Skip to content

Commit

Permalink
feat(contentwarehouse): update the api
Browse files Browse the repository at this point in the history
#### contentwarehouse:v1

The following keys were deleted:
- schemas.EntitySignalsClassificationOutput (Total Keys: 6)
- schemas.EntitySignalsEntityClassification (Total Keys: 6)
- schemas.EntitySignalsEntityFeature (Total Keys: 6)
- schemas.EntitySignalsWeightedRelevanceRating (Total Keys: 5)
- schemas.RepositoryWebrefAnnotationDebugInfo.properties.infoString (Total Keys: 2)
- schemas.RepositoryWebrefAnnotationDebugInfo.properties.rawClassification.$ref (Total Keys: 1)
- schemas.RepositoryWebrefDetailedEntityScores.properties.anchorScore (Total Keys: 2)
- schemas.RepositoryWebrefDetailedEntityScores.properties.bodyScore (Total Keys: 2)
- schemas.RepositoryWebrefDetailedEntityScores.properties.nbScore (Total Keys: 2)
- schemas.RepositoryWebrefDetailedEntityScores.properties.newsTopicalityScore (Total Keys: 2)
- schemas.RepositoryWebrefDetailedMentionScores.properties.patternInfo (Total Keys: 2)
- schemas.RepositoryWebrefDetailedMentionScores.properties.posteriorForLearning (Total Keys: 2)
- schemas.RepositoryWebrefPatternInfo (Total Keys: 6)
- schemas.ResearchScienceSearchLocation.properties.locationResource.type (Total Keys: 1)
- schemas.ScienceIndexSignal.properties.HoldingsId (Total Keys: 3)

The following keys were added:
- schemas.AppsPeopleOzExternalMergedpeopleapiNamePronunciationAudioMetadataInfo (Total Keys: 4)
- schemas.AppsPeopleOzExternalMergedpeopleapiPerson.properties.namePronunciationAudioMetadataInfo (Total Keys: 2)
- schemas.AppsPeopleOzExternalMergedpeopleapiPhoto.properties.decoration (Total Keys: 2)
- schemas.AppsPeopleOzExternalMergedpeopleapiPhoto.properties.originalPhoto.$ref (Total Keys: 1)
- schemas.AssistantApiSuggestionsSupport.properties.multiStepTrySayingSupported.type (Total Keys: 1)
- schemas.AssistantGroundingRankerMediaGroundingProviderFeatures.properties.isCastVideo.type (Total Keys: 1)
- schemas.AssistantGroundingRankerMediaGroundingProviderFeatures.properties.scubedPSaiMusic (Total Keys: 2)
- schemas.AssistantLogsProviderAnnotationLog (Total Keys: 4)
- schemas.AssistantLogsQueryAnnotationLog.properties.providerAnnotation.$ref (Total Keys: 1)
- schemas.BlueGingerClientVisibleProtoBlueGingerSupportedServicesBlueGingerModule.properties.useCase.type (Total Keys: 1)
- schemas.DrishtiFeatureSetDataFeatureSetElement.properties.quantizedByteDense.$ref (Total Keys: 1)
- schemas.DrishtiFeatureSetDataFeatureSetElement.properties.quantizedByteIndexed.$ref (Total Keys: 1)
- schemas.DrishtiQuantizedByteDenseFeatureData (Total Keys: 7)
- schemas.DrishtiQuantizedByteIndexedFeatureData (Total Keys: 10)
- schemas.KnowledgeAnswersSemanticType.properties.allowAll.type (Total Keys: 1)
- schemas.QualityCalypsoAppsUniversalImageData.properties.enhancedImage.$ref (Total Keys: 1)
- schemas.QualityNsrNsrChunksProto (Total Keys: 5)
- schemas.QualityNsrNsrChunksWithSourceInfo (Total Keys: 4)
- schemas.QualityNsrNsrData.properties.versionedAsrData (Total Keys: 2)
- schemas.QualityNsrNsrDataMetadata.properties.lastTimeProcessedGoldmineInSeconds (Total Keys: 2)
- schemas.QualityNsrNsrDataMetadata.properties.lastTimeProcessedMduInSeconds (Total Keys: 2)
- schemas.QualityNsrNsrDataMetadata.properties.lastTimeProcessedRaffiaInSeconds (Total Keys: 2)
- schemas.QualityNsrNsrDataMetadata.properties.nsrChunksWithSourceInfo.$ref (Total Keys: 1)
- schemas.QualityShoppingShoppingAttachmentOffer.properties.isLensBuildable.type (Total Keys: 1)
- schemas.RepositoryWebrefEntityNameRatingsEntityNameRating.properties.comment.type (Total Keys: 1)
- schemas.ResearchScamGenericFeatureVector.properties.internalOnlyIsSecondaryPartition.type (Total Keys: 1)
- schemas.ResearchScienceSearchLocation.properties.locationSource.type (Total Keys: 1)
- schemas.ScienceCitation.properties.AbstractCitationSource (Total Keys: 2)
- schemas.SdrEmbedding.properties.compressedEmbeddings.$ref (Total Keys: 1)
- schemas.SocialGraphApiProtoDecorationOverlay (Total Keys: 4)
- schemas.SocialGraphApiProtoImageReference (Total Keys: 3)
- schemas.SocialGraphApiProtoNamePronunciationAudioMetadata (Total Keys: 4)
- schemas.SocialGraphApiProtoPhotoOverlay (Total Keys: 4)
- schemas.SocialGraphApiProtoRelativePosition (Total Keys: 6)
- schemas.SocialGraphApiProtoRelativeScale (Total Keys: 6)
- schemas.WWWDocInfo.properties.nsrSitechunk.type (Total Keys: 1)
  • Loading branch information
yoshi-automation committed Jan 31, 2023
1 parent 33a044e commit 512fa51
Show file tree
Hide file tree
Showing 3 changed files with 806 additions and 295 deletions.
6 changes: 3 additions & 3 deletions docs/dyn/contentwarehouse_v1.projects.html
Expand Up @@ -87,7 +87,7 @@ <h2>Instance Methods</h2>
<p class="firstline">Gets the access control policy for a resource. Returns NOT_FOUND error if the resource does not exist. Returns an empty policy if the resource exists but does not have a policy set.</p>
<p class="toc_element">
<code><a href="#setAcl">setAcl(resource, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Sets the access control policy for a resource. Replaces any existing policy. You can set ACL with condition for projects only. Supported operators are: `=`, `!=`, `<`, `<=`, `>`, and `>=` where the left of the operator is `DocumentSchemaId` or property name and the right of the operator is a number or a quoted string. You must escape backslash (\\) and quote (\") characters. Boolean expressions (AND/OR) are supported up to 3 levels of nesting (for example, "((A AND B AND C) OR D) AND E"), a maximum of 10 comparisons are allowed in the expression. The expression must be < 6000 bytes in length. Sample condition: `"DocumentSchemaId = \"some schema id\" " OR SchemaId.floatPropertyName >= 10`</p>
<p class="firstline">Sets the access control policy for a resource. Replaces any existing policy.</p>
<h3>Method Details</h3>
<div class="method">
<code class="details" id="close">close()</code>
Expand Down Expand Up @@ -163,15 +163,15 @@ <h3>Method Details</h3>

<div class="method">
<code class="details" id="setAcl">setAcl(resource, body=None, x__xgafv=None)</code>
<pre>Sets the access control policy for a resource. Replaces any existing policy. You can set ACL with condition for projects only. Supported operators are: `=`, `!=`, `&lt;`, `&lt;=`, `&gt;`, and `&gt;=` where the left of the operator is `DocumentSchemaId` or property name and the right of the operator is a number or a quoted string. You must escape backslash (\\) and quote (\&quot;) characters. Boolean expressions (AND/OR) are supported up to 3 levels of nesting (for example, &quot;((A AND B AND C) OR D) AND E&quot;), a maximum of 10 comparisons are allowed in the expression. The expression must be &lt; 6000 bytes in length. Sample condition: `&quot;DocumentSchemaId = \&quot;some schema id\&quot; &quot; OR SchemaId.floatPropertyName &gt;= 10`
<pre>Sets the access control policy for a resource. Replaces any existing policy.

Args:
resource: string, Required. REQUIRED: The resource for which the policy is being requested. Format for document: projects/{project_number}/locations/{location}/documents/{document_id}. Format for project: projects/{project_number}. (required)
body: object, The request body.
The object takes the form of:

{ # Request message for DocumentService.SetAcl.
&quot;policy&quot;: { # An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members`, or principals, to a single `role`. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { &quot;bindings&quot;: [ { &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;, &quot;members&quot;: [ &quot;user:mike@example.com&quot;, &quot;group:admins@example.com&quot;, &quot;domain:google.com&quot;, &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot; ] }, { &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;, &quot;members&quot;: [ &quot;user:eve@example.com&quot; ], &quot;condition&quot;: { &quot;title&quot;: &quot;expirable access&quot;, &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;, &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;, } } ], &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;, &quot;version&quot;: 3 } **YAML example:** bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;) etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/). # Required. REQUIRED: The complete policy to be applied to the `resource`. The size of the policy is limited to a few 10s of KB. This refers to an Identity and Access (IAM) policy, which specifies access controls for the Document.
&quot;policy&quot;: { # An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members`, or principals, to a single `role`. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { &quot;bindings&quot;: [ { &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;, &quot;members&quot;: [ &quot;user:mike@example.com&quot;, &quot;group:admins@example.com&quot;, &quot;domain:google.com&quot;, &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot; ] }, { &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;, &quot;members&quot;: [ &quot;user:eve@example.com&quot; ], &quot;condition&quot;: { &quot;title&quot;: &quot;expirable access&quot;, &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;, &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;, } } ], &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;, &quot;version&quot;: 3 } **YAML example:** bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;) etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/). # Required. REQUIRED: The complete policy to be applied to the `resource`. The size of the policy is limited to a few 10s of KB. This refers to an Identity and Access (IAM) policy, which specifies access controls for the Document. You can set ACL with condition for projects only. Supported operators are: `=`, `!=`, `&lt;`, `&lt;=`, `&gt;`, and `&gt;=` where the left of the operator is `DocumentSchemaId` or property name and the right of the operator is a number or a quoted string. You must escape backslash (\\) and quote (\&quot;) characters. Boolean expressions (AND/OR) are supported up to 3 levels of nesting (for example, &quot;((A AND B AND C) OR D) AND E&quot;), a maximum of 10 comparisons are allowed in the expression. The expression must be &lt; 6000 bytes in length. Sample condition: `&quot;DocumentSchemaId = \&quot;some schema id\&quot; OR SchemaId.floatPropertyName &gt;= 10&quot;`
&quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
{ # Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { &quot;audit_configs&quot;: [ { &quot;service&quot;: &quot;allServices&quot;, &quot;audit_log_configs&quot;: [ { &quot;log_type&quot;: &quot;DATA_READ&quot;, &quot;exempted_members&quot;: [ &quot;user:jose@example.com&quot; ] }, { &quot;log_type&quot;: &quot;DATA_WRITE&quot; }, { &quot;log_type&quot;: &quot;ADMIN_READ&quot; } ] }, { &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;, &quot;audit_log_configs&quot;: [ { &quot;log_type&quot;: &quot;DATA_READ&quot; }, { &quot;log_type&quot;: &quot;DATA_WRITE&quot;, &quot;exempted_members&quot;: [ &quot;user:aliya@example.com&quot; ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts `jose@example.com` from DATA_READ logging, and `aliya@example.com` from DATA_WRITE logging.
&quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
Expand Down
Expand Up @@ -119,7 +119,7 @@ <h2>Instance Methods</h2>
<p class="firstline">Retrieves the next page of results.</p>
<p class="toc_element">
<code><a href="#setAcl">setAcl(resource, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Sets the access control policy for a resource. Replaces any existing policy. You can set ACL with condition for projects only. Supported operators are: `=`, `!=`, `<`, `<=`, `>`, and `>=` where the left of the operator is `DocumentSchemaId` or property name and the right of the operator is a number or a quoted string. You must escape backslash (\\) and quote (\") characters. Boolean expressions (AND/OR) are supported up to 3 levels of nesting (for example, "((A AND B AND C) OR D) AND E"), a maximum of 10 comparisons are allowed in the expression. The expression must be < 6000 bytes in length. Sample condition: `"DocumentSchemaId = \"some schema id\" " OR SchemaId.floatPropertyName >= 10`</p>
<p class="firstline">Sets the access control policy for a resource. Replaces any existing policy.</p>
<h3>Method Details</h3>
<div class="method">
<code class="details" id="close">close()</code>
Expand Down Expand Up @@ -6841,15 +6841,15 @@ <h3>Method Details</h3>

<div class="method">
<code class="details" id="setAcl">setAcl(resource, body=None, x__xgafv=None)</code>
<pre>Sets the access control policy for a resource. Replaces any existing policy. You can set ACL with condition for projects only. Supported operators are: `=`, `!=`, `&lt;`, `&lt;=`, `&gt;`, and `&gt;=` where the left of the operator is `DocumentSchemaId` or property name and the right of the operator is a number or a quoted string. You must escape backslash (\\) and quote (\&quot;) characters. Boolean expressions (AND/OR) are supported up to 3 levels of nesting (for example, &quot;((A AND B AND C) OR D) AND E&quot;), a maximum of 10 comparisons are allowed in the expression. The expression must be &lt; 6000 bytes in length. Sample condition: `&quot;DocumentSchemaId = \&quot;some schema id\&quot; &quot; OR SchemaId.floatPropertyName &gt;= 10`
<pre>Sets the access control policy for a resource. Replaces any existing policy.

Args:
resource: string, Required. REQUIRED: The resource for which the policy is being requested. Format for document: projects/{project_number}/locations/{location}/documents/{document_id}. Format for project: projects/{project_number}. (required)
body: object, The request body.
The object takes the form of:

{ # Request message for DocumentService.SetAcl.
&quot;policy&quot;: { # An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members`, or principals, to a single `role`. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { &quot;bindings&quot;: [ { &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;, &quot;members&quot;: [ &quot;user:mike@example.com&quot;, &quot;group:admins@example.com&quot;, &quot;domain:google.com&quot;, &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot; ] }, { &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;, &quot;members&quot;: [ &quot;user:eve@example.com&quot; ], &quot;condition&quot;: { &quot;title&quot;: &quot;expirable access&quot;, &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;, &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;, } } ], &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;, &quot;version&quot;: 3 } **YAML example:** bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;) etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/). # Required. REQUIRED: The complete policy to be applied to the `resource`. The size of the policy is limited to a few 10s of KB. This refers to an Identity and Access (IAM) policy, which specifies access controls for the Document.
&quot;policy&quot;: { # An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members`, or principals, to a single `role`. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { &quot;bindings&quot;: [ { &quot;role&quot;: &quot;roles/resourcemanager.organizationAdmin&quot;, &quot;members&quot;: [ &quot;user:mike@example.com&quot;, &quot;group:admins@example.com&quot;, &quot;domain:google.com&quot;, &quot;serviceAccount:my-project-id@appspot.gserviceaccount.com&quot; ] }, { &quot;role&quot;: &quot;roles/resourcemanager.organizationViewer&quot;, &quot;members&quot;: [ &quot;user:eve@example.com&quot; ], &quot;condition&quot;: { &quot;title&quot;: &quot;expirable access&quot;, &quot;description&quot;: &quot;Does not grant access after Sep 2020&quot;, &quot;expression&quot;: &quot;request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;)&quot;, } } ], &quot;etag&quot;: &quot;BwWWja0YfJA=&quot;, &quot;version&quot;: 3 } **YAML example:** bindings: - members: - user:mike@example.com - group:admins@example.com - domain:google.com - serviceAccount:my-project-id@appspot.gserviceaccount.com role: roles/resourcemanager.organizationAdmin - members: - user:eve@example.com role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time &lt; timestamp(&#x27;2020-10-01T00:00:00.000Z&#x27;) etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/). # Required. REQUIRED: The complete policy to be applied to the `resource`. The size of the policy is limited to a few 10s of KB. This refers to an Identity and Access (IAM) policy, which specifies access controls for the Document. You can set ACL with condition for projects only. Supported operators are: `=`, `!=`, `&lt;`, `&lt;=`, `&gt;`, and `&gt;=` where the left of the operator is `DocumentSchemaId` or property name and the right of the operator is a number or a quoted string. You must escape backslash (\\) and quote (\&quot;) characters. Boolean expressions (AND/OR) are supported up to 3 levels of nesting (for example, &quot;((A AND B AND C) OR D) AND E&quot;), a maximum of 10 comparisons are allowed in the expression. The expression must be &lt; 6000 bytes in length. Sample condition: `&quot;DocumentSchemaId = \&quot;some schema id\&quot; OR SchemaId.floatPropertyName &gt;= 10&quot;`
&quot;auditConfigs&quot;: [ # Specifies cloud audit logging configuration for this policy.
{ # Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { &quot;audit_configs&quot;: [ { &quot;service&quot;: &quot;allServices&quot;, &quot;audit_log_configs&quot;: [ { &quot;log_type&quot;: &quot;DATA_READ&quot;, &quot;exempted_members&quot;: [ &quot;user:jose@example.com&quot; ] }, { &quot;log_type&quot;: &quot;DATA_WRITE&quot; }, { &quot;log_type&quot;: &quot;ADMIN_READ&quot; } ] }, { &quot;service&quot;: &quot;sampleservice.googleapis.com&quot;, &quot;audit_log_configs&quot;: [ { &quot;log_type&quot;: &quot;DATA_READ&quot; }, { &quot;log_type&quot;: &quot;DATA_WRITE&quot;, &quot;exempted_members&quot;: [ &quot;user:aliya@example.com&quot; ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts `jose@example.com` from DATA_READ logging, and `aliya@example.com` from DATA_WRITE logging.
&quot;auditLogConfigs&quot;: [ # The configuration for logging of each type of permission.
Expand Down

0 comments on commit 512fa51

Please sign in to comment.