Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(295)

Side by Side Diff: discovery/googleapis/sourcerepo__v1.json

Issue 3003493002: Api-Roll 53: 2017-08-21 (Closed)
Patch Set: Created 3 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « discovery/googleapis/slides__v1.json ('k') | discovery/googleapis/spanner__v1.json » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 { 1 {
2 "auth": { 2 "auth": {
3 "oauth2": { 3 "oauth2": {
4 "scopes": { 4 "scopes": {
5 "https://www.googleapis.com/auth/source.read_write": {
6 "description": "Manage the contents of your source code repo sitories"
7 },
5 "https://www.googleapis.com/auth/cloud-platform": { 8 "https://www.googleapis.com/auth/cloud-platform": {
6 "description": "View and manage your data across Google Clou d Platform services" 9 "description": "View and manage your data across Google Clou d Platform services"
7 }, 10 },
8 "https://www.googleapis.com/auth/source.read_only": { 11 "https://www.googleapis.com/auth/source.read_only": {
9 "description": "View the contents of your source code reposi tories" 12 "description": "View the contents of your source code reposi tories"
10 },
11 "https://www.googleapis.com/auth/source.read_write": {
12 "description": "Manage the contents of your source code repo sitories"
13 } 13 }
14 } 14 }
15 } 15 }
16 }, 16 },
17 "basePath": "", 17 "basePath": "",
18 "baseUrl": "https://sourcerepo.googleapis.com/", 18 "baseUrl": "https://sourcerepo.googleapis.com/",
19 "batchPath": "batch", 19 "batchPath": "batch",
20 "canonicalName": "Cloud Source Repositories", 20 "canonicalName": "Cloud Source Repositories",
21 "description": "Access source code repositories hosted by Google.", 21 "description": "Access source code repositories hosted by Google.",
22 "discoveryVersion": "v1", 22 "discoveryVersion": "v1",
23 "documentationLink": "https://cloud.google.com/source-repositories/docs/apis ", 23 "documentationLink": "https://cloud.google.com/source-repositories/docs/apis ",
24 "icons": { 24 "icons": {
25 "x16": "http://www.google.com/images/icons/product/search-16.gif", 25 "x16": "http://www.google.com/images/icons/product/search-16.gif",
26 "x32": "http://www.google.com/images/icons/product/search-32.gif" 26 "x32": "http://www.google.com/images/icons/product/search-32.gif"
27 }, 27 },
28 "id": "sourcerepo:v1", 28 "id": "sourcerepo:v1",
29 "kind": "discovery#restDescription", 29 "kind": "discovery#restDescription",
30 "name": "sourcerepo", 30 "name": "sourcerepo",
31 "ownerDomain": "google.com", 31 "ownerDomain": "google.com",
32 "ownerName": "Google", 32 "ownerName": "Google",
33 "parameters": { 33 "parameters": {
34 "bearer_token": {
35 "description": "OAuth bearer token.",
36 "location": "query",
37 "type": "string"
38 },
39 "oauth_token": {
40 "description": "OAuth 2.0 token for the current user.",
41 "location": "query",
42 "type": "string"
43 },
34 "upload_protocol": { 44 "upload_protocol": {
35 "description": "Upload protocol for media (e.g. \"raw\", \"multipart \").", 45 "description": "Upload protocol for media (e.g. \"raw\", \"multipart \").",
36 "location": "query", 46 "location": "query",
37 "type": "string" 47 "type": "string"
38 }, 48 },
39 "prettyPrint": { 49 "prettyPrint": {
40 "default": "true", 50 "default": "true",
41 "description": "Returns response with indentations and line breaks." , 51 "description": "Returns response with indentations and line breaks." ,
42 "location": "query", 52 "location": "query",
43 "type": "boolean" 53 "type": "boolean"
44 }, 54 },
45 "uploadType": { 55 "uploadType": {
46 "description": "Legacy upload protocol for media (e.g. \"media\", \" multipart\").", 56 "description": "Legacy upload protocol for media (e.g. \"media\", \" multipart\").",
47 "location": "query", 57 "location": "query",
48 "type": "string" 58 "type": "string"
49 }, 59 },
50 "fields": { 60 "fields": {
51 "description": "Selector specifying which fields to include in a par tial response.", 61 "description": "Selector specifying which fields to include in a par tial response.",
52 "location": "query", 62 "location": "query",
53 "type": "string" 63 "type": "string"
54 }, 64 },
55 "callback": {
56 "description": "JSONP",
57 "location": "query",
58 "type": "string"
59 },
60 "$.xgafv": { 65 "$.xgafv": {
61 "description": "V1 error format.", 66 "description": "V1 error format.",
62 "enum": [ 67 "enum": [
63 "1", 68 "1",
64 "2" 69 "2"
65 ], 70 ],
66 "enumDescriptions": [ 71 "enumDescriptions": [
67 "v1 error format", 72 "v1 error format",
68 "v2 error format" 73 "v2 error format"
69 ], 74 ],
70 "location": "query", 75 "location": "query",
71 "type": "string" 76 "type": "string"
72 }, 77 },
78 "callback": {
79 "description": "JSONP",
80 "location": "query",
81 "type": "string"
82 },
73 "alt": { 83 "alt": {
74 "default": "json", 84 "default": "json",
75 "description": "Data format for response.", 85 "description": "Data format for response.",
76 "enum": [ 86 "enum": [
77 "json", 87 "json",
78 "media", 88 "media",
79 "proto" 89 "proto"
80 ], 90 ],
81 "enumDescriptions": [ 91 "enumDescriptions": [
82 "Responses with Content-Type of application/json", 92 "Responses with Content-Type of application/json",
(...skipping 16 matching lines...) Expand all
99 "quotaUser": { 109 "quotaUser": {
100 "description": "Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exc eed 40 characters.", 110 "description": "Available to use for quota purposes for server-side applications. Can be any arbitrary string assigned to a user, but should not exc eed 40 characters.",
101 "location": "query", 111 "location": "query",
102 "type": "string" 112 "type": "string"
103 }, 113 },
104 "pp": { 114 "pp": {
105 "default": "true", 115 "default": "true",
106 "description": "Pretty-print response.", 116 "description": "Pretty-print response.",
107 "location": "query", 117 "location": "query",
108 "type": "boolean" 118 "type": "boolean"
109 },
110 "bearer_token": {
111 "description": "OAuth bearer token.",
112 "location": "query",
113 "type": "string"
114 },
115 "oauth_token": {
116 "description": "OAuth 2.0 token for the current user.",
117 "location": "query",
118 "type": "string"
119 } 119 }
120 }, 120 },
121 "protocol": "rest", 121 "protocol": "rest",
122 "resources": { 122 "resources": {
123 "projects": { 123 "projects": {
124 "resources": { 124 "resources": {
125 "repos": { 125 "repos": {
126 "methods": { 126 "methods": {
127 "get": {
128 "description": "Returns information about a repo.",
129 "httpMethod": "GET",
130 "id": "sourcerepo.projects.repos.get",
131 "parameterOrder": [
132 "name"
133 ],
134 "parameters": {
135 "name": {
136 "description": "The name of the requested re pository. Values are of the form\n`projects/<project>/repos/<repo>`.",
137 "location": "path",
138 "pattern": "^projects/[^/]+/repos/.+$",
139 "required": true,
140 "type": "string"
141 }
142 },
143 "path": "v1/{+name}",
144 "response": {
145 "$ref": "Repo"
146 },
147 "scopes": [
148 "https://www.googleapis.com/auth/cloud-platform" ,
149 "https://www.googleapis.com/auth/source.read_onl y",
150 "https://www.googleapis.com/auth/source.read_wri te"
151 ]
152 },
153 "testIamPermissions": {
154 "description": "Returns permissions that a caller ha s on the specified resource.\nIf the resource does not exist, this will return a n empty set of\npermissions, not a NOT_FOUND error.",
155 "httpMethod": "POST",
156 "id": "sourcerepo.projects.repos.testIamPermissions" ,
157 "parameterOrder": [
158 "resource"
159 ],
160 "parameters": {
161 "resource": {
162 "description": "REQUIRED: The resource for w hich the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.",
163 "location": "path",
164 "pattern": "^projects/[^/]+/repos/.+$",
165 "required": true,
166 "type": "string"
167 }
168 },
169 "path": "v1/{+resource}:testIamPermissions",
170 "request": {
171 "$ref": "TestIamPermissionsRequest"
172 },
173 "response": {
174 "$ref": "TestIamPermissionsResponse"
175 },
176 "scopes": [
177 "https://www.googleapis.com/auth/cloud-platform" ,
178 "https://www.googleapis.com/auth/source.read_onl y",
179 "https://www.googleapis.com/auth/source.read_wri te"
180 ]
181 },
182 "delete": { 127 "delete": {
183 "description": "Deletes a repo.", 128 "description": "Deletes a repo.",
184 "httpMethod": "DELETE", 129 "httpMethod": "DELETE",
185 "id": "sourcerepo.projects.repos.delete", 130 "id": "sourcerepo.projects.repos.delete",
186 "parameterOrder": [ 131 "parameterOrder": [
187 "name" 132 "name"
188 ], 133 ],
189 "parameters": { 134 "parameters": {
190 "name": { 135 "name": {
191 "description": "The name of the repo to dele te. Values are of the form\n`projects/<project>/repos/<repo>`.", 136 "description": "The name of the repo to dele te. Values are of the form\n`projects/<project>/repos/<repo>`.",
(...skipping 126 matching lines...) Expand 10 before | Expand all | Expand 10 after
318 }, 263 },
319 "path": "v1/{+resource}:getIamPolicy", 264 "path": "v1/{+resource}:getIamPolicy",
320 "response": { 265 "response": {
321 "$ref": "Policy" 266 "$ref": "Policy"
322 }, 267 },
323 "scopes": [ 268 "scopes": [
324 "https://www.googleapis.com/auth/cloud-platform" , 269 "https://www.googleapis.com/auth/cloud-platform" ,
325 "https://www.googleapis.com/auth/source.read_onl y", 270 "https://www.googleapis.com/auth/source.read_onl y",
326 "https://www.googleapis.com/auth/source.read_wri te" 271 "https://www.googleapis.com/auth/source.read_wri te"
327 ] 272 ]
273 },
274 "get": {
275 "description": "Returns information about a repo.",
276 "httpMethod": "GET",
277 "id": "sourcerepo.projects.repos.get",
278 "parameterOrder": [
279 "name"
280 ],
281 "parameters": {
282 "name": {
283 "description": "The name of the requested re pository. Values are of the form\n`projects/<project>/repos/<repo>`.",
284 "location": "path",
285 "pattern": "^projects/[^/]+/repos/.+$",
286 "required": true,
287 "type": "string"
288 }
289 },
290 "path": "v1/{+name}",
291 "response": {
292 "$ref": "Repo"
293 },
294 "scopes": [
295 "https://www.googleapis.com/auth/cloud-platform" ,
296 "https://www.googleapis.com/auth/source.read_onl y",
297 "https://www.googleapis.com/auth/source.read_wri te"
298 ]
299 },
300 "testIamPermissions": {
301 "description": "Returns permissions that a caller ha s on the specified resource.\nIf the resource does not exist, this will return a n empty set of\npermissions, not a NOT_FOUND error.",
302 "httpMethod": "POST",
303 "id": "sourcerepo.projects.repos.testIamPermissions" ,
304 "parameterOrder": [
305 "resource"
306 ],
307 "parameters": {
308 "resource": {
309 "description": "REQUIRED: The resource for w hich the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.",
310 "location": "path",
311 "pattern": "^projects/[^/]+/repos/.+$",
312 "required": true,
313 "type": "string"
314 }
315 },
316 "path": "v1/{+resource}:testIamPermissions",
317 "request": {
318 "$ref": "TestIamPermissionsRequest"
319 },
320 "response": {
321 "$ref": "TestIamPermissionsResponse"
322 },
323 "scopes": [
324 "https://www.googleapis.com/auth/cloud-platform" ,
325 "https://www.googleapis.com/auth/source.read_onl y",
326 "https://www.googleapis.com/auth/source.read_wri te"
327 ]
328 } 328 }
329 } 329 }
330 } 330 }
331 } 331 }
332 } 332 }
333 }, 333 },
334 "revision": "20170528", 334 "revision": "20170528",
335 "rootUrl": "https://sourcerepo.googleapis.com/", 335 "rootUrl": "https://sourcerepo.googleapis.com/",
336 "schemas": { 336 "schemas": {
337 "Condition": {
338 "description": "A condition to be met.",
339 "id": "Condition",
340 "properties": {
341 "sys": {
342 "description": "Trusted attributes supplied by any service t hat owns resources and uses\nthe IAM system for access control.",
343 "enum": [
344 "NO_ATTR",
345 "REGION",
346 "SERVICE",
347 "NAME",
348 "IP"
349 ],
350 "enumDescriptions": [
351 "Default non-attribute type",
352 "Region of the resource",
353 "Service name",
354 "Resource name",
355 "IP address of the caller"
356 ],
357 "type": "string"
358 },
359 "value": {
360 "description": "DEPRECATED. Use 'values' instead.",
361 "type": "string"
362 },
363 "iam": {
364 "description": "Trusted attributes supplied by the IAM syste m.",
365 "enum": [
366 "NO_ATTR",
367 "AUTHORITY",
368 "ATTRIBUTION",
369 "APPROVER",
370 "JUSTIFICATION_TYPE"
371 ],
372 "enumDescriptions": [
373 "Default non-attribute.",
374 "Either principal or (if present) authority selector.",
375 "The principal (even if an authority selector is present ), which\nmust only be used for attribution, not authorization.",
376 "An approver (distinct from the requester) that has auth orized this\nrequest.\nWhen used with IN, the condition indicates that one of th e approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, a nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT _IN).\nSee: go/rpc-security-policy-dynamicauth.",
377 "What types of justifications have been supplied with th is request.\nString values should match enum names from tech.iam.JustificationTy pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe * absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications , e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported. "
378 ],
379 "type": "string"
380 },
381 "values": {
382 "description": "The objects of the condition. This is mutual ly exclusive with 'value'.",
383 "items": {
384 "type": "string"
385 },
386 "type": "array"
387 },
388 "op": {
389 "description": "An operator to apply the subject with.",
390 "enum": [
391 "NO_OP",
392 "EQUALS",
393 "NOT_EQUALS",
394 "IN",
395 "NOT_IN",
396 "DISCHARGED"
397 ],
398 "enumDescriptions": [
399 "Default no-op.",
400 "DEPRECATED. Use IN instead.",
401 "DEPRECATED. Use NOT_IN instead.",
402 "The condition is true if the subject (or any element of it if it is\na set) matches any of the supplied values.",
403 "The condition is true if the subject (or every element of it if it is\na set) matches none of the supplied values.",
404 "Subject is discharged"
405 ],
406 "type": "string"
407 },
408 "svc": {
409 "description": "Trusted attributes discharged by the service .",
410 "type": "string"
411 }
412 },
413 "type": "object"
414 },
415 "ListReposResponse": {
416 "description": "Response for ListRepos. The size is not set in the returned repositories.",
417 "id": "ListReposResponse",
418 "properties": {
419 "repos": {
420 "description": "The listed repos.",
421 "items": {
422 "$ref": "Repo"
423 },
424 "type": "array"
425 },
426 "nextPageToken": {
427 "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.",
428 "type": "string"
429 }
430 },
431 "type": "object"
432 },
433 "TestIamPermissionsResponse": {
434 "description": "Response message for `TestIamPermissions` method.",
435 "id": "TestIamPermissionsResponse",
436 "properties": {
437 "permissions": {
438 "description": "A subset of `TestPermissionsRequest.permissi ons` that the caller is\nallowed.",
439 "items": {
440 "type": "string"
441 },
442 "type": "array"
443 }
444 },
445 "type": "object"
446 },
337 "CounterOptions": { 447 "CounterOptions": {
338 "description": "Options for counters", 448 "description": "Options for counters",
339 "id": "CounterOptions", 449 "id": "CounterOptions",
340 "properties": { 450 "properties": {
341 "field": { 451 "field": {
342 "description": "The field value to attribute.", 452 "description": "The field value to attribute.",
343 "type": "string" 453 "type": "string"
344 }, 454 },
345 "metric": { 455 "metric": {
346 "description": "The metric to update.", 456 "description": "The metric to update.",
347 "type": "string" 457 "type": "string"
348 } 458 }
349 }, 459 },
350 "type": "object" 460 "type": "object"
351 }, 461 },
352 "AuditLogConfig": { 462 "AuditLogConfig": {
353 "description": "Provides the configuration for logging a type of per missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type \": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and ' DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", 463 "description": "Provides the configuration for logging a type of per missions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type \": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and ' DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.",
354 "id": "AuditLogConfig", 464 "id": "AuditLogConfig",
355 "properties": { 465 "properties": {
356 "exemptedMembers": {
357 "description": "Specifies the identities that do not cause l ogging for this type of\npermission.\nFollows the same format of Binding.members .",
358 "items": {
359 "type": "string"
360 },
361 "type": "array"
362 },
363 "logType": { 466 "logType": {
364 "description": "The log type that this config enables.", 467 "description": "The log type that this config enables.",
365 "enum": [ 468 "enum": [
366 "LOG_TYPE_UNSPECIFIED", 469 "LOG_TYPE_UNSPECIFIED",
367 "ADMIN_READ", 470 "ADMIN_READ",
368 "DATA_WRITE", 471 "DATA_WRITE",
369 "DATA_READ" 472 "DATA_READ"
370 ], 473 ],
371 "enumDescriptions": [ 474 "enumDescriptions": [
372 "Default case. Should never be this.", 475 "Default case. Should never be this.",
373 "Admin reads. Example: CloudIAM getIamPolicy", 476 "Admin reads. Example: CloudIAM getIamPolicy",
374 "Data writes. Example: CloudSQL Users create", 477 "Data writes. Example: CloudSQL Users create",
375 "Data reads. Example: CloudSQL Users list" 478 "Data reads. Example: CloudSQL Users list"
376 ], 479 ],
377 "type": "string" 480 "type": "string"
481 },
482 "exemptedMembers": {
483 "description": "Specifies the identities that do not cause l ogging for this type of\npermission.\nFollows the same format of Binding.members .",
484 "items": {
485 "type": "string"
486 },
487 "type": "array"
378 } 488 }
379 }, 489 },
380 "type": "object" 490 "type": "object"
381 }, 491 },
382 "Rule": { 492 "Rule": {
383 "description": "A rule to be applied in a Policy.", 493 "description": "A rule to be applied in a Policy.",
384 "id": "Rule", 494 "id": "Rule",
385 "properties": { 495 "properties": {
386 "notIn": { 496 "notIn": {
387 "description": "If one or more 'not_in' clauses are specifie d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri es.\nThe format for in and not_in entries is the same as for members in a\nBindi ng (see google/iam/v1/policy.proto).", 497 "description": "If one or more 'not_in' clauses are specifie d, the rule matches\nif the PRINCIPAL/AUTHORITY_SELECTOR is in none of the entri es.\nThe format for in and not_in entries is the same as for members in a\nBindi ng (see google/iam/v1/policy.proto).",
(...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after
475 }, 585 },
476 "type": "array" 586 "type": "array"
477 } 587 }
478 }, 588 },
479 "type": "object" 589 "type": "object"
480 }, 590 },
481 "Policy": { 591 "Policy": {
482 "description": "Defines an Identity and Access Management (IAM) poli cy. It is used to\nspecify access control policies for Cloud Platform resources. \n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n `members` to a `role`, where the members can be user accounts, Google groups,\nG oogle domains, and service accounts. A `role` is a named list of permissions\nde fined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike @example.com\",\n \"group:admins@example.com\",\n \"domain :google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccoun t.com\",\n ]\n },\n {\n \"role\": \"roles/viewer \",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide ](https://cloud.google.com/iam).", 592 "description": "Defines an Identity and Access Management (IAM) poli cy. It is used to\nspecify access control policies for Cloud Platform resources. \n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n `members` to a `role`, where the members can be user accounts, Google groups,\nG oogle domains, and service accounts. A `role` is a named list of permissions\nde fined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike @example.com\",\n \"group:admins@example.com\",\n \"domain :google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccoun t.com\",\n ]\n },\n {\n \"role\": \"roles/viewer \",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide ](https://cloud.google.com/iam).",
483 "id": "Policy", 593 "id": "Policy",
484 "properties": { 594 "properties": {
485 "etag": {
486 "description": "`etag` is used for optimistic concurrency co ntrol as a way to help\nprevent simultaneous updates of a policy from overwritin g each other.\nIt is strongly suggested that systems make use of the `etag` in t he\nread-modify-write cycle to perform policy updates in order to avoid race\nco nditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that t heir change will be applied to the same version of the policy.\n\nIf no `etag` i s provided in the call to `setIamPolicy`, then the existing\npolicy is overwritt en blindly.",
487 "format": "byte",
488 "type": "string"
489 },
490 "iamOwned": {
491 "type": "boolean"
492 },
493 "rules": { 595 "rules": {
494 "description": "If more than one rule is specified, the rule s are applied in the following\nmanner:\n- All matching LOG rules are always app lied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Loggin g will be applied if one or more matching rule requires logging.\n- Otherwise, i f any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging wi ll be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.", 596 "description": "If more than one rule is specified, the rule s are applied in the following\nmanner:\n- All matching LOG rules are always app lied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Loggin g will be applied if one or more matching rule requires logging.\n- Otherwise, i f any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging wi ll be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.",
495 "items": { 597 "items": {
496 "$ref": "Rule" 598 "$ref": "Rule"
497 }, 599 },
498 "type": "array" 600 "type": "array"
499 }, 601 },
500 "version": { 602 "version": {
501 "description": "Version of the `Policy`. The default version is 0.", 603 "description": "Version of the `Policy`. The default version is 0.",
502 "format": "int32", 604 "format": "int32",
503 "type": "integer" 605 "type": "integer"
504 }, 606 },
505 "auditConfigs": { 607 "auditConfigs": {
506 "description": "Specifies cloud audit logging configuration for this policy.", 608 "description": "Specifies cloud audit logging configuration for this policy.",
507 "items": { 609 "items": {
508 "$ref": "AuditConfig" 610 "$ref": "AuditConfig"
509 }, 611 },
510 "type": "array" 612 "type": "array"
511 }, 613 },
512 "bindings": { 614 "bindings": {
513 "description": "Associates a list of `members` to a `role`.\ nMultiple `bindings` must not be specified for the same `role`.\n`bindings` with no members will result in an error.", 615 "description": "Associates a list of `members` to a `role`.\ nMultiple `bindings` must not be specified for the same `role`.\n`bindings` with no members will result in an error.",
514 "items": { 616 "items": {
515 "$ref": "Binding" 617 "$ref": "Binding"
516 }, 618 },
517 "type": "array" 619 "type": "array"
620 },
621 "etag": {
622 "description": "`etag` is used for optimistic concurrency co ntrol as a way to help\nprevent simultaneous updates of a policy from overwritin g each other.\nIt is strongly suggested that systems make use of the `etag` in t he\nread-modify-write cycle to perform policy updates in order to avoid race\nco nditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that t heir change will be applied to the same version of the policy.\n\nIf no `etag` i s provided in the call to `setIamPolicy`, then the existing\npolicy is overwritt en blindly.",
623 "format": "byte",
624 "type": "string"
625 },
626 "iamOwned": {
627 "type": "boolean"
518 } 628 }
519 }, 629 },
520 "type": "object" 630 "type": "object"
521 }, 631 },
522 "DataAccessOptions": { 632 "DataAccessOptions": {
523 "description": "Write a Data Access (Gin) log", 633 "description": "Write a Data Access (Gin) log",
524 "id": "DataAccessOptions", 634 "id": "DataAccessOptions",
525 "properties": {}, 635 "properties": {},
526 "type": "object" 636 "type": "object"
527 }, 637 },
528 "AuditConfig": { 638 "AuditConfig": {
529 "description": "Specifies the audit configuration for a service.\nTh e configuration determines which permission types are logged, and what\nidentiti es, if any, are exempted from logging.\nAn AuditConfig must have one or more Aud itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_t ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac h\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices \"\n \"audit_log_configs\": [\n {\n \"log_type\ ": \"DATA_READ\",\n \"exempted_members\": [\n \"user :foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"lo g_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_config s\": [\n {\n \"log_type\": \"DATA_READ\",\n } ,\n {\n \"log_type\": \"DATA_WRITE\",\n \"e xempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this pol icy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@g mail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", 639 "description": "Specifies the audit configuration for a service.\nTh e configuration determines which permission types are logged, and what\nidentiti es, if any, are exempted from logging.\nAn AuditConfig must have one or more Aud itLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_t ypes\nspecified in each AuditConfig are enabled, and the exempted_members in eac h\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices \"\n \"audit_log_configs\": [\n {\n \"log_type\ ": \"DATA_READ\",\n \"exempted_members\": [\n \"user :foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"lo g_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_config s\": [\n {\n \"log_type\": \"DATA_READ\",\n } ,\n {\n \"log_type\": \"DATA_WRITE\",\n \"e xempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this pol icy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@g mail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.",
530 "id": "AuditConfig", 640 "id": "AuditConfig",
531 "properties": { 641 "properties": {
532 "exemptedMembers": {
533 "items": {
534 "type": "string"
535 },
536 "type": "array"
537 },
538 "service": { 642 "service": {
539 "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com `.\n`allServices` is a special value that covers all services.", 643 "description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com `.\n`allServices` is a special value that covers all services.",
540 "type": "string" 644 "type": "string"
541 }, 645 },
542 "auditLogConfigs": { 646 "auditLogConfigs": {
543 "description": "The configuration for logging of each type o f permission.\nNext ID: 4", 647 "description": "The configuration for logging of each type o f permission.\nNext ID: 4",
544 "items": { 648 "items": {
545 "$ref": "AuditLogConfig" 649 "$ref": "AuditLogConfig"
546 }, 650 },
547 "type": "array" 651 "type": "array"
652 },
653 "exemptedMembers": {
654 "items": {
655 "type": "string"
656 },
657 "type": "array"
548 } 658 }
549 }, 659 },
550 "type": "object" 660 "type": "object"
551 }, 661 },
552 "SetIamPolicyRequest": { 662 "SetIamPolicyRequest": {
553 "description": "Request message for `SetIamPolicy` method.", 663 "description": "Request message for `SetIamPolicy` method.",
554 "id": "SetIamPolicyRequest", 664 "id": "SetIamPolicyRequest",
555 "properties": { 665 "properties": {
556 "policy": { 666 "policy": {
557 "$ref": "Policy", 667 "$ref": "Policy",
(...skipping 68 matching lines...) Expand 10 before | Expand all | Expand 10 after
626 "description": "ID of the SSH deploy key at the other hostin g service.\nRemoving this key from the other service would deauthorize\nGoogle C loud Source Repositories from mirroring.", 736 "description": "ID of the SSH deploy key at the other hostin g service.\nRemoving this key from the other service would deauthorize\nGoogle C loud Source Repositories from mirroring.",
627 "type": "string" 737 "type": "string"
628 } 738 }
629 }, 739 },
630 "type": "object" 740 "type": "object"
631 }, 741 },
632 "Repo": { 742 "Repo": {
633 "description": "A repository (or repo) is a Git repository storing v ersioned source content.", 743 "description": "A repository (or repo) is a Git repository storing v ersioned source content.",
634 "id": "Repo", 744 "id": "Repo",
635 "properties": { 745 "properties": {
746 "size": {
747 "description": "The disk usage of the repo, in bytes.\nOnly returned by GetRepo.",
748 "format": "int64",
749 "type": "string"
750 },
636 "name": { 751 "name": {
637 "description": "Resource name of the repository, of the form \n`projects/<project>/repos/<repo>`. The repo name may contain slashes.\neg, `p rojects/myproject/repos/name/with/slash`", 752 "description": "Resource name of the repository, of the form \n`projects/<project>/repos/<repo>`. The repo name may contain slashes.\neg, `p rojects/myproject/repos/name/with/slash`",
638 "type": "string" 753 "type": "string"
639 }, 754 },
640 "mirrorConfig": { 755 "mirrorConfig": {
641 "$ref": "MirrorConfig", 756 "$ref": "MirrorConfig",
642 "description": "How this repository mirrors a repository man aged by another service." 757 "description": "How this repository mirrors a repository man aged by another service."
643 }, 758 },
644 "url": { 759 "url": {
645 "description": "URL to clone the repository from Google Clou d Source Repositories.", 760 "description": "URL to clone the repository from Google Clou d Source Repositories.",
646 "type": "string" 761 "type": "string"
647 },
648 "size": {
649 "description": "The disk usage of the repo, in bytes.\nOnly returned by GetRepo.",
650 "format": "int64",
651 "type": "string"
652 } 762 }
653 }, 763 },
654 "type": "object" 764 "type": "object"
655 },
656 "TestIamPermissionsResponse": {
657 "description": "Response message for `TestIamPermissions` method.",
658 "id": "TestIamPermissionsResponse",
659 "properties": {
660 "permissions": {
661 "description": "A subset of `TestPermissionsRequest.permissi ons` that the caller is\nallowed.",
662 "items": {
663 "type": "string"
664 },
665 "type": "array"
666 }
667 },
668 "type": "object"
669 },
670 "ListReposResponse": {
671 "description": "Response for ListRepos. The size is not set in the returned repositories.",
672 "id": "ListReposResponse",
673 "properties": {
674 "repos": {
675 "description": "The listed repos.",
676 "items": {
677 "$ref": "Repo"
678 },
679 "type": "array"
680 },
681 "nextPageToken": {
682 "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.",
683 "type": "string"
684 }
685 },
686 "type": "object"
687 },
688 "Condition": {
689 "description": "A condition to be met.",
690 "id": "Condition",
691 "properties": {
692 "op": {
693 "description": "An operator to apply the subject with.",
694 "enum": [
695 "NO_OP",
696 "EQUALS",
697 "NOT_EQUALS",
698 "IN",
699 "NOT_IN",
700 "DISCHARGED"
701 ],
702 "enumDescriptions": [
703 "Default no-op.",
704 "DEPRECATED. Use IN instead.",
705 "DEPRECATED. Use NOT_IN instead.",
706 "The condition is true if the subject (or any element of it if it is\na set) matches any of the supplied values.",
707 "The condition is true if the subject (or every element of it if it is\na set) matches none of the supplied values.",
708 "Subject is discharged"
709 ],
710 "type": "string"
711 },
712 "svc": {
713 "description": "Trusted attributes discharged by the service .",
714 "type": "string"
715 },
716 "value": {
717 "description": "DEPRECATED. Use 'values' instead.",
718 "type": "string"
719 },
720 "sys": {
721 "description": "Trusted attributes supplied by any service t hat owns resources and uses\nthe IAM system for access control.",
722 "enum": [
723 "NO_ATTR",
724 "REGION",
725 "SERVICE",
726 "NAME",
727 "IP"
728 ],
729 "enumDescriptions": [
730 "Default non-attribute type",
731 "Region of the resource",
732 "Service name",
733 "Resource name",
734 "IP address of the caller"
735 ],
736 "type": "string"
737 },
738 "iam": {
739 "description": "Trusted attributes supplied by the IAM syste m.",
740 "enum": [
741 "NO_ATTR",
742 "AUTHORITY",
743 "ATTRIBUTION",
744 "APPROVER",
745 "JUSTIFICATION_TYPE"
746 ],
747 "enumDescriptions": [
748 "Default non-attribute.",
749 "Either principal or (if present) authority selector.",
750 "The principal (even if an authority selector is present ), which\nmust only be used for attribution, not authorization.",
751 "An approver (distinct from the requester) that has auth orized this\nrequest.\nWhen used with IN, the condition indicates that one of th e approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, a nd are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT _IN).\nSee: go/rpc-security-policy-dynamicauth.",
752 "What types of justifications have been supplied with th is request.\nString values should match enum names from tech.iam.JustificationTy pe,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe * absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications , e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported. "
753 ],
754 "type": "string"
755 },
756 "values": {
757 "description": "The objects of the condition. This is mutual ly exclusive with 'value'.",
758 "items": {
759 "type": "string"
760 },
761 "type": "array"
762 }
763 },
764 "type": "object"
765 } 765 }
766 }, 766 },
767 "servicePath": "", 767 "servicePath": "",
768 "title": "Cloud Source Repositories API", 768 "title": "Cloud Source Repositories API",
769 "version": "v1" 769 "version": "v1"
770 } 770 }
OLDNEW
« no previous file with comments | « discovery/googleapis/slides__v1.json ('k') | discovery/googleapis/spanner__v1.json » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698