@@ -231,18 +231,18 @@ public static final class Bindings extends com.google.api.client.json.GenericJso
231231
232232 /**
233233 * A collection of identifiers for members who may assume the provided role. Recognized
234- * identifiers are as follows: - allUsers — A special identifier that represents anyone on the
235- * internet; with or without a Google account. - allAuthenticatedUsers — A special identifier
234+ * identifiers are as follows: - allUsers - A special identifier that represents anyone on the
235+ * internet; with or without a Google account. - allAuthenticatedUsers - A special identifier
236236 * that represents anyone who is authenticated with a Google account or a service account. -
237- * user:emailid — An email address that represents a specific account. For example,
238- * user:[email protected] or user:[email protected] . - serviceAccount:emailid — An email address 237+ * user:emailid - An email address that represents a specific account. For example,
238+ * user:[email protected] or user:[email protected] . - serviceAccount:emailid - An email address 239239 * that represents a service account. For example, serviceAccount:my-other-
240- * [email protected] . - group:emailid — An email address that represents a Google 241- * group. For example, group:[email protected] . - domain:domain — A Google Apps domain name 240+ * [email protected] . - group:emailid - An email address that represents a Google 241+ * group. For example, group:[email protected] . - domain:domain - A Google Apps domain name 242242 * that represents all the users of that domain. For example, domain:google.com or
243- * domain:example.com. - projectOwner:projectid — Owners of the given project. For example,
244- * projectOwner:my-example-project - projectEditor:projectid — Editors of the given project. For
245- * example, projectEditor:my-example-project - projectViewer:projectid — Viewers of the given
243+ * domain:example.com. - projectOwner:projectid - Owners of the given project. For example,
244+ * projectOwner:my-example-project - projectEditor:projectid - Editors of the given project. For
245+ * example, projectEditor:my-example-project - projectViewer:projectid - Viewers of the given
246246 * project. For example, projectViewer:my-example-project
247247 * The value may be {@code null}.
248248 */
@@ -253,18 +253,18 @@ public static final class Bindings extends com.google.api.client.json.GenericJso
253253 * The role to which members belong. Two types of roles are supported: new IAM roles, which grant
254254 * permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do
255255 * map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The
256- * new IAM roles are: - roles/storage.admin — Full control of Google Cloud Storage resources.
257- * - roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects. -
258- * roles/storage.objectCreator — Access to create objects in Google Cloud Storage. -
259- * roles/storage.objectAdmin — Full control of Google Cloud Storage objects. The legacy IAM
260- * roles are: - roles/storage.legacyObjectReader — Read-only access to objects without listing.
256+ * new IAM roles are: - roles/storage.admin - Full control of Google Cloud Storage resources.
257+ * - roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects. -
258+ * roles/storage.objectCreator - Access to create objects in Google Cloud Storage. -
259+ * roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM
260+ * roles are: - roles/storage.legacyObjectReader - Read-only access to objects without listing.
261261 * Equivalent to an ACL entry on an object with the READER role. -
262- * roles/storage.legacyObjectOwner — Read/write access to existing objects without listing.
262+ * roles/storage.legacyObjectOwner - Read/write access to existing objects without listing.
263263 * Equivalent to an ACL entry on an object with the OWNER role. -
264- * roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an
265- * ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter — Read access
264+ * roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an
265+ * ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter - Read access
266266 * to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with
267- * the WRITER role. - roles/storage.legacyBucketOwner — Read and write access to existing
267+ * the WRITER role. - roles/storage.legacyBucketOwner - Read and write access to existing
268268 * buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the
269269 * OWNER role.
270270 * The value may be {@code null}.
@@ -295,18 +295,18 @@ public Bindings setCondition(Expr condition) {
295295
296296 /**
297297 * A collection of identifiers for members who may assume the provided role. Recognized
298- * identifiers are as follows: - allUsers — A special identifier that represents anyone on the
299- * internet; with or without a Google account. - allAuthenticatedUsers — A special identifier
298+ * identifiers are as follows: - allUsers - A special identifier that represents anyone on the
299+ * internet; with or without a Google account. - allAuthenticatedUsers - A special identifier
300300 * that represents anyone who is authenticated with a Google account or a service account. -
301- * user:emailid — An email address that represents a specific account. For example,
302- * user:[email protected] or user:[email protected] . - serviceAccount:emailid — An email address 301+ * user:emailid - An email address that represents a specific account. For example,
302+ * user:[email protected] or user:[email protected] . - serviceAccount:emailid - An email address 303303 * that represents a service account. For example, serviceAccount:my-other-
304- * [email protected] . - group:emailid — An email address that represents a Google 305- * group. For example, group:[email protected] . - domain:domain — A Google Apps domain name 304+ * [email protected] . - group:emailid - An email address that represents a Google 305+ * group. For example, group:[email protected] . - domain:domain - A Google Apps domain name 306306 * that represents all the users of that domain. For example, domain:google.com or
307- * domain:example.com. - projectOwner:projectid — Owners of the given project. For example,
308- * projectOwner:my-example-project - projectEditor:projectid — Editors of the given project. For
309- * example, projectEditor:my-example-project - projectViewer:projectid — Viewers of the given
307+ * domain:example.com. - projectOwner:projectid - Owners of the given project. For example,
308+ * projectOwner:my-example-project - projectEditor:projectid - Editors of the given project. For
309+ * example, projectEditor:my-example-project - projectViewer:projectid - Viewers of the given
310310 * project. For example, projectViewer:my-example-project
311311 * @return value or {@code null} for none
312312 */
@@ -316,18 +316,18 @@ public java.util.List<java.lang.String> getMembers() {
316316
317317 /**
318318 * A collection of identifiers for members who may assume the provided role. Recognized
319- * identifiers are as follows: - allUsers — A special identifier that represents anyone on the
320- * internet; with or without a Google account. - allAuthenticatedUsers — A special identifier
319+ * identifiers are as follows: - allUsers - A special identifier that represents anyone on the
320+ * internet; with or without a Google account. - allAuthenticatedUsers - A special identifier
321321 * that represents anyone who is authenticated with a Google account or a service account. -
322- * user:emailid — An email address that represents a specific account. For example,
323- * user:[email protected] or user:[email protected] . - serviceAccount:emailid — An email address 322+ * user:emailid - An email address that represents a specific account. For example,
323+ * user:[email protected] or user:[email protected] . - serviceAccount:emailid - An email address 324324 * that represents a service account. For example, serviceAccount:my-other-
325- * [email protected] . - group:emailid — An email address that represents a Google 326- * group. For example, group:[email protected] . - domain:domain — A Google Apps domain name 325+ * [email protected] . - group:emailid - An email address that represents a Google 326+ * group. For example, group:[email protected] . - domain:domain - A Google Apps domain name 327327 * that represents all the users of that domain. For example, domain:google.com or
328- * domain:example.com. - projectOwner:projectid — Owners of the given project. For example,
329- * projectOwner:my-example-project - projectEditor:projectid — Editors of the given project. For
330- * example, projectEditor:my-example-project - projectViewer:projectid — Viewers of the given
328+ * domain:example.com. - projectOwner:projectid - Owners of the given project. For example,
329+ * projectOwner:my-example-project - projectEditor:projectid - Editors of the given project. For
330+ * example, projectEditor:my-example-project - projectViewer:projectid - Viewers of the given
331331 * project. For example, projectViewer:my-example-project
332332 * @param members members or {@code null} for none
333333 */
@@ -340,18 +340,18 @@ public Bindings setMembers(java.util.List<java.lang.String> members) {
340340 * The role to which members belong. Two types of roles are supported: new IAM roles, which grant
341341 * permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do
342342 * map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The
343- * new IAM roles are: - roles/storage.admin — Full control of Google Cloud Storage resources.
344- * - roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects. -
345- * roles/storage.objectCreator — Access to create objects in Google Cloud Storage. -
346- * roles/storage.objectAdmin — Full control of Google Cloud Storage objects. The legacy IAM
347- * roles are: - roles/storage.legacyObjectReader — Read-only access to objects without listing.
343+ * new IAM roles are: - roles/storage.admin - Full control of Google Cloud Storage resources.
344+ * - roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects. -
345+ * roles/storage.objectCreator - Access to create objects in Google Cloud Storage. -
346+ * roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM
347+ * roles are: - roles/storage.legacyObjectReader - Read-only access to objects without listing.
348348 * Equivalent to an ACL entry on an object with the READER role. -
349- * roles/storage.legacyObjectOwner — Read/write access to existing objects without listing.
349+ * roles/storage.legacyObjectOwner - Read/write access to existing objects without listing.
350350 * Equivalent to an ACL entry on an object with the OWNER role. -
351- * roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an
352- * ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter — Read access
351+ * roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an
352+ * ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter - Read access
353353 * to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with
354- * the WRITER role. - roles/storage.legacyBucketOwner — Read and write access to existing
354+ * the WRITER role. - roles/storage.legacyBucketOwner - Read and write access to existing
355355 * buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the
356356 * OWNER role.
357357 * @return value or {@code null} for none
@@ -364,18 +364,18 @@ public java.lang.String getRole() {
364364 * The role to which members belong. Two types of roles are supported: new IAM roles, which grant
365365 * permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do
366366 * map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The
367- * new IAM roles are: - roles/storage.admin — Full control of Google Cloud Storage resources.
368- * - roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects. -
369- * roles/storage.objectCreator — Access to create objects in Google Cloud Storage. -
370- * roles/storage.objectAdmin — Full control of Google Cloud Storage objects. The legacy IAM
371- * roles are: - roles/storage.legacyObjectReader — Read-only access to objects without listing.
367+ * new IAM roles are: - roles/storage.admin - Full control of Google Cloud Storage resources.
368+ * - roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects. -
369+ * roles/storage.objectCreator - Access to create objects in Google Cloud Storage. -
370+ * roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM
371+ * roles are: - roles/storage.legacyObjectReader - Read-only access to objects without listing.
372372 * Equivalent to an ACL entry on an object with the READER role. -
373- * roles/storage.legacyObjectOwner — Read/write access to existing objects without listing.
373+ * roles/storage.legacyObjectOwner - Read/write access to existing objects without listing.
374374 * Equivalent to an ACL entry on an object with the OWNER role. -
375- * roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an
376- * ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter — Read access
375+ * roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an
376+ * ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter - Read access
377377 * to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with
378- * the WRITER role. - roles/storage.legacyBucketOwner — Read and write access to existing
378+ * the WRITER role. - roles/storage.legacyBucketOwner - Read and write access to existing
379379 * buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the
380380 * OWNER role.
381381 * @param role role or {@code null} for none
0 commit comments