| Index: generated/googleapis/lib/deploymentmanager/v2.dart
|
| diff --git a/generated/googleapis/lib/deploymentmanager/v2.dart b/generated/googleapis/lib/deploymentmanager/v2.dart
|
| index 9cf8b5fd191c36ffb48b0913d7be3982196cb0a5..825bbe40d9ee6b2974cc2545fc68991a898af7ce 100644
|
| --- a/generated/googleapis/lib/deploymentmanager/v2.dart
|
| +++ b/generated/googleapis/lib/deploymentmanager/v2.dart
|
| @@ -1347,14 +1347,19 @@ class TypesResourceApi {
|
| * If there are AuditConfigs for both `allServices` and a specific service, the
|
| * union of the two AuditConfigs is used for that service: the log_types
|
| * specified in each AuditConfig are enabled, and the exempted_members in each
|
| - * AuditConfig are exempted. Example Policy with multiple AuditConfigs: {
|
| - * "audit_configs": [ { "service": "allServices" "audit_log_configs": [ {
|
| + * AuditConfig are exempted.
|
| + *
|
| + * Example Policy with multiple AuditConfigs:
|
| + *
|
| + * { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ {
|
| * "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, {
|
| * "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service":
|
| - * "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ",
|
| + * "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ",
|
| * }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] }
|
| - * ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and
|
| - * ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and
|
| + * ] } ] }
|
| + *
|
| + * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ
|
| + * logging. It also exempts foo@gmail.com from DATA_READ logging, and
|
| * bar@gmail.com from DATA_WRITE logging.
|
| */
|
| class AuditConfig {
|
|
|