File manager - Edit - /home/u478019808/domains/bestandroidphones.store/public_html/static/img/logo/kms_apitools.tar
Back
__pycache__/cloudkms_v1_messages.cpython-39.pyc 0000644 00000122472 15025253155 0015536 0 ustar 00 a +(Wg�� � @ s� d Z ddlmZ ddlmZ ddlmZ dZG dd� dej�Z G dd � d ej�Z G d d� dej�ZG dd � d ej�ZG dd� dej�Z G dd� dej�ZG dd� dej�ZG dd� dej�ZG dd� dej�ZG dd� dej�ZG dd� dej�ZG dd� dej�ZG dd� dej�ZG d d!� d!ej�ZG d"d#� d#ej�ZG d$d%� d%ej�ZG d&d'� d'ej�ZG d(d)� d)ej�ZG d*d+� d+ej�ZG d,d-� d-ej�ZG d.d/� d/ej�ZG d0d1� d1ej�ZG d2d3� d3ej�ZG d4d5� d5ej�Z G d6d7� d7ej�Z!G d8d9� d9ej�Z"G d:d;� d;ej�Z#G d<d=� d=ej�Z$G d>d?� d?ej�Z%G d@dA� dAej�Z&G dBdC� dCej�Z'G dDdE� dEej�Z(G dFdG� dGej�Z)G dHdI� dIej�Z*G dJdK� dKej�Z+G dLdM� dMej�Z,G dNdO� dOej�Z-G dPdQ� dQej�Z.G dRdS� dSej�Z/G dTdU� dUej�Z0G dVdW� dWej�Z1G dXdY� dYej�Z2G dZd[� d[ej�Z3G d\d]� d]ej�Z4G d^d_� d_ej�Z5G d`da� daej�Z6G dbdc� dcej�Z7G ddde� deej�Z8e�9e5dfdg� e�:e5j;dhdi� e�:e5j;djdk� dlS )mz�Generated message classes for cloudkms version v1. Manages encryption for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256 encryption keys. � )�messages)�encoding)�extra_types�cloudkmsc @ s8 e Zd ZdZejdddd�Zejddd�Ze�d�Z dS ) �AuditConfiga� Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging. Fields: auditLogConfigs: The configuration for logging of each type of permission. Next ID: 4 exemptedMembers: A string attribute. service: Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services. �AuditLogConfig� T��repeated� � N) �__name__� __module__�__qualname__�__doc__� _messages�MessageFieldZauditLogConfigs�StringField�exemptedMembers�service� r r �B/opt/gsutil/gslib/third_party/kms_apitools/cloudkms_v1_messages.pyr s r c @ s<