Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(263)

Unified Diff: generated/googleapis/lib/deploymentmanager/v2.dart

Issue 2734843002: Api-roll 46: 2017-03-06 (Closed)
Patch Set: Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « generated/googleapis/lib/dataproc/v1.dart ('k') | generated/googleapis/lib/doubleclickbidmanager/v1.dart » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: generated/googleapis/lib/deploymentmanager/v2.dart
diff --git a/generated/googleapis/lib/deploymentmanager/v2.dart b/generated/googleapis/lib/deploymentmanager/v2.dart
index 2e1cd5cae7e472a89de32031859cd519f1f1169f..8e71d158c5d8f5b1eca6746b97316ea0d2166b20 100644
--- a/generated/googleapis/lib/deploymentmanager/v2.dart
+++ b/generated/googleapis/lib/deploymentmanager/v2.dart
@@ -1343,16 +1343,23 @@ class TypesResourceApi {
* Specifies the audit configuration for a service. It consists of which
* permission types are logged, and what identities, if any, are exempted from
* logging. An AuditConifg must have one or more AuditLogConfigs.
+ *
+ * If there are AuditConfigs for both `allServices` and a specific service, the
+ * union of the two AuditConfigs is used for that service: the log_types
+ * specified in each AuditConfig are enabled, and the exempted_members in each
+ * AuditConfig are exempted. Example Policy with multiple AuditConfigs: {
+ * "audit_configs": [ { "service": "allServices" "audit_log_configs": [ {
+ * "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, {
+ * "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service":
+ * "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ",
+ * }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] }
+ * ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and
+ * ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and
+ * bar@gmail.com from DATA_WRITE logging.
*/
class AuditConfig {
/** The configuration for logging of each type of permission. */
core.List<AuditLogConfig> auditLogConfigs;
- /**
- * Specifies the identities that are exempted from "data access" audit logging
- * for the `service` specified above. Follows the same format of
- * Binding.members. This field is deprecated in favor of per-permission-type
- * exemptions.
- */
core.List<core.String> exemptedMembers;
/**
* Specifies a service that will be enabled for audit logging. For example,
« no previous file with comments | « generated/googleapis/lib/dataproc/v1.dart ('k') | generated/googleapis/lib/doubleclickbidmanager/v1.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698