@@ -115,50 +115,55 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
115115 + "key_name\030 \005 \001 (\t \022 Y\n \037 service_account_delega"
116116 + "tion_info\030 \006 \003 (\013 20.google.cloud.audit.Ser"
117117 + "viceAccountDelegationInfo\022 \031 \n \021 principal_s"
118- + "ubject\030 \010 \001 (\t \" \226 \001 \n \021 AuthorizationInfo\022 \020 \n \010 re"
118+ + "ubject\030 \010 \001 (\t \" \330 \002 \n \021 AuthorizationInfo\022 \020 \n \010 re"
119119 + "source\030 \001 \001 (\t \022 \022 \n \n permission\030 \002 \001 (\t \022 \017 \n \007 gran"
120120 + "ted\030 \003 \001 (\010 \022 J\n \023 resource_attributes\030 \005 \001 (\013 2-"
121121 + ".google.rpc.context.AttributeContext.Res"
122- + "ource\" \365 \001 \n \017 RequestMetadata\022 \021 \n \t caller_ip\030 \001 "
123- + " \001 (\t \022 \" \n \032 caller_supplied_user_agent\030 \002 \001 (\t "
124- + "\022 \026 \n \016 caller_network\030 \003 \001 (\t \022 H\n \022 request_attr"
125- + "ibutes\030 \007 \001 (\013 2,.google.rpc.context.Attrib"
126- + "uteContext.Request\022 I\n \026 destination_attrib"
127- + "utes\030 \010 \001 (\013 2).google.rpc.context.Attribut"
128- + "eContext.Peer\" I\n \020 ResourceLocation\022 \031 \n \021 cur"
129- + "rent_locations\030 \001 \003 (\t \022 \032 \n \022 original_locatio"
130- + "ns\030 \002 \003 (\t \" \303 \003 \n \034 ServiceAccountDelegationInf"
131- + "o\022 \031 \n \021 principal_subject\030 \003 \001 (\t \022 e\n \025 first_pa"
132- + "rty_principal\030 \001 \001 (\013 2D.google.cloud.audit"
133- + ".ServiceAccountDelegationInfo.FirstParty"
134- + "PrincipalH\000 \022 e\n \025 third_party_principal\030 \002 \001 "
135- + "(\013 2D.google.cloud.audit.ServiceAccountDe"
136- + "legationInfo.ThirdPartyPrincipalH\000 \032 a\n \023 Fi"
137- + "rstPartyPrincipal\022 \027 \n \017 principal_email\030 \001 \001 "
138- + "(\t \022 1\n \020 service_metadata\030 \002 \001 (\013 2\027 .google.pr"
139- + "otobuf.Struct\032 J\n \023 ThirdPartyPrincipal\022 3\n \022 "
140- + "third_party_claims\030 \001 \001 (\013 2\027 .google.protob"
141- + "uf.StructB\013 \n \t Authority\" d\n \023 PolicyViolatio"
142- + "nInfo\022 M\n \031 org_policy_violation_info\030 \001 \001 (\013 "
143- + "2*.google.cloud.audit.OrgPolicyViolation"
144- + "Info\" \262 \002 \n \026 OrgPolicyViolationInfo\022 -\n \007 paylo"
145- + "ad\030 \001 \001 (\013 2\027 .google.protobuf.StructB\003 \340 A\001 \022 \032 "
146- + "\n \r resource_type\030 \002 \001 (\t B\003 \340 A\001 \022 X\n \r resource_t"
147- + "ags\030 \003 \003 (\013 2<.google.cloud.audit.OrgPolicy"
148- + "ViolationInfo.ResourceTagsEntryB\003 \340 A\001 \022 >\n \016 "
149- + "violation_info\030 \004 \003 (\013 2!.google.cloud.audi"
150- + "t.ViolationInfoB\003 \340 A\001 \032 3\n \021 ResourceTagsEntr"
151- + "y\022 \013 \n \003 key\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \227 \002 \n \r Vi"
152- + "olationInfo\022 \027 \n \n constraint\030 \001 \001 (\t B\003 \340 A\001 \022 \032 \n \r "
153- + "error_message\030 \002 \001 (\t B\003 \340 A\001 \022 \032 \n \r checked_valu"
154- + "e\030 \003 \001 (\t B\003 \340 A\001 \022 F\n \013 policy_type\030 \004 \001 (\016 2,.goog"
155- + "le.cloud.audit.ViolationInfo.PolicyTypeB"
156- + "\003 \340 A\001 \" m\n \n PolicyType\022 \033 \n \027 POLICY_TYPE_UNSPEC"
157- + "IFIED\020 \000 \022 \026 \n \022 BOOLEAN_CONSTRAINT\020 \001 \022 \023 \n \017 LIST_"
158- + "CONSTRAINT\020 \002 \022 \025 \n \021 CUSTOM_CONSTRAINT\020 \003 Be\n \026 c"
159- + "om.google.cloud.auditB\r AuditLogProtoP\001 Z7"
160- + "google.golang.org/genproto/googleapis/cl"
161- + "oud/audit;audit\370 \001 \001 b\006 proto3"
122+ + "ource\022 M\n \017 permission_type\030 \007 \001 (\016 24.google."
123+ + "cloud.audit.AuthorizationInfo.Permission"
124+ + "Type\" q\n \016 PermissionType\022 \037 \n \033 PERMISSION_TYP"
125+ + "E_UNSPECIFIED\020 \000 \022 \016 \n \n ADMIN_READ\020 \001 \022 \017 \n \013 ADMIN"
126+ + "_WRITE\020 \002 \022 \r \n \t DATA_READ\020 \003 \022 \016 \n \n DATA_WRITE\020 \004 \" "
127+ + "\365 \001 \n \017 RequestMetadata\022 \021 \n \t caller_ip\030 \001 \001 (\t \022 \" "
128+ + "\n \032 caller_supplied_user_agent\030 \002 \001 (\t \022 \026 \n \016 ca"
129+ + "ller_network\030 \003 \001 (\t \022 H\n \022 request_attributes"
130+ + "\030 \007 \001 (\013 2,.google.rpc.context.AttributeCon"
131+ + "text.Request\022 I\n \026 destination_attributes\030 \010 "
132+ + " \001 (\013 2).google.rpc.context.AttributeConte"
133+ + "xt.Peer\" I\n \020 ResourceLocation\022 \031 \n \021 current_l"
134+ + "ocations\030 \001 \003 (\t \022 \032 \n \022 original_locations\030 \002 \003 "
135+ + "(\t \" \303 \003 \n \034 ServiceAccountDelegationInfo\022 \031 \n \021 p"
136+ + "rincipal_subject\030 \003 \001 (\t \022 e\n \025 first_party_pr"
137+ + "incipal\030 \001 \001 (\013 2D.google.cloud.audit.Servi"
138+ + "ceAccountDelegationInfo.FirstPartyPrinci"
139+ + "palH\000 \022 e\n \025 third_party_principal\030 \002 \001 (\013 2D.g"
140+ + "oogle.cloud.audit.ServiceAccountDelegati"
141+ + "onInfo.ThirdPartyPrincipalH\000 \032 a\n \023 FirstPar"
142+ + "tyPrincipal\022 \027 \n \017 principal_email\030 \001 \001 (\t \022 1\n \020 "
143+ + "service_metadata\030 \002 \001 (\013 2\027 .google.protobuf"
144+ + ".Struct\032 J\n \023 ThirdPartyPrincipal\022 3\n \022 third_"
145+ + "party_claims\030 \001 \001 (\013 2\027 .google.protobuf.Str"
146+ + "uctB\013 \n \t Authority\" d\n \023 PolicyViolationInfo\022 "
147+ + "M\n \031 org_policy_violation_info\030 \001 \001 (\013 2*.goo"
148+ + "gle.cloud.audit.OrgPolicyViolationInfo\" \262 "
149+ + "\002 \n \026 OrgPolicyViolationInfo\022 -\n \007 payload\030 \001 \001 "
150+ + "(\013 2\027 .google.protobuf.StructB\003 \340 A\001 \022 \032 \n \r reso"
151+ + "urce_type\030 \002 \001 (\t B\003 \340 A\001 \022 X\n \r resource_tags\030 \003 "
152+ + "\003 (\013 2<.google.cloud.audit.OrgPolicyViolat"
153+ + "ionInfo.ResourceTagsEntryB\003 \340 A\001 \022 >\n \016 violat"
154+ + "ion_info\030 \004 \003 (\013 2!.google.cloud.audit.Viol"
155+ + "ationInfoB\003 \340 A\001 \032 3\n \021 ResourceTagsEntry\022 \013 \n \003 k"
156+ + "ey\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \227 \002 \n \r Violatio"
157+ + "nInfo\022 \027 \n \n constraint\030 \001 \001 (\t B\003 \340 A\001 \022 \032 \n \r error_"
158+ + "message\030 \002 \001 (\t B\003 \340 A\001 \022 \032 \n \r checked_value\030 \003 \001 ("
159+ + "\t B\003 \340 A\001 \022 F\n \013 policy_type\030 \004 \001 (\016 2,.google.clo"
160+ + "ud.audit.ViolationInfo.PolicyTypeB\003 \340 A\001 \" m"
161+ + "\n \n PolicyType\022 \033 \n \027 POLICY_TYPE_UNSPECIFIED\020 "
162+ + "\000 \022 \026 \n \022 BOOLEAN_CONSTRAINT\020 \001 \022 \023 \n \017 LIST_CONSTR"
163+ + "AINT\020 \002 \022 \025 \n \021 CUSTOM_CONSTRAINT\020 \003 Be\n \026 com.goo"
164+ + "gle.cloud.auditB\r AuditLogProtoP\001 Z7google"
165+ + ".golang.org/genproto/googleapis/cloud/au"
166+ + "dit;audit\370 \001 \001 b\006 proto3"
162167 };
163168 descriptor =
164169 com .google .protobuf .Descriptors .FileDescriptor .internalBuildGeneratedFileFrom (
@@ -211,7 +216,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
211216 new com .google .protobuf .GeneratedMessageV3 .FieldAccessorTable (
212217 internal_static_google_cloud_audit_AuthorizationInfo_descriptor ,
213218 new java .lang .String [] {
214- "Resource" , "Permission" , "Granted" , "ResourceAttributes" ,
219+ "Resource" , "Permission" , "Granted" , "ResourceAttributes" , "PermissionType" ,
215220 });
216221 internal_static_google_cloud_audit_RequestMetadata_descriptor =
217222 getDescriptor ().getMessageTypes ().get (3 );
0 commit comments