docs: update generated docs (#981)
diff --git a/docs/dyn/secretmanager_v1.projects.secrets.html b/docs/dyn/secretmanager_v1.projects.secrets.html
index 383fad4..c1fb308 100644
--- a/docs/dyn/secretmanager_v1.projects.secrets.html
+++ b/docs/dyn/secretmanager_v1.projects.secrets.html
@@ -95,7 +95,7 @@
<code><a href="#getIamPolicy">getIamPolicy(resource, options_requestedPolicyVersion=None, x__xgafv=None)</a></code></p>
<p class="firstline">Gets the access control policy for a secret.</p>
<p class="toc_element">
- <code><a href="#list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</a></code></p>
+ <code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
<p class="firstline">Lists Secrets.</p>
<p class="toc_element">
<code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
@@ -140,13 +140,13 @@
"destroyTime": "A String", # Output only. The time this SecretVersion was destroyed.
# Only present if state is
# DESTROYED.
- "createTime": "A String", # Output only. The time at which the SecretVersion was created.
- "state": "A String", # Output only. The current state of the SecretVersion.
"name": "A String", # Output only. The resource name of the SecretVersion in the
# format `projects/*/secrets/*/versions/*`.
#
# SecretVersion IDs in a Secret start at 1 and
# are incremented for each subsequent version of the secret.
+ "createTime": "A String", # Output only. The time at which the SecretVersion was created.
+ "state": "A String", # Output only. The current state of the SecretVersion.
}</pre>
</div>
@@ -161,44 +161,44 @@
The object takes the form of:
{ # A Secret is a logical secret whose value and versions can
- # be accessed.
- #
- # A Secret is made up of zero or more SecretVersions that
- # represent the secret data.
- "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
- "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ # be accessed.
#
- # The replication policy cannot be changed after the Secret has been created.
- "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
- # locations specified in Secret.replication.user_managed.replicas
- "replicas": [ # Required. The list of Replicas for this Secret.
- #
- # Cannot be empty.
- { # Represents a Replica for this Secret.
- "location": "A String", # The canonical IDs of the location to replicate data.
- # For example: `"us-east1"`.
- },
- ],
+ # A Secret is made up of zero or more SecretVersions that
+ # represent the secret data.
+ "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+ "createTime": "A String", # Output only. The time at which the Secret was created.
+ "labels": { # The labels assigned to this Secret.
+ #
+ # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+ # of maximum 128 bytes, and must conform to the following PCRE regular
+ # expression: `\p{Ll}\p{Lo}{0,62}`
+ #
+ # Label values must be between 0 and 63 characters long, have a UTF-8
+ # encoding of maximum 128 bytes, and must conform to the following PCRE
+ # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+ #
+ # No more than 64 labels can be assigned to a given resource.
+ "a_key": "A String",
},
- "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
- # restrictions.
+ "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ #
+ # The replication policy cannot be changed after the Secret has been created.
+ "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+ # restrictions.
+ },
+ "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+ # locations specified in Secret.replication.user_managed.replicas
+ "replicas": [ # Required. The list of Replicas for this Secret.
+ #
+ # Cannot be empty.
+ { # Represents a Replica for this Secret.
+ "location": "A String", # The canonical IDs of the location to replicate data.
+ # For example: `"us-east1"`.
+ },
+ ],
+ },
},
- },
- "createTime": "A String", # Output only. The time at which the Secret was created.
- "labels": { # The labels assigned to this Secret.
- #
- # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
- # of maximum 128 bytes, and must conform to the following PCRE regular
- # expression: `\p{Ll}\p{Lo}{0,62}`
- #
- # Label values must be between 0 and 63 characters long, have a UTF-8
- # encoding of maximum 128 bytes, and must conform to the following PCRE
- # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
- #
- # No more than 64 labels can be assigned to a given resource.
- "a_key": "A String",
- },
-}
+ }
secretId: string, Required. This must be unique within the project.
@@ -214,44 +214,44 @@
An object of the form:
{ # A Secret is a logical secret whose value and versions can
- # be accessed.
- #
- # A Secret is made up of zero or more SecretVersions that
- # represent the secret data.
- "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
- "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ # be accessed.
#
- # The replication policy cannot be changed after the Secret has been created.
- "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
- # locations specified in Secret.replication.user_managed.replicas
- "replicas": [ # Required. The list of Replicas for this Secret.
- #
- # Cannot be empty.
- { # Represents a Replica for this Secret.
- "location": "A String", # The canonical IDs of the location to replicate data.
- # For example: `"us-east1"`.
- },
- ],
+ # A Secret is made up of zero or more SecretVersions that
+ # represent the secret data.
+ "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+ "createTime": "A String", # Output only. The time at which the Secret was created.
+ "labels": { # The labels assigned to this Secret.
+ #
+ # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+ # of maximum 128 bytes, and must conform to the following PCRE regular
+ # expression: `\p{Ll}\p{Lo}{0,62}`
+ #
+ # Label values must be between 0 and 63 characters long, have a UTF-8
+ # encoding of maximum 128 bytes, and must conform to the following PCRE
+ # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+ #
+ # No more than 64 labels can be assigned to a given resource.
+ "a_key": "A String",
},
- "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
- # restrictions.
+ "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ #
+ # The replication policy cannot be changed after the Secret has been created.
+ "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+ # restrictions.
+ },
+ "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+ # locations specified in Secret.replication.user_managed.replicas
+ "replicas": [ # Required. The list of Replicas for this Secret.
+ #
+ # Cannot be empty.
+ { # Represents a Replica for this Secret.
+ "location": "A String", # The canonical IDs of the location to replicate data.
+ # For example: `"us-east1"`.
+ },
+ ],
+ },
},
- },
- "createTime": "A String", # Output only. The time at which the Secret was created.
- "labels": { # The labels assigned to this Secret.
- #
- # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
- # of maximum 128 bytes, and must conform to the following PCRE regular
- # expression: `\p{Ll}\p{Lo}{0,62}`
- #
- # Label values must be between 0 and 63 characters long, have a UTF-8
- # encoding of maximum 128 bytes, and must conform to the following PCRE
- # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
- #
- # No more than 64 labels can be assigned to a given resource.
- "a_key": "A String",
- },
- }</pre>
+ }</pre>
</div>
<div class="method">
@@ -296,44 +296,44 @@
An object of the form:
{ # A Secret is a logical secret whose value and versions can
- # be accessed.
- #
- # A Secret is made up of zero or more SecretVersions that
- # represent the secret data.
- "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
- "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ # be accessed.
#
- # The replication policy cannot be changed after the Secret has been created.
- "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
- # locations specified in Secret.replication.user_managed.replicas
- "replicas": [ # Required. The list of Replicas for this Secret.
- #
- # Cannot be empty.
- { # Represents a Replica for this Secret.
- "location": "A String", # The canonical IDs of the location to replicate data.
- # For example: `"us-east1"`.
- },
- ],
+ # A Secret is made up of zero or more SecretVersions that
+ # represent the secret data.
+ "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+ "createTime": "A String", # Output only. The time at which the Secret was created.
+ "labels": { # The labels assigned to this Secret.
+ #
+ # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+ # of maximum 128 bytes, and must conform to the following PCRE regular
+ # expression: `\p{Ll}\p{Lo}{0,62}`
+ #
+ # Label values must be between 0 and 63 characters long, have a UTF-8
+ # encoding of maximum 128 bytes, and must conform to the following PCRE
+ # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+ #
+ # No more than 64 labels can be assigned to a given resource.
+ "a_key": "A String",
},
- "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
- # restrictions.
+ "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ #
+ # The replication policy cannot be changed after the Secret has been created.
+ "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+ # restrictions.
+ },
+ "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+ # locations specified in Secret.replication.user_managed.replicas
+ "replicas": [ # Required. The list of Replicas for this Secret.
+ #
+ # Cannot be empty.
+ { # Represents a Replica for this Secret.
+ "location": "A String", # The canonical IDs of the location to replicate data.
+ # For example: `"us-east1"`.
+ },
+ ],
+ },
},
- },
- "createTime": "A String", # Output only. The time at which the Secret was created.
- "labels": { # The labels assigned to this Secret.
- #
- # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
- # of maximum 128 bytes, and must conform to the following PCRE regular
- # expression: `\p{Ll}\p{Lo}{0,62}`
- #
- # Label values must be between 0 and 63 characters long, have a UTF-8
- # encoding of maximum 128 bytes, and must conform to the following PCRE
- # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
- #
- # No more than 64 labels can be assigned to a given resource.
- "a_key": "A String",
- },
- }</pre>
+ }</pre>
</div>
<div class="method">
@@ -431,12 +431,131 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
+ { # Specifies the audit configuration for a service.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
+ # An AuditConfig must have one or more AuditLogConfigs.
+ #
+ # If there are AuditConfigs for both `allServices` and a specific service,
+ # the union of the two AuditConfigs is used for that service: the log_types
+ # specified in each AuditConfig are enabled, and the exempted_members in each
+ # AuditLogConfig are exempted.
+ #
+ # Example Policy with multiple AuditConfigs:
+ #
+ # {
+ # "audit_configs": [
+ # {
+ # "service": "allServices",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # },
+ # {
+ # "log_type": "ADMIN_READ"
+ # }
+ # ]
+ # },
+ # {
+ # "service": "sampleservice.googleapis.com",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ"
+ # },
+ # {
+ # "log_type": "DATA_WRITE",
+ # "exempted_members": [
+ # "user:aliya@example.com"
+ # ]
+ # }
+ # ]
+ # }
+ # ]
+ # }
+ #
+ # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+ # logging. It also exempts jose@example.com from DATA_READ logging, and
+ # aliya@example.com from DATA_WRITE logging.
+ "service": "A String", # Specifies a service that will be enabled for audit logging.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+ # `allServices` is a special value that covers all services.
+ "auditLogConfigs": [ # The configuration for logging of each type of permission.
+ { # Provides the configuration for logging a type of permissions.
+ # Example:
+ #
+ # {
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # }
+ # ]
+ # }
+ #
+ # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
+ # jose@example.com from DATA_READ logging.
+ "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
+ # permission.
+ # Follows the same format of Binding.members.
+ "A String",
+ ],
+ "logType": "A String", # The log type that this config enables.
+ },
+ ],
+ },
+ ],
+ "version": 42, # Specifies the format of the policy.
+ #
+ # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+ # are rejected.
+ #
+ # Any operation that affects conditional role bindings must specify version
+ # `3`. This requirement applies to the following operations:
+ #
+ # * Getting a policy that includes a conditional role binding
+ # * Adding a conditional role binding to a policy
+ # * Changing a conditional role binding in a policy
+ # * Removing any role binding, with or without a condition, from a policy
+ # that includes conditions
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
+ #
+ # If a policy does not include any conditions, operations on that policy may
+ # specify any valid version or leave the field unset.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
"bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
- "role": "A String", # Role that is assigned to `members`.
- # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
#
# If the condition evaluates to `true`, then this binding applies to the
@@ -479,15 +598,15 @@
# The exact variables and functions that may be referenced within an expression
# are determined by the service that evaluates it. See the service
# documentation for additional information.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
"title": "A String", # Optional. Title for the expression, i.e. a short string describing
# its purpose. This can be used e.g. in UIs which allow to enter the
# expression.
"location": "A String", # Optional. String indicating the location of the expression for error
# reporting, e.g. a file name and a position in the file.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
},
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
@@ -534,144 +653,25 @@
#
"A String",
],
- },
- ],
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- "version": 42, # Specifies the format of the policy.
- #
- # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
- # are rejected.
- #
- # Any operation that affects conditional role bindings must specify version
- # `3`. This requirement applies to the following operations:
- #
- # * Getting a policy that includes a conditional role binding
- # * Adding a conditional role binding to a policy
- # * Changing a conditional role binding in a policy
- # * Removing any role binding, with or without a condition, from a policy
- # that includes conditions
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- #
- # If a policy does not include any conditions, operations on that policy may
- # specify any valid version or leave the field unset.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
- { # Specifies the audit configuration for a service.
- # The configuration determines which permission types are logged, and what
- # identities, if any, are exempted from logging.
- # An AuditConfig must have one or more AuditLogConfigs.
- #
- # If there are AuditConfigs for both `allServices` and a specific service,
- # the union of the two AuditConfigs is used for that service: the log_types
- # specified in each AuditConfig are enabled, and the exempted_members in each
- # AuditLogConfig are exempted.
- #
- # Example Policy with multiple AuditConfigs:
- #
- # {
- # "audit_configs": [
- # {
- # "service": "allServices"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # },
- # {
- # "log_type": "ADMIN_READ",
- # }
- # ]
- # },
- # {
- # "service": "sampleservice.googleapis.com"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # },
- # {
- # "log_type": "DATA_WRITE",
- # "exempted_members": [
- # "user:aliya@example.com"
- # ]
- # }
- # ]
- # }
- # ]
- # }
- #
- # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
- # logging. It also exempts jose@example.com from DATA_READ logging, and
- # aliya@example.com from DATA_WRITE logging.
- "service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
- # `allServices` is a special value that covers all services.
- "auditLogConfigs": [ # The configuration for logging of each type of permission.
- { # Provides the configuration for logging a type of permissions.
- # Example:
- #
- # {
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # }
- # ]
- # }
- #
- # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
- # jose@example.com from DATA_READ logging.
- "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
- # permission.
- # Follows the same format of Binding.members.
- "A String",
- ],
- "logType": "A String", # The log type that this config enables.
- },
- ],
+ "role": "A String", # Role that is assigned to `members`.
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
},
],
}</pre>
</div>
<div class="method">
- <code class="details" id="list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</code>
+ <code class="details" id="list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</code>
<pre>Lists Secrets.
Args:
parent: string, Required. The resource name of the project associated with the
Secrets, in the format `projects/*`. (required)
- pageToken: string, Optional. Pagination token, returned earlier via
-ListSecretsResponse.next_page_token.
pageSize: integer, Optional. The maximum number of results to be returned in a single page. If
set to 0, the server decides the number of results to return. If the
number is greater than 25000, it is capped at 25000.
+ pageToken: string, Optional. Pagination token, returned earlier via
+ListSecretsResponse.next_page_token.
x__xgafv: string, V1 error format.
Allowed values
1 - v1 error format
@@ -681,51 +681,51 @@
An object of the form:
{ # Response message for SecretManagerService.ListSecrets.
+ "totalSize": 42, # The total number of Secrets.
+ "nextPageToken": "A String", # A token to retrieve the next page of results. Pass this value in
+ # ListSecretsRequest.page_token to retrieve the next page.
"secrets": [ # The list of Secrets sorted in reverse by create_time (newest
# first).
{ # A Secret is a logical secret whose value and versions can
- # be accessed.
- #
- # A Secret is made up of zero or more SecretVersions that
- # represent the secret data.
- "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
- "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ # be accessed.
#
- # The replication policy cannot be changed after the Secret has been created.
- "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
- # locations specified in Secret.replication.user_managed.replicas
- "replicas": [ # Required. The list of Replicas for this Secret.
- #
- # Cannot be empty.
- { # Represents a Replica for this Secret.
- "location": "A String", # The canonical IDs of the location to replicate data.
- # For example: `"us-east1"`.
- },
- ],
+ # A Secret is made up of zero or more SecretVersions that
+ # represent the secret data.
+ "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+ "createTime": "A String", # Output only. The time at which the Secret was created.
+ "labels": { # The labels assigned to this Secret.
+ #
+ # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+ # of maximum 128 bytes, and must conform to the following PCRE regular
+ # expression: `\p{Ll}\p{Lo}{0,62}`
+ #
+ # Label values must be between 0 and 63 characters long, have a UTF-8
+ # encoding of maximum 128 bytes, and must conform to the following PCRE
+ # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+ #
+ # No more than 64 labels can be assigned to a given resource.
+ "a_key": "A String",
},
- "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
- # restrictions.
+ "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ #
+ # The replication policy cannot be changed after the Secret has been created.
+ "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+ # restrictions.
+ },
+ "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+ # locations specified in Secret.replication.user_managed.replicas
+ "replicas": [ # Required. The list of Replicas for this Secret.
+ #
+ # Cannot be empty.
+ { # Represents a Replica for this Secret.
+ "location": "A String", # The canonical IDs of the location to replicate data.
+ # For example: `"us-east1"`.
+ },
+ ],
+ },
},
},
- "createTime": "A String", # Output only. The time at which the Secret was created.
- "labels": { # The labels assigned to this Secret.
- #
- # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
- # of maximum 128 bytes, and must conform to the following PCRE regular
- # expression: `\p{Ll}\p{Lo}{0,62}`
- #
- # Label values must be between 0 and 63 characters long, have a UTF-8
- # encoding of maximum 128 bytes, and must conform to the following PCRE
- # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
- #
- # No more than 64 labels can be assigned to a given resource.
- "a_key": "A String",
- },
- },
],
- "nextPageToken": "A String", # A token to retrieve the next page of results. Pass this value in
- # ListSecretsRequest.page_token to retrieve the next page.
- "totalSize": 42, # The total number of Secrets.
}</pre>
</div>
@@ -753,63 +753,31 @@
The object takes the form of:
{ # A Secret is a logical secret whose value and versions can
- # be accessed.
- #
- # A Secret is made up of zero or more SecretVersions that
- # represent the secret data.
- "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
- "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
- #
- # The replication policy cannot be changed after the Secret has been created.
- "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
- # locations specified in Secret.replication.user_managed.replicas
- "replicas": [ # Required. The list of Replicas for this Secret.
- #
- # Cannot be empty.
- { # Represents a Replica for this Secret.
- "location": "A String", # The canonical IDs of the location to replicate data.
- # For example: `"us-east1"`.
- },
- ],
- },
- "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
- # restrictions.
- },
- },
- "createTime": "A String", # Output only. The time at which the Secret was created.
- "labels": { # The labels assigned to this Secret.
- #
- # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
- # of maximum 128 bytes, and must conform to the following PCRE regular
- # expression: `\p{Ll}\p{Lo}{0,62}`
- #
- # Label values must be between 0 and 63 characters long, have a UTF-8
- # encoding of maximum 128 bytes, and must conform to the following PCRE
- # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
- #
- # No more than 64 labels can be assigned to a given resource.
- "a_key": "A String",
- },
-}
-
- updateMask: string, Required. Specifies the fields to be updated.
- x__xgafv: string, V1 error format.
- Allowed values
- 1 - v1 error format
- 2 - v2 error format
-
-Returns:
- An object of the form:
-
- { # A Secret is a logical secret whose value and versions can
# be accessed.
- #
+ #
# A Secret is made up of zero or more SecretVersions that
# represent the secret data.
"name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+ "createTime": "A String", # Output only. The time at which the Secret was created.
+ "labels": { # The labels assigned to this Secret.
+ #
+ # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+ # of maximum 128 bytes, and must conform to the following PCRE regular
+ # expression: `\p{Ll}\p{Lo}{0,62}`
+ #
+ # Label values must be between 0 and 63 characters long, have a UTF-8
+ # encoding of maximum 128 bytes, and must conform to the following PCRE
+ # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+ #
+ # No more than 64 labels can be assigned to a given resource.
+ "a_key": "A String",
+ },
"replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
- #
+ #
# The replication policy cannot be changed after the Secret has been created.
+ "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+ # restrictions.
+ },
"userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
# locations specified in Secret.replication.user_managed.replicas
"replicas": [ # Required. The list of Replicas for this Secret.
@@ -821,25 +789,57 @@
},
],
},
- "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
- # restrictions.
+ },
+ }
+
+ updateMask: string, Required. Specifies the fields to be updated.
+ x__xgafv: string, V1 error format.
+ Allowed values
+ 1 - v1 error format
+ 2 - v2 error format
+
+Returns:
+ An object of the form:
+
+ { # A Secret is a logical secret whose value and versions can
+ # be accessed.
+ #
+ # A Secret is made up of zero or more SecretVersions that
+ # represent the secret data.
+ "name": "A String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
+ "createTime": "A String", # Output only. The time at which the Secret was created.
+ "labels": { # The labels assigned to this Secret.
+ #
+ # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
+ # of maximum 128 bytes, and must conform to the following PCRE regular
+ # expression: `\p{Ll}\p{Lo}{0,62}`
+ #
+ # Label values must be between 0 and 63 characters long, have a UTF-8
+ # encoding of maximum 128 bytes, and must conform to the following PCRE
+ # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
+ #
+ # No more than 64 labels can be assigned to a given resource.
+ "a_key": "A String",
},
- },
- "createTime": "A String", # Output only. The time at which the Secret was created.
- "labels": { # The labels assigned to this Secret.
- #
- # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
- # of maximum 128 bytes, and must conform to the following PCRE regular
- # expression: `\p{Ll}\p{Lo}{0,62}`
- #
- # Label values must be between 0 and 63 characters long, have a UTF-8
- # encoding of maximum 128 bytes, and must conform to the following PCRE
- # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
- #
- # No more than 64 labels can be assigned to a given resource.
- "a_key": "A String",
- },
- }</pre>
+ "replication": { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
+ #
+ # The replication policy cannot be changed after the Secret has been created.
+ "automatic": { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
+ # restrictions.
+ },
+ "userManaged": { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
+ # locations specified in Secret.replication.user_managed.replicas
+ "replicas": [ # Required. The list of Replicas for this Secret.
+ #
+ # Cannot be empty.
+ { # Represents a Replica for this Secret.
+ "location": "A String", # The canonical IDs of the location to replicate data.
+ # For example: `"us-east1"`.
+ },
+ ],
+ },
+ },
+ }</pre>
</div>
<div class="method">
@@ -927,12 +927,131 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
+ { # Specifies the audit configuration for a service.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
+ # An AuditConfig must have one or more AuditLogConfigs.
+ #
+ # If there are AuditConfigs for both `allServices` and a specific service,
+ # the union of the two AuditConfigs is used for that service: the log_types
+ # specified in each AuditConfig are enabled, and the exempted_members in each
+ # AuditLogConfig are exempted.
+ #
+ # Example Policy with multiple AuditConfigs:
+ #
+ # {
+ # "audit_configs": [
+ # {
+ # "service": "allServices",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # },
+ # {
+ # "log_type": "ADMIN_READ"
+ # }
+ # ]
+ # },
+ # {
+ # "service": "sampleservice.googleapis.com",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ"
+ # },
+ # {
+ # "log_type": "DATA_WRITE",
+ # "exempted_members": [
+ # "user:aliya@example.com"
+ # ]
+ # }
+ # ]
+ # }
+ # ]
+ # }
+ #
+ # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+ # logging. It also exempts jose@example.com from DATA_READ logging, and
+ # aliya@example.com from DATA_WRITE logging.
+ "service": "A String", # Specifies a service that will be enabled for audit logging.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+ # `allServices` is a special value that covers all services.
+ "auditLogConfigs": [ # The configuration for logging of each type of permission.
+ { # Provides the configuration for logging a type of permissions.
+ # Example:
+ #
+ # {
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # }
+ # ]
+ # }
+ #
+ # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
+ # jose@example.com from DATA_READ logging.
+ "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
+ # permission.
+ # Follows the same format of Binding.members.
+ "A String",
+ ],
+ "logType": "A String", # The log type that this config enables.
+ },
+ ],
+ },
+ ],
+ "version": 42, # Specifies the format of the policy.
+ #
+ # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+ # are rejected.
+ #
+ # Any operation that affects conditional role bindings must specify version
+ # `3`. This requirement applies to the following operations:
+ #
+ # * Getting a policy that includes a conditional role binding
+ # * Adding a conditional role binding to a policy
+ # * Changing a conditional role binding in a policy
+ # * Removing any role binding, with or without a condition, from a policy
+ # that includes conditions
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
+ #
+ # If a policy does not include any conditions, operations on that policy may
+ # specify any valid version or leave the field unset.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
"bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
- "role": "A String", # Role that is assigned to `members`.
- # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
#
# If the condition evaluates to `true`, then this binding applies to the
@@ -975,15 +1094,15 @@
# The exact variables and functions that may be referenced within an expression
# are determined by the service that evaluates it. See the service
# documentation for additional information.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
"title": "A String", # Optional. Title for the expression, i.e. a short string describing
# its purpose. This can be used e.g. in UIs which allow to enter the
# expression.
"location": "A String", # Optional. String indicating the location of the expression for error
# reporting, e.g. a file name and a position in the file.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
},
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
@@ -1030,127 +1149,8 @@
#
"A String",
],
- },
- ],
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- "version": 42, # Specifies the format of the policy.
- #
- # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
- # are rejected.
- #
- # Any operation that affects conditional role bindings must specify version
- # `3`. This requirement applies to the following operations:
- #
- # * Getting a policy that includes a conditional role binding
- # * Adding a conditional role binding to a policy
- # * Changing a conditional role binding in a policy
- # * Removing any role binding, with or without a condition, from a policy
- # that includes conditions
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- #
- # If a policy does not include any conditions, operations on that policy may
- # specify any valid version or leave the field unset.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
- { # Specifies the audit configuration for a service.
- # The configuration determines which permission types are logged, and what
- # identities, if any, are exempted from logging.
- # An AuditConfig must have one or more AuditLogConfigs.
- #
- # If there are AuditConfigs for both `allServices` and a specific service,
- # the union of the two AuditConfigs is used for that service: the log_types
- # specified in each AuditConfig are enabled, and the exempted_members in each
- # AuditLogConfig are exempted.
- #
- # Example Policy with multiple AuditConfigs:
- #
- # {
- # "audit_configs": [
- # {
- # "service": "allServices"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # },
- # {
- # "log_type": "ADMIN_READ",
- # }
- # ]
- # },
- # {
- # "service": "sampleservice.googleapis.com"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # },
- # {
- # "log_type": "DATA_WRITE",
- # "exempted_members": [
- # "user:aliya@example.com"
- # ]
- # }
- # ]
- # }
- # ]
- # }
- #
- # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
- # logging. It also exempts jose@example.com from DATA_READ logging, and
- # aliya@example.com from DATA_WRITE logging.
- "service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
- # `allServices` is a special value that covers all services.
- "auditLogConfigs": [ # The configuration for logging of each type of permission.
- { # Provides the configuration for logging a type of permissions.
- # Example:
- #
- # {
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # }
- # ]
- # }
- #
- # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
- # jose@example.com from DATA_READ logging.
- "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
- # permission.
- # Follows the same format of Binding.members.
- "A String",
- ],
- "logType": "A String", # The log type that this config enables.
- },
- ],
+ "role": "A String", # Role that is assigned to `members`.
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
},
],
},
@@ -1236,12 +1236,131 @@
#
# For a description of IAM and its features, see the
# [IAM documentation](https://cloud.google.com/iam/docs/).
+ "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
+ { # Specifies the audit configuration for a service.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
+ # An AuditConfig must have one or more AuditLogConfigs.
+ #
+ # If there are AuditConfigs for both `allServices` and a specific service,
+ # the union of the two AuditConfigs is used for that service: the log_types
+ # specified in each AuditConfig are enabled, and the exempted_members in each
+ # AuditLogConfig are exempted.
+ #
+ # Example Policy with multiple AuditConfigs:
+ #
+ # {
+ # "audit_configs": [
+ # {
+ # "service": "allServices",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # },
+ # {
+ # "log_type": "ADMIN_READ"
+ # }
+ # ]
+ # },
+ # {
+ # "service": "sampleservice.googleapis.com",
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ"
+ # },
+ # {
+ # "log_type": "DATA_WRITE",
+ # "exempted_members": [
+ # "user:aliya@example.com"
+ # ]
+ # }
+ # ]
+ # }
+ # ]
+ # }
+ #
+ # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
+ # logging. It also exempts jose@example.com from DATA_READ logging, and
+ # aliya@example.com from DATA_WRITE logging.
+ "service": "A String", # Specifies a service that will be enabled for audit logging.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
+ # `allServices` is a special value that covers all services.
+ "auditLogConfigs": [ # The configuration for logging of each type of permission.
+ { # Provides the configuration for logging a type of permissions.
+ # Example:
+ #
+ # {
+ # "audit_log_configs": [
+ # {
+ # "log_type": "DATA_READ",
+ # "exempted_members": [
+ # "user:jose@example.com"
+ # ]
+ # },
+ # {
+ # "log_type": "DATA_WRITE"
+ # }
+ # ]
+ # }
+ #
+ # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
+ # jose@example.com from DATA_READ logging.
+ "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
+ # permission.
+ # Follows the same format of Binding.members.
+ "A String",
+ ],
+ "logType": "A String", # The log type that this config enables.
+ },
+ ],
+ },
+ ],
+ "version": 42, # Specifies the format of the policy.
+ #
+ # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
+ # are rejected.
+ #
+ # Any operation that affects conditional role bindings must specify version
+ # `3`. This requirement applies to the following operations:
+ #
+ # * Getting a policy that includes a conditional role binding
+ # * Adding a conditional role binding to a policy
+ # * Changing a conditional role binding in a policy
+ # * Removing any role binding, with or without a condition, from a policy
+ # that includes conditions
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
+ #
+ # If a policy does not include any conditions, operations on that policy may
+ # specify any valid version or leave the field unset.
+ #
+ # To learn which resources support conditions in their IAM policies, see the
+ # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
+ "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
+ # prevent simultaneous updates of a policy from overwriting each other.
+ # It is strongly suggested that systems make use of the `etag` in the
+ # read-modify-write cycle to perform policy updates in order to avoid race
+ # conditions: An `etag` is returned in the response to `getIamPolicy`, and
+ # systems are expected to put that etag in the request to `setIamPolicy` to
+ # ensure that their change will be applied to the same version of the policy.
+ #
+ # **Important:** If you use IAM Conditions, you must include the `etag` field
+ # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
+ # you to overwrite a version `3` policy with a version `1` policy, and all of
+ # the conditions in the version `3` policy are lost.
"bindings": [ # Associates a list of `members` to a `role`. Optionally, may specify a
# `condition` that determines how and when the `bindings` are applied. Each
# of the `bindings` must contain at least one member.
{ # Associates `members` with a `role`.
- "role": "A String", # Role that is assigned to `members`.
- # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
"condition": { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
#
# If the condition evaluates to `true`, then this binding applies to the
@@ -1284,15 +1403,15 @@
# The exact variables and functions that may be referenced within an expression
# are determined by the service that evaluates it. See the service
# documentation for additional information.
+ "expression": "A String", # Textual representation of an expression in Common Expression Language
+ # syntax.
+ "description": "A String", # Optional. Description of the expression. This is a longer text which
+ # describes the expression, e.g. when hovered over it in a UI.
"title": "A String", # Optional. Title for the expression, i.e. a short string describing
# its purpose. This can be used e.g. in UIs which allow to enter the
# expression.
"location": "A String", # Optional. String indicating the location of the expression for error
# reporting, e.g. a file name and a position in the file.
- "description": "A String", # Optional. Description of the expression. This is a longer text which
- # describes the expression, e.g. when hovered over it in a UI.
- "expression": "A String", # Textual representation of an expression in Common Expression Language
- # syntax.
},
"members": [ # Specifies the identities requesting access for a Cloud Platform resource.
# `members` can have the following values:
@@ -1339,127 +1458,8 @@
#
"A String",
],
- },
- ],
- "etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
- # prevent simultaneous updates of a policy from overwriting each other.
- # It is strongly suggested that systems make use of the `etag` in the
- # read-modify-write cycle to perform policy updates in order to avoid race
- # conditions: An `etag` is returned in the response to `getIamPolicy`, and
- # systems are expected to put that etag in the request to `setIamPolicy` to
- # ensure that their change will be applied to the same version of the policy.
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- "version": 42, # Specifies the format of the policy.
- #
- # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
- # are rejected.
- #
- # Any operation that affects conditional role bindings must specify version
- # `3`. This requirement applies to the following operations:
- #
- # * Getting a policy that includes a conditional role binding
- # * Adding a conditional role binding to a policy
- # * Changing a conditional role binding in a policy
- # * Removing any role binding, with or without a condition, from a policy
- # that includes conditions
- #
- # **Important:** If you use IAM Conditions, you must include the `etag` field
- # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
- # you to overwrite a version `3` policy with a version `1` policy, and all of
- # the conditions in the version `3` policy are lost.
- #
- # If a policy does not include any conditions, operations on that policy may
- # specify any valid version or leave the field unset.
- #
- # To learn which resources support conditions in their IAM policies, see the
- # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
- "auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
- { # Specifies the audit configuration for a service.
- # The configuration determines which permission types are logged, and what
- # identities, if any, are exempted from logging.
- # An AuditConfig must have one or more AuditLogConfigs.
- #
- # If there are AuditConfigs for both `allServices` and a specific service,
- # the union of the two AuditConfigs is used for that service: the log_types
- # specified in each AuditConfig are enabled, and the exempted_members in each
- # AuditLogConfig are exempted.
- #
- # Example Policy with multiple AuditConfigs:
- #
- # {
- # "audit_configs": [
- # {
- # "service": "allServices"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # },
- # {
- # "log_type": "ADMIN_READ",
- # }
- # ]
- # },
- # {
- # "service": "sampleservice.googleapis.com"
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # },
- # {
- # "log_type": "DATA_WRITE",
- # "exempted_members": [
- # "user:aliya@example.com"
- # ]
- # }
- # ]
- # }
- # ]
- # }
- #
- # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
- # logging. It also exempts jose@example.com from DATA_READ logging, and
- # aliya@example.com from DATA_WRITE logging.
- "service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
- # `allServices` is a special value that covers all services.
- "auditLogConfigs": [ # The configuration for logging of each type of permission.
- { # Provides the configuration for logging a type of permissions.
- # Example:
- #
- # {
- # "audit_log_configs": [
- # {
- # "log_type": "DATA_READ",
- # "exempted_members": [
- # "user:jose@example.com"
- # ]
- # },
- # {
- # "log_type": "DATA_WRITE",
- # }
- # ]
- # }
- #
- # This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
- # jose@example.com from DATA_READ logging.
- "exemptedMembers": [ # Specifies the identities that do not cause logging for this type of
- # permission.
- # Follows the same format of Binding.members.
- "A String",
- ],
- "logType": "A String", # The log type that this config enables.
- },
- ],
+ "role": "A String", # Role that is assigned to `members`.
+ # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
},
],
}</pre>