OXIESEC PANEL
- Current Dir:
/
/
var
/
www
/
firebase
/
vendor
/
google
/
common-protos
/
src
/
Api
Server IP: 139.59.38.164
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
08/12/2024 10:36:18 AM
rwxr-xr-x
📄
Advice.php
2.04 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
AuthProvider.php
16.66 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
AuthRequirement.php
6.4 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Authentication.php
4.2 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
AuthenticationRule.php
6.1 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Backend.php
2.31 KB
08/12/2024 10:33:56 AM
rw-r--r--
📁
BackendRule
-
08/12/2024 10:35:04 AM
rwxr-xr-x
📄
BackendRule.php
18.63 KB
08/12/2024 10:33:56 AM
rw-r--r--
📁
Billing
-
08/12/2024 10:35:04 AM
rwxr-xr-x
📄
Billing.php
4.25 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ChangeType.php
2.03 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ClientLibraryDestination.php
1.88 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ClientLibraryOrganization.php
2.61 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ClientLibrarySettings.php
14.28 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
CommonLanguageSettings.php
3.7 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ConfigChange.php
8.9 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Context.php
3.41 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ContextRule.php
7.95 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Control.php
3.71 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
CppSettings.php
1.85 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
CustomHttpPattern.php
2.37 KB
08/12/2024 10:33:56 AM
rw-r--r--
📁
Distribution
-
08/12/2024 10:36:18 AM
rwxr-xr-x
📄
Distribution.php
15.39 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Documentation.php
13.04 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
DocumentationRule.php
6.49 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
DotnetSettings.php
11.41 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Endpoint.php
8.24 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
ErrorReason.php
28.55 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
FieldBehavior.php
5.02 KB
08/12/2024 10:33:56 AM
rw-r--r--
📁
FieldInfo
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
FieldInfo.php
4.17 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
FieldPolicy.php
6.66 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
GoSettings.php
1.84 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
Http.php
4.49 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
HttpBody.php
5.34 KB
08/12/2024 10:33:56 AM
rw-r--r--
📄
HttpRule.php
24.57 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
JavaSettings.php
8.01 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
JwtLocation.php
5.82 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
LabelDescriptor
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
LabelDescriptor.php
3.38 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
LaunchStage.php
4.28 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
LogDescriptor.php
6.83 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
Logging
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
Logging.php
6.1 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
MethodPolicy.php
4.2 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
MethodSettings
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
MethodSettings.php
9.2 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Metric.php
3.58 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
MetricDescriptor
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
MetricDescriptor.php
36.34 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
MetricRule.php
4.28 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
MonitoredResource.php
5.76 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
MonitoredResourceDescriptor.php
11.69 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
MonitoredResourceMetadata.php
5.25 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
Monitoring
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
Monitoring.php
8.71 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
NodeSettings.php
1.85 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
OAuthRequirements.php
3.72 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Page.php
7.26 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
PhpSettings.php
1.85 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
ProjectProperties.php
2.63 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
Property
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
Property.php
3.7 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Publishing.php
15.91 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
PythonSettings.php
1.86 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Quota.php
5.01 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
QuotaLimit.php
20.61 KB
08/12/2024 10:33:57 AM
rw-r--r--
📁
ResourceDescriptor
-
08/12/2024 10:35:05 AM
rwxr-xr-x
📄
ResourceDescriptor.php
21.19 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
ResourceReference.php
6.3 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
RoutingParameter.php
13.21 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
RoutingRule.php
13.93 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
RubySettings.php
1.85 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Service.php
40 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
SourceInfo.php
1.94 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
SystemParameter.php
4.1 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
SystemParameterRule.php
4.59 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
SystemParameters.php
6.09 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
TypeReference.php
3.63 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Usage.php
8.15 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
UsageRule.php
6.25 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
Visibility.php
3.23 KB
08/12/2024 10:33:57 AM
rw-r--r--
📄
VisibilityRule.php
5.25 KB
08/12/2024 10:33:57 AM
rw-r--r--
Editing: AuthProvider.php
Close
<?php # Generated by the protocol buffer compiler. DO NOT EDIT! # source: google/api/auth.proto namespace Google\Api; use Google\Protobuf\Internal\GPBType; use Google\Protobuf\Internal\RepeatedField; use Google\Protobuf\Internal\GPBUtil; /** * Configuration for an authentication provider, including support for * [JSON Web Token * (JWT)](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32). * * Generated from protobuf message <code>google.api.AuthProvider</code> */ class AuthProvider extends \Google\Protobuf\Internal\Message { /** * The unique identifier of the auth provider. It will be referred to by * `AuthRequirement.provider_id`. * Example: "bookstore_auth". * * Generated from protobuf field <code>string id = 1;</code> */ protected $id = ''; /** * Identifies the principal that issued the JWT. See * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1 * Usually a URL or an email address. * Example: https://securetoken.google.com * Example: 1234567-compute@developer.gserviceaccount.com * * Generated from protobuf field <code>string issuer = 2;</code> */ protected $issuer = ''; /** * URL of the provider's public key set to validate signature of the JWT. See * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). * Optional if the key set document: * - can be retrieved from * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html) * of the issuer. * - can be inferred from the email domain of the issuer (e.g. a Google * service account). * Example: https://www.googleapis.com/oauth2/v1/certs * * Generated from protobuf field <code>string jwks_uri = 3;</code> */ protected $jwks_uri = ''; /** * The list of JWT * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3). * that are allowed to access. A JWT containing any of these audiences will * be accepted. When this setting is absent, JWTs with audiences: * - "https://[service.name]/[google.protobuf.Api.name]" * - "https://[service.name]/" * will be accepted. * For example, if no audiences are in the setting, LibraryService API will * accept JWTs with the following audiences: * - * https://library-example.googleapis.com/google.example.library.v1.LibraryService * - https://library-example.googleapis.com/ * Example: * audiences: bookstore_android.apps.googleusercontent.com, * bookstore_web.apps.googleusercontent.com * * Generated from protobuf field <code>string audiences = 4;</code> */ protected $audiences = ''; /** * Redirect URL if JWT token is required but not present or is expired. * Implement authorizationUrl of securityDefinitions in OpenAPI spec. * * Generated from protobuf field <code>string authorization_url = 5;</code> */ protected $authorization_url = ''; /** * Defines the locations to extract the JWT. For now it is only used by the * Cloud Endpoints to store the OpenAPI extension [x-google-jwt-locations] * (https://cloud.google.com/endpoints/docs/openapi/openapi-extensions#x-google-jwt-locations) * JWT locations can be one of HTTP headers, URL query parameters or * cookies. The rule is that the first match wins. * If not specified, default to use following 3 locations: * 1) Authorization: Bearer * 2) x-goog-iap-jwt-assertion * 3) access_token query parameter * Default locations can be specified as followings: * jwt_locations: * - header: Authorization * value_prefix: "Bearer " * - header: x-goog-iap-jwt-assertion * - query: access_token * * Generated from protobuf field <code>repeated .google.api.JwtLocation jwt_locations = 6;</code> */ private $jwt_locations; /** * Constructor. * * @param array $data { * Optional. Data for populating the Message object. * * @type string $id * The unique identifier of the auth provider. It will be referred to by * `AuthRequirement.provider_id`. * Example: "bookstore_auth". * @type string $issuer * Identifies the principal that issued the JWT. See * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1 * Usually a URL or an email address. * Example: https://securetoken.google.com * Example: 1234567-compute@developer.gserviceaccount.com * @type string $jwks_uri * URL of the provider's public key set to validate signature of the JWT. See * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). * Optional if the key set document: * - can be retrieved from * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html) * of the issuer. * - can be inferred from the email domain of the issuer (e.g. a Google * service account). * Example: https://www.googleapis.com/oauth2/v1/certs * @type string $audiences * The list of JWT * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3). * that are allowed to access. A JWT containing any of these audiences will * be accepted. When this setting is absent, JWTs with audiences: * - "https://[service.name]/[google.protobuf.Api.name]" * - "https://[service.name]/" * will be accepted. * For example, if no audiences are in the setting, LibraryService API will * accept JWTs with the following audiences: * - * https://library-example.googleapis.com/google.example.library.v1.LibraryService * - https://library-example.googleapis.com/ * Example: * audiences: bookstore_android.apps.googleusercontent.com, * bookstore_web.apps.googleusercontent.com * @type string $authorization_url * Redirect URL if JWT token is required but not present or is expired. * Implement authorizationUrl of securityDefinitions in OpenAPI spec. * @type array<\Google\Api\JwtLocation>|\Google\Protobuf\Internal\RepeatedField $jwt_locations * Defines the locations to extract the JWT. For now it is only used by the * Cloud Endpoints to store the OpenAPI extension [x-google-jwt-locations] * (https://cloud.google.com/endpoints/docs/openapi/openapi-extensions#x-google-jwt-locations) * JWT locations can be one of HTTP headers, URL query parameters or * cookies. The rule is that the first match wins. * If not specified, default to use following 3 locations: * 1) Authorization: Bearer * 2) x-goog-iap-jwt-assertion * 3) access_token query parameter * Default locations can be specified as followings: * jwt_locations: * - header: Authorization * value_prefix: "Bearer " * - header: x-goog-iap-jwt-assertion * - query: access_token * } */ public function __construct($data = NULL) { \GPBMetadata\Google\Api\Auth::initOnce(); parent::__construct($data); } /** * The unique identifier of the auth provider. It will be referred to by * `AuthRequirement.provider_id`. * Example: "bookstore_auth". * * Generated from protobuf field <code>string id = 1;</code> * @return string */ public function getId() { return $this->id; } /** * The unique identifier of the auth provider. It will be referred to by * `AuthRequirement.provider_id`. * Example: "bookstore_auth". * * Generated from protobuf field <code>string id = 1;</code> * @param string $var * @return $this */ public function setId($var) { GPBUtil::checkString($var, True); $this->id = $var; return $this; } /** * Identifies the principal that issued the JWT. See * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1 * Usually a URL or an email address. * Example: https://securetoken.google.com * Example: 1234567-compute@developer.gserviceaccount.com * * Generated from protobuf field <code>string issuer = 2;</code> * @return string */ public function getIssuer() { return $this->issuer; } /** * Identifies the principal that issued the JWT. See * https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.1 * Usually a URL or an email address. * Example: https://securetoken.google.com * Example: 1234567-compute@developer.gserviceaccount.com * * Generated from protobuf field <code>string issuer = 2;</code> * @param string $var * @return $this */ public function setIssuer($var) { GPBUtil::checkString($var, True); $this->issuer = $var; return $this; } /** * URL of the provider's public key set to validate signature of the JWT. See * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). * Optional if the key set document: * - can be retrieved from * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html) * of the issuer. * - can be inferred from the email domain of the issuer (e.g. a Google * service account). * Example: https://www.googleapis.com/oauth2/v1/certs * * Generated from protobuf field <code>string jwks_uri = 3;</code> * @return string */ public function getJwksUri() { return $this->jwks_uri; } /** * URL of the provider's public key set to validate signature of the JWT. See * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderMetadata). * Optional if the key set document: * - can be retrieved from * [OpenID * Discovery](https://openid.net/specs/openid-connect-discovery-1_0.html) * of the issuer. * - can be inferred from the email domain of the issuer (e.g. a Google * service account). * Example: https://www.googleapis.com/oauth2/v1/certs * * Generated from protobuf field <code>string jwks_uri = 3;</code> * @param string $var * @return $this */ public function setJwksUri($var) { GPBUtil::checkString($var, True); $this->jwks_uri = $var; return $this; } /** * The list of JWT * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3). * that are allowed to access. A JWT containing any of these audiences will * be accepted. When this setting is absent, JWTs with audiences: * - "https://[service.name]/[google.protobuf.Api.name]" * - "https://[service.name]/" * will be accepted. * For example, if no audiences are in the setting, LibraryService API will * accept JWTs with the following audiences: * - * https://library-example.googleapis.com/google.example.library.v1.LibraryService * - https://library-example.googleapis.com/ * Example: * audiences: bookstore_android.apps.googleusercontent.com, * bookstore_web.apps.googleusercontent.com * * Generated from protobuf field <code>string audiences = 4;</code> * @return string */ public function getAudiences() { return $this->audiences; } /** * The list of JWT * [audiences](https://tools.ietf.org/html/draft-ietf-oauth-json-web-token-32#section-4.1.3). * that are allowed to access. A JWT containing any of these audiences will * be accepted. When this setting is absent, JWTs with audiences: * - "https://[service.name]/[google.protobuf.Api.name]" * - "https://[service.name]/" * will be accepted. * For example, if no audiences are in the setting, LibraryService API will * accept JWTs with the following audiences: * - * https://library-example.googleapis.com/google.example.library.v1.LibraryService * - https://library-example.googleapis.com/ * Example: * audiences: bookstore_android.apps.googleusercontent.com, * bookstore_web.apps.googleusercontent.com * * Generated from protobuf field <code>string audiences = 4;</code> * @param string $var * @return $this */ public function setAudiences($var) { GPBUtil::checkString($var, True); $this->audiences = $var; return $this; } /** * Redirect URL if JWT token is required but not present or is expired. * Implement authorizationUrl of securityDefinitions in OpenAPI spec. * * Generated from protobuf field <code>string authorization_url = 5;</code> * @return string */ public function getAuthorizationUrl() { return $this->authorization_url; } /** * Redirect URL if JWT token is required but not present or is expired. * Implement authorizationUrl of securityDefinitions in OpenAPI spec. * * Generated from protobuf field <code>string authorization_url = 5;</code> * @param string $var * @return $this */ public function setAuthorizationUrl($var) { GPBUtil::checkString($var, True); $this->authorization_url = $var; return $this; } /** * Defines the locations to extract the JWT. For now it is only used by the * Cloud Endpoints to store the OpenAPI extension [x-google-jwt-locations] * (https://cloud.google.com/endpoints/docs/openapi/openapi-extensions#x-google-jwt-locations) * JWT locations can be one of HTTP headers, URL query parameters or * cookies. The rule is that the first match wins. * If not specified, default to use following 3 locations: * 1) Authorization: Bearer * 2) x-goog-iap-jwt-assertion * 3) access_token query parameter * Default locations can be specified as followings: * jwt_locations: * - header: Authorization * value_prefix: "Bearer " * - header: x-goog-iap-jwt-assertion * - query: access_token * * Generated from protobuf field <code>repeated .google.api.JwtLocation jwt_locations = 6;</code> * @return \Google\Protobuf\Internal\RepeatedField */ public function getJwtLocations() { return $this->jwt_locations; } /** * Defines the locations to extract the JWT. For now it is only used by the * Cloud Endpoints to store the OpenAPI extension [x-google-jwt-locations] * (https://cloud.google.com/endpoints/docs/openapi/openapi-extensions#x-google-jwt-locations) * JWT locations can be one of HTTP headers, URL query parameters or * cookies. The rule is that the first match wins. * If not specified, default to use following 3 locations: * 1) Authorization: Bearer * 2) x-goog-iap-jwt-assertion * 3) access_token query parameter * Default locations can be specified as followings: * jwt_locations: * - header: Authorization * value_prefix: "Bearer " * - header: x-goog-iap-jwt-assertion * - query: access_token * * Generated from protobuf field <code>repeated .google.api.JwtLocation jwt_locations = 6;</code> * @param array<\Google\Api\JwtLocation>|\Google\Protobuf\Internal\RepeatedField $var * @return $this */ public function setJwtLocations($var) { $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::MESSAGE, \Google\Api\JwtLocation::class); $this->jwt_locations = $arr; return $this; } }