Skip to content

Commit

Permalink
feat: regenerate index files
Browse files Browse the repository at this point in the history
  • Loading branch information
yoshi-automation authored and JustinBeckwith committed May 23, 2021
1 parent 0600e39 commit a616324
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 2 deletions.
4 changes: 2 additions & 2 deletions discovery/gameservices-v1beta.json
Expand Up @@ -1357,7 +1357,7 @@
}
}
},
"revision": "20210506",
"revision": "20210511",
"rootUrl": "https://gameservices.googleapis.com/",
"schemas": {
"AuditConfig": {
Expand Down Expand Up @@ -1518,7 +1518,7 @@
"Default non-attribute.",
"Either principal or (if present) authority selector.",
"The principal (even if an authority selector is present), which must only be used for attribution, not authorization.",
"Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates \"any of the request's realms match one of the given values; with NOT_IN, \"none of the realms match any of the given values\". Note that a value can be: - 'self' (i.e., allow connections from clients that are in the same security realm) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the *absence* of a realm, so realm conditions can only be used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).",
"Any of the security realms in the IAMContext (go/security-realms). When used with IN, the condition indicates \"any of the request's realms match one of the given values; with NOT_IN, \"none of the realms match any of the given values\". Note that a value can be: - 'self' (i.e., allow connections from clients that are in the same security realm, which is currently but not guaranteed to be campus-sized) - 'self:metro' (i.e., clients that are in the same metro) - 'self:cloud-region' (i.e., allow connections from clients that are in the same cloud region) - 'guardians' (i.e., allow connections from its guardian realms. See go/security-realms-glossary#guardian for more information.) - a realm (e.g., 'campus-abc') - a realm group (e.g., 'realms-for-borg-cell-xx', see: go/realm-groups) A match is determined by a realm group membership check performed by a RealmAclRep object (go/realm-acl-howto). It is not permitted to grant access based on the *absence* of a realm, so realm conditions can only be used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).",
"An approver (distinct from the requester) that has authorized this request. When used with IN, the condition indicates that one of the approvers associated with the request matches the specified principal, or is a member of the specified group. Approvers can only grant additional access, and are thus only used in a strictly positive context (e.g. ALLOW/IN or DENY/NOT_IN).",
"What types of justifications have been supplied with this request. String values should match enum names from security.credentials.JustificationType, e.g. \"MANUAL_STRING\". It is not permitted to grant access based on the *absence* of a justification, so justification conditions can only be used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN). Multiple justifications, e.g., a Buganizer ID and a manually-entered reason, are normal and supported.",
"What type of credentials have been supplied with this request. String values should match enum names from security_loas_l2.CredentialsType - currently, only CREDS_TYPE_EMERGENCY is supported. It is not permitted to grant access based on the *absence* of a credentials type, so the conditions can only be used in a \"positive\" context (e.g., ALLOW/IN or DENY/NOT_IN).",
Expand Down
15 changes: 15 additions & 0 deletions discovery/index.json
Expand Up @@ -1880,6 +1880,21 @@
"x32": "https://www.gstatic.com/images/branding/product/1x/googleg_32dp.png"
},
"documentationLink": "https://developers.google.com/doubleclick-advertisers/",
"preferred": false
},
{
"kind": "discovery#directoryItem",
"id": "dfareporting:v3.5",
"name": "dfareporting",
"version": "v3.5",
"title": "Campaign Manager 360 API",
"description": "Build applications to efficiently manage large or complex trafficking, reporting, and attribution workflows for Campaign Manager 360.",
"discoveryRestUrl": "https://dfareporting.googleapis.com/$discovery/rest?version=v3.5",
"icons": {
"x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",
"x32": "https://www.gstatic.com/images/branding/product/1x/googleg_32dp.png"
},
"documentationLink": "https://developers.google.com/doubleclick-advertisers/",
"preferred": true
},
{
Expand Down
1 change: 1 addition & 0 deletions src/index.ts
Expand Up @@ -152,6 +152,7 @@ export {deploymentmanager_v2} from './apis/deploymentmanager/v2';
export {deploymentmanager_v2beta} from './apis/deploymentmanager/v2beta';
export {dfareporting_v3_3} from './apis/dfareporting/v3.3';
export {dfareporting_v3_4} from './apis/dfareporting/v3.4';
export {dfareporting_v3_5} from './apis/dfareporting/v3.5';
export {dialogflow_v2} from './apis/dialogflow/v2';
export {dialogflow_v2beta1} from './apis/dialogflow/v2beta1';
export {dialogflow_v3} from './apis/dialogflow/v3';
Expand Down

0 comments on commit a616324

Please sign in to comment.