docs: update generated docs (#981)
diff --git a/docs/dyn/policytroubleshooter_v1.iam.html b/docs/dyn/policytroubleshooter_v1.iam.html
index 439e12f..523a203 100644
--- a/docs/dyn/policytroubleshooter_v1.iam.html
+++ b/docs/dyn/policytroubleshooter_v1.iam.html
@@ -90,18 +90,6 @@
{ # Request for TroubleshootIamPolicy.
"accessTuple": { # Information about the member, resource, and permission to check. # The information to use for checking whether a member has a permission for a
# resource.
- "principal": "A String", # Required. The member, or principal, whose access you want to check, in the form of
- # the email address that represents that member. For example,
- # `alice@example.com` or
- # `my-service-account@my-project.iam.gserviceaccount.com`.
- #
- # The member must be a Google Account or a service account. Other types of
- # members are not supported.
- "fullResourceName": "A String", # Required. The full resource name that identifies the resource. For example,
- # `//compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance`.
- #
- # For examples of full resource names for Google Cloud services, see
- # https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
"permission": "A String", # Required. The IAM permission to check for the specified member and resource.
#
# For a complete list of IAM permissions, see
@@ -109,6 +97,18 @@
#
# For a complete list of predefined IAM roles and the permissions in each
# role, see https://cloud.google.com/iam/help/roles/reference.
+ "fullResourceName": "A String", # Required. The full resource name that identifies the resource. For example,
+ # `//compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance`.
+ #
+ # For examples of full resource names for Google Cloud services, see
+ # https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
+ "principal": "A String", # Required. The member, or principal, whose access you want to check, in the form of
+ # the email address that represents that member. For example,
+ # `alice@example.com` or
+ # `my-service-account@my-project.iam.gserviceaccount.com`.
+ #
+ # The member must be a Google Account or a service account. Other types of
+ # members are not supported.
},
}
@@ -141,14 +141,6 @@
# this policy. To determine whether the member actually has the permission,
# use the `access` field in the
# TroubleshootIamPolicyResponse.
- "fullResourceName": "A String", # The full resource name that identifies the resource. For example,
- # `//compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance`.
- #
- # If the sender of the request does not have access to the policy, this field
- # is omitted.
- #
- # For examples of full resource names for Google Cloud services, see
- # https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
"bindingExplanations": [ # Details about how each binding in the policy affects the member's ability,
# or inability, to use the permission for the resource.
#
@@ -161,10 +153,36 @@
#
# For a complete list of predefined IAM roles, as well as the permissions in
# each role, see https://cloud.google.com/iam/help/roles/reference.
- "rolePermission": "A String", # Indicates whether the role granted by this binding contains the specified
- # permission.
"rolePermissionRelevance": "A String", # The relevance of the permission's existence, or nonexistence, in the role
# to the overall determination for the entire policy.
+ "rolePermission": "A String", # Indicates whether the role granted by this binding contains the specified
+ # permission.
+ "memberships": { # Indicates whether each member in the binding includes the member specified
+ # in the request, either directly or indirectly. Each key identifies a member
+ # in the binding, and each value indicates whether the member in the binding
+ # includes the member in the request.
+ #
+ # For example, suppose that a binding includes the following members:
+ #
+ # * `user:alice@example.com`
+ # * `group:product-eng@example.com`
+ #
+ # You want to troubleshoot access for `user:bob@example.com`. This user is a
+ # member of the group `group:product-eng@example.com`.
+ #
+ # For the first member in the binding, the key is `user:alice@example.com`,
+ # and the `membership` field in the value is set to
+ # `MEMBERSHIP_NOT_INCLUDED`.
+ #
+ # For the second member in the binding, the key is
+ # `group:product-eng@example.com`, and the `membership` field in the value is
+ # set to `MEMBERSHIP_INCLUDED`.
+ "a_key": { # Details about whether the binding includes the member.
+ "relevance": "A String", # The relevance of the member's status to the overall determination for the
+ # binding.
+ "membership": "A String", # Indicates whether the binding includes the member.
+ },
+ },
"access": "A String", # Required. Indicates whether _this binding_ provides the specified permission to the
# specified member for the specified resource.
#
@@ -173,6 +191,8 @@
# this binding. To determine whether the member actually has the permission,
# use the `access` field in the
# TroubleshootIamPolicyResponse.
+ "relevance": "A String", # The relevance of this binding to the overall determination for the entire
+ # policy.
"condition": { # Represents a textual expression in the Common Expression Language (CEL) # A condition expression that prevents access unless the expression evaluates
# to `true`.
#
@@ -213,41 +233,21 @@
"title": "A String", # Optional. Title for the expression, i.e. a short string describing
# its purpose. This can be used e.g. in UIs which allow to enter the
# expression.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
"expression": "A String", # Textual representation of an expression in Common Expression Language
# syntax.
- },
- "relevance": "A String", # The relevance of this binding to the overall determination for the entire
- # policy.
- "memberships": { # Indicates whether each member in the binding includes the member specified
- # in the request, either directly or indirectly. Each key identifies a member
- # in the binding, and each value indicates whether the member in the binding
- # includes the member in the request.
- #
- # For example, suppose that a binding includes the following members:
- #
- # * `user:alice@example.com`
- # * `group:product-eng@example.com`
- #
- # You want to troubleshoot access for `user:bob@example.com`. This user is a
- # member of the group `group:product-eng@example.com`.
- #
- # For the first member in the binding, the key is `user:alice@example.com`,
- # and the `membership` field in the value is set to
- # `MEMBERSHIP_NOT_INCLUDED`.
- #
- # For the second member in the binding, the key is
- # `group:product-eng@example.com`, and the `membership` field in the value is
- # set to `MEMBERSHIP_INCLUDED`.
- "a_key": { # Details about whether the binding includes the member.
- "relevance": "A String", # The relevance of the member's status to the overall determination for the
- # binding.
- "membership": "A String", # Indicates whether the binding includes the member.
- },
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
},
},
],
+ "fullResourceName": "A String", # The full resource name that identifies the resource. For example,
+ # `//compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance`.
+ #
+ # If the sender of the request does not have access to the policy, this field
+ # is omitted.
+ #
+ # For examples of full resource names for Google Cloud services, see
+ # https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
"policy": { # An Identity and Access Management (IAM) policy, which specifies access # The IAM policy attached to the resource.
#
# If the sender of the request does not have access to the policy, this field
@@ -318,12 +318,46 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
+ "version": 42, # Specifies the format of the policy.
+ #
+ # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+ # are rejected.
+ #
+ # Any operation that affects conditional role bindings must specify version
+ # `3`. This requirement applies to the following operations:
+ #
+ # * Getting a policy that includes a conditional role binding
+ # * Adding a conditional role binding to a policy
+ # * Changing a conditional role binding in a policy
+ # * Removing any role binding, with or without a condition, from a policy
+ # that includes conditions
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
+ #
+ # If a policy does not include any conditions, operations on that policy may
+ # specify any valid version or leave the field unset.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
"bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
- "role": "A String", # Role that is assigned to `members`.
- # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
#
@@ -416,49 +450,15 @@
"title": "A String", # Optional. Title for the expression, i.e. a short string describing
# its purpose. This can be used e.g. in UIs which allow to enter the
# expression.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
"expression": "A String", # Textual representation of an expression in Common Expression Language
# syntax.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
},
+ "role": "A String", # Role that is assigned to `members`.
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
},
],
- "version": 42, # Specifies the format of the policy.
- #
- # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
- # are rejected.
- #
- # Any operation that affects conditional role bindings must specify version
- # `3`. This requirement applies to the following operations:
- #
- # * Getting a policy that includes a conditional role binding
- # * Adding a conditional role binding to a policy
- # * Changing a conditional role binding in a policy
- # * Removing any role binding, with or without a condition, from a policy
- # that includes conditions
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- #
- # If a policy does not include any conditions, operations on that policy may
- # specify any valid version or leave the field unset.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
"auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
{ # Specifies the audit configuration for a service.
# The configuration determines which permission types are logged, and what
@@ -475,7 +475,7 @@
# {
# "audit_configs": [
# {
- # "service": "allServices"
+ # "service": "allServices",
# "audit_log_configs": [
# {
# "log_type": "DATA_READ",
@@ -484,18 +484,18 @@
# ]
# },
# {
- # "log_type": "DATA_WRITE",
+ # "log_type": "DATA_WRITE"
# },
# {
- # "log_type": "ADMIN_READ",
+ # "log_type": "ADMIN_READ"
# }
# ]
# },
# {
- # "service": "sampleservice.googleapis.com"
+ # "service": "sampleservice.googleapis.com",
# "audit_log_configs": [
# {
- # "log_type": "DATA_READ",
+ # "log_type": "DATA_READ"
# },
# {
# "log_type": "DATA_WRITE",
@@ -527,19 +527,19 @@
# ]
# },
# {
- # "log_type": "DATA_WRITE",
+ # "log_type": "DATA_WRITE"
# }
# ]
# }
#
# This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
# jose@example.com from DATA_READ logging.
+ "logType": "A String", # The log type that this config enables.
"exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
# permission.
# Follows the same format of Binding.members.
"A String",
],
- "logType": "A String", # The log type that this config enables.
},
],
},