Skip to content

Commit 2305000

Browse files
feat(logging)!: update the API
BREAKING CHANGE: This release has breaking changes. #### logging:v2 The following keys were deleted: - schemas.AuditConfig.description - schemas.AuditConfig.id - schemas.AuditConfig.properties.auditLogConfigs.description - schemas.AuditConfig.properties.auditLogConfigs.items.$ref - schemas.AuditConfig.properties.auditLogConfigs.type - schemas.AuditConfig.properties.service.description - schemas.AuditConfig.properties.service.type - schemas.AuditConfig.type - schemas.AuditLogConfig.description - schemas.AuditLogConfig.id - schemas.AuditLogConfig.properties.exemptedMembers.description - schemas.AuditLogConfig.properties.exemptedMembers.items.type - schemas.AuditLogConfig.properties.exemptedMembers.type - schemas.AuditLogConfig.properties.logType.description - schemas.AuditLogConfig.properties.logType.enum - schemas.AuditLogConfig.properties.logType.enumDescriptions - schemas.AuditLogConfig.properties.logType.type - schemas.AuditLogConfig.type - schemas.Policy.properties.auditConfigs.description - schemas.Policy.properties.auditConfigs.items.$ref - schemas.Policy.properties.auditConfigs.type The following keys were changed: - resources.billingAccounts.resources.locations.resources.buckets.resources.views.methods.create.parameters.viewId.description - resources.folders.resources.locations.resources.buckets.resources.views.methods.create.parameters.viewId.description - resources.locations.resources.buckets.resources.views.methods.create.parameters.viewId.description - resources.organizations.resources.locations.resources.buckets.resources.views.methods.create.parameters.viewId.description - resources.projects.resources.locations.resources.buckets.resources.views.methods.create.parameters.viewId.description
1 parent 870646f commit 2305000

File tree

2 files changed

+11
-96
lines changed

2 files changed

+11
-96
lines changed

discovery/logging-v2.json

Lines changed: 6 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -910,7 +910,7 @@
910910
"type": "string"
911911
},
912912
"viewId": {
913-
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.",
913+
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.",
914914
"location": "query",
915915
"type": "string"
916916
}
@@ -2736,7 +2736,7 @@
27362736
"type": "string"
27372737
},
27382738
"viewId": {
2739-
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.",
2739+
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.",
27402740
"location": "query",
27412741
"type": "string"
27422742
}
@@ -4317,7 +4317,7 @@
43174317
"type": "string"
43184318
},
43194319
"viewId": {
4320-
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.",
4320+
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.",
43214321
"location": "query",
43224322
"type": "string"
43234323
}
@@ -5554,7 +5554,7 @@
55545554
"type": "string"
55555555
},
55565556
"viewId": {
5557-
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.",
5557+
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.",
55585558
"location": "query",
55595559
"type": "string"
55605560
}
@@ -7356,7 +7356,7 @@
73567356
"type": "string"
73577357
},
73587358
"viewId": {
7359-
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.",
7359+
"description": "Required. A client-assigned identifier such as \"my-view\". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.",
73607360
"location": "query",
73617361
"type": "string"
73627362
}
@@ -8922,57 +8922,9 @@
89228922
}
89238923
}
89248924
},
8925-
"revision": "20250110",
8925+
"revision": "20250124",
89268926
"rootUrl": "https://logging.googleapis.com/",
89278927
"schemas": {
8928-
"AuditConfig": {
8929-
"description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs.If there are AuditConfigs for both allServices and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted.Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:[email protected]\" ] }, { \"log_type\": \"DATA_WRITE\" }, { \"log_type\": \"ADMIN_READ\" } ] }, { \"service\": \"sampleservice.googleapis.com\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\" }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:[email protected]\" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts [email protected] from DATA_READ logging, and [email protected] from DATA_WRITE logging.",
8930-
"id": "AuditConfig",
8931-
"properties": {
8932-
"auditLogConfigs": {
8933-
"description": "The configuration for logging of each type of permission.",
8934-
"items": {
8935-
"$ref": "AuditLogConfig"
8936-
},
8937-
"type": "array"
8938-
},
8939-
"service": {
8940-
"description": "Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.",
8941-
"type": "string"
8942-
}
8943-
},
8944-
"type": "object"
8945-
},
8946-
"AuditLogConfig": {
8947-
"description": "Provides the configuration for logging a type of permissions. Example: { \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:[email protected]\" ] }, { \"log_type\": \"DATA_WRITE\" } ] } This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting [email protected] from DATA_READ logging.",
8948-
"id": "AuditLogConfig",
8949-
"properties": {
8950-
"exemptedMembers": {
8951-
"description": "Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.",
8952-
"items": {
8953-
"type": "string"
8954-
},
8955-
"type": "array"
8956-
},
8957-
"logType": {
8958-
"description": "The log type that this config enables.",
8959-
"enum": [
8960-
"LOG_TYPE_UNSPECIFIED",
8961-
"ADMIN_READ",
8962-
"DATA_WRITE",
8963-
"DATA_READ"
8964-
],
8965-
"enumDescriptions": [
8966-
"Default case. Should never be this.",
8967-
"Admin reads. Example: CloudIAM getIamPolicy",
8968-
"Data writes. Example: CloudSQL Users create",
8969-
"Data reads. Example: CloudSQL Users list"
8970-
],
8971-
"type": "string"
8972-
}
8973-
},
8974-
"type": "object"
8975-
},
89768928
"BigQueryDataset": {
89778929
"description": "Describes a BigQuery dataset that was created by a link.",
89788930
"id": "BigQueryDataset",
@@ -10927,13 +10879,6 @@
1092710879
"description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members, or principals, to a single role. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user:[email protected]\", \"group:[email protected]\", \"domain:google.com\", \"serviceAccount:[email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user:[email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } YAML example: bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).",
1092810880
"id": "Policy",
1092910881
"properties": {
10930-
"auditConfigs": {
10931-
"description": "Specifies cloud audit logging configuration for this policy.",
10932-
"items": {
10933-
"$ref": "AuditConfig"
10934-
},
10935-
"type": "array"
10936-
},
1093710882
"bindings": {
1093810883
"description": "Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal.The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:[email protected], and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.",
1093910884
"items": {

src/apis/logging/v2.ts

Lines changed: 5 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -145,32 +145,6 @@ export namespace logging_v2 {
145145
}
146146
}
147147

148-
/**
149-
* Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs.If there are AuditConfigs for both allServices and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted.Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices", "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:[email protected]" ] \}, { "log_type": "DATA_WRITE" \}, { "log_type": "ADMIN_READ" \} ] \}, { "service": "sampleservice.googleapis.com", "audit_log_configs": [ { "log_type": "DATA_READ" \}, { "log_type": "DATA_WRITE", "exempted_members": [ "user:[email protected]" ] \} ] \} ] \} For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts [email protected] from DATA_READ logging, and [email protected] from DATA_WRITE logging.
150-
*/
151-
export interface Schema$AuditConfig {
152-
/**
153-
* The configuration for logging of each type of permission.
154-
*/
155-
auditLogConfigs?: Schema$AuditLogConfig[];
156-
/**
157-
* Specifies a service that will be enabled for audit logging. For example, storage.googleapis.com, cloudsql.googleapis.com. allServices is a special value that covers all services.
158-
*/
159-
service?: string | null;
160-
}
161-
/**
162-
* Provides the configuration for logging a type of permissions. Example: { "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:[email protected]" ] \}, { "log_type": "DATA_WRITE" \} ] \} This enables 'DATA_READ' and 'DATA_WRITE' logging, while exempting [email protected] from DATA_READ logging.
163-
*/
164-
export interface Schema$AuditLogConfig {
165-
/**
166-
* Specifies the identities that do not cause logging for this type of permission. Follows the same format of Binding.members.
167-
*/
168-
exemptedMembers?: string[] | null;
169-
/**
170-
* The log type that this config enables.
171-
*/
172-
logType?: string | null;
173-
}
174148
/**
175149
* Describes a BigQuery dataset that was created by a link.
176150
*/
@@ -1492,10 +1466,6 @@ export namespace logging_v2 {
14921466
* An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources.A Policy is a collection of bindings. A binding binds one or more members, or principals, to a single role. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A role is a named list of permissions; each role can be an IAM predefined role or a user-created custom role.For some types of Google Cloud resources, a binding can also specify a condition, which is a logical expression that allows access to a resource only if the expression evaluates to true. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the IAM documentation (https://cloud.google.com/iam/help/conditions/resource-policies).JSON example: { "bindings": [ { "role": "roles/resourcemanager.organizationAdmin", "members": [ "user:[email protected]", "group:[email protected]", "domain:google.com", "serviceAccount:[email protected]" ] \}, { "role": "roles/resourcemanager.organizationViewer", "members": [ "user:[email protected]" ], "condition": { "title": "expirable access", "description": "Does not grant access after Sep 2020", "expression": "request.time < timestamp('2020-10-01T00:00:00.000Z')", \} \} ], "etag": "BwWWja0YfJA=", "version": 3 \} YAML example: bindings: - members: - user:[email protected] - group:[email protected] - domain:google.com - serviceAccount:[email protected] role: roles/resourcemanager.organizationAdmin - members: - user:[email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the IAM documentation (https://cloud.google.com/iam/docs/).
14931467
*/
14941468
export interface Schema$Policy {
1495-
/**
1496-
* Specifies cloud audit logging configuration for this policy.
1497-
*/
1498-
auditConfigs?: Schema$AuditConfig[];
14991469
/**
15001470
* Associates a list of members, or principals, with a role. Optionally, may specify a condition that determines how and when the bindings are applied. Each of the bindings must contain at least one principal.The bindings in a Policy can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the bindings grant 50 different roles to user:[email protected], and not to any other principal, then you can add another 1,450 principals to the bindings in the Policy.
15011471
*/
@@ -4546,7 +4516,7 @@ export namespace logging_v2 {
45464516
*/
45474517
parent?: string;
45484518
/**
4549-
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.
4519+
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.
45504520
*/
45514521
viewId?: string;
45524522

@@ -10352,7 +10322,7 @@ export namespace logging_v2 {
1035210322
*/
1035310323
parent?: string;
1035410324
/**
10355-
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.
10325+
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.
1035610326
*/
1035710327
viewId?: string;
1035810328

@@ -14982,7 +14952,7 @@ export namespace logging_v2 {
1498214952
*/
1498314953
parent?: string;
1498414954
/**
14985-
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.
14955+
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.
1498614956
*/
1498714957
viewId?: string;
1498814958

@@ -18803,7 +18773,7 @@ export namespace logging_v2 {
1880318773
*/
1880418774
parent?: string;
1880518775
/**
18806-
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.
18776+
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.
1880718777
*/
1880818778
viewId?: string;
1880918779

@@ -24170,7 +24140,7 @@ export namespace logging_v2 {
2417024140
*/
2417124141
parent?: string;
2417224142
/**
24173-
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, hyphens, and periods.
24143+
* Required. A client-assigned identifier such as "my-view". Identifiers are limited to 100 characters and can include only letters, digits, underscores, and hyphens.
2417424144
*/
2417524145
viewId?: string;
2417624146

0 commit comments

Comments
 (0)