "JUSTIFICATION_TYPE" |
+ ], |
+ "enumDescriptions": [ |
+ "Default non-attribute.", |
+ "Either principal or (if present) authority selector.", |
+ "The principal (even if an authority selector is present), which\nmust only be used for attribution, not authorization.", |
+ "An approver (distinct from the requester) that has authorized this\nrequest.\nWhen used with IN, the condition indicates that one of the approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, and are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
+ "What types of justifications have been supplied with this request.\nString values should match enum names from tech.iam.JustificationType,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported." |
+ ], |
+ "type": "string" |
+ }, |
+ "values": { |
+ "description": "The objects of the condition. This is mutually exclusive with 'value'.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
} |
}, |
"type": "object" |
@@ -517,6 +517,13 @@ |
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
"id": "AuditLogConfig", |
"properties": { |
+ "exemptedMembers": { |
+ "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
"logType": { |
"description": "The log type that this config enables.", |
"enum": [ |
@@ -532,13 +539,6 @@ |
"Data reads. Example: CloudSQL Users list" |
], |
"type": "string" |
- }, |
- "exemptedMembers": { |
- "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
} |
}, |
"type": "object" |
@@ -547,6 +547,13 @@ |
"description": "A rule to be applied in a Policy.", |
"id": "Rule", |
"properties": { |
+ "conditions": { |
+ "description": "Additional restrictions that must be met", |
+ "items": { |
+ "$ref": "Condition" |
+ }, |
+ "type": "array" |
+ }, |
"logConfig": { |
"description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.", |
"items": { |
@@ -598,13 +605,6 @@ |
"description": { |
"description": "Human-readable description of the rule.", |
"type": "string" |
- }, |
- "conditions": { |
- "description": "Additional restrictions that must be met", |
- "items": { |
- "$ref": "Condition" |
- }, |
- "type": "array" |
} |
}, |
"type": "object" |
@@ -613,6 +613,10 @@ |
"description": "Specifies what kind of log the caller must write", |
"id": "LogConfig", |
"properties": { |
+ "cloudAudit": { |
+ "$ref": "CloudAuditOptions", |
+ "description": "Cloud audit options." |
+ }, |
"counter": { |
"$ref": "CounterOptions", |
"description": "Counter options." |
@@ -620,10 +624,6 @@ |
"dataAccess": { |
"$ref": "DataAccessOptions", |
"description": "Data access options." |
- }, |
- "cloudAudit": { |
- "$ref": "CloudAuditOptions", |
- "description": "Cloud audit options." |
} |
}, |
"type": "object" |
@@ -690,7 +690,7 @@ |
"type": "object" |
}, |
"AuditConfig": { |
- "description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\nExample Policy with multiple AuditConfigs:\n{\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice@googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n}\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
+ "description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
"id": "AuditConfig", |
"properties": { |
"service": { |