Regen docs (#373)
diff --git a/docs/dyn/cloudkms_v1.projects.locations.keyRings.html b/docs/dyn/cloudkms_v1.projects.locations.keyRings.html
index ff8e157..bf8034c 100644
--- a/docs/dyn/cloudkms_v1.projects.locations.keyRings.html
+++ b/docs/dyn/cloudkms_v1.projects.locations.keyRings.html
@@ -205,8 +205,8 @@
# [IAM developer's guide](https://cloud.google.com/iam).
"auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
{ # Specifies the audit configuration for a service.
- # It consists of which permission types are logged, and what identities, if
- # any, are exempted from logging.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
# An AuditConifg must have one or more AuditLogConfigs.
#
# If there are AuditConfigs for both `allServices` and a specific service,
@@ -285,11 +285,10 @@
},
],
"service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `resourcemanager`, `storage`, `compute`.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
# `allServices` is a special value that covers all services.
},
],
- "version": 42, # Version of the `Policy`. The default version is 0.
"rules": [ # If more than one rule is specified, the rules are applied in the following
# manner:
# - All matching LOG rules are always applied.
@@ -328,28 +327,6 @@
"logConfig": [ # The config returned to callers of tech.iam.IAM.CheckPolicy for any entries
# that match the LOG action.
{ # Specifies what kind of log the caller must write
- # Increment a streamz counter with the specified metric and field names.
- #
- # Metric names should start with a '/', generally be lowercase-only,
- # and end in "_count". Field names should not contain an initial slash.
- # The actual exported metric names will have "/iam/policy" prepended.
- #
- # Field names correspond to IAM request parameters and field values are
- # their respective values.
- #
- # At present the only supported field names are
- # - "iam_principal", corresponding to IAMContext.principal;
- # - "" (empty string), resulting in one aggretated counter with no field.
- #
- # Examples:
- # counter { metric: "/debug_access_count" field: "iam_principal" }
- # ==> increment counter /iam/policy/backend_debug_access_count
- # {iam_principal=[value of IAMContext.principal]}
- #
- # At this time we do not support:
- # * multiple field names (though this may be supported in the future)
- # * decrementing the counter
- # * incrementing it by anything other than 1
"counter": { # Options for counters # Counter options.
"field": "A String", # The field value to attribute.
"metric": "A String", # The metric to update.
@@ -367,6 +344,7 @@
],
},
],
+ "version": 42, # Version of the `Policy`. The default version is 0.
"etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
# prevent simultaneous updates of a policy from overwriting each other.
# It is strongly suggested that systems make use of the `etag` in the
@@ -511,8 +489,8 @@
# [IAM developer's guide](https://cloud.google.com/iam).
"auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
{ # Specifies the audit configuration for a service.
- # It consists of which permission types are logged, and what identities, if
- # any, are exempted from logging.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
# An AuditConifg must have one or more AuditLogConfigs.
#
# If there are AuditConfigs for both `allServices` and a specific service,
@@ -591,11 +569,10 @@
},
],
"service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `resourcemanager`, `storage`, `compute`.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
# `allServices` is a special value that covers all services.
},
],
- "version": 42, # Version of the `Policy`. The default version is 0.
"rules": [ # If more than one rule is specified, the rules are applied in the following
# manner:
# - All matching LOG rules are always applied.
@@ -634,28 +611,6 @@
"logConfig": [ # The config returned to callers of tech.iam.IAM.CheckPolicy for any entries
# that match the LOG action.
{ # Specifies what kind of log the caller must write
- # Increment a streamz counter with the specified metric and field names.
- #
- # Metric names should start with a '/', generally be lowercase-only,
- # and end in "_count". Field names should not contain an initial slash.
- # The actual exported metric names will have "/iam/policy" prepended.
- #
- # Field names correspond to IAM request parameters and field values are
- # their respective values.
- #
- # At present the only supported field names are
- # - "iam_principal", corresponding to IAMContext.principal;
- # - "" (empty string), resulting in one aggretated counter with no field.
- #
- # Examples:
- # counter { metric: "/debug_access_count" field: "iam_principal" }
- # ==> increment counter /iam/policy/backend_debug_access_count
- # {iam_principal=[value of IAMContext.principal]}
- #
- # At this time we do not support:
- # * multiple field names (though this may be supported in the future)
- # * decrementing the counter
- # * incrementing it by anything other than 1
"counter": { # Options for counters # Counter options.
"field": "A String", # The field value to attribute.
"metric": "A String", # The metric to update.
@@ -673,6 +628,7 @@
],
},
],
+ "version": 42, # Version of the `Policy`. The default version is 0.
"etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
# prevent simultaneous updates of a policy from overwriting each other.
# It is strongly suggested that systems make use of the `etag` in the
@@ -719,8 +675,8 @@
"iamOwned": True or False,
},
"updateMask": "A String", # OPTIONAL: A FieldMask specifying which fields of the policy to modify. Only
- # the fields in the mask will be modified. If no mask is provided, a default
- # mask is used:
+ # the fields in the mask will be modified. If no mask is provided, the
+ # following default mask is used:
# paths: "bindings, etag"
# This field is only used by Cloud IAM.
}
@@ -766,8 +722,8 @@
# [IAM developer's guide](https://cloud.google.com/iam).
"auditConfigs": [ # Specifies cloud audit logging configuration for this policy.
{ # Specifies the audit configuration for a service.
- # It consists of which permission types are logged, and what identities, if
- # any, are exempted from logging.
+ # The configuration determines which permission types are logged, and what
+ # identities, if any, are exempted from logging.
# An AuditConifg must have one or more AuditLogConfigs.
#
# If there are AuditConfigs for both `allServices` and a specific service,
@@ -846,11 +802,10 @@
},
],
"service": "A String", # Specifies a service that will be enabled for audit logging.
- # For example, `resourcemanager`, `storage`, `compute`.
+ # For example, `storage.googleapis.com`, `cloudsql.googleapis.com`.
# `allServices` is a special value that covers all services.
},
],
- "version": 42, # Version of the `Policy`. The default version is 0.
"rules": [ # If more than one rule is specified, the rules are applied in the following
# manner:
# - All matching LOG rules are always applied.
@@ -889,28 +844,6 @@
"logConfig": [ # The config returned to callers of tech.iam.IAM.CheckPolicy for any entries
# that match the LOG action.
{ # Specifies what kind of log the caller must write
- # Increment a streamz counter with the specified metric and field names.
- #
- # Metric names should start with a '/', generally be lowercase-only,
- # and end in "_count". Field names should not contain an initial slash.
- # The actual exported metric names will have "/iam/policy" prepended.
- #
- # Field names correspond to IAM request parameters and field values are
- # their respective values.
- #
- # At present the only supported field names are
- # - "iam_principal", corresponding to IAMContext.principal;
- # - "" (empty string), resulting in one aggretated counter with no field.
- #
- # Examples:
- # counter { metric: "/debug_access_count" field: "iam_principal" }
- # ==> increment counter /iam/policy/backend_debug_access_count
- # {iam_principal=[value of IAMContext.principal]}
- #
- # At this time we do not support:
- # * multiple field names (though this may be supported in the future)
- # * decrementing the counter
- # * incrementing it by anything other than 1
"counter": { # Options for counters # Counter options.
"field": "A String", # The field value to attribute.
"metric": "A String", # The metric to update.
@@ -928,6 +861,7 @@
],
},
],
+ "version": 42, # Version of the `Policy`. The default version is 0.
"etag": "A String", # `etag` is used for optimistic concurrency control as a way to help
# prevent simultaneous updates of a policy from overwriting each other.
# It is strongly suggested that systems make use of the `etag` in the