Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(492)

Side by Side Diff: generated/googleapis/lib/sourcerepo/v1.dart

Issue 2824163002: Api-roll 48: 2017-04-18 (Closed)
Patch Set: Revert changes to pubspecs Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « generated/googleapis/lib/slides/v1.dart ('k') | generated/googleapis/lib/spanner/v1.dart » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // This is a generated file (see the discoveryapis_generator project). 1 // This is a generated file (see the discoveryapis_generator project).
2 2
3 library googleapis.sourcerepo.v1; 3 library googleapis.sourcerepo.v1;
4 4
5 import 'dart:core' as core; 5 import 'dart:core' as core;
6 import 'dart:async' as async; 6 import 'dart:async' as async;
7 import 'dart:convert' as convert; 7 import 'dart:convert' as convert;
8 8
9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons;
10 import 'package:http/http.dart' as http; 10 import 'package:http/http.dart' as http;
(...skipping 355 matching lines...) Expand 10 before | Expand all | Expand 10 after
366 /** 366 /**
367 * Specifies the audit configuration for a service. 367 * Specifies the audit configuration for a service.
368 * The configuration determines which permission types are logged, and what 368 * The configuration determines which permission types are logged, and what
369 * identities, if any, are exempted from logging. 369 * identities, if any, are exempted from logging.
370 * An AuditConifg must have one or more AuditLogConfigs. 370 * An AuditConifg must have one or more AuditLogConfigs.
371 * 371 *
372 * If there are AuditConfigs for both `allServices` and a specific service, 372 * If there are AuditConfigs for both `allServices` and a specific service,
373 * the union of the two AuditConfigs is used for that service: the log_types 373 * the union of the two AuditConfigs is used for that service: the log_types
374 * specified in each AuditConfig are enabled, and the exempted_members in each 374 * specified in each AuditConfig are enabled, and the exempted_members in each
375 * AuditConfig are exempted. 375 * AuditConfig are exempted.
376 *
376 * Example Policy with multiple AuditConfigs: 377 * Example Policy with multiple AuditConfigs:
377 * { 378 *
378 * "audit_configs": [
379 * { 379 * {
380 * "service": "allServices" 380 * "audit_configs": [
381 * "audit_log_configs": [
382 * { 381 * {
383 * "log_type": "DATA_READ", 382 * "service": "allServices"
384 * "exempted_members": [ 383 * "audit_log_configs": [
385 * "user:foo@gmail.com" 384 * {
385 * "log_type": "DATA_READ",
386 * "exempted_members": [
387 * "user:foo@gmail.com"
388 * ]
389 * },
390 * {
391 * "log_type": "DATA_WRITE",
392 * },
393 * {
394 * "log_type": "ADMIN_READ",
395 * }
386 * ] 396 * ]
387 * }, 397 * },
388 * { 398 * {
389 * "log_type": "DATA_WRITE", 399 * "service": "fooservice.googleapis.com"
390 * }, 400 * "audit_log_configs": [
391 * { 401 * {
392 * "log_type": "ADMIN_READ", 402 * "log_type": "DATA_READ",
393 * } 403 * },
394 * ] 404 * {
395 * }, 405 * "log_type": "DATA_WRITE",
396 * { 406 * "exempted_members": [
397 * "service": "fooservice@googleapis.com" 407 * "user:bar@gmail.com"
398 * "audit_log_configs": [ 408 * ]
399 * { 409 * }
400 * "log_type": "DATA_READ",
401 * },
402 * {
403 * "log_type": "DATA_WRITE",
404 * "exempted_members": [
405 * "user:bar@gmail.com"
406 * ] 410 * ]
407 * } 411 * }
408 * ] 412 * ]
409 * } 413 * }
410 * ] 414 *
411 * }
412 * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ 415 * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
413 * logging. It also exempts foo@gmail.com from DATA_READ logging, and 416 * logging. It also exempts foo@gmail.com from DATA_READ logging, and
414 * bar@gmail.com from DATA_WRITE logging. 417 * bar@gmail.com from DATA_WRITE logging.
415 */ 418 */
416 class AuditConfig { 419 class AuditConfig {
417 /** 420 /**
418 * The configuration for logging of each type of permission. 421 * The configuration for logging of each type of permission.
419 * Next ID: 4 422 * Next ID: 4
420 */ 423 */
421 core.List<AuditLogConfig> auditLogConfigs; 424 core.List<AuditLogConfig> auditLogConfigs;
(...skipping 812 matching lines...) Expand 10 before | Expand all | Expand 10 after
1234 } 1237 }
1235 1238
1236 core.Map toJson() { 1239 core.Map toJson() {
1237 var _json = new core.Map(); 1240 var _json = new core.Map();
1238 if (permissions != null) { 1241 if (permissions != null) {
1239 _json["permissions"] = permissions; 1242 _json["permissions"] = permissions;
1240 } 1243 }
1241 return _json; 1244 return _json;
1242 } 1245 }
1243 } 1246 }
OLDNEW
« no previous file with comments | « generated/googleapis/lib/slides/v1.dart ('k') | generated/googleapis/lib/spanner/v1.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698