mirror of
https://github.com/OMGeeky/google-apis-rs.git
synced 2026-02-23 15:49:49 +01:00
Regen all remaining APIs with preproc - more changes than anticipated
This commit is contained in:
@@ -513,12 +513,13 @@ impl RequestValue for SetIamPolicyRequest {}
|
||||
|
||||
/// Represents an expression text. Example:
|
||||
///
|
||||
/// title: "User account presence"
|
||||
/// description: "Determines whether the request has a user account"
|
||||
/// expression: "size(request.user) > 0"
|
||||
/// ````text
|
||||
/// title: "User account presence"
|
||||
/// description: "Determines whether the request has a user account"
|
||||
/// expression: "size(request.user) > 0"
|
||||
/// ````
|
||||
///
|
||||
/// This type is not used in any activity, and only used as *part* of another schema.
|
||||
///
|
||||
#[derive(Default, Clone, Debug, Serialize, Deserialize)]
|
||||
pub struct Expr {
|
||||
/// An optional description of the expression. This is a longer text which
|
||||
@@ -545,25 +546,26 @@ impl Part for Expr {}
|
||||
/// Provides the configuration for logging a type of permissions.
|
||||
/// Example:
|
||||
///
|
||||
/// ````text
|
||||
/// {
|
||||
/// "audit_log_configs": [
|
||||
/// {
|
||||
/// "audit_log_configs": [
|
||||
/// {
|
||||
/// "log_type": "DATA_READ",
|
||||
/// "exempted_members": [
|
||||
/// "user:foo@gmail.com"
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "DATA_WRITE",
|
||||
/// }
|
||||
/// "log_type": "DATA_READ",
|
||||
/// "exempted_members": [
|
||||
/// "user:foo@gmail.com"
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "DATA_WRITE",
|
||||
/// }
|
||||
/// ]
|
||||
/// }
|
||||
/// ````
|
||||
///
|
||||
/// This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting
|
||||
/// foo@gmail.com from DATA_READ logging.
|
||||
///
|
||||
/// This type is not used in any activity, and only used as *part* of another schema.
|
||||
///
|
||||
#[derive(Default, Clone, Debug, Serialize, Deserialize)]
|
||||
pub struct AuditLogConfig {
|
||||
/// Specifies the identities that do not cause logging for this type of
|
||||
@@ -633,7 +635,8 @@ pub struct Location {
|
||||
pub display_name: Option<String>,
|
||||
/// Cross-service attributes for the location. For example
|
||||
///
|
||||
/// {"cloud.googleapis.com/region": "us-east1"}
|
||||
/// ````text
|
||||
/// {"cloud.googleapis.com/region": "us-east1"}````
|
||||
pub labels: Option<HashMap<String, String>>,
|
||||
/// The canonical id for this location. For example: `"us-east1"`.
|
||||
#[serde(rename="locationId")]
|
||||
@@ -652,7 +655,6 @@ impl Part for Location {}
|
||||
/// Defines an Identity and Access Management (IAM) policy. It is used to
|
||||
/// specify access control policies for Cloud Platform resources.
|
||||
///
|
||||
///
|
||||
/// A `Policy` consists of a list of `bindings`. A `binding` binds a list of
|
||||
/// `members` to a `role`, where the members can be user accounts, Google groups,
|
||||
/// Google domains, and service accounts. A `role` is a named list of permissions
|
||||
@@ -660,37 +662,40 @@ impl Part for Location {}
|
||||
///
|
||||
/// **JSON Example**
|
||||
///
|
||||
/// ````text
|
||||
/// {
|
||||
/// "bindings": [
|
||||
/// {
|
||||
/// "bindings": [
|
||||
/// {
|
||||
/// "role": "roles/owner",
|
||||
/// "members": [
|
||||
/// "user:mike@example.com",
|
||||
/// "group:admins@example.com",
|
||||
/// "domain:google.com",
|
||||
/// "serviceAccount:my-other-app@appspot.gserviceaccount.com"
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "role": "roles/viewer",
|
||||
/// "members": ["user:sean@example.com"]
|
||||
/// }
|
||||
/// "role": "roles/owner",
|
||||
/// "members": [
|
||||
/// "user:mike@example.com",
|
||||
/// "group:admins@example.com",
|
||||
/// "domain:google.com",
|
||||
/// "serviceAccount:my-other-app@appspot.gserviceaccount.com"
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "role": "roles/viewer",
|
||||
/// "members": ["user:sean@example.com"]
|
||||
/// }
|
||||
/// ]
|
||||
/// }
|
||||
/// ````
|
||||
///
|
||||
/// **YAML Example**
|
||||
///
|
||||
/// bindings:
|
||||
/// - members:
|
||||
/// - user:mike@example.com
|
||||
/// - group:admins@example.com
|
||||
/// - domain:google.com
|
||||
/// - serviceAccount:my-other-app@appspot.gserviceaccount.com
|
||||
/// role: roles/owner
|
||||
/// - members:
|
||||
/// - user:sean@example.com
|
||||
/// role: roles/viewer
|
||||
///
|
||||
/// ````text
|
||||
/// bindings:
|
||||
/// - members:
|
||||
/// - user:mike@example.com
|
||||
/// - group:admins@example.com
|
||||
/// - domain:google.com
|
||||
/// - serviceAccount:my-other-app@appspot.gserviceaccount.com
|
||||
/// role: roles/owner
|
||||
/// - members:
|
||||
/// - user:sean@example.com
|
||||
/// role: roles/viewer
|
||||
/// ````
|
||||
///
|
||||
/// For a description of IAM and its features, see the
|
||||
/// [IAM developer's guide](https://cloud.google.com/iam/docs).
|
||||
@@ -702,7 +707,6 @@ impl Part for Location {}
|
||||
///
|
||||
/// * [locations functions set iam policy projects](struct.ProjectLocationFunctionSetIamPolicyCall.html) (response)
|
||||
/// * [locations functions get iam policy projects](struct.ProjectLocationFunctionGetIamPolicyCall.html) (response)
|
||||
///
|
||||
#[derive(Default, Clone, Debug, Serialize, Deserialize)]
|
||||
pub struct Policy {
|
||||
/// Specifies cloud audit logging configuration for this policy.
|
||||
@@ -1059,48 +1063,49 @@ impl RequestValue for GenerateUploadUrlRequest {}
|
||||
///
|
||||
/// Example Policy with multiple AuditConfigs:
|
||||
///
|
||||
/// ````text
|
||||
/// {
|
||||
/// "audit_configs": [
|
||||
/// {
|
||||
/// "audit_configs": [
|
||||
/// "service": "allServices"
|
||||
/// "audit_log_configs": [
|
||||
/// {
|
||||
/// "service": "allServices"
|
||||
/// "audit_log_configs": [
|
||||
/// {
|
||||
/// "log_type": "DATA_READ",
|
||||
/// "exempted_members": [
|
||||
/// "user:foo@gmail.com"
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "DATA_WRITE",
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "ADMIN_READ",
|
||||
/// }
|
||||
/// "log_type": "DATA_READ",
|
||||
/// "exempted_members": [
|
||||
/// "user:foo@gmail.com"
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "service": "fooservice.googleapis.com"
|
||||
/// "audit_log_configs": [
|
||||
/// {
|
||||
/// "log_type": "DATA_READ",
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "DATA_WRITE",
|
||||
/// "exempted_members": [
|
||||
/// "user:bar@gmail.com"
|
||||
/// ]
|
||||
/// }
|
||||
/// "log_type": "DATA_WRITE",
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "ADMIN_READ",
|
||||
/// }
|
||||
/// ]
|
||||
/// },
|
||||
/// {
|
||||
/// "service": "fooservice.googleapis.com"
|
||||
/// "audit_log_configs": [
|
||||
/// {
|
||||
/// "log_type": "DATA_READ",
|
||||
/// },
|
||||
/// {
|
||||
/// "log_type": "DATA_WRITE",
|
||||
/// "exempted_members": [
|
||||
/// "user:bar@gmail.com"
|
||||
/// ]
|
||||
/// }
|
||||
/// ]
|
||||
/// }
|
||||
/// ]
|
||||
/// }
|
||||
/// ````
|
||||
///
|
||||
/// For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
|
||||
/// logging. It also exempts foo@gmail.com from DATA_READ logging, and
|
||||
/// bar@gmail.com from DATA_WRITE logging.
|
||||
///
|
||||
/// This type is not used in any activity, and only used as *part* of another schema.
|
||||
///
|
||||
#[derive(Default, Clone, Debug, Serialize, Deserialize)]
|
||||
pub struct AuditConfig {
|
||||
/// The configuration for logging of each type of permission.
|
||||
|
||||
Reference in New Issue
Block a user