mirror of
https://github.com/restic/restic.git
synced 2025-12-08 06:09:56 +00:00
Update dependencies
Among others, this updates minio-go, so that the new "eu-west-3" zone for AWS is supported.
This commit is contained in:
parent
b63de7c798
commit
2b39f9f4b2
3435 changed files with 1318042 additions and 315692 deletions
38
vendor/google.golang.org/api/cloudresourcemanager/v1/cloudresourcemanager-gen.go
generated
vendored
38
vendor/google.golang.org/api/cloudresourcemanager/v1/cloudresourcemanager-gen.go
generated
vendored
|
|
@ -1673,7 +1673,7 @@ func (s *OrganizationOwner) MarshalJSON() ([]byte, error) {
|
|||
// }
|
||||
//
|
||||
// For a description of IAM and its features, see the
|
||||
// [IAM developer's guide](https://cloud.google.com/iam).
|
||||
// [IAM developer's guide](https://cloud.google.com/iam/docs).
|
||||
type Policy struct {
|
||||
// AuditConfigs: Specifies cloud audit logging configuration for this
|
||||
// policy.
|
||||
|
|
@ -1703,7 +1703,7 @@ type Policy struct {
|
|||
// policy is overwritten blindly.
|
||||
Etag string `json:"etag,omitempty"`
|
||||
|
||||
// Version: Version of the `Policy`. The default version is 0.
|
||||
// Version: Deprecated.
|
||||
Version int64 `json:"version,omitempty"`
|
||||
|
||||
// ServerResponse contains the HTTP response code and headers from the
|
||||
|
|
@ -1797,10 +1797,10 @@ type Project struct {
|
|||
|
||||
// Parent: An optional reference to a parent Resource.
|
||||
//
|
||||
// The only supported parent type is "organization". Once set, the
|
||||
// parent
|
||||
// cannot be modified. The `parent` can be set on creation or using
|
||||
// Supported parent types include "organization" and "folder". Once set,
|
||||
// the
|
||||
// parent cannot be cleared. The `parent` can be set on creation or
|
||||
// using the
|
||||
// `UpdateProject` method; the end user must have
|
||||
// the
|
||||
// `resourcemanager.projects.create` permission on the
|
||||
|
|
@ -6273,7 +6273,11 @@ type ProjectsGetIamPolicyCall struct {
|
|||
//
|
||||
// Authorization requires the Google IAM
|
||||
// permission
|
||||
// `resourcemanager.projects.getIamPolicy` on the project
|
||||
// `resourcemanager.projects.getIamPolicy` on the project.
|
||||
//
|
||||
// For additional information about resource structure and
|
||||
// identification,
|
||||
// see [Resource Names](/apis/design/resource_names).
|
||||
func (r *ProjectsService) GetIamPolicy(resource string, getiampolicyrequest *GetIamPolicyRequest) *ProjectsGetIamPolicyCall {
|
||||
c := &ProjectsGetIamPolicyCall{s: r.s, urlParams_: make(gensupport.URLParams)}
|
||||
c.resource = resource
|
||||
|
|
@ -6367,7 +6371,7 @@ func (c *ProjectsGetIamPolicyCall) Do(opts ...googleapi.CallOption) (*Policy, er
|
|||
}
|
||||
return ret, nil
|
||||
// {
|
||||
// "description": "Returns the IAM access control policy for the specified Project.\nPermission is denied if the policy or the resource does not exist.\n\nAuthorization requires the Google IAM permission\n`resourcemanager.projects.getIamPolicy` on the project",
|
||||
// "description": "Returns the IAM access control policy for the specified Project.\nPermission is denied if the policy or the resource does not exist.\n\nAuthorization requires the Google IAM permission\n`resourcemanager.projects.getIamPolicy` on the project.\n\nFor additional information about resource structure and identification,\nsee [Resource Names](/apis/design/resource_names).",
|
||||
// "flatPath": "v1/projects/{resource}:getIamPolicy",
|
||||
// "httpMethod": "POST",
|
||||
// "id": "cloudresourcemanager.projects.getIamPolicy",
|
||||
|
|
@ -6555,7 +6559,14 @@ type ProjectsListCall struct {
|
|||
// the
|
||||
// specified filter. This method returns Projects in an unspecified
|
||||
// order.
|
||||
// New Projects do not necessarily appear at the end of the list.
|
||||
// This method is eventually consistent with project mutations; this
|
||||
// means
|
||||
// that a newly created project may not appear in the results or
|
||||
// recent
|
||||
// updates to an existing project may not be reflected in the results.
|
||||
// To
|
||||
// retrieve the latest state of a project, use the
|
||||
// GetProject method.
|
||||
func (r *ProjectsService) List() *ProjectsListCall {
|
||||
c := &ProjectsListCall{s: r.s, urlParams_: make(gensupport.URLParams)}
|
||||
return c
|
||||
|
|
@ -6716,7 +6727,7 @@ func (c *ProjectsListCall) Do(opts ...googleapi.CallOption) (*ListProjectsRespon
|
|||
}
|
||||
return ret, nil
|
||||
// {
|
||||
// "description": "Lists Projects that are visible to the user and satisfy the\nspecified filter. This method returns Projects in an unspecified order.\nNew Projects do not necessarily appear at the end of the list.",
|
||||
// "description": "Lists Projects that are visible to the user and satisfy the\nspecified filter. This method returns Projects in an unspecified order.\nThis method is eventually consistent with project mutations; this means\nthat a newly created project may not appear in the results or recent\nupdates to an existing project may not be reflected in the results. To\nretrieve the latest state of a project, use the\nGetProject method.",
|
||||
// "flatPath": "v1/projects",
|
||||
// "httpMethod": "GET",
|
||||
// "id": "cloudresourcemanager.projects.list",
|
||||
|
|
@ -7102,7 +7113,7 @@ type ProjectsSetIamPolicyCall struct {
|
|||
}
|
||||
|
||||
// SetIamPolicy: Sets the IAM access control policy for the specified
|
||||
// Project. Replaces
|
||||
// Project. Overwrites
|
||||
// any existing policy.
|
||||
//
|
||||
// The following constraints apply when using `setIamPolicy()`:
|
||||
|
|
@ -7148,8 +7159,9 @@ type ProjectsSetIamPolicyCall struct {
|
|||
// is
|
||||
// rectified.
|
||||
//
|
||||
// + Calling this method requires enabling the App Engine Admin
|
||||
// API.
|
||||
// + This method will replace the existing policy, and cannot be used
|
||||
// to
|
||||
// append additional IAM settings.
|
||||
//
|
||||
// Note: Removing service accounts from policies or changing their
|
||||
// roles
|
||||
|
|
@ -7255,7 +7267,7 @@ func (c *ProjectsSetIamPolicyCall) Do(opts ...googleapi.CallOption) (*Policy, er
|
|||
}
|
||||
return ret, nil
|
||||
// {
|
||||
// "description": "Sets the IAM access control policy for the specified Project. Replaces\nany existing policy.\n\nThe following constraints apply when using `setIamPolicy()`:\n\n+ Project does not support `allUsers` and `allAuthenticatedUsers` as\n`members` in a `Binding` of a `Policy`.\n\n+ The owner role can be granted only to `user` and `serviceAccount`.\n\n+ Service accounts can be made owners of a project directly\nwithout any restrictions. However, to be added as an owner, a user must be\ninvited via Cloud Platform console and must accept the invitation.\n\n+ A user cannot be granted the owner role using `setIamPolicy()`. The user\nmust be granted the owner role using the Cloud Platform Console and must\nexplicitly accept the invitation.\n\n+ Invitations to grant the owner role cannot be sent using\n`setIamPolicy()`;\nthey must be sent only using the Cloud Platform Console.\n\n+ Membership changes that leave the project without any owners that have\naccepted the Terms of Service (ToS) will be rejected.\n\n+ If the project is not part of an organization, there must be at least\none owner who has accepted the Terms of Service (ToS) agreement in the\npolicy. Calling `setIamPolicy()` to remove the last ToS-accepted owner\nfrom the policy will fail. This restriction also applies to legacy\nprojects that no longer have owners who have accepted the ToS. Edits to\nIAM policies will be rejected until the lack of a ToS-accepting owner is\nrectified.\n\n+ Calling this method requires enabling the App Engine Admin API.\n\nNote: Removing service accounts from policies or changing their roles\ncan render services completely inoperable. It is important to understand\nhow the service account is being used before removing or updating its\nroles.\n\nAuthorization requires the Google IAM permission\n`resourcemanager.projects.setIamPolicy` on the project",
|
||||
// "description": "Sets the IAM access control policy for the specified Project. Overwrites\nany existing policy.\n\nThe following constraints apply when using `setIamPolicy()`:\n\n+ Project does not support `allUsers` and `allAuthenticatedUsers` as\n`members` in a `Binding` of a `Policy`.\n\n+ The owner role can be granted only to `user` and `serviceAccount`.\n\n+ Service accounts can be made owners of a project directly\nwithout any restrictions. However, to be added as an owner, a user must be\ninvited via Cloud Platform console and must accept the invitation.\n\n+ A user cannot be granted the owner role using `setIamPolicy()`. The user\nmust be granted the owner role using the Cloud Platform Console and must\nexplicitly accept the invitation.\n\n+ Invitations to grant the owner role cannot be sent using\n`setIamPolicy()`;\nthey must be sent only using the Cloud Platform Console.\n\n+ Membership changes that leave the project without any owners that have\naccepted the Terms of Service (ToS) will be rejected.\n\n+ If the project is not part of an organization, there must be at least\none owner who has accepted the Terms of Service (ToS) agreement in the\npolicy. Calling `setIamPolicy()` to remove the last ToS-accepted owner\nfrom the policy will fail. This restriction also applies to legacy\nprojects that no longer have owners who have accepted the ToS. Edits to\nIAM policies will be rejected until the lack of a ToS-accepting owner is\nrectified.\n\n+ This method will replace the existing policy, and cannot be used to\nappend additional IAM settings.\n\nNote: Removing service accounts from policies or changing their roles\ncan render services completely inoperable. It is important to understand\nhow the service account is being used before removing or updating its\nroles.\n\nAuthorization requires the Google IAM permission\n`resourcemanager.projects.setIamPolicy` on the project",
|
||||
// "flatPath": "v1/projects/{resource}:setIamPolicy",
|
||||
// "httpMethod": "POST",
|
||||
// "id": "cloudresourcemanager.projects.setIamPolicy",
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue