Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(70)

Side by Side Diff: generated/googleapis/lib/deploymentmanager/v2.dart

Issue 2734843002: Api-roll 46: 2017-03-06 (Closed)
Patch Set: Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // This is a generated file (see the discoveryapis_generator project). 1 // This is a generated file (see the discoveryapis_generator project).
2 2
3 library googleapis.deploymentmanager.v2; 3 library googleapis.deploymentmanager.v2;
4 4
5 import 'dart:core' as core; 5 import 'dart:core' as core;
6 import 'dart:async' as async; 6 import 'dart:async' as async;
7 import 'dart:convert' as convert; 7 import 'dart:convert' as convert;
8 8
9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons;
10 import 'package:http/http.dart' as http; 10 import 'package:http/http.dart' as http;
(...skipping 1325 matching lines...) Expand 10 before | Expand all | Expand 10 after
1336 } 1336 }
1337 1337
1338 } 1338 }
1339 1339
1340 1340
1341 1341
1342 /** 1342 /**
1343 * Specifies the audit configuration for a service. It consists of which 1343 * Specifies the audit configuration for a service. It consists of which
1344 * permission types are logged, and what identities, if any, are exempted from 1344 * permission types are logged, and what identities, if any, are exempted from
1345 * logging. An AuditConifg must have one or more AuditLogConfigs. 1345 * logging. An AuditConifg must have one or more AuditLogConfigs.
1346 *
1347 * If there are AuditConfigs for both `allServices` and a specific service, the
1348 * union of the two AuditConfigs is used for that service: the log_types
1349 * specified in each AuditConfig are enabled, and the exempted_members in each
1350 * AuditConfig are exempted. Example Policy with multiple AuditConfigs: {
1351 * "audit_configs": [ { "service": "allServices" "audit_log_configs": [ {
1352 * "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, {
1353 * "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service":
1354 * "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ",
1355 * }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] }
1356 * ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and
1357 * ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and
1358 * bar@gmail.com from DATA_WRITE logging.
1346 */ 1359 */
1347 class AuditConfig { 1360 class AuditConfig {
1348 /** The configuration for logging of each type of permission. */ 1361 /** The configuration for logging of each type of permission. */
1349 core.List<AuditLogConfig> auditLogConfigs; 1362 core.List<AuditLogConfig> auditLogConfigs;
1350 /**
1351 * Specifies the identities that are exempted from "data access" audit logging
1352 * for the `service` specified above. Follows the same format of
1353 * Binding.members. This field is deprecated in favor of per-permission-type
1354 * exemptions.
1355 */
1356 core.List<core.String> exemptedMembers; 1363 core.List<core.String> exemptedMembers;
1357 /** 1364 /**
1358 * Specifies a service that will be enabled for audit logging. For example, 1365 * Specifies a service that will be enabled for audit logging. For example,
1359 * `resourcemanager`, `storage`, `compute`. `allServices` is a special value 1366 * `resourcemanager`, `storage`, `compute`. `allServices` is a special value
1360 * that covers all services. 1367 * that covers all services.
1361 */ 1368 */
1362 core.String service; 1369 core.String service;
1363 1370
1364 AuditConfig(); 1371 AuditConfig();
1365 1372
(...skipping 2090 matching lines...) Expand 10 before | Expand all | Expand 10 after
3456 var _json = new core.Map(); 3463 var _json = new core.Map();
3457 if (nextPageToken != null) { 3464 if (nextPageToken != null) {
3458 _json["nextPageToken"] = nextPageToken; 3465 _json["nextPageToken"] = nextPageToken;
3459 } 3466 }
3460 if (types != null) { 3467 if (types != null) {
3461 _json["types"] = types.map((value) => (value).toJson()).toList(); 3468 _json["types"] = types.map((value) => (value).toJson()).toList();
3462 } 3469 }
3463 return _json; 3470 return _json;
3464 } 3471 }
3465 } 3472 }
OLDNEW
« no previous file with comments | « generated/googleapis/lib/dataproc/v1.dart ('k') | generated/googleapis/lib/doubleclickbidmanager/v1.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698