-
Notifications
You must be signed in to change notification settings - Fork 2.3k
/
apigeeregistry_v1.yaml
159 lines (147 loc) · 6.65 KB
/
apigeeregistry_v1.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
type: google.api.Service
config_version: 3
name: apigeeregistry.googleapis.com
title: Apigee Registry API
apis:
- name: google.cloud.apigeeregistry.v1.Provisioning
- name: google.cloud.apigeeregistry.v1.Registry
- name: google.cloud.location.Locations
- name: google.iam.v1.IAMPolicy
- name: google.longrunning.Operations
types:
- name: google.cloud.apigeeregistry.v1.OperationMetadata
documentation:
rules:
- selector: google.cloud.location.Locations.GetLocation
description: Gets information about a location.
- selector: google.cloud.location.Locations.ListLocations
description: Lists information about the supported locations for this service.
- selector: google.iam.v1.IAMPolicy.GetIamPolicy
description: |-
Gets the access control policy for a resource. Returns an empty policy
if the resource exists and does not have a policy set.
- selector: google.iam.v1.IAMPolicy.SetIamPolicy
description: |-
Sets the access control policy on the specified resource. Replaces
any existing policy.
Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED`
errors.
- selector: google.iam.v1.IAMPolicy.TestIamPermissions
description: |-
Returns permissions that a caller has on the specified resource. If the
resource does not exist, this will return an empty set of
permissions, not a `NOT_FOUND` error.
Note: This operation is designed to be used for building
permission-aware UIs and command-line tools, not for authorization
checking. This operation may "fail open" without warning.
backend:
rules:
- selector: 'google.cloud.apigeeregistry.v1.Provisioning.*'
deadline: 60.0
- selector: 'google.cloud.apigeeregistry.v1.Registry.*'
deadline: 60.0
- selector: google.cloud.location.Locations.GetLocation
deadline: 60.0
- selector: google.cloud.location.Locations.ListLocations
deadline: 60.0
- selector: 'google.iam.v1.IAMPolicy.*'
deadline: 60.0
- selector: 'google.longrunning.Operations.*'
deadline: 60.0
http:
rules:
- selector: google.cloud.location.Locations.GetLocation
get: '/v1/{name=projects/*/locations/*}'
- selector: google.cloud.location.Locations.ListLocations
get: '/v1/{name=projects/*}/locations'
- selector: google.iam.v1.IAMPolicy.GetIamPolicy
get: '/v1/{resource=projects/*/locations/*/apis/*}:getIamPolicy'
additional_bindings:
- get: '/v1/{resource=projects/*/locations/*/apis/*/deployments/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/apis/*/versions/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/specs/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/artifacts/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/apis/*/artifacts/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/artifacts/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/specs/*/artifacts/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/instances/*}:getIamPolicy'
- get: '/v1/{resource=projects/*/locations/*/runtime}:getIamPolicy'
- selector: google.iam.v1.IAMPolicy.SetIamPolicy
post: '/v1/{resource=projects/*/locations/*/apis/*}:setIamPolicy'
body: '*'
additional_bindings:
- post: '/v1/{resource=projects/*/locations/*/apis/*/deployments/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/specs/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/artifacts/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/artifacts/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/artifacts/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/specs/*/artifacts/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/instances/*}:setIamPolicy'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/runtime}:setIamPolicy'
body: '*'
- selector: google.iam.v1.IAMPolicy.TestIamPermissions
post: '/v1/{resource=projects/*/locations/*/apis/*}:testIamPermissions'
body: '*'
additional_bindings:
- post: '/v1/{resource=projects/*/locations/*/apis/*/deployments/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/specs/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/artifacts/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/artifacts/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/artifacts/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/apis/*/versions/*/specs/*/artifacts/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/instances/*}:testIamPermissions'
body: '*'
- post: '/v1/{resource=projects/*/locations/*/runtime}:testIamPermissions'
body: '*'
- selector: google.longrunning.Operations.CancelOperation
post: '/v1/{name=projects/*/locations/*/operations/*}:cancel'
body: '*'
- selector: google.longrunning.Operations.DeleteOperation
delete: '/v1/{name=projects/*/locations/*/operations/*}'
- selector: google.longrunning.Operations.GetOperation
get: '/v1/{name=projects/*/locations/*/operations/*}'
- selector: google.longrunning.Operations.ListOperations
get: '/v1/{name=projects/*/locations/*}/operations'
authentication:
rules:
- selector: 'google.cloud.apigeeregistry.v1.Provisioning.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.cloud.apigeeregistry.v1.Registry.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: google.cloud.location.Locations.GetLocation
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: google.cloud.location.Locations.ListLocations
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.iam.v1.IAMPolicy.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform
- selector: 'google.longrunning.Operations.*'
oauth:
canonical_scopes: |-
https://www.googleapis.com/auth/cloud-platform