Skip to content

Commit

Permalink
feat(cloudasset)!: update the API
Browse files Browse the repository at this point in the history
BREAKING CHANGE: This release has breaking changes.
#### cloudasset:v1p1beta1
The following keys were changed:
- resources.iamPolicies.methods.searchAll.description
- resources.iamPolicies.methods.searchAll.parameters.query.description
- resources.iamPolicies.methods.searchAll.parameters.scope.description
- resources.resources.methods.searchAll.description
- resources.resources.methods.searchAll.parameters.orderBy.description
- resources.resources.methods.searchAll.parameters.scope.description
- schemas.AuditConfig.description
- schemas.AuditLogConfig.description

#### cloudasset:v1p4beta1
The following keys were changed:
- resources.v1p4beta1.methods.analyzeIamPolicy.parameters.analysisQuery.identitySelector.identity.description
- resources.v1p4beta1.methods.analyzeIamPolicy.parameters.analysisQuery.resourceSelector.fullResourceName.description
- resources.v1p4beta1.methods.analyzeIamPolicy.parameters.options.analyzeServiceAccountImpersonation.description
- resources.v1p4beta1.methods.analyzeIamPolicy.parameters.parent.description
- resources.v1p4beta1.methods.exportIamPolicyAnalysis.parameters.parent.description
- schemas.GoogleCloudAssetV1p4beta1Resource.properties.fullResourceName.description
- schemas.IamPolicyAnalysisQuery.properties.parent.description
- schemas.IamPolicyAnalysisResult.properties.attachedResourceFullName.description
- schemas.IdentitySelector.properties.identity.description
- schemas.ResourceSelector.description
- schemas.ResourceSelector.properties.fullResourceName.description

#### cloudasset:v1
The following keys were deleted:
- resources.v1.methods.searchAllIamPolicies.description
- resources.v1.methods.searchAllIamPolicies.flatPath
- resources.v1.methods.searchAllIamPolicies.httpMethod
- resources.v1.methods.searchAllIamPolicies.id
- resources.v1.methods.searchAllIamPolicies.parameterOrder
- resources.v1.methods.searchAllIamPolicies.parameters.pageSize.description
- resources.v1.methods.searchAllIamPolicies.parameters.pageSize.format
- resources.v1.methods.searchAllIamPolicies.parameters.pageSize.location
- resources.v1.methods.searchAllIamPolicies.parameters.pageSize.type
- resources.v1.methods.searchAllIamPolicies.parameters.pageToken.description
- resources.v1.methods.searchAllIamPolicies.parameters.pageToken.location
- resources.v1.methods.searchAllIamPolicies.parameters.pageToken.type
- resources.v1.methods.searchAllIamPolicies.parameters.query.description
- resources.v1.methods.searchAllIamPolicies.parameters.query.location
- resources.v1.methods.searchAllIamPolicies.parameters.query.type
- resources.v1.methods.searchAllIamPolicies.parameters.scope.description
- resources.v1.methods.searchAllIamPolicies.parameters.scope.location
- resources.v1.methods.searchAllIamPolicies.parameters.scope.pattern
- resources.v1.methods.searchAllIamPolicies.parameters.scope.required
- resources.v1.methods.searchAllIamPolicies.parameters.scope.type
- resources.v1.methods.searchAllIamPolicies.path
- resources.v1.methods.searchAllIamPolicies.response.$ref
- resources.v1.methods.searchAllIamPolicies.scopes
- resources.v1.methods.searchAllResources.description
- resources.v1.methods.searchAllResources.flatPath
- resources.v1.methods.searchAllResources.httpMethod
- resources.v1.methods.searchAllResources.id
- resources.v1.methods.searchAllResources.parameterOrder
- resources.v1.methods.searchAllResources.parameters.assetTypes.description
- resources.v1.methods.searchAllResources.parameters.assetTypes.location
- resources.v1.methods.searchAllResources.parameters.assetTypes.repeated
- resources.v1.methods.searchAllResources.parameters.assetTypes.type
- resources.v1.methods.searchAllResources.parameters.orderBy.description
- resources.v1.methods.searchAllResources.parameters.orderBy.location
- resources.v1.methods.searchAllResources.parameters.orderBy.type
- resources.v1.methods.searchAllResources.parameters.pageSize.description
- resources.v1.methods.searchAllResources.parameters.pageSize.format
- resources.v1.methods.searchAllResources.parameters.pageSize.location
- resources.v1.methods.searchAllResources.parameters.pageSize.type
- resources.v1.methods.searchAllResources.parameters.pageToken.description
- resources.v1.methods.searchAllResources.parameters.pageToken.location
- resources.v1.methods.searchAllResources.parameters.pageToken.type
- resources.v1.methods.searchAllResources.parameters.query.description
- resources.v1.methods.searchAllResources.parameters.query.location
- resources.v1.methods.searchAllResources.parameters.query.type
- resources.v1.methods.searchAllResources.parameters.scope.description
- resources.v1.methods.searchAllResources.parameters.scope.location
- resources.v1.methods.searchAllResources.parameters.scope.pattern
- resources.v1.methods.searchAllResources.parameters.scope.required
- resources.v1.methods.searchAllResources.parameters.scope.type
- resources.v1.methods.searchAllResources.path
- resources.v1.methods.searchAllResources.response.$ref
- resources.v1.methods.searchAllResources.scopes
- schemas.Explanation.description
- schemas.Explanation.id
- schemas.Explanation.properties.matchedPermissions.additionalProperties.$ref
- schemas.Explanation.properties.matchedPermissions.description
- schemas.Explanation.properties.matchedPermissions.type
- schemas.Explanation.type
- schemas.IamPolicySearchResult.description
- schemas.IamPolicySearchResult.id
- schemas.IamPolicySearchResult.properties.explanation.$ref
- schemas.IamPolicySearchResult.properties.explanation.description
- schemas.IamPolicySearchResult.properties.policy.$ref
- schemas.IamPolicySearchResult.properties.policy.description
- schemas.IamPolicySearchResult.properties.project.description
- schemas.IamPolicySearchResult.properties.project.type
- schemas.IamPolicySearchResult.properties.resource.description
- schemas.IamPolicySearchResult.properties.resource.type
- schemas.IamPolicySearchResult.type
- schemas.Permissions.description
- schemas.Permissions.id
- schemas.Permissions.properties.permissions.description
- schemas.Permissions.properties.permissions.items.type
- schemas.Permissions.properties.permissions.type
- schemas.Permissions.type
- schemas.ResourceSearchResult.description
- schemas.ResourceSearchResult.id
- schemas.ResourceSearchResult.properties.additionalAttributes.additionalProperties.description
- schemas.ResourceSearchResult.properties.additionalAttributes.additionalProperties.type
- schemas.ResourceSearchResult.properties.additionalAttributes.description
- schemas.ResourceSearchResult.properties.additionalAttributes.type
- schemas.ResourceSearchResult.properties.assetType.description
- schemas.ResourceSearchResult.properties.assetType.type
- schemas.ResourceSearchResult.properties.description.description
- schemas.ResourceSearchResult.properties.description.type
- schemas.ResourceSearchResult.properties.displayName.description
- schemas.ResourceSearchResult.properties.displayName.type
- schemas.ResourceSearchResult.properties.labels.additionalProperties.type
- schemas.ResourceSearchResult.properties.labels.description
- schemas.ResourceSearchResult.properties.labels.type
- schemas.ResourceSearchResult.properties.location.description
- schemas.ResourceSearchResult.properties.location.type
- schemas.ResourceSearchResult.properties.name.description
- schemas.ResourceSearchResult.properties.name.type
- schemas.ResourceSearchResult.properties.networkTags.description
- schemas.ResourceSearchResult.properties.networkTags.items.type
- schemas.ResourceSearchResult.properties.networkTags.type
- schemas.ResourceSearchResult.properties.project.description
- schemas.ResourceSearchResult.properties.project.type
- schemas.ResourceSearchResult.type
- schemas.SearchAllIamPoliciesResponse.description
- schemas.SearchAllIamPoliciesResponse.id
- schemas.SearchAllIamPoliciesResponse.properties.nextPageToken.description
- schemas.SearchAllIamPoliciesResponse.properties.nextPageToken.type
- schemas.SearchAllIamPoliciesResponse.properties.results.description
- schemas.SearchAllIamPoliciesResponse.properties.results.items.$ref
- schemas.SearchAllIamPoliciesResponse.properties.results.type
- schemas.SearchAllIamPoliciesResponse.type
- schemas.SearchAllResourcesResponse.description
- schemas.SearchAllResourcesResponse.id
- schemas.SearchAllResourcesResponse.properties.nextPageToken.description
- schemas.SearchAllResourcesResponse.properties.nextPageToken.type
- schemas.SearchAllResourcesResponse.properties.results.description
- schemas.SearchAllResourcesResponse.properties.results.items.$ref
- schemas.SearchAllResourcesResponse.properties.results.type
- schemas.SearchAllResourcesResponse.type

The following keys were added:
- schemas.Asset.properties.updateTime.description
- schemas.Asset.properties.updateTime.format
- schemas.Asset.properties.updateTime.type

The following keys were changed:
- resources.v1.methods.batchGetAssetsHistory.description
- resources.v1.methods.exportAssets.description
- schemas.Asset.properties.assetType.description
- schemas.Asset.properties.name.description
- schemas.AuditConfig.description
- schemas.AuditLogConfig.description
- schemas.BigQueryDestination.description
- schemas.ExportAssetsRequest.properties.outputConfig.description
- schemas.OutputConfig.properties.bigqueryDestination.description
- schemas.Resource.properties.discoveryDocumentUri.description
- schemas.Resource.properties.discoveryName.description
- schemas.Resource.properties.parent.description
- schemas.Resource.properties.resourceUrl.description
- schemas.Resource.properties.version.description
- schemas.TimeWindow.description

#### cloudasset:v1beta1
The following keys were changed:
- resources.organizations.methods.batchGetAssetsHistory.description
- resources.projects.methods.batchGetAssetsHistory.description
- schemas.AuditConfig.description
- schemas.AuditLogConfig.description
  • Loading branch information
yoshi-automation authored and JustinBeckwith committed Jun 16, 2020
1 parent 66842f3 commit 423ea12
Show file tree
Hide file tree
Showing 8 changed files with 129 additions and 871 deletions.
270 changes: 21 additions & 249 deletions discovery/cloudasset-v1.json

Large diffs are not rendered by default.

10 changes: 5 additions & 5 deletions discovery/cloudasset-v1beta1.json
Expand Up @@ -171,7 +171,7 @@
"organizations": {
"methods": {
"batchGetAssetsHistory": {
"description": "Batch gets the update history of assets that overlap a time window.\nFor RESOURCE content, this API outputs history with asset in both\nnon-delete or deleted status.\nFor IAM_POLICY content, this API outputs history when the asset and its\nattached IAM POLICY both exist. This can create gaps in the output history.\nIf a specified asset does not exist, this API returns an INVALID_ARGUMENT\nerror.",
"description": "Batch gets the update history of assets that overlap a time window.\nFor IAM_POLICY content, this API outputs history when the asset and its\nattached IAM POLICY both exist. This can create gaps in the output history.\nOtherwise, this API outputs history with asset in both non-delete or\ndeleted status.\nIf a specified asset does not exist, this API returns an INVALID_ARGUMENT\nerror.",
"flatPath": "v1beta1/organizations/{organizationsId}:batchGetAssetsHistory",
"httpMethod": "GET",
"id": "cloudasset.organizations.batchGetAssetsHistory",
Expand Down Expand Up @@ -287,7 +287,7 @@
"projects": {
"methods": {
"batchGetAssetsHistory": {
"description": "Batch gets the update history of assets that overlap a time window.\nFor RESOURCE content, this API outputs history with asset in both\nnon-delete or deleted status.\nFor IAM_POLICY content, this API outputs history when the asset and its\nattached IAM POLICY both exist. This can create gaps in the output history.\nIf a specified asset does not exist, this API returns an INVALID_ARGUMENT\nerror.",
"description": "Batch gets the update history of assets that overlap a time window.\nFor IAM_POLICY content, this API outputs history when the asset and its\nattached IAM POLICY both exist. This can create gaps in the output history.\nOtherwise, this API outputs history with asset in both non-delete or\ndeleted status.\nIf a specified asset does not exist, this API returns an INVALID_ARGUMENT\nerror.",
"flatPath": "v1beta1/projects/{projectsId}:batchGetAssetsHistory",
"httpMethod": "GET",
"id": "cloudasset.projects.batchGetAssetsHistory",
Expand Down Expand Up @@ -401,7 +401,7 @@
}
}
},
"revision": "20200515",
"revision": "20200605",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"Asset": {
Expand All @@ -428,7 +428,7 @@
"type": "object"
},
"AuditConfig": {
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"sampleservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:aliya@example.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts jose@example.com from DATA_READ logging, and\naliya@example.com from DATA_WRITE logging.",
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\",\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\"\n },\n {\n \"log_type\": \"ADMIN_READ\"\n }\n ]\n },\n {\n \"service\": \"sampleservice.googleapis.com\",\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\"\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:aliya@example.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts jose@example.com from DATA_READ logging, and\naliya@example.com from DATA_WRITE logging.",
"id": "AuditConfig",
"properties": {
"auditLogConfigs": {
Expand All @@ -446,7 +446,7 @@
"type": "object"
},
"AuditLogConfig": {
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\njose@example.com from DATA_READ logging.",
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\"\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\njose@example.com from DATA_READ logging.",
"id": "AuditLogConfig",
"properties": {
"exemptedMembers": {
Expand Down
18 changes: 9 additions & 9 deletions discovery/cloudasset-v1p1beta1.json
Expand Up @@ -108,7 +108,7 @@
"iamPolicies": {
"methods": {
"searchAll": {
"description": "Searches all the IAM policies under a given accessible CRM scope\n(project/folder/organization). This RPC gives callers\nespecially admins the ability to search all the IAM policies under a scope,\neven if they don't have .getIamPolicy permission of all the IAM policies.\nCallers should have cloud.assets.SearchAllIamPolicies permission on the\nrequested scope, otherwise it will be rejected.",
"description": "Searches all the IAM policies within a given accessible CRM scope\n(project/folder/organization). This RPC gives callers especially\nadministrators the ability to search all the IAM policies within a scope,\neven if they don't have `.getIamPolicy` permission of all the IAM policies.\nCallers should have `cloud.assets.SearchAllIamPolicies` permission on the\nrequested scope, otherwise the request will be rejected.",
"flatPath": "v1p1beta1/{v1p1beta1Id}/{v1p1beta1Id1}/iamPolicies:searchAll",
"httpMethod": "GET",
"id": "cloudasset.iamPolicies.searchAll",
Expand All @@ -128,12 +128,12 @@
"type": "string"
},
"query": {
"description": "Optional. The query statement.\nExamples:\n* \"policy:myuser@mydomain.com\"\n* \"policy:(myuser@mydomain.com viewer)\"",
"description": "Optional. The query statement. Examples:\n\n* \"policy:myuser@mydomain.com\"\n* \"policy:(myuser@mydomain.com viewer)\"",
"location": "query",
"type": "string"
},
"scope": {
"description": "Required. The relative name of an asset. The search is limited to the resources\nwithin the `scope`. The allowed value must be:\n* Organization number (such as \"organizations/123\")\n* Folder number(such as \"folders/1234\")\n* Project number (such as \"projects/12345\")\n* Project id (such as \"projects/abc\")",
"description": "Required. The relative name of an asset. The search is limited to the resources\nwithin the `scope`. The allowed value must be:\n\n* Organization number (such as \"organizations/123\")\n* Folder number(such as \"folders/1234\")\n* Project number (such as \"projects/12345\")\n* Project id (such as \"projects/abc\")",
"location": "path",
"pattern": "^[^/]+/[^/]+$",
"required": true,
Expand All @@ -153,7 +153,7 @@
"resources": {
"methods": {
"searchAll": {
"description": "Searches all the resources under a given accessible CRM scope\n(project/folder/organization). This RPC gives callers\nespecially admins the ability to search all the resources under a scope,\neven if they don't have .get permission of all the resources. Callers\nshould have cloud.assets.SearchAllResources permission on the requested\nscope, otherwise it will be rejected.",
"description": "Searches all the resources within a given accessible CRM scope\n(project/folder/organization). This RPC gives callers especially\nadministrators the ability to search all the resources within a scope, even\nif they don't have `.get` permission of all the resources. Callers should\nhave `cloud.assets.SearchAllResources` permission on the requested scope,\notherwise the request will be rejected.",
"flatPath": "v1p1beta1/{v1p1beta1Id}/{v1p1beta1Id1}/resources:searchAll",
"httpMethod": "GET",
"id": "cloudasset.resources.searchAll",
Expand All @@ -168,7 +168,7 @@
"type": "string"
},
"orderBy": {
"description": "Optional. A comma separated list of fields specifying the sorting order of the\nresults. The default order is ascending. Add \" desc\" after the field name\nto indicate descending order. Redundant space characters are ignored. For\nexample, \" foo , bar desc \".",
"description": "Optional. A comma separated list of fields specifying the sorting order of the\nresults. The default order is ascending. Add ` DESC` after the field name\nto indicate descending order. Redundant space characters are ignored. For\nexample, ` location DESC , name `.",
"location": "query",
"type": "string"
},
Expand All @@ -189,7 +189,7 @@
"type": "string"
},
"scope": {
"description": "Required. The relative name of an asset. The search is limited to the resources\nwithin the `scope`. The allowed value must be:\n* Organization number (such as \"organizations/123\")\n* Folder number(such as \"folders/1234\")\n* Project number (such as \"projects/12345\")\n* Project id (such as \"projects/abc\")",
"description": "Required. The relative name of an asset. The search is limited to the resources\nwithin the `scope`. The allowed value must be:\n\n* Organization number (such as \"organizations/123\")\n* Folder number(such as \"folders/1234\")\n* Project number (such as \"projects/12345\")\n* Project id (such as \"projects/abc\")",
"location": "path",
"pattern": "^[^/]+/[^/]+$",
"required": true,
Expand All @@ -207,11 +207,11 @@
}
}
},
"revision": "20200515",
"revision": "20200605",
"rootUrl": "https://cloudasset.googleapis.com/",
"schemas": {
"AuditConfig": {
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n },\n {\n \"log_type\": \"ADMIN_READ\",\n }\n ]\n },\n {\n \"service\": \"sampleservice.googleapis.com\"\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:aliya@example.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts jose@example.com from DATA_READ logging, and\naliya@example.com from DATA_WRITE logging.",
"description": "Specifies the audit configuration for a service.\nThe configuration determines which permission types are logged, and what\nidentities, if any, are exempted from logging.\nAn AuditConfig must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service,\nthe union of the two AuditConfigs is used for that service: the log_types\nspecified in each AuditConfig are enabled, and the exempted_members in each\nAuditLogConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n {\n \"audit_configs\": [\n {\n \"service\": \"allServices\",\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\"\n },\n {\n \"log_type\": \"ADMIN_READ\"\n }\n ]\n },\n {\n \"service\": \"sampleservice.googleapis.com\",\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\"\n },\n {\n \"log_type\": \"DATA_WRITE\",\n \"exempted_members\": [\n \"user:aliya@example.com\"\n ]\n }\n ]\n }\n ]\n }\n\nFor sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ\nlogging. It also exempts jose@example.com from DATA_READ logging, and\naliya@example.com from DATA_WRITE logging.",
"id": "AuditConfig",
"properties": {
"auditLogConfigs": {
Expand All @@ -229,7 +229,7 @@
"type": "object"
},
"AuditLogConfig": {
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\",\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\njose@example.com from DATA_READ logging.",
"description": "Provides the configuration for logging a type of permissions.\nExample:\n\n {\n \"audit_log_configs\": [\n {\n \"log_type\": \"DATA_READ\",\n \"exempted_members\": [\n \"user:jose@example.com\"\n ]\n },\n {\n \"log_type\": \"DATA_WRITE\"\n }\n ]\n }\n\nThis enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting\njose@example.com from DATA_READ logging.",
"id": "AuditLogConfig",
"properties": {
"exemptedMembers": {
Expand Down

0 comments on commit 423ea12

Please sign in to comment.