Index: discovery/googleapis/sourcerepo__v1.json |
diff --git a/discovery/googleapis/sourcerepo__v1.json b/discovery/googleapis/sourcerepo__v1.json |
index 9e9ced412081cdd26da13e822f7c46db31e4a4c3..cd358cb9419df18d6c395a0ff1d0887dbea55386 100644 |
--- a/discovery/googleapis/sourcerepo__v1.json |
+++ b/discovery/googleapis/sourcerepo__v1.json |
@@ -2,6 +2,12 @@ |
"auth": { |
"oauth2": { |
"scopes": { |
+ "https://www.googleapis.com/auth/source.read_only": { |
+ "description": "View the contents of your source code repositories" |
+ }, |
+ "https://www.googleapis.com/auth/source.read_write": { |
+ "description": "Manage the contents of your source code repositories" |
+ }, |
"https://www.googleapis.com/auth/cloud-platform": { |
"description": "View and manage your data across Google Cloud Platform services" |
} |
@@ -25,6 +31,17 @@ |
"ownerDomain": "google.com", |
"ownerName": "Google", |
"parameters": { |
+ "upload_protocol": { |
+ "description": "Upload protocol for media (e.g. \"raw\", \"multipart\").", |
+ "location": "query", |
+ "type": "string" |
+ }, |
+ "prettyPrint": { |
+ "default": "true", |
+ "description": "Returns response with indentations and line breaks.", |
+ "location": "query", |
+ "type": "boolean" |
+ }, |
"fields": { |
"description": "Selector specifying which fields to include in a partial response.", |
"location": "query", |
@@ -69,13 +86,13 @@ |
"location": "query", |
"type": "string" |
}, |
- "key": { |
- "description": "API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.", |
+ "access_token": { |
+ "description": "OAuth access token.", |
"location": "query", |
"type": "string" |
}, |
- "access_token": { |
- "description": "OAuth access token.", |
+ "key": { |
+ "description": "API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.", |
"location": "query", |
"type": "string" |
}, |
@@ -99,17 +116,6 @@ |
"description": "OAuth bearer token.", |
"location": "query", |
"type": "string" |
- }, |
- "upload_protocol": { |
- "description": "Upload protocol for media (e.g. \"raw\", \"multipart\").", |
- "location": "query", |
- "type": "string" |
- }, |
- "prettyPrint": { |
- "default": "true", |
- "description": "Returns response with indentations and line breaks.", |
- "location": "query", |
- "type": "boolean" |
} |
}, |
"protocol": "rest", |
@@ -118,192 +124,206 @@ |
"resources": { |
"repos": { |
"methods": { |
- "testIamPermissions": { |
- "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.", |
+ "setIamPolicy": { |
+ "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.", |
"httpMethod": "POST", |
- "id": "sourcerepo.projects.repos.testIamPermissions", |
+ "id": "sourcerepo.projects.repos.setIamPolicy", |
"parameterOrder": [ |
"resource" |
], |
"parameters": { |
"resource": { |
- "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.", |
+ "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.", |
"location": "path", |
"pattern": "^projects/[^/]+/repos/.+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+resource}:testIamPermissions", |
+ "path": "v1/{+resource}:setIamPolicy", |
"request": { |
- "$ref": "TestIamPermissionsRequest" |
+ "$ref": "SetIamPolicyRequest" |
}, |
"response": { |
- "$ref": "TestIamPermissionsResponse" |
+ "$ref": "Policy" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
}, |
- "delete": { |
- "description": "Deletes a repo.", |
- "httpMethod": "DELETE", |
- "id": "sourcerepo.projects.repos.delete", |
+ "create": { |
+ "description": "Creates a repo in the given project with the given name.\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.", |
+ "httpMethod": "POST", |
+ "id": "sourcerepo.projects.repos.create", |
"parameterOrder": [ |
- "name" |
+ "parent" |
], |
"parameters": { |
- "name": { |
- "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.", |
+ "parent": { |
+ "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.", |
"location": "path", |
- "pattern": "^projects/[^/]+/repos/.+$", |
+ "pattern": "^projects/[^/]+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+name}", |
+ "path": "v1/{+parent}/repos", |
+ "request": { |
+ "$ref": "Repo" |
+ }, |
"response": { |
- "$ref": "Empty" |
+ "$ref": "Repo" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
}, |
- "list": { |
- "description": "Returns all repos belonging to a project.", |
+ "getIamPolicy": { |
+ "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a policy\nset.", |
"httpMethod": "GET", |
- "id": "sourcerepo.projects.repos.list", |
+ "id": "sourcerepo.projects.repos.getIamPolicy", |
"parameterOrder": [ |
- "name" |
+ "resource" |
], |
"parameters": { |
- "name": { |
- "description": "The project ID whose repos should be listed. Values are of the form\n`projects/<project>`.", |
+ "resource": { |
+ "description": "REQUIRED: The resource for which the policy is being requested.\nSee the operation documentation for the appropriate value for this field.", |
"location": "path", |
- "pattern": "^projects/[^/]+$", |
+ "pattern": "^projects/[^/]+/repos/.+$", |
"required": true, |
"type": "string" |
- }, |
- "pageToken": { |
- "description": "Resume listing repositories where a prior ListReposResponse\nleft off. This is an opaque token that must be obtained from\na recent, prior ListReposResponse's next_page_token field.", |
- "location": "query", |
- "type": "string" |
- }, |
- "pageSize": { |
- "description": "Maximum number of repositories to return; between 1 and 500.\nIf not set or zero, defaults to 100 at the server.", |
- "format": "int32", |
- "location": "query", |
- "type": "integer" |
} |
}, |
- "path": "v1/{+name}/repos", |
+ "path": "v1/{+resource}:getIamPolicy", |
"response": { |
- "$ref": "ListReposResponse" |
+ "$ref": "Policy" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
}, |
- "create": { |
- "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.", |
- "httpMethod": "POST", |
- "id": "sourcerepo.projects.repos.create", |
+ "get": { |
+ "description": "Returns information about a repo.", |
+ "httpMethod": "GET", |
+ "id": "sourcerepo.projects.repos.get", |
"parameterOrder": [ |
- "parent" |
+ "name" |
], |
"parameters": { |
- "parent": { |
- "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.", |
+ "name": { |
+ "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.", |
"location": "path", |
- "pattern": "^projects/[^/]+$", |
+ "pattern": "^projects/[^/]+/repos/.+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+parent}/repos", |
- "request": { |
- "$ref": "Repo" |
- }, |
+ "path": "v1/{+name}", |
"response": { |
"$ref": "Repo" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
}, |
- "setIamPolicy": { |
- "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.", |
+ "testIamPermissions": { |
+ "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.", |
"httpMethod": "POST", |
- "id": "sourcerepo.projects.repos.setIamPolicy", |
+ "id": "sourcerepo.projects.repos.testIamPermissions", |
"parameterOrder": [ |
"resource" |
], |
"parameters": { |
"resource": { |
- "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.", |
+ "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.", |
"location": "path", |
"pattern": "^projects/[^/]+/repos/.+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+resource}:setIamPolicy", |
+ "path": "v1/{+resource}:testIamPermissions", |
"request": { |
- "$ref": "SetIamPolicyRequest" |
+ "$ref": "TestIamPermissionsRequest" |
}, |
"response": { |
- "$ref": "Policy" |
+ "$ref": "TestIamPermissionsResponse" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
}, |
- "getIamPolicy": { |
- "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a policy\nset.", |
- "httpMethod": "GET", |
- "id": "sourcerepo.projects.repos.getIamPolicy", |
+ "delete": { |
+ "description": "Deletes a repo.", |
+ "httpMethod": "DELETE", |
+ "id": "sourcerepo.projects.repos.delete", |
"parameterOrder": [ |
- "resource" |
+ "name" |
], |
"parameters": { |
- "resource": { |
- "description": "REQUIRED: The resource for which the policy is being requested.\nSee the operation documentation for the appropriate value for this field.", |
+ "name": { |
+ "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.", |
"location": "path", |
"pattern": "^projects/[^/]+/repos/.+$", |
"required": true, |
"type": "string" |
} |
}, |
- "path": "v1/{+resource}:getIamPolicy", |
+ "path": "v1/{+name}", |
"response": { |
- "$ref": "Policy" |
+ "$ref": "Empty" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
}, |
- "get": { |
- "description": "Returns information about a repo.", |
+ "list": { |
+ "description": "Returns all repos belonging to a project. The sizes of the repos are\nnot set by ListRepos. To get the size of a repo, use GetRepo.", |
"httpMethod": "GET", |
- "id": "sourcerepo.projects.repos.get", |
+ "id": "sourcerepo.projects.repos.list", |
"parameterOrder": [ |
"name" |
], |
"parameters": { |
"name": { |
- "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.", |
+ "description": "The project ID whose repos should be listed. Values are of the form\n`projects/<project>`.", |
"location": "path", |
- "pattern": "^projects/[^/]+/repos/.+$", |
+ "pattern": "^projects/[^/]+$", |
"required": true, |
"type": "string" |
+ }, |
+ "pageToken": { |
+ "description": "Resume listing repositories where a prior ListReposResponse\nleft off. This is an opaque token that must be obtained from\na recent, prior ListReposResponse's next_page_token field.", |
+ "location": "query", |
+ "type": "string" |
+ }, |
+ "pageSize": { |
+ "description": "Maximum number of repositories to return; between 1 and 500.\nIf not set or zero, defaults to 100 at the server.", |
+ "format": "int32", |
+ "location": "query", |
+ "type": "integer" |
} |
}, |
- "path": "v1/{+name}", |
+ "path": "v1/{+name}/repos", |
"response": { |
- "$ref": "Repo" |
+ "$ref": "ListReposResponse" |
}, |
"scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform" |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
] |
} |
} |
@@ -311,13 +331,113 @@ |
} |
} |
}, |
- "revision": "20170502", |
+ "revision": "20170528", |
"rootUrl": "https://sourcerepo.googleapis.com/", |
"schemas": { |
+ "AuditLogConfig": { |
+ "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
+ "id": "AuditLogConfig", |
+ "properties": { |
+ "exemptedMembers": { |
+ "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "logType": { |
+ "description": "The log type that this config enables.", |
+ "enum": [ |
+ "LOG_TYPE_UNSPECIFIED", |
+ "ADMIN_READ", |
+ "DATA_WRITE", |
+ "DATA_READ" |
+ ], |
+ "enumDescriptions": [ |
+ "Default case. Should never be this.", |
+ "Admin reads. Example: CloudIAM getIamPolicy", |
+ "Data writes. Example: CloudSQL Users create", |
+ "Data reads. Example: CloudSQL Users list" |
+ ], |
+ "type": "string" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "Rule": { |
+ "description": "A rule to be applied in a Policy.", |
+ "id": "Rule", |
+ "properties": { |
+ "description": { |
+ "description": "Human-readable description of the rule.", |
+ "type": "string" |
+ }, |
+ "conditions": { |
+ "description": "Additional restrictions that must be met", |
+ "items": { |
+ "$ref": "Condition" |
+ }, |
+ "type": "array" |
+ }, |
+ "logConfig": { |
+ "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.", |
+ "items": { |
+ "$ref": "LogConfig" |
+ }, |
+ "type": "array" |
+ }, |
+ "in": { |
+ "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "permissions": { |
+ "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "action": { |
+ "description": "Required", |
+ "enum": [ |
+ "NO_ACTION", |
+ "ALLOW", |
+ "ALLOW_WITH_LOG", |
+ "DENY", |
+ "DENY_WITH_LOG", |
+ "LOG" |
+ ], |
+ "enumDescriptions": [ |
+ "Default no action.", |
+ "Matching 'Entries' grant access.", |
+ "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.", |
+ "Matching 'Entries' deny access.", |
+ "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.", |
+ "Matching 'Entries' tell IAM.Check callers to generate logs." |
+ ], |
+ "type": "string" |
+ }, |
+ "notIn": { |
+ "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
"LogConfig": { |
"description": "Specifies what kind of log the caller must write", |
"id": "LogConfig", |
"properties": { |
+ "cloudAudit": { |
+ "$ref": "CloudAuditOptions", |
+ "description": "Cloud audit options." |
+ }, |
"counter": { |
"$ref": "CounterOptions", |
"description": "Counter options." |
@@ -325,10 +445,6 @@ |
"dataAccess": { |
"$ref": "DataAccessOptions", |
"description": "Data access options." |
- }, |
- "cloudAudit": { |
- "$ref": "CloudAuditOptions", |
- "description": "Cloud audit options." |
} |
}, |
"type": "object" |
@@ -351,21 +467,6 @@ |
"description": "Defines an Identity and Access Management (IAM) policy. It is used to\nspecify access control policies for Cloud Platform resources.\n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n`members` to a `role`, where the members can be user accounts, Google groups,\nGoogle domains, and service accounts. A `role` is a named list of permissions\ndefined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike@example.com\",\n \"group:admins@example.com\",\n \"domain:google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccount.com\",\n ]\n },\n {\n \"role\": \"roles/viewer\",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide](https://cloud.google.com/iam).", |
"id": "Policy", |
"properties": { |
- "etag": { |
- "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.", |
- "format": "byte", |
- "type": "string" |
- }, |
- "iamOwned": { |
- "type": "boolean" |
- }, |
- "rules": { |
- "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.", |
- "items": { |
- "$ref": "Rule" |
- }, |
- "type": "array" |
- }, |
"version": { |
"description": "Version of the `Policy`. The default version is 0.", |
"format": "int32", |
@@ -384,6 +485,21 @@ |
"$ref": "Binding" |
}, |
"type": "array" |
+ }, |
+ "etag": { |
+ "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.", |
+ "format": "byte", |
+ "type": "string" |
+ }, |
+ "iamOwned": { |
+ "type": "boolean" |
+ }, |
+ "rules": { |
+ "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.", |
+ "items": { |
+ "$ref": "Rule" |
+ }, |
+ "type": "array" |
} |
}, |
"type": "object" |
@@ -398,10 +514,6 @@ |
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
"id": "AuditConfig", |
"properties": { |
- "service": { |
- "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.", |
- "type": "string" |
- }, |
"auditLogConfigs": { |
"description": "The configuration for logging of each type of permission.\nNext ID: 4", |
"items": { |
@@ -414,6 +526,10 @@ |
"type": "string" |
}, |
"type": "array" |
+ }, |
+ "service": { |
+ "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.", |
+ "type": "string" |
} |
}, |
"type": "object" |
@@ -422,14 +538,14 @@ |
"description": "Request message for `SetIamPolicy` method.", |
"id": "SetIamPolicyRequest", |
"properties": { |
- "policy": { |
- "$ref": "Policy", |
- "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them." |
- }, |
"updateMask": { |
"description": "OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\"\nThis field is only used by Cloud IAM.", |
"format": "google-fieldmask", |
"type": "string" |
+ }, |
+ "policy": { |
+ "$ref": "Policy", |
+ "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them." |
} |
}, |
"type": "object" |
@@ -437,7 +553,22 @@ |
"CloudAuditOptions": { |
"description": "Write a Cloud Audit log", |
"id": "CloudAuditOptions", |
- "properties": {}, |
+ "properties": { |
+ "logName": { |
+ "description": "The log_name to populate in the Cloud Audit Record.", |
+ "enum": [ |
+ "UNSPECIFIED_LOG_NAME", |
+ "ADMIN_ACTIVITY", |
+ "DATA_ACCESS" |
+ ], |
+ "enumDescriptions": [ |
+ "Default. Should not be used.", |
+ "Corresponds to \"cloudaudit.googleapis.com/activity\"", |
+ "Corresponds to \"cloudaudit.googleapis.com/data_access\"" |
+ ], |
+ "type": "string" |
+ } |
+ }, |
"type": "object" |
}, |
"Binding": { |
@@ -445,7 +576,7 @@ |
"id": "Binding", |
"properties": { |
"members": { |
- "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n", |
+ "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n", |
"items": { |
"type": "string" |
}, |
@@ -488,7 +619,7 @@ |
"id": "Repo", |
"properties": { |
"name": { |
- "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`.", |
+ "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`. The repo name may contain slashes.\neg, `projects/myproject/repos/name/with/slash`", |
"type": "string" |
}, |
"mirrorConfig": { |
@@ -507,34 +638,20 @@ |
}, |
"type": "object" |
}, |
- "TestIamPermissionsResponse": { |
- "description": "Response message for `TestIamPermissions` method.", |
- "id": "TestIamPermissionsResponse", |
- "properties": { |
- "permissions": { |
- "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- } |
- }, |
- "type": "object" |
- }, |
"ListReposResponse": { |
- "description": "Response for ListRepos.", |
+ "description": "Response for ListRepos. The size is not set in the returned repositories.", |
"id": "ListReposResponse", |
"properties": { |
- "nextPageToken": { |
- "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.", |
- "type": "string" |
- }, |
"repos": { |
"description": "The listed repos.", |
"items": { |
"$ref": "Repo" |
}, |
"type": "array" |
+ }, |
+ "nextPageToken": { |
+ "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.", |
+ "type": "string" |
} |
}, |
"type": "object" |
@@ -543,32 +660,6 @@ |
"description": "A condition to be met.", |
"id": "Condition", |
"properties": { |
- "svc": { |
- "description": "Trusted attributes discharged by the service.", |
- "type": "string" |
- }, |
- "sys": { |
- "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.", |
- "enum": [ |
- "NO_ATTR", |
- "REGION", |
- "SERVICE", |
- "NAME", |
- "IP" |
- ], |
- "enumDescriptions": [ |
- "Default non-attribute type", |
- "Region of the resource", |
- "Service name", |
- "Resource name", |
- "IP address of the caller" |
- ], |
- "type": "string" |
- }, |
- "value": { |
- "description": "DEPRECATED. Use 'values' instead.", |
- "type": "string" |
- }, |
"iam": { |
"description": "Trusted attributes supplied by the IAM system.", |
"enum": [ |
@@ -613,117 +704,61 @@ |
"Subject is discharged" |
], |
"type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "CounterOptions": { |
- "description": "Options for counters", |
- "id": "CounterOptions", |
- "properties": { |
- "metric": { |
- "description": "The metric to update.", |
- "type": "string" |
}, |
- "field": { |
- "description": "The field value to attribute.", |
+ "svc": { |
+ "description": "Trusted attributes discharged by the service.", |
"type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "AuditLogConfig": { |
- "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
- "id": "AuditLogConfig", |
- "properties": { |
- "exemptedMembers": { |
- "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
}, |
- "logType": { |
- "description": "The log type that this config enables.", |
+ "sys": { |
+ "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.", |
"enum": [ |
- "LOG_TYPE_UNSPECIFIED", |
- "ADMIN_READ", |
- "DATA_WRITE", |
- "DATA_READ" |
+ "NO_ATTR", |
+ "REGION", |
+ "SERVICE", |
+ "NAME", |
+ "IP" |
], |
"enumDescriptions": [ |
- "Default case. Should never be this.", |
- "Admin reads. Example: CloudIAM getIamPolicy", |
- "Data writes. Example: CloudSQL Users create", |
- "Data reads. Example: CloudSQL Users list" |
+ "Default non-attribute type", |
+ "Region of the resource", |
+ "Service name", |
+ "Resource name", |
+ "IP address of the caller" |
], |
"type": "string" |
+ }, |
+ "value": { |
+ "description": "DEPRECATED. Use 'values' instead.", |
+ "type": "string" |
} |
}, |
"type": "object" |
}, |
- "Rule": { |
- "description": "A rule to be applied in a Policy.", |
- "id": "Rule", |
+ "TestIamPermissionsResponse": { |
+ "description": "Response message for `TestIamPermissions` method.", |
+ "id": "TestIamPermissionsResponse", |
"properties": { |
- "description": { |
- "description": "Human-readable description of the rule.", |
- "type": "string" |
- }, |
- "conditions": { |
- "description": "Additional restrictions that must be met", |
- "items": { |
- "$ref": "Condition" |
- }, |
- "type": "array" |
- }, |
- "logConfig": { |
- "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.", |
- "items": { |
- "$ref": "LogConfig" |
- }, |
- "type": "array" |
- }, |
- "in": { |
- "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- }, |
"permissions": { |
- "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.", |
+ "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.", |
"items": { |
"type": "string" |
}, |
"type": "array" |
- }, |
- "action": { |
- "description": "Required", |
- "enum": [ |
- "NO_ACTION", |
- "ALLOW", |
- "ALLOW_WITH_LOG", |
- "DENY", |
- "DENY_WITH_LOG", |
- "LOG" |
- ], |
- "enumDescriptions": [ |
- "Default no action.", |
- "Matching 'Entries' grant access.", |
- "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.", |
- "Matching 'Entries' deny access.", |
- "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.", |
- "Matching 'Entries' tell IAM.Check callers to generate logs." |
- ], |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "CounterOptions": { |
+ "description": "Options for counters", |
+ "id": "CounterOptions", |
+ "properties": { |
+ "metric": { |
+ "description": "The metric to update.", |
"type": "string" |
}, |
- "notIn": { |
- "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
+ "field": { |
+ "description": "The field value to attribute.", |
+ "type": "string" |
} |
}, |
"type": "object" |