| Index: discovery/googleapis/sourcerepo__v1.json
|
| diff --git a/discovery/googleapis/sourcerepo__v1.json b/discovery/googleapis/sourcerepo__v1.json
|
| index 9e9ced412081cdd26da13e822f7c46db31e4a4c3..cd358cb9419df18d6c395a0ff1d0887dbea55386 100644
|
| --- a/discovery/googleapis/sourcerepo__v1.json
|
| +++ b/discovery/googleapis/sourcerepo__v1.json
|
| @@ -2,6 +2,12 @@
|
| "auth": {
|
| "oauth2": {
|
| "scopes": {
|
| + "https://www.googleapis.com/auth/source.read_only": {
|
| + "description": "View the contents of your source code repositories"
|
| + },
|
| + "https://www.googleapis.com/auth/source.read_write": {
|
| + "description": "Manage the contents of your source code repositories"
|
| + },
|
| "https://www.googleapis.com/auth/cloud-platform": {
|
| "description": "View and manage your data across Google Cloud Platform services"
|
| }
|
| @@ -25,6 +31,17 @@
|
| "ownerDomain": "google.com",
|
| "ownerName": "Google",
|
| "parameters": {
|
| + "upload_protocol": {
|
| + "description": "Upload protocol for media (e.g. \"raw\", \"multipart\").",
|
| + "location": "query",
|
| + "type": "string"
|
| + },
|
| + "prettyPrint": {
|
| + "default": "true",
|
| + "description": "Returns response with indentations and line breaks.",
|
| + "location": "query",
|
| + "type": "boolean"
|
| + },
|
| "fields": {
|
| "description": "Selector specifying which fields to include in a partial response.",
|
| "location": "query",
|
| @@ -69,13 +86,13 @@
|
| "location": "query",
|
| "type": "string"
|
| },
|
| - "key": {
|
| - "description": "API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.",
|
| + "access_token": {
|
| + "description": "OAuth access token.",
|
| "location": "query",
|
| "type": "string"
|
| },
|
| - "access_token": {
|
| - "description": "OAuth access token.",
|
| + "key": {
|
| + "description": "API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.",
|
| "location": "query",
|
| "type": "string"
|
| },
|
| @@ -99,17 +116,6 @@
|
| "description": "OAuth bearer token.",
|
| "location": "query",
|
| "type": "string"
|
| - },
|
| - "upload_protocol": {
|
| - "description": "Upload protocol for media (e.g. \"raw\", \"multipart\").",
|
| - "location": "query",
|
| - "type": "string"
|
| - },
|
| - "prettyPrint": {
|
| - "default": "true",
|
| - "description": "Returns response with indentations and line breaks.",
|
| - "location": "query",
|
| - "type": "boolean"
|
| }
|
| },
|
| "protocol": "rest",
|
| @@ -118,192 +124,206 @@
|
| "resources": {
|
| "repos": {
|
| "methods": {
|
| - "testIamPermissions": {
|
| - "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.",
|
| + "setIamPolicy": {
|
| + "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.",
|
| "httpMethod": "POST",
|
| - "id": "sourcerepo.projects.repos.testIamPermissions",
|
| + "id": "sourcerepo.projects.repos.setIamPolicy",
|
| "parameterOrder": [
|
| "resource"
|
| ],
|
| "parameters": {
|
| "resource": {
|
| - "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.",
|
| + "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.",
|
| "location": "path",
|
| "pattern": "^projects/[^/]+/repos/.+$",
|
| "required": true,
|
| "type": "string"
|
| }
|
| },
|
| - "path": "v1/{+resource}:testIamPermissions",
|
| + "path": "v1/{+resource}:setIamPolicy",
|
| "request": {
|
| - "$ref": "TestIamPermissionsRequest"
|
| + "$ref": "SetIamPolicyRequest"
|
| },
|
| "response": {
|
| - "$ref": "TestIamPermissionsResponse"
|
| + "$ref": "Policy"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| },
|
| - "delete": {
|
| - "description": "Deletes a repo.",
|
| - "httpMethod": "DELETE",
|
| - "id": "sourcerepo.projects.repos.delete",
|
| + "create": {
|
| + "description": "Creates a repo in the given project with the given name.\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.",
|
| + "httpMethod": "POST",
|
| + "id": "sourcerepo.projects.repos.create",
|
| "parameterOrder": [
|
| - "name"
|
| + "parent"
|
| ],
|
| "parameters": {
|
| - "name": {
|
| - "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.",
|
| + "parent": {
|
| + "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.",
|
| "location": "path",
|
| - "pattern": "^projects/[^/]+/repos/.+$",
|
| + "pattern": "^projects/[^/]+$",
|
| "required": true,
|
| "type": "string"
|
| }
|
| },
|
| - "path": "v1/{+name}",
|
| + "path": "v1/{+parent}/repos",
|
| + "request": {
|
| + "$ref": "Repo"
|
| + },
|
| "response": {
|
| - "$ref": "Empty"
|
| + "$ref": "Repo"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| },
|
| - "list": {
|
| - "description": "Returns all repos belonging to a project.",
|
| + "getIamPolicy": {
|
| + "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a policy\nset.",
|
| "httpMethod": "GET",
|
| - "id": "sourcerepo.projects.repos.list",
|
| + "id": "sourcerepo.projects.repos.getIamPolicy",
|
| "parameterOrder": [
|
| - "name"
|
| + "resource"
|
| ],
|
| "parameters": {
|
| - "name": {
|
| - "description": "The project ID whose repos should be listed. Values are of the form\n`projects/<project>`.",
|
| + "resource": {
|
| + "description": "REQUIRED: The resource for which the policy is being requested.\nSee the operation documentation for the appropriate value for this field.",
|
| "location": "path",
|
| - "pattern": "^projects/[^/]+$",
|
| + "pattern": "^projects/[^/]+/repos/.+$",
|
| "required": true,
|
| "type": "string"
|
| - },
|
| - "pageToken": {
|
| - "description": "Resume listing repositories where a prior ListReposResponse\nleft off. This is an opaque token that must be obtained from\na recent, prior ListReposResponse's next_page_token field.",
|
| - "location": "query",
|
| - "type": "string"
|
| - },
|
| - "pageSize": {
|
| - "description": "Maximum number of repositories to return; between 1 and 500.\nIf not set or zero, defaults to 100 at the server.",
|
| - "format": "int32",
|
| - "location": "query",
|
| - "type": "integer"
|
| }
|
| },
|
| - "path": "v1/{+name}/repos",
|
| + "path": "v1/{+resource}:getIamPolicy",
|
| "response": {
|
| - "$ref": "ListReposResponse"
|
| + "$ref": "Policy"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| },
|
| - "create": {
|
| - "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.",
|
| - "httpMethod": "POST",
|
| - "id": "sourcerepo.projects.repos.create",
|
| + "get": {
|
| + "description": "Returns information about a repo.",
|
| + "httpMethod": "GET",
|
| + "id": "sourcerepo.projects.repos.get",
|
| "parameterOrder": [
|
| - "parent"
|
| + "name"
|
| ],
|
| "parameters": {
|
| - "parent": {
|
| - "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.",
|
| + "name": {
|
| + "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.",
|
| "location": "path",
|
| - "pattern": "^projects/[^/]+$",
|
| + "pattern": "^projects/[^/]+/repos/.+$",
|
| "required": true,
|
| "type": "string"
|
| }
|
| },
|
| - "path": "v1/{+parent}/repos",
|
| - "request": {
|
| - "$ref": "Repo"
|
| - },
|
| + "path": "v1/{+name}",
|
| "response": {
|
| "$ref": "Repo"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| },
|
| - "setIamPolicy": {
|
| - "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.",
|
| + "testIamPermissions": {
|
| + "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.",
|
| "httpMethod": "POST",
|
| - "id": "sourcerepo.projects.repos.setIamPolicy",
|
| + "id": "sourcerepo.projects.repos.testIamPermissions",
|
| "parameterOrder": [
|
| "resource"
|
| ],
|
| "parameters": {
|
| "resource": {
|
| - "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.",
|
| + "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.",
|
| "location": "path",
|
| "pattern": "^projects/[^/]+/repos/.+$",
|
| "required": true,
|
| "type": "string"
|
| }
|
| },
|
| - "path": "v1/{+resource}:setIamPolicy",
|
| + "path": "v1/{+resource}:testIamPermissions",
|
| "request": {
|
| - "$ref": "SetIamPolicyRequest"
|
| + "$ref": "TestIamPermissionsRequest"
|
| },
|
| "response": {
|
| - "$ref": "Policy"
|
| + "$ref": "TestIamPermissionsResponse"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| },
|
| - "getIamPolicy": {
|
| - "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a policy\nset.",
|
| - "httpMethod": "GET",
|
| - "id": "sourcerepo.projects.repos.getIamPolicy",
|
| + "delete": {
|
| + "description": "Deletes a repo.",
|
| + "httpMethod": "DELETE",
|
| + "id": "sourcerepo.projects.repos.delete",
|
| "parameterOrder": [
|
| - "resource"
|
| + "name"
|
| ],
|
| "parameters": {
|
| - "resource": {
|
| - "description": "REQUIRED: The resource for which the policy is being requested.\nSee the operation documentation for the appropriate value for this field.",
|
| + "name": {
|
| + "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.",
|
| "location": "path",
|
| "pattern": "^projects/[^/]+/repos/.+$",
|
| "required": true,
|
| "type": "string"
|
| }
|
| },
|
| - "path": "v1/{+resource}:getIamPolicy",
|
| + "path": "v1/{+name}",
|
| "response": {
|
| - "$ref": "Policy"
|
| + "$ref": "Empty"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| },
|
| - "get": {
|
| - "description": "Returns information about a repo.",
|
| + "list": {
|
| + "description": "Returns all repos belonging to a project. The sizes of the repos are\nnot set by ListRepos. To get the size of a repo, use GetRepo.",
|
| "httpMethod": "GET",
|
| - "id": "sourcerepo.projects.repos.get",
|
| + "id": "sourcerepo.projects.repos.list",
|
| "parameterOrder": [
|
| "name"
|
| ],
|
| "parameters": {
|
| "name": {
|
| - "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.",
|
| + "description": "The project ID whose repos should be listed. Values are of the form\n`projects/<project>`.",
|
| "location": "path",
|
| - "pattern": "^projects/[^/]+/repos/.+$",
|
| + "pattern": "^projects/[^/]+$",
|
| "required": true,
|
| "type": "string"
|
| + },
|
| + "pageToken": {
|
| + "description": "Resume listing repositories where a prior ListReposResponse\nleft off. This is an opaque token that must be obtained from\na recent, prior ListReposResponse's next_page_token field.",
|
| + "location": "query",
|
| + "type": "string"
|
| + },
|
| + "pageSize": {
|
| + "description": "Maximum number of repositories to return; between 1 and 500.\nIf not set or zero, defaults to 100 at the server.",
|
| + "format": "int32",
|
| + "location": "query",
|
| + "type": "integer"
|
| }
|
| },
|
| - "path": "v1/{+name}",
|
| + "path": "v1/{+name}/repos",
|
| "response": {
|
| - "$ref": "Repo"
|
| + "$ref": "ListReposResponse"
|
| },
|
| "scopes": [
|
| - "https://www.googleapis.com/auth/cloud-platform"
|
| + "https://www.googleapis.com/auth/cloud-platform",
|
| + "https://www.googleapis.com/auth/source.read_only",
|
| + "https://www.googleapis.com/auth/source.read_write"
|
| ]
|
| }
|
| }
|
| @@ -311,13 +331,113 @@
|
| }
|
| }
|
| },
|
| - "revision": "20170502",
|
| + "revision": "20170528",
|
| "rootUrl": "https://sourcerepo.googleapis.com/",
|
| "schemas": {
|
| + "AuditLogConfig": {
|
| + "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.",
|
| + "id": "AuditLogConfig",
|
| + "properties": {
|
| + "exemptedMembers": {
|
| + "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.",
|
| + "items": {
|
| + "type": "string"
|
| + },
|
| + "type": "array"
|
| + },
|
| + "logType": {
|
| + "description": "The log type that this config enables.",
|
| + "enum": [
|
| + "LOG_TYPE_UNSPECIFIED",
|
| + "ADMIN_READ",
|
| + "DATA_WRITE",
|
| + "DATA_READ"
|
| + ],
|
| + "enumDescriptions": [
|
| + "Default case. Should never be this.",
|
| + "Admin reads. Example: CloudIAM getIamPolicy",
|
| + "Data writes. Example: CloudSQL Users create",
|
| + "Data reads. Example: CloudSQL Users list"
|
| + ],
|
| + "type": "string"
|
| + }
|
| + },
|
| + "type": "object"
|
| + },
|
| + "Rule": {
|
| + "description": "A rule to be applied in a Policy.",
|
| + "id": "Rule",
|
| + "properties": {
|
| + "description": {
|
| + "description": "Human-readable description of the rule.",
|
| + "type": "string"
|
| + },
|
| + "conditions": {
|
| + "description": "Additional restrictions that must be met",
|
| + "items": {
|
| + "$ref": "Condition"
|
| + },
|
| + "type": "array"
|
| + },
|
| + "logConfig": {
|
| + "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.",
|
| + "items": {
|
| + "$ref": "LogConfig"
|
| + },
|
| + "type": "array"
|
| + },
|
| + "in": {
|
| + "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.",
|
| + "items": {
|
| + "type": "string"
|
| + },
|
| + "type": "array"
|
| + },
|
| + "permissions": {
|
| + "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.",
|
| + "items": {
|
| + "type": "string"
|
| + },
|
| + "type": "array"
|
| + },
|
| + "action": {
|
| + "description": "Required",
|
| + "enum": [
|
| + "NO_ACTION",
|
| + "ALLOW",
|
| + "ALLOW_WITH_LOG",
|
| + "DENY",
|
| + "DENY_WITH_LOG",
|
| + "LOG"
|
| + ],
|
| + "enumDescriptions": [
|
| + "Default no action.",
|
| + "Matching 'Entries' grant access.",
|
| + "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.",
|
| + "Matching 'Entries' deny access.",
|
| + "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.",
|
| + "Matching 'Entries' tell IAM.Check callers to generate logs."
|
| + ],
|
| + "type": "string"
|
| + },
|
| + "notIn": {
|
| + "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).",
|
| + "items": {
|
| + "type": "string"
|
| + },
|
| + "type": "array"
|
| + }
|
| + },
|
| + "type": "object"
|
| + },
|
| "LogConfig": {
|
| "description": "Specifies what kind of log the caller must write",
|
| "id": "LogConfig",
|
| "properties": {
|
| + "cloudAudit": {
|
| + "$ref": "CloudAuditOptions",
|
| + "description": "Cloud audit options."
|
| + },
|
| "counter": {
|
| "$ref": "CounterOptions",
|
| "description": "Counter options."
|
| @@ -325,10 +445,6 @@
|
| "dataAccess": {
|
| "$ref": "DataAccessOptions",
|
| "description": "Data access options."
|
| - },
|
| - "cloudAudit": {
|
| - "$ref": "CloudAuditOptions",
|
| - "description": "Cloud audit options."
|
| }
|
| },
|
| "type": "object"
|
| @@ -351,21 +467,6 @@
|
| "description": "Defines an Identity and Access Management (IAM) policy. It is used to\nspecify access control policies for Cloud Platform resources.\n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n`members` to a `role`, where the members can be user accounts, Google groups,\nGoogle domains, and service accounts. A `role` is a named list of permissions\ndefined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike@example.com\",\n \"group:admins@example.com\",\n \"domain:google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccount.com\",\n ]\n },\n {\n \"role\": \"roles/viewer\",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide](https://cloud.google.com/iam).",
|
| "id": "Policy",
|
| "properties": {
|
| - "etag": {
|
| - "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.",
|
| - "format": "byte",
|
| - "type": "string"
|
| - },
|
| - "iamOwned": {
|
| - "type": "boolean"
|
| - },
|
| - "rules": {
|
| - "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
|
| - "items": {
|
| - "$ref": "Rule"
|
| - },
|
| - "type": "array"
|
| - },
|
| "version": {
|
| "description": "Version of the `Policy`. The default version is 0.",
|
| "format": "int32",
|
| @@ -384,6 +485,21 @@
|
| "$ref": "Binding"
|
| },
|
| "type": "array"
|
| + },
|
| + "etag": {
|
| + "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.",
|
| + "format": "byte",
|
| + "type": "string"
|
| + },
|
| + "iamOwned": {
|
| + "type": "boolean"
|
| + },
|
| + "rules": {
|
| + "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
|
| + "items": {
|
| + "$ref": "Rule"
|
| + },
|
| + "type": "array"
|
| }
|
| },
|
| "type": "object"
|
| @@ -398,10 +514,6 @@
|
| "description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.",
|
| "id": "AuditConfig",
|
| "properties": {
|
| - "service": {
|
| - "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.",
|
| - "type": "string"
|
| - },
|
| "auditLogConfigs": {
|
| "description": "The configuration for logging of each type of permission.\nNext ID: 4",
|
| "items": {
|
| @@ -414,6 +526,10 @@
|
| "type": "string"
|
| },
|
| "type": "array"
|
| + },
|
| + "service": {
|
| + "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.",
|
| + "type": "string"
|
| }
|
| },
|
| "type": "object"
|
| @@ -422,14 +538,14 @@
|
| "description": "Request message for `SetIamPolicy` method.",
|
| "id": "SetIamPolicyRequest",
|
| "properties": {
|
| - "policy": {
|
| - "$ref": "Policy",
|
| - "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them."
|
| - },
|
| "updateMask": {
|
| "description": "OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\"\nThis field is only used by Cloud IAM.",
|
| "format": "google-fieldmask",
|
| "type": "string"
|
| + },
|
| + "policy": {
|
| + "$ref": "Policy",
|
| + "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them."
|
| }
|
| },
|
| "type": "object"
|
| @@ -437,7 +553,22 @@
|
| "CloudAuditOptions": {
|
| "description": "Write a Cloud Audit log",
|
| "id": "CloudAuditOptions",
|
| - "properties": {},
|
| + "properties": {
|
| + "logName": {
|
| + "description": "The log_name to populate in the Cloud Audit Record.",
|
| + "enum": [
|
| + "UNSPECIFIED_LOG_NAME",
|
| + "ADMIN_ACTIVITY",
|
| + "DATA_ACCESS"
|
| + ],
|
| + "enumDescriptions": [
|
| + "Default. Should not be used.",
|
| + "Corresponds to \"cloudaudit.googleapis.com/activity\"",
|
| + "Corresponds to \"cloudaudit.googleapis.com/data_access\""
|
| + ],
|
| + "type": "string"
|
| + }
|
| + },
|
| "type": "object"
|
| },
|
| "Binding": {
|
| @@ -445,7 +576,7 @@
|
| "id": "Binding",
|
| "properties": {
|
| "members": {
|
| - "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n",
|
| + "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n",
|
| "items": {
|
| "type": "string"
|
| },
|
| @@ -488,7 +619,7 @@
|
| "id": "Repo",
|
| "properties": {
|
| "name": {
|
| - "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`.",
|
| + "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`. The repo name may contain slashes.\neg, `projects/myproject/repos/name/with/slash`",
|
| "type": "string"
|
| },
|
| "mirrorConfig": {
|
| @@ -507,34 +638,20 @@
|
| },
|
| "type": "object"
|
| },
|
| - "TestIamPermissionsResponse": {
|
| - "description": "Response message for `TestIamPermissions` method.",
|
| - "id": "TestIamPermissionsResponse",
|
| - "properties": {
|
| - "permissions": {
|
| - "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.",
|
| - "items": {
|
| - "type": "string"
|
| - },
|
| - "type": "array"
|
| - }
|
| - },
|
| - "type": "object"
|
| - },
|
| "ListReposResponse": {
|
| - "description": "Response for ListRepos.",
|
| + "description": "Response for ListRepos. The size is not set in the returned repositories.",
|
| "id": "ListReposResponse",
|
| "properties": {
|
| - "nextPageToken": {
|
| - "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.",
|
| - "type": "string"
|
| - },
|
| "repos": {
|
| "description": "The listed repos.",
|
| "items": {
|
| "$ref": "Repo"
|
| },
|
| "type": "array"
|
| + },
|
| + "nextPageToken": {
|
| + "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.",
|
| + "type": "string"
|
| }
|
| },
|
| "type": "object"
|
| @@ -543,32 +660,6 @@
|
| "description": "A condition to be met.",
|
| "id": "Condition",
|
| "properties": {
|
| - "svc": {
|
| - "description": "Trusted attributes discharged by the service.",
|
| - "type": "string"
|
| - },
|
| - "sys": {
|
| - "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.",
|
| - "enum": [
|
| - "NO_ATTR",
|
| - "REGION",
|
| - "SERVICE",
|
| - "NAME",
|
| - "IP"
|
| - ],
|
| - "enumDescriptions": [
|
| - "Default non-attribute type",
|
| - "Region of the resource",
|
| - "Service name",
|
| - "Resource name",
|
| - "IP address of the caller"
|
| - ],
|
| - "type": "string"
|
| - },
|
| - "value": {
|
| - "description": "DEPRECATED. Use 'values' instead.",
|
| - "type": "string"
|
| - },
|
| "iam": {
|
| "description": "Trusted attributes supplied by the IAM system.",
|
| "enum": [
|
| @@ -613,117 +704,61 @@
|
| "Subject is discharged"
|
| ],
|
| "type": "string"
|
| - }
|
| - },
|
| - "type": "object"
|
| - },
|
| - "CounterOptions": {
|
| - "description": "Options for counters",
|
| - "id": "CounterOptions",
|
| - "properties": {
|
| - "metric": {
|
| - "description": "The metric to update.",
|
| - "type": "string"
|
| },
|
| - "field": {
|
| - "description": "The field value to attribute.",
|
| + "svc": {
|
| + "description": "Trusted attributes discharged by the service.",
|
| "type": "string"
|
| - }
|
| - },
|
| - "type": "object"
|
| - },
|
| - "AuditLogConfig": {
|
| - "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.",
|
| - "id": "AuditLogConfig",
|
| - "properties": {
|
| - "exemptedMembers": {
|
| - "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.",
|
| - "items": {
|
| - "type": "string"
|
| - },
|
| - "type": "array"
|
| },
|
| - "logType": {
|
| - "description": "The log type that this config enables.",
|
| + "sys": {
|
| + "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.",
|
| "enum": [
|
| - "LOG_TYPE_UNSPECIFIED",
|
| - "ADMIN_READ",
|
| - "DATA_WRITE",
|
| - "DATA_READ"
|
| + "NO_ATTR",
|
| + "REGION",
|
| + "SERVICE",
|
| + "NAME",
|
| + "IP"
|
| ],
|
| "enumDescriptions": [
|
| - "Default case. Should never be this.",
|
| - "Admin reads. Example: CloudIAM getIamPolicy",
|
| - "Data writes. Example: CloudSQL Users create",
|
| - "Data reads. Example: CloudSQL Users list"
|
| + "Default non-attribute type",
|
| + "Region of the resource",
|
| + "Service name",
|
| + "Resource name",
|
| + "IP address of the caller"
|
| ],
|
| "type": "string"
|
| + },
|
| + "value": {
|
| + "description": "DEPRECATED. Use 'values' instead.",
|
| + "type": "string"
|
| }
|
| },
|
| "type": "object"
|
| },
|
| - "Rule": {
|
| - "description": "A rule to be applied in a Policy.",
|
| - "id": "Rule",
|
| + "TestIamPermissionsResponse": {
|
| + "description": "Response message for `TestIamPermissions` method.",
|
| + "id": "TestIamPermissionsResponse",
|
| "properties": {
|
| - "description": {
|
| - "description": "Human-readable description of the rule.",
|
| - "type": "string"
|
| - },
|
| - "conditions": {
|
| - "description": "Additional restrictions that must be met",
|
| - "items": {
|
| - "$ref": "Condition"
|
| - },
|
| - "type": "array"
|
| - },
|
| - "logConfig": {
|
| - "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.",
|
| - "items": {
|
| - "$ref": "LogConfig"
|
| - },
|
| - "type": "array"
|
| - },
|
| - "in": {
|
| - "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.",
|
| - "items": {
|
| - "type": "string"
|
| - },
|
| - "type": "array"
|
| - },
|
| "permissions": {
|
| - "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.",
|
| + "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.",
|
| "items": {
|
| "type": "string"
|
| },
|
| "type": "array"
|
| - },
|
| - "action": {
|
| - "description": "Required",
|
| - "enum": [
|
| - "NO_ACTION",
|
| - "ALLOW",
|
| - "ALLOW_WITH_LOG",
|
| - "DENY",
|
| - "DENY_WITH_LOG",
|
| - "LOG"
|
| - ],
|
| - "enumDescriptions": [
|
| - "Default no action.",
|
| - "Matching 'Entries' grant access.",
|
| - "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.",
|
| - "Matching 'Entries' deny access.",
|
| - "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.",
|
| - "Matching 'Entries' tell IAM.Check callers to generate logs."
|
| - ],
|
| + }
|
| + },
|
| + "type": "object"
|
| + },
|
| + "CounterOptions": {
|
| + "description": "Options for counters",
|
| + "id": "CounterOptions",
|
| + "properties": {
|
| + "metric": {
|
| + "description": "The metric to update.",
|
| "type": "string"
|
| },
|
| - "notIn": {
|
| - "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).",
|
| - "items": {
|
| - "type": "string"
|
| - },
|
| - "type": "array"
|
| + "field": {
|
| + "description": "The field value to attribute.",
|
| + "type": "string"
|
| }
|
| },
|
| "type": "object"
|
|
|