@@ -115,50 +115,55 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
115
115
+ "key_name\030 \005 \001 (\t \022 Y\n \037 service_account_delega"
116
116
+ "tion_info\030 \006 \003 (\013 20.google.cloud.audit.Ser"
117
117
+ "viceAccountDelegationInfo\022 \031 \n \021 principal_s"
118
- + "ubject\030 \010 \001 (\t \" \226 \001 \n \021 AuthorizationInfo\022 \020 \n \010 re"
118
+ + "ubject\030 \010 \001 (\t \" \330 \002 \n \021 AuthorizationInfo\022 \020 \n \010 re"
119
119
+ "source\030 \001 \001 (\t \022 \022 \n \n permission\030 \002 \001 (\t \022 \017 \n \007 gran"
120
120
+ "ted\030 \003 \001 (\010 \022 J\n \023 resource_attributes\030 \005 \001 (\013 2-"
121
121
+ ".google.rpc.context.AttributeContext.Res"
122
- + "ource\" \365 \001 \n \017 RequestMetadata\022 \021 \n \t caller_ip\030 \001 "
123
- + " \001 (\t \022 \" \n \032 caller_supplied_user_agent\030 \002 \001 (\t "
124
- + "\022 \026 \n \016 caller_network\030 \003 \001 (\t \022 H\n \022 request_attr"
125
- + "ibutes\030 \007 \001 (\013 2,.google.rpc.context.Attrib"
126
- + "uteContext.Request\022 I\n \026 destination_attrib"
127
- + "utes\030 \010 \001 (\013 2).google.rpc.context.Attribut"
128
- + "eContext.Peer\" I\n \020 ResourceLocation\022 \031 \n \021 cur"
129
- + "rent_locations\030 \001 \003 (\t \022 \032 \n \022 original_locatio"
130
- + "ns\030 \002 \003 (\t \" \303 \003 \n \034 ServiceAccountDelegationInf"
131
- + "o\022 \031 \n \021 principal_subject\030 \003 \001 (\t \022 e\n \025 first_pa"
132
- + "rty_principal\030 \001 \001 (\013 2D.google.cloud.audit"
133
- + ".ServiceAccountDelegationInfo.FirstParty"
134
- + "PrincipalH\000 \022 e\n \025 third_party_principal\030 \002 \001 "
135
- + "(\013 2D.google.cloud.audit.ServiceAccountDe"
136
- + "legationInfo.ThirdPartyPrincipalH\000 \032 a\n \023 Fi"
137
- + "rstPartyPrincipal\022 \027 \n \017 principal_email\030 \001 \001 "
138
- + "(\t \022 1\n \020 service_metadata\030 \002 \001 (\013 2\027 .google.pr"
139
- + "otobuf.Struct\032 J\n \023 ThirdPartyPrincipal\022 3\n \022 "
140
- + "third_party_claims\030 \001 \001 (\013 2\027 .google.protob"
141
- + "uf.StructB\013 \n \t Authority\" d\n \023 PolicyViolatio"
142
- + "nInfo\022 M\n \031 org_policy_violation_info\030 \001 \001 (\013 "
143
- + "2*.google.cloud.audit.OrgPolicyViolation"
144
- + "Info\" \262 \002 \n \026 OrgPolicyViolationInfo\022 -\n \007 paylo"
145
- + "ad\030 \001 \001 (\013 2\027 .google.protobuf.StructB\003 \340 A\001 \022 \032 "
146
- + "\n \r resource_type\030 \002 \001 (\t B\003 \340 A\001 \022 X\n \r resource_t"
147
- + "ags\030 \003 \003 (\013 2<.google.cloud.audit.OrgPolicy"
148
- + "ViolationInfo.ResourceTagsEntryB\003 \340 A\001 \022 >\n \016 "
149
- + "violation_info\030 \004 \003 (\013 2!.google.cloud.audi"
150
- + "t.ViolationInfoB\003 \340 A\001 \032 3\n \021 ResourceTagsEntr"
151
- + "y\022 \013 \n \003 key\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \227 \002 \n \r Vi"
152
- + "olationInfo\022 \027 \n \n constraint\030 \001 \001 (\t B\003 \340 A\001 \022 \032 \n \r "
153
- + "error_message\030 \002 \001 (\t B\003 \340 A\001 \022 \032 \n \r checked_valu"
154
- + "e\030 \003 \001 (\t B\003 \340 A\001 \022 F\n \013 policy_type\030 \004 \001 (\016 2,.goog"
155
- + "le.cloud.audit.ViolationInfo.PolicyTypeB"
156
- + "\003 \340 A\001 \" m\n \n PolicyType\022 \033 \n \027 POLICY_TYPE_UNSPEC"
157
- + "IFIED\020 \000 \022 \026 \n \022 BOOLEAN_CONSTRAINT\020 \001 \022 \023 \n \017 LIST_"
158
- + "CONSTRAINT\020 \002 \022 \025 \n \021 CUSTOM_CONSTRAINT\020 \003 Be\n \026 c"
159
- + "om.google.cloud.auditB\r AuditLogProtoP\001 Z7"
160
- + "google.golang.org/genproto/googleapis/cl"
161
- + "oud/audit;audit\370 \001 \001 b\006 proto3"
122
+ + "ource\022 M\n \017 permission_type\030 \007 \001 (\016 24.google."
123
+ + "cloud.audit.AuthorizationInfo.Permission"
124
+ + "Type\" q\n \016 PermissionType\022 \037 \n \033 PERMISSION_TYP"
125
+ + "E_UNSPECIFIED\020 \000 \022 \016 \n \n ADMIN_READ\020 \001 \022 \017 \n \013 ADMIN"
126
+ + "_WRITE\020 \002 \022 \r \n \t DATA_READ\020 \003 \022 \016 \n \n DATA_WRITE\020 \004 \" "
127
+ + "\365 \001 \n \017 RequestMetadata\022 \021 \n \t caller_ip\030 \001 \001 (\t \022 \" "
128
+ + "\n \032 caller_supplied_user_agent\030 \002 \001 (\t \022 \026 \n \016 ca"
129
+ + "ller_network\030 \003 \001 (\t \022 H\n \022 request_attributes"
130
+ + "\030 \007 \001 (\013 2,.google.rpc.context.AttributeCon"
131
+ + "text.Request\022 I\n \026 destination_attributes\030 \010 "
132
+ + " \001 (\013 2).google.rpc.context.AttributeConte"
133
+ + "xt.Peer\" I\n \020 ResourceLocation\022 \031 \n \021 current_l"
134
+ + "ocations\030 \001 \003 (\t \022 \032 \n \022 original_locations\030 \002 \003 "
135
+ + "(\t \" \303 \003 \n \034 ServiceAccountDelegationInfo\022 \031 \n \021 p"
136
+ + "rincipal_subject\030 \003 \001 (\t \022 e\n \025 first_party_pr"
137
+ + "incipal\030 \001 \001 (\013 2D.google.cloud.audit.Servi"
138
+ + "ceAccountDelegationInfo.FirstPartyPrinci"
139
+ + "palH\000 \022 e\n \025 third_party_principal\030 \002 \001 (\013 2D.g"
140
+ + "oogle.cloud.audit.ServiceAccountDelegati"
141
+ + "onInfo.ThirdPartyPrincipalH\000 \032 a\n \023 FirstPar"
142
+ + "tyPrincipal\022 \027 \n \017 principal_email\030 \001 \001 (\t \022 1\n \020 "
143
+ + "service_metadata\030 \002 \001 (\013 2\027 .google.protobuf"
144
+ + ".Struct\032 J\n \023 ThirdPartyPrincipal\022 3\n \022 third_"
145
+ + "party_claims\030 \001 \001 (\013 2\027 .google.protobuf.Str"
146
+ + "uctB\013 \n \t Authority\" d\n \023 PolicyViolationInfo\022 "
147
+ + "M\n \031 org_policy_violation_info\030 \001 \001 (\013 2*.goo"
148
+ + "gle.cloud.audit.OrgPolicyViolationInfo\" \262 "
149
+ + "\002 \n \026 OrgPolicyViolationInfo\022 -\n \007 payload\030 \001 \001 "
150
+ + "(\013 2\027 .google.protobuf.StructB\003 \340 A\001 \022 \032 \n \r reso"
151
+ + "urce_type\030 \002 \001 (\t B\003 \340 A\001 \022 X\n \r resource_tags\030 \003 "
152
+ + "\003 (\013 2<.google.cloud.audit.OrgPolicyViolat"
153
+ + "ionInfo.ResourceTagsEntryB\003 \340 A\001 \022 >\n \016 violat"
154
+ + "ion_info\030 \004 \003 (\013 2!.google.cloud.audit.Viol"
155
+ + "ationInfoB\003 \340 A\001 \032 3\n \021 ResourceTagsEntry\022 \013 \n \003 k"
156
+ + "ey\030 \001 \001 (\t \022 \r \n \005 value\030 \002 \001 (\t :\002 8\001 \" \227 \002 \n \r Violatio"
157
+ + "nInfo\022 \027 \n \n constraint\030 \001 \001 (\t B\003 \340 A\001 \022 \032 \n \r error_"
158
+ + "message\030 \002 \001 (\t B\003 \340 A\001 \022 \032 \n \r checked_value\030 \003 \001 ("
159
+ + "\t B\003 \340 A\001 \022 F\n \013 policy_type\030 \004 \001 (\016 2,.google.clo"
160
+ + "ud.audit.ViolationInfo.PolicyTypeB\003 \340 A\001 \" m"
161
+ + "\n \n PolicyType\022 \033 \n \027 POLICY_TYPE_UNSPECIFIED\020 "
162
+ + "\000 \022 \026 \n \022 BOOLEAN_CONSTRAINT\020 \001 \022 \023 \n \017 LIST_CONSTR"
163
+ + "AINT\020 \002 \022 \025 \n \021 CUSTOM_CONSTRAINT\020 \003 Be\n \026 com.goo"
164
+ + "gle.cloud.auditB\r AuditLogProtoP\001 Z7google"
165
+ + ".golang.org/genproto/googleapis/cloud/au"
166
+ + "dit;audit\370 \001 \001 b\006 proto3"
162
167
};
163
168
descriptor =
164
169
com .google .protobuf .Descriptors .FileDescriptor .internalBuildGeneratedFileFrom (
@@ -211,7 +216,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
211
216
new com .google .protobuf .GeneratedMessageV3 .FieldAccessorTable (
212
217
internal_static_google_cloud_audit_AuthorizationInfo_descriptor ,
213
218
new java .lang .String [] {
214
- "Resource" , "Permission" , "Granted" , "ResourceAttributes" ,
219
+ "Resource" , "Permission" , "Granted" , "ResourceAttributes" , "PermissionType" ,
215
220
});
216
221
internal_static_google_cloud_audit_RequestMetadata_descriptor =
217
222
getDescriptor ().getMessageTypes ().get (3 );
0 commit comments