Index: generated/googleapis/lib/deploymentmanager/v2.dart |
diff --git a/generated/googleapis/lib/deploymentmanager/v2.dart b/generated/googleapis/lib/deploymentmanager/v2.dart |
index 9cf8b5fd191c36ffb48b0913d7be3982196cb0a5..825bbe40d9ee6b2974cc2545fc68991a898af7ce 100644 |
--- a/generated/googleapis/lib/deploymentmanager/v2.dart |
+++ b/generated/googleapis/lib/deploymentmanager/v2.dart |
@@ -1347,14 +1347,19 @@ class TypesResourceApi { |
* If there are AuditConfigs for both `allServices` and a specific service, the |
* union of the two AuditConfigs is used for that service: the log_types |
* specified in each AuditConfig are enabled, and the exempted_members in each |
- * AuditConfig are exempted. Example Policy with multiple AuditConfigs: { |
- * "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { |
+ * AuditConfig are exempted. |
+ * |
+ * Example Policy with multiple AuditConfigs: |
+ * |
+ * { "audit_configs": [ { "service": "allServices" "audit_log_configs": [ { |
* "log_type": "DATA_READ", "exempted_members": [ "user:foo@gmail.com" ] }, { |
* "log_type": "DATA_WRITE", }, { "log_type": "ADMIN_READ", } ] }, { "service": |
- * "fooservice@googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", |
+ * "fooservice.googleapis.com" "audit_log_configs": [ { "log_type": "DATA_READ", |
* }, { "log_type": "DATA_WRITE", "exempted_members": [ "user:bar@gmail.com" ] } |
- * ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and |
- * ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and |
+ * ] } ] } |
+ * |
+ * For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ |
+ * logging. It also exempts foo@gmail.com from DATA_READ logging, and |
* bar@gmail.com from DATA_WRITE logging. |
*/ |
class AuditConfig { |