| Index: discovery/googleapis/deploymentmanager__v2.json
|
| diff --git a/discovery/googleapis/deploymentmanager__v2.json b/discovery/googleapis/deploymentmanager__v2.json
|
| index d4a98f49aa2349b1f989cc95582e68e8f47f47c2..a0e18105affb63742b1643e56590d26a1f71136a 100644
|
| --- a/discovery/googleapis/deploymentmanager__v2.json
|
| +++ b/discovery/googleapis/deploymentmanager__v2.json
|
| @@ -24,7 +24,7 @@
|
| "description": "Declares, configures, and deploys complex solutions on Google Cloud Platform.",
|
| "discoveryVersion": "v1",
|
| "documentationLink": "https://cloud.google.com/deployment-manager/",
|
| - "etag": "\"tbys6C40o18GZwyMen5GMkdK-3s/BZOTaOSd6CDPT3kBLAME2ENtrqQ\"",
|
| + "etag": "\"tbys6C40o18GZwyMen5GMkdK-3s/236c0P79pEssBCHgt4e65pJeS8I\"",
|
| "icons": {
|
| "x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",
|
| "x32": "https://www.gstatic.com/images/branding/product/1x/googleg_32dp.png"
|
| @@ -919,11 +919,11 @@
|
| }
|
| }
|
| },
|
| - "revision": "20170126",
|
| + "revision": "20170302",
|
| "rootUrl": "https://www.googleapis.com/",
|
| "schemas": {
|
| "AuditConfig": {
|
| - "description": "Specifies the audit configuration for a service. It consists of which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.",
|
| + "description": "Specifies the audit configuration for a service. It consists of which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:foo@gmail.com\" ] }, { \"log_type\": \"DATA_WRITE\", }, { \"log_type\": \"ADMIN_READ\", } ] }, { \"service\": \"fooservice@googleapis.com\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:bar@gmail.com\" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.",
|
| "id": "AuditConfig",
|
| "properties": {
|
| "auditLogConfigs": {
|
| @@ -934,7 +934,7 @@
|
| "type": "array"
|
| },
|
| "exemptedMembers": {
|
| - "description": "Specifies the identities that are exempted from \"data access\" audit logging for the `service` specified above. Follows the same format of Binding.members. This field is deprecated in favor of per-permission-type exemptions.",
|
| + "description": "",
|
| "items": {
|
| "type": "string"
|
| },
|
|
|