Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
18 commits
Select commit Hold shift + click to select a range
b3d4a5e
chore: update googleapis commit at Thu Feb 27 02:27:38 UTC 2025
cloud-java-bot Feb 27, 2025
0009a97
chore: update googleapis commit at Fri Feb 28 02:27:48 UTC 2025
cloud-java-bot Feb 28, 2025
af982e3
chore: generate libraries at Fri Feb 28 02:32:10 UTC 2025
cloud-java-bot Feb 28, 2025
8bc38bd
chore: merge main into generate-libraries-main
cloud-java-bot Mar 1, 2025
26af615
chore: update googleapis commit at Sat Mar 1 02:29:31 UTC 2025
cloud-java-bot Mar 1, 2025
09eeb26
chore: generate libraries at Sat Mar 1 02:34:27 UTC 2025
cloud-java-bot Mar 1, 2025
3e259ea
chore: update googleapis commit at Mon Mar 3 02:28:31 UTC 2025
cloud-java-bot Mar 3, 2025
1d42c70
chore: update googleapis commit at Tue Mar 4 02:28:13 UTC 2025
cloud-java-bot Mar 4, 2025
ba89464
chore: update googleapis commit at Wed Mar 5 02:28:10 UTC 2025
cloud-java-bot Mar 5, 2025
065bb52
chore: merge main into generate-libraries-main
cloud-java-bot Mar 6, 2025
78c00cf
chore: update googleapis commit at Thu Mar 6 02:28:23 UTC 2025
cloud-java-bot Mar 6, 2025
063c9cc
chore: merge main into generate-libraries-main
cloud-java-bot Mar 7, 2025
1b85e81
chore: update googleapis commit at Fri Mar 7 02:28:46 UTC 2025
cloud-java-bot Mar 7, 2025
4724530
chore: generate libraries at Fri Mar 7 02:33:24 UTC 2025
cloud-java-bot Mar 7, 2025
29219e9
chore: merge main into generate-libraries-main
cloud-java-bot Mar 8, 2025
f184104
chore: update googleapis commit at Sat Mar 8 02:14:18 UTC 2025
cloud-java-bot Mar 8, 2025
a63336d
chore: merge main into generate-libraries-main
cloud-java-bot Mar 11, 2025
94f1657
chore: update googleapis commit at Tue Mar 11 02:28:42 UTC 2025
cloud-java-bot Mar 11, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion generation_config.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
googleapis_commitish: fbbbf5023815f9a662c85aa8af8f3b72467fcb6f
googleapis_commitish: 66ab6ceb69178f5368b130949eaf518b7c28352f
# the libraries are ordered with respect to library name, which is
# java-{library.library_name} or java-{library.api-shortname} when
# library.library_name is not defined.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -115,50 +115,55 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "key_name\030\005 \001(\t\022Y\n\037service_account_delega"
+ "tion_info\030\006 \003(\01320.google.cloud.audit.Ser"
+ "viceAccountDelegationInfo\022\031\n\021principal_s"
+ "ubject\030\010 \001(\t\"\226\001\n\021AuthorizationInfo\022\020\n\010re"
+ "ubject\030\010 \001(\t\"\330\002\n\021AuthorizationInfo\022\020\n\010re"
+ "source\030\001 \001(\t\022\022\n\npermission\030\002 \001(\t\022\017\n\007gran"
+ "ted\030\003 \001(\010\022J\n\023resource_attributes\030\005 \001(\0132-"
+ ".google.rpc.context.AttributeContext.Res"
+ "ource\"\365\001\n\017RequestMetadata\022\021\n\tcaller_ip\030\001"
+ " \001(\t\022\"\n\032caller_supplied_user_agent\030\002 \001(\t"
+ "\022\026\n\016caller_network\030\003 \001(\t\022H\n\022request_attr"
+ "ibutes\030\007 \001(\0132,.google.rpc.context.Attrib"
+ "uteContext.Request\022I\n\026destination_attrib"
+ "utes\030\010 \001(\0132).google.rpc.context.Attribut"
+ "eContext.Peer\"I\n\020ResourceLocation\022\031\n\021cur"
+ "rent_locations\030\001 \003(\t\022\032\n\022original_locatio"
+ "ns\030\002 \003(\t\"\303\003\n\034ServiceAccountDelegationInf"
+ "o\022\031\n\021principal_subject\030\003 \001(\t\022e\n\025first_pa"
+ "rty_principal\030\001 \001(\0132D.google.cloud.audit"
+ ".ServiceAccountDelegationInfo.FirstParty"
+ "PrincipalH\000\022e\n\025third_party_principal\030\002 \001"
+ "(\0132D.google.cloud.audit.ServiceAccountDe"
+ "legationInfo.ThirdPartyPrincipalH\000\032a\n\023Fi"
+ "rstPartyPrincipal\022\027\n\017principal_email\030\001 \001"
+ "(\t\0221\n\020service_metadata\030\002 \001(\0132\027.google.pr"
+ "otobuf.Struct\032J\n\023ThirdPartyPrincipal\0223\n\022"
+ "third_party_claims\030\001 \001(\0132\027.google.protob"
+ "uf.StructB\013\n\tAuthority\"d\n\023PolicyViolatio"
+ "nInfo\022M\n\031org_policy_violation_info\030\001 \001(\013"
+ "2*.google.cloud.audit.OrgPolicyViolation"
+ "Info\"\262\002\n\026OrgPolicyViolationInfo\022-\n\007paylo"
+ "ad\030\001 \001(\0132\027.google.protobuf.StructB\003\340A\001\022\032"
+ "\n\rresource_type\030\002 \001(\tB\003\340A\001\022X\n\rresource_t"
+ "ags\030\003 \003(\0132<.google.cloud.audit.OrgPolicy"
+ "ViolationInfo.ResourceTagsEntryB\003\340A\001\022>\n\016"
+ "violation_info\030\004 \003(\0132!.google.cloud.audi"
+ "t.ViolationInfoB\003\340A\001\0323\n\021ResourceTagsEntr"
+ "y\022\013\n\003key\030\001 \001(\t\022\r\n\005value\030\002 \001(\t:\0028\001\"\227\002\n\rVi"
+ "olationInfo\022\027\n\nconstraint\030\001 \001(\tB\003\340A\001\022\032\n\r"
+ "error_message\030\002 \001(\tB\003\340A\001\022\032\n\rchecked_valu"
+ "e\030\003 \001(\tB\003\340A\001\022F\n\013policy_type\030\004 \001(\0162,.goog"
+ "le.cloud.audit.ViolationInfo.PolicyTypeB"
+ "\003\340A\001\"m\n\nPolicyType\022\033\n\027POLICY_TYPE_UNSPEC"
+ "IFIED\020\000\022\026\n\022BOOLEAN_CONSTRAINT\020\001\022\023\n\017LIST_"
+ "CONSTRAINT\020\002\022\025\n\021CUSTOM_CONSTRAINT\020\003Be\n\026c"
+ "om.google.cloud.auditB\rAuditLogProtoP\001Z7"
+ "google.golang.org/genproto/googleapis/cl"
+ "oud/audit;audit\370\001\001b\006proto3"
+ "ource\022M\n\017permission_type\030\007 \001(\01624.google."
+ "cloud.audit.AuthorizationInfo.Permission"
+ "Type\"q\n\016PermissionType\022\037\n\033PERMISSION_TYP"
+ "E_UNSPECIFIED\020\000\022\016\n\nADMIN_READ\020\001\022\017\n\013ADMIN"
+ "_WRITE\020\002\022\r\n\tDATA_READ\020\003\022\016\n\nDATA_WRITE\020\004\""
+ "\365\001\n\017RequestMetadata\022\021\n\tcaller_ip\030\001 \001(\t\022\""
+ "\n\032caller_supplied_user_agent\030\002 \001(\t\022\026\n\016ca"
+ "ller_network\030\003 \001(\t\022H\n\022request_attributes"
+ "\030\007 \001(\0132,.google.rpc.context.AttributeCon"
+ "text.Request\022I\n\026destination_attributes\030\010"
+ " \001(\0132).google.rpc.context.AttributeConte"
+ "xt.Peer\"I\n\020ResourceLocation\022\031\n\021current_l"
+ "ocations\030\001 \003(\t\022\032\n\022original_locations\030\002 \003"
+ "(\t\"\303\003\n\034ServiceAccountDelegationInfo\022\031\n\021p"
+ "rincipal_subject\030\003 \001(\t\022e\n\025first_party_pr"
+ "incipal\030\001 \001(\0132D.google.cloud.audit.Servi"
+ "ceAccountDelegationInfo.FirstPartyPrinci"
+ "palH\000\022e\n\025third_party_principal\030\002 \001(\0132D.g"
+ "oogle.cloud.audit.ServiceAccountDelegati"
+ "onInfo.ThirdPartyPrincipalH\000\032a\n\023FirstPar"
+ "tyPrincipal\022\027\n\017principal_email\030\001 \001(\t\0221\n\020"
+ "service_metadata\030\002 \001(\0132\027.google.protobuf"
+ ".Struct\032J\n\023ThirdPartyPrincipal\0223\n\022third_"
+ "party_claims\030\001 \001(\0132\027.google.protobuf.Str"
+ "uctB\013\n\tAuthority\"d\n\023PolicyViolationInfo\022"
+ "M\n\031org_policy_violation_info\030\001 \001(\0132*.goo"
+ "gle.cloud.audit.OrgPolicyViolationInfo\"\262"
+ "\002\n\026OrgPolicyViolationInfo\022-\n\007payload\030\001 \001"
+ "(\0132\027.google.protobuf.StructB\003\340A\001\022\032\n\rreso"
+ "urce_type\030\002 \001(\tB\003\340A\001\022X\n\rresource_tags\030\003 "
+ "\003(\0132<.google.cloud.audit.OrgPolicyViolat"
+ "ionInfo.ResourceTagsEntryB\003\340A\001\022>\n\016violat"
+ "ion_info\030\004 \003(\0132!.google.cloud.audit.Viol"
+ "ationInfoB\003\340A\001\0323\n\021ResourceTagsEntry\022\013\n\003k"
+ "ey\030\001 \001(\t\022\r\n\005value\030\002 \001(\t:\0028\001\"\227\002\n\rViolatio"
+ "nInfo\022\027\n\nconstraint\030\001 \001(\tB\003\340A\001\022\032\n\rerror_"
+ "message\030\002 \001(\tB\003\340A\001\022\032\n\rchecked_value\030\003 \001("
+ "\tB\003\340A\001\022F\n\013policy_type\030\004 \001(\0162,.google.clo"
+ "ud.audit.ViolationInfo.PolicyTypeB\003\340A\001\"m"
+ "\n\nPolicyType\022\033\n\027POLICY_TYPE_UNSPECIFIED\020"
+ "\000\022\026\n\022BOOLEAN_CONSTRAINT\020\001\022\023\n\017LIST_CONSTR"
+ "AINT\020\002\022\025\n\021CUSTOM_CONSTRAINT\020\003Be\n\026com.goo"
+ "gle.cloud.auditB\rAuditLogProtoP\001Z7google"
+ ".golang.org/genproto/googleapis/cloud/au"
+ "dit;audit\370\001\001b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
Expand Down Expand Up @@ -211,7 +216,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_audit_AuthorizationInfo_descriptor,
new java.lang.String[] {
"Resource", "Permission", "Granted", "ResourceAttributes",
"Resource", "Permission", "Granted", "ResourceAttributes", "PermissionType",
});
internal_static_google_cloud_audit_RequestMetadata_descriptor =
getDescriptor().getMessageTypes().get(3);
Expand Down
Loading
Loading