Index: discovery/googleapis/deploymentmanager__v2.json |
diff --git a/discovery/googleapis/deploymentmanager__v2.json b/discovery/googleapis/deploymentmanager__v2.json |
index a0e18105affb63742b1643e56590d26a1f71136a..d38f196ef066d8d7475e49afc4b73716e9bc1f4d 100644 |
--- a/discovery/googleapis/deploymentmanager__v2.json |
+++ b/discovery/googleapis/deploymentmanager__v2.json |
@@ -24,7 +24,7 @@ |
"description": "Declares, configures, and deploys complex solutions on Google Cloud Platform.", |
"discoveryVersion": "v1", |
"documentationLink": "https://cloud.google.com/deployment-manager/", |
- "etag": "\"tbys6C40o18GZwyMen5GMkdK-3s/236c0P79pEssBCHgt4e65pJeS8I\"", |
+ "etag": "\"tbys6C40o18GZwyMen5GMkdK-3s/IHE7RRqwAjvUDuB9q_yaFj_YTY0\"", |
"icons": { |
"x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png", |
"x32": "https://www.gstatic.com/images/branding/product/1x/googleg_32dp.png" |
@@ -919,11 +919,11 @@ |
} |
} |
}, |
- "revision": "20170302", |
+ "revision": "20170315", |
"rootUrl": "https://www.googleapis.com/", |
"schemas": { |
"AuditConfig": { |
- "description": "Specifies the audit configuration for a service. It consists of which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:foo@gmail.com\" ] }, { \"log_type\": \"DATA_WRITE\", }, { \"log_type\": \"ADMIN_READ\", } ] }, { \"service\": \"fooservice@googleapis.com\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:bar@gmail.com\" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.", |
+ "description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:foo@gmail.com\" ] }, { \"log_type\": \"DATA_WRITE\", }, { \"log_type\": \"ADMIN_READ\", } ] }, { \"service\": \"fooservice@googleapis.com\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:bar@gmail.com\" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.", |
"id": "AuditConfig", |
"properties": { |
"auditLogConfigs": { |
@@ -941,7 +941,7 @@ |
"type": "array" |
}, |
"service": { |
- "description": "Specifies a service that will be enabled for audit logging. For example, `resourcemanager`, `storage`, `compute`. `allServices` is a special value that covers all services.", |
+ "description": "Specifies a service that will be enabled for audit logging. For example, `storage.googleapis.com`, `cloudsql.googleapis.com`. `allServices` is a special value that covers all services.", |
"type": "string" |
} |
}, |