Skip to content

Commit 5330a0b

Browse files
1 parent da6171e commit 5330a0b

File tree

6 files changed

+102
-102
lines changed

6 files changed

+102
-102
lines changed

clients/google-api-services-storage/v1/2.0.0/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
2222
<dependency>
2323
<groupId>com.google.apis</groupId>
2424
<artifactId>google-api-services-storage</artifactId>
25-
<version>v1-rev20241206-2.0.0</version>
25+
<version>v1-rev20250224-2.0.0</version>
2626
</dependency>
2727
</dependencies>
2828
</project>
@@ -35,7 +35,7 @@ repositories {
3535
mavenCentral()
3636
}
3737
dependencies {
38-
implementation 'com.google.apis:google-api-services-storage:v1-rev20241206-2.0.0'
38+
implementation 'com.google.apis:google-api-services-storage:v1-rev20250224-2.0.0'
3939
}
4040
```
4141

clients/google-api-services-storage/v1/2.0.0/com/google/api/services/storage/Storage.java

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5559,17 +5559,17 @@ public Insert setBucket(java.lang.String bucket) {
55595559
return this;
55605560
}
55615561

5562-
/** If true, any parent folder which doesnt exist will be created automatically. */
5562+
/** If true, any parent folder which doesn't exist will be created automatically. */
55635563
@com.google.api.client.util.Key
55645564
private java.lang.Boolean recursive;
55655565

5566-
/** If true, any parent folder which doesnt exist will be created automatically.
5566+
/** If true, any parent folder which doesn't exist will be created automatically.
55675567
*/
55685568
public java.lang.Boolean getRecursive() {
55695569
return recursive;
55705570
}
55715571

5572-
/** If true, any parent folder which doesnt exist will be created automatically. */
5572+
/** If true, any parent folder which doesn't exist will be created automatically. */
55735573
public Insert setRecursive(java.lang.Boolean recursive) {
55745574
this.recursive = recursive;
55755575
return this;

clients/google-api-services-storage/v1/2.0.0/com/google/api/services/storage/model/Policy.java

Lines changed: 54 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -231,18 +231,18 @@ public static final class Bindings extends com.google.api.client.json.GenericJso
231231

232232
/**
233233
* A collection of identifiers for members who may assume the provided role. Recognized
234-
* identifiers are as follows: - allUsers A special identifier that represents anyone on the
235-
* internet; with or without a Google account. - allAuthenticatedUsers A special identifier
234+
* identifiers are as follows: - allUsers - A special identifier that represents anyone on the
235+
* internet; with or without a Google account. - allAuthenticatedUsers - A special identifier
236236
* that represents anyone who is authenticated with a Google account or a service account. -
237-
* user:emailid An email address that represents a specific account. For example,
238-
* user:[email protected] or user:[email protected]. - serviceAccount:emailid An email address
237+
* user:emailid - An email address that represents a specific account. For example,
238+
* user:[email protected] or user:[email protected]. - serviceAccount:emailid - An email address
239239
* that represents a service account. For example, serviceAccount:my-other-
240-
* [email protected] . - group:emailid An email address that represents a Google
241-
* group. For example, group:[email protected]. - domain:domain A Google Apps domain name
240+
* [email protected] . - group:emailid - An email address that represents a Google
241+
* group. For example, group:[email protected]. - domain:domain - A Google Apps domain name
242242
* that represents all the users of that domain. For example, domain:google.com or
243-
* domain:example.com. - projectOwner:projectid Owners of the given project. For example,
244-
* projectOwner:my-example-project - projectEditor:projectid Editors of the given project. For
245-
* example, projectEditor:my-example-project - projectViewer:projectid Viewers of the given
243+
* domain:example.com. - projectOwner:projectid - Owners of the given project. For example,
244+
* projectOwner:my-example-project - projectEditor:projectid - Editors of the given project. For
245+
* example, projectEditor:my-example-project - projectViewer:projectid - Viewers of the given
246246
* project. For example, projectViewer:my-example-project
247247
* The value may be {@code null}.
248248
*/
@@ -253,18 +253,18 @@ public static final class Bindings extends com.google.api.client.json.GenericJso
253253
* The role to which members belong. Two types of roles are supported: new IAM roles, which grant
254254
* permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do
255255
* map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The
256-
* new IAM roles are: - roles/storage.admin Full control of Google Cloud Storage resources.
257-
* - roles/storage.objectViewer Read-Only access to Google Cloud Storage objects. -
258-
* roles/storage.objectCreator Access to create objects in Google Cloud Storage. -
259-
* roles/storage.objectAdmin Full control of Google Cloud Storage objects. The legacy IAM
260-
* roles are: - roles/storage.legacyObjectReader Read-only access to objects without listing.
256+
* new IAM roles are: - roles/storage.admin - Full control of Google Cloud Storage resources.
257+
* - roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects. -
258+
* roles/storage.objectCreator - Access to create objects in Google Cloud Storage. -
259+
* roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM
260+
* roles are: - roles/storage.legacyObjectReader - Read-only access to objects without listing.
261261
* Equivalent to an ACL entry on an object with the READER role. -
262-
* roles/storage.legacyObjectOwner Read/write access to existing objects without listing.
262+
* roles/storage.legacyObjectOwner - Read/write access to existing objects without listing.
263263
* Equivalent to an ACL entry on an object with the OWNER role. -
264-
* roles/storage.legacyBucketReader Read access to buckets with object listing. Equivalent to an
265-
* ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter Read access
264+
* roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an
265+
* ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter - Read access
266266
* to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with
267-
* the WRITER role. - roles/storage.legacyBucketOwner Read and write access to existing
267+
* the WRITER role. - roles/storage.legacyBucketOwner - Read and write access to existing
268268
* buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the
269269
* OWNER role.
270270
* The value may be {@code null}.
@@ -295,18 +295,18 @@ public Bindings setCondition(Expr condition) {
295295

296296
/**
297297
* A collection of identifiers for members who may assume the provided role. Recognized
298-
* identifiers are as follows: - allUsers A special identifier that represents anyone on the
299-
* internet; with or without a Google account. - allAuthenticatedUsers A special identifier
298+
* identifiers are as follows: - allUsers - A special identifier that represents anyone on the
299+
* internet; with or without a Google account. - allAuthenticatedUsers - A special identifier
300300
* that represents anyone who is authenticated with a Google account or a service account. -
301-
* user:emailid An email address that represents a specific account. For example,
302-
* user:[email protected] or user:[email protected]. - serviceAccount:emailid An email address
301+
* user:emailid - An email address that represents a specific account. For example,
302+
* user:[email protected] or user:[email protected]. - serviceAccount:emailid - An email address
303303
* that represents a service account. For example, serviceAccount:my-other-
304-
* [email protected] . - group:emailid An email address that represents a Google
305-
* group. For example, group:[email protected]. - domain:domain A Google Apps domain name
304+
* [email protected] . - group:emailid - An email address that represents a Google
305+
* group. For example, group:[email protected]. - domain:domain - A Google Apps domain name
306306
* that represents all the users of that domain. For example, domain:google.com or
307-
* domain:example.com. - projectOwner:projectid Owners of the given project. For example,
308-
* projectOwner:my-example-project - projectEditor:projectid Editors of the given project. For
309-
* example, projectEditor:my-example-project - projectViewer:projectid Viewers of the given
307+
* domain:example.com. - projectOwner:projectid - Owners of the given project. For example,
308+
* projectOwner:my-example-project - projectEditor:projectid - Editors of the given project. For
309+
* example, projectEditor:my-example-project - projectViewer:projectid - Viewers of the given
310310
* project. For example, projectViewer:my-example-project
311311
* @return value or {@code null} for none
312312
*/
@@ -316,18 +316,18 @@ public java.util.List<java.lang.String> getMembers() {
316316

317317
/**
318318
* A collection of identifiers for members who may assume the provided role. Recognized
319-
* identifiers are as follows: - allUsers A special identifier that represents anyone on the
320-
* internet; with or without a Google account. - allAuthenticatedUsers A special identifier
319+
* identifiers are as follows: - allUsers - A special identifier that represents anyone on the
320+
* internet; with or without a Google account. - allAuthenticatedUsers - A special identifier
321321
* that represents anyone who is authenticated with a Google account or a service account. -
322-
* user:emailid An email address that represents a specific account. For example,
323-
* user:[email protected] or user:[email protected]. - serviceAccount:emailid An email address
322+
* user:emailid - An email address that represents a specific account. For example,
323+
* user:[email protected] or user:[email protected]. - serviceAccount:emailid - An email address
324324
* that represents a service account. For example, serviceAccount:my-other-
325-
* [email protected] . - group:emailid An email address that represents a Google
326-
* group. For example, group:[email protected]. - domain:domain A Google Apps domain name
325+
* [email protected] . - group:emailid - An email address that represents a Google
326+
* group. For example, group:[email protected]. - domain:domain - A Google Apps domain name
327327
* that represents all the users of that domain. For example, domain:google.com or
328-
* domain:example.com. - projectOwner:projectid Owners of the given project. For example,
329-
* projectOwner:my-example-project - projectEditor:projectid Editors of the given project. For
330-
* example, projectEditor:my-example-project - projectViewer:projectid Viewers of the given
328+
* domain:example.com. - projectOwner:projectid - Owners of the given project. For example,
329+
* projectOwner:my-example-project - projectEditor:projectid - Editors of the given project. For
330+
* example, projectEditor:my-example-project - projectViewer:projectid - Viewers of the given
331331
* project. For example, projectViewer:my-example-project
332332
* @param members members or {@code null} for none
333333
*/
@@ -340,18 +340,18 @@ public Bindings setMembers(java.util.List<java.lang.String> members) {
340340
* The role to which members belong. Two types of roles are supported: new IAM roles, which grant
341341
* permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do
342342
* map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The
343-
* new IAM roles are: - roles/storage.admin Full control of Google Cloud Storage resources.
344-
* - roles/storage.objectViewer Read-Only access to Google Cloud Storage objects. -
345-
* roles/storage.objectCreator Access to create objects in Google Cloud Storage. -
346-
* roles/storage.objectAdmin Full control of Google Cloud Storage objects. The legacy IAM
347-
* roles are: - roles/storage.legacyObjectReader Read-only access to objects without listing.
343+
* new IAM roles are: - roles/storage.admin - Full control of Google Cloud Storage resources.
344+
* - roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects. -
345+
* roles/storage.objectCreator - Access to create objects in Google Cloud Storage. -
346+
* roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM
347+
* roles are: - roles/storage.legacyObjectReader - Read-only access to objects without listing.
348348
* Equivalent to an ACL entry on an object with the READER role. -
349-
* roles/storage.legacyObjectOwner Read/write access to existing objects without listing.
349+
* roles/storage.legacyObjectOwner - Read/write access to existing objects without listing.
350350
* Equivalent to an ACL entry on an object with the OWNER role. -
351-
* roles/storage.legacyBucketReader Read access to buckets with object listing. Equivalent to an
352-
* ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter Read access
351+
* roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an
352+
* ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter - Read access
353353
* to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with
354-
* the WRITER role. - roles/storage.legacyBucketOwner Read and write access to existing
354+
* the WRITER role. - roles/storage.legacyBucketOwner - Read and write access to existing
355355
* buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the
356356
* OWNER role.
357357
* @return value or {@code null} for none
@@ -364,18 +364,18 @@ public java.lang.String getRole() {
364364
* The role to which members belong. Two types of roles are supported: new IAM roles, which grant
365365
* permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do
366366
* map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The
367-
* new IAM roles are: - roles/storage.admin Full control of Google Cloud Storage resources.
368-
* - roles/storage.objectViewer Read-Only access to Google Cloud Storage objects. -
369-
* roles/storage.objectCreator Access to create objects in Google Cloud Storage. -
370-
* roles/storage.objectAdmin Full control of Google Cloud Storage objects. The legacy IAM
371-
* roles are: - roles/storage.legacyObjectReader Read-only access to objects without listing.
367+
* new IAM roles are: - roles/storage.admin - Full control of Google Cloud Storage resources.
368+
* - roles/storage.objectViewer - Read-Only access to Google Cloud Storage objects. -
369+
* roles/storage.objectCreator - Access to create objects in Google Cloud Storage. -
370+
* roles/storage.objectAdmin - Full control of Google Cloud Storage objects. The legacy IAM
371+
* roles are: - roles/storage.legacyObjectReader - Read-only access to objects without listing.
372372
* Equivalent to an ACL entry on an object with the READER role. -
373-
* roles/storage.legacyObjectOwner Read/write access to existing objects without listing.
373+
* roles/storage.legacyObjectOwner - Read/write access to existing objects without listing.
374374
* Equivalent to an ACL entry on an object with the OWNER role. -
375-
* roles/storage.legacyBucketReader Read access to buckets with object listing. Equivalent to an
376-
* ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter Read access
375+
* roles/storage.legacyBucketReader - Read access to buckets with object listing. Equivalent to an
376+
* ACL entry on a bucket with the READER role. - roles/storage.legacyBucketWriter - Read access
377377
* to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with
378-
* the WRITER role. - roles/storage.legacyBucketOwner Read and write access to existing
378+
* the WRITER role. - roles/storage.legacyBucketOwner - Read and write access to existing
379379
* buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the
380380
* OWNER role.
381381
* @param role role or {@code null} for none

0 commit comments

Comments
 (0)