| Index: discovery/googleapis/deploymentmanager__v2.json
|
| diff --git a/discovery/googleapis/deploymentmanager__v2.json b/discovery/googleapis/deploymentmanager__v2.json
|
| index d38f196ef066d8d7475e49afc4b73716e9bc1f4d..ee2c0ba24d7a5a2c3f7875fd41826299c3dc0700 100644
|
| --- a/discovery/googleapis/deploymentmanager__v2.json
|
| +++ b/discovery/googleapis/deploymentmanager__v2.json
|
| @@ -24,7 +24,7 @@
|
| "description": "Declares, configures, and deploys complex solutions on Google Cloud Platform.",
|
| "discoveryVersion": "v1",
|
| "documentationLink": "https://cloud.google.com/deployment-manager/",
|
| - "etag": "\"tbys6C40o18GZwyMen5GMkdK-3s/IHE7RRqwAjvUDuB9q_yaFj_YTY0\"",
|
| + "etag": "\"YWOzh2SDasdU84ArJnpYek-OMdg/MyRdVyVTYA0_k7DO0LZvygMuxpU\"",
|
| "icons": {
|
| "x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",
|
| "x32": "https://www.gstatic.com/images/branding/product/1x/googleg_32dp.png"
|
| @@ -919,11 +919,11 @@
|
| }
|
| }
|
| },
|
| - "revision": "20170315",
|
| + "revision": "20170410",
|
| "rootUrl": "https://www.googleapis.com/",
|
| "schemas": {
|
| "AuditConfig": {
|
| - "description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:foo@gmail.com\" ] }, { \"log_type\": \"DATA_WRITE\", }, { \"log_type\": \"ADMIN_READ\", } ] }, { \"service\": \"fooservice@googleapis.com\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:bar@gmail.com\" ] } ] } ] } For fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.",
|
| + "description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConifg must have one or more AuditLogConfigs.\n\nIf there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditConfig are exempted.\n\nExample Policy with multiple AuditConfigs:\n\n{ \"audit_configs\": [ { \"service\": \"allServices\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:foo@gmail.com\" ] }, { \"log_type\": \"DATA_WRITE\", }, { \"log_type\": \"ADMIN_READ\", } ] }, { \"service\": \"fooservice.googleapis.com\" \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:bar@gmail.com\" ] } ] } ] }\n\nFor fooservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts foo@gmail.com from DATA_READ logging, and bar@gmail.com from DATA_WRITE logging.",
|
| "id": "AuditConfig",
|
| "properties": {
|
| "auditLogConfigs": {
|
|
|