docs: update generated docs (#981)
diff --git a/docs/dyn/policytroubleshooter_v1beta.iam.html b/docs/dyn/policytroubleshooter_v1beta.iam.html
index 9cf558b..e37ec26 100644
--- a/docs/dyn/policytroubleshooter_v1beta.iam.html
+++ b/docs/dyn/policytroubleshooter_v1beta.iam.html
@@ -90,13 +90,6 @@
{ # Request for TroubleshootIamPolicy.
"accessTuple": { # Information about the member, resource, and permission to check. # The information to use for checking whether a member has a permission for a
# resource.
- "principal": "A String", # Required. The member, or principal, whose access you want to check, in the form of
- # the email address that represents that member. For example,
- # `alice@example.com` or
- # `my-service-account@my-project.iam.gserviceaccount.com`.
- #
- # The member must be a Google Account or a service account. Other types of
- # members are not supported.
"permission": "A String", # Required. The IAM permission to check for the specified member and resource.
#
# For a complete list of IAM permissions, see
@@ -109,6 +102,13 @@
#
# For examples of full resource names for Google Cloud services, see
# https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
+ "principal": "A String", # Required. The member, or principal, whose access you want to check, in the form of
+ # the email address that represents that member. For example,
+ # `alice@example.com` or
+ # `my-service-account@my-project.iam.gserviceaccount.com`.
+ #
+ # The member must be a Google Account or a service account. Other types of
+ # members are not supported.
},
}
@@ -133,6 +133,11 @@
# https://cloud.google.com/iam/help/resource-hierarchy.
{ # Details about how a specific IAM Policy contributed
# to the access check.
+ "relevance": "A String", # The relevance of this policy to the overall determination in the
+ # TroubleshootIamPolicyResponse.
+ #
+ # If the sender of the request does not have access to the policy, this field
+ # is omitted.
"access": "A String", # Indicates whether _this policy_ provides the specified permission to the
# specified member for the specified resource.
#
@@ -141,118 +146,6 @@
# this policy. To determine whether the member actually has the permission,
# use the `access` field in the
# TroubleshootIamPolicyResponse.
- "relevance": "A String", # The relevance of this policy to the overall determination in the
- # TroubleshootIamPolicyResponse.
- #
- # If the sender of the request does not have access to the policy, this field
- # is omitted.
- "fullResourceName": "A String", # The full resource name that identifies the resource. For example,
- # `//compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance`.
- #
- # If the sender of the request does not have access to the policy, this field
- # is omitted.
- #
- # For examples of full resource names for Google Cloud services, see
- # https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
- "bindingExplanations": [ # Details about how each binding in the policy affects the member's ability,
- # or inability, to use the permission for the resource.
- #
- # If the sender of the request does not have access to the policy, this field
- # is omitted.
- { # Details about how a binding in a policy affects a member's ability to use a
- # permission.
- "role": "A String", # The role that this binding grants. For example,
- # `roles/compute.serviceAgent`.
- #
- # For a complete list of predefined IAM roles, as well as the permissions in
- # each role, see https://cloud.google.com/iam/help/roles/reference.
- "rolePermission": "A String", # Indicates whether the role granted by this binding contains the specified
- # permission.
- "condition": { # Represents a textual expression in the Common Expression Language (CEL) # A condition expression that prevents access unless the expression evaluates
- # to `true`.
- #
- # To learn about IAM Conditions, see
- # http://cloud.google.com/iam/help/conditions/overview.
- # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
- # are documented at https://github.com/google/cel-spec.
- #
- # Example (Comparison):
- #
- # title: "Summary size limit"
- # description: "Determines if a summary is less than 100 chars"
- # expression: "document.summary.size() < 100"
- #
- # Example (Equality):
- #
- # title: "Requestor is owner"
- # description: "Determines if requestor is the document owner"
- # expression: "document.owner == request.auth.claims.email"
- #
- # Example (Logic):
- #
- # title: "Public documents"
- # description: "Determine whether the document should be publicly visible"
- # expression: "document.type != 'private' && document.type != 'internal'"
- #
- # Example (Data Manipulation):
- #
- # title: "Notification string"
- # description: "Create a notification string with a timestamp."
- # expression: "'New message received at ' + string(document.create_time)"
- #
- # The exact variables and functions that may be referenced within an expression
- # are determined by the service that evaluates it. See the service
- # documentation for additional information.
- "location": "A String", # Optional. String indicating the location of the expression for error
- # reporting, e.g. a file name and a position in the file.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "title": "A String", # Optional. Title for the expression, i.e. a short string describing
- # its purpose. This can be used e.g. in UIs which allow to enter the
- # expression.
- },
- "rolePermissionRelevance": "A String", # The relevance of the permission's existence, or nonexistence, in the role
- # to the overall determination for the entire policy.
- "memberships": { # Indicates whether each member in the binding includes the member specified
- # in the request, either directly or indirectly. Each key identifies a member
- # in the binding, and each value indicates whether the member in the binding
- # includes the member in the request.
- #
- # For example, suppose that a binding includes the following members:
- #
- # * `user:alice@example.com`
- # * `group:product-eng@example.com`
- #
- # You want to troubleshoot access for `user:bob@example.com`. This user is a
- # member of the group `group:product-eng@example.com`.
- #
- # For the first member in the binding, the key is `user:alice@example.com`,
- # and the `membership` field in the value is set to
- # `MEMBERSHIP_NOT_INCLUDED`.
- #
- # For the second member in the binding, the key is
- # `group:product-eng@example.com`, and the `membership` field in the value is
- # set to `MEMBERSHIP_INCLUDED`.
- "a_key": { # Details about whether the binding includes the member.
- "relevance": "A String", # The relevance of the member's status to the overall determination for the
- # binding.
- "membership": "A String", # Indicates whether the binding includes the member.
- },
- },
- "access": "A String", # Indicates whether _this binding_ provides the specified permission to the
- # specified member for the specified resource.
- #
- # This field does _not_ indicate whether the member actually has the
- # permission for the resource. There might be another binding that overrides
- # this binding. To determine whether the member actually has the permission,
- # use the `access` field in the
- # TroubleshootIamPolicyResponse.
- "relevance": "A String", # The relevance of this binding to the overall determination for the entire
- # policy.
- },
- ],
"policy": { # An Identity and Access Management (IAM) policy, which specifies access # The IAM policy attached to the resource.
#
# If the sender of the request does not have access to the policy, this field
@@ -335,10 +228,97 @@
# whenever you call `setIamPolicy`. If you omit this field, then IAM allows
# you to overwrite a version `3` policy with a version `1` policy, and all of
# the conditions in the version `3` policy are lost.
+ "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
+ { # Specifies the audit configuration for a service.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
+ # An AuditConfig must have one or more AuditLogConfigs.
+ #
+ # If there are AuditConfigs for both `allServices` and a specific service,
+ # the union of the two AuditConfigs is used for that service: the log_types
+ # specified in each AuditConfig are enabled, and the exempted_members in each
+ # AuditLogConfig are exempted.
+ #
+ # Example Policy with multiple AuditConfigs:
+ #
+ # {
+ # "audit_configs": [
+ # {
+ # "service": "allServices",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # },
+ # {
+ # "log_type": "ADMIN_READ"
+ # }
+ # ]
+ # },
+ # {
+ # "service": "sampleservice.googleapis.com",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ"
+ # },
+ # {
+ # "log_type": "DATA_WRITE",
+ # "exempted_members": [
+ # "user:aliya@example.com"
+ # ]
+ # }
+ # ]
+ # }
+ # ]
+ # }
+ #
+ # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+ # logging. It also exempts jose@example.com from DATA_READ logging, and
+ # aliya@example.com from DATA_WRITE logging.
+ "service": "A String", # Specifies a service that will be enabled for audit logging.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+ # `allServices` is a special value that covers all services.
+ "auditLogConfigs": [ # The configuration for logging of each type of permission.
+ { # Provides the configuration for logging a type of permissions.
+ # Example:
+ #
+ # {
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # }
+ # ]
+ # }
+ #
+ # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
+ # jose@example.com from DATA_READ logging.
+ "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
+ # permission.
+ # Follows the same format of Binding.members.
+ "A String",
+ ],
+ "logType": "A String", # The log type that this config enables.
+ },
+ ],
+ },
+ ],
"bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
+ "role": "A String", # Role that is assigned to `members`.
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
#
# If the condition evaluates to `true`, then this binding applies to the
@@ -383,13 +363,13 @@
# documentation for additional information.
"location": "A String", # Optional. String indicating the location of the expression for error
# reporting, e.g. a file name and a position in the file.
+ "title": "A String", # Optional. Title for the expression, i.e. a short string describing
+ # its purpose. This can be used e.g. in UIs which allow to enter the
+ # expression.
"expression": "A String", # Textual representation of an expression in Common Expression Language
# syntax.
"description": "A String", # Optional. Description of the expression. This is a longer text which
# describes the expression, e.g. when hovered over it in a UI.
- "title": "A String", # Optional. Title for the expression, i.e. a short string describing
- # its purpose. This can be used e.g. in UIs which allow to enter the
- # expression.
},
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
@@ -436,8 +416,6 @@
#
"A String",
],
- "role": "A String", # Role that is assigned to `members`.
- # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
},
],
"version": 42, # Specifies the format of the policy.
@@ -464,92 +442,114 @@
#
# To learn which resources support conditions in their IAM policies, see the
# [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
- { # Specifies the audit configuration for a service.
- # The configuration determines which permission types are logged, and what
- # identities, if any, are exempted from logging.
- # An AuditConfig must have one or more AuditLogConfigs.
- #
- # If there are AuditConfigs for both `allServices` and a specific service,
- # the union of the two AuditConfigs is used for that service: the log_types
- # specified in each AuditConfig are enabled, and the exempted_members in each
- # AuditLogConfig are exempted.
- #
- # Example Policy with multiple AuditConfigs:
- #
- # {
- # "audit_configs": [
- # {
- # "service": "allServices"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # },
- # {
- # "log_type": "ADMIN_READ",
- # }
- # ]
- # },
- # {
- # "service": "sampleservice.googleapis.com"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # },
- # {
- # "log_type": "DATA_WRITE",
- # "exempted_members": [
- # "user:aliya@example.com"
- # ]
- # }
- # ]
- # }
- # ]
- # }
- #
- # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
- # logging. It also exempts jose@example.com from DATA_READ logging, and
- # aliya@example.com from DATA_WRITE logging.
- "auditLogConfigs": [ # The configuration for logging of each type of permission.
- { # Provides the configuration for logging a type of permissions.
- # Example:
- #
- # {
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # }
- # ]
- # }
- #
- # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
- # jose@example.com from DATA_READ logging.
- "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
- # permission.
- # Follows the same format of Binding.members.
- "A String",
- ],
- "logType": "A String", # The log type that this config enables.
- },
- ],
- "service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
- # `allServices` is a special value that covers all services.
- },
- ],
},
+ "bindingExplanations": [ # Details about how each binding in the policy affects the member's ability,
+ # or inability, to use the permission for the resource.
+ #
+ # If the sender of the request does not have access to the policy, this field
+ # is omitted.
+ { # Details about how a binding in a policy affects a member's ability to use a
+ # permission.
+ "rolePermissionRelevance": "A String", # The relevance of the permission's existence, or nonexistence, in the role
+ # to the overall determination for the entire policy.
+ "role": "A String", # The role that this binding grants. For example,
+ # `roles/compute.serviceAgent`.
+ #
+ # For a complete list of predefined IAM roles, as well as the permissions in
+ # each role, see https://cloud.google.com/iam/help/roles/reference.
+ "access": "A String", # Indicates whether _this binding_ provides the specified permission to the
+ # specified member for the specified resource.
+ #
+ # This field does _not_ indicate whether the member actually has the
+ # permission for the resource. There might be another binding that overrides
+ # this binding. To determine whether the member actually has the permission,
+ # use the `access` field in the
+ # TroubleshootIamPolicyResponse.
+ "condition": { # Represents a textual expression in the Common Expression Language (CEL) # A condition expression that prevents access unless the expression evaluates
+ # to `true`.
+ #
+ # To learn about IAM Conditions, see
+ # http://cloud.google.com/iam/help/conditions/overview.
+ # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
+ # are documented at https://github.com/google/cel-spec.
+ #
+ # Example (Comparison):
+ #
+ # title: "Summary size limit"
+ # description: "Determines if a summary is less than 100 chars"
+ # expression: "document.summary.size() < 100"
+ #
+ # Example (Equality):
+ #
+ # title: "Requestor is owner"
+ # description: "Determines if requestor is the document owner"
+ # expression: "document.owner == request.auth.claims.email"
+ #
+ # Example (Logic):
+ #
+ # title: "Public documents"
+ # description: "Determine whether the document should be publicly visible"
+ # expression: "document.type != 'private' && document.type != 'internal'"
+ #
+ # Example (Data Manipulation):
+ #
+ # title: "Notification string"
+ # description: "Create a notification string with a timestamp."
+ # expression: "'New message received at ' + string(document.create_time)"
+ #
+ # The exact variables and functions that may be referenced within an expression
+ # are determined by the service that evaluates it. See the service
+ # documentation for additional information.
+ "location": "A String", # Optional. String indicating the location of the expression for error
+ # reporting, e.g. a file name and a position in the file.
+ "title": "A String", # Optional. Title for the expression, i.e. a short string describing
+ # its purpose. This can be used e.g. in UIs which allow to enter the
+ # expression.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
+ },
+ "relevance": "A String", # The relevance of this binding to the overall determination for the entire
+ # policy.
+ "memberships": { # Indicates whether each member in the binding includes the member specified
+ # in the request, either directly or indirectly. Each key identifies a member
+ # in the binding, and each value indicates whether the member in the binding
+ # includes the member in the request.
+ #
+ # For example, suppose that a binding includes the following members:
+ #
+ # * `user:alice@example.com`
+ # * `group:product-eng@example.com`
+ #
+ # You want to troubleshoot access for `user:bob@example.com`. This user is a
+ # member of the group `group:product-eng@example.com`.
+ #
+ # For the first member in the binding, the key is `user:alice@example.com`,
+ # and the `membership` field in the value is set to
+ # `MEMBERSHIP_NOT_INCLUDED`.
+ #
+ # For the second member in the binding, the key is
+ # `group:product-eng@example.com`, and the `membership` field in the value is
+ # set to `MEMBERSHIP_INCLUDED`.
+ "a_key": { # Details about whether the binding includes the member.
+ "relevance": "A String", # The relevance of the member's status to the overall determination for the
+ # binding.
+ "membership": "A String", # Indicates whether the binding includes the member.
+ },
+ },
+ "rolePermission": "A String", # Indicates whether the role granted by this binding contains the specified
+ # permission.
+ },
+ ],
+ "fullResourceName": "A String", # The full resource name that identifies the resource. For example,
+ # `//compute.googleapis.com/projects/my-project/zones/us-central1-a/instances/my-instance`.
+ #
+ # If the sender of the request does not have access to the policy, this field
+ # is omitted.
+ #
+ # For examples of full resource names for Google Cloud services, see
+ # https://cloud.google.com/iam/help/troubleshooter/full-resource-names.
},
],
"access": "A String", # Indicates whether the member has the specified permission for the specified