Skip to content

Commit e282b16

Browse files
chore: Update discovery artifacts (#2234)
## Deleted keys were detected in the following stable discovery artifacts: artifactregistry v1 https://github.com/googleapis/google-api-python-client/commit/925d7384640280aab0f923a4023b282d729092fa cloudbuild v2 https://github.com/googleapis/google-api-python-client/commit/2ba8584c37c2b2bfeceeea8dff622499b759b2cb contentwarehouse v1 https://github.com/googleapis/google-api-python-client/commit/f6bded182b34cc25f1c9f5cdd8d047a55b3b608d dataproc v1 https://github.com/googleapis/google-api-python-client/commit/c11aa6140692ecb36018bde571e8b735d96daa10 gkehub v1 https://github.com/googleapis/google-api-python-client/commit/2710c97dd8a22a4ccc1802e12463db3d14c1dcbd osconfig v1 https://github.com/googleapis/google-api-python-client/commit/cc52a780f11d39b20b581b1f7b581c42ed9cb480 playintegrity v1 https://github.com/googleapis/google-api-python-client/commit/59849cf1b19804aff82185658552f6bb9b607d54 ## Deleted keys were detected in the following pre-stable discovery artifacts: assuredworkloads v1beta1 https://github.com/googleapis/google-api-python-client/commit/bf69570cb38fce939b548014c6cc638c85bc9797 checks v1alpha https://github.com/googleapis/google-api-python-client/commit/6f5c60fa82cccd6d578e89bbba7ab92414d3cd37 compute alpha https://github.com/googleapis/google-api-python-client/commit/0762f0a3fd5630fc5083b281de7e2512b7ff0532 discoveryengine v1beta https://github.com/googleapis/google-api-python-client/commit/cc18a9daf7b5a16caa671d487878acb8a7a27588 gkehub v1alpha https://github.com/googleapis/google-api-python-client/commit/2710c97dd8a22a4ccc1802e12463db3d14c1dcbd gkehub v1beta https://github.com/googleapis/google-api-python-client/commit/2710c97dd8a22a4ccc1802e12463db3d14c1dcbd ## Discovery Artifact Change Summary: feat(artifactregistry): update the api https://github.com/googleapis/google-api-python-client/commit/925d7384640280aab0f923a4023b282d729092fa feat(assuredworkloads): update the api https://github.com/googleapis/google-api-python-client/commit/bf69570cb38fce939b548014c6cc638c85bc9797 feat(beyondcorp): update the api https://github.com/googleapis/google-api-python-client/commit/eaf37a3368353471945e989673ad78f7e44fff21 feat(checks): update the api https://github.com/googleapis/google-api-python-client/commit/6f5c60fa82cccd6d578e89bbba7ab92414d3cd37 feat(chromemanagement): update the api https://github.com/googleapis/google-api-python-client/commit/641424e2dfcf18847c280e4270700e7f96765824 feat(cloudasset): update the api https://github.com/googleapis/google-api-python-client/commit/4d113e754958d89f928c42907108bbc96298a3f1 feat(cloudbuild): update the api https://github.com/googleapis/google-api-python-client/commit/2ba8584c37c2b2bfeceeea8dff622499b759b2cb feat(cloudchannel): update the api https://github.com/googleapis/google-api-python-client/commit/814aeadaee0e14c3cad01d9d003cede5b4d09d80 feat(clouddeploy): update the api https://github.com/googleapis/google-api-python-client/commit/9f7848d88082ca1801b752e211f71d2389e46748 feat(compute): update the api https://github.com/googleapis/google-api-python-client/commit/0762f0a3fd5630fc5083b281de7e2512b7ff0532 feat(contentwarehouse): update the api https://github.com/googleapis/google-api-python-client/commit/f6bded182b34cc25f1c9f5cdd8d047a55b3b608d feat(dataflow): update the api https://github.com/googleapis/google-api-python-client/commit/838306b18ac4c6b1e3ab198a2a74e4db3d28350c feat(datalineage): update the api https://github.com/googleapis/google-api-python-client/commit/3fb547604c5c01264510fca4bb18e2759e397a6c feat(dataproc): update the api https://github.com/googleapis/google-api-python-client/commit/c11aa6140692ecb36018bde571e8b735d96daa10 feat(datastream): update the api https://github.com/googleapis/google-api-python-client/commit/7bae6cc0aba44a19f36f0e1a424e422ddb4ba27e feat(dialogflow): update the api https://github.com/googleapis/google-api-python-client/commit/d38b16cab08d30e64b54060e1d66c55fdf4ad065 feat(discoveryengine): update the api https://github.com/googleapis/google-api-python-client/commit/cc18a9daf7b5a16caa671d487878acb8a7a27588 feat(dlp): update the api https://github.com/googleapis/google-api-python-client/commit/cf1e77127bd308028a4c7457eab29ff72c19de23 feat(firebase): update the api https://github.com/googleapis/google-api-python-client/commit/0b39faa707cd8c2778c3c14b7d414969c67d75a4 feat(firebasehosting): update the api https://github.com/googleapis/google-api-python-client/commit/e6ce23a51864794b8538fbf97ac38d7031cfb423 feat(firestore): update the api https://github.com/googleapis/google-api-python-client/commit/f9e0dca5892e2e19073eec8ec7675dbb16eed2ed feat(games): update the api https://github.com/googleapis/google-api-python-client/commit/62b660dca00efa79ccc91a0ce95a7a4c71a13287 feat(gkehub): update the api https://github.com/googleapis/google-api-python-client/commit/2710c97dd8a22a4ccc1802e12463db3d14c1dcbd feat(gmailpostmastertools): update the api https://github.com/googleapis/google-api-python-client/commit/1e74f0722a963da1f2817de20ae17969629216fc feat(iap): update the api https://github.com/googleapis/google-api-python-client/commit/4e1a648427768cc49fc5c42964e7b49f981cba0b feat(jobs): update the api https://github.com/googleapis/google-api-python-client/commit/0079f51e7992aa940dbbedb5d7ddcd00337aa30d feat(memcache): update the api https://github.com/googleapis/google-api-python-client/commit/1992c7bc5311917da83b08b6a0daf8ee262ec78b feat(metastore): update the api https://github.com/googleapis/google-api-python-client/commit/4213e2ba3a41329dc327b3fadd463d8a258f1a24 feat(migrationcenter): update the api https://github.com/googleapis/google-api-python-client/commit/b363895450584b9a276a6873b01fa58b44bc01af feat(networkconnectivity): update the api https://github.com/googleapis/google-api-python-client/commit/3cc76e5ebb14e1a33026b7eb368a8fc81755a148 feat(osconfig): update the api https://github.com/googleapis/google-api-python-client/commit/cc52a780f11d39b20b581b1f7b581c42ed9cb480 feat(oslogin): update the api https://github.com/googleapis/google-api-python-client/commit/d56232113235105d78999207969d3090a2ffdb33 feat(places): update the api https://github.com/googleapis/google-api-python-client/commit/65a1f10385fe805c9d99f704ca61af61a8e287d1 feat(playintegrity): update the api https://github.com/googleapis/google-api-python-client/commit/59849cf1b19804aff82185658552f6bb9b607d54 feat(redis): update the api https://github.com/googleapis/google-api-python-client/commit/d4ff4da80d5f00b4c7c589a1ea3381379d2bff3e feat(speech): update the api https://github.com/googleapis/google-api-python-client/commit/9317602deb7a577cc2fc76eadd30f2e168ac5a61 feat(storage): update the api https://github.com/googleapis/google-api-python-client/commit/84e8295a44849a1dfecbc656f3c0e570ed799048 feat(vmmigration): update the api https://github.com/googleapis/google-api-python-client/commit/6a76a013c0565790af8f695e9834ed5076702fa8 feat(workflowexecutions): update the api https://github.com/googleapis/google-api-python-client/commit/870a08beb6e1ec780315eeccadf19d4a1c973328 feat(workloadmanager): update the api https://github.com/googleapis/google-api-python-client/commit/f247c4befd636a0663660735ccd67c8d85a85ac3 feat(workstations): update the api https://github.com/googleapis/google-api-python-client/commit/ecb45b3d6287c03caacf25cd8512809492d18f4d
1 parent 50ad361 commit e282b16

File tree

572 files changed

+36251
-7074
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

572 files changed

+36251
-7074
lines changed

docs/dyn/accesscontextmanager_v1.accessPolicies.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ <h3>Method Details</h3>
137137
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
138138
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
139139
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
140-
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
140+
&quot;scopes&quot;: [ # The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=[&quot;folders/123&quot;]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
141141
&quot;A String&quot;,
142142
],
143143
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
@@ -225,7 +225,7 @@ <h3>Method Details</h3>
225225
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
226226
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
227227
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
228-
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
228+
&quot;scopes&quot;: [ # The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=[&quot;folders/123&quot;]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
229229
&quot;A String&quot;,
230230
],
231231
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
@@ -310,7 +310,7 @@ <h3>Method Details</h3>
310310
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
311311
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
312312
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
313-
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
313+
&quot;scopes&quot;: [ # The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=[&quot;folders/123&quot;]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
314314
&quot;A String&quot;,
315315
],
316316
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.
@@ -347,7 +347,7 @@ <h3>Method Details</h3>
347347
&quot;etag&quot;: &quot;A String&quot;, # Output only. An opaque identifier for the current version of the `AccessPolicy`. This will always be a strongly validated etag, meaning that two Access Polices will be identical if and only if their etags are identical. Clients should not expect this to be in any specific format.
348348
&quot;name&quot;: &quot;A String&quot;, # Output only. Resource name of the `AccessPolicy`. Format: `accessPolicies/{access_policy}`
349349
&quot;parent&quot;: &quot;A String&quot;, # Required. The parent of this `AccessPolicy` in the Cloud Resource Hierarchy. Currently immutable once created. Format: `organizations/{organization_id}`
350-
&quot;scopes&quot;: [ # The scopes of a policy define which resources an ACM policy can restrict, and where ACM resources can be referenced. For example, a policy with scopes=[&quot;folders/123&quot;] has the following behavior: - vpcsc perimeters can only restrict projects within folders/123 - access levels can only be referenced by resources within folders/123. If empty, there are no limitations on which resources can be restricted by an ACM policy, and there are no limitations on where ACM resources can be referenced. Only one policy can include a given scope (attempting to create a second policy which includes &quot;folders/123&quot; will result in an error). Currently, scopes cannot be modified after a policy is created. Currently, policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
350+
&quot;scopes&quot;: [ # The scopes of the AccessPolicy. Scopes define which resources a policy can restrict and where its resources can be referenced. For example, policy A with `scopes=[&quot;folders/123&quot;]` has the following behavior: - ServicePerimeter can only restrict projects within `folders/123`. - ServicePerimeter within policy A can only reference access levels defined within policy A. - Only one policy can include a given scope; thus, attempting to create a second policy which includes `folders/123` will result in an error. If no scopes are provided, then any resource within the organization can be restricted. Scopes cannot be modified after a policy is created. Policies can only have a single scope. Format: list of `folders/{folder_number}` or `projects/{project_number}`
351351
&quot;A String&quot;,
352352
],
353353
&quot;title&quot;: &quot;A String&quot;, # Required. Human readable title. Does not affect behavior.

docs/dyn/admob_v1beta.accounts.adUnitMappings.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,14 +76,14 @@ <h1><a href="admob_v1beta.html">AdMob API</a> . <a href="admob_v1beta.accounts.h
7676
<h2>Instance Methods</h2>
7777
<p class="toc_element">
7878
<code><a href="#batchCreate">batchCreate(parent, body=None, x__xgafv=None)</a></code></p>
79-
<p class="firstline">Batch create the ad unit mappings under the specific AdMob account. The maximum allowed batch size is 100.</p>
79+
<p class="firstline">Batch create the ad unit mappings under the specific AdMob account. The maximum allowed batch size is 100. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
8080
<p class="toc_element">
8181
<code><a href="#close">close()</a></code></p>
8282
<p class="firstline">Close httplib2 connections.</p>
8383
<h3>Method Details</h3>
8484
<div class="method">
8585
<code class="details" id="batchCreate">batchCreate(parent, body=None, x__xgafv=None)</code>
86-
<pre>Batch create the ad unit mappings under the specific AdMob account. The maximum allowed batch size is 100.
86+
<pre>Batch create the ad unit mappings under the specific AdMob account. The maximum allowed batch size is 100. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
8787

8888
Args:
8989
parent: string, Required. The AdMob account which owns this collection of ad unit mappings. Format: accounts/{publisher_id} See https://support.google.com/admob/answer/2784578 for instructions on how to find your AdMob publisher ID. (required)

docs/dyn/admob_v1beta.accounts.adUnits.adUnitMappings.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -79,10 +79,10 @@ <h2>Instance Methods</h2>
7979
<p class="firstline">Close httplib2 connections.</p>
8080
<p class="toc_element">
8181
<code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p>
82-
<p class="firstline">Create an ad unit mapping under the specific AdMob account and ad unit.</p>
82+
<p class="firstline">Create an ad unit mapping under the specific AdMob account and ad unit. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
8383
<p class="toc_element">
8484
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
85-
<p class="firstline">List ad unit mappings under the specified AdMob account and ad unit.</p>
85+
<p class="firstline">List ad unit mappings under the specified AdMob account and ad unit. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
8686
<p class="toc_element">
8787
<code><a href="#list_next">list_next()</a></code></p>
8888
<p class="firstline">Retrieves the next page of results.</p>
@@ -94,7 +94,7 @@ <h3>Method Details</h3>
9494

9595
<div class="method">
9696
<code class="details" id="create">create(parent, body=None, x__xgafv=None)</code>
97-
<pre>Create an ad unit mapping under the specific AdMob account and ad unit.
97+
<pre>Create an ad unit mapping under the specific AdMob account and ad unit. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
9898

9999
Args:
100100
parent: string, Required. The parent which owns the ad unit mapping. Format: accounts/{publisher_id}/adUnits/{ad_unit_id} (required)
@@ -132,7 +132,7 @@ <h3>Method Details</h3>
132132

133133
<div class="method">
134134
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
135-
<pre>List ad unit mappings under the specified AdMob account and ad unit.
135+
<pre>List ad unit mappings under the specified AdMob account and ad unit. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
136136

137137
Args:
138138
parent: string, Required. The parent which owns this collection of ad unit mappings. Format: accounts/{publisher_id}/adUnits/{ad_unit_id} (required)

docs/dyn/admob_v1beta.accounts.adUnits.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ <h2>Instance Methods</h2>
8484
<p class="firstline">Close httplib2 connections.</p>
8585
<p class="toc_element">
8686
<code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p>
87-
<p class="firstline">Creates an ad unit under the specified AdMob account.</p>
87+
<p class="firstline">Creates an ad unit under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
8888
<p class="toc_element">
8989
<code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
9090
<p class="firstline">List the ad units under the specified AdMob account.</p>
@@ -99,7 +99,7 @@ <h3>Method Details</h3>
9999

100100
<div class="method">
101101
<code class="details" id="create">create(parent, body=None, x__xgafv=None)</code>
102-
<pre>Creates an ad unit under the specified AdMob account.
102+
<pre>Creates an ad unit under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
103103

104104
Args:
105105
parent: string, Required. Resource name of the account to create the specified ad unit for. Example: accounts/pub-9876543210987654 (required)

docs/dyn/admob_v1beta.accounts.apps.html

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ <h2>Instance Methods</h2>
7979
<p class="firstline">Close httplib2 connections.</p>
8080
<p class="toc_element">
8181
<code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p>
82-
<p class="firstline">Creates an app under the specified AdMob account.</p>
82+
<p class="firstline">Creates an app under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
8383
<p class="toc_element">
8484
<code><a href="#list">list(parent, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
8585
<p class="firstline">List the apps under the specified AdMob account.</p>
@@ -94,7 +94,7 @@ <h3>Method Details</h3>
9494

9595
<div class="method">
9696
<code class="details" id="create">create(parent, body=None, x__xgafv=None)</code>
97-
<pre>Creates an app under the specified AdMob account.
97+
<pre>Creates an app under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
9898

9999
Args:
100100
parent: string, Required. Resource name of the account for which the app is being created. Example: accounts/pub-9876543210987654 (required)

docs/dyn/admob_v1beta.accounts.mediationGroups.html

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,16 +84,16 @@ <h2>Instance Methods</h2>
8484
<p class="firstline">Close httplib2 connections.</p>
8585
<p class="toc_element">
8686
<code><a href="#create">create(parent, body=None, x__xgafv=None)</a></code></p>
87-
<p class="firstline">Create a mediation group under the specific AdMob account.</p>
87+
<p class="firstline">Create a mediation group under the specific AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
8888
<p class="toc_element">
8989
<code><a href="#list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
90-
<p class="firstline">List mediation groups under the specified AdMob account.</p>
90+
<p class="firstline">List mediation groups under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
9191
<p class="toc_element">
9292
<code><a href="#list_next">list_next()</a></code></p>
9393
<p class="firstline">Retrieves the next page of results.</p>
9494
<p class="toc_element">
9595
<code><a href="#patch">patch(name, body=None, updateMask=None, x__xgafv=None)</a></code></p>
96-
<p class="firstline">Update the specified mediation group under the specified AdMob account.</p>
96+
<p class="firstline">Update the specified mediation group under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.</p>
9797
<h3>Method Details</h3>
9898
<div class="method">
9999
<code class="details" id="close">close()</code>
@@ -102,7 +102,7 @@ <h3>Method Details</h3>
102102

103103
<div class="method">
104104
<code class="details" id="create">create(parent, body=None, x__xgafv=None)</code>
105-
<pre>Create a mediation group under the specific AdMob account.
105+
<pre>Create a mediation group under the specific AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
106106

107107
Args:
108108
parent: string, Required. The parent which owns the mediation group. Format: accounts/{publisher_id} (required)
@@ -192,7 +192,7 @@ <h3>Method Details</h3>
192192

193193
<div class="method">
194194
<code class="details" id="list">list(parent, filter=None, pageSize=None, pageToken=None, x__xgafv=None)</code>
195-
<pre>List mediation groups under the specified AdMob account.
195+
<pre>List mediation groups under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
196196

197197
Args:
198198
parent: string, Required. Resource name of the account to list mediation groups for. Example: accounts/pub-9876543210987654 (required)
@@ -265,7 +265,7 @@ <h3>Method Details</h3>
265265

266266
<div class="method">
267267
<code class="details" id="patch">patch(name, body=None, updateMask=None, x__xgafv=None)</code>
268-
<pre>Update the specified mediation group under the specified AdMob account.
268+
<pre>Update the specified mediation group under the specified AdMob account. This method has limited access. If you see a 403 permission denied error, please reach out to your account manager for access.
269269

270270
Args:
271271
name: string, Resource name for this mediation group. Format is: accounts/{publisher_id}/mediationGroups/{mediation_group_id} Example: accounts/pub-9876543210987654/mediationGroups/0123456789 (required)

0 commit comments

Comments
 (0)