blob: 66de141b84a2c545ad6f1820f9e779b6b98c53be [file] [log] [blame]
Bu Sun Kim65020912020-05-20 12:08:20 -07001<html><body>
2<style>
3
4body, h1, h2, h3, div, span, p, pre, a {
5 margin: 0;
6 padding: 0;
7 border: 0;
8 font-weight: inherit;
9 font-style: inherit;
10 font-size: 100%;
11 font-family: inherit;
12 vertical-align: baseline;
13}
14
15body {
16 font-size: 13px;
17 padding: 1em;
18}
19
20h1 {
21 font-size: 26px;
22 margin-bottom: 1em;
23}
24
25h2 {
26 font-size: 24px;
27 margin-bottom: 1em;
28}
29
30h3 {
31 font-size: 20px;
32 margin-bottom: 1em;
33 margin-top: 1em;
34}
35
36pre, code {
37 line-height: 1.5;
38 font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
39}
40
41pre {
42 margin-top: 0.5em;
43}
44
45h1, h2, h3, p {
46 font-family: Arial, sans serif;
47}
48
49h1, h2, h3 {
50 border-bottom: solid #CCC 1px;
51}
52
53.toc_element {
54 margin-top: 0.5em;
55}
56
57.firstline {
58 margin-left: 2 em;
59}
60
61.method {
62 margin-top: 1em;
63 border: solid 1px #CCC;
64 padding: 1em;
65 background: #EEE;
66}
67
68.details {
69 font-weight: bold;
70 font-size: 14px;
71}
72
73</style>
74
75<h1><a href="secretmanager_v1beta1.html">Secret Manager API</a> . <a href="secretmanager_v1beta1.projects.html">projects</a> . <a href="secretmanager_v1beta1.projects.secrets.html">secrets</a></h1>
76<h2>Instance Methods</h2>
77<p class="toc_element">
78 <code><a href="secretmanager_v1beta1.projects.secrets.versions.html">versions()</a></code>
79</p>
80<p class="firstline">Returns the versions Resource.</p>
81
82<p class="toc_element">
83 <code><a href="#addVersion">addVersion(parent, body=None, x__xgafv=None)</a></code></p>
84<p class="firstline">Creates a new SecretVersion containing secret data and attaches</p>
85<p class="toc_element">
86 <code><a href="#create">create(parent, body=None, secretId=None, x__xgafv=None)</a></code></p>
87<p class="firstline">Creates a new Secret containing no SecretVersions.</p>
88<p class="toc_element">
89 <code><a href="#delete">delete(name, x__xgafv=None)</a></code></p>
90<p class="firstline">Deletes a Secret.</p>
91<p class="toc_element">
92 <code><a href="#get">get(name, x__xgafv=None)</a></code></p>
93<p class="firstline">Gets metadata for a given Secret.</p>
94<p class="toc_element">
95 <code><a href="#getIamPolicy">getIamPolicy(resource, options_requestedPolicyVersion=None, x__xgafv=None)</a></code></p>
96<p class="firstline">Gets the access control policy for a secret.</p>
97<p class="toc_element">
98 <code><a href="#list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</a></code></p>
99<p class="firstline">Lists Secrets.</p>
100<p class="toc_element">
101 <code><a href="#list_next">list_next(previous_request, previous_response)</a></code></p>
102<p class="firstline">Retrieves the next page of results.</p>
103<p class="toc_element">
104 <code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
105<p class="firstline">Updates metadata of an existing Secret.</p>
106<p class="toc_element">
107 <code><a href="#setIamPolicy">setIamPolicy(resource, body=None, x__xgafv=None)</a></code></p>
108<p class="firstline">Sets the access control policy on the specified secret. Replaces any</p>
109<p class="toc_element">
110 <code><a href="#testIamPermissions">testIamPermissions(resource, body=None, x__xgafv=None)</a></code></p>
111<p class="firstline">Returns permissions that a caller has for the specified secret.</p>
112<h3>Method Details</h3>
113<div class="method">
114 <code class="details" id="addVersion">addVersion(parent, body=None, x__xgafv=None)</code>
115 <pre>Creates a new SecretVersion containing secret data and attaches
116it to an existing Secret.
117
118Args:
119 parent: string, Required. The resource name of the Secret to associate with the
120SecretVersion in the format `projects/*/secrets/*`. (required)
121 body: object, The request body.
122 The object takes the form of:
123
124{ # Request message for SecretManagerService.AddSecretVersion.
125 &quot;payload&quot;: { # A secret payload resource in the Secret Manager API. This contains the # Required. The secret payload of the SecretVersion.
126 # sensitive secret data that is associated with a SecretVersion.
127 &quot;data&quot;: &quot;A String&quot;, # The secret data. Must be no larger than 64KiB.
128 },
129 }
130
131 x__xgafv: string, V1 error format.
132 Allowed values
133 1 - v1 error format
134 2 - v2 error format
135
136Returns:
137 An object of the form:
138
139 { # A secret version resource in the Secret Manager API.
140 &quot;state&quot;: &quot;A String&quot;, # Output only. The current state of the SecretVersion.
141 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the SecretVersion in the
142 # format `projects/*/secrets/*/versions/*`.
143 #
144 # SecretVersion IDs in a Secret start at 1 and
145 # are incremented for each subsequent version of the secret.
146 &quot;destroyTime&quot;: &quot;A String&quot;, # Output only. The time this SecretVersion was destroyed.
147 # Only present if state is
148 # DESTROYED.
149 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the SecretVersion was created.
150 }</pre>
151</div>
152
153<div class="method">
154 <code class="details" id="create">create(parent, body=None, secretId=None, x__xgafv=None)</code>
155 <pre>Creates a new Secret containing no SecretVersions.
156
157Args:
158 parent: string, Required. The resource name of the project to associate with the
159Secret, in the format `projects/*`. (required)
160 body: object, The request body.
161 The object takes the form of:
162
163{ # A Secret is a logical secret whose value and versions can
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700164 # be accessed.
Bu Sun Kim65020912020-05-20 12:08:20 -0700165 #
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700166 # A Secret is made up of zero or more SecretVersions that
167 # represent the secret data.
168 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
169 &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
170 #
171 # The replication policy cannot be changed after the Secret has been created.
172 &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
173 # restrictions.
174 },
175 &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
176 # locations specified in Secret.replication.user_managed.replicas
177 &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
178 #
179 # Cannot be empty.
180 { # Represents a Replica for this Secret.
181 &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
182 # For example: `&quot;us-east1&quot;`.
183 },
184 ],
185 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700186 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700187 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
188 &quot;labels&quot;: { # The labels assigned to this Secret.
189 #
190 # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
191 # of maximum 128 bytes, and must conform to the following PCRE regular
192 # expression: `\p{Ll}\p{Lo}{0,62}`
193 #
194 # Label values must be between 0 and 63 characters long, have a UTF-8
195 # encoding of maximum 128 bytes, and must conform to the following PCRE
196 # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
197 #
198 # No more than 64 labels can be assigned to a given resource.
199 &quot;a_key&quot;: &quot;A String&quot;,
Bu Sun Kim65020912020-05-20 12:08:20 -0700200 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700201 }
Bu Sun Kim65020912020-05-20 12:08:20 -0700202
203 secretId: string, Required. This must be unique within the project.
204
205A secret ID is a string with a maximum length of 255 characters and can
206contain uppercase and lowercase letters, numerals, and the hyphen (`-`) and
207underscore (`_`) characters.
208 x__xgafv: string, V1 error format.
209 Allowed values
210 1 - v1 error format
211 2 - v2 error format
212
213Returns:
214 An object of the form:
215
216 { # A Secret is a logical secret whose value and versions can
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700217 # be accessed.
Bu Sun Kim65020912020-05-20 12:08:20 -0700218 #
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700219 # A Secret is made up of zero or more SecretVersions that
220 # represent the secret data.
221 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
222 &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
223 #
224 # The replication policy cannot be changed after the Secret has been created.
225 &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
226 # restrictions.
227 },
228 &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
229 # locations specified in Secret.replication.user_managed.replicas
230 &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
231 #
232 # Cannot be empty.
233 { # Represents a Replica for this Secret.
234 &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
235 # For example: `&quot;us-east1&quot;`.
236 },
237 ],
238 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700239 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700240 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
241 &quot;labels&quot;: { # The labels assigned to this Secret.
242 #
243 # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
244 # of maximum 128 bytes, and must conform to the following PCRE regular
245 # expression: `\p{Ll}\p{Lo}{0,62}`
246 #
247 # Label values must be between 0 and 63 characters long, have a UTF-8
248 # encoding of maximum 128 bytes, and must conform to the following PCRE
249 # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
250 #
251 # No more than 64 labels can be assigned to a given resource.
252 &quot;a_key&quot;: &quot;A String&quot;,
Bu Sun Kim65020912020-05-20 12:08:20 -0700253 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700254 }</pre>
Bu Sun Kim65020912020-05-20 12:08:20 -0700255</div>
256
257<div class="method">
258 <code class="details" id="delete">delete(name, x__xgafv=None)</code>
259 <pre>Deletes a Secret.
260
261Args:
262 name: string, Required. The resource name of the Secret to delete in the format
263`projects/*/secrets/*`. (required)
264 x__xgafv: string, V1 error format.
265 Allowed values
266 1 - v1 error format
267 2 - v2 error format
268
269Returns:
270 An object of the form:
271
272 { # A generic empty message that you can re-use to avoid defining duplicated
273 # empty messages in your APIs. A typical example is to use it as the request
274 # or the response type of an API method. For instance:
275 #
276 # service Foo {
277 # rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty);
278 # }
279 #
280 # The JSON representation for `Empty` is empty JSON object `{}`.
281 }</pre>
282</div>
283
284<div class="method">
285 <code class="details" id="get">get(name, x__xgafv=None)</code>
286 <pre>Gets metadata for a given Secret.
287
288Args:
289 name: string, Required. The resource name of the Secret, in the format `projects/*/secrets/*`. (required)
290 x__xgafv: string, V1 error format.
291 Allowed values
292 1 - v1 error format
293 2 - v2 error format
294
295Returns:
296 An object of the form:
297
298 { # A Secret is a logical secret whose value and versions can
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700299 # be accessed.
Bu Sun Kim65020912020-05-20 12:08:20 -0700300 #
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700301 # A Secret is made up of zero or more SecretVersions that
302 # represent the secret data.
303 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
304 &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
305 #
306 # The replication policy cannot be changed after the Secret has been created.
307 &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
308 # restrictions.
309 },
310 &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
311 # locations specified in Secret.replication.user_managed.replicas
312 &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
313 #
314 # Cannot be empty.
315 { # Represents a Replica for this Secret.
316 &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
317 # For example: `&quot;us-east1&quot;`.
318 },
319 ],
320 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700321 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700322 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
323 &quot;labels&quot;: { # The labels assigned to this Secret.
324 #
325 # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
326 # of maximum 128 bytes, and must conform to the following PCRE regular
327 # expression: `\p{Ll}\p{Lo}{0,62}`
328 #
329 # Label values must be between 0 and 63 characters long, have a UTF-8
330 # encoding of maximum 128 bytes, and must conform to the following PCRE
331 # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
332 #
333 # No more than 64 labels can be assigned to a given resource.
334 &quot;a_key&quot;: &quot;A String&quot;,
Bu Sun Kim65020912020-05-20 12:08:20 -0700335 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700336 }</pre>
Bu Sun Kim65020912020-05-20 12:08:20 -0700337</div>
338
339<div class="method">
340 <code class="details" id="getIamPolicy">getIamPolicy(resource, options_requestedPolicyVersion=None, x__xgafv=None)</code>
341 <pre>Gets the access control policy for a secret.
342Returns empty policy if the secret exists and does not have a policy set.
343
344Args:
345 resource: string, REQUIRED: The resource for which the policy is being requested.
346See the operation documentation for the appropriate value for this field. (required)
347 options_requestedPolicyVersion: integer, Optional. The policy format version to be returned.
348
349Valid values are 0, 1, and 3. Requests specifying an invalid value will be
350rejected.
351
352Requests for policies with any conditional bindings must specify version 3.
353Policies without any conditional bindings may specify any valid value or
354leave the field unset.
355
356To learn which resources support conditions in their IAM policies, see the
357[IAM
358documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
359 x__xgafv: string, V1 error format.
360 Allowed values
361 1 - v1 error format
362 2 - v2 error format
363
364Returns:
365 An object of the form:
366
367 { # An Identity and Access Management (IAM) policy, which specifies access
368 # controls for Google Cloud resources.
369 #
370 #
371 # A `Policy` is a collection of `bindings`. A `binding` binds one or more
372 # `members` to a single `role`. Members can be user accounts, service accounts,
373 # Google groups, and domains (such as G Suite). A `role` is a named list of
374 # permissions; each `role` can be an IAM predefined role or a user-created
375 # custom role.
376 #
377 # For some types of Google Cloud resources, a `binding` can also specify a
378 # `condition`, which is a logical expression that allows access to a resource
379 # only if the expression evaluates to `true`. A condition can add constraints
380 # based on attributes of the request, the resource, or both. To learn which
381 # resources support conditions in their IAM policies, see the
382 # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
383 #
384 # **JSON example:**
385 #
386 # {
387 # &quot;bindings&quot;: [
388 # {
389 # &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;,
390 # &quot;members&quot;: [
391 # &quot;user:mike@example.com&quot;,
392 # &quot;group:admins@example.com&quot;,
393 # &quot;domain:google.com&quot;,
394 # &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot;
395 # ]
396 # },
397 # {
398 # &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;,
399 # &quot;members&quot;: [
400 # &quot;user:eve@example.com&quot;
401 # ],
402 # &quot;condition&quot;: {
403 # &quot;title&quot;: &quot;expirable access&quot;,
404 # &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;,
405 # &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;,
406 # }
407 # }
408 # ],
409 # &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;,
410 # &quot;version&quot;: 3
411 # }
412 #
413 # **YAML example:**
414 #
415 # bindings:
416 # - members:
417 # - user:mike@example.com
418 # - group:admins@example.com
419 # - domain:google.com
420 # - serviceAccount:my-project-id@appspot.gserviceaccount.com
421 # role: roles/resourcemanager.organizationAdmin
422 # - members:
423 # - user:eve@example.com
424 # role: roles/resourcemanager.organizationViewer
425 # condition:
426 # title: expirable access
427 # description: Does not grant access after Sep 2020
428 # expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)
429 # - etag: BwWWja0YfJA=
430 # - version: 3
431 #
432 # For a description of IAM and its features, see the
433 # [IAM documentation](https://cloud.google.com/iam/docs/).
Bu Sun Kim65020912020-05-20 12:08:20 -0700434 &quot;version&quot;: 42, # Specifies the format of the policy.
435 #
436 # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
437 # are rejected.
438 #
439 # Any operation that affects conditional role bindings must specify version
440 # `3`. This requirement applies to the following operations:
441 #
442 # * Getting a policy that includes a conditional role binding
443 # * Adding a conditional role binding to a policy
444 # * Changing a conditional role binding in a policy
445 # * Removing any role binding, with or without a condition, from a policy
446 # that includes conditions
447 #
448 # **Important:** If you use IAM Conditions, you must include the `etag` field
449 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
450 # you to overwrite a version `3` policy with a version `1` policy, and all of
451 # the conditions in the version `3` policy are lost.
452 #
453 # If a policy does not include any conditions, operations on that policy may
454 # specify any valid version or leave the field unset.
455 #
456 # To learn which resources support conditions in their IAM policies, see the
457 # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
458 &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
459 { # Specifies the audit configuration for a service.
460 # The configuration determines which permission types are logged, and what
461 # identities, if any, are exempted from logging.
462 # An AuditConfig must have one or more AuditLogConfigs.
463 #
464 # If there are AuditConfigs for both `allServices` and a specific service,
465 # the union of the two AuditConfigs is used for that service: the log_types
466 # specified in each AuditConfig are enabled, and the exempted_members in each
467 # AuditLogConfig are exempted.
468 #
469 # Example Policy with multiple AuditConfigs:
470 #
471 # {
472 # &quot;audit_configs&quot;: [
473 # {
474 # &quot;service&quot;: &quot;allServices&quot;
475 # &quot;audit_log_configs&quot;: [
476 # {
477 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
478 # &quot;exempted_members&quot;: [
479 # &quot;user:jose@example.com&quot;
480 # ]
481 # },
482 # {
483 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
484 # },
485 # {
486 # &quot;log_type&quot;: &quot;ADMIN_READ&quot;,
487 # }
488 # ]
489 # },
490 # {
491 # &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;
492 # &quot;audit_log_configs&quot;: [
493 # {
494 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
495 # },
496 # {
497 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
498 # &quot;exempted_members&quot;: [
499 # &quot;user:aliya@example.com&quot;
500 # ]
501 # }
502 # ]
503 # }
504 # ]
505 # }
506 #
507 # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
508 # logging. It also exempts jose@example.com from DATA_READ logging, and
509 # aliya@example.com from DATA_WRITE logging.
510 &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
511 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
512 # `allServices` is a special value that covers all services.
513 &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
514 { # Provides the configuration for logging a type of permissions.
515 # Example:
516 #
517 # {
518 # &quot;audit_log_configs&quot;: [
519 # {
520 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
521 # &quot;exempted_members&quot;: [
522 # &quot;user:jose@example.com&quot;
523 # ]
524 # },
525 # {
526 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
527 # }
528 # ]
529 # }
530 #
531 # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
532 # jose@example.com from DATA_READ logging.
533 &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
534 &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
535 # permission.
536 # Follows the same format of Binding.members.
537 &quot;A String&quot;,
538 ],
539 },
540 ],
541 },
542 ],
543 &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
544 # `condition` that determines how and when the `bindings` are applied. Each
545 # of the `bindings` must contain at least one member.
546 { # Associates `members` with a `role`.
547 &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
548 #
549 # If the condition evaluates to `true`, then this binding applies to the
550 # current request.
551 #
552 # If the condition evaluates to `false`, then this binding does not apply to
553 # the current request. However, a different role binding might grant the same
554 # role to one or more of the members in this binding.
555 #
556 # To learn which resources support conditions in their IAM policies, see the
557 # [IAM
558 # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
559 # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
560 # are documented at https://github.com/google/cel-spec.
561 #
562 # Example (Comparison):
563 #
564 # title: &quot;Summary size limit&quot;
565 # description: &quot;Determines if a summary is less than 100 chars&quot;
566 # expression: &quot;document.summary.size() &lt; 100&quot;
567 #
568 # Example (Equality):
569 #
570 # title: &quot;Requestor is owner&quot;
571 # description: &quot;Determines if requestor is the document owner&quot;
572 # expression: &quot;document.owner == request.auth.claims.email&quot;
573 #
574 # Example (Logic):
575 #
576 # title: &quot;Public documents&quot;
577 # description: &quot;Determine whether the document should be publicly visible&quot;
578 # expression: &quot;document.type != &#x27;private&#x27; &amp;&amp; document.type != &#x27;internal&#x27;&quot;
579 #
580 # Example (Data Manipulation):
581 #
582 # title: &quot;Notification string&quot;
583 # description: &quot;Create a notification string with a timestamp.&quot;
584 # expression: &quot;&#x27;New message received at &#x27; + string(document.create_time)&quot;
585 #
586 # The exact variables and functions that may be referenced within an expression
587 # are determined by the service that evaluates it. See the service
588 # documentation for additional information.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700589 &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
590 # syntax.
Bu Sun Kim65020912020-05-20 12:08:20 -0700591 &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
592 # its purpose. This can be used e.g. in UIs which allow to enter the
593 # expression.
594 &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
595 # reporting, e.g. a file name and a position in the file.
596 &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
597 # describes the expression, e.g. when hovered over it in a UI.
Bu Sun Kim65020912020-05-20 12:08:20 -0700598 },
599 &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
600 # `members` can have the following values:
601 #
602 # * `allUsers`: A special identifier that represents anyone who is
603 # on the internet; with or without a Google account.
604 #
605 # * `allAuthenticatedUsers`: A special identifier that represents anyone
606 # who is authenticated with a Google account or a service account.
607 #
608 # * `user:{emailid}`: An email address that represents a specific Google
609 # account. For example, `alice@example.com` .
610 #
611 #
612 # * `serviceAccount:{emailid}`: An email address that represents a service
613 # account. For example, `my-other-app@appspot.gserviceaccount.com`.
614 #
615 # * `group:{emailid}`: An email address that represents a Google group.
616 # For example, `admins@example.com`.
617 #
618 # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
619 # identifier) representing a user that has been recently deleted. For
620 # example, `alice@example.com?uid=123456789012345678901`. If the user is
621 # recovered, this value reverts to `user:{emailid}` and the recovered user
622 # retains the role in the binding.
623 #
624 # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
625 # unique identifier) representing a service account that has been recently
626 # deleted. For example,
627 # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
628 # If the service account is undeleted, this value reverts to
629 # `serviceAccount:{emailid}` and the undeleted service account retains the
630 # role in the binding.
631 #
632 # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
633 # identifier) representing a Google group that has been recently
634 # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
635 # the group is recovered, this value reverts to `group:{emailid}` and the
636 # recovered group retains the role in the binding.
637 #
638 #
639 # * `domain:{domain}`: The G Suite domain (primary) that represents all the
640 # users of that domain. For example, `google.com` or `example.com`.
641 #
642 &quot;A String&quot;,
643 ],
644 &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
645 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
646 },
647 ],
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700648 &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
649 # prevent simultaneous updates of a policy from overwriting each other.
650 # It is strongly suggested that systems make use of the `etag` in the
651 # read-modify-write cycle to perform policy updates in order to avoid race
652 # conditions: An `etag` is returned in the response to `getIamPolicy`, and
653 # systems are expected to put that etag in the request to `setIamPolicy` to
654 # ensure that their change will be applied to the same version of the policy.
655 #
656 # **Important:** If you use IAM Conditions, you must include the `etag` field
657 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
658 # you to overwrite a version `3` policy with a version `1` policy, and all of
659 # the conditions in the version `3` policy are lost.
Bu Sun Kim65020912020-05-20 12:08:20 -0700660 }</pre>
661</div>
662
663<div class="method">
664 <code class="details" id="list">list(parent, pageToken=None, pageSize=None, x__xgafv=None)</code>
665 <pre>Lists Secrets.
666
667Args:
668 parent: string, Required. The resource name of the project associated with the
669Secrets, in the format `projects/*`. (required)
670 pageToken: string, Optional. Pagination token, returned earlier via
671ListSecretsResponse.next_page_token.
672 pageSize: integer, Optional. The maximum number of results to be returned in a single page. If
673set to 0, the server decides the number of results to return. If the
674number is greater than 25000, it is capped at 25000.
675 x__xgafv: string, V1 error format.
676 Allowed values
677 1 - v1 error format
678 2 - v2 error format
679
680Returns:
681 An object of the form:
682
683 { # Response message for SecretManagerService.ListSecrets.
684 &quot;secrets&quot;: [ # The list of Secrets sorted in reverse by create_time (newest
685 # first).
686 { # A Secret is a logical secret whose value and versions can
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700687 # be accessed.
Bu Sun Kim65020912020-05-20 12:08:20 -0700688 #
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700689 # A Secret is made up of zero or more SecretVersions that
690 # represent the secret data.
691 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
692 &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
693 #
694 # The replication policy cannot be changed after the Secret has been created.
695 &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
696 # restrictions.
697 },
698 &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
699 # locations specified in Secret.replication.user_managed.replicas
700 &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
701 #
702 # Cannot be empty.
703 { # Represents a Replica for this Secret.
704 &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
705 # For example: `&quot;us-east1&quot;`.
706 },
707 ],
708 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700709 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700710 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
711 &quot;labels&quot;: { # The labels assigned to this Secret.
712 #
713 # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
714 # of maximum 128 bytes, and must conform to the following PCRE regular
715 # expression: `\p{Ll}\p{Lo}{0,62}`
716 #
717 # Label values must be between 0 and 63 characters long, have a UTF-8
718 # encoding of maximum 128 bytes, and must conform to the following PCRE
719 # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
720 #
721 # No more than 64 labels can be assigned to a given resource.
722 &quot;a_key&quot;: &quot;A String&quot;,
Bu Sun Kim65020912020-05-20 12:08:20 -0700723 },
724 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700725 ],
726 &quot;nextPageToken&quot;: &quot;A String&quot;, # A token to retrieve the next page of results. Pass this value in
727 # ListSecretsRequest.page_token to retrieve the next page.
728 &quot;totalSize&quot;: 42, # The total number of Secrets.
729 }</pre>
730</div>
731
732<div class="method">
733 <code class="details" id="list_next">list_next(previous_request, previous_response)</code>
734 <pre>Retrieves the next page of results.
735
736Args:
737 previous_request: The request for the previous page. (required)
738 previous_response: The response from the request for the previous page. (required)
739
740Returns:
741 A request object that you can call &#x27;execute()&#x27; on to request the next
742 page. Returns None if there are no more items in the collection.
743 </pre>
744</div>
745
746<div class="method">
747 <code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code>
748 <pre>Updates metadata of an existing Secret.
749
750Args:
751 name: string, Output only. The resource name of the Secret in the format `projects/*/secrets/*`. (required)
752 body: object, The request body.
753 The object takes the form of:
754
755{ # A Secret is a logical secret whose value and versions can
Bu Sun Kim65020912020-05-20 12:08:20 -0700756 # be accessed.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700757 #
Bu Sun Kim65020912020-05-20 12:08:20 -0700758 # A Secret is made up of zero or more SecretVersions that
759 # represent the secret data.
760 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
761 &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700762 #
Bu Sun Kim65020912020-05-20 12:08:20 -0700763 # The replication policy cannot be changed after the Secret has been created.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700764 &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
765 # restrictions.
766 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700767 &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
768 # locations specified in Secret.replication.user_managed.replicas
769 &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
770 #
771 # Cannot be empty.
772 { # Represents a Replica for this Secret.
773 &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
774 # For example: `&quot;us-east1&quot;`.
775 },
776 ],
777 },
Bu Sun Kim65020912020-05-20 12:08:20 -0700778 },
779 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
780 &quot;labels&quot;: { # The labels assigned to this Secret.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700781 #
Bu Sun Kim65020912020-05-20 12:08:20 -0700782 # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
783 # of maximum 128 bytes, and must conform to the following PCRE regular
784 # expression: `\p{Ll}\p{Lo}{0,62}`
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700785 #
Bu Sun Kim65020912020-05-20 12:08:20 -0700786 # Label values must be between 0 and 63 characters long, have a UTF-8
787 # encoding of maximum 128 bytes, and must conform to the following PCRE
788 # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700789 #
Bu Sun Kim65020912020-05-20 12:08:20 -0700790 # No more than 64 labels can be assigned to a given resource.
791 &quot;a_key&quot;: &quot;A String&quot;,
792 },
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -0700793 }
794
795 updateMask: string, Required. Specifies the fields to be updated.
796 x__xgafv: string, V1 error format.
797 Allowed values
798 1 - v1 error format
799 2 - v2 error format
800
801Returns:
802 An object of the form:
803
804 { # A Secret is a logical secret whose value and versions can
805 # be accessed.
806 #
807 # A Secret is made up of zero or more SecretVersions that
808 # represent the secret data.
809 &quot;name&quot;: &quot;A String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
810 &quot;replication&quot;: { # A policy that defines the replication configuration of data. # Required. Immutable. The replication policy of the secret data attached to the Secret.
811 #
812 # The replication policy cannot be changed after the Secret has been created.
813 &quot;automatic&quot;: { # A replication policy that replicates the Secret payload without any # The Secret will automatically be replicated without any restrictions.
814 # restrictions.
815 },
816 &quot;userManaged&quot;: { # A replication policy that replicates the Secret payload into the # The Secret will only be replicated into the locations specified.
817 # locations specified in Secret.replication.user_managed.replicas
818 &quot;replicas&quot;: [ # Required. The list of Replicas for this Secret.
819 #
820 # Cannot be empty.
821 { # Represents a Replica for this Secret.
822 &quot;location&quot;: &quot;A String&quot;, # The canonical IDs of the location to replicate data.
823 # For example: `&quot;us-east1&quot;`.
824 },
825 ],
826 },
827 },
828 &quot;createTime&quot;: &quot;A String&quot;, # Output only. The time at which the Secret was created.
829 &quot;labels&quot;: { # The labels assigned to this Secret.
830 #
831 # Label keys must be between 1 and 63 characters long, have a UTF-8 encoding
832 # of maximum 128 bytes, and must conform to the following PCRE regular
833 # expression: `\p{Ll}\p{Lo}{0,62}`
834 #
835 # Label values must be between 0 and 63 characters long, have a UTF-8
836 # encoding of maximum 128 bytes, and must conform to the following PCRE
837 # regular expression: `[\p{Ll}\p{Lo}\p{N}_-]{0,63}`
838 #
839 # No more than 64 labels can be assigned to a given resource.
840 &quot;a_key&quot;: &quot;A String&quot;,
841 },
842 }</pre>
Bu Sun Kim65020912020-05-20 12:08:20 -0700843</div>
844
845<div class="method">
846 <code class="details" id="setIamPolicy">setIamPolicy(resource, body=None, x__xgafv=None)</code>
847 <pre>Sets the access control policy on the specified secret. Replaces any
848existing policy.
849
850Permissions on SecretVersions are enforced according
851to the policy set on the associated Secret.
852
853Args:
854 resource: string, REQUIRED: The resource for which the policy is being specified.
855See the operation documentation for the appropriate value for this field. (required)
856 body: object, The request body.
857 The object takes the form of:
858
859{ # Request message for `SetIamPolicy` method.
860 &quot;policy&quot;: { # An Identity and Access Management (IAM) policy, which specifies access # REQUIRED: The complete policy to be applied to the `resource`. The size of
861 # the policy is limited to a few 10s of KB. An empty policy is a
862 # valid policy but certain Cloud Platform services (such as Projects)
863 # might reject them.
864 # controls for Google Cloud resources.
865 #
866 #
867 # A `Policy` is a collection of `bindings`. A `binding` binds one or more
868 # `members` to a single `role`. Members can be user accounts, service accounts,
869 # Google groups, and domains (such as G Suite). A `role` is a named list of
870 # permissions; each `role` can be an IAM predefined role or a user-created
871 # custom role.
872 #
873 # For some types of Google Cloud resources, a `binding` can also specify a
874 # `condition`, which is a logical expression that allows access to a resource
875 # only if the expression evaluates to `true`. A condition can add constraints
876 # based on attributes of the request, the resource, or both. To learn which
877 # resources support conditions in their IAM policies, see the
878 # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
879 #
880 # **JSON example:**
881 #
882 # {
883 # &quot;bindings&quot;: [
884 # {
885 # &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;,
886 # &quot;members&quot;: [
887 # &quot;user:mike@example.com&quot;,
888 # &quot;group:admins@example.com&quot;,
889 # &quot;domain:google.com&quot;,
890 # &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot;
891 # ]
892 # },
893 # {
894 # &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;,
895 # &quot;members&quot;: [
896 # &quot;user:eve@example.com&quot;
897 # ],
898 # &quot;condition&quot;: {
899 # &quot;title&quot;: &quot;expirable access&quot;,
900 # &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;,
901 # &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;,
902 # }
903 # }
904 # ],
905 # &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;,
906 # &quot;version&quot;: 3
907 # }
908 #
909 # **YAML example:**
910 #
911 # bindings:
912 # - members:
913 # - user:mike@example.com
914 # - group:admins@example.com
915 # - domain:google.com
916 # - serviceAccount:my-project-id@appspot.gserviceaccount.com
917 # role: roles/resourcemanager.organizationAdmin
918 # - members:
919 # - user:eve@example.com
920 # role: roles/resourcemanager.organizationViewer
921 # condition:
922 # title: expirable access
923 # description: Does not grant access after Sep 2020
924 # expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)
925 # - etag: BwWWja0YfJA=
926 # - version: 3
927 #
928 # For a description of IAM and its features, see the
929 # [IAM documentation](https://cloud.google.com/iam/docs/).
Bu Sun Kim65020912020-05-20 12:08:20 -0700930 &quot;version&quot;: 42, # Specifies the format of the policy.
931 #
932 # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
933 # are rejected.
934 #
935 # Any operation that affects conditional role bindings must specify version
936 # `3`. This requirement applies to the following operations:
937 #
938 # * Getting a policy that includes a conditional role binding
939 # * Adding a conditional role binding to a policy
940 # * Changing a conditional role binding in a policy
941 # * Removing any role binding, with or without a condition, from a policy
942 # that includes conditions
943 #
944 # **Important:** If you use IAM Conditions, you must include the `etag` field
945 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
946 # you to overwrite a version `3` policy with a version `1` policy, and all of
947 # the conditions in the version `3` policy are lost.
948 #
949 # If a policy does not include any conditions, operations on that policy may
950 # specify any valid version or leave the field unset.
951 #
952 # To learn which resources support conditions in their IAM policies, see the
953 # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
954 &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
955 { # Specifies the audit configuration for a service.
956 # The configuration determines which permission types are logged, and what
957 # identities, if any, are exempted from logging.
958 # An AuditConfig must have one or more AuditLogConfigs.
959 #
960 # If there are AuditConfigs for both `allServices` and a specific service,
961 # the union of the two AuditConfigs is used for that service: the log_types
962 # specified in each AuditConfig are enabled, and the exempted_members in each
963 # AuditLogConfig are exempted.
964 #
965 # Example Policy with multiple AuditConfigs:
966 #
967 # {
968 # &quot;audit_configs&quot;: [
969 # {
970 # &quot;service&quot;: &quot;allServices&quot;
971 # &quot;audit_log_configs&quot;: [
972 # {
973 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
974 # &quot;exempted_members&quot;: [
975 # &quot;user:jose@example.com&quot;
976 # ]
977 # },
978 # {
979 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
980 # },
981 # {
982 # &quot;log_type&quot;: &quot;ADMIN_READ&quot;,
983 # }
984 # ]
985 # },
986 # {
987 # &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;
988 # &quot;audit_log_configs&quot;: [
989 # {
990 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
991 # },
992 # {
993 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
994 # &quot;exempted_members&quot;: [
995 # &quot;user:aliya@example.com&quot;
996 # ]
997 # }
998 # ]
999 # }
1000 # ]
1001 # }
1002 #
1003 # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
1004 # logging. It also exempts jose@example.com from DATA_READ logging, and
1005 # aliya@example.com from DATA_WRITE logging.
1006 &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
1007 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
1008 # `allServices` is a special value that covers all services.
1009 &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
1010 { # Provides the configuration for logging a type of permissions.
1011 # Example:
1012 #
1013 # {
1014 # &quot;audit_log_configs&quot;: [
1015 # {
1016 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
1017 # &quot;exempted_members&quot;: [
1018 # &quot;user:jose@example.com&quot;
1019 # ]
1020 # },
1021 # {
1022 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
1023 # }
1024 # ]
1025 # }
1026 #
1027 # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
1028 # jose@example.com from DATA_READ logging.
1029 &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
1030 &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
1031 # permission.
1032 # Follows the same format of Binding.members.
1033 &quot;A String&quot;,
1034 ],
1035 },
1036 ],
1037 },
1038 ],
1039 &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
1040 # `condition` that determines how and when the `bindings` are applied. Each
1041 # of the `bindings` must contain at least one member.
1042 { # Associates `members` with a `role`.
1043 &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
1044 #
1045 # If the condition evaluates to `true`, then this binding applies to the
1046 # current request.
1047 #
1048 # If the condition evaluates to `false`, then this binding does not apply to
1049 # the current request. However, a different role binding might grant the same
1050 # role to one or more of the members in this binding.
1051 #
1052 # To learn which resources support conditions in their IAM policies, see the
1053 # [IAM
1054 # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
1055 # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
1056 # are documented at https://github.com/google/cel-spec.
1057 #
1058 # Example (Comparison):
1059 #
1060 # title: &quot;Summary size limit&quot;
1061 # description: &quot;Determines if a summary is less than 100 chars&quot;
1062 # expression: &quot;document.summary.size() &lt; 100&quot;
1063 #
1064 # Example (Equality):
1065 #
1066 # title: &quot;Requestor is owner&quot;
1067 # description: &quot;Determines if requestor is the document owner&quot;
1068 # expression: &quot;document.owner == request.auth.claims.email&quot;
1069 #
1070 # Example (Logic):
1071 #
1072 # title: &quot;Public documents&quot;
1073 # description: &quot;Determine whether the document should be publicly visible&quot;
1074 # expression: &quot;document.type != &#x27;private&#x27; &amp;&amp; document.type != &#x27;internal&#x27;&quot;
1075 #
1076 # Example (Data Manipulation):
1077 #
1078 # title: &quot;Notification string&quot;
1079 # description: &quot;Create a notification string with a timestamp.&quot;
1080 # expression: &quot;&#x27;New message received at &#x27; + string(document.create_time)&quot;
1081 #
1082 # The exact variables and functions that may be referenced within an expression
1083 # are determined by the service that evaluates it. See the service
1084 # documentation for additional information.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -07001085 &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
1086 # syntax.
Bu Sun Kim65020912020-05-20 12:08:20 -07001087 &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
1088 # its purpose. This can be used e.g. in UIs which allow to enter the
1089 # expression.
1090 &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
1091 # reporting, e.g. a file name and a position in the file.
1092 &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
1093 # describes the expression, e.g. when hovered over it in a UI.
Bu Sun Kim65020912020-05-20 12:08:20 -07001094 },
1095 &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
1096 # `members` can have the following values:
1097 #
1098 # * `allUsers`: A special identifier that represents anyone who is
1099 # on the internet; with or without a Google account.
1100 #
1101 # * `allAuthenticatedUsers`: A special identifier that represents anyone
1102 # who is authenticated with a Google account or a service account.
1103 #
1104 # * `user:{emailid}`: An email address that represents a specific Google
1105 # account. For example, `alice@example.com` .
1106 #
1107 #
1108 # * `serviceAccount:{emailid}`: An email address that represents a service
1109 # account. For example, `my-other-app@appspot.gserviceaccount.com`.
1110 #
1111 # * `group:{emailid}`: An email address that represents a Google group.
1112 # For example, `admins@example.com`.
1113 #
1114 # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
1115 # identifier) representing a user that has been recently deleted. For
1116 # example, `alice@example.com?uid=123456789012345678901`. If the user is
1117 # recovered, this value reverts to `user:{emailid}` and the recovered user
1118 # retains the role in the binding.
1119 #
1120 # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
1121 # unique identifier) representing a service account that has been recently
1122 # deleted. For example,
1123 # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
1124 # If the service account is undeleted, this value reverts to
1125 # `serviceAccount:{emailid}` and the undeleted service account retains the
1126 # role in the binding.
1127 #
1128 # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
1129 # identifier) representing a Google group that has been recently
1130 # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
1131 # the group is recovered, this value reverts to `group:{emailid}` and the
1132 # recovered group retains the role in the binding.
1133 #
1134 #
1135 # * `domain:{domain}`: The G Suite domain (primary) that represents all the
1136 # users of that domain. For example, `google.com` or `example.com`.
1137 #
1138 &quot;A String&quot;,
1139 ],
1140 &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
1141 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
1142 },
1143 ],
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -07001144 &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
1145 # prevent simultaneous updates of a policy from overwriting each other.
1146 # It is strongly suggested that systems make use of the `etag` in the
1147 # read-modify-write cycle to perform policy updates in order to avoid race
1148 # conditions: An `etag` is returned in the response to `getIamPolicy`, and
1149 # systems are expected to put that etag in the request to `setIamPolicy` to
1150 # ensure that their change will be applied to the same version of the policy.
1151 #
1152 # **Important:** If you use IAM Conditions, you must include the `etag` field
1153 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
1154 # you to overwrite a version `3` policy with a version `1` policy, and all of
1155 # the conditions in the version `3` policy are lost.
Bu Sun Kim65020912020-05-20 12:08:20 -07001156 },
1157 &quot;updateMask&quot;: &quot;A String&quot;, # OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only
1158 # the fields in the mask will be modified. If no mask is provided, the
1159 # following default mask is used:
1160 #
1161 # `paths: &quot;bindings, etag&quot;`
1162 }
1163
1164 x__xgafv: string, V1 error format.
1165 Allowed values
1166 1 - v1 error format
1167 2 - v2 error format
1168
1169Returns:
1170 An object of the form:
1171
1172 { # An Identity and Access Management (IAM) policy, which specifies access
1173 # controls for Google Cloud resources.
1174 #
1175 #
1176 # A `Policy` is a collection of `bindings`. A `binding` binds one or more
1177 # `members` to a single `role`. Members can be user accounts, service accounts,
1178 # Google groups, and domains (such as G Suite). A `role` is a named list of
1179 # permissions; each `role` can be an IAM predefined role or a user-created
1180 # custom role.
1181 #
1182 # For some types of Google Cloud resources, a `binding` can also specify a
1183 # `condition`, which is a logical expression that allows access to a resource
1184 # only if the expression evaluates to `true`. A condition can add constraints
1185 # based on attributes of the request, the resource, or both. To learn which
1186 # resources support conditions in their IAM policies, see the
1187 # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
1188 #
1189 # **JSON example:**
1190 #
1191 # {
1192 # &quot;bindings&quot;: [
1193 # {
1194 # &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;,
1195 # &quot;members&quot;: [
1196 # &quot;user:mike@example.com&quot;,
1197 # &quot;group:admins@example.com&quot;,
1198 # &quot;domain:google.com&quot;,
1199 # &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot;
1200 # ]
1201 # },
1202 # {
1203 # &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;,
1204 # &quot;members&quot;: [
1205 # &quot;user:eve@example.com&quot;
1206 # ],
1207 # &quot;condition&quot;: {
1208 # &quot;title&quot;: &quot;expirable access&quot;,
1209 # &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;,
1210 # &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;,
1211 # }
1212 # }
1213 # ],
1214 # &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;,
1215 # &quot;version&quot;: 3
1216 # }
1217 #
1218 # **YAML example:**
1219 #
1220 # bindings:
1221 # - members:
1222 # - user:mike@example.com
1223 # - group:admins@example.com
1224 # - domain:google.com
1225 # - serviceAccount:my-project-id@appspot.gserviceaccount.com
1226 # role: roles/resourcemanager.organizationAdmin
1227 # - members:
1228 # - user:eve@example.com
1229 # role: roles/resourcemanager.organizationViewer
1230 # condition:
1231 # title: expirable access
1232 # description: Does not grant access after Sep 2020
1233 # expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)
1234 # - etag: BwWWja0YfJA=
1235 # - version: 3
1236 #
1237 # For a description of IAM and its features, see the
1238 # [IAM documentation](https://cloud.google.com/iam/docs/).
Bu Sun Kim65020912020-05-20 12:08:20 -07001239 &quot;version&quot;: 42, # Specifies the format of the policy.
1240 #
1241 # Valid values are `0`, `1`, and `3`. Requests that specify an invalid value
1242 # are rejected.
1243 #
1244 # Any operation that affects conditional role bindings must specify version
1245 # `3`. This requirement applies to the following operations:
1246 #
1247 # * Getting a policy that includes a conditional role binding
1248 # * Adding a conditional role binding to a policy
1249 # * Changing a conditional role binding in a policy
1250 # * Removing any role binding, with or without a condition, from a policy
1251 # that includes conditions
1252 #
1253 # **Important:** If you use IAM Conditions, you must include the `etag` field
1254 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
1255 # you to overwrite a version `3` policy with a version `1` policy, and all of
1256 # the conditions in the version `3` policy are lost.
1257 #
1258 # If a policy does not include any conditions, operations on that policy may
1259 # specify any valid version or leave the field unset.
1260 #
1261 # To learn which resources support conditions in their IAM policies, see the
1262 # [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
1263 &quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
1264 { # Specifies the audit configuration for a service.
1265 # The configuration determines which permission types are logged, and what
1266 # identities, if any, are exempted from logging.
1267 # An AuditConfig must have one or more AuditLogConfigs.
1268 #
1269 # If there are AuditConfigs for both `allServices` and a specific service,
1270 # the union of the two AuditConfigs is used for that service: the log_types
1271 # specified in each AuditConfig are enabled, and the exempted_members in each
1272 # AuditLogConfig are exempted.
1273 #
1274 # Example Policy with multiple AuditConfigs:
1275 #
1276 # {
1277 # &quot;audit_configs&quot;: [
1278 # {
1279 # &quot;service&quot;: &quot;allServices&quot;
1280 # &quot;audit_log_configs&quot;: [
1281 # {
1282 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
1283 # &quot;exempted_members&quot;: [
1284 # &quot;user:jose@example.com&quot;
1285 # ]
1286 # },
1287 # {
1288 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
1289 # },
1290 # {
1291 # &quot;log_type&quot;: &quot;ADMIN_READ&quot;,
1292 # }
1293 # ]
1294 # },
1295 # {
1296 # &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;
1297 # &quot;audit_log_configs&quot;: [
1298 # {
1299 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
1300 # },
1301 # {
1302 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
1303 # &quot;exempted_members&quot;: [
1304 # &quot;user:aliya@example.com&quot;
1305 # ]
1306 # }
1307 # ]
1308 # }
1309 # ]
1310 # }
1311 #
1312 # For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
1313 # logging. It also exempts jose@example.com from DATA_READ logging, and
1314 # aliya@example.com from DATA_WRITE logging.
1315 &quot;service&quot;: &quot;A String&quot;, # Specifies a service that will be enabled for audit logging.
1316 # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
1317 # `allServices` is a special value that covers all services.
1318 &quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
1319 { # Provides the configuration for logging a type of permissions.
1320 # Example:
1321 #
1322 # {
1323 # &quot;audit_log_configs&quot;: [
1324 # {
1325 # &quot;log_type&quot;: &quot;DATA_READ&quot;,
1326 # &quot;exempted_members&quot;: [
1327 # &quot;user:jose@example.com&quot;
1328 # ]
1329 # },
1330 # {
1331 # &quot;log_type&quot;: &quot;DATA_WRITE&quot;,
1332 # }
1333 # ]
1334 # }
1335 #
1336 # This enables &#x27;DATA_READ&#x27; and &#x27;DATA_WRITE&#x27; logging, while exempting
1337 # jose@example.com from DATA_READ logging.
1338 &quot;logType&quot;: &quot;A String&quot;, # The log type that this config enables.
1339 &quot;exemptedMembers&quot;: [ # Specifies the identities that do not cause logging for this type of
1340 # permission.
1341 # Follows the same format of Binding.members.
1342 &quot;A String&quot;,
1343 ],
1344 },
1345 ],
1346 },
1347 ],
1348 &quot;bindings&quot;: [ # Associates a list of `members` to a `role`. Optionally, may specify a
1349 # `condition` that determines how and when the `bindings` are applied. Each
1350 # of the `bindings` must contain at least one member.
1351 { # Associates `members` with a `role`.
1352 &quot;condition&quot;: { # Represents a textual expression in the Common Expression Language (CEL) # The condition that is associated with this binding.
1353 #
1354 # If the condition evaluates to `true`, then this binding applies to the
1355 # current request.
1356 #
1357 # If the condition evaluates to `false`, then this binding does not apply to
1358 # the current request. However, a different role binding might grant the same
1359 # role to one or more of the members in this binding.
1360 #
1361 # To learn which resources support conditions in their IAM policies, see the
1362 # [IAM
1363 # documentation](https://cloud.google.com/iam/help/conditions/resource-policies).
1364 # syntax. CEL is a C-like expression language. The syntax and semantics of CEL
1365 # are documented at https://github.com/google/cel-spec.
1366 #
1367 # Example (Comparison):
1368 #
1369 # title: &quot;Summary size limit&quot;
1370 # description: &quot;Determines if a summary is less than 100 chars&quot;
1371 # expression: &quot;document.summary.size() &lt; 100&quot;
1372 #
1373 # Example (Equality):
1374 #
1375 # title: &quot;Requestor is owner&quot;
1376 # description: &quot;Determines if requestor is the document owner&quot;
1377 # expression: &quot;document.owner == request.auth.claims.email&quot;
1378 #
1379 # Example (Logic):
1380 #
1381 # title: &quot;Public documents&quot;
1382 # description: &quot;Determine whether the document should be publicly visible&quot;
1383 # expression: &quot;document.type != &#x27;private&#x27; &amp;&amp; document.type != &#x27;internal&#x27;&quot;
1384 #
1385 # Example (Data Manipulation):
1386 #
1387 # title: &quot;Notification string&quot;
1388 # description: &quot;Create a notification string with a timestamp.&quot;
1389 # expression: &quot;&#x27;New message received at &#x27; + string(document.create_time)&quot;
1390 #
1391 # The exact variables and functions that may be referenced within an expression
1392 # are determined by the service that evaluates it. See the service
1393 # documentation for additional information.
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -07001394 &quot;expression&quot;: &quot;A String&quot;, # Textual representation of an expression in Common Expression Language
1395 # syntax.
Bu Sun Kim65020912020-05-20 12:08:20 -07001396 &quot;title&quot;: &quot;A String&quot;, # Optional. Title for the expression, i.e. a short string describing
1397 # its purpose. This can be used e.g. in UIs which allow to enter the
1398 # expression.
1399 &quot;location&quot;: &quot;A String&quot;, # Optional. String indicating the location of the expression for error
1400 # reporting, e.g. a file name and a position in the file.
1401 &quot;description&quot;: &quot;A String&quot;, # Optional. Description of the expression. This is a longer text which
1402 # describes the expression, e.g. when hovered over it in a UI.
Bu Sun Kim65020912020-05-20 12:08:20 -07001403 },
1404 &quot;members&quot;: [ # Specifies the identities requesting access for a Cloud Platform resource.
1405 # `members` can have the following values:
1406 #
1407 # * `allUsers`: A special identifier that represents anyone who is
1408 # on the internet; with or without a Google account.
1409 #
1410 # * `allAuthenticatedUsers`: A special identifier that represents anyone
1411 # who is authenticated with a Google account or a service account.
1412 #
1413 # * `user:{emailid}`: An email address that represents a specific Google
1414 # account. For example, `alice@example.com` .
1415 #
1416 #
1417 # * `serviceAccount:{emailid}`: An email address that represents a service
1418 # account. For example, `my-other-app@appspot.gserviceaccount.com`.
1419 #
1420 # * `group:{emailid}`: An email address that represents a Google group.
1421 # For example, `admins@example.com`.
1422 #
1423 # * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique
1424 # identifier) representing a user that has been recently deleted. For
1425 # example, `alice@example.com?uid=123456789012345678901`. If the user is
1426 # recovered, this value reverts to `user:{emailid}` and the recovered user
1427 # retains the role in the binding.
1428 #
1429 # * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus
1430 # unique identifier) representing a service account that has been recently
1431 # deleted. For example,
1432 # `my-other-app@appspot.gserviceaccount.com?uid=123456789012345678901`.
1433 # If the service account is undeleted, this value reverts to
1434 # `serviceAccount:{emailid}` and the undeleted service account retains the
1435 # role in the binding.
1436 #
1437 # * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique
1438 # identifier) representing a Google group that has been recently
1439 # deleted. For example, `admins@example.com?uid=123456789012345678901`. If
1440 # the group is recovered, this value reverts to `group:{emailid}` and the
1441 # recovered group retains the role in the binding.
1442 #
1443 #
1444 # * `domain:{domain}`: The G Suite domain (primary) that represents all the
1445 # users of that domain. For example, `google.com` or `example.com`.
1446 #
1447 &quot;A String&quot;,
1448 ],
1449 &quot;role&quot;: &quot;A String&quot;, # Role that is assigned to `members`.
1450 # For example, `roles/viewer`, `roles/editor`, or `roles/owner`.
1451 },
1452 ],
Bu Sun Kim4ed7d3f2020-05-27 12:20:54 -07001453 &quot;etag&quot;: &quot;A String&quot;, # `etag` is used for optimistic concurrency control as a way to help
1454 # prevent simultaneous updates of a policy from overwriting each other.
1455 # It is strongly suggested that systems make use of the `etag` in the
1456 # read-modify-write cycle to perform policy updates in order to avoid race
1457 # conditions: An `etag` is returned in the response to `getIamPolicy`, and
1458 # systems are expected to put that etag in the request to `setIamPolicy` to
1459 # ensure that their change will be applied to the same version of the policy.
1460 #
1461 # **Important:** If you use IAM Conditions, you must include the `etag` field
1462 # whenever you call `setIamPolicy`. If you omit this field, then IAM allows
1463 # you to overwrite a version `3` policy with a version `1` policy, and all of
1464 # the conditions in the version `3` policy are lost.
Bu Sun Kim65020912020-05-20 12:08:20 -07001465 }</pre>
1466</div>
1467
1468<div class="method">
1469 <code class="details" id="testIamPermissions">testIamPermissions(resource, body=None, x__xgafv=None)</code>
1470 <pre>Returns permissions that a caller has for the specified secret.
1471If the secret does not exist, this call returns an empty set of
1472permissions, not a NOT_FOUND error.
1473
1474Note: This operation is designed to be used for building permission-aware
1475UIs and command-line tools, not for authorization checking. This operation
1476may &quot;fail open&quot; without warning.
1477
1478Args:
1479 resource: string, REQUIRED: The resource for which the policy detail is being requested.
1480See the operation documentation for the appropriate value for this field. (required)
1481 body: object, The request body.
1482 The object takes the form of:
1483
1484{ # Request message for `TestIamPermissions` method.
1485 &quot;permissions&quot;: [ # The set of permissions to check for the `resource`. Permissions with
1486 # wildcards (such as &#x27;*&#x27; or &#x27;storage.*&#x27;) are not allowed. For more
1487 # information see
1488 # [IAM Overview](https://cloud.google.com/iam/docs/overview#permissions).
1489 &quot;A String&quot;,
1490 ],
1491 }
1492
1493 x__xgafv: string, V1 error format.
1494 Allowed values
1495 1 - v1 error format
1496 2 - v2 error format
1497
1498Returns:
1499 An object of the form:
1500
1501 { # Response message for `TestIamPermissions` method.
1502 &quot;permissions&quot;: [ # A subset of `TestPermissionsRequest.permissions` that the caller is
1503 # allowed.
1504 &quot;A String&quot;,
1505 ],
1506 }</pre>
1507</div>
1508
1509</body></html>