Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(25)

Unified Diff: discovery/googleapis/sourcerepo__v1.json

Issue 2936613002: Api-Roll 50: 2017-06-12 (Closed)
Patch Set: Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « discovery/googleapis/slides__v1.json ('k') | discovery/googleapis/spanner__v1.json » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: discovery/googleapis/sourcerepo__v1.json
diff --git a/discovery/googleapis/sourcerepo__v1.json b/discovery/googleapis/sourcerepo__v1.json
index 9e9ced412081cdd26da13e822f7c46db31e4a4c3..cd358cb9419df18d6c395a0ff1d0887dbea55386 100644
--- a/discovery/googleapis/sourcerepo__v1.json
+++ b/discovery/googleapis/sourcerepo__v1.json
@@ -2,6 +2,12 @@
"auth": {
"oauth2": {
"scopes": {
+ "https://www.googleapis.com/auth/source.read_only": {
+ "description": "View the contents of your source code repositories"
+ },
+ "https://www.googleapis.com/auth/source.read_write": {
+ "description": "Manage the contents of your source code repositories"
+ },
"https://www.googleapis.com/auth/cloud-platform": {
"description": "View and manage your data across Google Cloud Platform services"
}
@@ -25,6 +31,17 @@
"ownerDomain": "google.com",
"ownerName": "Google",
"parameters": {
+ "upload_protocol": {
+ "description": "Upload protocol for media (e.g. \"raw\", \"multipart\").",
+ "location": "query",
+ "type": "string"
+ },
+ "prettyPrint": {
+ "default": "true",
+ "description": "Returns response with indentations and line breaks.",
+ "location": "query",
+ "type": "boolean"
+ },
"fields": {
"description": "Selector specifying which fields to include in a partial response.",
"location": "query",
@@ -69,13 +86,13 @@
"location": "query",
"type": "string"
},
- "key": {
- "description": "API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.",
+ "access_token": {
+ "description": "OAuth access token.",
"location": "query",
"type": "string"
},
- "access_token": {
- "description": "OAuth access token.",
+ "key": {
+ "description": "API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.",
"location": "query",
"type": "string"
},
@@ -99,17 +116,6 @@
"description": "OAuth bearer token.",
"location": "query",
"type": "string"
- },
- "upload_protocol": {
- "description": "Upload protocol for media (e.g. \"raw\", \"multipart\").",
- "location": "query",
- "type": "string"
- },
- "prettyPrint": {
- "default": "true",
- "description": "Returns response with indentations and line breaks.",
- "location": "query",
- "type": "boolean"
}
},
"protocol": "rest",
@@ -118,192 +124,206 @@
"resources": {
"repos": {
"methods": {
- "testIamPermissions": {
- "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.",
+ "setIamPolicy": {
+ "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.",
"httpMethod": "POST",
- "id": "sourcerepo.projects.repos.testIamPermissions",
+ "id": "sourcerepo.projects.repos.setIamPolicy",
"parameterOrder": [
"resource"
],
"parameters": {
"resource": {
- "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.",
+ "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.",
"location": "path",
"pattern": "^projects/[^/]+/repos/.+$",
"required": true,
"type": "string"
}
},
- "path": "v1/{+resource}:testIamPermissions",
+ "path": "v1/{+resource}:setIamPolicy",
"request": {
- "$ref": "TestIamPermissionsRequest"
+ "$ref": "SetIamPolicyRequest"
},
"response": {
- "$ref": "TestIamPermissionsResponse"
+ "$ref": "Policy"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
},
- "delete": {
- "description": "Deletes a repo.",
- "httpMethod": "DELETE",
- "id": "sourcerepo.projects.repos.delete",
+ "create": {
+ "description": "Creates a repo in the given project with the given name.\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.",
+ "httpMethod": "POST",
+ "id": "sourcerepo.projects.repos.create",
"parameterOrder": [
- "name"
+ "parent"
],
"parameters": {
- "name": {
- "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.",
+ "parent": {
+ "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.",
"location": "path",
- "pattern": "^projects/[^/]+/repos/.+$",
+ "pattern": "^projects/[^/]+$",
"required": true,
"type": "string"
}
},
- "path": "v1/{+name}",
+ "path": "v1/{+parent}/repos",
+ "request": {
+ "$ref": "Repo"
+ },
"response": {
- "$ref": "Empty"
+ "$ref": "Repo"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
},
- "list": {
- "description": "Returns all repos belonging to a project.",
+ "getIamPolicy": {
+ "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a policy\nset.",
"httpMethod": "GET",
- "id": "sourcerepo.projects.repos.list",
+ "id": "sourcerepo.projects.repos.getIamPolicy",
"parameterOrder": [
- "name"
+ "resource"
],
"parameters": {
- "name": {
- "description": "The project ID whose repos should be listed. Values are of the form\n`projects/<project>`.",
+ "resource": {
+ "description": "REQUIRED: The resource for which the policy is being requested.\nSee the operation documentation for the appropriate value for this field.",
"location": "path",
- "pattern": "^projects/[^/]+$",
+ "pattern": "^projects/[^/]+/repos/.+$",
"required": true,
"type": "string"
- },
- "pageToken": {
- "description": "Resume listing repositories where a prior ListReposResponse\nleft off. This is an opaque token that must be obtained from\na recent, prior ListReposResponse's next_page_token field.",
- "location": "query",
- "type": "string"
- },
- "pageSize": {
- "description": "Maximum number of repositories to return; between 1 and 500.\nIf not set or zero, defaults to 100 at the server.",
- "format": "int32",
- "location": "query",
- "type": "integer"
}
},
- "path": "v1/{+name}/repos",
+ "path": "v1/{+resource}:getIamPolicy",
"response": {
- "$ref": "ListReposResponse"
+ "$ref": "Policy"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
},
- "create": {
- "description": "Creates a repo in the given project with the given name..\n\nIf the named repository already exists, `CreateRepo` returns\n`ALREADY_EXISTS`.",
- "httpMethod": "POST",
- "id": "sourcerepo.projects.repos.create",
+ "get": {
+ "description": "Returns information about a repo.",
+ "httpMethod": "GET",
+ "id": "sourcerepo.projects.repos.get",
"parameterOrder": [
- "parent"
+ "name"
],
"parameters": {
- "parent": {
- "description": "The project in which to create the repo. Values are of the form\n`projects/<project>`.",
+ "name": {
+ "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.",
"location": "path",
- "pattern": "^projects/[^/]+$",
+ "pattern": "^projects/[^/]+/repos/.+$",
"required": true,
"type": "string"
}
},
- "path": "v1/{+parent}/repos",
- "request": {
- "$ref": "Repo"
- },
+ "path": "v1/{+name}",
"response": {
"$ref": "Repo"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
},
- "setIamPolicy": {
- "description": "Sets the access control policy on the specified resource. Replaces any\nexisting policy.",
+ "testIamPermissions": {
+ "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.",
"httpMethod": "POST",
- "id": "sourcerepo.projects.repos.setIamPolicy",
+ "id": "sourcerepo.projects.repos.testIamPermissions",
"parameterOrder": [
"resource"
],
"parameters": {
"resource": {
- "description": "REQUIRED: The resource for which the policy is being specified.\nSee the operation documentation for the appropriate value for this field.",
+ "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.",
"location": "path",
"pattern": "^projects/[^/]+/repos/.+$",
"required": true,
"type": "string"
}
},
- "path": "v1/{+resource}:setIamPolicy",
+ "path": "v1/{+resource}:testIamPermissions",
"request": {
- "$ref": "SetIamPolicyRequest"
+ "$ref": "TestIamPermissionsRequest"
},
"response": {
- "$ref": "Policy"
+ "$ref": "TestIamPermissionsResponse"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
},
- "getIamPolicy": {
- "description": "Gets the access control policy for a resource.\nReturns an empty policy if the resource exists and does not have a policy\nset.",
- "httpMethod": "GET",
- "id": "sourcerepo.projects.repos.getIamPolicy",
+ "delete": {
+ "description": "Deletes a repo.",
+ "httpMethod": "DELETE",
+ "id": "sourcerepo.projects.repos.delete",
"parameterOrder": [
- "resource"
+ "name"
],
"parameters": {
- "resource": {
- "description": "REQUIRED: The resource for which the policy is being requested.\nSee the operation documentation for the appropriate value for this field.",
+ "name": {
+ "description": "The name of the repo to delete. Values are of the form\n`projects/<project>/repos/<repo>`.",
"location": "path",
"pattern": "^projects/[^/]+/repos/.+$",
"required": true,
"type": "string"
}
},
- "path": "v1/{+resource}:getIamPolicy",
+ "path": "v1/{+name}",
"response": {
- "$ref": "Policy"
+ "$ref": "Empty"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
},
- "get": {
- "description": "Returns information about a repo.",
+ "list": {
+ "description": "Returns all repos belonging to a project. The sizes of the repos are\nnot set by ListRepos. To get the size of a repo, use GetRepo.",
"httpMethod": "GET",
- "id": "sourcerepo.projects.repos.get",
+ "id": "sourcerepo.projects.repos.list",
"parameterOrder": [
"name"
],
"parameters": {
"name": {
- "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.",
+ "description": "The project ID whose repos should be listed. Values are of the form\n`projects/<project>`.",
"location": "path",
- "pattern": "^projects/[^/]+/repos/.+$",
+ "pattern": "^projects/[^/]+$",
"required": true,
"type": "string"
+ },
+ "pageToken": {
+ "description": "Resume listing repositories where a prior ListReposResponse\nleft off. This is an opaque token that must be obtained from\na recent, prior ListReposResponse's next_page_token field.",
+ "location": "query",
+ "type": "string"
+ },
+ "pageSize": {
+ "description": "Maximum number of repositories to return; between 1 and 500.\nIf not set or zero, defaults to 100 at the server.",
+ "format": "int32",
+ "location": "query",
+ "type": "integer"
}
},
- "path": "v1/{+name}",
+ "path": "v1/{+name}/repos",
"response": {
- "$ref": "Repo"
+ "$ref": "ListReposResponse"
},
"scopes": [
- "https://www.googleapis.com/auth/cloud-platform"
+ "https://www.googleapis.com/auth/cloud-platform",
+ "https://www.googleapis.com/auth/source.read_only",
+ "https://www.googleapis.com/auth/source.read_write"
]
}
}
@@ -311,13 +331,113 @@
}
}
},
- "revision": "20170502",
+ "revision": "20170528",
"rootUrl": "https://sourcerepo.googleapis.com/",
"schemas": {
+ "AuditLogConfig": {
+ "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.",
+ "id": "AuditLogConfig",
+ "properties": {
+ "exemptedMembers": {
+ "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.",
+ "items": {
+ "type": "string"
+ },
+ "type": "array"
+ },
+ "logType": {
+ "description": "The log type that this config enables.",
+ "enum": [
+ "LOG_TYPE_UNSPECIFIED",
+ "ADMIN_READ",
+ "DATA_WRITE",
+ "DATA_READ"
+ ],
+ "enumDescriptions": [
+ "Default case. Should never be this.",
+ "Admin reads. Example: CloudIAM getIamPolicy",
+ "Data writes. Example: CloudSQL Users create",
+ "Data reads. Example: CloudSQL Users list"
+ ],
+ "type": "string"
+ }
+ },
+ "type": "object"
+ },
+ "Rule": {
+ "description": "A rule to be applied in a Policy.",
+ "id": "Rule",
+ "properties": {
+ "description": {
+ "description": "Human-readable description of the rule.",
+ "type": "string"
+ },
+ "conditions": {
+ "description": "Additional restrictions that must be met",
+ "items": {
+ "$ref": "Condition"
+ },
+ "type": "array"
+ },
+ "logConfig": {
+ "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.",
+ "items": {
+ "$ref": "LogConfig"
+ },
+ "type": "array"
+ },
+ "in": {
+ "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.",
+ "items": {
+ "type": "string"
+ },
+ "type": "array"
+ },
+ "permissions": {
+ "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.",
+ "items": {
+ "type": "string"
+ },
+ "type": "array"
+ },
+ "action": {
+ "description": "Required",
+ "enum": [
+ "NO_ACTION",
+ "ALLOW",
+ "ALLOW_WITH_LOG",
+ "DENY",
+ "DENY_WITH_LOG",
+ "LOG"
+ ],
+ "enumDescriptions": [
+ "Default no action.",
+ "Matching 'Entries' grant access.",
+ "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.",
+ "Matching 'Entries' deny access.",
+ "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.",
+ "Matching 'Entries' tell IAM.Check callers to generate logs."
+ ],
+ "type": "string"
+ },
+ "notIn": {
+ "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).",
+ "items": {
+ "type": "string"
+ },
+ "type": "array"
+ }
+ },
+ "type": "object"
+ },
"LogConfig": {
"description": "Specifies what kind of log the caller must write",
"id": "LogConfig",
"properties": {
+ "cloudAudit": {
+ "$ref": "CloudAuditOptions",
+ "description": "Cloud audit options."
+ },
"counter": {
"$ref": "CounterOptions",
"description": "Counter options."
@@ -325,10 +445,6 @@
"dataAccess": {
"$ref": "DataAccessOptions",
"description": "Data access options."
- },
- "cloudAudit": {
- "$ref": "CloudAuditOptions",
- "description": "Cloud audit options."
}
},
"type": "object"
@@ -351,21 +467,6 @@
"description": "Defines an Identity and Access Management (IAM) policy. It is used to\nspecify access control policies for Cloud Platform resources.\n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n`members` to a `role`, where the members can be user accounts, Google groups,\nGoogle domains, and service accounts. A `role` is a named list of permissions\ndefined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike@example.com\",\n \"group:admins@example.com\",\n \"domain:google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccount.com\",\n ]\n },\n {\n \"role\": \"roles/viewer\",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide](https://cloud.google.com/iam).",
"id": "Policy",
"properties": {
- "etag": {
- "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.",
- "format": "byte",
- "type": "string"
- },
- "iamOwned": {
- "type": "boolean"
- },
- "rules": {
- "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
- "items": {
- "$ref": "Rule"
- },
- "type": "array"
- },
"version": {
"description": "Version of the `Policy`. The default version is 0.",
"format": "int32",
@@ -384,6 +485,21 @@
"$ref": "Binding"
},
"type": "array"
+ },
+ "etag": {
+ "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.",
+ "format": "byte",
+ "type": "string"
+ },
+ "iamOwned": {
+ "type": "boolean"
+ },
+ "rules": {
+ "description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
+ "items": {
+ "$ref": "Rule"
+ },
+ "type": "array"
}
},
"type": "object"
@@ -398,10 +514,6 @@
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.",
"id": "AuditConfig",
"properties": {
- "service": {
- "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.",
- "type": "string"
- },
"auditLogConfigs": {
"description": "The configuration for logging of each type of permission.\nNext ID: 4",
"items": {
@@ -414,6 +526,10 @@
"type": "string"
},
"type": "array"
+ },
+ "service": {
+ "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.",
+ "type": "string"
}
},
"type": "object"
@@ -422,14 +538,14 @@
"description": "Request message for `SetIamPolicy` method.",
"id": "SetIamPolicyRequest",
"properties": {
- "policy": {
- "$ref": "Policy",
- "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them."
- },
"updateMask": {
"description": "OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only\nthe fields in the mask will be modified. If no mask is provided, the\nfollowing default mask is used:\npaths: \"bindings, etag\"\nThis field is only used by Cloud IAM.",
"format": "google-fieldmask",
"type": "string"
+ },
+ "policy": {
+ "$ref": "Policy",
+ "description": "REQUIRED: The complete policy to be applied to the `resource`. The size of\nthe policy is limited to a few 10s of KB. An empty policy is a\nvalid policy but certain Cloud Platform services (such as Projects)\nmight reject them."
}
},
"type": "object"
@@ -437,7 +553,22 @@
"CloudAuditOptions": {
"description": "Write a Cloud Audit log",
"id": "CloudAuditOptions",
- "properties": {},
+ "properties": {
+ "logName": {
+ "description": "The log_name to populate in the Cloud Audit Record.",
+ "enum": [
+ "UNSPECIFIED_LOG_NAME",
+ "ADMIN_ACTIVITY",
+ "DATA_ACCESS"
+ ],
+ "enumDescriptions": [
+ "Default. Should not be used.",
+ "Corresponds to \"cloudaudit.googleapis.com/activity\"",
+ "Corresponds to \"cloudaudit.googleapis.com/data_access\""
+ ],
+ "type": "string"
+ }
+ },
"type": "object"
},
"Binding": {
@@ -445,7 +576,7 @@
"id": "Binding",
"properties": {
"members": {
- "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n",
+ "description": "Specifies the identities requesting access for a Cloud Platform resource.\n`members` can have the following values:\n\n* `allUsers`: A special identifier that represents anyone who is\n on the internet; with or without a Google account.\n\n* `allAuthenticatedUsers`: A special identifier that represents anyone\n who is authenticated with a Google account or a service account.\n\n* `user:{emailid}`: An email address that represents a specific Google\n account. For example, `alice@gmail.com` or `joe@example.com`.\n\n\n* `serviceAccount:{emailid}`: An email address that represents a service\n account. For example, `my-other-app@appspot.gserviceaccount.com`.\n\n* `group:{emailid}`: An email address that represents a Google group.\n For example, `admins@example.com`.\n\n\n* `domain:{domain}`: A Google Apps domain name that represents all the\n users of that domain. For example, `google.com` or `example.com`.\n\n",
"items": {
"type": "string"
},
@@ -488,7 +619,7 @@
"id": "Repo",
"properties": {
"name": {
- "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`.",
+ "description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`. The repo name may contain slashes.\neg, `projects/myproject/repos/name/with/slash`",
"type": "string"
},
"mirrorConfig": {
@@ -507,34 +638,20 @@
},
"type": "object"
},
- "TestIamPermissionsResponse": {
- "description": "Response message for `TestIamPermissions` method.",
- "id": "TestIamPermissionsResponse",
- "properties": {
- "permissions": {
- "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.",
- "items": {
- "type": "string"
- },
- "type": "array"
- }
- },
- "type": "object"
- },
"ListReposResponse": {
- "description": "Response for ListRepos.",
+ "description": "Response for ListRepos. The size is not set in the returned repositories.",
"id": "ListReposResponse",
"properties": {
- "nextPageToken": {
- "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.",
- "type": "string"
- },
"repos": {
"description": "The listed repos.",
"items": {
"$ref": "Repo"
},
"type": "array"
+ },
+ "nextPageToken": {
+ "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.",
+ "type": "string"
}
},
"type": "object"
@@ -543,32 +660,6 @@
"description": "A condition to be met.",
"id": "Condition",
"properties": {
- "svc": {
- "description": "Trusted attributes discharged by the service.",
- "type": "string"
- },
- "sys": {
- "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.",
- "enum": [
- "NO_ATTR",
- "REGION",
- "SERVICE",
- "NAME",
- "IP"
- ],
- "enumDescriptions": [
- "Default non-attribute type",
- "Region of the resource",
- "Service name",
- "Resource name",
- "IP address of the caller"
- ],
- "type": "string"
- },
- "value": {
- "description": "DEPRECATED. Use 'values' instead.",
- "type": "string"
- },
"iam": {
"description": "Trusted attributes supplied by the IAM system.",
"enum": [
@@ -613,117 +704,61 @@
"Subject is discharged"
],
"type": "string"
- }
- },
- "type": "object"
- },
- "CounterOptions": {
- "description": "Options for counters",
- "id": "CounterOptions",
- "properties": {
- "metric": {
- "description": "The metric to update.",
- "type": "string"
},
- "field": {
- "description": "The field value to attribute.",
+ "svc": {
+ "description": "Trusted attributes discharged by the service.",
"type": "string"
- }
- },
- "type": "object"
- },
- "AuditLogConfig": {
- "description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.",
- "id": "AuditLogConfig",
- "properties": {
- "exemptedMembers": {
- "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.",
- "items": {
- "type": "string"
- },
- "type": "array"
},
- "logType": {
- "description": "The log type that this config enables.",
+ "sys": {
+ "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.",
"enum": [
- "LOG_TYPE_UNSPECIFIED",
- "ADMIN_READ",
- "DATA_WRITE",
- "DATA_READ"
+ "NO_ATTR",
+ "REGION",
+ "SERVICE",
+ "NAME",
+ "IP"
],
"enumDescriptions": [
- "Default case. Should never be this.",
- "Admin reads. Example: CloudIAM getIamPolicy",
- "Data writes. Example: CloudSQL Users create",
- "Data reads. Example: CloudSQL Users list"
+ "Default non-attribute type",
+ "Region of the resource",
+ "Service name",
+ "Resource name",
+ "IP address of the caller"
],
"type": "string"
+ },
+ "value": {
+ "description": "DEPRECATED. Use 'values' instead.",
+ "type": "string"
}
},
"type": "object"
},
- "Rule": {
- "description": "A rule to be applied in a Policy.",
- "id": "Rule",
+ "TestIamPermissionsResponse": {
+ "description": "Response message for `TestIamPermissions` method.",
+ "id": "TestIamPermissionsResponse",
"properties": {
- "description": {
- "description": "Human-readable description of the rule.",
- "type": "string"
- },
- "conditions": {
- "description": "Additional restrictions that must be met",
- "items": {
- "$ref": "Condition"
- },
- "type": "array"
- },
- "logConfig": {
- "description": "The config returned to callers of tech.iam.IAM.CheckPolicy for any entries\nthat match the LOG action.",
- "items": {
- "$ref": "LogConfig"
- },
- "type": "array"
- },
- "in": {
- "description": "If one or more 'in' clauses are specified, the rule matches if\nthe PRINCIPAL/AUTHORITY_SELECTOR is in at least one of these entries.",
- "items": {
- "type": "string"
- },
- "type": "array"
- },
"permissions": {
- "description": "A permission is a string of form '<service>.<resource type>.<verb>'\n(e.g., 'storage.buckets.list'). A value of '*' matches all permissions,\nand a verb part of '*' (e.g., 'storage.buckets.*') matches all verbs.",
+ "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.",
"items": {
"type": "string"
},
"type": "array"
- },
- "action": {
- "description": "Required",
- "enum": [
- "NO_ACTION",
- "ALLOW",
- "ALLOW_WITH_LOG",
- "DENY",
- "DENY_WITH_LOG",
- "LOG"
- ],
- "enumDescriptions": [
- "Default no action.",
- "Matching 'Entries' grant access.",
- "Matching 'Entries' grant access and the caller promises to log\nthe request per the returned log_configs.",
- "Matching 'Entries' deny access.",
- "Matching 'Entries' deny access and the caller promises to log\nthe request per the returned log_configs.",
- "Matching 'Entries' tell IAM.Check callers to generate logs."
- ],
+ }
+ },
+ "type": "object"
+ },
+ "CounterOptions": {
+ "description": "Options for counters",
+ "id": "CounterOptions",
+ "properties": {
+ "metric": {
+ "description": "The metric to update.",
"type": "string"
},
- "notIn": {
- "description": "If one or more 'not_in' clauses are specified, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entries.\nThe format for in and not_in entries is the same as for members in a\nBinding (see google/iam/v1/policy.proto).",
- "items": {
- "type": "string"
- },
- "type": "array"
+ "field": {
+ "description": "The field value to attribute.",
+ "type": "string"
}
},
"type": "object"
« no previous file with comments | « discovery/googleapis/slides__v1.json ('k') | discovery/googleapis/spanner__v1.json » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698