|
8 | 8 |
|
9 | 9 | documentation:
|
10 | 10 | summary: 'A data platform for customers to create, manage, share and query data.'
|
| 11 | + rules: |
| 12 | + - selector: google.iam.v1.IAMPolicy.GetIamPolicy |
| 13 | + description: |- |
| 14 | + Gets the access control policy for a resource. Returns an empty policy |
| 15 | + if the resource exists and does not have a policy set. |
| 16 | +
|
| 17 | + - selector: google.iam.v1.IAMPolicy.SetIamPolicy |
| 18 | + description: |- |
| 19 | + Sets the access control policy on the specified resource. Replaces |
| 20 | + any existing policy. |
| 21 | +
|
| 22 | + Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` |
| 23 | + errors. |
| 24 | +
|
| 25 | + - selector: google.iam.v1.IAMPolicy.TestIamPermissions |
| 26 | + description: |- |
| 27 | + Returns permissions that a caller has on the specified resource. If the |
| 28 | + resource does not exist, this will return an empty set of |
| 29 | + permissions, not a `NOT_FOUND` error. |
| 30 | +
|
| 31 | + Note: This operation is designed to be used for building |
| 32 | + permission-aware UIs and command-line tools, not for authorization |
| 33 | + checking. This operation may "fail open" without warning. |
| 34 | +
|
| 35 | +http: |
| 36 | + rules: |
| 37 | + - selector: google.iam.v1.IAMPolicy.GetIamPolicy |
| 38 | + post: '/bigquery/v2/{resource=projects/*/datasets/*}:getIamPolicy' |
| 39 | + body: '*' |
| 40 | + additional_bindings: |
| 41 | + - post: '/bigquery/v2/{resource=projects/*/datasets/*/tables/*}:getIamPolicy' |
| 42 | + body: '*' |
| 43 | + - selector: google.iam.v1.IAMPolicy.SetIamPolicy |
| 44 | + post: '/bigquery/v2/{resource=projects/*/datasets/*}:setIamPolicy' |
| 45 | + body: '*' |
| 46 | + additional_bindings: |
| 47 | + - post: '/bigquery/v2/{resource=projects/*/datasets/*/tables/*}:setIamPolicy' |
| 48 | + body: '*' |
| 49 | + - selector: google.iam.v1.IAMPolicy.TestIamPermissions |
| 50 | + post: '/bigquery/v2/{resource=projects/*/datasets/*}:testIamPermissions' |
| 51 | + body: '*' |
| 52 | + additional_bindings: |
| 53 | + - post: '/bigquery/v2/{resource=projects/*/datasets/*/tables/*}:testIamPermissions' |
| 54 | + body: '*' |
11 | 55 |
|
12 | 56 | authentication:
|
13 | 57 | rules:
|
@@ -35,3 +79,22 @@ authentication:
|
35 | 79 | canonical_scopes: |-
|
36 | 80 | https://www.googleapis.com/auth/bigquery,
|
37 | 81 | https://www.googleapis.com/auth/cloud-platform
|
| 82 | + - selector: google.iam.v1.IAMPolicy.GetIamPolicy |
| 83 | + oauth: |
| 84 | + canonical_scopes: |- |
| 85 | + https://www.googleapis.com/auth/bigquery, |
| 86 | + https://www.googleapis.com/auth/bigquery.readonly, |
| 87 | + https://www.googleapis.com/auth/cloud-platform, |
| 88 | + https://www.googleapis.com/auth/cloud-platform.read-only |
| 89 | + - selector: google.iam.v1.IAMPolicy.SetIamPolicy |
| 90 | + oauth: |
| 91 | + canonical_scopes: |- |
| 92 | + https://www.googleapis.com/auth/bigquery, |
| 93 | + https://www.googleapis.com/auth/cloud-platform |
| 94 | + - selector: google.iam.v1.IAMPolicy.TestIamPermissions |
| 95 | + oauth: |
| 96 | + canonical_scopes: |- |
| 97 | + https://www.googleapis.com/auth/bigquery, |
| 98 | + https://www.googleapis.com/auth/bigquery.readonly, |
| 99 | + https://www.googleapis.com/auth/cloud-platform, |
| 100 | + https://www.googleapis.com/auth/cloud-platform.read-only |
0 commit comments