Index: discovery/googleapis/sourcerepo__v1.json |
diff --git a/discovery/googleapis/sourcerepo__v1.json b/discovery/googleapis/sourcerepo__v1.json |
index 8f40346a776b8f56f16cc7982891de991e495602..8f11358ab59242c5f66305fbac9410a366f9d162 100644 |
--- a/discovery/googleapis/sourcerepo__v1.json |
+++ b/discovery/googleapis/sourcerepo__v1.json |
@@ -2,14 +2,14 @@ |
"auth": { |
"oauth2": { |
"scopes": { |
+ "https://www.googleapis.com/auth/source.read_write": { |
+ "description": "Manage the contents of your source code repositories" |
+ }, |
"https://www.googleapis.com/auth/cloud-platform": { |
"description": "View and manage your data across Google Cloud Platform services" |
}, |
"https://www.googleapis.com/auth/source.read_only": { |
"description": "View the contents of your source code repositories" |
- }, |
- "https://www.googleapis.com/auth/source.read_write": { |
- "description": "Manage the contents of your source code repositories" |
} |
} |
} |
@@ -31,6 +31,16 @@ |
"ownerDomain": "google.com", |
"ownerName": "Google", |
"parameters": { |
+ "bearer_token": { |
+ "description": "OAuth bearer token.", |
+ "location": "query", |
+ "type": "string" |
+ }, |
+ "oauth_token": { |
+ "description": "OAuth 2.0 token for the current user.", |
+ "location": "query", |
+ "type": "string" |
+ }, |
"upload_protocol": { |
"description": "Upload protocol for media (e.g. \"raw\", \"multipart\").", |
"location": "query", |
@@ -52,11 +62,6 @@ |
"location": "query", |
"type": "string" |
}, |
- "callback": { |
- "description": "JSONP", |
- "location": "query", |
- "type": "string" |
- }, |
"$.xgafv": { |
"description": "V1 error format.", |
"enum": [ |
@@ -70,6 +75,11 @@ |
"location": "query", |
"type": "string" |
}, |
+ "callback": { |
+ "description": "JSONP", |
+ "location": "query", |
+ "type": "string" |
+ }, |
"alt": { |
"default": "json", |
"description": "Data format for response.", |
@@ -106,16 +116,6 @@ |
"description": "Pretty-print response.", |
"location": "query", |
"type": "boolean" |
- }, |
- "bearer_token": { |
- "description": "OAuth bearer token.", |
- "location": "query", |
- "type": "string" |
- }, |
- "oauth_token": { |
- "description": "OAuth 2.0 token for the current user.", |
- "location": "query", |
- "type": "string" |
} |
}, |
"protocol": "rest", |
@@ -124,61 +124,6 @@ |
"resources": { |
"repos": { |
"methods": { |
- "get": { |
- "description": "Returns information about a repo.", |
- "httpMethod": "GET", |
- "id": "sourcerepo.projects.repos.get", |
- "parameterOrder": [ |
- "name" |
- ], |
- "parameters": { |
- "name": { |
- "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.", |
- "location": "path", |
- "pattern": "^projects/[^/]+/repos/.+$", |
- "required": true, |
- "type": "string" |
- } |
- }, |
- "path": "v1/{+name}", |
- "response": { |
- "$ref": "Repo" |
- }, |
- "scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform", |
- "https://www.googleapis.com/auth/source.read_only", |
- "https://www.googleapis.com/auth/source.read_write" |
- ] |
- }, |
- "testIamPermissions": { |
- "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.", |
- "httpMethod": "POST", |
- "id": "sourcerepo.projects.repos.testIamPermissions", |
- "parameterOrder": [ |
- "resource" |
- ], |
- "parameters": { |
- "resource": { |
- "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.", |
- "location": "path", |
- "pattern": "^projects/[^/]+/repos/.+$", |
- "required": true, |
- "type": "string" |
- } |
- }, |
- "path": "v1/{+resource}:testIamPermissions", |
- "request": { |
- "$ref": "TestIamPermissionsRequest" |
- }, |
- "response": { |
- "$ref": "TestIamPermissionsResponse" |
- }, |
- "scopes": [ |
- "https://www.googleapis.com/auth/cloud-platform", |
- "https://www.googleapis.com/auth/source.read_only", |
- "https://www.googleapis.com/auth/source.read_write" |
- ] |
- }, |
"delete": { |
"description": "Deletes a repo.", |
"httpMethod": "DELETE", |
@@ -325,6 +270,61 @@ |
"https://www.googleapis.com/auth/source.read_only", |
"https://www.googleapis.com/auth/source.read_write" |
] |
+ }, |
+ "get": { |
+ "description": "Returns information about a repo.", |
+ "httpMethod": "GET", |
+ "id": "sourcerepo.projects.repos.get", |
+ "parameterOrder": [ |
+ "name" |
+ ], |
+ "parameters": { |
+ "name": { |
+ "description": "The name of the requested repository. Values are of the form\n`projects/<project>/repos/<repo>`.", |
+ "location": "path", |
+ "pattern": "^projects/[^/]+/repos/.+$", |
+ "required": true, |
+ "type": "string" |
+ } |
+ }, |
+ "path": "v1/{+name}", |
+ "response": { |
+ "$ref": "Repo" |
+ }, |
+ "scopes": [ |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
+ ] |
+ }, |
+ "testIamPermissions": { |
+ "description": "Returns permissions that a caller has on the specified resource.\nIf the resource does not exist, this will return an empty set of\npermissions, not a NOT_FOUND error.", |
+ "httpMethod": "POST", |
+ "id": "sourcerepo.projects.repos.testIamPermissions", |
+ "parameterOrder": [ |
+ "resource" |
+ ], |
+ "parameters": { |
+ "resource": { |
+ "description": "REQUIRED: The resource for which the policy detail is being requested.\nSee the operation documentation for the appropriate value for this field.", |
+ "location": "path", |
+ "pattern": "^projects/[^/]+/repos/.+$", |
+ "required": true, |
+ "type": "string" |
+ } |
+ }, |
+ "path": "v1/{+resource}:testIamPermissions", |
+ "request": { |
+ "$ref": "TestIamPermissionsRequest" |
+ }, |
+ "response": { |
+ "$ref": "TestIamPermissionsResponse" |
+ }, |
+ "scopes": [ |
+ "https://www.googleapis.com/auth/cloud-platform", |
+ "https://www.googleapis.com/auth/source.read_only", |
+ "https://www.googleapis.com/auth/source.read_write" |
+ ] |
} |
} |
} |
@@ -334,6 +334,116 @@ |
"revision": "20170528", |
"rootUrl": "https://sourcerepo.googleapis.com/", |
"schemas": { |
+ "Condition": { |
+ "description": "A condition to be met.", |
+ "id": "Condition", |
+ "properties": { |
+ "sys": { |
+ "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.", |
+ "enum": [ |
+ "NO_ATTR", |
+ "REGION", |
+ "SERVICE", |
+ "NAME", |
+ "IP" |
+ ], |
+ "enumDescriptions": [ |
+ "Default non-attribute type", |
+ "Region of the resource", |
+ "Service name", |
+ "Resource name", |
+ "IP address of the caller" |
+ ], |
+ "type": "string" |
+ }, |
+ "value": { |
+ "description": "DEPRECATED. Use 'values' instead.", |
+ "type": "string" |
+ }, |
+ "iam": { |
+ "description": "Trusted attributes supplied by the IAM system.", |
+ "enum": [ |
+ "NO_ATTR", |
+ "AUTHORITY", |
+ "ATTRIBUTION", |
+ "APPROVER", |
+ "JUSTIFICATION_TYPE" |
+ ], |
+ "enumDescriptions": [ |
+ "Default non-attribute.", |
+ "Either principal or (if present) authority selector.", |
+ "The principal (even if an authority selector is present), which\nmust only be used for attribution, not authorization.", |
+ "An approver (distinct from the requester) that has authorized this\nrequest.\nWhen used with IN, the condition indicates that one of the approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, and are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
+ "What types of justifications have been supplied with this request.\nString values should match enum names from tech.iam.JustificationType,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported." |
+ ], |
+ "type": "string" |
+ }, |
+ "values": { |
+ "description": "The objects of the condition. This is mutually exclusive with 'value'.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ }, |
+ "op": { |
+ "description": "An operator to apply the subject with.", |
+ "enum": [ |
+ "NO_OP", |
+ "EQUALS", |
+ "NOT_EQUALS", |
+ "IN", |
+ "NOT_IN", |
+ "DISCHARGED" |
+ ], |
+ "enumDescriptions": [ |
+ "Default no-op.", |
+ "DEPRECATED. Use IN instead.", |
+ "DEPRECATED. Use NOT_IN instead.", |
+ "The condition is true if the subject (or any element of it if it is\na set) matches any of the supplied values.", |
+ "The condition is true if the subject (or every element of it if it is\na set) matches none of the supplied values.", |
+ "Subject is discharged" |
+ ], |
+ "type": "string" |
+ }, |
+ "svc": { |
+ "description": "Trusted attributes discharged by the service.", |
+ "type": "string" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "ListReposResponse": { |
+ "description": "Response for ListRepos. The size is not set in the returned repositories.", |
+ "id": "ListReposResponse", |
+ "properties": { |
+ "repos": { |
+ "description": "The listed repos.", |
+ "items": { |
+ "$ref": "Repo" |
+ }, |
+ "type": "array" |
+ }, |
+ "nextPageToken": { |
+ "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.", |
+ "type": "string" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
+ "TestIamPermissionsResponse": { |
+ "description": "Response message for `TestIamPermissions` method.", |
+ "id": "TestIamPermissionsResponse", |
+ "properties": { |
+ "permissions": { |
+ "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
+ } |
+ }, |
+ "type": "object" |
+ }, |
"CounterOptions": { |
"description": "Options for counters", |
"id": "CounterOptions", |
@@ -353,13 +463,6 @@ |
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\nfoo@gmail.com from DATA_READ logging.", |
"id": "AuditLogConfig", |
"properties": { |
- "exemptedMembers": { |
- "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- }, |
"logType": { |
"description": "The log type that this config enables.", |
"enum": [ |
@@ -375,6 +478,13 @@ |
"Data reads. Example: CloudSQL Users list" |
], |
"type": "string" |
+ }, |
+ "exemptedMembers": { |
+ "description": "Specifies the identities that do not cause logging for this type of\npermission.\nFollows the same format of Binding.members.", |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
} |
}, |
"type": "object" |
@@ -482,14 +592,6 @@ |
"description": "Defines an Identity and Access Management (IAM) policy. It is used to\nspecify access control policies for Cloud Platform resources.\n\n\nA `Policy` consists of a list of `bindings`. A `Binding` binds a list of\n`members` to a `role`, where the members can be user accounts, Google groups,\nGoogle domains, and service accounts. A `role` is a named list of permissions\ndefined by IAM.\n\n**Example**\n\n {\n \"bindings\": [\n {\n \"role\": \"roles/owner\",\n \"members\": [\n \"user:mike@example.com\",\n \"group:admins@example.com\",\n \"domain:google.com\",\n \"serviceAccount:my-other-app@appspot.gserviceaccount.com\",\n ]\n },\n {\n \"role\": \"roles/viewer\",\n \"members\": [\"user:sean@example.com\"]\n }\n ]\n }\n\nFor a description of IAM and its features, see the\n[IAM developer's guide](https://cloud.google.com/iam).", |
"id": "Policy", |
"properties": { |
- "etag": { |
- "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.", |
- "format": "byte", |
- "type": "string" |
- }, |
- "iamOwned": { |
- "type": "boolean" |
- }, |
"rules": { |
"description": "If more than one rule is specified, the rules are applied in the following\nmanner:\n- All matching LOG rules are always applied.\n- If any DENY/DENY_WITH_LOG rule matches, permission is denied.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if any ALLOW/ALLOW_WITH_LOG rule matches, permission is\n granted.\n Logging will be applied if one or more matching rule requires logging.\n- Otherwise, if no rule applies, permission is denied.", |
"items": { |
@@ -515,6 +617,14 @@ |
"$ref": "Binding" |
}, |
"type": "array" |
+ }, |
+ "etag": { |
+ "description": "`etag` is used for optimistic concurrency control as a way to help\nprevent simultaneous updates of a policy from overwriting each other.\nIt is strongly suggested that systems make use of the `etag` in the\nread-modify-write cycle to perform policy updates in order to avoid race\nconditions: An `etag` is returned in the response to `getIamPolicy`, and\nsystems are expected to put that etag in the request to `setIamPolicy` to\nensure that their change will be applied to the same version of the policy.\n\nIf no `etag` is provided in the call to `setIamPolicy`, then the existing\npolicy is overwritten blindly.", |
+ "format": "byte", |
+ "type": "string" |
+ }, |
+ "iamOwned": { |
+ "type": "boolean" |
} |
}, |
"type": "object" |
@@ -529,12 +639,6 @@ |
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:foo@gmail.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"fooservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:bar@gmail.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts foo@gmail.com from DATA_READ logging, and\nbar@gmail.com from DATA_WRITE logging.", |
"id": "AuditConfig", |
"properties": { |
- "exemptedMembers": { |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- }, |
"service": { |
"description": "Specifies a service that will be enabled for audit logging.\nFor example, `storage.googleapis.com`, `cloudsql.googleapis.com`.\n`allServices` is a special value that covers all services.", |
"type": "string" |
@@ -545,6 +649,12 @@ |
"$ref": "AuditLogConfig" |
}, |
"type": "array" |
+ }, |
+ "exemptedMembers": { |
+ "items": { |
+ "type": "string" |
+ }, |
+ "type": "array" |
} |
}, |
"type": "object" |
@@ -633,6 +743,11 @@ |
"description": "A repository (or repo) is a Git repository storing versioned source content.", |
"id": "Repo", |
"properties": { |
+ "size": { |
+ "description": "The disk usage of the repo, in bytes.\nOnly returned by GetRepo.", |
+ "format": "int64", |
+ "type": "string" |
+ }, |
"name": { |
"description": "Resource name of the repository, of the form\n`projects/<project>/repos/<repo>`. The repo name may contain slashes.\neg, `projects/myproject/repos/name/with/slash`", |
"type": "string" |
@@ -644,121 +759,6 @@ |
"url": { |
"description": "URL to clone the repository from Google Cloud Source Repositories.", |
"type": "string" |
- }, |
- "size": { |
- "description": "The disk usage of the repo, in bytes.\nOnly returned by GetRepo.", |
- "format": "int64", |
- "type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "TestIamPermissionsResponse": { |
- "description": "Response message for `TestIamPermissions` method.", |
- "id": "TestIamPermissionsResponse", |
- "properties": { |
- "permissions": { |
- "description": "A subset of `TestPermissionsRequest.permissions` that the caller is\nallowed.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
- } |
- }, |
- "type": "object" |
- }, |
- "ListReposResponse": { |
- "description": "Response for ListRepos. The size is not set in the returned repositories.", |
- "id": "ListReposResponse", |
- "properties": { |
- "repos": { |
- "description": "The listed repos.", |
- "items": { |
- "$ref": "Repo" |
- }, |
- "type": "array" |
- }, |
- "nextPageToken": { |
- "description": "If non-empty, additional repositories exist within the project. These\ncan be retrieved by including this value in the next ListReposRequest's\npage_token field.", |
- "type": "string" |
- } |
- }, |
- "type": "object" |
- }, |
- "Condition": { |
- "description": "A condition to be met.", |
- "id": "Condition", |
- "properties": { |
- "op": { |
- "description": "An operator to apply the subject with.", |
- "enum": [ |
- "NO_OP", |
- "EQUALS", |
- "NOT_EQUALS", |
- "IN", |
- "NOT_IN", |
- "DISCHARGED" |
- ], |
- "enumDescriptions": [ |
- "Default no-op.", |
- "DEPRECATED. Use IN instead.", |
- "DEPRECATED. Use NOT_IN instead.", |
- "The condition is true if the subject (or any element of it if it is\na set) matches any of the supplied values.", |
- "The condition is true if the subject (or every element of it if it is\na set) matches none of the supplied values.", |
- "Subject is discharged" |
- ], |
- "type": "string" |
- }, |
- "svc": { |
- "description": "Trusted attributes discharged by the service.", |
- "type": "string" |
- }, |
- "value": { |
- "description": "DEPRECATED. Use 'values' instead.", |
- "type": "string" |
- }, |
- "sys": { |
- "description": "Trusted attributes supplied by any service that owns resources and uses\nthe IAM system for access control.", |
- "enum": [ |
- "NO_ATTR", |
- "REGION", |
- "SERVICE", |
- "NAME", |
- "IP" |
- ], |
- "enumDescriptions": [ |
- "Default non-attribute type", |
- "Region of the resource", |
- "Service name", |
- "Resource name", |
- "IP address of the caller" |
- ], |
- "type": "string" |
- }, |
- "iam": { |
- "description": "Trusted attributes supplied by the IAM system.", |
- "enum": [ |
- "NO_ATTR", |
- "AUTHORITY", |
- "ATTRIBUTION", |
- "APPROVER", |
- "JUSTIFICATION_TYPE" |
- ], |
- "enumDescriptions": [ |
- "Default non-attribute.", |
- "Either principal or (if present) authority selector.", |
- "The principal (even if an authority selector is present), which\nmust only be used for attribution, not authorization.", |
- "An approver (distinct from the requester) that has authorized this\nrequest.\nWhen used with IN, the condition indicates that one of the approvers\nassociated with the request matches the specified principal, or is a\nmember of the specified group. Approvers can only grant additional\naccess, and are thus only used in a strictly positive context\n(e.g. ALLOW/IN or DENY/NOT_IN).\nSee: go/rpc-security-policy-dynamicauth.", |
- "What types of justifications have been supplied with this request.\nString values should match enum names from tech.iam.JustificationType,\ne.g. \"MANUAL_STRING\". It is not permitted to grant access based on\nthe *absence* of a justification, so justification conditions can only\nbe used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).\n\nMultiple justifications, e.g., a Buganizer ID and a manually-entered\nreason, are normal and supported." |
- ], |
- "type": "string" |
- }, |
- "values": { |
- "description": "The objects of the condition. This is mutually exclusive with 'value'.", |
- "items": { |
- "type": "string" |
- }, |
- "type": "array" |
} |
}, |
"type": "object" |