Index: generated/googleapis/lib/sourcerepo/v1.dart |
diff --git a/generated/googleapis/lib/sourcerepo/v1.dart b/generated/googleapis/lib/sourcerepo/v1.dart |
index b308053211ee6fccb8e34f1d4bf625b39dcccffb..0452fe308b8bb9ed822a654445de317bd99c11e0 100644 |
--- a/generated/googleapis/lib/sourcerepo/v1.dart |
+++ b/generated/googleapis/lib/sourcerepo/v1.dart |
@@ -373,42 +373,45 @@ class ProjectsReposResourceApi { |
* the union of the two AuditConfigs is used for that service: the log_types |
* specified in each AuditConfig are enabled, and the exempted_members in each |
* AuditConfig are exempted. |
+ * |
* Example Policy with multiple AuditConfigs: |
- * { |
- * "audit_configs": [ |
+ * |
* { |
- * "service": "allServices" |
- * "audit_log_configs": [ |
+ * "audit_configs": [ |
* { |
- * "log_type": "DATA_READ", |
- * "exempted_members": [ |
- * "user:foo@gmail.com" |
+ * "service": "allServices" |
+ * "audit_log_configs": [ |
+ * { |
+ * "log_type": "DATA_READ", |
+ * "exempted_members": [ |
+ * "user:foo@gmail.com" |
+ * ] |
+ * }, |
+ * { |
+ * "log_type": "DATA_WRITE", |
+ * }, |
+ * { |
+ * "log_type": "ADMIN_READ", |
+ * } |
* ] |
* }, |
* { |
- * "log_type": "DATA_WRITE", |
- * }, |
- * { |
- * "log_type": "ADMIN_READ", |
- * } |
- * ] |
- * }, |
- * { |
- * "service": "fooservice@googleapis.com" |
- * "audit_log_configs": [ |
- * { |
- * "log_type": "DATA_READ", |
- * }, |
- * { |
- * "log_type": "DATA_WRITE", |
- * "exempted_members": [ |
- * "user:bar@gmail.com" |
+ * "service": "fooservice.googleapis.com" |
+ * "audit_log_configs": [ |
+ * { |
+ * "log_type": "DATA_READ", |
+ * }, |
+ * { |
+ * "log_type": "DATA_WRITE", |
+ * "exempted_members": [ |
+ * "user:bar@gmail.com" |
+ * ] |
+ * } |
* ] |
* } |
* ] |
* } |
- * ] |
- * } |
+ * |
* For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ |
* logging. It also exempts foo@gmail.com from DATA_READ logging, and |
* bar@gmail.com from DATA_WRITE logging. |