changeset 162:59ccdfd217b2

Move around old stuff
author Lewin Bormann <lbo@spheniscida.de>
date Wed, 25 Nov 2020 12:45:45 +0100
parents 2933cf1633fc
children dffa0f1afda2
files drive_example/Cargo.lock drive_example/Cargo.toml drive_example/README.md drive_example/src/drive_v3_types.rs drive_example/src/main.rs example_crates/drive_example/Cargo.lock example_crates/drive_example/Cargo.toml example_crates/drive_example/README.md example_crates/drive_example/src/drive_v3_types.rs example_crates/drive_example/src/main.rs example_crates/gcs_example/Cargo.lock example_crates/gcs_example/Cargo.toml example_crates/gcs_example/README.md example_crates/gcs_example/src/main.rs example_crates/gcs_example/src/storage_v1_types.rs gcs_example/Cargo.lock gcs_example/Cargo.toml gcs_example/README.md gcs_example/src/main.rs gcs_example/src/storage_v1_types.rs manual_demo/Cargo.lock manual_demo/Cargo.toml manual_demo/src/drive_v3_types.rs manual_demo/src/main.rs res/README.md res/manual_demo/Cargo.lock res/manual_demo/Cargo.toml res/manual_demo/README.md res/manual_demo/src/drive_v3_types.rs res/manual_demo/src/main.rs res/manual_demo/src/photoslibrary_v1_types.rs res/test_integration/Cargo.lock res/test_integration/Cargo.toml res/test_integration/client_secret.json res/test_integration/src/integration_test_v1_types.rs res/test_integration/src/lib.rs res/test_integration/src/main.rs test_integration/Cargo.lock test_integration/Cargo.toml test_integration/client_secret.json test_integration/src/integration_test_v1_types.rs test_integration/src/lib.rs
diffstat 42 files changed, 19615 insertions(+), 19605 deletions(-) [+]
line wrap: on
line diff
--- a/drive_example/Cargo.lock	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1180 +0,0 @@
-# This file is automatically @generated by Cargo.
-# It is not intended for manual editing.
-[[package]]
-name = "aho-corasick"
-version = "0.7.14"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b476ce7103678b0c6d3d395dbbae31d48ff910bd28be979ba5d48c6351131d0d"
-dependencies = [
- "memchr",
-]
-
-[[package]]
-name = "anyhow"
-version = "1.0.33"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
-
-[[package]]
-name = "arrayref"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
-
-[[package]]
-name = "async-google-apis-common"
-version = "0.1.7"
-dependencies = [
- "anyhow",
- "chrono",
- "futures",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "radix64",
- "serde",
- "serde_json",
- "tokio",
- "yup-oauth2",
-]
-
-[[package]]
-name = "atty"
-version = "0.2.14"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
-dependencies = [
- "hermit-abi",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "autocfg"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
-
-[[package]]
-name = "base64"
-version = "0.11.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
-
-[[package]]
-name = "base64"
-version = "0.12.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
-
-[[package]]
-name = "bitflags"
-version = "1.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
-
-[[package]]
-name = "bumpalo"
-version = "3.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
-
-[[package]]
-name = "bytes"
-version = "0.5.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
-
-[[package]]
-name = "cc"
-version = "1.0.61"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
-
-[[package]]
-name = "cfg-if"
-version = "0.1.10"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
-
-[[package]]
-name = "chrono"
-version = "0.4.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
-dependencies = [
- "libc",
- "num-integer",
- "num-traits",
- "serde",
- "time",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "core-foundation"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "core-foundation-sys"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
-
-[[package]]
-name = "ct-logs"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
-dependencies = [
- "sct",
-]
-
-[[package]]
-name = "drive_example"
-version = "0.1.0"
-dependencies = [
- "anyhow",
- "async-google-apis-common",
- "env_logger",
- "hyper",
- "hyper-rustls",
- "serde",
- "tokio",
-]
-
-[[package]]
-name = "env_logger"
-version = "0.8.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "54532e3223c5af90a6a757c90b5c5521564b07e5e7a958681bcd2afad421cdcd"
-dependencies = [
- "atty",
- "humantime",
- "log",
- "regex",
- "termcolor",
-]
-
-[[package]]
-name = "fnv"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
-
-[[package]]
-name = "fuchsia-zircon"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
-dependencies = [
- "bitflags",
- "fuchsia-zircon-sys",
-]
-
-[[package]]
-name = "fuchsia-zircon-sys"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
-
-[[package]]
-name = "futures"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "95314d38584ffbfda215621d723e0a3906f032e03ae5551e650058dac83d4797"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-executor",
- "futures-io",
- "futures-sink",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-channel"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0448174b01148032eed37ac4aed28963aaaa8cfa93569a08e5b479bbc6c2c151"
-dependencies = [
- "futures-core",
- "futures-sink",
-]
-
-[[package]]
-name = "futures-core"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "18eaa56102984bed2c88ea39026cff3ce3b4c7f508ca970cedf2450ea10d4e46"
-
-[[package]]
-name = "futures-executor"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f5f8e0c9258abaea85e78ebdda17ef9666d390e987f006be6080dfe354b708cb"
-dependencies = [
- "futures-core",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-io"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e1798854a4727ff944a7b12aa999f58ce7aa81db80d2dfaaf2ba06f065ddd2b"
-
-[[package]]
-name = "futures-macro"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e36fccf3fc58563b4a14d265027c627c3b665d7fed489427e88e7cc929559efe"
-dependencies = [
- "proc-macro-hack",
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "futures-sink"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e3ca3f17d6e8804ae5d3df7a7d35b2b3a6fe89dac84b31872720fc3060a0b11"
-
-[[package]]
-name = "futures-task"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "96d502af37186c4fef99453df03e374683f8a1eec9dcc1e66b3b82dc8278ce3c"
-dependencies = [
- "once_cell",
-]
-
-[[package]]
-name = "futures-util"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "abcb44342f62e6f3e8ac427b8aa815f724fd705dfad060b18ac7866c15bb8e34"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-io",
- "futures-macro",
- "futures-sink",
- "futures-task",
- "memchr",
- "pin-project 1.0.1",
- "pin-utils",
- "proc-macro-hack",
- "proc-macro-nested",
- "slab",
-]
-
-[[package]]
-name = "h2"
-version = "0.2.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5e4728fd124914ad25e99e3d15a9361a879f6620f63cb56bbb08f95abb97a535"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "futures-sink",
- "futures-util",
- "http",
- "indexmap",
- "slab",
- "tokio",
- "tokio-util",
- "tracing",
- "tracing-futures",
-]
-
-[[package]]
-name = "hashbrown"
-version = "0.9.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
-
-[[package]]
-name = "hermit-abi"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "http"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
-dependencies = [
- "bytes",
- "fnv",
- "itoa",
-]
-
-[[package]]
-name = "http-body"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
-dependencies = [
- "bytes",
- "http",
-]
-
-[[package]]
-name = "httparse"
-version = "1.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
-
-[[package]]
-name = "httpdate"
-version = "0.3.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
-
-[[package]]
-name = "humantime"
-version = "2.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3c1ad908cc71012b7bea4d0c53ba96a8cba9962f048fa68d143376143d863b7a"
-
-[[package]]
-name = "hyper"
-version = "0.13.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
-dependencies = [
- "bytes",
- "futures-channel",
- "futures-core",
- "futures-util",
- "h2",
- "http",
- "http-body",
- "httparse",
- "httpdate",
- "itoa",
- "pin-project 0.4.27",
- "socket2",
- "tokio",
- "tower-service",
- "tracing",
- "want",
-]
-
-[[package]]
-name = "hyper-rustls"
-version = "0.20.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
-dependencies = [
- "bytes",
- "ct-logs",
- "futures-util",
- "hyper",
- "log",
- "rustls",
- "rustls-native-certs",
- "tokio",
- "tokio-rustls",
- "webpki",
-]
-
-[[package]]
-name = "idna"
-version = "0.2.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
-dependencies = [
- "matches",
- "unicode-bidi",
- "unicode-normalization",
-]
-
-[[package]]
-name = "indexmap"
-version = "1.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
-dependencies = [
- "autocfg",
- "hashbrown",
-]
-
-[[package]]
-name = "iovec"
-version = "0.1.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "itoa"
-version = "0.4.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
-
-[[package]]
-name = "js-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
-dependencies = [
- "wasm-bindgen",
-]
-
-[[package]]
-name = "kernel32-sys"
-version = "0.2.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "lazy_static"
-version = "1.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
-
-[[package]]
-name = "libc"
-version = "0.2.80"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d58d1b70b004888f764dfbf6a26a3b0342a1632d33968e4a179d8011c760614"
-
-[[package]]
-name = "log"
-version = "0.4.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
-dependencies = [
- "cfg-if",
-]
-
-[[package]]
-name = "matches"
-version = "0.1.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
-
-[[package]]
-name = "memchr"
-version = "2.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
-
-[[package]]
-name = "mio"
-version = "0.6.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
-dependencies = [
- "cfg-if",
- "fuchsia-zircon",
- "fuchsia-zircon-sys",
- "iovec",
- "kernel32-sys",
- "libc",
- "log",
- "miow",
- "net2",
- "slab",
- "winapi 0.2.8",
-]
-
-[[package]]
-name = "miow"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
-dependencies = [
- "kernel32-sys",
- "net2",
- "winapi 0.2.8",
- "ws2_32-sys",
-]
-
-[[package]]
-name = "net2"
-version = "0.2.35"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
-dependencies = [
- "cfg-if",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "num-integer"
-version = "0.1.43"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
-dependencies = [
- "autocfg",
- "num-traits",
-]
-
-[[package]]
-name = "num-traits"
-version = "0.2.12"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
-dependencies = [
- "autocfg",
-]
-
-[[package]]
-name = "once_cell"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
-
-[[package]]
-name = "openssl-probe"
-version = "0.1.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
-
-[[package]]
-name = "percent-encoding"
-version = "2.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
-
-[[package]]
-name = "pin-project"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
-dependencies = [
- "pin-project-internal 0.4.27",
-]
-
-[[package]]
-name = "pin-project"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ee41d838744f60d959d7074e3afb6b35c7456d0f61cad38a24e35e6553f73841"
-dependencies = [
- "pin-project-internal 1.0.1",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "81a4ffa594b66bff340084d4081df649a7dc049ac8d7fc458d8e628bfbbb2f86"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-lite"
-version = "0.1.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b"
-
-[[package]]
-name = "pin-utils"
-version = "0.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
-
-[[package]]
-name = "proc-macro-hack"
-version = "0.5.18"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
-
-[[package]]
-name = "proc-macro-nested"
-version = "0.1.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
-
-[[package]]
-name = "proc-macro2"
-version = "1.0.24"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
-dependencies = [
- "unicode-xid",
-]
-
-[[package]]
-name = "quote"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
-dependencies = [
- "proc-macro2",
-]
-
-[[package]]
-name = "radix64"
-version = "0.6.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
-dependencies = [
- "arrayref",
- "cfg-if",
-]
-
-[[package]]
-name = "redox_syscall"
-version = "0.1.57"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
-
-[[package]]
-name = "regex"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8963b85b8ce3074fecffde43b4b0dded83ce2f367dc8d363afc56679f3ee820b"
-dependencies = [
- "aho-corasick",
- "memchr",
- "regex-syntax",
- "thread_local",
-]
-
-[[package]]
-name = "regex-syntax"
-version = "0.6.20"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8cab7a364d15cde1e505267766a2d3c4e22a843e1a601f0fa7564c0f82ced11c"
-
-[[package]]
-name = "ring"
-version = "0.16.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
-dependencies = [
- "cc",
- "libc",
- "once_cell",
- "spin",
- "untrusted",
- "web-sys",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "rustls"
-version = "0.17.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
-dependencies = [
- "base64 0.11.0",
- "log",
- "ring",
- "sct",
- "webpki",
-]
-
-[[package]]
-name = "rustls-native-certs"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
-dependencies = [
- "openssl-probe",
- "rustls",
- "schannel",
- "security-framework",
-]
-
-[[package]]
-name = "ryu"
-version = "1.0.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
-
-[[package]]
-name = "schannel"
-version = "0.1.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
-dependencies = [
- "lazy_static",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "sct"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "seahash"
-version = "4.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
-
-[[package]]
-name = "security-framework"
-version = "0.4.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
-dependencies = [
- "bitflags",
- "core-foundation",
- "core-foundation-sys",
- "libc",
- "security-framework-sys",
-]
-
-[[package]]
-name = "security-framework-sys"
-version = "0.4.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "serde"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
-dependencies = [
- "serde_derive",
-]
-
-[[package]]
-name = "serde_derive"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "serde_json"
-version = "1.0.59"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
-dependencies = [
- "itoa",
- "ryu",
- "serde",
-]
-
-[[package]]
-name = "slab"
-version = "0.4.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
-
-[[package]]
-name = "socket2"
-version = "0.3.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
-dependencies = [
- "cfg-if",
- "libc",
- "redox_syscall",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "spin"
-version = "0.5.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
-
-[[package]]
-name = "syn"
-version = "1.0.48"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cc371affeffc477f42a221a1e4297aedcea33d47d19b61455588bd9d8f6b19ac"
-dependencies = [
- "proc-macro2",
- "quote",
- "unicode-xid",
-]
-
-[[package]]
-name = "termcolor"
-version = "1.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f"
-dependencies = [
- "winapi-util",
-]
-
-[[package]]
-name = "thread_local"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "time"
-version = "0.1.44"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
-dependencies = [
- "libc",
- "wasi",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "tinyvec"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
-
-[[package]]
-name = "tokio"
-version = "0.2.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "iovec",
- "lazy_static",
- "memchr",
- "mio",
- "pin-project-lite",
- "slab",
- "tokio-macros",
-]
-
-[[package]]
-name = "tokio-macros"
-version = "0.2.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "tokio-rustls"
-version = "0.13.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
-dependencies = [
- "futures-core",
- "rustls",
- "tokio",
- "webpki",
-]
-
-[[package]]
-name = "tokio-util"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
-dependencies = [
- "bytes",
- "futures-core",
- "futures-sink",
- "log",
- "pin-project-lite",
- "tokio",
-]
-
-[[package]]
-name = "tower-service"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
-
-[[package]]
-name = "tracing"
-version = "0.1.21"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
-dependencies = [
- "cfg-if",
- "log",
- "pin-project-lite",
- "tracing-core",
-]
-
-[[package]]
-name = "tracing-core"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "tracing-futures"
-version = "0.2.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c"
-dependencies = [
- "pin-project 0.4.27",
- "tracing",
-]
-
-[[package]]
-name = "try-lock"
-version = "0.2.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
-
-[[package]]
-name = "unicode-bidi"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
-dependencies = [
- "matches",
-]
-
-[[package]]
-name = "unicode-normalization"
-version = "0.1.13"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
-dependencies = [
- "tinyvec",
-]
-
-[[package]]
-name = "unicode-xid"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
-
-[[package]]
-name = "untrusted"
-version = "0.7.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
-
-[[package]]
-name = "url"
-version = "2.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
-dependencies = [
- "idna",
- "matches",
- "percent-encoding",
-]
-
-[[package]]
-name = "want"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
-dependencies = [
- "log",
- "try-lock",
-]
-
-[[package]]
-name = "wasi"
-version = "0.10.0+wasi-snapshot-preview1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
-
-[[package]]
-name = "wasm-bindgen"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
-dependencies = [
- "cfg-if",
- "wasm-bindgen-macro",
-]
-
-[[package]]
-name = "wasm-bindgen-backend"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
-dependencies = [
- "bumpalo",
- "lazy_static",
- "log",
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-macro"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
-dependencies = [
- "quote",
- "wasm-bindgen-macro-support",
-]
-
-[[package]]
-name = "wasm-bindgen-macro-support"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-backend",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-shared"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
-
-[[package]]
-name = "web-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
-dependencies = [
- "js-sys",
- "wasm-bindgen",
-]
-
-[[package]]
-name = "webpki"
-version = "0.21.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "winapi"
-version = "0.2.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
-
-[[package]]
-name = "winapi"
-version = "0.3.9"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
-dependencies = [
- "winapi-i686-pc-windows-gnu",
- "winapi-x86_64-pc-windows-gnu",
-]
-
-[[package]]
-name = "winapi-build"
-version = "0.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
-
-[[package]]
-name = "winapi-i686-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
-
-[[package]]
-name = "winapi-util"
-version = "0.1.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
-dependencies = [
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "winapi-x86_64-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
-
-[[package]]
-name = "ws2_32-sys"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "yup-oauth2"
-version = "4.1.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "92ed435d48d4c834ee654443dd3330399f9656506d7477ec645df58e406a25db"
-dependencies = [
- "base64 0.12.3",
- "chrono",
- "futures",
- "http",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "rustls",
- "seahash",
- "serde",
- "serde_json",
- "tokio",
- "url",
-]
--- a/drive_example/Cargo.toml	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,17 +0,0 @@
-[package]
-name = "drive_example"
-version = "0.1.0"
-authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
-edition = "2018"
-
-# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
-
-[dependencies]
-async-google-apis-common = { path = "../async-google-apis-common/" }
-
-anyhow = "~1.0"
-serde = "~1.0"
-env_logger = "~0.8"
-hyper-rustls = "~0.20"
-hyper = "~0.13"
-tokio = { version = "~0.2", features = ["rt-core", "io-util", "macros", "fs"] }
--- a/drive_example/README.md	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,21 +0,0 @@
-# `drive_example`
-
-List your Google Drive root directory, or upload a file.
-
-```shell
-$ cargo run
-# Lists all objects in your root folder of Drive.
-...
-$ cargo run -- ~/some_file.txt
-# Uploads the given file to your root folder, and prints the involved File
-# objects and the used request parameters.
-...
-```
-
-Please note that you need a client secret to run this binary. Download it from
-[Developer Console](https://console.developers.google.com) and place it into the
-file `client_secret.json` in your working directory so that `drive_example` can
-find it.
-
-Run with `RUST_LOG=debug` in order to see an accurate record of HTTP requests
-being sent and received.
--- a/drive_example/src/drive_v3_types.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,6278 +0,0 @@
-#![allow(unused_variables, unused_mut, dead_code)]
-//! This file was generated by async-google-apis. (https://github.com/dermesser/async-google-apis)
-//!
-//! (c) 2020 Lewin Bormann <lbo@spheniscida.de>
-//!
-//! ## Getting started
-//!
-//! **Tip**: Take a look at those types ending in `...Service`. These represent API resources
-//! and contain methods to interact with an API. The remaining types are used by those methods
-//! and can be explored starting from a method you want to use.
-//!
-//! I'd be happy if you let me know about your use case of this code.
-//!
-//! THIS FILE HAS BEEN GENERATED -- SAVE ANY MODIFICATIONS BEFORE REPLACING.
-
-use async_google_apis_common::*;
-
-/// Scopes of this API. Convertible to their string representation with `AsRef`.
-#[derive(Debug, Clone, Copy)]
-pub enum DriveScopes {
-    /// See, edit, create, and delete all of your Google Drive files
-    ///
-    /// URL: https://www.googleapis.com/auth/drive
-    Drive,
-    /// View and manage its own configuration data in your Google Drive
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.appdata
-    DriveAppdata,
-    /// View and manage Google Drive files and folders that you have opened or created with this app
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.file
-    DriveFile,
-    /// View and manage metadata of files in your Google Drive
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.metadata
-    DriveMetadata,
-    /// View metadata for files in your Google Drive
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.metadata.readonly
-    DriveMetadataReadonly,
-    /// View the photos, videos and albums in your Google Photos
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.photos.readonly
-    DrivePhotosReadonly,
-    /// See and download all your Google Drive files
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.readonly
-    DriveReadonly,
-    /// Modify your Google Apps Script scripts' behavior
-    ///
-    /// URL: https://www.googleapis.com/auth/drive.scripts
-    DriveScripts,
-}
-
-impl std::convert::AsRef<str> for DriveScopes {
-    fn as_ref(&self) -> &'static str {
-        match self {
-            DriveScopes::Drive => "https://www.googleapis.com/auth/drive",
-            DriveScopes::DriveAppdata => "https://www.googleapis.com/auth/drive.appdata",
-            DriveScopes::DriveFile => "https://www.googleapis.com/auth/drive.file",
-            DriveScopes::DriveMetadata => "https://www.googleapis.com/auth/drive.metadata",
-            DriveScopes::DriveMetadataReadonly => {
-                "https://www.googleapis.com/auth/drive.metadata.readonly"
-            }
-            DriveScopes::DrivePhotosReadonly => {
-                "https://www.googleapis.com/auth/drive.photos.readonly"
-            }
-            DriveScopes::DriveReadonly => "https://www.googleapis.com/auth/drive.readonly",
-            DriveScopes::DriveScripts => "https://www.googleapis.com/auth/drive.scripts",
-        }
-    }
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct AboutDriveThemes {
-    /// A link to this theme's background image.
-    #[serde(rename = "backgroundImageLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub background_image_link: Option<String>,
-    /// The color of this theme as an RGB hex string.
-    #[serde(rename = "colorRgb")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub color_rgb: Option<String>,
-    /// The ID of the theme.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-}
-
-/// The user's storage quota limits and usage. All fields are measured in bytes.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct AboutStorageQuota {
-    /// i64: The usage limit, if applicable. This will not be present if the user has unlimited storage.
-    #[serde(rename = "limit")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub limit: Option<String>,
-    /// i64: The total usage across all services.
-    #[serde(rename = "usage")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub usage: Option<String>,
-    /// i64: The usage by all files in Google Drive.
-    #[serde(rename = "usageInDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub usage_in_drive: Option<String>,
-    /// i64: The usage by trashed files in Google Drive.
-    #[serde(rename = "usageInDriveTrash")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub usage_in_drive_trash: Option<String>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct AboutTeamDriveThemes {
-    /// Deprecated - use driveThemes/backgroundImageLink instead.
-    #[serde(rename = "backgroundImageLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub background_image_link: Option<String>,
-    /// Deprecated - use driveThemes/colorRgb instead.
-    #[serde(rename = "colorRgb")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub color_rgb: Option<String>,
-    /// Deprecated - use driveThemes/id instead.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-}
-
-/// Information about the user, the user's Drive, and system capabilities.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct About {
-    /// Whether the user has installed the requesting app.
-    #[serde(rename = "appInstalled")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub app_installed: Option<bool>,
-    /// Whether the user can create shared drives.
-    #[serde(rename = "canCreateDrives")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_create_drives: Option<bool>,
-    /// Deprecated - use canCreateDrives instead.
-    #[serde(rename = "canCreateTeamDrives")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_create_team_drives: Option<bool>,
-    /// A list of themes that are supported for shared drives.
-    #[serde(rename = "driveThemes")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub drive_themes: Option<Vec<AboutDriveThemes>>,
-    /// A map of source MIME type to possible targets for all supported exports.
-    #[serde(rename = "exportFormats")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub export_formats: Option<HashMap<String, Vec<String>>>,
-    /// The currently supported folder colors as RGB hex strings.
-    #[serde(rename = "folderColorPalette")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub folder_color_palette: Option<Vec<String>>,
-    /// A map of source MIME type to possible targets for all supported imports.
-    #[serde(rename = "importFormats")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub import_formats: Option<HashMap<String, Vec<String>>>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#about".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// A map of maximum import sizes by MIME type, in bytes.
-    #[serde(rename = "maxImportSizes")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub max_import_sizes: Option<HashMap<String, String>>,
-    /// i64: The maximum upload size in bytes.
-    #[serde(rename = "maxUploadSize")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub max_upload_size: Option<String>,
-    /// The user's storage quota limits and usage. All fields are measured in bytes.
-    #[serde(rename = "storageQuota")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub storage_quota: Option<AboutStorageQuota>,
-    /// Deprecated - use driveThemes instead.
-    #[serde(rename = "teamDriveThemes")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drive_themes: Option<Vec<AboutTeamDriveThemes>>,
-    #[serde(rename = "user")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub user: Option<User>,
-}
-
-/// A change to a file or shared drive.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Change {
-    /// The type of the change. Possible values are file and drive.
-    #[serde(rename = "changeType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub change_type: Option<String>,
-    #[serde(rename = "drive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub drive: Option<Drive>,
-    /// The ID of the shared drive associated with this change.
-    #[serde(rename = "driveId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub drive_id: Option<String>,
-    #[serde(rename = "file")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub file: Option<File>,
-    /// The ID of the file which has changed.
-    #[serde(rename = "fileId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub file_id: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#change".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Whether the file or shared drive has been removed from this list of changes, for example by deletion or loss of access.
-    #[serde(rename = "removed")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub removed: Option<bool>,
-    #[serde(rename = "teamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drive: Option<TeamDrive>,
-    /// Deprecated - use driveId instead.
-    #[serde(rename = "teamDriveId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drive_id: Option<String>,
-    /// DateTime: The time of this change (RFC 3339 date-time).
-    #[serde(rename = "time")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time: Option<DateTime<Utc>>,
-    /// Deprecated - use changeType instead.
-    #[serde(rename = "type")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub typ: Option<String>,
-}
-
-/// A list of changes for a user.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ChangeList {
-    /// The list of changes. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "changes")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub changes: Option<Vec<Change>>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#changeList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The starting page token for future changes. This will be present only if the end of the current changes list has been reached.
-    #[serde(rename = "newStartPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub new_start_page_token: Option<String>,
-    /// The page token for the next page of changes. This will be absent if the end of the changes list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-/// An notification channel used to watch for resource changes.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Channel {
-    /// The address where notifications are delivered for this channel.
-    #[serde(rename = "address")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub address: Option<String>,
-    /// i64: Date and time of notification channel expiration, expressed as a Unix timestamp, in milliseconds. Optional.
-    #[serde(rename = "expiration")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub expiration: Option<String>,
-    /// A UUID or similar unique string that identifies this channel.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies this as a notification channel used to watch for changes to a resource, which is "api#channel".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Additional parameters controlling delivery channel behavior. Optional.
-    #[serde(rename = "params")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub params: Option<HashMap<String, String>>,
-    /// A Boolean value to indicate whether payload is wanted. Optional.
-    #[serde(rename = "payload")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub payload: Option<bool>,
-    /// An opaque ID that identifies the resource being watched on this channel. Stable across different API versions.
-    #[serde(rename = "resourceId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resource_id: Option<String>,
-    /// A version-specific identifier for the watched resource.
-    #[serde(rename = "resourceUri")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resource_uri: Option<String>,
-    /// An arbitrary string delivered to the target address with each notification delivered over this channel. Optional.
-    #[serde(rename = "token")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub token: Option<String>,
-    /// The type of delivery mechanism used for this channel.
-    #[serde(rename = "type")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub typ: Option<String>,
-}
-
-/// The file content to which the comment refers, typically within the anchor region. For a text file, for example, this would be the text at the location of the comment.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentQuotedFileContent {
-    /// The MIME type of the quoted content.
-    #[serde(rename = "mimeType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub mime_type: Option<String>,
-    /// The quoted content itself. This is interpreted as plain text if set through the API.
-    #[serde(rename = "value")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub value: Option<String>,
-}
-
-/// A comment on a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Comment {
-    /// A region of the document represented as a JSON string. See anchor documentation for details on how to define and interpret anchor properties.
-    #[serde(rename = "anchor")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub anchor: Option<String>,
-    #[serde(rename = "author")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub author: Option<User>,
-    /// The plain text content of the comment. This field is used for setting the content, while htmlContent should be displayed.
-    #[serde(rename = "content")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content: Option<String>,
-    /// DateTime: The time at which the comment was created (RFC 3339 date-time).
-    #[serde(rename = "createdTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub created_time: Option<DateTime<Utc>>,
-    /// Whether the comment has been deleted. A deleted comment has no content.
-    #[serde(rename = "deleted")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub deleted: Option<bool>,
-    /// The content of the comment with HTML formatting.
-    #[serde(rename = "htmlContent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub html_content: Option<String>,
-    /// The ID of the comment.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#comment".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// DateTime: The last time the comment or any of its replies was modified (RFC 3339 date-time).
-    #[serde(rename = "modifiedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub modified_time: Option<DateTime<Utc>>,
-    /// The file content to which the comment refers, typically within the anchor region. For a text file, for example, this would be the text at the location of the comment.
-    #[serde(rename = "quotedFileContent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub quoted_file_content: Option<CommentQuotedFileContent>,
-    /// The full list of replies to the comment in chronological order.
-    #[serde(rename = "replies")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub replies: Option<Vec<Reply>>,
-    /// Whether the comment has been resolved by one of its replies.
-    #[serde(rename = "resolved")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resolved: Option<bool>,
-}
-
-/// A list of comments on a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentList {
-    /// The list of comments. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "comments")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub comments: Option<Vec<Comment>>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#commentList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of comments. This will be absent if the end of the comments list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-/// A restriction for accessing the content of the file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ContentRestriction {
-    /// Whether the content of the file is read-only. If a file is read-only, a new revision of the file may not be added, comments may not be added or modified, and the title of the file may not be modified.
-    #[serde(rename = "readOnly")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub read_only: Option<bool>,
-    /// Reason for why the content of the file is restricted. This is only mutable on requests that also set readOnly=true.
-    #[serde(rename = "reason")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub reason: Option<String>,
-    #[serde(rename = "restrictingUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub restricting_user: Option<User>,
-    /// DateTime: The time at which the content restriction was set (formatted RFC 3339 timestamp). Only populated if readOnly is true.
-    #[serde(rename = "restrictionTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub restriction_time: Option<DateTime<Utc>>,
-    /// The type of the content restriction. Currently the only possible value is globalContentRestriction.
-    #[serde(rename = "type")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub typ: Option<String>,
-}
-
-/// An image file and cropping parameters from which a background image for this shared drive is set. This is a write only field; it can only be set on drive.drives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DriveBackgroundImageFile {
-    /// The ID of an image file in Google Drive to use for the background image.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The width of the cropped image in the closed range of 0 to 1. This value represents the width of the cropped image divided by the width of the entire image. The height is computed by applying a width to height aspect ratio of 80 to 9. The resulting image must be at least 1280 pixels wide and 144 pixels high.
-    #[serde(rename = "width")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub width: Option<f32>,
-    /// The X coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the horizontal distance from the left side of the entire image to the left side of the cropping area divided by the width of the entire image.
-    #[serde(rename = "xCoordinate")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub x_coordinate: Option<f32>,
-    /// The Y coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the vertical distance from the top side of the entire image to the top side of the cropping area divided by the height of the entire image.
-    #[serde(rename = "yCoordinate")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub y_coordinate: Option<f32>,
-}
-
-/// Capabilities the current user has on this shared drive.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DriveCapabilities {
-    /// Whether the current user can add children to folders in this shared drive.
-    #[serde(rename = "canAddChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_add_children: Option<bool>,
-    /// Whether the current user can change the copyRequiresWriterPermission restriction of this shared drive.
-    #[serde(rename = "canChangeCopyRequiresWriterPermissionRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_copy_requires_writer_permission_restriction: Option<bool>,
-    /// Whether the current user can change the domainUsersOnly restriction of this shared drive.
-    #[serde(rename = "canChangeDomainUsersOnlyRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_domain_users_only_restriction: Option<bool>,
-    /// Whether the current user can change the background of this shared drive.
-    #[serde(rename = "canChangeDriveBackground")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_drive_background: Option<bool>,
-    /// Whether the current user can change the driveMembersOnly restriction of this shared drive.
-    #[serde(rename = "canChangeDriveMembersOnlyRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_drive_members_only_restriction: Option<bool>,
-    /// Whether the current user can comment on files in this shared drive.
-    #[serde(rename = "canComment")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_comment: Option<bool>,
-    /// Whether the current user can copy files in this shared drive.
-    #[serde(rename = "canCopy")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_copy: Option<bool>,
-    /// Whether the current user can delete children from folders in this shared drive.
-    #[serde(rename = "canDeleteChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_delete_children: Option<bool>,
-    /// Whether the current user can delete this shared drive. Attempting to delete the shared drive may still fail if there are untrashed items inside the shared drive.
-    #[serde(rename = "canDeleteDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_delete_drive: Option<bool>,
-    /// Whether the current user can download files in this shared drive.
-    #[serde(rename = "canDownload")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_download: Option<bool>,
-    /// Whether the current user can edit files in this shared drive
-    #[serde(rename = "canEdit")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_edit: Option<bool>,
-    /// Whether the current user can list the children of folders in this shared drive.
-    #[serde(rename = "canListChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_list_children: Option<bool>,
-    /// Whether the current user can add members to this shared drive or remove them or change their role.
-    #[serde(rename = "canManageMembers")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_manage_members: Option<bool>,
-    /// Whether the current user can read the revisions resource of files in this shared drive.
-    #[serde(rename = "canReadRevisions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_read_revisions: Option<bool>,
-    /// Whether the current user can rename files or folders in this shared drive.
-    #[serde(rename = "canRename")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_rename: Option<bool>,
-    /// Whether the current user can rename this shared drive.
-    #[serde(rename = "canRenameDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_rename_drive: Option<bool>,
-    /// Whether the current user can share files or folders in this shared drive.
-    #[serde(rename = "canShare")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_share: Option<bool>,
-    /// Whether the current user can trash children from folders in this shared drive.
-    #[serde(rename = "canTrashChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_trash_children: Option<bool>,
-}
-
-/// A set of restrictions that apply to this shared drive or items inside this shared drive.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DriveRestrictions {
-    /// Whether administrative privileges on this shared drive are required to modify restrictions.
-    #[serde(rename = "adminManagedRestrictions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub admin_managed_restrictions: Option<bool>,
-    /// Whether the options to copy, print, or download files inside this shared drive, should be disabled for readers and commenters. When this restriction is set to true, it will override the similarly named field to true for any file inside this shared drive.
-    #[serde(rename = "copyRequiresWriterPermission")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub copy_requires_writer_permission: Option<bool>,
-    /// Whether access to this shared drive and items inside this shared drive is restricted to users of the domain to which this shared drive belongs. This restriction may be overridden by other sharing policies controlled outside of this shared drive.
-    #[serde(rename = "domainUsersOnly")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub domain_users_only: Option<bool>,
-    /// Whether access to items inside this shared drive is restricted to its members.
-    #[serde(rename = "driveMembersOnly")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub drive_members_only: Option<bool>,
-}
-
-/// Representation of a shared drive.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Drive {
-    /// An image file and cropping parameters from which a background image for this shared drive is set. This is a write only field; it can only be set on drive.drives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
-    #[serde(rename = "backgroundImageFile")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub background_image_file: Option<DriveBackgroundImageFile>,
-    /// A short-lived link to this shared drive's background image.
-    #[serde(rename = "backgroundImageLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub background_image_link: Option<String>,
-    /// Capabilities the current user has on this shared drive.
-    #[serde(rename = "capabilities")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub capabilities: Option<DriveCapabilities>,
-    /// The color of this shared drive as an RGB hex string. It can only be set on a drive.drives.update request that does not set themeId.
-    #[serde(rename = "colorRgb")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub color_rgb: Option<String>,
-    /// DateTime: The time at which the shared drive was created (RFC 3339 date-time).
-    #[serde(rename = "createdTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub created_time: Option<DateTime<Utc>>,
-    /// Whether the shared drive is hidden from default view.
-    #[serde(rename = "hidden")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub hidden: Option<bool>,
-    /// The ID of this shared drive which is also the ID of the top level folder of this shared drive.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#drive".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The name of this shared drive.
-    #[serde(rename = "name")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub name: Option<String>,
-    /// A set of restrictions that apply to this shared drive or items inside this shared drive.
-    #[serde(rename = "restrictions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub restrictions: Option<DriveRestrictions>,
-    /// The ID of the theme from which the background image and color will be set. The set of possible driveThemes can be retrieved from a drive.about.get response. When not specified on a drive.drives.create request, a random theme is chosen from which the background image and color are set. This is a write-only field; it can only be set on requests that don't set colorRgb or backgroundImageFile.
-    #[serde(rename = "themeId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub theme_id: Option<String>,
-}
-
-/// A list of shared drives.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DriveList {
-    /// The list of shared drives. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "drives")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub drives: Option<Vec<Drive>>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#driveList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of shared drives. This will be absent if the end of the list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-/// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileCapabilities {
-    /// Whether the current user can add children to this folder. This is always false when the item is not a folder.
-    #[serde(rename = "canAddChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_add_children: Option<bool>,
-    /// Whether the current user can add a folder from another drive (different shared drive or My Drive) to this folder. This is false when the item is not a folder. Only populated for items in shared drives.
-    #[serde(rename = "canAddFolderFromAnotherDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_add_folder_from_another_drive: Option<bool>,
-    /// Whether the current user can add a parent for the item without removing an existing parent in the same request. Not populated for shared drive files.
-    #[serde(rename = "canAddMyDriveParent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_add_my_drive_parent: Option<bool>,
-    /// Whether the current user can change the copyRequiresWriterPermission restriction of this file.
-    #[serde(rename = "canChangeCopyRequiresWriterPermission")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_copy_requires_writer_permission: Option<bool>,
-    /// Deprecated
-    #[serde(rename = "canChangeViewersCanCopyContent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_viewers_can_copy_content: Option<bool>,
-    /// Whether the current user can comment on this file.
-    #[serde(rename = "canComment")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_comment: Option<bool>,
-    /// Whether the current user can copy this file. For an item in a shared drive, whether the current user can copy non-folder descendants of this item, or this item itself if it is not a folder.
-    #[serde(rename = "canCopy")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_copy: Option<bool>,
-    /// Whether the current user can delete this file.
-    #[serde(rename = "canDelete")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_delete: Option<bool>,
-    /// Whether the current user can delete children of this folder. This is false when the item is not a folder. Only populated for items in shared drives.
-    #[serde(rename = "canDeleteChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_delete_children: Option<bool>,
-    /// Whether the current user can download this file.
-    #[serde(rename = "canDownload")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_download: Option<bool>,
-    /// Whether the current user can edit this file. Other factors may limit the type of changes a user can make to a file. For example, see canChangeCopyRequiresWriterPermission or canModifyContent.
-    #[serde(rename = "canEdit")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_edit: Option<bool>,
-    /// Whether the current user can list the children of this folder. This is always false when the item is not a folder.
-    #[serde(rename = "canListChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_list_children: Option<bool>,
-    /// Whether the current user can modify the content of this file.
-    #[serde(rename = "canModifyContent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_modify_content: Option<bool>,
-    /// Whether the current user can modify restrictions on content of this file.
-    #[serde(rename = "canModifyContentRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_modify_content_restriction: Option<bool>,
-    /// Whether the current user can move children of this folder outside of the shared drive. This is false when the item is not a folder. Only populated for items in shared drives.
-    #[serde(rename = "canMoveChildrenOutOfDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_children_out_of_drive: Option<bool>,
-    /// Deprecated - use canMoveChildrenOutOfDrive instead.
-    #[serde(rename = "canMoveChildrenOutOfTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_children_out_of_team_drive: Option<bool>,
-    /// Whether the current user can move children of this folder within this drive. This is false when the item is not a folder. Note that a request to move the child may still fail depending on the current user's access to the child and to the destination folder.
-    #[serde(rename = "canMoveChildrenWithinDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_children_within_drive: Option<bool>,
-    /// Deprecated - use canMoveChildrenWithinDrive instead.
-    #[serde(rename = "canMoveChildrenWithinTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_children_within_team_drive: Option<bool>,
-    /// Deprecated - use canMoveItemOutOfDrive instead.
-    #[serde(rename = "canMoveItemIntoTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_item_into_team_drive: Option<bool>,
-    /// Whether the current user can move this item outside of this drive by changing its parent. Note that a request to change the parent of the item may still fail depending on the new parent that is being added.
-    #[serde(rename = "canMoveItemOutOfDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_item_out_of_drive: Option<bool>,
-    /// Deprecated - use canMoveItemOutOfDrive instead.
-    #[serde(rename = "canMoveItemOutOfTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_item_out_of_team_drive: Option<bool>,
-    /// Whether the current user can move this item within this drive. Note that a request to change the parent of the item may still fail depending on the new parent that is being added and the parent that is being removed.
-    #[serde(rename = "canMoveItemWithinDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_item_within_drive: Option<bool>,
-    /// Deprecated - use canMoveItemWithinDrive instead.
-    #[serde(rename = "canMoveItemWithinTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_item_within_team_drive: Option<bool>,
-    /// Deprecated - use canMoveItemWithinDrive or canMoveItemOutOfDrive instead.
-    #[serde(rename = "canMoveTeamDriveItem")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_move_team_drive_item: Option<bool>,
-    /// Whether the current user can read the shared drive to which this file belongs. Only populated for items in shared drives.
-    #[serde(rename = "canReadDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_read_drive: Option<bool>,
-    /// Whether the current user can read the revisions resource of this file. For a shared drive item, whether revisions of non-folder descendants of this item, or this item itself if it is not a folder, can be read.
-    #[serde(rename = "canReadRevisions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_read_revisions: Option<bool>,
-    /// Deprecated - use canReadDrive instead.
-    #[serde(rename = "canReadTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_read_team_drive: Option<bool>,
-    /// Whether the current user can remove children from this folder. This is always false when the item is not a folder. For a folder in a shared drive, use canDeleteChildren or canTrashChildren instead.
-    #[serde(rename = "canRemoveChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_remove_children: Option<bool>,
-    /// Whether the current user can remove a parent from the item without adding another parent in the same request. Not populated for shared drive files.
-    #[serde(rename = "canRemoveMyDriveParent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_remove_my_drive_parent: Option<bool>,
-    /// Whether the current user can rename this file.
-    #[serde(rename = "canRename")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_rename: Option<bool>,
-    /// Whether the current user can modify the sharing settings for this file.
-    #[serde(rename = "canShare")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_share: Option<bool>,
-    /// Whether the current user can move this file to trash.
-    #[serde(rename = "canTrash")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_trash: Option<bool>,
-    /// Whether the current user can trash children of this folder. This is false when the item is not a folder. Only populated for items in shared drives.
-    #[serde(rename = "canTrashChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_trash_children: Option<bool>,
-    /// Whether the current user can restore this file from trash.
-    #[serde(rename = "canUntrash")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_untrash: Option<bool>,
-}
-
-/// A thumbnail for the file. This will only be used if Google Drive cannot generate a standard thumbnail.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileContentHintsThumbnail {
-    /// The thumbnail data encoded with URL-safe Base64 (RFC 4648 section 5).
-    #[serde(rename = "image")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub image: Option<String>,
-    /// The MIME type of the thumbnail.
-    #[serde(rename = "mimeType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub mime_type: Option<String>,
-}
-
-/// Additional information about the content of the file. These fields are never populated in responses.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileContentHints {
-    /// Text to be indexed for the file to improve fullText queries. This is limited to 128KB in length and may contain HTML elements.
-    #[serde(rename = "indexableText")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub indexable_text: Option<String>,
-    /// A thumbnail for the file. This will only be used if Google Drive cannot generate a standard thumbnail.
-    #[serde(rename = "thumbnail")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub thumbnail: Option<FileContentHintsThumbnail>,
-}
-
-/// Geographic location information stored in the image.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileImageMediaMetadataLocation {
-    /// The altitude stored in the image.
-    #[serde(rename = "altitude")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub altitude: Option<f64>,
-    /// The latitude stored in the image.
-    #[serde(rename = "latitude")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub latitude: Option<f64>,
-    /// The longitude stored in the image.
-    #[serde(rename = "longitude")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub longitude: Option<f64>,
-}
-
-/// Additional metadata about image media, if available.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileImageMediaMetadata {
-    /// The aperture used to create the photo (f-number).
-    #[serde(rename = "aperture")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub aperture: Option<f32>,
-    /// The make of the camera used to create the photo.
-    #[serde(rename = "cameraMake")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub camera_make: Option<String>,
-    /// The model of the camera used to create the photo.
-    #[serde(rename = "cameraModel")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub camera_model: Option<String>,
-    /// The color space of the photo.
-    #[serde(rename = "colorSpace")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub color_space: Option<String>,
-    /// The exposure bias of the photo (APEX value).
-    #[serde(rename = "exposureBias")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub exposure_bias: Option<f32>,
-    /// The exposure mode used to create the photo.
-    #[serde(rename = "exposureMode")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub exposure_mode: Option<String>,
-    /// The length of the exposure, in seconds.
-    #[serde(rename = "exposureTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub exposure_time: Option<f32>,
-    /// Whether a flash was used to create the photo.
-    #[serde(rename = "flashUsed")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub flash_used: Option<bool>,
-    /// The focal length used to create the photo, in millimeters.
-    #[serde(rename = "focalLength")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub focal_length: Option<f32>,
-    /// The height of the image in pixels.
-    #[serde(rename = "height")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub height: Option<i32>,
-    /// The ISO speed used to create the photo.
-    #[serde(rename = "isoSpeed")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub iso_speed: Option<i32>,
-    /// The lens used to create the photo.
-    #[serde(rename = "lens")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub lens: Option<String>,
-    /// Geographic location information stored in the image.
-    #[serde(rename = "location")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub location: Option<FileImageMediaMetadataLocation>,
-    /// The smallest f-number of the lens at the focal length used to create the photo (APEX value).
-    #[serde(rename = "maxApertureValue")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub max_aperture_value: Option<f32>,
-    /// The metering mode used to create the photo.
-    #[serde(rename = "meteringMode")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub metering_mode: Option<String>,
-    /// The number of clockwise 90 degree rotations applied from the image's original orientation.
-    #[serde(rename = "rotation")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub rotation: Option<i32>,
-    /// The type of sensor used to create the photo.
-    #[serde(rename = "sensor")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub sensor: Option<String>,
-    /// The distance to the subject of the photo, in meters.
-    #[serde(rename = "subjectDistance")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub subject_distance: Option<i32>,
-    /// The date and time the photo was taken (EXIF DateTime).
-    #[serde(rename = "time")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time: Option<String>,
-    /// The white balance mode used to create the photo.
-    #[serde(rename = "whiteBalance")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub white_balance: Option<String>,
-    /// The width of the image in pixels.
-    #[serde(rename = "width")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub width: Option<i32>,
-}
-
-/// Shortcut file details. Only populated for shortcut files, which have the mimeType field set to application/vnd.google-apps.shortcut.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileShortcutDetails {
-    /// The ID of the file that this shortcut points to.
-    #[serde(rename = "targetId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub target_id: Option<String>,
-    /// The MIME type of the file that this shortcut points to. The value of this field is a snapshot of the target's MIME type, captured when the shortcut is created.
-    #[serde(rename = "targetMimeType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub target_mime_type: Option<String>,
-}
-
-/// Additional metadata about video media. This may not be available immediately upon upload.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileVideoMediaMetadata {
-    /// i64: The duration of the video in milliseconds.
-    #[serde(rename = "durationMillis")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub duration_millis: Option<String>,
-    /// The height of the video in pixels.
-    #[serde(rename = "height")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub height: Option<i32>,
-    /// The width of the video in pixels.
-    #[serde(rename = "width")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub width: Option<i32>,
-}
-
-/// The metadata for a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct File {
-    /// A collection of arbitrary key-value pairs which are private to the requesting app. Entries with null values are cleared in update and copy requests.
-    #[serde(rename = "appProperties")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub app_properties: Option<HashMap<String, String>>,
-    /// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
-    #[serde(rename = "capabilities")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub capabilities: Option<FileCapabilities>,
-    /// Additional information about the content of the file. These fields are never populated in responses.
-    #[serde(rename = "contentHints")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content_hints: Option<FileContentHints>,
-    /// Restrictions for accessing the content of the file. Only populated if such a restriction exists.
-    #[serde(rename = "contentRestrictions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content_restrictions: Option<Vec<ContentRestriction>>,
-    /// Whether the options to copy, print, or download this file, should be disabled for readers and commenters.
-    #[serde(rename = "copyRequiresWriterPermission")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub copy_requires_writer_permission: Option<bool>,
-    /// DateTime: The time at which the file was created (RFC 3339 date-time).
-    #[serde(rename = "createdTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub created_time: Option<DateTime<Utc>>,
-    /// A short description of the file.
-    #[serde(rename = "description")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub description: Option<String>,
-    /// ID of the shared drive the file resides in. Only populated for items in shared drives.
-    #[serde(rename = "driveId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub drive_id: Option<String>,
-    /// Whether the file has been explicitly trashed, as opposed to recursively trashed from a parent folder.
-    #[serde(rename = "explicitlyTrashed")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub explicitly_trashed: Option<bool>,
-    /// Links for exporting Google Docs to specific formats.
-    #[serde(rename = "exportLinks")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub export_links: Option<HashMap<String, String>>,
-    /// The final component of fullFileExtension. This is only available for files with binary content in Google Drive.
-    #[serde(rename = "fileExtension")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub file_extension: Option<String>,
-    /// The color for a folder as an RGB hex string. The supported colors are published in the folderColorPalette field of the About resource. If an unsupported color is specified, the closest color in the palette will be used instead.
-    #[serde(rename = "folderColorRgb")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub folder_color_rgb: Option<String>,
-    /// The full file extension extracted from the name field. May contain multiple concatenated extensions, such as "tar.gz". This is only available for files with binary content in Google Drive. This is automatically updated when the name field changes, however it is not cleared if the new name does not contain a valid extension.
-    #[serde(rename = "fullFileExtension")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub full_file_extension: Option<String>,
-    /// Whether there are permissions directly on this file. This field is only populated for items in shared drives.
-    #[serde(rename = "hasAugmentedPermissions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub has_augmented_permissions: Option<bool>,
-    /// Whether this file has a thumbnail. This does not indicate whether the requesting app has access to the thumbnail. To check access, look for the presence of the thumbnailLink field.
-    #[serde(rename = "hasThumbnail")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub has_thumbnail: Option<bool>,
-    /// The ID of the file's head revision. This is currently only available for files with binary content in Google Drive.
-    #[serde(rename = "headRevisionId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub head_revision_id: Option<String>,
-    /// A static, unauthenticated link to the file's icon.
-    #[serde(rename = "iconLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub icon_link: Option<String>,
-    /// The ID of the file.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Additional metadata about image media, if available.
-    #[serde(rename = "imageMediaMetadata")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub image_media_metadata: Option<FileImageMediaMetadata>,
-    /// Whether the file was created or opened by the requesting app.
-    #[serde(rename = "isAppAuthorized")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub is_app_authorized: Option<bool>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#file".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    #[serde(rename = "lastModifyingUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub last_modifying_user: Option<User>,
-    /// The MD5 checksum for the content of the file. This is only applicable to files with binary content in Google Drive.
-    #[serde(rename = "md5Checksum")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub md5_checksum: Option<String>,
-    /// The MIME type of the file. Google Drive will attempt to automatically detect an appropriate value from uploaded content if no value is provided. The value cannot be changed unless a new revision is uploaded. If a file is created with a Google Doc MIME type, the uploaded content will be imported if possible. The supported import formats are published in the About resource.
-    #[serde(rename = "mimeType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub mime_type: Option<String>,
-    /// Whether the file has been modified by this user.
-    #[serde(rename = "modifiedByMe")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub modified_by_me: Option<bool>,
-    /// DateTime: The last time the file was modified by the user (RFC 3339 date-time).
-    #[serde(rename = "modifiedByMeTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub modified_by_me_time: Option<DateTime<Utc>>,
-    /// DateTime: The last time the file was modified by anyone (RFC 3339 date-time). Note that setting modifiedTime will also update modifiedByMeTime for the user.
-    #[serde(rename = "modifiedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub modified_time: Option<DateTime<Utc>>,
-    /// The name of the file. This is not necessarily unique within a folder. Note that for immutable items such as the top level folders of shared drives, My Drive root folder, and Application Data folder the name is constant.
-    #[serde(rename = "name")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub name: Option<String>,
-    /// The original filename of the uploaded content if available, or else the original value of the name field. This is only available for files with binary content in Google Drive.
-    #[serde(rename = "originalFilename")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub original_filename: Option<String>,
-    /// Whether the user owns the file. Not populated for items in shared drives.
-    #[serde(rename = "ownedByMe")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub owned_by_me: Option<bool>,
-    /// The owners of the file. Currently, only certain legacy files may have more than one owner. Not populated for items in shared drives.
-    #[serde(rename = "owners")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub owners: Option<Vec<User>>,
-    /// The IDs of the parent folders which contain the file. If not specified as part of a create request, the file will be placed directly in the user's My Drive folder. If not specified as part of a copy request, the file will inherit any discoverable parents of the source file. Update requests must use the addParents and removeParents parameters to modify the parents list.
-    #[serde(rename = "parents")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub parents: Option<Vec<String>>,
-    /// List of permission IDs for users with access to this file.
-    #[serde(rename = "permissionIds")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permission_ids: Option<Vec<String>>,
-    /// The full list of permissions for the file. This is only available if the requesting user can share the file. Not populated for items in shared drives.
-    #[serde(rename = "permissions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permissions: Option<Vec<Permission>>,
-    /// A collection of arbitrary key-value pairs which are visible to all apps. Entries with null values are cleared in update and copy requests.
-    #[serde(rename = "properties")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub properties: Option<HashMap<String, String>>,
-    /// i64: The number of storage quota bytes used by the file. This includes the head revision as well as previous revisions with keepForever enabled.
-    #[serde(rename = "quotaBytesUsed")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub quota_bytes_used: Option<String>,
-    /// Whether the file has been shared. Not populated for items in shared drives.
-    #[serde(rename = "shared")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub shared: Option<bool>,
-    /// DateTime: The time at which the file was shared with the user, if applicable (RFC 3339 date-time).
-    #[serde(rename = "sharedWithMeTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub shared_with_me_time: Option<DateTime<Utc>>,
-    #[serde(rename = "sharingUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub sharing_user: Option<User>,
-    /// Shortcut file details. Only populated for shortcut files, which have the mimeType field set to application/vnd.google-apps.shortcut.
-    #[serde(rename = "shortcutDetails")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub shortcut_details: Option<FileShortcutDetails>,
-    /// i64: The size of the file's content in bytes. This is only applicable to files with binary content in Google Drive.
-    #[serde(rename = "size")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub size: Option<String>,
-    /// The list of spaces which contain the file. The currently supported values are 'drive', 'appDataFolder' and 'photos'.
-    #[serde(rename = "spaces")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub spaces: Option<Vec<String>>,
-    /// Whether the user has starred the file.
-    #[serde(rename = "starred")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub starred: Option<bool>,
-    /// Deprecated - use driveId instead.
-    #[serde(rename = "teamDriveId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drive_id: Option<String>,
-    /// A short-lived link to the file's thumbnail, if available. Typically lasts on the order of hours. Only populated when the requesting app can access the file's content. If the file isn't shared publicly, the URL returned in Files.thumbnailLink must be fetched using a credentialed request.
-    #[serde(rename = "thumbnailLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub thumbnail_link: Option<String>,
-    /// i64: The thumbnail version for use in thumbnail cache invalidation.
-    #[serde(rename = "thumbnailVersion")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub thumbnail_version: Option<String>,
-    /// Whether the file has been trashed, either explicitly or from a trashed parent folder. Only the owner may trash a file. The trashed item is excluded from all files.list responses returned for any user who does not own the file. However, all users with access to the file can see the trashed item metadata in an API response. All users with access can copy, download, export, and share the file.
-    #[serde(rename = "trashed")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub trashed: Option<bool>,
-    /// DateTime: The time that the item was trashed (RFC 3339 date-time). Only populated for items in shared drives.
-    #[serde(rename = "trashedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub trashed_time: Option<DateTime<Utc>>,
-    #[serde(rename = "trashingUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub trashing_user: Option<User>,
-    /// i64: A monotonically increasing version number for the file. This reflects every change made to the file on the server, even those not visible to the user.
-    #[serde(rename = "version")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub version: Option<String>,
-    /// Additional metadata about video media. This may not be available immediately upon upload.
-    #[serde(rename = "videoMediaMetadata")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub video_media_metadata: Option<FileVideoMediaMetadata>,
-    /// Whether the file has been viewed by this user.
-    #[serde(rename = "viewedByMe")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub viewed_by_me: Option<bool>,
-    /// DateTime: The last time the file was viewed by the user (RFC 3339 date-time).
-    #[serde(rename = "viewedByMeTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub viewed_by_me_time: Option<DateTime<Utc>>,
-    /// Deprecated - use copyRequiresWriterPermission instead.
-    #[serde(rename = "viewersCanCopyContent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub viewers_can_copy_content: Option<bool>,
-    /// A link for downloading the content of the file in a browser. This is only available for files with binary content in Google Drive.
-    #[serde(rename = "webContentLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub web_content_link: Option<String>,
-    /// A link for opening the file in a relevant Google editor or viewer in a browser.
-    #[serde(rename = "webViewLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub web_view_link: Option<String>,
-    /// Whether users with only writer permission can modify the file's permissions. Not populated for items in shared drives.
-    #[serde(rename = "writersCanShare")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub writers_can_share: Option<bool>,
-}
-
-/// A list of files.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileList {
-    /// The list of files. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "files")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub files: Option<Vec<File>>,
-    /// Whether the search process was incomplete. If true, then some search results may be missing, since all documents were not searched. This may occur when searching multiple drives with the "allDrives" corpora, but all corpora could not be searched. When this happens, it is suggested that clients narrow their query by choosing a different corpus such as "user" or "drive".
-    #[serde(rename = "incompleteSearch")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub incomplete_search: Option<bool>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#fileList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of files. This will be absent if the end of the files list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-/// A list of generated file IDs which can be provided in create requests.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct GeneratedIds {
-    /// The IDs generated for the requesting user in the specified space.
-    #[serde(rename = "ids")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub ids: Option<Vec<String>>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#generatedIds".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The type of file that can be created with these IDs.
-    #[serde(rename = "space")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub space: Option<String>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionPermissionDetails {
-    /// Whether this permission is inherited. This field is always populated. This is an output-only field.
-    #[serde(rename = "inherited")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub inherited: Option<bool>,
-    /// The ID of the item from which this permission is inherited. This is an output-only field.
-    #[serde(rename = "inheritedFrom")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub inherited_from: Option<String>,
-    /// The permission type for this user. While new values may be added in future, the following are currently possible:   - file  - member
-    #[serde(rename = "permissionType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permission_type: Option<String>,
-    /// The primary role for this user. While new values may be added in the future, the following are currently possible:   - organizer  - fileOrganizer  - writer  - commenter  - reader
-    #[serde(rename = "role")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub role: Option<String>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionTeamDrivePermissionDetails {
-    /// Deprecated - use permissionDetails/inherited instead.
-    #[serde(rename = "inherited")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub inherited: Option<bool>,
-    /// Deprecated - use permissionDetails/inheritedFrom instead.
-    #[serde(rename = "inheritedFrom")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub inherited_from: Option<String>,
-    /// Deprecated - use permissionDetails/role instead.
-    #[serde(rename = "role")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub role: Option<String>,
-    /// Deprecated - use permissionDetails/permissionType instead.
-    #[serde(rename = "teamDrivePermissionType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drive_permission_type: Option<String>,
-}
-
-/// A permission for a file. A permission grants a user, group, domain or the world access to a file or a folder hierarchy.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Permission {
-    /// Whether the permission allows the file to be discovered through search. This is only applicable for permissions of type domain or anyone.
-    #[serde(rename = "allowFileDiscovery")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub allow_file_discovery: Option<bool>,
-    /// Whether the account associated with this permission has been deleted. This field only pertains to user and group permissions.
-    #[serde(rename = "deleted")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub deleted: Option<bool>,
-    /// The "pretty" name of the value of the permission. The following is a list of examples for each type of permission:   - user - User's full name, as defined for their Google account, such as "Joe Smith."  - group - Name of the Google Group, such as "The Company Administrators."  - domain - String domain name, such as "thecompany.com."  - anyone - No displayName is present.
-    #[serde(rename = "displayName")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub display_name: Option<String>,
-    /// The domain to which this permission refers.
-    #[serde(rename = "domain")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub domain: Option<String>,
-    /// The email address of the user or group to which this permission refers.
-    #[serde(rename = "emailAddress")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub email_address: Option<String>,
-    /// DateTime: The time at which this permission will expire (RFC 3339 date-time). Expiration times have the following restrictions:   - They can only be set on user and group permissions  - The time must be in the future  - The time cannot be more than a year in the future
-    #[serde(rename = "expirationTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub expiration_time: Option<DateTime<Utc>>,
-    /// The ID of this permission. This is a unique identifier for the grantee, and is published in User resources as permissionId. IDs should be treated as opaque values.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#permission".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Details of whether the permissions on this shared drive item are inherited or directly on this item. This is an output-only field which is present only for shared drive items.
-    #[serde(rename = "permissionDetails")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permission_details: Option<Vec<PermissionPermissionDetails>>,
-    /// A link to the user's profile photo, if available.
-    #[serde(rename = "photoLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub photo_link: Option<String>,
-    /// The role granted by this permission. While new values may be supported in the future, the following are currently allowed:   - owner  - organizer  - fileOrganizer  - writer  - commenter  - reader
-    #[serde(rename = "role")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub role: Option<String>,
-    /// Deprecated - use permissionDetails instead.
-    #[serde(rename = "teamDrivePermissionDetails")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drive_permission_details: Option<Vec<PermissionTeamDrivePermissionDetails>>,
-    /// The type of the grantee. Valid values are:   - user  - group  - domain  - anyone  When creating a permission, if type is user or group, you must provide an emailAddress for the user or group. When type is domain, you must provide a domain. There isn't extra information required for a anyone type.
-    #[serde(rename = "type")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub typ: Option<String>,
-    /// Indicates the view for this permission. Only populated for permissions that belong to a view. published is the only supported value.
-    #[serde(rename = "view")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub view: Option<String>,
-}
-
-/// A list of permissions for a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionList {
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#permissionList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of permissions. This field will be absent if the end of the permissions list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-    /// The list of permissions. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "permissions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permissions: Option<Vec<Permission>>,
-}
-
-/// A reply to a comment on a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Reply {
-    /// The action the reply performed to the parent comment. Valid values are:   - resolve  - reopen
-    #[serde(rename = "action")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub action: Option<String>,
-    #[serde(rename = "author")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub author: Option<User>,
-    /// The plain text content of the reply. This field is used for setting the content, while htmlContent should be displayed. This is required on creates if no action is specified.
-    #[serde(rename = "content")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content: Option<String>,
-    /// DateTime: The time at which the reply was created (RFC 3339 date-time).
-    #[serde(rename = "createdTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub created_time: Option<DateTime<Utc>>,
-    /// Whether the reply has been deleted. A deleted reply has no content.
-    #[serde(rename = "deleted")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub deleted: Option<bool>,
-    /// The content of the reply with HTML formatting.
-    #[serde(rename = "htmlContent")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub html_content: Option<String>,
-    /// The ID of the reply.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#reply".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// DateTime: The last time the reply was modified (RFC 3339 date-time).
-    #[serde(rename = "modifiedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub modified_time: Option<DateTime<Utc>>,
-}
-
-/// A list of replies to a comment on a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ReplyList {
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#replyList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of replies. This will be absent if the end of the replies list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-    /// The list of replies. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "replies")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub replies: Option<Vec<Reply>>,
-}
-
-/// The metadata for a revision to a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Revision {
-    /// Links for exporting Google Docs to specific formats.
-    #[serde(rename = "exportLinks")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub export_links: Option<HashMap<String, String>>,
-    /// The ID of the revision.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Whether to keep this revision forever, even if it is no longer the head revision. If not set, the revision will be automatically purged 30 days after newer content is uploaded. This can be set on a maximum of 200 revisions for a file. This field is only applicable to files with binary content in Drive.
-    #[serde(rename = "keepForever")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub keep_forever: Option<bool>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#revision".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    #[serde(rename = "lastModifyingUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub last_modifying_user: Option<User>,
-    /// The MD5 checksum of the revision's content. This is only applicable to files with binary content in Drive.
-    #[serde(rename = "md5Checksum")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub md5_checksum: Option<String>,
-    /// The MIME type of the revision.
-    #[serde(rename = "mimeType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub mime_type: Option<String>,
-    /// DateTime: The last time the revision was modified (RFC 3339 date-time).
-    #[serde(rename = "modifiedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub modified_time: Option<DateTime<Utc>>,
-    /// The original filename used to create this revision. This is only applicable to files with binary content in Drive.
-    #[serde(rename = "originalFilename")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub original_filename: Option<String>,
-    /// Whether subsequent revisions will be automatically republished. This is only applicable to Google Docs.
-    #[serde(rename = "publishAuto")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub publish_auto: Option<bool>,
-    /// Whether this revision is published. This is only applicable to Google Docs.
-    #[serde(rename = "published")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub published: Option<bool>,
-    /// A link to the published revision. This is only populated for Google Sites files.
-    #[serde(rename = "publishedLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub published_link: Option<String>,
-    /// Whether this revision is published outside the domain. This is only applicable to Google Docs.
-    #[serde(rename = "publishedOutsideDomain")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub published_outside_domain: Option<bool>,
-    /// i64: The size of the revision's content in bytes. This is only applicable to files with binary content in Drive.
-    #[serde(rename = "size")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub size: Option<String>,
-}
-
-/// A list of revisions of a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RevisionList {
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#revisionList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of revisions. This will be absent if the end of the revisions list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-    /// The list of revisions. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "revisions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub revisions: Option<Vec<Revision>>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct StartPageToken {
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#startPageToken".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The starting page token for listing changes.
-    #[serde(rename = "startPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub start_page_token: Option<String>,
-}
-
-/// An image file and cropping parameters from which a background image for this Team Drive is set. This is a write only field; it can only be set on drive.teamdrives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamDriveBackgroundImageFile {
-    /// The ID of an image file in Drive to use for the background image.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The width of the cropped image in the closed range of 0 to 1. This value represents the width of the cropped image divided by the width of the entire image. The height is computed by applying a width to height aspect ratio of 80 to 9. The resulting image must be at least 1280 pixels wide and 144 pixels high.
-    #[serde(rename = "width")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub width: Option<f32>,
-    /// The X coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the horizontal distance from the left side of the entire image to the left side of the cropping area divided by the width of the entire image.
-    #[serde(rename = "xCoordinate")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub x_coordinate: Option<f32>,
-    /// The Y coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the vertical distance from the top side of the entire image to the top side of the cropping area divided by the height of the entire image.
-    #[serde(rename = "yCoordinate")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub y_coordinate: Option<f32>,
-}
-
-/// Capabilities the current user has on this Team Drive.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamDriveCapabilities {
-    /// Whether the current user can add children to folders in this Team Drive.
-    #[serde(rename = "canAddChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_add_children: Option<bool>,
-    /// Whether the current user can change the copyRequiresWriterPermission restriction of this Team Drive.
-    #[serde(rename = "canChangeCopyRequiresWriterPermissionRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_copy_requires_writer_permission_restriction: Option<bool>,
-    /// Whether the current user can change the domainUsersOnly restriction of this Team Drive.
-    #[serde(rename = "canChangeDomainUsersOnlyRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_domain_users_only_restriction: Option<bool>,
-    /// Whether the current user can change the background of this Team Drive.
-    #[serde(rename = "canChangeTeamDriveBackground")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_team_drive_background: Option<bool>,
-    /// Whether the current user can change the teamMembersOnly restriction of this Team Drive.
-    #[serde(rename = "canChangeTeamMembersOnlyRestriction")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_change_team_members_only_restriction: Option<bool>,
-    /// Whether the current user can comment on files in this Team Drive.
-    #[serde(rename = "canComment")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_comment: Option<bool>,
-    /// Whether the current user can copy files in this Team Drive.
-    #[serde(rename = "canCopy")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_copy: Option<bool>,
-    /// Whether the current user can delete children from folders in this Team Drive.
-    #[serde(rename = "canDeleteChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_delete_children: Option<bool>,
-    /// Whether the current user can delete this Team Drive. Attempting to delete the Team Drive may still fail if there are untrashed items inside the Team Drive.
-    #[serde(rename = "canDeleteTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_delete_team_drive: Option<bool>,
-    /// Whether the current user can download files in this Team Drive.
-    #[serde(rename = "canDownload")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_download: Option<bool>,
-    /// Whether the current user can edit files in this Team Drive
-    #[serde(rename = "canEdit")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_edit: Option<bool>,
-    /// Whether the current user can list the children of folders in this Team Drive.
-    #[serde(rename = "canListChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_list_children: Option<bool>,
-    /// Whether the current user can add members to this Team Drive or remove them or change their role.
-    #[serde(rename = "canManageMembers")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_manage_members: Option<bool>,
-    /// Whether the current user can read the revisions resource of files in this Team Drive.
-    #[serde(rename = "canReadRevisions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_read_revisions: Option<bool>,
-    /// Deprecated - use canDeleteChildren or canTrashChildren instead.
-    #[serde(rename = "canRemoveChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_remove_children: Option<bool>,
-    /// Whether the current user can rename files or folders in this Team Drive.
-    #[serde(rename = "canRename")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_rename: Option<bool>,
-    /// Whether the current user can rename this Team Drive.
-    #[serde(rename = "canRenameTeamDrive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_rename_team_drive: Option<bool>,
-    /// Whether the current user can share files or folders in this Team Drive.
-    #[serde(rename = "canShare")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_share: Option<bool>,
-    /// Whether the current user can trash children from folders in this Team Drive.
-    #[serde(rename = "canTrashChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_trash_children: Option<bool>,
-}
-
-/// A set of restrictions that apply to this Team Drive or items inside this Team Drive.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamDriveRestrictions {
-    /// Whether administrative privileges on this Team Drive are required to modify restrictions.
-    #[serde(rename = "adminManagedRestrictions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub admin_managed_restrictions: Option<bool>,
-    /// Whether the options to copy, print, or download files inside this Team Drive, should be disabled for readers and commenters. When this restriction is set to true, it will override the similarly named field to true for any file inside this Team Drive.
-    #[serde(rename = "copyRequiresWriterPermission")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub copy_requires_writer_permission: Option<bool>,
-    /// Whether access to this Team Drive and items inside this Team Drive is restricted to users of the domain to which this Team Drive belongs. This restriction may be overridden by other sharing policies controlled outside of this Team Drive.
-    #[serde(rename = "domainUsersOnly")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub domain_users_only: Option<bool>,
-    /// Whether access to items inside this Team Drive is restricted to members of this Team Drive.
-    #[serde(rename = "teamMembersOnly")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_members_only: Option<bool>,
-}
-
-/// Deprecated: use the drive collection instead.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamDrive {
-    /// An image file and cropping parameters from which a background image for this Team Drive is set. This is a write only field; it can only be set on drive.teamdrives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
-    #[serde(rename = "backgroundImageFile")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub background_image_file: Option<TeamDriveBackgroundImageFile>,
-    /// A short-lived link to this Team Drive's background image.
-    #[serde(rename = "backgroundImageLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub background_image_link: Option<String>,
-    /// Capabilities the current user has on this Team Drive.
-    #[serde(rename = "capabilities")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub capabilities: Option<TeamDriveCapabilities>,
-    /// The color of this Team Drive as an RGB hex string. It can only be set on a drive.teamdrives.update request that does not set themeId.
-    #[serde(rename = "colorRgb")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub color_rgb: Option<String>,
-    /// DateTime: The time at which the Team Drive was created (RFC 3339 date-time).
-    #[serde(rename = "createdTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub created_time: Option<DateTime<Utc>>,
-    /// The ID of this Team Drive which is also the ID of the top level folder of this Team Drive.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#teamDrive".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The name of this Team Drive.
-    #[serde(rename = "name")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub name: Option<String>,
-    /// A set of restrictions that apply to this Team Drive or items inside this Team Drive.
-    #[serde(rename = "restrictions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub restrictions: Option<TeamDriveRestrictions>,
-    /// The ID of the theme from which the background image and color will be set. The set of possible teamDriveThemes can be retrieved from a drive.about.get response. When not specified on a drive.teamdrives.create request, a random theme is chosen from which the background image and color are set. This is a write-only field; it can only be set on requests that don't set colorRgb or backgroundImageFile.
-    #[serde(rename = "themeId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub theme_id: Option<String>,
-}
-
-/// A list of Team Drives.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamDriveList {
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#teamDriveList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of Team Drives. This will be absent if the end of the Team Drives list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-    /// The list of Team Drives. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "teamDrives")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team_drives: Option<Vec<TeamDrive>>,
-}
-
-/// Information about a Drive user.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct User {
-    /// A plain text displayable name for this user.
-    #[serde(rename = "displayName")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub display_name: Option<String>,
-    /// The email address of the user. This may not be present in certain contexts if the user has not made their email address visible to the requester.
-    #[serde(rename = "emailAddress")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub email_address: Option<String>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#user".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Whether this user is the requesting user.
-    #[serde(rename = "me")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub me: Option<bool>,
-    /// The user's ID as visible in Permission resources.
-    #[serde(rename = "permissionId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permission_id: Option<String>,
-    /// A link to the user's profile photo, if available.
-    #[serde(rename = "photoLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub photo_link: Option<String>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DriveParams {
-    /// Data format for the response.
-    #[serde(rename = "alt")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub alt: Option<String>,
-    /// Selector specifying which fields to include in a partial response.
-    #[serde(rename = "fields")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub fields: Option<String>,
-    /// API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
-    #[serde(rename = "key")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub key: Option<String>,
-    /// OAuth 2.0 token for the current user.
-    #[serde(rename = "oauth_token")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub oauth_token: Option<String>,
-    /// Returns response with indentations and line breaks.
-    #[serde(rename = "prettyPrint")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub pretty_print: Option<bool>,
-    /// An opaque string that represents a user for quota purposes. Must not exceed 40 characters.
-    #[serde(rename = "quotaUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub quota_user: Option<String>,
-    /// Deprecated. Please use quotaUser instead.
-    #[serde(rename = "userIp")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub user_ip: Option<String>,
-}
-
-/// Parameters for the `about.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct AboutGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-}
-
-impl std::fmt::Display for AboutGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `changes.getStartPageToken` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ChangesGetStartPageTokenParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the shared drive for which the starting pageToken for listing future changes from that shared drive is returned.
-    #[serde(rename = "driveId")]
-    pub drive_id: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Deprecated use driveId instead.
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: Option<String>,
-}
-
-impl std::fmt::Display for ChangesGetStartPageTokenParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.drive_id {
-            write!(
-                f,
-                "&driveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.team_drive_id {
-            write!(
-                f,
-                "&teamDriveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `changes.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ChangesListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The shared drive from which changes are returned. If specified the change IDs will be reflective of the shared drive; use the combined drive ID and change ID as an identifier.
-    #[serde(rename = "driveId")]
-    pub drive_id: Option<String>,
-    /// Whether changes should include the file resource if the file is still accessible by the user at the time of the request, even when a file was removed from the list of changes and there will be no further change entries for this file.
-    #[serde(rename = "includeCorpusRemovals")]
-    pub include_corpus_removals: Option<bool>,
-    /// Whether both My Drive and shared drive items should be included in results.
-    #[serde(rename = "includeItemsFromAllDrives")]
-    pub include_items_from_all_drives: Option<bool>,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether to include changes indicating that items have been removed from the list of changes, for example by deletion or loss of access.
-    #[serde(rename = "includeRemoved")]
-    pub include_removed: Option<bool>,
-    /// Deprecated use includeItemsFromAllDrives instead.
-    #[serde(rename = "includeTeamDriveItems")]
-    pub include_team_drive_items: Option<bool>,
-    /// The maximum number of changes to return per page.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response or to the response from the getStartPageToken method.
-    #[serde(rename = "pageToken")]
-    pub page_token: String,
-    /// Whether to restrict the results to changes inside the My Drive hierarchy. This omits changes to files such as those in the Application Data folder or shared files which have not been added to My Drive.
-    #[serde(rename = "restrictToMyDrive")]
-    pub restrict_to_my_drive: Option<bool>,
-    /// A comma-separated list of spaces to query within the user corpus. Supported values are 'drive', 'appDataFolder' and 'photos'.
-    #[serde(rename = "spaces")]
-    pub spaces: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Deprecated use driveId instead.
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: Option<String>,
-}
-
-impl std::fmt::Display for ChangesListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&pageToken={}",
-            percent_encode(format!("{}", self.page_token).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        if let Some(ref v) = self.drive_id {
-            write!(
-                f,
-                "&driveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_corpus_removals {
-            write!(
-                f,
-                "&includeCorpusRemovals={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_items_from_all_drives {
-            write!(
-                f,
-                "&includeItemsFromAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_removed {
-            write!(
-                f,
-                "&includeRemoved={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_team_drive_items {
-            write!(
-                f,
-                "&includeTeamDriveItems={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.restrict_to_my_drive {
-            write!(
-                f,
-                "&restrictToMyDrive={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.spaces {
-            write!(
-                f,
-                "&spaces={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.team_drive_id {
-            write!(
-                f,
-                "&teamDriveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `changes.watch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ChangesWatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The shared drive from which changes are returned. If specified the change IDs will be reflective of the shared drive; use the combined drive ID and change ID as an identifier.
-    #[serde(rename = "driveId")]
-    pub drive_id: Option<String>,
-    /// Whether changes should include the file resource if the file is still accessible by the user at the time of the request, even when a file was removed from the list of changes and there will be no further change entries for this file.
-    #[serde(rename = "includeCorpusRemovals")]
-    pub include_corpus_removals: Option<bool>,
-    /// Whether both My Drive and shared drive items should be included in results.
-    #[serde(rename = "includeItemsFromAllDrives")]
-    pub include_items_from_all_drives: Option<bool>,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether to include changes indicating that items have been removed from the list of changes, for example by deletion or loss of access.
-    #[serde(rename = "includeRemoved")]
-    pub include_removed: Option<bool>,
-    /// Deprecated use includeItemsFromAllDrives instead.
-    #[serde(rename = "includeTeamDriveItems")]
-    pub include_team_drive_items: Option<bool>,
-    /// The maximum number of changes to return per page.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response or to the response from the getStartPageToken method.
-    #[serde(rename = "pageToken")]
-    pub page_token: String,
-    /// Whether to restrict the results to changes inside the My Drive hierarchy. This omits changes to files such as those in the Application Data folder or shared files which have not been added to My Drive.
-    #[serde(rename = "restrictToMyDrive")]
-    pub restrict_to_my_drive: Option<bool>,
-    /// A comma-separated list of spaces to query within the user corpus. Supported values are 'drive', 'appDataFolder' and 'photos'.
-    #[serde(rename = "spaces")]
-    pub spaces: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Deprecated use driveId instead.
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: Option<String>,
-}
-
-impl std::fmt::Display for ChangesWatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&pageToken={}",
-            percent_encode(format!("{}", self.page_token).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        if let Some(ref v) = self.drive_id {
-            write!(
-                f,
-                "&driveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_corpus_removals {
-            write!(
-                f,
-                "&includeCorpusRemovals={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_items_from_all_drives {
-            write!(
-                f,
-                "&includeItemsFromAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_removed {
-            write!(
-                f,
-                "&includeRemoved={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_team_drive_items {
-            write!(
-                f,
-                "&includeTeamDriveItems={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.restrict_to_my_drive {
-            write!(
-                f,
-                "&restrictToMyDrive={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.spaces {
-            write!(
-                f,
-                "&spaces={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.team_drive_id {
-            write!(
-                f,
-                "&teamDriveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `channels.stop` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ChannelsStopParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-}
-
-impl std::fmt::Display for ChannelsStopParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `comments.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentsCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-}
-
-impl std::fmt::Display for CommentsCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `comments.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-}
-
-impl std::fmt::Display for CommentsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `comments.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether to return deleted comments. Deleted comments will not include their original content.
-    #[serde(rename = "includeDeleted")]
-    pub include_deleted: Option<bool>,
-}
-
-impl std::fmt::Display for CommentsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.include_deleted {
-            write!(
-                f,
-                "&includeDeleted={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `comments.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether to include deleted comments. Deleted comments will not include their original content.
-    #[serde(rename = "includeDeleted")]
-    pub include_deleted: Option<bool>,
-    /// The maximum number of comments to return per page.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// The minimum value of 'modifiedTime' for the result comments (RFC 3339 date-time).
-    #[serde(rename = "startModifiedTime")]
-    pub start_modified_time: Option<String>,
-}
-
-impl std::fmt::Display for CommentsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.include_deleted {
-            write!(
-                f,
-                "&includeDeleted={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.start_modified_time {
-            write!(
-                f,
-                "&startModifiedTime={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `comments.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct CommentsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-}
-
-impl std::fmt::Display for CommentsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// An ID, such as a random UUID, which uniquely identifies this user's request for idempotent creation of a shared drive. A repeated request by the same user and with the same request ID will avoid creating duplicates by attempting to create the same shared drive. If the shared drive already exists a 409 error will be returned.
-    #[serde(rename = "requestId")]
-    pub request_id: String,
-}
-
-impl std::fmt::Display for DrivesCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&requestId={}",
-            percent_encode(format!("{}", self.request_id).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the shared drive.
-    #[serde(rename = "driveId")]
-    pub drive_id: String,
-}
-
-impl std::fmt::Display for DrivesDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the shared drive.
-    #[serde(rename = "driveId")]
-    pub drive_id: String,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for DrivesGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.hide` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesHideParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the shared drive.
-    #[serde(rename = "driveId")]
-    pub drive_id: String,
-}
-
-impl std::fmt::Display for DrivesHideParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Maximum number of shared drives to return.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// Page token for shared drives.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Query string for searching shared drives.
-    #[serde(rename = "q")]
-    pub q: Option<String>,
-    /// Issue the request as a domain administrator; if set to true, then all shared drives of the domain in which the requester is an administrator are returned.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for DrivesListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.q {
-            write!(
-                f,
-                "&q={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.unhide` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesUnhideParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the shared drive.
-    #[serde(rename = "driveId")]
-    pub drive_id: String,
-}
-
-impl std::fmt::Display for DrivesUnhideParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `drives.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DrivesUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the shared drive.
-    #[serde(rename = "driveId")]
-    pub drive_id: String,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for DrivesUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.copy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesCopyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. Requests that specify more than one parent fail.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether to ignore the domain's default visibility settings for the created file. Domain administrators can choose to make all uploaded files visible to the domain by default; this parameter bypasses that behavior for the request. Permissions are still inherited from parent folders.
-    #[serde(rename = "ignoreDefaultVisibility")]
-    pub ignore_default_visibility: Option<bool>,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether to set the 'keepForever' field in the new head revision. This is only applicable to files with binary content in Google Drive. Only 200 revisions for the file can be kept forever. If the limit is reached, try deleting pinned revisions.
-    #[serde(rename = "keepRevisionForever")]
-    pub keep_revision_forever: Option<bool>,
-    /// A language hint for OCR processing during image import (ISO 639-1 code).
-    #[serde(rename = "ocrLanguage")]
-    pub ocr_language: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-}
-
-impl std::fmt::Display for FilesCopyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.ignore_default_visibility {
-            write!(
-                f,
-                "&ignoreDefaultVisibility={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.keep_revision_forever {
-            write!(
-                f,
-                "&keepRevisionForever={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.ocr_language {
-            write!(
-                f,
-                "&ocrLanguage={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. Requests that specify more than one parent fail.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-    /// Whether to ignore the domain's default visibility settings for the created file. Domain administrators can choose to make all uploaded files visible to the domain by default; this parameter bypasses that behavior for the request. Permissions are still inherited from parent folders.
-    #[serde(rename = "ignoreDefaultVisibility")]
-    pub ignore_default_visibility: Option<bool>,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether to set the 'keepForever' field in the new head revision. This is only applicable to files with binary content in Google Drive. Only 200 revisions for the file can be kept forever. If the limit is reached, try deleting pinned revisions.
-    #[serde(rename = "keepRevisionForever")]
-    pub keep_revision_forever: Option<bool>,
-    /// A language hint for OCR processing during image import (ISO 639-1 code).
-    #[serde(rename = "ocrLanguage")]
-    pub ocr_language: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Whether to use the uploaded content as indexable text.
-    #[serde(rename = "useContentAsIndexableText")]
-    pub use_content_as_indexable_text: Option<bool>,
-}
-
-impl std::fmt::Display for FilesCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.ignore_default_visibility {
-            write!(
-                f,
-                "&ignoreDefaultVisibility={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.keep_revision_forever {
-            write!(
-                f,
-                "&keepRevisionForever={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.ocr_language {
-            write!(
-                f,
-                "&ocrLanguage={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_content_as_indexable_text {
-            write!(
-                f,
-                "&useContentAsIndexableText={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-}
-
-impl std::fmt::Display for FilesDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.emptyTrash` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesEmptyTrashParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-}
-
-impl std::fmt::Display for FilesEmptyTrashParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.export` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesExportParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The MIME type of the format requested for this export.
-    #[serde(rename = "mimeType")]
-    pub mime_type: String,
-}
-
-impl std::fmt::Display for FilesExportParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&mimeType={}",
-            percent_encode(format!("{}", self.mime_type).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.generateIds` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesGenerateIdsParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The number of IDs to return.
-    #[serde(rename = "count")]
-    pub count: Option<i32>,
-    /// The space in which the IDs can be used to create new files. Supported values are 'drive' and 'appDataFolder'.
-    #[serde(rename = "space")]
-    pub space: Option<String>,
-}
-
-impl std::fmt::Display for FilesGenerateIdsParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.count {
-            write!(
-                f,
-                "&count={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.space {
-            write!(
-                f,
-                "&space={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Whether the user is acknowledging the risk of downloading known malware or other abusive files. This is only applicable when alt=media.
-    #[serde(rename = "acknowledgeAbuse")]
-    pub acknowledge_abuse: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-}
-
-impl std::fmt::Display for FilesGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.acknowledge_abuse {
-            write!(
-                f,
-                "&acknowledgeAbuse={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Groupings of files to which the query applies. Supported groupings are: 'user' (files created by, opened by, or shared directly with the user), 'drive' (files in the specified shared drive as indicated by the 'driveId'), 'domain' (files shared to the user's domain), and 'allDrives' (A combination of 'user' and 'drive' for all drives where the user is a member). When able, use 'user' or 'drive', instead of 'allDrives', for efficiency.
-    #[serde(rename = "corpora")]
-    pub corpora: Option<String>,
-    /// The source of files to list. Deprecated: use 'corpora' instead.
-    #[serde(rename = "corpus")]
-    pub corpus: Option<String>,
-    /// ID of the shared drive to search.
-    #[serde(rename = "driveId")]
-    pub drive_id: Option<String>,
-    /// Whether both My Drive and shared drive items should be included in results.
-    #[serde(rename = "includeItemsFromAllDrives")]
-    pub include_items_from_all_drives: Option<bool>,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Deprecated use includeItemsFromAllDrives instead.
-    #[serde(rename = "includeTeamDriveItems")]
-    pub include_team_drive_items: Option<bool>,
-    /// A comma-separated list of sort keys. Valid keys are 'createdTime', 'folder', 'modifiedByMeTime', 'modifiedTime', 'name', 'name_natural', 'quotaBytesUsed', 'recency', 'sharedWithMeTime', 'starred', and 'viewedByMeTime'. Each key sorts ascending by default, but may be reversed with the 'desc' modifier. Example usage: ?orderBy=folder,modifiedTime desc,name. Please note that there is a current limitation for users with approximately one million files in which the requested sort order is ignored.
-    #[serde(rename = "orderBy")]
-    pub order_by: Option<String>,
-    /// The maximum number of files to return per page. Partial or empty result pages are possible even before the end of the files list has been reached.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// A query for filtering the file results. See the "Search for Files" guide for supported syntax.
-    #[serde(rename = "q")]
-    pub q: Option<String>,
-    /// A comma-separated list of spaces to query within the corpus. Supported values are 'drive', 'appDataFolder' and 'photos'.
-    #[serde(rename = "spaces")]
-    pub spaces: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Deprecated use driveId instead.
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: Option<String>,
-}
-
-impl std::fmt::Display for FilesListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.corpora {
-            write!(
-                f,
-                "&corpora={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.corpus {
-            write!(
-                f,
-                "&corpus={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.drive_id {
-            write!(
-                f,
-                "&driveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_items_from_all_drives {
-            write!(
-                f,
-                "&includeItemsFromAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_team_drive_items {
-            write!(
-                f,
-                "&includeTeamDriveItems={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.order_by {
-            write!(
-                f,
-                "&orderBy={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.q {
-            write!(
-                f,
-                "&q={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.spaces {
-            write!(
-                f,
-                "&spaces={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.team_drive_id {
-            write!(
-                f,
-                "&teamDriveId={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// A comma-separated list of parent IDs to add.
-    #[serde(rename = "addParents")]
-    pub add_parents: Option<String>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. If the item's owner makes a request to add a single parent, the item is removed from all current folders and placed in the requested folder. Other requests that increase the number of parents fail, except when the canAddMyDriveParent file capability is true and a single parent is being added.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether to set the 'keepForever' field in the new head revision. This is only applicable to files with binary content in Google Drive. Only 200 revisions for the file can be kept forever. If the limit is reached, try deleting pinned revisions.
-    #[serde(rename = "keepRevisionForever")]
-    pub keep_revision_forever: Option<bool>,
-    /// A language hint for OCR processing during image import (ISO 639-1 code).
-    #[serde(rename = "ocrLanguage")]
-    pub ocr_language: Option<String>,
-    /// A comma-separated list of parent IDs to remove.
-    #[serde(rename = "removeParents")]
-    pub remove_parents: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Whether to use the uploaded content as indexable text.
-    #[serde(rename = "useContentAsIndexableText")]
-    pub use_content_as_indexable_text: Option<bool>,
-}
-
-impl std::fmt::Display for FilesUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.add_parents {
-            write!(
-                f,
-                "&addParents={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.keep_revision_forever {
-            write!(
-                f,
-                "&keepRevisionForever={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.ocr_language {
-            write!(
-                f,
-                "&ocrLanguage={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.remove_parents {
-            write!(
-                f,
-                "&removeParents={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_content_as_indexable_text {
-            write!(
-                f,
-                "&useContentAsIndexableText={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.watch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesWatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Whether the user is acknowledging the risk of downloading known malware or other abusive files. This is only applicable when alt=media.
-    #[serde(rename = "acknowledgeAbuse")]
-    pub acknowledge_abuse: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-}
-
-impl std::fmt::Display for FilesWatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.acknowledge_abuse {
-            write!(
-                f,
-                "&acknowledgeAbuse={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `permissions.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionsCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// A plain text custom message to include in the notification email.
-    #[serde(rename = "emailMessage")]
-    pub email_message: Option<String>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. See moveToNewOwnersRoot for details.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-    /// The ID of the file or shared drive.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// This parameter only takes effect if the item is not in a shared drive and the request is attempting to transfer the ownership of the item. When set to true, the item is moved to the new owner's My Drive root folder and all prior parents removed. If set to false, when enforceSingleParent=true, parents are not changed. If set to false, when enforceSingleParent=false, existing parents are not changed; however, the file will be added to the new owner's My Drive root folder, unless it is already in the new owner's My Drive.
-    #[serde(rename = "moveToNewOwnersRoot")]
-    pub move_to_new_owners_root: Option<bool>,
-    /// Whether to send a notification email when sharing to users or groups. This defaults to true for users and groups, and is not allowed for other requests. It must not be disabled for ownership transfers.
-    #[serde(rename = "sendNotificationEmail")]
-    pub send_notification_email: Option<bool>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Whether to transfer ownership to the specified user and downgrade the current owner to a writer. This parameter is required as an acknowledgement of the side effect.
-    #[serde(rename = "transferOwnership")]
-    pub transfer_ownership: Option<bool>,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for PermissionsCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.email_message {
-            write!(
-                f,
-                "&emailMessage={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.move_to_new_owners_root {
-            write!(
-                f,
-                "&moveToNewOwnersRoot={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.send_notification_email {
-            write!(
-                f,
-                "&sendNotificationEmail={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.transfer_ownership {
-            write!(
-                f,
-                "&transferOwnership={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `permissions.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file or shared drive.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the permission.
-    #[serde(rename = "permissionId")]
-    pub permission_id: String,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for PermissionsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `permissions.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the permission.
-    #[serde(rename = "permissionId")]
-    pub permission_id: String,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for PermissionsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `permissions.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file or shared drive.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
-    #[serde(rename = "includePermissionsForView")]
-    pub include_permissions_for_view: Option<String>,
-    /// The maximum number of permissions to return per page. When not set for files in a shared drive, at most 100 results will be returned. When not set for files that are not in a shared drive, the entire list will be returned.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for PermissionsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.include_permissions_for_view {
-            write!(
-                f,
-                "&includePermissionsForView={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `permissions.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PermissionsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file or shared drive.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the permission.
-    #[serde(rename = "permissionId")]
-    pub permission_id: String,
-    /// Whether to remove the expiration date.
-    #[serde(rename = "removeExpiration")]
-    pub remove_expiration: Option<bool>,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-    /// Whether to transfer ownership to the specified user and downgrade the current owner to a writer. This parameter is required as an acknowledgement of the side effect.
-    #[serde(rename = "transferOwnership")]
-    pub transfer_ownership: Option<bool>,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for PermissionsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.remove_expiration {
-            write!(
-                f,
-                "&removeExpiration={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.transfer_ownership {
-            write!(
-                f,
-                "&transferOwnership={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `replies.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RepliesCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-}
-
-impl std::fmt::Display for RepliesCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `replies.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RepliesDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the reply.
-    #[serde(rename = "replyId")]
-    pub reply_id: String,
-}
-
-impl std::fmt::Display for RepliesDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `replies.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RepliesGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether to return deleted replies. Deleted replies will not include their original content.
-    #[serde(rename = "includeDeleted")]
-    pub include_deleted: Option<bool>,
-    /// The ID of the reply.
-    #[serde(rename = "replyId")]
-    pub reply_id: String,
-}
-
-impl std::fmt::Display for RepliesGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.include_deleted {
-            write!(
-                f,
-                "&includeDeleted={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `replies.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RepliesListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether to include deleted replies. Deleted replies will not include their original content.
-    #[serde(rename = "includeDeleted")]
-    pub include_deleted: Option<bool>,
-    /// The maximum number of replies to return per page.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-}
-
-impl std::fmt::Display for RepliesListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.include_deleted {
-            write!(
-                f,
-                "&includeDeleted={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `replies.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RepliesUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the comment.
-    #[serde(rename = "commentId")]
-    pub comment_id: String,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the reply.
-    #[serde(rename = "replyId")]
-    pub reply_id: String,
-}
-
-impl std::fmt::Display for RepliesUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `revisions.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RevisionsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the revision.
-    #[serde(rename = "revisionId")]
-    pub revision_id: String,
-}
-
-impl std::fmt::Display for RevisionsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `revisions.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RevisionsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Whether the user is acknowledging the risk of downloading known malware or other abusive files. This is only applicable when alt=media.
-    #[serde(rename = "acknowledgeAbuse")]
-    pub acknowledge_abuse: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the revision.
-    #[serde(rename = "revisionId")]
-    pub revision_id: String,
-}
-
-impl std::fmt::Display for RevisionsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.acknowledge_abuse {
-            write!(
-                f,
-                "&acknowledgeAbuse={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `revisions.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RevisionsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The maximum number of revisions to return per page.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-}
-
-impl std::fmt::Display for RevisionsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `revisions.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RevisionsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The ID of the revision.
-    #[serde(rename = "revisionId")]
-    pub revision_id: String,
-}
-
-impl std::fmt::Display for RevisionsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `teamdrives.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamdrivesCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// An ID, such as a random UUID, which uniquely identifies this user's request for idempotent creation of a Team Drive. A repeated request by the same user and with the same request ID will avoid creating duplicates by attempting to create the same Team Drive. If the Team Drive already exists a 409 error will be returned.
-    #[serde(rename = "requestId")]
-    pub request_id: String,
-}
-
-impl std::fmt::Display for TeamdrivesCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&requestId={}",
-            percent_encode(format!("{}", self.request_id).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        Ok(())
-    }
-}
-
-/// Parameters for the `teamdrives.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamdrivesDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the Team Drive
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: String,
-}
-
-impl std::fmt::Display for TeamdrivesDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `teamdrives.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamdrivesGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the Team Drive
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: String,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the Team Drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for TeamdrivesGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `teamdrives.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamdrivesListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// Maximum number of Team Drives to return.
-    #[serde(rename = "pageSize")]
-    pub page_size: Option<i32>,
-    /// Page token for Team Drives.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Query string for searching Team Drives.
-    #[serde(rename = "q")]
-    pub q: Option<String>,
-    /// Issue the request as a domain administrator; if set to true, then all Team Drives of the domain in which the requester is an administrator are returned.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for TeamdrivesListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.page_size {
-            write!(
-                f,
-                "&pageSize={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.q {
-            write!(
-                f,
-                "&q={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `teamdrives.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TeamdrivesUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub drive_params: Option<DriveParams>,
-    /// The ID of the Team Drive
-    #[serde(rename = "teamDriveId")]
-    pub team_drive_id: String,
-    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the Team Drive belongs.
-    #[serde(rename = "useDomainAdminAccess")]
-    pub use_domain_admin_access: Option<bool>,
-}
-
-impl std::fmt::Display for TeamdrivesUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.use_domain_admin_access {
-            write!(
-                f,
-                "&useDomainAdminAccess={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-impl std::fmt::Display for DriveParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.alt {
-            write!(
-                f,
-                "&alt={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.fields {
-            write!(
-                f,
-                "&fields={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.key {
-            write!(
-                f,
-                "&key={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.oauth_token {
-            write!(
-                f,
-                "&oauth_token={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.pretty_print {
-            write!(
-                f,
-                "&prettyPrint={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.quota_user {
-            write!(
-                f,
-                "&quotaUser={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_ip {
-            write!(
-                f,
-                "&userIp={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// The Drive About service represents the About resource.
-pub struct AboutService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl AboutService {
-    /// Create a new AboutService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> AboutService {
-        AboutService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Gets information about the user, the user's Drive, and system capabilities.
-    pub async fn get(&mut self, params: &AboutGetParams) -> Result<About> {
-        let rel_path = format!("about",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-}
-
-/// The Drive Changes service represents the Changes resource.
-pub struct ChangesService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ChangesService {
-    /// Create a new ChangesService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ChangesService {
-        ChangesService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Gets the starting pageToken for listing future changes.
-    pub async fn get_start_page_token(
-        &mut self,
-        params: &ChangesGetStartPageTokenParams,
-    ) -> Result<StartPageToken> {
-        let rel_path = format!("changes/startPageToken",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Lists the changes for a user or shared drive.
-    pub async fn list(&mut self, params: &ChangesListParams) -> Result<ChangeList> {
-        let rel_path = format!("changes",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Subscribes to changes for a user.
-    pub async fn watch(&mut self, params: &ChangesWatchParams, req: &Channel) -> Result<Channel> {
-        let rel_path = format!("changes/watch",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-}
-
-/// The Drive Channels service represents the Channels resource.
-pub struct ChannelsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ChannelsService {
-    /// Create a new ChannelsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ChannelsService {
-        ChannelsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Stop watching resources through this channel
-    pub async fn stop(&mut self, params: &ChannelsStopParams, req: &Channel) -> Result<()> {
-        let rel_path = format!("channels/stop",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-}
-
-/// The Drive Comments service represents the Comments resource.
-pub struct CommentsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl CommentsService {
-    /// Create a new CommentsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> CommentsService {
-        CommentsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a new comment on a file.
-    pub async fn create(
-        &mut self,
-        params: &CommentsCreateParams,
-        req: &Comment,
-    ) -> Result<Comment> {
-        let rel_path = format!(
-            "files/{fileId}/comments",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Deletes a comment.
-    pub async fn delete(&mut self, params: &CommentsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Gets a comment by ID.
-    pub async fn get(&mut self, params: &CommentsGetParams) -> Result<Comment> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Lists a file's comments.
-    pub async fn list(&mut self, params: &CommentsListParams) -> Result<CommentList> {
-        let rel_path = format!(
-            "files/{fileId}/comments",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates a comment with patch semantics.
-    pub async fn update(
-        &mut self,
-        params: &CommentsUpdateParams,
-        req: &Comment,
-    ) -> Result<Comment> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-}
-
-/// The Drive Drives service represents the Drives resource.
-pub struct DrivesService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl DrivesService {
-    /// Create a new DrivesService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> DrivesService {
-        DrivesService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a new shared drive.
-    pub async fn create(&mut self, params: &DrivesCreateParams, req: &Drive) -> Result<Drive> {
-        let rel_path = format!("drives",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Permanently deletes a shared drive for which the user is an organizer. The shared drive cannot contain any untrashed items.
-    pub async fn delete(&mut self, params: &DrivesDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "drives/{driveId}",
-            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Gets a shared drive's metadata by ID.
-    pub async fn get(&mut self, params: &DrivesGetParams) -> Result<Drive> {
-        let rel_path = format!(
-            "drives/{driveId}",
-            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Hides a shared drive from the default view.
-    pub async fn hide(&mut self, params: &DrivesHideParams) -> Result<Drive> {
-        let rel_path = format!(
-            "drives/{driveId}/hide",
-            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Lists the user's shared drives.
-    pub async fn list(&mut self, params: &DrivesListParams) -> Result<DriveList> {
-        let rel_path = format!("drives",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Restores a shared drive to the default view.
-    pub async fn unhide(&mut self, params: &DrivesUnhideParams) -> Result<Drive> {
-        let rel_path = format!(
-            "drives/{driveId}/unhide",
-            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Updates the metadate for a shared drive.
-    pub async fn update(&mut self, params: &DrivesUpdateParams, req: &Drive) -> Result<Drive> {
-        let rel_path = format!(
-            "drives/{driveId}",
-            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-}
-
-/// The Drive Files service represents the Files resource.
-pub struct FilesService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl FilesService {
-    /// Create a new FilesService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> FilesService {
-        FilesService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a copy of a file and applies any requested updates with patch semantics. Folders cannot be copied.
-    pub async fn copy(&mut self, params: &FilesCopyParams, req: &File) -> Result<File> {
-        let rel_path = format!(
-            "files/{fileId}/copy",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DrivePhotosReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Creates a new file.
-    pub async fn create(&mut self, params: &FilesCreateParams, req: &File) -> Result<File> {
-        let rel_path = format!("files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Creates a new file.
-    ///
-    /// This method is a variant of `create()`, taking data for upload. It performs a multipart upload.
-    pub async fn create_upload(
-        &mut self,
-        params: &FilesCreateParams,
-        req: &File,
-        data: hyper::body::Bytes,
-    ) -> Result<File> {
-        let rel_path = format!("/upload/drive/v3/files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=multipart{params}", params = params);
-
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-
-        do_upload_multipart(&self.client, &full_uri, &headers, "POST", opt_request, data).await
-    }
-
-    /// Creates a new file.
-    ///
-    /// This method is a variant of `create()`, taking data for upload.
-    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
-    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
-    /// you choose for the upload.
-    pub async fn create_resumable_upload<'client>(
-        &'client mut self,
-        params: &FilesCreateParams,
-        req: &File,
-    ) -> Result<ResumableUpload<'client, File>> {
-        let rel_path = format!("/resumable/upload/drive/v3/files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=resumable{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
-            do_request_with_headers(&self.client, &full_uri, &headers, "POST", opt_request).await?;
-        if let Some(dest) = headers.get(hyper::header::LOCATION) {
-            use std::convert::TryFrom;
-            Ok(ResumableUpload::new(
-                hyper::Uri::try_from(dest.to_str()?)?,
-                &self.client,
-                5 * 1024 * 1024,
-            ))
-        } else {
-            Err(Error::from(ApiError::RedirectError(format!(
-                "Resumable upload response didn't contain Location: {:?}",
-                headers
-            )))
-            .context(format!("{:?}", headers)))?
-        }
-    }
-
-    /// Permanently deletes a file owned by the user without moving it to the trash. If the file belongs to a shared drive the user must be an organizer on the parent. If the target is a folder, all descendants owned by the user are also deleted.
-    pub async fn delete(&mut self, params: &FilesDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "files/{fileId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Permanently deletes all of the user's trashed files.
-    pub async fn empty_trash(&mut self, params: &FilesEmptyTrashParams) -> Result<()> {
-        let rel_path = format!("files/trash",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Exports a Google Doc to the requested MIME type and returns the exported content. Please note that the exported content is limited to 10MB.
-    ///
-    /// This method potentially downloads data. See documentation of `Download`.
-    pub async fn export<'a>(
-        &'a mut self,
-        params: &FilesExportParams,
-    ) -> Result<Download<'a, EmptyRequest, ()>> {
-        let rel_path = format!(
-            "files/{fileId}/export",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-
-        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
-    }
-
-    /// Generates a set of file IDs which can be provided in create or copy requests.
-    pub async fn generate_ids(&mut self, params: &FilesGenerateIdsParams) -> Result<GeneratedIds> {
-        let rel_path = format!("files/generateIds",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Gets a file's metadata or content by ID.
-    ///
-    /// This method potentially downloads data. See documentation of `Download`.
-    pub async fn get<'a>(
-        &'a mut self,
-        params: &FilesGetParams,
-    ) -> Result<Download<'a, EmptyRequest, File>> {
-        let rel_path = format!(
-            "files/{fileId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-
-        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
-    }
-
-    /// Lists or searches files.
-    pub async fn list(&mut self, params: &FilesListParams) -> Result<FileList> {
-        let rel_path = format!("files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates a file's metadata and/or content. This method supports patch semantics.
-    pub async fn update(&mut self, params: &FilesUpdateParams, req: &File) -> Result<File> {
-        let rel_path = format!(
-            "files/{fileId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveScripts.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-
-    /// Updates a file's metadata and/or content. This method supports patch semantics.
-    ///
-    /// This method is a variant of `update()`, taking data for upload. It performs a multipart upload.
-    pub async fn update_upload(
-        &mut self,
-        params: &FilesUpdateParams,
-        req: &File,
-        data: hyper::body::Bytes,
-    ) -> Result<File> {
-        let rel_path = format!(
-            "/upload/drive/v3/files/{fileId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveScripts.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=multipart{params}", params = params);
-
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-
-        do_upload_multipart(
-            &self.client,
-            &full_uri,
-            &headers,
-            "PATCH",
-            opt_request,
-            data,
-        )
-        .await
-    }
-
-    /// Updates a file's metadata and/or content. This method supports patch semantics.
-    ///
-    /// This method is a variant of `update()`, taking data for upload.
-    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
-    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
-    /// you choose for the upload.
-    pub async fn update_resumable_upload<'client>(
-        &'client mut self,
-        params: &FilesUpdateParams,
-        req: &File,
-    ) -> Result<ResumableUpload<'client, File>> {
-        let rel_path = format!(
-            "/resumable/upload/drive/v3/files/{fileId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveScripts.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=resumable{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
-            do_request_with_headers(&self.client, &full_uri, &headers, "PATCH", opt_request)
-                .await?;
-        if let Some(dest) = headers.get(hyper::header::LOCATION) {
-            use std::convert::TryFrom;
-            Ok(ResumableUpload::new(
-                hyper::Uri::try_from(dest.to_str()?)?,
-                &self.client,
-                5 * 1024 * 1024,
-            ))
-        } else {
-            Err(Error::from(ApiError::RedirectError(format!(
-                "Resumable upload response didn't contain Location: {:?}",
-                headers
-            )))
-            .context(format!("{:?}", headers)))?
-        }
-    }
-
-    /// Subscribes to changes to a file
-    ///
-    /// This method potentially downloads data. See documentation of `Download`.
-    pub async fn watch<'a>(
-        &'a mut self,
-        params: &FilesWatchParams,
-        req: &'a Channel,
-    ) -> Result<Download<'a, Channel, Channel>> {
-        let rel_path = format!(
-            "files/{fileId}/watch",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-
-        do_download(&self.client, &full_uri, headers, "POST".into(), opt_request).await
-    }
-}
-
-/// The Drive Permissions service represents the Permissions resource.
-pub struct PermissionsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl PermissionsService {
-    /// Create a new PermissionsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> PermissionsService {
-        PermissionsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a permission for a file or shared drive.
-    pub async fn create(
-        &mut self,
-        params: &PermissionsCreateParams,
-        req: &Permission,
-    ) -> Result<Permission> {
-        let rel_path = format!(
-            "files/{fileId}/permissions",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Deletes a permission.
-    pub async fn delete(&mut self, params: &PermissionsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "files/{fileId}/permissions/{permissionId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            permissionId = percent_encode(params.permission_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Gets a permission by ID.
-    pub async fn get(&mut self, params: &PermissionsGetParams) -> Result<Permission> {
-        let rel_path = format!(
-            "files/{fileId}/permissions/{permissionId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            permissionId = percent_encode(params.permission_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Lists a file's or shared drive's permissions.
-    pub async fn list(&mut self, params: &PermissionsListParams) -> Result<PermissionList> {
-        let rel_path = format!(
-            "files/{fileId}/permissions",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates a permission with patch semantics.
-    pub async fn update(
-        &mut self,
-        params: &PermissionsUpdateParams,
-        req: &Permission,
-    ) -> Result<Permission> {
-        let rel_path = format!(
-            "files/{fileId}/permissions/{permissionId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            permissionId = percent_encode(params.permission_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-}
-
-/// The Drive Replies service represents the Replies resource.
-pub struct RepliesService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl RepliesService {
-    /// Create a new RepliesService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> RepliesService {
-        RepliesService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a new reply to a comment.
-    pub async fn create(&mut self, params: &RepliesCreateParams, req: &Reply) -> Result<Reply> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}/replies",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Deletes a reply.
-    pub async fn delete(&mut self, params: &RepliesDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}/replies/{replyId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC),
-            replyId = percent_encode(params.reply_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Gets a reply by ID.
-    pub async fn get(&mut self, params: &RepliesGetParams) -> Result<Reply> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}/replies/{replyId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC),
-            replyId = percent_encode(params.reply_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Lists a comment's replies.
-    pub async fn list(&mut self, params: &RepliesListParams) -> Result<ReplyList> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}/replies",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates a reply with patch semantics.
-    pub async fn update(&mut self, params: &RepliesUpdateParams, req: &Reply) -> Result<Reply> {
-        let rel_path = format!(
-            "files/{fileId}/comments/{commentId}/replies/{replyId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC),
-            replyId = percent_encode(params.reply_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-}
-
-/// The Drive Revisions service represents the Revisions resource.
-pub struct RevisionsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl RevisionsService {
-    /// Create a new RevisionsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> RevisionsService {
-        RevisionsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Permanently deletes a file version. You can only delete revisions for files with binary content in Google Drive, like images or videos. Revisions for other files, like Google Docs or Sheets, and the last remaining file version can't be deleted.
-    pub async fn delete(&mut self, params: &RevisionsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "files/{fileId}/revisions/{revisionId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            revisionId = percent_encode(params.revision_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Gets a revision's metadata or content by ID.
-    ///
-    /// This method potentially downloads data. See documentation of `Download`.
-    pub async fn get<'a>(
-        &'a mut self,
-        params: &RevisionsGetParams,
-    ) -> Result<Download<'a, EmptyRequest, Revision>> {
-        let rel_path = format!(
-            "files/{fileId}/revisions/{revisionId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            revisionId = percent_encode(params.revision_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-
-        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
-    }
-
-    /// Lists a file's revisions.
-    pub async fn list(&mut self, params: &RevisionsListParams) -> Result<RevisionList> {
-        let rel_path = format!(
-            "files/{fileId}/revisions",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates a revision with patch semantics.
-    pub async fn update(
-        &mut self,
-        params: &RevisionsUpdateParams,
-        req: &Revision,
-    ) -> Result<Revision> {
-        let rel_path = format!(
-            "files/{fileId}/revisions/{revisionId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
-            revisionId = percent_encode(params.revision_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-}
-
-/// The Drive Teamdrives service represents the Teamdrives resource.
-pub struct TeamdrivesService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl TeamdrivesService {
-    /// Create a new TeamdrivesService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> TeamdrivesService {
-        TeamdrivesService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://www.googleapis.com/drive/v3/".into(),
-            root_url: "https://www.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Deprecated use drives.create instead.
-    pub async fn create(
-        &mut self,
-        params: &TeamdrivesCreateParams,
-        req: &TeamDrive,
-    ) -> Result<TeamDrive> {
-        let rel_path = format!("teamdrives",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Deprecated use drives.delete instead.
-    pub async fn delete(&mut self, params: &TeamdrivesDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "teamdrives/{teamDriveId}",
-            teamDriveId = percent_encode(params.team_drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Deprecated use drives.get instead.
-    pub async fn get(&mut self, params: &TeamdrivesGetParams) -> Result<TeamDrive> {
-        let rel_path = format!(
-            "teamdrives/{teamDriveId}",
-            teamDriveId = percent_encode(params.team_drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Deprecated use drives.list instead.
-    pub async fn list(&mut self, params: &TeamdrivesListParams) -> Result<TeamDriveList> {
-        let rel_path = format!("teamdrives",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Deprecated use drives.update instead
-    pub async fn update(
-        &mut self,
-        params: &TeamdrivesUpdateParams,
-        req: &TeamDrive,
-    ) -> Result<TeamDrive> {
-        let rel_path = format!(
-            "teamdrives/{teamDriveId}",
-            teamDriveId = percent_encode(params.team_drive_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.drive_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-}
--- a/drive_example/src/main.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,146 +0,0 @@
-//! List your Google Drive root folder, or upload a file there.
-//!
-//! When run with no arguments, a very detailed listing of all objects in your root folder is
-//! printed.
-//!
-//! When you specify a file name as command line argument, the given file is uploaded to your
-//! Google Drive.
-
-mod drive_v3_types;
-use drive_v3_types as drive;
-
-use env_logger;
-
-use async_google_apis_common as common;
-
-use std::path::Path;
-use std::rc::Rc;
-
-/// Create a new HTTPS client.
-fn https_client() -> common::TlsClient {
-    let conn = hyper_rustls::HttpsConnector::new();
-    let cl = hyper::Client::builder().build(conn);
-    cl
-}
-
-/// Upload a local file `f` to your drive.
-async fn upload_file(mut cl: drive::FilesService, f: &Path) -> anyhow::Result<()> {
-    let fname = f.file_name().unwrap().to_str().unwrap();
-
-    let mut general_params = drive::DriveParams::default();
-    general_params.fields = Some("*".to_string());
-
-    let mut params = drive::FilesCreateParams::default();
-    params.drive_params = Some(general_params.clone());
-    params.include_permissions_for_view = Some("published".to_string());
-    let mut file = drive::File::default();
-    file.name = Some(fname.to_string());
-
-    // Upload data using the upload version of create(). We obtain a `File` object.
-    //
-    let resumable = cl.create_resumable_upload(&params, &file).await?;
-
-    let tokiofile = tokio::fs::OpenOptions::new().read(true).open(f).await?;
-    let resp = resumable.upload_file(tokiofile).await?;
-
-    // If you used this method, no file content would be uploaded:
-    // let resp = cl.create(&params, &file).await?;
-    println!(
-        "Uploaded file: {} (id = {}) with metadata: \n {:?}",
-        resp.name.as_ref().unwrap(),
-        resp.id.as_ref().unwrap(),
-        resp
-    );
-
-    let file_id = resp.id.unwrap();
-
-    // Now get the file and check that it is correct.
-    //
-    let mut params = drive::FilesGetParams::default();
-    params.file_id = file_id.clone();
-    params.drive_params = Some(general_params.clone());
-    // This parameter will trigger the download.
-    params.drive_params.as_mut().unwrap().alt = Some("media".into());
-    let mut dest = vec![0 as u8; 128];
-
-    // Get file contents.
-    let get_file = cl.get(&params).await?.do_it_to_buf(&mut dest).await?;
-    println!("{:?}", get_file);
-
-    // get() returns a response type (Response(...)) if the server returned an application/json
-    // response, otherwise it will download to a Writer. If you don't supply a Writer and there is
-    // data to download, an error is returned (ApiError::DataAvailableError).
-    match get_file {
-        common::DownloadResult::Response(_) => {
-            // We want download! No metadata.
-            assert!(false);
-        }
-        common::DownloadResult::Downloaded => println!("Download success."),
-    }
-
-    // Get file metadata. We don't specify &alt=media, so no download will take place.
-    let mut params = drive::FilesGetParams::default();
-    params.file_id = file_id.clone();
-    let get_file = cl.get(&params).await?.do_it(None).await?;
-    println!("{:?}", get_file);
-
-    match get_file {
-        common::DownloadResult::Response(gf) => {
-            println!("Metadata success.");
-            assert!(gf.name == Some(fname.to_string()));
-        }
-        // We want metadata! No download.
-        common::DownloadResult::Downloaded => assert!(false),
-    }
-    Ok(())
-}
-
-#[tokio::main]
-async fn main() {
-    env_logger::init();
-
-    let https = https_client();
-    // Put your client secret in the working directory!
-    let sec = common::yup_oauth2::read_application_secret("client_secret.json")
-        .await
-        .expect("client secret couldn't be read.");
-    let auth = common::yup_oauth2::InstalledFlowAuthenticator::builder(
-        sec,
-        common::yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
-    )
-    .persist_tokens_to_disk("tokencache.json")
-    .hyper_client(https.clone())
-    .build()
-    .await
-    .expect("InstalledFlowAuthenticator failed to build");
-
-    let scopes = vec![drive::DriveScopes::Drive];
-    let mut cl = drive::FilesService::new(https, Rc::new(auth));
-    cl.set_scopes(&scopes);
-
-    let arg = std::env::args().skip(1).next();
-    if let Some(fp) = arg {
-        upload_file(cl, Path::new(&fp))
-            .await
-            .expect("Upload failed :(");
-    } else {
-        // By default, list root directory.
-        let mut general_params = drive::DriveParams::default();
-        general_params.fields = Some("*".to_string());
-        let mut p = drive::FilesListParams::default();
-        p.q = Some("'root' in parents and trashed = false".to_string());
-        p.drive_params = Some(general_params);
-
-        let resp = cl.list(&p).await.expect("listing your Drive failed!");
-
-        if let Some(files) = resp.files {
-            for f in files {
-                println!(
-                    "{} => {:?}",
-                    f.id.unwrap(),
-                    f.name.as_ref().unwrap_or(&"???".to_string()),
-                );
-            }
-        }
-    }
-}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/drive_example/Cargo.lock	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,1180 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
+name = "aho-corasick"
+version = "0.7.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b476ce7103678b0c6d3d395dbbae31d48ff910bd28be979ba5d48c6351131d0d"
+dependencies = [
+ "memchr",
+]
+
+[[package]]
+name = "anyhow"
+version = "1.0.33"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
+
+[[package]]
+name = "arrayref"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
+
+[[package]]
+name = "async-google-apis-common"
+version = "0.1.7"
+dependencies = [
+ "anyhow",
+ "chrono",
+ "futures",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "radix64",
+ "serde",
+ "serde_json",
+ "tokio",
+ "yup-oauth2",
+]
+
+[[package]]
+name = "atty"
+version = "0.2.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
+dependencies = [
+ "hermit-abi",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "autocfg"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
+
+[[package]]
+name = "base64"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
+
+[[package]]
+name = "base64"
+version = "0.12.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
+
+[[package]]
+name = "bitflags"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
+
+[[package]]
+name = "bumpalo"
+version = "3.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
+
+[[package]]
+name = "bytes"
+version = "0.5.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
+
+[[package]]
+name = "cc"
+version = "1.0.61"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
+
+[[package]]
+name = "cfg-if"
+version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
+
+[[package]]
+name = "chrono"
+version = "0.4.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
+dependencies = [
+ "libc",
+ "num-integer",
+ "num-traits",
+ "serde",
+ "time",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "core-foundation"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "core-foundation-sys"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
+
+[[package]]
+name = "ct-logs"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
+dependencies = [
+ "sct",
+]
+
+[[package]]
+name = "drive_example"
+version = "0.1.0"
+dependencies = [
+ "anyhow",
+ "async-google-apis-common",
+ "env_logger",
+ "hyper",
+ "hyper-rustls",
+ "serde",
+ "tokio",
+]
+
+[[package]]
+name = "env_logger"
+version = "0.8.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "54532e3223c5af90a6a757c90b5c5521564b07e5e7a958681bcd2afad421cdcd"
+dependencies = [
+ "atty",
+ "humantime",
+ "log",
+ "regex",
+ "termcolor",
+]
+
+[[package]]
+name = "fnv"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
+
+[[package]]
+name = "fuchsia-zircon"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
+dependencies = [
+ "bitflags",
+ "fuchsia-zircon-sys",
+]
+
+[[package]]
+name = "fuchsia-zircon-sys"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
+
+[[package]]
+name = "futures"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "95314d38584ffbfda215621d723e0a3906f032e03ae5551e650058dac83d4797"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-executor",
+ "futures-io",
+ "futures-sink",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-channel"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0448174b01148032eed37ac4aed28963aaaa8cfa93569a08e5b479bbc6c2c151"
+dependencies = [
+ "futures-core",
+ "futures-sink",
+]
+
+[[package]]
+name = "futures-core"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "18eaa56102984bed2c88ea39026cff3ce3b4c7f508ca970cedf2450ea10d4e46"
+
+[[package]]
+name = "futures-executor"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f5f8e0c9258abaea85e78ebdda17ef9666d390e987f006be6080dfe354b708cb"
+dependencies = [
+ "futures-core",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-io"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e1798854a4727ff944a7b12aa999f58ce7aa81db80d2dfaaf2ba06f065ddd2b"
+
+[[package]]
+name = "futures-macro"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e36fccf3fc58563b4a14d265027c627c3b665d7fed489427e88e7cc929559efe"
+dependencies = [
+ "proc-macro-hack",
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "futures-sink"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e3ca3f17d6e8804ae5d3df7a7d35b2b3a6fe89dac84b31872720fc3060a0b11"
+
+[[package]]
+name = "futures-task"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "96d502af37186c4fef99453df03e374683f8a1eec9dcc1e66b3b82dc8278ce3c"
+dependencies = [
+ "once_cell",
+]
+
+[[package]]
+name = "futures-util"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "abcb44342f62e6f3e8ac427b8aa815f724fd705dfad060b18ac7866c15bb8e34"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-io",
+ "futures-macro",
+ "futures-sink",
+ "futures-task",
+ "memchr",
+ "pin-project 1.0.1",
+ "pin-utils",
+ "proc-macro-hack",
+ "proc-macro-nested",
+ "slab",
+]
+
+[[package]]
+name = "h2"
+version = "0.2.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5e4728fd124914ad25e99e3d15a9361a879f6620f63cb56bbb08f95abb97a535"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "futures-sink",
+ "futures-util",
+ "http",
+ "indexmap",
+ "slab",
+ "tokio",
+ "tokio-util",
+ "tracing",
+ "tracing-futures",
+]
+
+[[package]]
+name = "hashbrown"
+version = "0.9.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
+
+[[package]]
+name = "hermit-abi"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "http"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
+dependencies = [
+ "bytes",
+ "fnv",
+ "itoa",
+]
+
+[[package]]
+name = "http-body"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
+dependencies = [
+ "bytes",
+ "http",
+]
+
+[[package]]
+name = "httparse"
+version = "1.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
+
+[[package]]
+name = "httpdate"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
+
+[[package]]
+name = "humantime"
+version = "2.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3c1ad908cc71012b7bea4d0c53ba96a8cba9962f048fa68d143376143d863b7a"
+
+[[package]]
+name = "hyper"
+version = "0.13.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
+dependencies = [
+ "bytes",
+ "futures-channel",
+ "futures-core",
+ "futures-util",
+ "h2",
+ "http",
+ "http-body",
+ "httparse",
+ "httpdate",
+ "itoa",
+ "pin-project 0.4.27",
+ "socket2",
+ "tokio",
+ "tower-service",
+ "tracing",
+ "want",
+]
+
+[[package]]
+name = "hyper-rustls"
+version = "0.20.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
+dependencies = [
+ "bytes",
+ "ct-logs",
+ "futures-util",
+ "hyper",
+ "log",
+ "rustls",
+ "rustls-native-certs",
+ "tokio",
+ "tokio-rustls",
+ "webpki",
+]
+
+[[package]]
+name = "idna"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
+dependencies = [
+ "matches",
+ "unicode-bidi",
+ "unicode-normalization",
+]
+
+[[package]]
+name = "indexmap"
+version = "1.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
+dependencies = [
+ "autocfg",
+ "hashbrown",
+]
+
+[[package]]
+name = "iovec"
+version = "0.1.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "itoa"
+version = "0.4.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
+
+[[package]]
+name = "js-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
+dependencies = [
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "kernel32-sys"
+version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "lazy_static"
+version = "1.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
+
+[[package]]
+name = "libc"
+version = "0.2.80"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d58d1b70b004888f764dfbf6a26a3b0342a1632d33968e4a179d8011c760614"
+
+[[package]]
+name = "log"
+version = "0.4.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
+dependencies = [
+ "cfg-if",
+]
+
+[[package]]
+name = "matches"
+version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
+
+[[package]]
+name = "memchr"
+version = "2.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
+
+[[package]]
+name = "mio"
+version = "0.6.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
+dependencies = [
+ "cfg-if",
+ "fuchsia-zircon",
+ "fuchsia-zircon-sys",
+ "iovec",
+ "kernel32-sys",
+ "libc",
+ "log",
+ "miow",
+ "net2",
+ "slab",
+ "winapi 0.2.8",
+]
+
+[[package]]
+name = "miow"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
+dependencies = [
+ "kernel32-sys",
+ "net2",
+ "winapi 0.2.8",
+ "ws2_32-sys",
+]
+
+[[package]]
+name = "net2"
+version = "0.2.35"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "num-integer"
+version = "0.1.43"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
+dependencies = [
+ "autocfg",
+ "num-traits",
+]
+
+[[package]]
+name = "num-traits"
+version = "0.2.12"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
+dependencies = [
+ "autocfg",
+]
+
+[[package]]
+name = "once_cell"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
+
+[[package]]
+name = "openssl-probe"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
+
+[[package]]
+name = "percent-encoding"
+version = "2.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
+
+[[package]]
+name = "pin-project"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
+dependencies = [
+ "pin-project-internal 0.4.27",
+]
+
+[[package]]
+name = "pin-project"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ee41d838744f60d959d7074e3afb6b35c7456d0f61cad38a24e35e6553f73841"
+dependencies = [
+ "pin-project-internal 1.0.1",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "81a4ffa594b66bff340084d4081df649a7dc049ac8d7fc458d8e628bfbbb2f86"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-lite"
+version = "0.1.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b"
+
+[[package]]
+name = "pin-utils"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
+
+[[package]]
+name = "proc-macro-hack"
+version = "0.5.18"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
+
+[[package]]
+name = "proc-macro-nested"
+version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
+
+[[package]]
+name = "proc-macro2"
+version = "1.0.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
+dependencies = [
+ "unicode-xid",
+]
+
+[[package]]
+name = "quote"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
+dependencies = [
+ "proc-macro2",
+]
+
+[[package]]
+name = "radix64"
+version = "0.6.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
+dependencies = [
+ "arrayref",
+ "cfg-if",
+]
+
+[[package]]
+name = "redox_syscall"
+version = "0.1.57"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
+
+[[package]]
+name = "regex"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8963b85b8ce3074fecffde43b4b0dded83ce2f367dc8d363afc56679f3ee820b"
+dependencies = [
+ "aho-corasick",
+ "memchr",
+ "regex-syntax",
+ "thread_local",
+]
+
+[[package]]
+name = "regex-syntax"
+version = "0.6.20"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8cab7a364d15cde1e505267766a2d3c4e22a843e1a601f0fa7564c0f82ced11c"
+
+[[package]]
+name = "ring"
+version = "0.16.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
+dependencies = [
+ "cc",
+ "libc",
+ "once_cell",
+ "spin",
+ "untrusted",
+ "web-sys",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "rustls"
+version = "0.17.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
+dependencies = [
+ "base64 0.11.0",
+ "log",
+ "ring",
+ "sct",
+ "webpki",
+]
+
+[[package]]
+name = "rustls-native-certs"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
+dependencies = [
+ "openssl-probe",
+ "rustls",
+ "schannel",
+ "security-framework",
+]
+
+[[package]]
+name = "ryu"
+version = "1.0.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
+
+[[package]]
+name = "schannel"
+version = "0.1.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
+dependencies = [
+ "lazy_static",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "sct"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "seahash"
+version = "4.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
+
+[[package]]
+name = "security-framework"
+version = "0.4.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
+dependencies = [
+ "bitflags",
+ "core-foundation",
+ "core-foundation-sys",
+ "libc",
+ "security-framework-sys",
+]
+
+[[package]]
+name = "security-framework-sys"
+version = "0.4.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "serde"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
+dependencies = [
+ "serde_derive",
+]
+
+[[package]]
+name = "serde_derive"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "serde_json"
+version = "1.0.59"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
+dependencies = [
+ "itoa",
+ "ryu",
+ "serde",
+]
+
+[[package]]
+name = "slab"
+version = "0.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
+
+[[package]]
+name = "socket2"
+version = "0.3.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "redox_syscall",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "spin"
+version = "0.5.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
+
+[[package]]
+name = "syn"
+version = "1.0.48"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cc371affeffc477f42a221a1e4297aedcea33d47d19b61455588bd9d8f6b19ac"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "unicode-xid",
+]
+
+[[package]]
+name = "termcolor"
+version = "1.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f"
+dependencies = [
+ "winapi-util",
+]
+
+[[package]]
+name = "thread_local"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "time"
+version = "0.1.44"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
+dependencies = [
+ "libc",
+ "wasi",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "tinyvec"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
+
+[[package]]
+name = "tokio"
+version = "0.2.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "iovec",
+ "lazy_static",
+ "memchr",
+ "mio",
+ "pin-project-lite",
+ "slab",
+ "tokio-macros",
+]
+
+[[package]]
+name = "tokio-macros"
+version = "0.2.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "tokio-rustls"
+version = "0.13.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
+dependencies = [
+ "futures-core",
+ "rustls",
+ "tokio",
+ "webpki",
+]
+
+[[package]]
+name = "tokio-util"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
+dependencies = [
+ "bytes",
+ "futures-core",
+ "futures-sink",
+ "log",
+ "pin-project-lite",
+ "tokio",
+]
+
+[[package]]
+name = "tower-service"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
+
+[[package]]
+name = "tracing"
+version = "0.1.21"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
+dependencies = [
+ "cfg-if",
+ "log",
+ "pin-project-lite",
+ "tracing-core",
+]
+
+[[package]]
+name = "tracing-core"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "tracing-futures"
+version = "0.2.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c"
+dependencies = [
+ "pin-project 0.4.27",
+ "tracing",
+]
+
+[[package]]
+name = "try-lock"
+version = "0.2.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
+
+[[package]]
+name = "unicode-bidi"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
+dependencies = [
+ "matches",
+]
+
+[[package]]
+name = "unicode-normalization"
+version = "0.1.13"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
+dependencies = [
+ "tinyvec",
+]
+
+[[package]]
+name = "unicode-xid"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
+
+[[package]]
+name = "untrusted"
+version = "0.7.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
+
+[[package]]
+name = "url"
+version = "2.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
+dependencies = [
+ "idna",
+ "matches",
+ "percent-encoding",
+]
+
+[[package]]
+name = "want"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
+dependencies = [
+ "log",
+ "try-lock",
+]
+
+[[package]]
+name = "wasi"
+version = "0.10.0+wasi-snapshot-preview1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
+
+[[package]]
+name = "wasm-bindgen"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
+dependencies = [
+ "cfg-if",
+ "wasm-bindgen-macro",
+]
+
+[[package]]
+name = "wasm-bindgen-backend"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
+dependencies = [
+ "bumpalo",
+ "lazy_static",
+ "log",
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-macro"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
+dependencies = [
+ "quote",
+ "wasm-bindgen-macro-support",
+]
+
+[[package]]
+name = "wasm-bindgen-macro-support"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-backend",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-shared"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
+
+[[package]]
+name = "web-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
+dependencies = [
+ "js-sys",
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "webpki"
+version = "0.21.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "winapi"
+version = "0.2.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
+
+[[package]]
+name = "winapi"
+version = "0.3.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
+dependencies = [
+ "winapi-i686-pc-windows-gnu",
+ "winapi-x86_64-pc-windows-gnu",
+]
+
+[[package]]
+name = "winapi-build"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
+
+[[package]]
+name = "winapi-i686-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
+
+[[package]]
+name = "winapi-util"
+version = "0.1.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
+dependencies = [
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "winapi-x86_64-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
+
+[[package]]
+name = "ws2_32-sys"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "yup-oauth2"
+version = "4.1.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "92ed435d48d4c834ee654443dd3330399f9656506d7477ec645df58e406a25db"
+dependencies = [
+ "base64 0.12.3",
+ "chrono",
+ "futures",
+ "http",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "rustls",
+ "seahash",
+ "serde",
+ "serde_json",
+ "tokio",
+ "url",
+]
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/drive_example/Cargo.toml	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,17 @@
+[package]
+name = "drive_example"
+version = "0.1.0"
+authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
+edition = "2018"
+
+# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
+
+[dependencies]
+async-google-apis-common = { path = "../async-google-apis-common/" }
+
+anyhow = "~1.0"
+serde = "~1.0"
+env_logger = "~0.8"
+hyper-rustls = "~0.20"
+hyper = "~0.13"
+tokio = { version = "~0.2", features = ["rt-core", "io-util", "macros", "fs"] }
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/drive_example/README.md	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,21 @@
+# `drive_example`
+
+List your Google Drive root directory, or upload a file.
+
+```shell
+$ cargo run
+# Lists all objects in your root folder of Drive.
+...
+$ cargo run -- ~/some_file.txt
+# Uploads the given file to your root folder, and prints the involved File
+# objects and the used request parameters.
+...
+```
+
+Please note that you need a client secret to run this binary. Download it from
+[Developer Console](https://console.developers.google.com) and place it into the
+file `client_secret.json` in your working directory so that `drive_example` can
+find it.
+
+Run with `RUST_LOG=debug` in order to see an accurate record of HTTP requests
+being sent and received.
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/drive_example/src/drive_v3_types.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,6278 @@
+#![allow(unused_variables, unused_mut, dead_code)]
+//! This file was generated by async-google-apis. (https://github.com/dermesser/async-google-apis)
+//!
+//! (c) 2020 Lewin Bormann <lbo@spheniscida.de>
+//!
+//! ## Getting started
+//!
+//! **Tip**: Take a look at those types ending in `...Service`. These represent API resources
+//! and contain methods to interact with an API. The remaining types are used by those methods
+//! and can be explored starting from a method you want to use.
+//!
+//! I'd be happy if you let me know about your use case of this code.
+//!
+//! THIS FILE HAS BEEN GENERATED -- SAVE ANY MODIFICATIONS BEFORE REPLACING.
+
+use async_google_apis_common::*;
+
+/// Scopes of this API. Convertible to their string representation with `AsRef`.
+#[derive(Debug, Clone, Copy)]
+pub enum DriveScopes {
+    /// See, edit, create, and delete all of your Google Drive files
+    ///
+    /// URL: https://www.googleapis.com/auth/drive
+    Drive,
+    /// View and manage its own configuration data in your Google Drive
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.appdata
+    DriveAppdata,
+    /// View and manage Google Drive files and folders that you have opened or created with this app
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.file
+    DriveFile,
+    /// View and manage metadata of files in your Google Drive
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.metadata
+    DriveMetadata,
+    /// View metadata for files in your Google Drive
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.metadata.readonly
+    DriveMetadataReadonly,
+    /// View the photos, videos and albums in your Google Photos
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.photos.readonly
+    DrivePhotosReadonly,
+    /// See and download all your Google Drive files
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.readonly
+    DriveReadonly,
+    /// Modify your Google Apps Script scripts' behavior
+    ///
+    /// URL: https://www.googleapis.com/auth/drive.scripts
+    DriveScripts,
+}
+
+impl std::convert::AsRef<str> for DriveScopes {
+    fn as_ref(&self) -> &'static str {
+        match self {
+            DriveScopes::Drive => "https://www.googleapis.com/auth/drive",
+            DriveScopes::DriveAppdata => "https://www.googleapis.com/auth/drive.appdata",
+            DriveScopes::DriveFile => "https://www.googleapis.com/auth/drive.file",
+            DriveScopes::DriveMetadata => "https://www.googleapis.com/auth/drive.metadata",
+            DriveScopes::DriveMetadataReadonly => {
+                "https://www.googleapis.com/auth/drive.metadata.readonly"
+            }
+            DriveScopes::DrivePhotosReadonly => {
+                "https://www.googleapis.com/auth/drive.photos.readonly"
+            }
+            DriveScopes::DriveReadonly => "https://www.googleapis.com/auth/drive.readonly",
+            DriveScopes::DriveScripts => "https://www.googleapis.com/auth/drive.scripts",
+        }
+    }
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct AboutDriveThemes {
+    /// A link to this theme's background image.
+    #[serde(rename = "backgroundImageLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub background_image_link: Option<String>,
+    /// The color of this theme as an RGB hex string.
+    #[serde(rename = "colorRgb")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub color_rgb: Option<String>,
+    /// The ID of the theme.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+}
+
+/// The user's storage quota limits and usage. All fields are measured in bytes.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct AboutStorageQuota {
+    /// i64: The usage limit, if applicable. This will not be present if the user has unlimited storage.
+    #[serde(rename = "limit")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub limit: Option<String>,
+    /// i64: The total usage across all services.
+    #[serde(rename = "usage")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub usage: Option<String>,
+    /// i64: The usage by all files in Google Drive.
+    #[serde(rename = "usageInDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub usage_in_drive: Option<String>,
+    /// i64: The usage by trashed files in Google Drive.
+    #[serde(rename = "usageInDriveTrash")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub usage_in_drive_trash: Option<String>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct AboutTeamDriveThemes {
+    /// Deprecated - use driveThemes/backgroundImageLink instead.
+    #[serde(rename = "backgroundImageLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub background_image_link: Option<String>,
+    /// Deprecated - use driveThemes/colorRgb instead.
+    #[serde(rename = "colorRgb")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub color_rgb: Option<String>,
+    /// Deprecated - use driveThemes/id instead.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+}
+
+/// Information about the user, the user's Drive, and system capabilities.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct About {
+    /// Whether the user has installed the requesting app.
+    #[serde(rename = "appInstalled")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub app_installed: Option<bool>,
+    /// Whether the user can create shared drives.
+    #[serde(rename = "canCreateDrives")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_create_drives: Option<bool>,
+    /// Deprecated - use canCreateDrives instead.
+    #[serde(rename = "canCreateTeamDrives")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_create_team_drives: Option<bool>,
+    /// A list of themes that are supported for shared drives.
+    #[serde(rename = "driveThemes")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub drive_themes: Option<Vec<AboutDriveThemes>>,
+    /// A map of source MIME type to possible targets for all supported exports.
+    #[serde(rename = "exportFormats")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub export_formats: Option<HashMap<String, Vec<String>>>,
+    /// The currently supported folder colors as RGB hex strings.
+    #[serde(rename = "folderColorPalette")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub folder_color_palette: Option<Vec<String>>,
+    /// A map of source MIME type to possible targets for all supported imports.
+    #[serde(rename = "importFormats")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub import_formats: Option<HashMap<String, Vec<String>>>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#about".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// A map of maximum import sizes by MIME type, in bytes.
+    #[serde(rename = "maxImportSizes")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub max_import_sizes: Option<HashMap<String, String>>,
+    /// i64: The maximum upload size in bytes.
+    #[serde(rename = "maxUploadSize")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub max_upload_size: Option<String>,
+    /// The user's storage quota limits and usage. All fields are measured in bytes.
+    #[serde(rename = "storageQuota")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub storage_quota: Option<AboutStorageQuota>,
+    /// Deprecated - use driveThemes instead.
+    #[serde(rename = "teamDriveThemes")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drive_themes: Option<Vec<AboutTeamDriveThemes>>,
+    #[serde(rename = "user")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub user: Option<User>,
+}
+
+/// A change to a file or shared drive.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Change {
+    /// The type of the change. Possible values are file and drive.
+    #[serde(rename = "changeType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub change_type: Option<String>,
+    #[serde(rename = "drive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub drive: Option<Drive>,
+    /// The ID of the shared drive associated with this change.
+    #[serde(rename = "driveId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub drive_id: Option<String>,
+    #[serde(rename = "file")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub file: Option<File>,
+    /// The ID of the file which has changed.
+    #[serde(rename = "fileId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub file_id: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#change".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Whether the file or shared drive has been removed from this list of changes, for example by deletion or loss of access.
+    #[serde(rename = "removed")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub removed: Option<bool>,
+    #[serde(rename = "teamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drive: Option<TeamDrive>,
+    /// Deprecated - use driveId instead.
+    #[serde(rename = "teamDriveId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drive_id: Option<String>,
+    /// DateTime: The time of this change (RFC 3339 date-time).
+    #[serde(rename = "time")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time: Option<DateTime<Utc>>,
+    /// Deprecated - use changeType instead.
+    #[serde(rename = "type")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub typ: Option<String>,
+}
+
+/// A list of changes for a user.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ChangeList {
+    /// The list of changes. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "changes")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub changes: Option<Vec<Change>>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#changeList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The starting page token for future changes. This will be present only if the end of the current changes list has been reached.
+    #[serde(rename = "newStartPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub new_start_page_token: Option<String>,
+    /// The page token for the next page of changes. This will be absent if the end of the changes list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+/// An notification channel used to watch for resource changes.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Channel {
+    /// The address where notifications are delivered for this channel.
+    #[serde(rename = "address")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub address: Option<String>,
+    /// i64: Date and time of notification channel expiration, expressed as a Unix timestamp, in milliseconds. Optional.
+    #[serde(rename = "expiration")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub expiration: Option<String>,
+    /// A UUID or similar unique string that identifies this channel.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies this as a notification channel used to watch for changes to a resource, which is "api#channel".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Additional parameters controlling delivery channel behavior. Optional.
+    #[serde(rename = "params")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub params: Option<HashMap<String, String>>,
+    /// A Boolean value to indicate whether payload is wanted. Optional.
+    #[serde(rename = "payload")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub payload: Option<bool>,
+    /// An opaque ID that identifies the resource being watched on this channel. Stable across different API versions.
+    #[serde(rename = "resourceId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resource_id: Option<String>,
+    /// A version-specific identifier for the watched resource.
+    #[serde(rename = "resourceUri")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resource_uri: Option<String>,
+    /// An arbitrary string delivered to the target address with each notification delivered over this channel. Optional.
+    #[serde(rename = "token")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub token: Option<String>,
+    /// The type of delivery mechanism used for this channel.
+    #[serde(rename = "type")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub typ: Option<String>,
+}
+
+/// The file content to which the comment refers, typically within the anchor region. For a text file, for example, this would be the text at the location of the comment.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentQuotedFileContent {
+    /// The MIME type of the quoted content.
+    #[serde(rename = "mimeType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub mime_type: Option<String>,
+    /// The quoted content itself. This is interpreted as plain text if set through the API.
+    #[serde(rename = "value")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub value: Option<String>,
+}
+
+/// A comment on a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Comment {
+    /// A region of the document represented as a JSON string. See anchor documentation for details on how to define and interpret anchor properties.
+    #[serde(rename = "anchor")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub anchor: Option<String>,
+    #[serde(rename = "author")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub author: Option<User>,
+    /// The plain text content of the comment. This field is used for setting the content, while htmlContent should be displayed.
+    #[serde(rename = "content")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content: Option<String>,
+    /// DateTime: The time at which the comment was created (RFC 3339 date-time).
+    #[serde(rename = "createdTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub created_time: Option<DateTime<Utc>>,
+    /// Whether the comment has been deleted. A deleted comment has no content.
+    #[serde(rename = "deleted")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub deleted: Option<bool>,
+    /// The content of the comment with HTML formatting.
+    #[serde(rename = "htmlContent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub html_content: Option<String>,
+    /// The ID of the comment.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#comment".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// DateTime: The last time the comment or any of its replies was modified (RFC 3339 date-time).
+    #[serde(rename = "modifiedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub modified_time: Option<DateTime<Utc>>,
+    /// The file content to which the comment refers, typically within the anchor region. For a text file, for example, this would be the text at the location of the comment.
+    #[serde(rename = "quotedFileContent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub quoted_file_content: Option<CommentQuotedFileContent>,
+    /// The full list of replies to the comment in chronological order.
+    #[serde(rename = "replies")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub replies: Option<Vec<Reply>>,
+    /// Whether the comment has been resolved by one of its replies.
+    #[serde(rename = "resolved")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resolved: Option<bool>,
+}
+
+/// A list of comments on a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentList {
+    /// The list of comments. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "comments")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub comments: Option<Vec<Comment>>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#commentList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of comments. This will be absent if the end of the comments list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+/// A restriction for accessing the content of the file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ContentRestriction {
+    /// Whether the content of the file is read-only. If a file is read-only, a new revision of the file may not be added, comments may not be added or modified, and the title of the file may not be modified.
+    #[serde(rename = "readOnly")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub read_only: Option<bool>,
+    /// Reason for why the content of the file is restricted. This is only mutable on requests that also set readOnly=true.
+    #[serde(rename = "reason")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub reason: Option<String>,
+    #[serde(rename = "restrictingUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub restricting_user: Option<User>,
+    /// DateTime: The time at which the content restriction was set (formatted RFC 3339 timestamp). Only populated if readOnly is true.
+    #[serde(rename = "restrictionTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub restriction_time: Option<DateTime<Utc>>,
+    /// The type of the content restriction. Currently the only possible value is globalContentRestriction.
+    #[serde(rename = "type")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub typ: Option<String>,
+}
+
+/// An image file and cropping parameters from which a background image for this shared drive is set. This is a write only field; it can only be set on drive.drives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DriveBackgroundImageFile {
+    /// The ID of an image file in Google Drive to use for the background image.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The width of the cropped image in the closed range of 0 to 1. This value represents the width of the cropped image divided by the width of the entire image. The height is computed by applying a width to height aspect ratio of 80 to 9. The resulting image must be at least 1280 pixels wide and 144 pixels high.
+    #[serde(rename = "width")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub width: Option<f32>,
+    /// The X coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the horizontal distance from the left side of the entire image to the left side of the cropping area divided by the width of the entire image.
+    #[serde(rename = "xCoordinate")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub x_coordinate: Option<f32>,
+    /// The Y coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the vertical distance from the top side of the entire image to the top side of the cropping area divided by the height of the entire image.
+    #[serde(rename = "yCoordinate")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub y_coordinate: Option<f32>,
+}
+
+/// Capabilities the current user has on this shared drive.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DriveCapabilities {
+    /// Whether the current user can add children to folders in this shared drive.
+    #[serde(rename = "canAddChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_add_children: Option<bool>,
+    /// Whether the current user can change the copyRequiresWriterPermission restriction of this shared drive.
+    #[serde(rename = "canChangeCopyRequiresWriterPermissionRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_copy_requires_writer_permission_restriction: Option<bool>,
+    /// Whether the current user can change the domainUsersOnly restriction of this shared drive.
+    #[serde(rename = "canChangeDomainUsersOnlyRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_domain_users_only_restriction: Option<bool>,
+    /// Whether the current user can change the background of this shared drive.
+    #[serde(rename = "canChangeDriveBackground")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_drive_background: Option<bool>,
+    /// Whether the current user can change the driveMembersOnly restriction of this shared drive.
+    #[serde(rename = "canChangeDriveMembersOnlyRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_drive_members_only_restriction: Option<bool>,
+    /// Whether the current user can comment on files in this shared drive.
+    #[serde(rename = "canComment")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_comment: Option<bool>,
+    /// Whether the current user can copy files in this shared drive.
+    #[serde(rename = "canCopy")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_copy: Option<bool>,
+    /// Whether the current user can delete children from folders in this shared drive.
+    #[serde(rename = "canDeleteChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_delete_children: Option<bool>,
+    /// Whether the current user can delete this shared drive. Attempting to delete the shared drive may still fail if there are untrashed items inside the shared drive.
+    #[serde(rename = "canDeleteDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_delete_drive: Option<bool>,
+    /// Whether the current user can download files in this shared drive.
+    #[serde(rename = "canDownload")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_download: Option<bool>,
+    /// Whether the current user can edit files in this shared drive
+    #[serde(rename = "canEdit")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_edit: Option<bool>,
+    /// Whether the current user can list the children of folders in this shared drive.
+    #[serde(rename = "canListChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_list_children: Option<bool>,
+    /// Whether the current user can add members to this shared drive or remove them or change their role.
+    #[serde(rename = "canManageMembers")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_manage_members: Option<bool>,
+    /// Whether the current user can read the revisions resource of files in this shared drive.
+    #[serde(rename = "canReadRevisions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_read_revisions: Option<bool>,
+    /// Whether the current user can rename files or folders in this shared drive.
+    #[serde(rename = "canRename")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_rename: Option<bool>,
+    /// Whether the current user can rename this shared drive.
+    #[serde(rename = "canRenameDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_rename_drive: Option<bool>,
+    /// Whether the current user can share files or folders in this shared drive.
+    #[serde(rename = "canShare")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_share: Option<bool>,
+    /// Whether the current user can trash children from folders in this shared drive.
+    #[serde(rename = "canTrashChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_trash_children: Option<bool>,
+}
+
+/// A set of restrictions that apply to this shared drive or items inside this shared drive.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DriveRestrictions {
+    /// Whether administrative privileges on this shared drive are required to modify restrictions.
+    #[serde(rename = "adminManagedRestrictions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub admin_managed_restrictions: Option<bool>,
+    /// Whether the options to copy, print, or download files inside this shared drive, should be disabled for readers and commenters. When this restriction is set to true, it will override the similarly named field to true for any file inside this shared drive.
+    #[serde(rename = "copyRequiresWriterPermission")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub copy_requires_writer_permission: Option<bool>,
+    /// Whether access to this shared drive and items inside this shared drive is restricted to users of the domain to which this shared drive belongs. This restriction may be overridden by other sharing policies controlled outside of this shared drive.
+    #[serde(rename = "domainUsersOnly")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub domain_users_only: Option<bool>,
+    /// Whether access to items inside this shared drive is restricted to its members.
+    #[serde(rename = "driveMembersOnly")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub drive_members_only: Option<bool>,
+}
+
+/// Representation of a shared drive.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Drive {
+    /// An image file and cropping parameters from which a background image for this shared drive is set. This is a write only field; it can only be set on drive.drives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
+    #[serde(rename = "backgroundImageFile")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub background_image_file: Option<DriveBackgroundImageFile>,
+    /// A short-lived link to this shared drive's background image.
+    #[serde(rename = "backgroundImageLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub background_image_link: Option<String>,
+    /// Capabilities the current user has on this shared drive.
+    #[serde(rename = "capabilities")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub capabilities: Option<DriveCapabilities>,
+    /// The color of this shared drive as an RGB hex string. It can only be set on a drive.drives.update request that does not set themeId.
+    #[serde(rename = "colorRgb")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub color_rgb: Option<String>,
+    /// DateTime: The time at which the shared drive was created (RFC 3339 date-time).
+    #[serde(rename = "createdTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub created_time: Option<DateTime<Utc>>,
+    /// Whether the shared drive is hidden from default view.
+    #[serde(rename = "hidden")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub hidden: Option<bool>,
+    /// The ID of this shared drive which is also the ID of the top level folder of this shared drive.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#drive".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The name of this shared drive.
+    #[serde(rename = "name")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub name: Option<String>,
+    /// A set of restrictions that apply to this shared drive or items inside this shared drive.
+    #[serde(rename = "restrictions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub restrictions: Option<DriveRestrictions>,
+    /// The ID of the theme from which the background image and color will be set. The set of possible driveThemes can be retrieved from a drive.about.get response. When not specified on a drive.drives.create request, a random theme is chosen from which the background image and color are set. This is a write-only field; it can only be set on requests that don't set colorRgb or backgroundImageFile.
+    #[serde(rename = "themeId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub theme_id: Option<String>,
+}
+
+/// A list of shared drives.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DriveList {
+    /// The list of shared drives. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "drives")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub drives: Option<Vec<Drive>>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#driveList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of shared drives. This will be absent if the end of the list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+/// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileCapabilities {
+    /// Whether the current user can add children to this folder. This is always false when the item is not a folder.
+    #[serde(rename = "canAddChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_add_children: Option<bool>,
+    /// Whether the current user can add a folder from another drive (different shared drive or My Drive) to this folder. This is false when the item is not a folder. Only populated for items in shared drives.
+    #[serde(rename = "canAddFolderFromAnotherDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_add_folder_from_another_drive: Option<bool>,
+    /// Whether the current user can add a parent for the item without removing an existing parent in the same request. Not populated for shared drive files.
+    #[serde(rename = "canAddMyDriveParent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_add_my_drive_parent: Option<bool>,
+    /// Whether the current user can change the copyRequiresWriterPermission restriction of this file.
+    #[serde(rename = "canChangeCopyRequiresWriterPermission")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_copy_requires_writer_permission: Option<bool>,
+    /// Deprecated
+    #[serde(rename = "canChangeViewersCanCopyContent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_viewers_can_copy_content: Option<bool>,
+    /// Whether the current user can comment on this file.
+    #[serde(rename = "canComment")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_comment: Option<bool>,
+    /// Whether the current user can copy this file. For an item in a shared drive, whether the current user can copy non-folder descendants of this item, or this item itself if it is not a folder.
+    #[serde(rename = "canCopy")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_copy: Option<bool>,
+    /// Whether the current user can delete this file.
+    #[serde(rename = "canDelete")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_delete: Option<bool>,
+    /// Whether the current user can delete children of this folder. This is false when the item is not a folder. Only populated for items in shared drives.
+    #[serde(rename = "canDeleteChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_delete_children: Option<bool>,
+    /// Whether the current user can download this file.
+    #[serde(rename = "canDownload")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_download: Option<bool>,
+    /// Whether the current user can edit this file. Other factors may limit the type of changes a user can make to a file. For example, see canChangeCopyRequiresWriterPermission or canModifyContent.
+    #[serde(rename = "canEdit")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_edit: Option<bool>,
+    /// Whether the current user can list the children of this folder. This is always false when the item is not a folder.
+    #[serde(rename = "canListChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_list_children: Option<bool>,
+    /// Whether the current user can modify the content of this file.
+    #[serde(rename = "canModifyContent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_modify_content: Option<bool>,
+    /// Whether the current user can modify restrictions on content of this file.
+    #[serde(rename = "canModifyContentRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_modify_content_restriction: Option<bool>,
+    /// Whether the current user can move children of this folder outside of the shared drive. This is false when the item is not a folder. Only populated for items in shared drives.
+    #[serde(rename = "canMoveChildrenOutOfDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_children_out_of_drive: Option<bool>,
+    /// Deprecated - use canMoveChildrenOutOfDrive instead.
+    #[serde(rename = "canMoveChildrenOutOfTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_children_out_of_team_drive: Option<bool>,
+    /// Whether the current user can move children of this folder within this drive. This is false when the item is not a folder. Note that a request to move the child may still fail depending on the current user's access to the child and to the destination folder.
+    #[serde(rename = "canMoveChildrenWithinDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_children_within_drive: Option<bool>,
+    /// Deprecated - use canMoveChildrenWithinDrive instead.
+    #[serde(rename = "canMoveChildrenWithinTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_children_within_team_drive: Option<bool>,
+    /// Deprecated - use canMoveItemOutOfDrive instead.
+    #[serde(rename = "canMoveItemIntoTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_item_into_team_drive: Option<bool>,
+    /// Whether the current user can move this item outside of this drive by changing its parent. Note that a request to change the parent of the item may still fail depending on the new parent that is being added.
+    #[serde(rename = "canMoveItemOutOfDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_item_out_of_drive: Option<bool>,
+    /// Deprecated - use canMoveItemOutOfDrive instead.
+    #[serde(rename = "canMoveItemOutOfTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_item_out_of_team_drive: Option<bool>,
+    /// Whether the current user can move this item within this drive. Note that a request to change the parent of the item may still fail depending on the new parent that is being added and the parent that is being removed.
+    #[serde(rename = "canMoveItemWithinDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_item_within_drive: Option<bool>,
+    /// Deprecated - use canMoveItemWithinDrive instead.
+    #[serde(rename = "canMoveItemWithinTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_item_within_team_drive: Option<bool>,
+    /// Deprecated - use canMoveItemWithinDrive or canMoveItemOutOfDrive instead.
+    #[serde(rename = "canMoveTeamDriveItem")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_move_team_drive_item: Option<bool>,
+    /// Whether the current user can read the shared drive to which this file belongs. Only populated for items in shared drives.
+    #[serde(rename = "canReadDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_read_drive: Option<bool>,
+    /// Whether the current user can read the revisions resource of this file. For a shared drive item, whether revisions of non-folder descendants of this item, or this item itself if it is not a folder, can be read.
+    #[serde(rename = "canReadRevisions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_read_revisions: Option<bool>,
+    /// Deprecated - use canReadDrive instead.
+    #[serde(rename = "canReadTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_read_team_drive: Option<bool>,
+    /// Whether the current user can remove children from this folder. This is always false when the item is not a folder. For a folder in a shared drive, use canDeleteChildren or canTrashChildren instead.
+    #[serde(rename = "canRemoveChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_remove_children: Option<bool>,
+    /// Whether the current user can remove a parent from the item without adding another parent in the same request. Not populated for shared drive files.
+    #[serde(rename = "canRemoveMyDriveParent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_remove_my_drive_parent: Option<bool>,
+    /// Whether the current user can rename this file.
+    #[serde(rename = "canRename")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_rename: Option<bool>,
+    /// Whether the current user can modify the sharing settings for this file.
+    #[serde(rename = "canShare")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_share: Option<bool>,
+    /// Whether the current user can move this file to trash.
+    #[serde(rename = "canTrash")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_trash: Option<bool>,
+    /// Whether the current user can trash children of this folder. This is false when the item is not a folder. Only populated for items in shared drives.
+    #[serde(rename = "canTrashChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_trash_children: Option<bool>,
+    /// Whether the current user can restore this file from trash.
+    #[serde(rename = "canUntrash")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_untrash: Option<bool>,
+}
+
+/// A thumbnail for the file. This will only be used if Google Drive cannot generate a standard thumbnail.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileContentHintsThumbnail {
+    /// The thumbnail data encoded with URL-safe Base64 (RFC 4648 section 5).
+    #[serde(rename = "image")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub image: Option<String>,
+    /// The MIME type of the thumbnail.
+    #[serde(rename = "mimeType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub mime_type: Option<String>,
+}
+
+/// Additional information about the content of the file. These fields are never populated in responses.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileContentHints {
+    /// Text to be indexed for the file to improve fullText queries. This is limited to 128KB in length and may contain HTML elements.
+    #[serde(rename = "indexableText")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub indexable_text: Option<String>,
+    /// A thumbnail for the file. This will only be used if Google Drive cannot generate a standard thumbnail.
+    #[serde(rename = "thumbnail")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub thumbnail: Option<FileContentHintsThumbnail>,
+}
+
+/// Geographic location information stored in the image.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileImageMediaMetadataLocation {
+    /// The altitude stored in the image.
+    #[serde(rename = "altitude")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub altitude: Option<f64>,
+    /// The latitude stored in the image.
+    #[serde(rename = "latitude")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub latitude: Option<f64>,
+    /// The longitude stored in the image.
+    #[serde(rename = "longitude")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub longitude: Option<f64>,
+}
+
+/// Additional metadata about image media, if available.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileImageMediaMetadata {
+    /// The aperture used to create the photo (f-number).
+    #[serde(rename = "aperture")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub aperture: Option<f32>,
+    /// The make of the camera used to create the photo.
+    #[serde(rename = "cameraMake")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub camera_make: Option<String>,
+    /// The model of the camera used to create the photo.
+    #[serde(rename = "cameraModel")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub camera_model: Option<String>,
+    /// The color space of the photo.
+    #[serde(rename = "colorSpace")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub color_space: Option<String>,
+    /// The exposure bias of the photo (APEX value).
+    #[serde(rename = "exposureBias")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub exposure_bias: Option<f32>,
+    /// The exposure mode used to create the photo.
+    #[serde(rename = "exposureMode")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub exposure_mode: Option<String>,
+    /// The length of the exposure, in seconds.
+    #[serde(rename = "exposureTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub exposure_time: Option<f32>,
+    /// Whether a flash was used to create the photo.
+    #[serde(rename = "flashUsed")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub flash_used: Option<bool>,
+    /// The focal length used to create the photo, in millimeters.
+    #[serde(rename = "focalLength")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub focal_length: Option<f32>,
+    /// The height of the image in pixels.
+    #[serde(rename = "height")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub height: Option<i32>,
+    /// The ISO speed used to create the photo.
+    #[serde(rename = "isoSpeed")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub iso_speed: Option<i32>,
+    /// The lens used to create the photo.
+    #[serde(rename = "lens")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub lens: Option<String>,
+    /// Geographic location information stored in the image.
+    #[serde(rename = "location")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub location: Option<FileImageMediaMetadataLocation>,
+    /// The smallest f-number of the lens at the focal length used to create the photo (APEX value).
+    #[serde(rename = "maxApertureValue")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub max_aperture_value: Option<f32>,
+    /// The metering mode used to create the photo.
+    #[serde(rename = "meteringMode")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub metering_mode: Option<String>,
+    /// The number of clockwise 90 degree rotations applied from the image's original orientation.
+    #[serde(rename = "rotation")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub rotation: Option<i32>,
+    /// The type of sensor used to create the photo.
+    #[serde(rename = "sensor")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub sensor: Option<String>,
+    /// The distance to the subject of the photo, in meters.
+    #[serde(rename = "subjectDistance")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub subject_distance: Option<i32>,
+    /// The date and time the photo was taken (EXIF DateTime).
+    #[serde(rename = "time")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time: Option<String>,
+    /// The white balance mode used to create the photo.
+    #[serde(rename = "whiteBalance")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub white_balance: Option<String>,
+    /// The width of the image in pixels.
+    #[serde(rename = "width")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub width: Option<i32>,
+}
+
+/// Shortcut file details. Only populated for shortcut files, which have the mimeType field set to application/vnd.google-apps.shortcut.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileShortcutDetails {
+    /// The ID of the file that this shortcut points to.
+    #[serde(rename = "targetId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub target_id: Option<String>,
+    /// The MIME type of the file that this shortcut points to. The value of this field is a snapshot of the target's MIME type, captured when the shortcut is created.
+    #[serde(rename = "targetMimeType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub target_mime_type: Option<String>,
+}
+
+/// Additional metadata about video media. This may not be available immediately upon upload.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileVideoMediaMetadata {
+    /// i64: The duration of the video in milliseconds.
+    #[serde(rename = "durationMillis")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub duration_millis: Option<String>,
+    /// The height of the video in pixels.
+    #[serde(rename = "height")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub height: Option<i32>,
+    /// The width of the video in pixels.
+    #[serde(rename = "width")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub width: Option<i32>,
+}
+
+/// The metadata for a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct File {
+    /// A collection of arbitrary key-value pairs which are private to the requesting app. Entries with null values are cleared in update and copy requests.
+    #[serde(rename = "appProperties")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub app_properties: Option<HashMap<String, String>>,
+    /// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
+    #[serde(rename = "capabilities")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub capabilities: Option<FileCapabilities>,
+    /// Additional information about the content of the file. These fields are never populated in responses.
+    #[serde(rename = "contentHints")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content_hints: Option<FileContentHints>,
+    /// Restrictions for accessing the content of the file. Only populated if such a restriction exists.
+    #[serde(rename = "contentRestrictions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content_restrictions: Option<Vec<ContentRestriction>>,
+    /// Whether the options to copy, print, or download this file, should be disabled for readers and commenters.
+    #[serde(rename = "copyRequiresWriterPermission")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub copy_requires_writer_permission: Option<bool>,
+    /// DateTime: The time at which the file was created (RFC 3339 date-time).
+    #[serde(rename = "createdTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub created_time: Option<DateTime<Utc>>,
+    /// A short description of the file.
+    #[serde(rename = "description")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub description: Option<String>,
+    /// ID of the shared drive the file resides in. Only populated for items in shared drives.
+    #[serde(rename = "driveId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub drive_id: Option<String>,
+    /// Whether the file has been explicitly trashed, as opposed to recursively trashed from a parent folder.
+    #[serde(rename = "explicitlyTrashed")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub explicitly_trashed: Option<bool>,
+    /// Links for exporting Google Docs to specific formats.
+    #[serde(rename = "exportLinks")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub export_links: Option<HashMap<String, String>>,
+    /// The final component of fullFileExtension. This is only available for files with binary content in Google Drive.
+    #[serde(rename = "fileExtension")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub file_extension: Option<String>,
+    /// The color for a folder as an RGB hex string. The supported colors are published in the folderColorPalette field of the About resource. If an unsupported color is specified, the closest color in the palette will be used instead.
+    #[serde(rename = "folderColorRgb")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub folder_color_rgb: Option<String>,
+    /// The full file extension extracted from the name field. May contain multiple concatenated extensions, such as "tar.gz". This is only available for files with binary content in Google Drive. This is automatically updated when the name field changes, however it is not cleared if the new name does not contain a valid extension.
+    #[serde(rename = "fullFileExtension")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub full_file_extension: Option<String>,
+    /// Whether there are permissions directly on this file. This field is only populated for items in shared drives.
+    #[serde(rename = "hasAugmentedPermissions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub has_augmented_permissions: Option<bool>,
+    /// Whether this file has a thumbnail. This does not indicate whether the requesting app has access to the thumbnail. To check access, look for the presence of the thumbnailLink field.
+    #[serde(rename = "hasThumbnail")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub has_thumbnail: Option<bool>,
+    /// The ID of the file's head revision. This is currently only available for files with binary content in Google Drive.
+    #[serde(rename = "headRevisionId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub head_revision_id: Option<String>,
+    /// A static, unauthenticated link to the file's icon.
+    #[serde(rename = "iconLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub icon_link: Option<String>,
+    /// The ID of the file.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Additional metadata about image media, if available.
+    #[serde(rename = "imageMediaMetadata")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub image_media_metadata: Option<FileImageMediaMetadata>,
+    /// Whether the file was created or opened by the requesting app.
+    #[serde(rename = "isAppAuthorized")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub is_app_authorized: Option<bool>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#file".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    #[serde(rename = "lastModifyingUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub last_modifying_user: Option<User>,
+    /// The MD5 checksum for the content of the file. This is only applicable to files with binary content in Google Drive.
+    #[serde(rename = "md5Checksum")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub md5_checksum: Option<String>,
+    /// The MIME type of the file. Google Drive will attempt to automatically detect an appropriate value from uploaded content if no value is provided. The value cannot be changed unless a new revision is uploaded. If a file is created with a Google Doc MIME type, the uploaded content will be imported if possible. The supported import formats are published in the About resource.
+    #[serde(rename = "mimeType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub mime_type: Option<String>,
+    /// Whether the file has been modified by this user.
+    #[serde(rename = "modifiedByMe")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub modified_by_me: Option<bool>,
+    /// DateTime: The last time the file was modified by the user (RFC 3339 date-time).
+    #[serde(rename = "modifiedByMeTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub modified_by_me_time: Option<DateTime<Utc>>,
+    /// DateTime: The last time the file was modified by anyone (RFC 3339 date-time). Note that setting modifiedTime will also update modifiedByMeTime for the user.
+    #[serde(rename = "modifiedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub modified_time: Option<DateTime<Utc>>,
+    /// The name of the file. This is not necessarily unique within a folder. Note that for immutable items such as the top level folders of shared drives, My Drive root folder, and Application Data folder the name is constant.
+    #[serde(rename = "name")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub name: Option<String>,
+    /// The original filename of the uploaded content if available, or else the original value of the name field. This is only available for files with binary content in Google Drive.
+    #[serde(rename = "originalFilename")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub original_filename: Option<String>,
+    /// Whether the user owns the file. Not populated for items in shared drives.
+    #[serde(rename = "ownedByMe")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub owned_by_me: Option<bool>,
+    /// The owners of the file. Currently, only certain legacy files may have more than one owner. Not populated for items in shared drives.
+    #[serde(rename = "owners")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub owners: Option<Vec<User>>,
+    /// The IDs of the parent folders which contain the file. If not specified as part of a create request, the file will be placed directly in the user's My Drive folder. If not specified as part of a copy request, the file will inherit any discoverable parents of the source file. Update requests must use the addParents and removeParents parameters to modify the parents list.
+    #[serde(rename = "parents")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub parents: Option<Vec<String>>,
+    /// List of permission IDs for users with access to this file.
+    #[serde(rename = "permissionIds")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permission_ids: Option<Vec<String>>,
+    /// The full list of permissions for the file. This is only available if the requesting user can share the file. Not populated for items in shared drives.
+    #[serde(rename = "permissions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permissions: Option<Vec<Permission>>,
+    /// A collection of arbitrary key-value pairs which are visible to all apps. Entries with null values are cleared in update and copy requests.
+    #[serde(rename = "properties")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub properties: Option<HashMap<String, String>>,
+    /// i64: The number of storage quota bytes used by the file. This includes the head revision as well as previous revisions with keepForever enabled.
+    #[serde(rename = "quotaBytesUsed")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub quota_bytes_used: Option<String>,
+    /// Whether the file has been shared. Not populated for items in shared drives.
+    #[serde(rename = "shared")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub shared: Option<bool>,
+    /// DateTime: The time at which the file was shared with the user, if applicable (RFC 3339 date-time).
+    #[serde(rename = "sharedWithMeTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub shared_with_me_time: Option<DateTime<Utc>>,
+    #[serde(rename = "sharingUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub sharing_user: Option<User>,
+    /// Shortcut file details. Only populated for shortcut files, which have the mimeType field set to application/vnd.google-apps.shortcut.
+    #[serde(rename = "shortcutDetails")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub shortcut_details: Option<FileShortcutDetails>,
+    /// i64: The size of the file's content in bytes. This is only applicable to files with binary content in Google Drive.
+    #[serde(rename = "size")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub size: Option<String>,
+    /// The list of spaces which contain the file. The currently supported values are 'drive', 'appDataFolder' and 'photos'.
+    #[serde(rename = "spaces")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub spaces: Option<Vec<String>>,
+    /// Whether the user has starred the file.
+    #[serde(rename = "starred")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub starred: Option<bool>,
+    /// Deprecated - use driveId instead.
+    #[serde(rename = "teamDriveId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drive_id: Option<String>,
+    /// A short-lived link to the file's thumbnail, if available. Typically lasts on the order of hours. Only populated when the requesting app can access the file's content. If the file isn't shared publicly, the URL returned in Files.thumbnailLink must be fetched using a credentialed request.
+    #[serde(rename = "thumbnailLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub thumbnail_link: Option<String>,
+    /// i64: The thumbnail version for use in thumbnail cache invalidation.
+    #[serde(rename = "thumbnailVersion")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub thumbnail_version: Option<String>,
+    /// Whether the file has been trashed, either explicitly or from a trashed parent folder. Only the owner may trash a file. The trashed item is excluded from all files.list responses returned for any user who does not own the file. However, all users with access to the file can see the trashed item metadata in an API response. All users with access can copy, download, export, and share the file.
+    #[serde(rename = "trashed")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub trashed: Option<bool>,
+    /// DateTime: The time that the item was trashed (RFC 3339 date-time). Only populated for items in shared drives.
+    #[serde(rename = "trashedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub trashed_time: Option<DateTime<Utc>>,
+    #[serde(rename = "trashingUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub trashing_user: Option<User>,
+    /// i64: A monotonically increasing version number for the file. This reflects every change made to the file on the server, even those not visible to the user.
+    #[serde(rename = "version")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub version: Option<String>,
+    /// Additional metadata about video media. This may not be available immediately upon upload.
+    #[serde(rename = "videoMediaMetadata")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub video_media_metadata: Option<FileVideoMediaMetadata>,
+    /// Whether the file has been viewed by this user.
+    #[serde(rename = "viewedByMe")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub viewed_by_me: Option<bool>,
+    /// DateTime: The last time the file was viewed by the user (RFC 3339 date-time).
+    #[serde(rename = "viewedByMeTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub viewed_by_me_time: Option<DateTime<Utc>>,
+    /// Deprecated - use copyRequiresWriterPermission instead.
+    #[serde(rename = "viewersCanCopyContent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub viewers_can_copy_content: Option<bool>,
+    /// A link for downloading the content of the file in a browser. This is only available for files with binary content in Google Drive.
+    #[serde(rename = "webContentLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub web_content_link: Option<String>,
+    /// A link for opening the file in a relevant Google editor or viewer in a browser.
+    #[serde(rename = "webViewLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub web_view_link: Option<String>,
+    /// Whether users with only writer permission can modify the file's permissions. Not populated for items in shared drives.
+    #[serde(rename = "writersCanShare")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub writers_can_share: Option<bool>,
+}
+
+/// A list of files.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileList {
+    /// The list of files. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "files")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub files: Option<Vec<File>>,
+    /// Whether the search process was incomplete. If true, then some search results may be missing, since all documents were not searched. This may occur when searching multiple drives with the "allDrives" corpora, but all corpora could not be searched. When this happens, it is suggested that clients narrow their query by choosing a different corpus such as "user" or "drive".
+    #[serde(rename = "incompleteSearch")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub incomplete_search: Option<bool>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#fileList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of files. This will be absent if the end of the files list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+/// A list of generated file IDs which can be provided in create requests.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct GeneratedIds {
+    /// The IDs generated for the requesting user in the specified space.
+    #[serde(rename = "ids")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub ids: Option<Vec<String>>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#generatedIds".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The type of file that can be created with these IDs.
+    #[serde(rename = "space")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub space: Option<String>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionPermissionDetails {
+    /// Whether this permission is inherited. This field is always populated. This is an output-only field.
+    #[serde(rename = "inherited")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub inherited: Option<bool>,
+    /// The ID of the item from which this permission is inherited. This is an output-only field.
+    #[serde(rename = "inheritedFrom")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub inherited_from: Option<String>,
+    /// The permission type for this user. While new values may be added in future, the following are currently possible:   - file  - member
+    #[serde(rename = "permissionType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permission_type: Option<String>,
+    /// The primary role for this user. While new values may be added in the future, the following are currently possible:   - organizer  - fileOrganizer  - writer  - commenter  - reader
+    #[serde(rename = "role")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub role: Option<String>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionTeamDrivePermissionDetails {
+    /// Deprecated - use permissionDetails/inherited instead.
+    #[serde(rename = "inherited")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub inherited: Option<bool>,
+    /// Deprecated - use permissionDetails/inheritedFrom instead.
+    #[serde(rename = "inheritedFrom")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub inherited_from: Option<String>,
+    /// Deprecated - use permissionDetails/role instead.
+    #[serde(rename = "role")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub role: Option<String>,
+    /// Deprecated - use permissionDetails/permissionType instead.
+    #[serde(rename = "teamDrivePermissionType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drive_permission_type: Option<String>,
+}
+
+/// A permission for a file. A permission grants a user, group, domain or the world access to a file or a folder hierarchy.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Permission {
+    /// Whether the permission allows the file to be discovered through search. This is only applicable for permissions of type domain or anyone.
+    #[serde(rename = "allowFileDiscovery")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub allow_file_discovery: Option<bool>,
+    /// Whether the account associated with this permission has been deleted. This field only pertains to user and group permissions.
+    #[serde(rename = "deleted")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub deleted: Option<bool>,
+    /// The "pretty" name of the value of the permission. The following is a list of examples for each type of permission:   - user - User's full name, as defined for their Google account, such as "Joe Smith."  - group - Name of the Google Group, such as "The Company Administrators."  - domain - String domain name, such as "thecompany.com."  - anyone - No displayName is present.
+    #[serde(rename = "displayName")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub display_name: Option<String>,
+    /// The domain to which this permission refers.
+    #[serde(rename = "domain")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub domain: Option<String>,
+    /// The email address of the user or group to which this permission refers.
+    #[serde(rename = "emailAddress")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub email_address: Option<String>,
+    /// DateTime: The time at which this permission will expire (RFC 3339 date-time). Expiration times have the following restrictions:   - They can only be set on user and group permissions  - The time must be in the future  - The time cannot be more than a year in the future
+    #[serde(rename = "expirationTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub expiration_time: Option<DateTime<Utc>>,
+    /// The ID of this permission. This is a unique identifier for the grantee, and is published in User resources as permissionId. IDs should be treated as opaque values.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#permission".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Details of whether the permissions on this shared drive item are inherited or directly on this item. This is an output-only field which is present only for shared drive items.
+    #[serde(rename = "permissionDetails")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permission_details: Option<Vec<PermissionPermissionDetails>>,
+    /// A link to the user's profile photo, if available.
+    #[serde(rename = "photoLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub photo_link: Option<String>,
+    /// The role granted by this permission. While new values may be supported in the future, the following are currently allowed:   - owner  - organizer  - fileOrganizer  - writer  - commenter  - reader
+    #[serde(rename = "role")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub role: Option<String>,
+    /// Deprecated - use permissionDetails instead.
+    #[serde(rename = "teamDrivePermissionDetails")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drive_permission_details: Option<Vec<PermissionTeamDrivePermissionDetails>>,
+    /// The type of the grantee. Valid values are:   - user  - group  - domain  - anyone  When creating a permission, if type is user or group, you must provide an emailAddress for the user or group. When type is domain, you must provide a domain. There isn't extra information required for a anyone type.
+    #[serde(rename = "type")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub typ: Option<String>,
+    /// Indicates the view for this permission. Only populated for permissions that belong to a view. published is the only supported value.
+    #[serde(rename = "view")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub view: Option<String>,
+}
+
+/// A list of permissions for a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionList {
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#permissionList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of permissions. This field will be absent if the end of the permissions list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+    /// The list of permissions. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "permissions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permissions: Option<Vec<Permission>>,
+}
+
+/// A reply to a comment on a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Reply {
+    /// The action the reply performed to the parent comment. Valid values are:   - resolve  - reopen
+    #[serde(rename = "action")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub action: Option<String>,
+    #[serde(rename = "author")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub author: Option<User>,
+    /// The plain text content of the reply. This field is used for setting the content, while htmlContent should be displayed. This is required on creates if no action is specified.
+    #[serde(rename = "content")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content: Option<String>,
+    /// DateTime: The time at which the reply was created (RFC 3339 date-time).
+    #[serde(rename = "createdTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub created_time: Option<DateTime<Utc>>,
+    /// Whether the reply has been deleted. A deleted reply has no content.
+    #[serde(rename = "deleted")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub deleted: Option<bool>,
+    /// The content of the reply with HTML formatting.
+    #[serde(rename = "htmlContent")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub html_content: Option<String>,
+    /// The ID of the reply.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#reply".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// DateTime: The last time the reply was modified (RFC 3339 date-time).
+    #[serde(rename = "modifiedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub modified_time: Option<DateTime<Utc>>,
+}
+
+/// A list of replies to a comment on a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ReplyList {
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#replyList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of replies. This will be absent if the end of the replies list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+    /// The list of replies. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "replies")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub replies: Option<Vec<Reply>>,
+}
+
+/// The metadata for a revision to a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Revision {
+    /// Links for exporting Google Docs to specific formats.
+    #[serde(rename = "exportLinks")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub export_links: Option<HashMap<String, String>>,
+    /// The ID of the revision.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Whether to keep this revision forever, even if it is no longer the head revision. If not set, the revision will be automatically purged 30 days after newer content is uploaded. This can be set on a maximum of 200 revisions for a file. This field is only applicable to files with binary content in Drive.
+    #[serde(rename = "keepForever")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub keep_forever: Option<bool>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#revision".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    #[serde(rename = "lastModifyingUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub last_modifying_user: Option<User>,
+    /// The MD5 checksum of the revision's content. This is only applicable to files with binary content in Drive.
+    #[serde(rename = "md5Checksum")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub md5_checksum: Option<String>,
+    /// The MIME type of the revision.
+    #[serde(rename = "mimeType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub mime_type: Option<String>,
+    /// DateTime: The last time the revision was modified (RFC 3339 date-time).
+    #[serde(rename = "modifiedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub modified_time: Option<DateTime<Utc>>,
+    /// The original filename used to create this revision. This is only applicable to files with binary content in Drive.
+    #[serde(rename = "originalFilename")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub original_filename: Option<String>,
+    /// Whether subsequent revisions will be automatically republished. This is only applicable to Google Docs.
+    #[serde(rename = "publishAuto")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub publish_auto: Option<bool>,
+    /// Whether this revision is published. This is only applicable to Google Docs.
+    #[serde(rename = "published")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub published: Option<bool>,
+    /// A link to the published revision. This is only populated for Google Sites files.
+    #[serde(rename = "publishedLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub published_link: Option<String>,
+    /// Whether this revision is published outside the domain. This is only applicable to Google Docs.
+    #[serde(rename = "publishedOutsideDomain")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub published_outside_domain: Option<bool>,
+    /// i64: The size of the revision's content in bytes. This is only applicable to files with binary content in Drive.
+    #[serde(rename = "size")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub size: Option<String>,
+}
+
+/// A list of revisions of a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RevisionList {
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#revisionList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of revisions. This will be absent if the end of the revisions list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+    /// The list of revisions. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "revisions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub revisions: Option<Vec<Revision>>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct StartPageToken {
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#startPageToken".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The starting page token for listing changes.
+    #[serde(rename = "startPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub start_page_token: Option<String>,
+}
+
+/// An image file and cropping parameters from which a background image for this Team Drive is set. This is a write only field; it can only be set on drive.teamdrives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamDriveBackgroundImageFile {
+    /// The ID of an image file in Drive to use for the background image.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The width of the cropped image in the closed range of 0 to 1. This value represents the width of the cropped image divided by the width of the entire image. The height is computed by applying a width to height aspect ratio of 80 to 9. The resulting image must be at least 1280 pixels wide and 144 pixels high.
+    #[serde(rename = "width")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub width: Option<f32>,
+    /// The X coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the horizontal distance from the left side of the entire image to the left side of the cropping area divided by the width of the entire image.
+    #[serde(rename = "xCoordinate")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub x_coordinate: Option<f32>,
+    /// The Y coordinate of the upper left corner of the cropping area in the background image. This is a value in the closed range of 0 to 1. This value represents the vertical distance from the top side of the entire image to the top side of the cropping area divided by the height of the entire image.
+    #[serde(rename = "yCoordinate")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub y_coordinate: Option<f32>,
+}
+
+/// Capabilities the current user has on this Team Drive.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamDriveCapabilities {
+    /// Whether the current user can add children to folders in this Team Drive.
+    #[serde(rename = "canAddChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_add_children: Option<bool>,
+    /// Whether the current user can change the copyRequiresWriterPermission restriction of this Team Drive.
+    #[serde(rename = "canChangeCopyRequiresWriterPermissionRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_copy_requires_writer_permission_restriction: Option<bool>,
+    /// Whether the current user can change the domainUsersOnly restriction of this Team Drive.
+    #[serde(rename = "canChangeDomainUsersOnlyRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_domain_users_only_restriction: Option<bool>,
+    /// Whether the current user can change the background of this Team Drive.
+    #[serde(rename = "canChangeTeamDriveBackground")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_team_drive_background: Option<bool>,
+    /// Whether the current user can change the teamMembersOnly restriction of this Team Drive.
+    #[serde(rename = "canChangeTeamMembersOnlyRestriction")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_change_team_members_only_restriction: Option<bool>,
+    /// Whether the current user can comment on files in this Team Drive.
+    #[serde(rename = "canComment")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_comment: Option<bool>,
+    /// Whether the current user can copy files in this Team Drive.
+    #[serde(rename = "canCopy")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_copy: Option<bool>,
+    /// Whether the current user can delete children from folders in this Team Drive.
+    #[serde(rename = "canDeleteChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_delete_children: Option<bool>,
+    /// Whether the current user can delete this Team Drive. Attempting to delete the Team Drive may still fail if there are untrashed items inside the Team Drive.
+    #[serde(rename = "canDeleteTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_delete_team_drive: Option<bool>,
+    /// Whether the current user can download files in this Team Drive.
+    #[serde(rename = "canDownload")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_download: Option<bool>,
+    /// Whether the current user can edit files in this Team Drive
+    #[serde(rename = "canEdit")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_edit: Option<bool>,
+    /// Whether the current user can list the children of folders in this Team Drive.
+    #[serde(rename = "canListChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_list_children: Option<bool>,
+    /// Whether the current user can add members to this Team Drive or remove them or change their role.
+    #[serde(rename = "canManageMembers")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_manage_members: Option<bool>,
+    /// Whether the current user can read the revisions resource of files in this Team Drive.
+    #[serde(rename = "canReadRevisions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_read_revisions: Option<bool>,
+    /// Deprecated - use canDeleteChildren or canTrashChildren instead.
+    #[serde(rename = "canRemoveChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_remove_children: Option<bool>,
+    /// Whether the current user can rename files or folders in this Team Drive.
+    #[serde(rename = "canRename")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_rename: Option<bool>,
+    /// Whether the current user can rename this Team Drive.
+    #[serde(rename = "canRenameTeamDrive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_rename_team_drive: Option<bool>,
+    /// Whether the current user can share files or folders in this Team Drive.
+    #[serde(rename = "canShare")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_share: Option<bool>,
+    /// Whether the current user can trash children from folders in this Team Drive.
+    #[serde(rename = "canTrashChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_trash_children: Option<bool>,
+}
+
+/// A set of restrictions that apply to this Team Drive or items inside this Team Drive.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamDriveRestrictions {
+    /// Whether administrative privileges on this Team Drive are required to modify restrictions.
+    #[serde(rename = "adminManagedRestrictions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub admin_managed_restrictions: Option<bool>,
+    /// Whether the options to copy, print, or download files inside this Team Drive, should be disabled for readers and commenters. When this restriction is set to true, it will override the similarly named field to true for any file inside this Team Drive.
+    #[serde(rename = "copyRequiresWriterPermission")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub copy_requires_writer_permission: Option<bool>,
+    /// Whether access to this Team Drive and items inside this Team Drive is restricted to users of the domain to which this Team Drive belongs. This restriction may be overridden by other sharing policies controlled outside of this Team Drive.
+    #[serde(rename = "domainUsersOnly")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub domain_users_only: Option<bool>,
+    /// Whether access to items inside this Team Drive is restricted to members of this Team Drive.
+    #[serde(rename = "teamMembersOnly")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_members_only: Option<bool>,
+}
+
+/// Deprecated: use the drive collection instead.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamDrive {
+    /// An image file and cropping parameters from which a background image for this Team Drive is set. This is a write only field; it can only be set on drive.teamdrives.update requests that don't set themeId. When specified, all fields of the backgroundImageFile must be set.
+    #[serde(rename = "backgroundImageFile")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub background_image_file: Option<TeamDriveBackgroundImageFile>,
+    /// A short-lived link to this Team Drive's background image.
+    #[serde(rename = "backgroundImageLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub background_image_link: Option<String>,
+    /// Capabilities the current user has on this Team Drive.
+    #[serde(rename = "capabilities")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub capabilities: Option<TeamDriveCapabilities>,
+    /// The color of this Team Drive as an RGB hex string. It can only be set on a drive.teamdrives.update request that does not set themeId.
+    #[serde(rename = "colorRgb")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub color_rgb: Option<String>,
+    /// DateTime: The time at which the Team Drive was created (RFC 3339 date-time).
+    #[serde(rename = "createdTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub created_time: Option<DateTime<Utc>>,
+    /// The ID of this Team Drive which is also the ID of the top level folder of this Team Drive.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#teamDrive".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The name of this Team Drive.
+    #[serde(rename = "name")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub name: Option<String>,
+    /// A set of restrictions that apply to this Team Drive or items inside this Team Drive.
+    #[serde(rename = "restrictions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub restrictions: Option<TeamDriveRestrictions>,
+    /// The ID of the theme from which the background image and color will be set. The set of possible teamDriveThemes can be retrieved from a drive.about.get response. When not specified on a drive.teamdrives.create request, a random theme is chosen from which the background image and color are set. This is a write-only field; it can only be set on requests that don't set colorRgb or backgroundImageFile.
+    #[serde(rename = "themeId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub theme_id: Option<String>,
+}
+
+/// A list of Team Drives.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamDriveList {
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#teamDriveList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of Team Drives. This will be absent if the end of the Team Drives list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+    /// The list of Team Drives. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "teamDrives")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team_drives: Option<Vec<TeamDrive>>,
+}
+
+/// Information about a Drive user.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct User {
+    /// A plain text displayable name for this user.
+    #[serde(rename = "displayName")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub display_name: Option<String>,
+    /// The email address of the user. This may not be present in certain contexts if the user has not made their email address visible to the requester.
+    #[serde(rename = "emailAddress")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub email_address: Option<String>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#user".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Whether this user is the requesting user.
+    #[serde(rename = "me")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub me: Option<bool>,
+    /// The user's ID as visible in Permission resources.
+    #[serde(rename = "permissionId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permission_id: Option<String>,
+    /// A link to the user's profile photo, if available.
+    #[serde(rename = "photoLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub photo_link: Option<String>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DriveParams {
+    /// Data format for the response.
+    #[serde(rename = "alt")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub alt: Option<String>,
+    /// Selector specifying which fields to include in a partial response.
+    #[serde(rename = "fields")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub fields: Option<String>,
+    /// API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
+    #[serde(rename = "key")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub key: Option<String>,
+    /// OAuth 2.0 token for the current user.
+    #[serde(rename = "oauth_token")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub oauth_token: Option<String>,
+    /// Returns response with indentations and line breaks.
+    #[serde(rename = "prettyPrint")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub pretty_print: Option<bool>,
+    /// An opaque string that represents a user for quota purposes. Must not exceed 40 characters.
+    #[serde(rename = "quotaUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub quota_user: Option<String>,
+    /// Deprecated. Please use quotaUser instead.
+    #[serde(rename = "userIp")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub user_ip: Option<String>,
+}
+
+/// Parameters for the `about.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct AboutGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+}
+
+impl std::fmt::Display for AboutGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `changes.getStartPageToken` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ChangesGetStartPageTokenParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the shared drive for which the starting pageToken for listing future changes from that shared drive is returned.
+    #[serde(rename = "driveId")]
+    pub drive_id: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Deprecated use driveId instead.
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: Option<String>,
+}
+
+impl std::fmt::Display for ChangesGetStartPageTokenParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.drive_id {
+            write!(
+                f,
+                "&driveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.team_drive_id {
+            write!(
+                f,
+                "&teamDriveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `changes.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ChangesListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The shared drive from which changes are returned. If specified the change IDs will be reflective of the shared drive; use the combined drive ID and change ID as an identifier.
+    #[serde(rename = "driveId")]
+    pub drive_id: Option<String>,
+    /// Whether changes should include the file resource if the file is still accessible by the user at the time of the request, even when a file was removed from the list of changes and there will be no further change entries for this file.
+    #[serde(rename = "includeCorpusRemovals")]
+    pub include_corpus_removals: Option<bool>,
+    /// Whether both My Drive and shared drive items should be included in results.
+    #[serde(rename = "includeItemsFromAllDrives")]
+    pub include_items_from_all_drives: Option<bool>,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether to include changes indicating that items have been removed from the list of changes, for example by deletion or loss of access.
+    #[serde(rename = "includeRemoved")]
+    pub include_removed: Option<bool>,
+    /// Deprecated use includeItemsFromAllDrives instead.
+    #[serde(rename = "includeTeamDriveItems")]
+    pub include_team_drive_items: Option<bool>,
+    /// The maximum number of changes to return per page.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response or to the response from the getStartPageToken method.
+    #[serde(rename = "pageToken")]
+    pub page_token: String,
+    /// Whether to restrict the results to changes inside the My Drive hierarchy. This omits changes to files such as those in the Application Data folder or shared files which have not been added to My Drive.
+    #[serde(rename = "restrictToMyDrive")]
+    pub restrict_to_my_drive: Option<bool>,
+    /// A comma-separated list of spaces to query within the user corpus. Supported values are 'drive', 'appDataFolder' and 'photos'.
+    #[serde(rename = "spaces")]
+    pub spaces: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Deprecated use driveId instead.
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: Option<String>,
+}
+
+impl std::fmt::Display for ChangesListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&pageToken={}",
+            percent_encode(format!("{}", self.page_token).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        if let Some(ref v) = self.drive_id {
+            write!(
+                f,
+                "&driveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_corpus_removals {
+            write!(
+                f,
+                "&includeCorpusRemovals={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_items_from_all_drives {
+            write!(
+                f,
+                "&includeItemsFromAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_removed {
+            write!(
+                f,
+                "&includeRemoved={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_team_drive_items {
+            write!(
+                f,
+                "&includeTeamDriveItems={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.restrict_to_my_drive {
+            write!(
+                f,
+                "&restrictToMyDrive={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.spaces {
+            write!(
+                f,
+                "&spaces={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.team_drive_id {
+            write!(
+                f,
+                "&teamDriveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `changes.watch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ChangesWatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The shared drive from which changes are returned. If specified the change IDs will be reflective of the shared drive; use the combined drive ID and change ID as an identifier.
+    #[serde(rename = "driveId")]
+    pub drive_id: Option<String>,
+    /// Whether changes should include the file resource if the file is still accessible by the user at the time of the request, even when a file was removed from the list of changes and there will be no further change entries for this file.
+    #[serde(rename = "includeCorpusRemovals")]
+    pub include_corpus_removals: Option<bool>,
+    /// Whether both My Drive and shared drive items should be included in results.
+    #[serde(rename = "includeItemsFromAllDrives")]
+    pub include_items_from_all_drives: Option<bool>,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether to include changes indicating that items have been removed from the list of changes, for example by deletion or loss of access.
+    #[serde(rename = "includeRemoved")]
+    pub include_removed: Option<bool>,
+    /// Deprecated use includeItemsFromAllDrives instead.
+    #[serde(rename = "includeTeamDriveItems")]
+    pub include_team_drive_items: Option<bool>,
+    /// The maximum number of changes to return per page.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response or to the response from the getStartPageToken method.
+    #[serde(rename = "pageToken")]
+    pub page_token: String,
+    /// Whether to restrict the results to changes inside the My Drive hierarchy. This omits changes to files such as those in the Application Data folder or shared files which have not been added to My Drive.
+    #[serde(rename = "restrictToMyDrive")]
+    pub restrict_to_my_drive: Option<bool>,
+    /// A comma-separated list of spaces to query within the user corpus. Supported values are 'drive', 'appDataFolder' and 'photos'.
+    #[serde(rename = "spaces")]
+    pub spaces: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Deprecated use driveId instead.
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: Option<String>,
+}
+
+impl std::fmt::Display for ChangesWatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&pageToken={}",
+            percent_encode(format!("{}", self.page_token).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        if let Some(ref v) = self.drive_id {
+            write!(
+                f,
+                "&driveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_corpus_removals {
+            write!(
+                f,
+                "&includeCorpusRemovals={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_items_from_all_drives {
+            write!(
+                f,
+                "&includeItemsFromAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_removed {
+            write!(
+                f,
+                "&includeRemoved={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_team_drive_items {
+            write!(
+                f,
+                "&includeTeamDriveItems={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.restrict_to_my_drive {
+            write!(
+                f,
+                "&restrictToMyDrive={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.spaces {
+            write!(
+                f,
+                "&spaces={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.team_drive_id {
+            write!(
+                f,
+                "&teamDriveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `channels.stop` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ChannelsStopParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+}
+
+impl std::fmt::Display for ChannelsStopParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `comments.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentsCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+}
+
+impl std::fmt::Display for CommentsCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `comments.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+}
+
+impl std::fmt::Display for CommentsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `comments.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether to return deleted comments. Deleted comments will not include their original content.
+    #[serde(rename = "includeDeleted")]
+    pub include_deleted: Option<bool>,
+}
+
+impl std::fmt::Display for CommentsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.include_deleted {
+            write!(
+                f,
+                "&includeDeleted={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `comments.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether to include deleted comments. Deleted comments will not include their original content.
+    #[serde(rename = "includeDeleted")]
+    pub include_deleted: Option<bool>,
+    /// The maximum number of comments to return per page.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// The minimum value of 'modifiedTime' for the result comments (RFC 3339 date-time).
+    #[serde(rename = "startModifiedTime")]
+    pub start_modified_time: Option<String>,
+}
+
+impl std::fmt::Display for CommentsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.include_deleted {
+            write!(
+                f,
+                "&includeDeleted={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.start_modified_time {
+            write!(
+                f,
+                "&startModifiedTime={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `comments.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct CommentsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+}
+
+impl std::fmt::Display for CommentsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// An ID, such as a random UUID, which uniquely identifies this user's request for idempotent creation of a shared drive. A repeated request by the same user and with the same request ID will avoid creating duplicates by attempting to create the same shared drive. If the shared drive already exists a 409 error will be returned.
+    #[serde(rename = "requestId")]
+    pub request_id: String,
+}
+
+impl std::fmt::Display for DrivesCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&requestId={}",
+            percent_encode(format!("{}", self.request_id).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the shared drive.
+    #[serde(rename = "driveId")]
+    pub drive_id: String,
+}
+
+impl std::fmt::Display for DrivesDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the shared drive.
+    #[serde(rename = "driveId")]
+    pub drive_id: String,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for DrivesGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.hide` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesHideParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the shared drive.
+    #[serde(rename = "driveId")]
+    pub drive_id: String,
+}
+
+impl std::fmt::Display for DrivesHideParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Maximum number of shared drives to return.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// Page token for shared drives.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Query string for searching shared drives.
+    #[serde(rename = "q")]
+    pub q: Option<String>,
+    /// Issue the request as a domain administrator; if set to true, then all shared drives of the domain in which the requester is an administrator are returned.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for DrivesListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.q {
+            write!(
+                f,
+                "&q={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.unhide` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesUnhideParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the shared drive.
+    #[serde(rename = "driveId")]
+    pub drive_id: String,
+}
+
+impl std::fmt::Display for DrivesUnhideParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `drives.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DrivesUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the shared drive.
+    #[serde(rename = "driveId")]
+    pub drive_id: String,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for DrivesUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.copy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesCopyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. Requests that specify more than one parent fail.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether to ignore the domain's default visibility settings for the created file. Domain administrators can choose to make all uploaded files visible to the domain by default; this parameter bypasses that behavior for the request. Permissions are still inherited from parent folders.
+    #[serde(rename = "ignoreDefaultVisibility")]
+    pub ignore_default_visibility: Option<bool>,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether to set the 'keepForever' field in the new head revision. This is only applicable to files with binary content in Google Drive. Only 200 revisions for the file can be kept forever. If the limit is reached, try deleting pinned revisions.
+    #[serde(rename = "keepRevisionForever")]
+    pub keep_revision_forever: Option<bool>,
+    /// A language hint for OCR processing during image import (ISO 639-1 code).
+    #[serde(rename = "ocrLanguage")]
+    pub ocr_language: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+}
+
+impl std::fmt::Display for FilesCopyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.ignore_default_visibility {
+            write!(
+                f,
+                "&ignoreDefaultVisibility={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.keep_revision_forever {
+            write!(
+                f,
+                "&keepRevisionForever={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.ocr_language {
+            write!(
+                f,
+                "&ocrLanguage={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. Requests that specify more than one parent fail.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+    /// Whether to ignore the domain's default visibility settings for the created file. Domain administrators can choose to make all uploaded files visible to the domain by default; this parameter bypasses that behavior for the request. Permissions are still inherited from parent folders.
+    #[serde(rename = "ignoreDefaultVisibility")]
+    pub ignore_default_visibility: Option<bool>,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether to set the 'keepForever' field in the new head revision. This is only applicable to files with binary content in Google Drive. Only 200 revisions for the file can be kept forever. If the limit is reached, try deleting pinned revisions.
+    #[serde(rename = "keepRevisionForever")]
+    pub keep_revision_forever: Option<bool>,
+    /// A language hint for OCR processing during image import (ISO 639-1 code).
+    #[serde(rename = "ocrLanguage")]
+    pub ocr_language: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Whether to use the uploaded content as indexable text.
+    #[serde(rename = "useContentAsIndexableText")]
+    pub use_content_as_indexable_text: Option<bool>,
+}
+
+impl std::fmt::Display for FilesCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.ignore_default_visibility {
+            write!(
+                f,
+                "&ignoreDefaultVisibility={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.keep_revision_forever {
+            write!(
+                f,
+                "&keepRevisionForever={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.ocr_language {
+            write!(
+                f,
+                "&ocrLanguage={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_content_as_indexable_text {
+            write!(
+                f,
+                "&useContentAsIndexableText={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+}
+
+impl std::fmt::Display for FilesDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.emptyTrash` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesEmptyTrashParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+}
+
+impl std::fmt::Display for FilesEmptyTrashParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.export` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesExportParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The MIME type of the format requested for this export.
+    #[serde(rename = "mimeType")]
+    pub mime_type: String,
+}
+
+impl std::fmt::Display for FilesExportParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&mimeType={}",
+            percent_encode(format!("{}", self.mime_type).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.generateIds` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesGenerateIdsParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The number of IDs to return.
+    #[serde(rename = "count")]
+    pub count: Option<i32>,
+    /// The space in which the IDs can be used to create new files. Supported values are 'drive' and 'appDataFolder'.
+    #[serde(rename = "space")]
+    pub space: Option<String>,
+}
+
+impl std::fmt::Display for FilesGenerateIdsParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.count {
+            write!(
+                f,
+                "&count={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.space {
+            write!(
+                f,
+                "&space={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Whether the user is acknowledging the risk of downloading known malware or other abusive files. This is only applicable when alt=media.
+    #[serde(rename = "acknowledgeAbuse")]
+    pub acknowledge_abuse: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+}
+
+impl std::fmt::Display for FilesGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.acknowledge_abuse {
+            write!(
+                f,
+                "&acknowledgeAbuse={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Groupings of files to which the query applies. Supported groupings are: 'user' (files created by, opened by, or shared directly with the user), 'drive' (files in the specified shared drive as indicated by the 'driveId'), 'domain' (files shared to the user's domain), and 'allDrives' (A combination of 'user' and 'drive' for all drives where the user is a member). When able, use 'user' or 'drive', instead of 'allDrives', for efficiency.
+    #[serde(rename = "corpora")]
+    pub corpora: Option<String>,
+    /// The source of files to list. Deprecated: use 'corpora' instead.
+    #[serde(rename = "corpus")]
+    pub corpus: Option<String>,
+    /// ID of the shared drive to search.
+    #[serde(rename = "driveId")]
+    pub drive_id: Option<String>,
+    /// Whether both My Drive and shared drive items should be included in results.
+    #[serde(rename = "includeItemsFromAllDrives")]
+    pub include_items_from_all_drives: Option<bool>,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Deprecated use includeItemsFromAllDrives instead.
+    #[serde(rename = "includeTeamDriveItems")]
+    pub include_team_drive_items: Option<bool>,
+    /// A comma-separated list of sort keys. Valid keys are 'createdTime', 'folder', 'modifiedByMeTime', 'modifiedTime', 'name', 'name_natural', 'quotaBytesUsed', 'recency', 'sharedWithMeTime', 'starred', and 'viewedByMeTime'. Each key sorts ascending by default, but may be reversed with the 'desc' modifier. Example usage: ?orderBy=folder,modifiedTime desc,name. Please note that there is a current limitation for users with approximately one million files in which the requested sort order is ignored.
+    #[serde(rename = "orderBy")]
+    pub order_by: Option<String>,
+    /// The maximum number of files to return per page. Partial or empty result pages are possible even before the end of the files list has been reached.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// A query for filtering the file results. See the "Search for Files" guide for supported syntax.
+    #[serde(rename = "q")]
+    pub q: Option<String>,
+    /// A comma-separated list of spaces to query within the corpus. Supported values are 'drive', 'appDataFolder' and 'photos'.
+    #[serde(rename = "spaces")]
+    pub spaces: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Deprecated use driveId instead.
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: Option<String>,
+}
+
+impl std::fmt::Display for FilesListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.corpora {
+            write!(
+                f,
+                "&corpora={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.corpus {
+            write!(
+                f,
+                "&corpus={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.drive_id {
+            write!(
+                f,
+                "&driveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_items_from_all_drives {
+            write!(
+                f,
+                "&includeItemsFromAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_team_drive_items {
+            write!(
+                f,
+                "&includeTeamDriveItems={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.order_by {
+            write!(
+                f,
+                "&orderBy={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.q {
+            write!(
+                f,
+                "&q={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.spaces {
+            write!(
+                f,
+                "&spaces={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.team_drive_id {
+            write!(
+                f,
+                "&teamDriveId={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// A comma-separated list of parent IDs to add.
+    #[serde(rename = "addParents")]
+    pub add_parents: Option<String>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. If the item's owner makes a request to add a single parent, the item is removed from all current folders and placed in the requested folder. Other requests that increase the number of parents fail, except when the canAddMyDriveParent file capability is true and a single parent is being added.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether to set the 'keepForever' field in the new head revision. This is only applicable to files with binary content in Google Drive. Only 200 revisions for the file can be kept forever. If the limit is reached, try deleting pinned revisions.
+    #[serde(rename = "keepRevisionForever")]
+    pub keep_revision_forever: Option<bool>,
+    /// A language hint for OCR processing during image import (ISO 639-1 code).
+    #[serde(rename = "ocrLanguage")]
+    pub ocr_language: Option<String>,
+    /// A comma-separated list of parent IDs to remove.
+    #[serde(rename = "removeParents")]
+    pub remove_parents: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Whether to use the uploaded content as indexable text.
+    #[serde(rename = "useContentAsIndexableText")]
+    pub use_content_as_indexable_text: Option<bool>,
+}
+
+impl std::fmt::Display for FilesUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.add_parents {
+            write!(
+                f,
+                "&addParents={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.keep_revision_forever {
+            write!(
+                f,
+                "&keepRevisionForever={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.ocr_language {
+            write!(
+                f,
+                "&ocrLanguage={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.remove_parents {
+            write!(
+                f,
+                "&removeParents={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_content_as_indexable_text {
+            write!(
+                f,
+                "&useContentAsIndexableText={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.watch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesWatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Whether the user is acknowledging the risk of downloading known malware or other abusive files. This is only applicable when alt=media.
+    #[serde(rename = "acknowledgeAbuse")]
+    pub acknowledge_abuse: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+}
+
+impl std::fmt::Display for FilesWatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.acknowledge_abuse {
+            write!(
+                f,
+                "&acknowledgeAbuse={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `permissions.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionsCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// A plain text custom message to include in the notification email.
+    #[serde(rename = "emailMessage")]
+    pub email_message: Option<String>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter only takes effect if the item is not in a shared drive. See moveToNewOwnersRoot for details.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+    /// The ID of the file or shared drive.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// This parameter only takes effect if the item is not in a shared drive and the request is attempting to transfer the ownership of the item. When set to true, the item is moved to the new owner's My Drive root folder and all prior parents removed. If set to false, when enforceSingleParent=true, parents are not changed. If set to false, when enforceSingleParent=false, existing parents are not changed; however, the file will be added to the new owner's My Drive root folder, unless it is already in the new owner's My Drive.
+    #[serde(rename = "moveToNewOwnersRoot")]
+    pub move_to_new_owners_root: Option<bool>,
+    /// Whether to send a notification email when sharing to users or groups. This defaults to true for users and groups, and is not allowed for other requests. It must not be disabled for ownership transfers.
+    #[serde(rename = "sendNotificationEmail")]
+    pub send_notification_email: Option<bool>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Whether to transfer ownership to the specified user and downgrade the current owner to a writer. This parameter is required as an acknowledgement of the side effect.
+    #[serde(rename = "transferOwnership")]
+    pub transfer_ownership: Option<bool>,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for PermissionsCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.email_message {
+            write!(
+                f,
+                "&emailMessage={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.move_to_new_owners_root {
+            write!(
+                f,
+                "&moveToNewOwnersRoot={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.send_notification_email {
+            write!(
+                f,
+                "&sendNotificationEmail={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.transfer_ownership {
+            write!(
+                f,
+                "&transferOwnership={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `permissions.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file or shared drive.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the permission.
+    #[serde(rename = "permissionId")]
+    pub permission_id: String,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for PermissionsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `permissions.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the permission.
+    #[serde(rename = "permissionId")]
+    pub permission_id: String,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for PermissionsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `permissions.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file or shared drive.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Specifies which additional view's permissions to include in the response. Only 'published' is supported.
+    #[serde(rename = "includePermissionsForView")]
+    pub include_permissions_for_view: Option<String>,
+    /// The maximum number of permissions to return per page. When not set for files in a shared drive, at most 100 results will be returned. When not set for files that are not in a shared drive, the entire list will be returned.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for PermissionsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.include_permissions_for_view {
+            write!(
+                f,
+                "&includePermissionsForView={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `permissions.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PermissionsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file or shared drive.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the permission.
+    #[serde(rename = "permissionId")]
+    pub permission_id: String,
+    /// Whether to remove the expiration date.
+    #[serde(rename = "removeExpiration")]
+    pub remove_expiration: Option<bool>,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+    /// Whether to transfer ownership to the specified user and downgrade the current owner to a writer. This parameter is required as an acknowledgement of the side effect.
+    #[serde(rename = "transferOwnership")]
+    pub transfer_ownership: Option<bool>,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if the file ID parameter refers to a shared drive and the requester is an administrator of the domain to which the shared drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for PermissionsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.remove_expiration {
+            write!(
+                f,
+                "&removeExpiration={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.transfer_ownership {
+            write!(
+                f,
+                "&transferOwnership={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `replies.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RepliesCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+}
+
+impl std::fmt::Display for RepliesCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `replies.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RepliesDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the reply.
+    #[serde(rename = "replyId")]
+    pub reply_id: String,
+}
+
+impl std::fmt::Display for RepliesDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `replies.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RepliesGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether to return deleted replies. Deleted replies will not include their original content.
+    #[serde(rename = "includeDeleted")]
+    pub include_deleted: Option<bool>,
+    /// The ID of the reply.
+    #[serde(rename = "replyId")]
+    pub reply_id: String,
+}
+
+impl std::fmt::Display for RepliesGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.include_deleted {
+            write!(
+                f,
+                "&includeDeleted={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `replies.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RepliesListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether to include deleted replies. Deleted replies will not include their original content.
+    #[serde(rename = "includeDeleted")]
+    pub include_deleted: Option<bool>,
+    /// The maximum number of replies to return per page.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+}
+
+impl std::fmt::Display for RepliesListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.include_deleted {
+            write!(
+                f,
+                "&includeDeleted={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `replies.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RepliesUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the comment.
+    #[serde(rename = "commentId")]
+    pub comment_id: String,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the reply.
+    #[serde(rename = "replyId")]
+    pub reply_id: String,
+}
+
+impl std::fmt::Display for RepliesUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `revisions.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RevisionsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the revision.
+    #[serde(rename = "revisionId")]
+    pub revision_id: String,
+}
+
+impl std::fmt::Display for RevisionsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `revisions.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RevisionsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Whether the user is acknowledging the risk of downloading known malware or other abusive files. This is only applicable when alt=media.
+    #[serde(rename = "acknowledgeAbuse")]
+    pub acknowledge_abuse: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the revision.
+    #[serde(rename = "revisionId")]
+    pub revision_id: String,
+}
+
+impl std::fmt::Display for RevisionsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.acknowledge_abuse {
+            write!(
+                f,
+                "&acknowledgeAbuse={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `revisions.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RevisionsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The maximum number of revisions to return per page.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// The token for continuing a previous list request on the next page. This should be set to the value of 'nextPageToken' from the previous response.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+}
+
+impl std::fmt::Display for RevisionsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `revisions.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RevisionsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The ID of the revision.
+    #[serde(rename = "revisionId")]
+    pub revision_id: String,
+}
+
+impl std::fmt::Display for RevisionsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `teamdrives.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamdrivesCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// An ID, such as a random UUID, which uniquely identifies this user's request for idempotent creation of a Team Drive. A repeated request by the same user and with the same request ID will avoid creating duplicates by attempting to create the same Team Drive. If the Team Drive already exists a 409 error will be returned.
+    #[serde(rename = "requestId")]
+    pub request_id: String,
+}
+
+impl std::fmt::Display for TeamdrivesCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&requestId={}",
+            percent_encode(format!("{}", self.request_id).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        Ok(())
+    }
+}
+
+/// Parameters for the `teamdrives.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamdrivesDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the Team Drive
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: String,
+}
+
+impl std::fmt::Display for TeamdrivesDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `teamdrives.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamdrivesGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the Team Drive
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: String,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the Team Drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for TeamdrivesGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `teamdrives.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamdrivesListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// Maximum number of Team Drives to return.
+    #[serde(rename = "pageSize")]
+    pub page_size: Option<i32>,
+    /// Page token for Team Drives.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Query string for searching Team Drives.
+    #[serde(rename = "q")]
+    pub q: Option<String>,
+    /// Issue the request as a domain administrator; if set to true, then all Team Drives of the domain in which the requester is an administrator are returned.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for TeamdrivesListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.page_size {
+            write!(
+                f,
+                "&pageSize={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.q {
+            write!(
+                f,
+                "&q={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `teamdrives.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TeamdrivesUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub drive_params: Option<DriveParams>,
+    /// The ID of the Team Drive
+    #[serde(rename = "teamDriveId")]
+    pub team_drive_id: String,
+    /// Issue the request as a domain administrator; if set to true, then the requester will be granted access if they are an administrator of the domain to which the Team Drive belongs.
+    #[serde(rename = "useDomainAdminAccess")]
+    pub use_domain_admin_access: Option<bool>,
+}
+
+impl std::fmt::Display for TeamdrivesUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.use_domain_admin_access {
+            write!(
+                f,
+                "&useDomainAdminAccess={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+impl std::fmt::Display for DriveParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.alt {
+            write!(
+                f,
+                "&alt={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.fields {
+            write!(
+                f,
+                "&fields={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.key {
+            write!(
+                f,
+                "&key={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.oauth_token {
+            write!(
+                f,
+                "&oauth_token={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.pretty_print {
+            write!(
+                f,
+                "&prettyPrint={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.quota_user {
+            write!(
+                f,
+                "&quotaUser={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_ip {
+            write!(
+                f,
+                "&userIp={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// The Drive About service represents the About resource.
+pub struct AboutService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl AboutService {
+    /// Create a new AboutService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> AboutService {
+        AboutService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Gets information about the user, the user's Drive, and system capabilities.
+    pub async fn get(&mut self, params: &AboutGetParams) -> Result<About> {
+        let rel_path = format!("about",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+}
+
+/// The Drive Changes service represents the Changes resource.
+pub struct ChangesService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ChangesService {
+    /// Create a new ChangesService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ChangesService {
+        ChangesService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Gets the starting pageToken for listing future changes.
+    pub async fn get_start_page_token(
+        &mut self,
+        params: &ChangesGetStartPageTokenParams,
+    ) -> Result<StartPageToken> {
+        let rel_path = format!("changes/startPageToken",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Lists the changes for a user or shared drive.
+    pub async fn list(&mut self, params: &ChangesListParams) -> Result<ChangeList> {
+        let rel_path = format!("changes",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Subscribes to changes for a user.
+    pub async fn watch(&mut self, params: &ChangesWatchParams, req: &Channel) -> Result<Channel> {
+        let rel_path = format!("changes/watch",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+}
+
+/// The Drive Channels service represents the Channels resource.
+pub struct ChannelsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ChannelsService {
+    /// Create a new ChannelsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ChannelsService {
+        ChannelsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Stop watching resources through this channel
+    pub async fn stop(&mut self, params: &ChannelsStopParams, req: &Channel) -> Result<()> {
+        let rel_path = format!("channels/stop",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+}
+
+/// The Drive Comments service represents the Comments resource.
+pub struct CommentsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl CommentsService {
+    /// Create a new CommentsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> CommentsService {
+        CommentsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a new comment on a file.
+    pub async fn create(
+        &mut self,
+        params: &CommentsCreateParams,
+        req: &Comment,
+    ) -> Result<Comment> {
+        let rel_path = format!(
+            "files/{fileId}/comments",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Deletes a comment.
+    pub async fn delete(&mut self, params: &CommentsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Gets a comment by ID.
+    pub async fn get(&mut self, params: &CommentsGetParams) -> Result<Comment> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Lists a file's comments.
+    pub async fn list(&mut self, params: &CommentsListParams) -> Result<CommentList> {
+        let rel_path = format!(
+            "files/{fileId}/comments",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates a comment with patch semantics.
+    pub async fn update(
+        &mut self,
+        params: &CommentsUpdateParams,
+        req: &Comment,
+    ) -> Result<Comment> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+}
+
+/// The Drive Drives service represents the Drives resource.
+pub struct DrivesService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl DrivesService {
+    /// Create a new DrivesService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> DrivesService {
+        DrivesService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a new shared drive.
+    pub async fn create(&mut self, params: &DrivesCreateParams, req: &Drive) -> Result<Drive> {
+        let rel_path = format!("drives",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Permanently deletes a shared drive for which the user is an organizer. The shared drive cannot contain any untrashed items.
+    pub async fn delete(&mut self, params: &DrivesDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "drives/{driveId}",
+            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Gets a shared drive's metadata by ID.
+    pub async fn get(&mut self, params: &DrivesGetParams) -> Result<Drive> {
+        let rel_path = format!(
+            "drives/{driveId}",
+            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Hides a shared drive from the default view.
+    pub async fn hide(&mut self, params: &DrivesHideParams) -> Result<Drive> {
+        let rel_path = format!(
+            "drives/{driveId}/hide",
+            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Lists the user's shared drives.
+    pub async fn list(&mut self, params: &DrivesListParams) -> Result<DriveList> {
+        let rel_path = format!("drives",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Restores a shared drive to the default view.
+    pub async fn unhide(&mut self, params: &DrivesUnhideParams) -> Result<Drive> {
+        let rel_path = format!(
+            "drives/{driveId}/unhide",
+            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Updates the metadate for a shared drive.
+    pub async fn update(&mut self, params: &DrivesUpdateParams, req: &Drive) -> Result<Drive> {
+        let rel_path = format!(
+            "drives/{driveId}",
+            driveId = percent_encode(params.drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+}
+
+/// The Drive Files service represents the Files resource.
+pub struct FilesService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl FilesService {
+    /// Create a new FilesService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> FilesService {
+        FilesService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a copy of a file and applies any requested updates with patch semantics. Folders cannot be copied.
+    pub async fn copy(&mut self, params: &FilesCopyParams, req: &File) -> Result<File> {
+        let rel_path = format!(
+            "files/{fileId}/copy",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DrivePhotosReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Creates a new file.
+    pub async fn create(&mut self, params: &FilesCreateParams, req: &File) -> Result<File> {
+        let rel_path = format!("files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Creates a new file.
+    ///
+    /// This method is a variant of `create()`, taking data for upload. It performs a multipart upload.
+    pub async fn create_upload(
+        &mut self,
+        params: &FilesCreateParams,
+        req: &File,
+        data: hyper::body::Bytes,
+    ) -> Result<File> {
+        let rel_path = format!("/upload/drive/v3/files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=multipart{params}", params = params);
+
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+
+        do_upload_multipart(&self.client, &full_uri, &headers, "POST", opt_request, data).await
+    }
+
+    /// Creates a new file.
+    ///
+    /// This method is a variant of `create()`, taking data for upload.
+    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
+    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
+    /// you choose for the upload.
+    pub async fn create_resumable_upload<'client>(
+        &'client mut self,
+        params: &FilesCreateParams,
+        req: &File,
+    ) -> Result<ResumableUpload<'client, File>> {
+        let rel_path = format!("/resumable/upload/drive/v3/files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=resumable{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
+            do_request_with_headers(&self.client, &full_uri, &headers, "POST", opt_request).await?;
+        if let Some(dest) = headers.get(hyper::header::LOCATION) {
+            use std::convert::TryFrom;
+            Ok(ResumableUpload::new(
+                hyper::Uri::try_from(dest.to_str()?)?,
+                &self.client,
+                5 * 1024 * 1024,
+            ))
+        } else {
+            Err(Error::from(ApiError::RedirectError(format!(
+                "Resumable upload response didn't contain Location: {:?}",
+                headers
+            )))
+            .context(format!("{:?}", headers)))?
+        }
+    }
+
+    /// Permanently deletes a file owned by the user without moving it to the trash. If the file belongs to a shared drive the user must be an organizer on the parent. If the target is a folder, all descendants owned by the user are also deleted.
+    pub async fn delete(&mut self, params: &FilesDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "files/{fileId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Permanently deletes all of the user's trashed files.
+    pub async fn empty_trash(&mut self, params: &FilesEmptyTrashParams) -> Result<()> {
+        let rel_path = format!("files/trash",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Exports a Google Doc to the requested MIME type and returns the exported content. Please note that the exported content is limited to 10MB.
+    ///
+    /// This method potentially downloads data. See documentation of `Download`.
+    pub async fn export<'a>(
+        &'a mut self,
+        params: &FilesExportParams,
+    ) -> Result<Download<'a, EmptyRequest, ()>> {
+        let rel_path = format!(
+            "files/{fileId}/export",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+
+        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
+    }
+
+    /// Generates a set of file IDs which can be provided in create or copy requests.
+    pub async fn generate_ids(&mut self, params: &FilesGenerateIdsParams) -> Result<GeneratedIds> {
+        let rel_path = format!("files/generateIds",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Gets a file's metadata or content by ID.
+    ///
+    /// This method potentially downloads data. See documentation of `Download`.
+    pub async fn get<'a>(
+        &'a mut self,
+        params: &FilesGetParams,
+    ) -> Result<Download<'a, EmptyRequest, File>> {
+        let rel_path = format!(
+            "files/{fileId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+
+        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
+    }
+
+    /// Lists or searches files.
+    pub async fn list(&mut self, params: &FilesListParams) -> Result<FileList> {
+        let rel_path = format!("files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates a file's metadata and/or content. This method supports patch semantics.
+    pub async fn update(&mut self, params: &FilesUpdateParams, req: &File) -> Result<File> {
+        let rel_path = format!(
+            "files/{fileId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveScripts.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+
+    /// Updates a file's metadata and/or content. This method supports patch semantics.
+    ///
+    /// This method is a variant of `update()`, taking data for upload. It performs a multipart upload.
+    pub async fn update_upload(
+        &mut self,
+        params: &FilesUpdateParams,
+        req: &File,
+        data: hyper::body::Bytes,
+    ) -> Result<File> {
+        let rel_path = format!(
+            "/upload/drive/v3/files/{fileId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveScripts.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=multipart{params}", params = params);
+
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+
+        do_upload_multipart(
+            &self.client,
+            &full_uri,
+            &headers,
+            "PATCH",
+            opt_request,
+            data,
+        )
+        .await
+    }
+
+    /// Updates a file's metadata and/or content. This method supports patch semantics.
+    ///
+    /// This method is a variant of `update()`, taking data for upload.
+    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
+    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
+    /// you choose for the upload.
+    pub async fn update_resumable_upload<'client>(
+        &'client mut self,
+        params: &FilesUpdateParams,
+        req: &File,
+    ) -> Result<ResumableUpload<'client, File>> {
+        let rel_path = format!(
+            "/resumable/upload/drive/v3/files/{fileId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveScripts.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=resumable{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
+            do_request_with_headers(&self.client, &full_uri, &headers, "PATCH", opt_request)
+                .await?;
+        if let Some(dest) = headers.get(hyper::header::LOCATION) {
+            use std::convert::TryFrom;
+            Ok(ResumableUpload::new(
+                hyper::Uri::try_from(dest.to_str()?)?,
+                &self.client,
+                5 * 1024 * 1024,
+            ))
+        } else {
+            Err(Error::from(ApiError::RedirectError(format!(
+                "Resumable upload response didn't contain Location: {:?}",
+                headers
+            )))
+            .context(format!("{:?}", headers)))?
+        }
+    }
+
+    /// Subscribes to changes to a file
+    ///
+    /// This method potentially downloads data. See documentation of `Download`.
+    pub async fn watch<'a>(
+        &'a mut self,
+        params: &FilesWatchParams,
+        req: &'a Channel,
+    ) -> Result<Download<'a, Channel, Channel>> {
+        let rel_path = format!(
+            "files/{fileId}/watch",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+
+        do_download(&self.client, &full_uri, headers, "POST".into(), opt_request).await
+    }
+}
+
+/// The Drive Permissions service represents the Permissions resource.
+pub struct PermissionsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl PermissionsService {
+    /// Create a new PermissionsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> PermissionsService {
+        PermissionsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a permission for a file or shared drive.
+    pub async fn create(
+        &mut self,
+        params: &PermissionsCreateParams,
+        req: &Permission,
+    ) -> Result<Permission> {
+        let rel_path = format!(
+            "files/{fileId}/permissions",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Deletes a permission.
+    pub async fn delete(&mut self, params: &PermissionsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "files/{fileId}/permissions/{permissionId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            permissionId = percent_encode(params.permission_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Gets a permission by ID.
+    pub async fn get(&mut self, params: &PermissionsGetParams) -> Result<Permission> {
+        let rel_path = format!(
+            "files/{fileId}/permissions/{permissionId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            permissionId = percent_encode(params.permission_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Lists a file's or shared drive's permissions.
+    pub async fn list(&mut self, params: &PermissionsListParams) -> Result<PermissionList> {
+        let rel_path = format!(
+            "files/{fileId}/permissions",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates a permission with patch semantics.
+    pub async fn update(
+        &mut self,
+        params: &PermissionsUpdateParams,
+        req: &Permission,
+    ) -> Result<Permission> {
+        let rel_path = format!(
+            "files/{fileId}/permissions/{permissionId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            permissionId = percent_encode(params.permission_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+}
+
+/// The Drive Replies service represents the Replies resource.
+pub struct RepliesService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl RepliesService {
+    /// Create a new RepliesService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> RepliesService {
+        RepliesService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a new reply to a comment.
+    pub async fn create(&mut self, params: &RepliesCreateParams, req: &Reply) -> Result<Reply> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}/replies",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Deletes a reply.
+    pub async fn delete(&mut self, params: &RepliesDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}/replies/{replyId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC),
+            replyId = percent_encode(params.reply_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Gets a reply by ID.
+    pub async fn get(&mut self, params: &RepliesGetParams) -> Result<Reply> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}/replies/{replyId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC),
+            replyId = percent_encode(params.reply_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Lists a comment's replies.
+    pub async fn list(&mut self, params: &RepliesListParams) -> Result<ReplyList> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}/replies",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates a reply with patch semantics.
+    pub async fn update(&mut self, params: &RepliesUpdateParams, req: &Reply) -> Result<Reply> {
+        let rel_path = format!(
+            "files/{fileId}/comments/{commentId}/replies/{replyId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            commentId = percent_encode(params.comment_id.as_bytes(), NON_ALPHANUMERIC),
+            replyId = percent_encode(params.reply_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+}
+
+/// The Drive Revisions service represents the Revisions resource.
+pub struct RevisionsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl RevisionsService {
+    /// Create a new RevisionsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> RevisionsService {
+        RevisionsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Permanently deletes a file version. You can only delete revisions for files with binary content in Google Drive, like images or videos. Revisions for other files, like Google Docs or Sheets, and the last remaining file version can't be deleted.
+    pub async fn delete(&mut self, params: &RevisionsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "files/{fileId}/revisions/{revisionId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            revisionId = percent_encode(params.revision_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Gets a revision's metadata or content by ID.
+    ///
+    /// This method potentially downloads data. See documentation of `Download`.
+    pub async fn get<'a>(
+        &'a mut self,
+        params: &RevisionsGetParams,
+    ) -> Result<Download<'a, EmptyRequest, Revision>> {
+        let rel_path = format!(
+            "files/{fileId}/revisions/{revisionId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            revisionId = percent_encode(params.revision_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+
+        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
+    }
+
+    /// Lists a file's revisions.
+    pub async fn list(&mut self, params: &RevisionsListParams) -> Result<RevisionList> {
+        let rel_path = format!(
+            "files/{fileId}/revisions",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates a revision with patch semantics.
+    pub async fn update(
+        &mut self,
+        params: &RevisionsUpdateParams,
+        req: &Revision,
+    ) -> Result<Revision> {
+        let rel_path = format!(
+            "files/{fileId}/revisions/{revisionId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC),
+            revisionId = percent_encode(params.revision_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveFile.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+}
+
+/// The Drive Teamdrives service represents the Teamdrives resource.
+pub struct TeamdrivesService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl TeamdrivesService {
+    /// Create a new TeamdrivesService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> TeamdrivesService {
+        TeamdrivesService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://www.googleapis.com/drive/v3/".into(),
+            root_url: "https://www.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of DriveScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Deprecated use drives.create instead.
+    pub async fn create(
+        &mut self,
+        params: &TeamdrivesCreateParams,
+        req: &TeamDrive,
+    ) -> Result<TeamDrive> {
+        let rel_path = format!("teamdrives",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Deprecated use drives.delete instead.
+    pub async fn delete(&mut self, params: &TeamdrivesDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "teamdrives/{teamDriveId}",
+            teamDriveId = percent_encode(params.team_drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Deprecated use drives.get instead.
+    pub async fn get(&mut self, params: &TeamdrivesGetParams) -> Result<TeamDrive> {
+        let rel_path = format!(
+            "teamdrives/{teamDriveId}",
+            teamDriveId = percent_encode(params.team_drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Deprecated use drives.list instead.
+    pub async fn list(&mut self, params: &TeamdrivesListParams) -> Result<TeamDriveList> {
+        let rel_path = format!("teamdrives",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::DriveReadonly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Deprecated use drives.update instead
+    pub async fn update(
+        &mut self,
+        params: &TeamdrivesUpdateParams,
+        req: &TeamDrive,
+    ) -> Result<TeamDrive> {
+        let rel_path = format!(
+            "teamdrives/{teamDriveId}",
+            teamDriveId = percent_encode(params.team_drive_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[DriveScopes::Drive.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.drive_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/drive_example/src/main.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,146 @@
+//! List your Google Drive root folder, or upload a file there.
+//!
+//! When run with no arguments, a very detailed listing of all objects in your root folder is
+//! printed.
+//!
+//! When you specify a file name as command line argument, the given file is uploaded to your
+//! Google Drive.
+
+mod drive_v3_types;
+use drive_v3_types as drive;
+
+use env_logger;
+
+use async_google_apis_common as common;
+
+use std::path::Path;
+use std::rc::Rc;
+
+/// Create a new HTTPS client.
+fn https_client() -> common::TlsClient {
+    let conn = hyper_rustls::HttpsConnector::new();
+    let cl = hyper::Client::builder().build(conn);
+    cl
+}
+
+/// Upload a local file `f` to your drive.
+async fn upload_file(mut cl: drive::FilesService, f: &Path) -> anyhow::Result<()> {
+    let fname = f.file_name().unwrap().to_str().unwrap();
+
+    let mut general_params = drive::DriveParams::default();
+    general_params.fields = Some("*".to_string());
+
+    let mut params = drive::FilesCreateParams::default();
+    params.drive_params = Some(general_params.clone());
+    params.include_permissions_for_view = Some("published".to_string());
+    let mut file = drive::File::default();
+    file.name = Some(fname.to_string());
+
+    // Upload data using the upload version of create(). We obtain a `File` object.
+    //
+    let resumable = cl.create_resumable_upload(&params, &file).await?;
+
+    let tokiofile = tokio::fs::OpenOptions::new().read(true).open(f).await?;
+    let resp = resumable.upload_file(tokiofile).await?;
+
+    // If you used this method, no file content would be uploaded:
+    // let resp = cl.create(&params, &file).await?;
+    println!(
+        "Uploaded file: {} (id = {}) with metadata: \n {:?}",
+        resp.name.as_ref().unwrap(),
+        resp.id.as_ref().unwrap(),
+        resp
+    );
+
+    let file_id = resp.id.unwrap();
+
+    // Now get the file and check that it is correct.
+    //
+    let mut params = drive::FilesGetParams::default();
+    params.file_id = file_id.clone();
+    params.drive_params = Some(general_params.clone());
+    // This parameter will trigger the download.
+    params.drive_params.as_mut().unwrap().alt = Some("media".into());
+    let mut dest = vec![0 as u8; 128];
+
+    // Get file contents.
+    let get_file = cl.get(&params).await?.do_it_to_buf(&mut dest).await?;
+    println!("{:?}", get_file);
+
+    // get() returns a response type (Response(...)) if the server returned an application/json
+    // response, otherwise it will download to a Writer. If you don't supply a Writer and there is
+    // data to download, an error is returned (ApiError::DataAvailableError).
+    match get_file {
+        common::DownloadResult::Response(_) => {
+            // We want download! No metadata.
+            assert!(false);
+        }
+        common::DownloadResult::Downloaded => println!("Download success."),
+    }
+
+    // Get file metadata. We don't specify &alt=media, so no download will take place.
+    let mut params = drive::FilesGetParams::default();
+    params.file_id = file_id.clone();
+    let get_file = cl.get(&params).await?.do_it(None).await?;
+    println!("{:?}", get_file);
+
+    match get_file {
+        common::DownloadResult::Response(gf) => {
+            println!("Metadata success.");
+            assert!(gf.name == Some(fname.to_string()));
+        }
+        // We want metadata! No download.
+        common::DownloadResult::Downloaded => assert!(false),
+    }
+    Ok(())
+}
+
+#[tokio::main]
+async fn main() {
+    env_logger::init();
+
+    let https = https_client();
+    // Put your client secret in the working directory!
+    let sec = common::yup_oauth2::read_application_secret("client_secret.json")
+        .await
+        .expect("client secret couldn't be read.");
+    let auth = common::yup_oauth2::InstalledFlowAuthenticator::builder(
+        sec,
+        common::yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
+    )
+    .persist_tokens_to_disk("tokencache.json")
+    .hyper_client(https.clone())
+    .build()
+    .await
+    .expect("InstalledFlowAuthenticator failed to build");
+
+    let scopes = vec![drive::DriveScopes::Drive];
+    let mut cl = drive::FilesService::new(https, Rc::new(auth));
+    cl.set_scopes(&scopes);
+
+    let arg = std::env::args().skip(1).next();
+    if let Some(fp) = arg {
+        upload_file(cl, Path::new(&fp))
+            .await
+            .expect("Upload failed :(");
+    } else {
+        // By default, list root directory.
+        let mut general_params = drive::DriveParams::default();
+        general_params.fields = Some("*".to_string());
+        let mut p = drive::FilesListParams::default();
+        p.q = Some("'root' in parents and trashed = false".to_string());
+        p.drive_params = Some(general_params);
+
+        let resp = cl.list(&p).await.expect("listing your Drive failed!");
+
+        if let Some(files) = resp.files {
+            for f in files {
+                println!(
+                    "{} => {:?}",
+                    f.id.unwrap(),
+                    f.name.as_ref().unwrap_or(&"???".to_string()),
+                );
+            }
+        }
+    }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/gcs_example/Cargo.lock	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,1233 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
+name = "aho-corasick"
+version = "0.7.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b476ce7103678b0c6d3d395dbbae31d48ff910bd28be979ba5d48c6351131d0d"
+dependencies = [
+ "memchr",
+]
+
+[[package]]
+name = "ansi_term"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
+dependencies = [
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "anyhow"
+version = "1.0.33"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
+
+[[package]]
+name = "arrayref"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
+
+[[package]]
+name = "async-google-apis-common"
+version = "0.1.7"
+dependencies = [
+ "anyhow",
+ "chrono",
+ "futures",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "radix64",
+ "serde",
+ "serde_json",
+ "tokio",
+ "yup-oauth2",
+]
+
+[[package]]
+name = "atty"
+version = "0.2.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
+dependencies = [
+ "hermit-abi",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "autocfg"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
+
+[[package]]
+name = "base64"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
+
+[[package]]
+name = "base64"
+version = "0.12.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
+
+[[package]]
+name = "bitflags"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
+
+[[package]]
+name = "bumpalo"
+version = "3.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
+
+[[package]]
+name = "bytes"
+version = "0.5.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
+
+[[package]]
+name = "cc"
+version = "1.0.61"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
+
+[[package]]
+name = "cfg-if"
+version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
+
+[[package]]
+name = "chrono"
+version = "0.4.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
+dependencies = [
+ "libc",
+ "num-integer",
+ "num-traits",
+ "serde",
+ "time",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "clap"
+version = "2.33.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "37e58ac78573c40708d45522f0d80fa2f01cc4f9b4e2bf749807255454312002"
+dependencies = [
+ "ansi_term",
+ "atty",
+ "bitflags",
+ "strsim",
+ "textwrap",
+ "unicode-width",
+ "vec_map",
+]
+
+[[package]]
+name = "core-foundation"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "core-foundation-sys"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
+
+[[package]]
+name = "ct-logs"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
+dependencies = [
+ "sct",
+]
+
+[[package]]
+name = "env_logger"
+version = "0.8.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "54532e3223c5af90a6a757c90b5c5521564b07e5e7a958681bcd2afad421cdcd"
+dependencies = [
+ "atty",
+ "humantime",
+ "log",
+ "regex",
+ "termcolor",
+]
+
+[[package]]
+name = "fnv"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
+
+[[package]]
+name = "fuchsia-zircon"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
+dependencies = [
+ "bitflags",
+ "fuchsia-zircon-sys",
+]
+
+[[package]]
+name = "fuchsia-zircon-sys"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
+
+[[package]]
+name = "futures"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "95314d38584ffbfda215621d723e0a3906f032e03ae5551e650058dac83d4797"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-executor",
+ "futures-io",
+ "futures-sink",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-channel"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0448174b01148032eed37ac4aed28963aaaa8cfa93569a08e5b479bbc6c2c151"
+dependencies = [
+ "futures-core",
+ "futures-sink",
+]
+
+[[package]]
+name = "futures-core"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "18eaa56102984bed2c88ea39026cff3ce3b4c7f508ca970cedf2450ea10d4e46"
+
+[[package]]
+name = "futures-executor"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f5f8e0c9258abaea85e78ebdda17ef9666d390e987f006be6080dfe354b708cb"
+dependencies = [
+ "futures-core",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-io"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e1798854a4727ff944a7b12aa999f58ce7aa81db80d2dfaaf2ba06f065ddd2b"
+
+[[package]]
+name = "futures-macro"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e36fccf3fc58563b4a14d265027c627c3b665d7fed489427e88e7cc929559efe"
+dependencies = [
+ "proc-macro-hack",
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "futures-sink"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e3ca3f17d6e8804ae5d3df7a7d35b2b3a6fe89dac84b31872720fc3060a0b11"
+
+[[package]]
+name = "futures-task"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "96d502af37186c4fef99453df03e374683f8a1eec9dcc1e66b3b82dc8278ce3c"
+dependencies = [
+ "once_cell",
+]
+
+[[package]]
+name = "futures-util"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "abcb44342f62e6f3e8ac427b8aa815f724fd705dfad060b18ac7866c15bb8e34"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-io",
+ "futures-macro",
+ "futures-sink",
+ "futures-task",
+ "memchr",
+ "pin-project 1.0.1",
+ "pin-utils",
+ "proc-macro-hack",
+ "proc-macro-nested",
+ "slab",
+]
+
+[[package]]
+name = "gcs_example"
+version = "0.1.0"
+dependencies = [
+ "anyhow",
+ "async-google-apis-common",
+ "chrono",
+ "clap",
+ "env_logger",
+ "hyper",
+ "hyper-rustls",
+ "serde",
+ "tokio",
+]
+
+[[package]]
+name = "h2"
+version = "0.2.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5e4728fd124914ad25e99e3d15a9361a879f6620f63cb56bbb08f95abb97a535"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "futures-sink",
+ "futures-util",
+ "http",
+ "indexmap",
+ "slab",
+ "tokio",
+ "tokio-util",
+ "tracing",
+ "tracing-futures",
+]
+
+[[package]]
+name = "hashbrown"
+version = "0.9.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
+
+[[package]]
+name = "hermit-abi"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "http"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
+dependencies = [
+ "bytes",
+ "fnv",
+ "itoa",
+]
+
+[[package]]
+name = "http-body"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
+dependencies = [
+ "bytes",
+ "http",
+]
+
+[[package]]
+name = "httparse"
+version = "1.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
+
+[[package]]
+name = "httpdate"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
+
+[[package]]
+name = "humantime"
+version = "2.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3c1ad908cc71012b7bea4d0c53ba96a8cba9962f048fa68d143376143d863b7a"
+
+[[package]]
+name = "hyper"
+version = "0.13.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
+dependencies = [
+ "bytes",
+ "futures-channel",
+ "futures-core",
+ "futures-util",
+ "h2",
+ "http",
+ "http-body",
+ "httparse",
+ "httpdate",
+ "itoa",
+ "pin-project 0.4.27",
+ "socket2",
+ "tokio",
+ "tower-service",
+ "tracing",
+ "want",
+]
+
+[[package]]
+name = "hyper-rustls"
+version = "0.20.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
+dependencies = [
+ "bytes",
+ "ct-logs",
+ "futures-util",
+ "hyper",
+ "log",
+ "rustls",
+ "rustls-native-certs",
+ "tokio",
+ "tokio-rustls",
+ "webpki",
+]
+
+[[package]]
+name = "idna"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
+dependencies = [
+ "matches",
+ "unicode-bidi",
+ "unicode-normalization",
+]
+
+[[package]]
+name = "indexmap"
+version = "1.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
+dependencies = [
+ "autocfg",
+ "hashbrown",
+]
+
+[[package]]
+name = "iovec"
+version = "0.1.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "itoa"
+version = "0.4.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
+
+[[package]]
+name = "js-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
+dependencies = [
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "kernel32-sys"
+version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "lazy_static"
+version = "1.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
+
+[[package]]
+name = "libc"
+version = "0.2.80"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d58d1b70b004888f764dfbf6a26a3b0342a1632d33968e4a179d8011c760614"
+
+[[package]]
+name = "log"
+version = "0.4.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
+dependencies = [
+ "cfg-if",
+]
+
+[[package]]
+name = "matches"
+version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
+
+[[package]]
+name = "memchr"
+version = "2.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
+
+[[package]]
+name = "mio"
+version = "0.6.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
+dependencies = [
+ "cfg-if",
+ "fuchsia-zircon",
+ "fuchsia-zircon-sys",
+ "iovec",
+ "kernel32-sys",
+ "libc",
+ "log",
+ "miow",
+ "net2",
+ "slab",
+ "winapi 0.2.8",
+]
+
+[[package]]
+name = "miow"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
+dependencies = [
+ "kernel32-sys",
+ "net2",
+ "winapi 0.2.8",
+ "ws2_32-sys",
+]
+
+[[package]]
+name = "net2"
+version = "0.2.35"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "num-integer"
+version = "0.1.43"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
+dependencies = [
+ "autocfg",
+ "num-traits",
+]
+
+[[package]]
+name = "num-traits"
+version = "0.2.12"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
+dependencies = [
+ "autocfg",
+]
+
+[[package]]
+name = "once_cell"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
+
+[[package]]
+name = "openssl-probe"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
+
+[[package]]
+name = "percent-encoding"
+version = "2.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
+
+[[package]]
+name = "pin-project"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
+dependencies = [
+ "pin-project-internal 0.4.27",
+]
+
+[[package]]
+name = "pin-project"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ee41d838744f60d959d7074e3afb6b35c7456d0f61cad38a24e35e6553f73841"
+dependencies = [
+ "pin-project-internal 1.0.1",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "81a4ffa594b66bff340084d4081df649a7dc049ac8d7fc458d8e628bfbbb2f86"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-lite"
+version = "0.1.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b"
+
+[[package]]
+name = "pin-utils"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
+
+[[package]]
+name = "proc-macro-hack"
+version = "0.5.18"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
+
+[[package]]
+name = "proc-macro-nested"
+version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
+
+[[package]]
+name = "proc-macro2"
+version = "1.0.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
+dependencies = [
+ "unicode-xid",
+]
+
+[[package]]
+name = "quote"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
+dependencies = [
+ "proc-macro2",
+]
+
+[[package]]
+name = "radix64"
+version = "0.6.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
+dependencies = [
+ "arrayref",
+ "cfg-if",
+]
+
+[[package]]
+name = "redox_syscall"
+version = "0.1.57"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
+
+[[package]]
+name = "regex"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8963b85b8ce3074fecffde43b4b0dded83ce2f367dc8d363afc56679f3ee820b"
+dependencies = [
+ "aho-corasick",
+ "memchr",
+ "regex-syntax",
+ "thread_local",
+]
+
+[[package]]
+name = "regex-syntax"
+version = "0.6.20"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8cab7a364d15cde1e505267766a2d3c4e22a843e1a601f0fa7564c0f82ced11c"
+
+[[package]]
+name = "ring"
+version = "0.16.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
+dependencies = [
+ "cc",
+ "libc",
+ "once_cell",
+ "spin",
+ "untrusted",
+ "web-sys",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "rustls"
+version = "0.17.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
+dependencies = [
+ "base64 0.11.0",
+ "log",
+ "ring",
+ "sct",
+ "webpki",
+]
+
+[[package]]
+name = "rustls-native-certs"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
+dependencies = [
+ "openssl-probe",
+ "rustls",
+ "schannel",
+ "security-framework",
+]
+
+[[package]]
+name = "ryu"
+version = "1.0.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
+
+[[package]]
+name = "schannel"
+version = "0.1.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
+dependencies = [
+ "lazy_static",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "sct"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "seahash"
+version = "4.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
+
+[[package]]
+name = "security-framework"
+version = "0.4.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
+dependencies = [
+ "bitflags",
+ "core-foundation",
+ "core-foundation-sys",
+ "libc",
+ "security-framework-sys",
+]
+
+[[package]]
+name = "security-framework-sys"
+version = "0.4.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "serde"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
+dependencies = [
+ "serde_derive",
+]
+
+[[package]]
+name = "serde_derive"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "serde_json"
+version = "1.0.59"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
+dependencies = [
+ "itoa",
+ "ryu",
+ "serde",
+]
+
+[[package]]
+name = "slab"
+version = "0.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
+
+[[package]]
+name = "socket2"
+version = "0.3.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "redox_syscall",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "spin"
+version = "0.5.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
+
+[[package]]
+name = "strsim"
+version = "0.8.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
+
+[[package]]
+name = "syn"
+version = "1.0.48"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cc371affeffc477f42a221a1e4297aedcea33d47d19b61455588bd9d8f6b19ac"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "unicode-xid",
+]
+
+[[package]]
+name = "termcolor"
+version = "1.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f"
+dependencies = [
+ "winapi-util",
+]
+
+[[package]]
+name = "textwrap"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
+dependencies = [
+ "unicode-width",
+]
+
+[[package]]
+name = "thread_local"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "time"
+version = "0.1.44"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
+dependencies = [
+ "libc",
+ "wasi",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "tinyvec"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
+
+[[package]]
+name = "tokio"
+version = "0.2.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "iovec",
+ "lazy_static",
+ "memchr",
+ "mio",
+ "pin-project-lite",
+ "slab",
+ "tokio-macros",
+]
+
+[[package]]
+name = "tokio-macros"
+version = "0.2.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "tokio-rustls"
+version = "0.13.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
+dependencies = [
+ "futures-core",
+ "rustls",
+ "tokio",
+ "webpki",
+]
+
+[[package]]
+name = "tokio-util"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
+dependencies = [
+ "bytes",
+ "futures-core",
+ "futures-sink",
+ "log",
+ "pin-project-lite",
+ "tokio",
+]
+
+[[package]]
+name = "tower-service"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
+
+[[package]]
+name = "tracing"
+version = "0.1.21"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
+dependencies = [
+ "cfg-if",
+ "log",
+ "pin-project-lite",
+ "tracing-core",
+]
+
+[[package]]
+name = "tracing-core"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "tracing-futures"
+version = "0.2.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c"
+dependencies = [
+ "pin-project 0.4.27",
+ "tracing",
+]
+
+[[package]]
+name = "try-lock"
+version = "0.2.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
+
+[[package]]
+name = "unicode-bidi"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
+dependencies = [
+ "matches",
+]
+
+[[package]]
+name = "unicode-normalization"
+version = "0.1.13"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
+dependencies = [
+ "tinyvec",
+]
+
+[[package]]
+name = "unicode-width"
+version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "9337591893a19b88d8d87f2cec1e73fad5cdfd10e5a6f349f498ad6ea2ffb1e3"
+
+[[package]]
+name = "unicode-xid"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
+
+[[package]]
+name = "untrusted"
+version = "0.7.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
+
+[[package]]
+name = "url"
+version = "2.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
+dependencies = [
+ "idna",
+ "matches",
+ "percent-encoding",
+]
+
+[[package]]
+name = "vec_map"
+version = "0.8.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f1bddf1187be692e79c5ffeab891132dfb0f236ed36a43c7ed39f1165ee20191"
+
+[[package]]
+name = "want"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
+dependencies = [
+ "log",
+ "try-lock",
+]
+
+[[package]]
+name = "wasi"
+version = "0.10.0+wasi-snapshot-preview1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
+
+[[package]]
+name = "wasm-bindgen"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
+dependencies = [
+ "cfg-if",
+ "wasm-bindgen-macro",
+]
+
+[[package]]
+name = "wasm-bindgen-backend"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
+dependencies = [
+ "bumpalo",
+ "lazy_static",
+ "log",
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-macro"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
+dependencies = [
+ "quote",
+ "wasm-bindgen-macro-support",
+]
+
+[[package]]
+name = "wasm-bindgen-macro-support"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-backend",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-shared"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
+
+[[package]]
+name = "web-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
+dependencies = [
+ "js-sys",
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "webpki"
+version = "0.21.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "winapi"
+version = "0.2.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
+
+[[package]]
+name = "winapi"
+version = "0.3.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
+dependencies = [
+ "winapi-i686-pc-windows-gnu",
+ "winapi-x86_64-pc-windows-gnu",
+]
+
+[[package]]
+name = "winapi-build"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
+
+[[package]]
+name = "winapi-i686-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
+
+[[package]]
+name = "winapi-util"
+version = "0.1.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
+dependencies = [
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "winapi-x86_64-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
+
+[[package]]
+name = "ws2_32-sys"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "yup-oauth2"
+version = "4.1.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "92ed435d48d4c834ee654443dd3330399f9656506d7477ec645df58e406a25db"
+dependencies = [
+ "base64 0.12.3",
+ "chrono",
+ "futures",
+ "http",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "rustls",
+ "seahash",
+ "serde",
+ "serde_json",
+ "tokio",
+ "url",
+]
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/gcs_example/Cargo.toml	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,19 @@
+[package]
+name = "gcs_example"
+version = "0.1.0"
+authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
+edition = "2018"
+
+# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
+
+[dependencies]
+async-google-apis-common = { path = "../async-google-apis-common" }
+
+anyhow = "~1.0"
+chrono = "~0.4"
+clap = "~2.33"
+serde = "~1.0"
+env_logger = "~0.8"
+hyper-rustls = "~0.20"
+hyper = "~0.13"
+tokio = { version = "~0.2", features = ["rt-core", "io-util", "macros", "fs"] }
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/gcs_example/README.md	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,34 @@
+# `gcs_example`
+
+This example binary can upload/download/list objects in Google Cloud Storage
+buckets.
+
+## Usage
+
+Expects a service account key in the
+`client_secret.json` file. You can download it from the Cloud console, and it
+should look roughly like this:
+
+```json
+{
+  "type": "service_account",
+  "project_id": "project",
+  "private_key_id": "...key id...",
+  "private_key": "...private key...",
+  "client_email": "account@project.iam.gserviceaccount.com",
+  "client_id": "106100510664759551719",
+  "auth_uri": "https://accounts.google.com/o/oauth2/auth",
+  "token_uri": "https://oauth2.googleapis.com/token",
+  "auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
+  "client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/account@project.iam.gserviceaccount.com"
+}
+```
+
+You can then find out more by running
+
+```bash
+$ gcs_example --help
+```
+
+Run with `RUST_LOG=debug` in order to see an accurate record of HTTP requests
+being sent and received.
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/gcs_example/src/main.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,227 @@
+mod storage_v1_types;
+
+use anyhow::Context;
+use async_google_apis_common as common;
+use env_logger;
+
+use std::path::Path;
+
+/// Create a new HTTPS client.
+fn https_client() -> common::TlsClient {
+    let conn = hyper_rustls::HttpsConnector::new();
+    let cl = hyper::Client::builder().build(conn);
+    cl
+}
+
+async fn upload_file(
+    mut cl: storage_v1_types::ObjectsService,
+    bucket: &str,
+    p: &Path,
+    prefix: &str,
+) -> common::Result<()> {
+    let mut params = storage_v1_types::ObjectsInsertParams::default();
+    params.bucket = bucket.into();
+    assert!(prefix.ends_with("/") || prefix.is_empty());
+    params.name = Some(prefix.to_string() + p.file_name().unwrap().to_str().unwrap());
+    let obj = storage_v1_types::Object::default();
+
+    let f = tokio::fs::OpenOptions::new().read(true).open(p).await?;
+    let result = cl
+        .insert_resumable_upload(&params, &obj)
+        .await?
+        .set_max_chunksize(1024 * 1024 * 5)?
+        .upload_file(f)
+        .await?;
+
+    println!("Uploaded object: {:?}", result);
+
+    Ok(())
+}
+
+async fn download_file(
+    mut cl: storage_v1_types::ObjectsService,
+    bucket: &str,
+    id: &str,
+) -> common::Result<()> {
+    // Set alt=media for download.
+    let mut gparams = storage_v1_types::StorageParams::default();
+    gparams.alt = Some("media".into());
+    let mut params = storage_v1_types::ObjectsGetParams::default();
+    params.storage_params = Some(gparams);
+    params.bucket = bucket.into();
+    params.object = id.into();
+
+    let id = id.replace("/", "_");
+    let mut f = tokio::fs::OpenOptions::new()
+        .write(true)
+        .create(true)
+        .open(id)
+        .await?;
+    let mut download = cl.get(&params).await?;
+
+    // Now run the actual download.
+    let result = download.do_it(Some(&mut f)).await?;
+    match result {
+        common::DownloadResult::Downloaded => println!("Downloaded object successfully."),
+        common::DownloadResult::Response(_) => panic!("Received response but expected download."),
+    }
+
+    Ok(())
+}
+
+fn print_objects(objs: &storage_v1_types::Objects) {
+    if let Some(ref objs) = objs.items {
+        for obj in objs.iter() {
+            println!(
+                "{} ({} B), class {}. Created @ {} by {}. => {}",
+                obj.name.as_ref().unwrap_or(&"(unknown name)".into()),
+                obj.size.as_ref().unwrap_or(&"(unknown size)".into()),
+                obj.storage_class
+                    .as_ref()
+                    .unwrap_or(&"(unknown class)".into()),
+                obj.time_created
+                    .as_ref()
+                    .map(|dt| format!("{}", dt))
+                    .unwrap_or("(unknown time)".into()),
+                obj.owner
+                    .as_ref()
+                    .unwrap_or(&Default::default())
+                    .entity
+                    .as_ref()
+                    .unwrap_or(&"".into()),
+                obj.media_link.as_ref().unwrap_or(&"(unknown link)".into())
+            );
+        }
+    }
+}
+
+async fn list_objects(
+    mut cl: storage_v1_types::ObjectsService,
+    bucket: &str,
+    prefix: &str,
+) -> common::Result<()> {
+    let mut params = storage_v1_types::ObjectsListParams::default();
+    params.bucket = bucket.into();
+    params.prefix = Some(prefix.into());
+    params.storage_params = Some(storage_v1_types::StorageParams::default());
+    params.storage_params.as_mut().unwrap().fields = Some("*".into());
+
+    let mut npt = None;
+    loop {
+        params.page_token = npt.take();
+        let result = cl.list(&params).await?;
+        print_objects(&result);
+        if result.next_page_token.is_some() {
+            npt = result.next_page_token.clone();
+        } else {
+            break;
+        }
+    }
+    Ok(())
+}
+
+async fn rm_object(
+    mut cl: storage_v1_types::ObjectsService,
+    bucket: &str,
+    id: &str,
+) -> common::Result<()> {
+    let mut params = storage_v1_types::ObjectsDeleteParams::default();
+    params.bucket = bucket.into();
+    params.object = id.into();
+
+    cl.delete(&params).await
+}
+
+#[tokio::main]
+async fn main() {
+    env_logger::init();
+
+    let matches = clap::App::new("gcs_example")
+        .version("0.1")
+        .about("Upload objects to GCS.")
+        .arg(
+            clap::Arg::with_name("BUCKET")
+                .help("target bucket")
+                .long("bucket")
+                .required(true)
+                .short("b")
+                .takes_value(true),
+        )
+        .arg(
+            clap::Arg::with_name("ACTION")
+                .help("What to do.")
+                .long("action")
+                .possible_values(&["get", "list", "put", "rm"])
+                .required(true)
+                .short("a")
+                .takes_value(true),
+        )
+        .arg(
+            clap::Arg::with_name("PREFIX")
+                .help("When listing with -a list: Prefix of objects to list. When uploading with -a put: Prefix to prepend to filename.")
+                .long("prefix")
+                .short("p")
+                .takes_value(true),
+        )
+        .arg(
+            clap::Arg::with_name("FILE_OR_OBJECT")
+                .help("File to upload")
+                .index(1),
+        )
+        .get_matches();
+
+    let https_client = https_client();
+    let service_account_key = common::yup_oauth2::read_service_account_key("client_secret.json")
+        .await
+        .map_err(anyhow::Error::from)
+        .context("client_secret.json")
+        .unwrap();
+    let authenticator =
+        common::yup_oauth2::ServiceAccountAuthenticator::builder(service_account_key)
+            .hyper_client(https_client.clone())
+            .persist_tokens_to_disk("tokencache.json")
+            .build()
+            .await
+            .expect("ServiceAccount authenticator failed.");
+    let authenticator = std::rc::Rc::new(authenticator);
+
+    let action = matches.value_of("ACTION").expect("--action is required.");
+    let buck = matches
+        .value_of("BUCKET")
+        .expect("--bucket is a mandatory argument.");
+
+    let cl = storage_v1_types::ObjectsService::new(https_client, authenticator);
+
+    if action == "get" {
+        let obj = matches
+            .value_of("FILE_OR_OBJECT")
+            .expect("OBJECT is a mandatory argument.");
+        download_file(cl, buck, obj)
+            .await
+            .expect("Download failed :(");
+    } else if action == "put" {
+        let fp = matches
+            .value_of("FILE_OR_OBJECT")
+            .expect("FILE is a mandatory argument.");
+        let mut pre = matches.value_of("PREFIX").unwrap_or("").to_string();
+        if !pre.ends_with("/") && !pre.is_empty() {
+            pre = pre.to_string() + "/";
+        }
+        upload_file(cl, buck, Path::new(&fp), &pre)
+            .await
+            .expect("Upload failed :(");
+        return;
+    } else if action == "list" {
+        let prefix = matches.value_of("PREFIX").unwrap_or("");
+        list_objects(cl, buck, prefix)
+            .await
+            .expect("List failed :(");
+        return;
+    } else if action == "rm" {
+        let obj = matches
+            .value_of("FILE_OR_OBJECT")
+            .expect("OBJECT is a mandatory argument.");
+        rm_object(cl, buck, obj).await.expect("rm failed :(");
+        return;
+    }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/example_crates/gcs_example/src/storage_v1_types.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,7010 @@
+#![allow(unused_variables, unused_mut, dead_code)]
+//! This file was generated by async-google-apis. (https://github.com/dermesser/async-google-apis)
+//!
+//! (c) 2020 Lewin Bormann <lbo@spheniscida.de>
+//!
+//! ## Getting started
+//!
+//! **Tip**: Take a look at those types ending in `...Service`. These represent API resources
+//! and contain methods to interact with an API. The remaining types are used by those methods
+//! and can be explored starting from a method you want to use.
+//!
+//! I'd be happy if you let me know about your use case of this code.
+//!
+//! THIS FILE HAS BEEN GENERATED -- SAVE ANY MODIFICATIONS BEFORE REPLACING.
+
+use async_google_apis_common::*;
+
+/// Scopes of this API. Convertible to their string representation with `AsRef`.
+#[derive(Debug, Clone, Copy)]
+pub enum StorageScopes {
+    /// View and manage your data across Google Cloud Platform services
+    ///
+    /// URL: https://www.googleapis.com/auth/cloud-platform
+    CloudPlatform,
+    /// View your data across Google Cloud Platform services
+    ///
+    /// URL: https://www.googleapis.com/auth/cloud-platform.read-only
+    CloudPlatformReadOnly,
+    /// Manage your data and permissions in Google Cloud Storage
+    ///
+    /// URL: https://www.googleapis.com/auth/devstorage.full_control
+    DevstorageFullControl,
+    /// View your data in Google Cloud Storage
+    ///
+    /// URL: https://www.googleapis.com/auth/devstorage.read_only
+    DevstorageReadOnly,
+    /// Manage your data in Google Cloud Storage
+    ///
+    /// URL: https://www.googleapis.com/auth/devstorage.read_write
+    DevstorageReadWrite,
+}
+
+impl std::convert::AsRef<str> for StorageScopes {
+    fn as_ref(&self) -> &'static str {
+        match self {
+            StorageScopes::CloudPlatform => "https://www.googleapis.com/auth/cloud-platform",
+            StorageScopes::CloudPlatformReadOnly => {
+                "https://www.googleapis.com/auth/cloud-platform.read-only"
+            }
+            StorageScopes::DevstorageFullControl => {
+                "https://www.googleapis.com/auth/devstorage.full_control"
+            }
+            StorageScopes::DevstorageReadOnly => {
+                "https://www.googleapis.com/auth/devstorage.read_only"
+            }
+            StorageScopes::DevstorageReadWrite => {
+                "https://www.googleapis.com/auth/devstorage.read_write"
+            }
+        }
+    }
+}
+
+/// The bucket's billing configuration.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketBilling {
+    /// When set to true, Requester Pays is enabled for this bucket.
+    #[serde(rename = "requesterPays")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub requester_pays: Option<bool>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketCors {
+    /// The value, in seconds, to return in the  Access-Control-Max-Age header used in preflight responses.
+    #[serde(rename = "maxAgeSeconds")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub max_age_seconds: Option<i32>,
+    /// The list of HTTP methods on which to include CORS response headers, (GET, OPTIONS, POST, etc) Note: "*" is permitted in the list of methods, and means "any method".
+    #[serde(rename = "method")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub method: Option<Vec<String>>,
+    /// The list of Origins eligible to receive CORS response headers. Note: "*" is permitted in the list of origins, and means "any Origin".
+    #[serde(rename = "origin")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub origin: Option<Vec<String>>,
+    /// The list of HTTP headers other than the simple response headers to give permission for the user-agent to share across domains.
+    #[serde(rename = "responseHeader")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub response_header: Option<Vec<String>>,
+}
+
+/// Encryption configuration for a bucket.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketEncryption {
+    /// A Cloud KMS key that will be used to encrypt objects inserted into this bucket, if no encryption method is specified.
+    #[serde(rename = "defaultKmsKeyName")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub default_kms_key_name: Option<String>,
+}
+
+/// The bucket's uniform bucket-level access configuration. The feature was formerly known as Bucket Policy Only. For backward compatibility, this field will be populated with identical information as the uniformBucketLevelAccess field. We recommend using the uniformBucketLevelAccess field to enable and disable the feature.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketIamConfigurationBucketPolicyOnly {
+    /// If set, access is controlled only by bucket-level or above IAM policies.
+    #[serde(rename = "enabled")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub enabled: Option<bool>,
+    /// DateTime: The deadline for changing iamConfiguration.bucketPolicyOnly.enabled from true to false in RFC 3339 format. iamConfiguration.bucketPolicyOnly.enabled may be changed from true to false until the locked time, after which the field is immutable.
+    #[serde(rename = "lockedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub locked_time: Option<DateTime<Utc>>,
+}
+
+/// The bucket's uniform bucket-level access configuration.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketIamConfigurationUniformBucketLevelAccess {
+    /// If set, access is controlled only by bucket-level or above IAM policies.
+    #[serde(rename = "enabled")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub enabled: Option<bool>,
+    /// DateTime: The deadline for changing iamConfiguration.uniformBucketLevelAccess.enabled from true to false in RFC 3339  format. iamConfiguration.uniformBucketLevelAccess.enabled may be changed from true to false until the locked time, after which the field is immutable.
+    #[serde(rename = "lockedTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub locked_time: Option<DateTime<Utc>>,
+}
+
+/// The bucket's IAM configuration.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketIamConfiguration {
+    /// The bucket's uniform bucket-level access configuration. The feature was formerly known as Bucket Policy Only. For backward compatibility, this field will be populated with identical information as the uniformBucketLevelAccess field. We recommend using the uniformBucketLevelAccess field to enable and disable the feature.
+    #[serde(rename = "bucketPolicyOnly")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub bucket_policy_only: Option<BucketIamConfigurationBucketPolicyOnly>,
+    /// The bucket's uniform bucket-level access configuration.
+    #[serde(rename = "uniformBucketLevelAccess")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub uniform_bucket_level_access: Option<BucketIamConfigurationUniformBucketLevelAccess>,
+}
+
+/// The action to take.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketLifecycleRuleAction {
+    /// Target storage class. Required iff the type of the action is SetStorageClass.
+    #[serde(rename = "storageClass")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub storage_class: Option<String>,
+    /// Type of the action. Currently, only Delete and SetStorageClass are supported.
+    #[serde(rename = "type")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub typ: Option<String>,
+}
+
+/// The condition(s) under which the action will be taken.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketLifecycleRuleCondition {
+    /// Age of an object (in days). This condition is satisfied when an object reaches the specified age.
+    #[serde(rename = "age")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub age: Option<i32>,
+    /// A date in RFC 3339 format with only the date part (for instance, "2013-01-15"). This condition is satisfied when an object is created before midnight of the specified date in UTC.
+    #[serde(rename = "createdBefore")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub created_before: Option<String>,
+    /// A date in RFC 3339 format with only the date part (for instance, "2013-01-15"). This condition is satisfied when the custom time on an object is before this date in UTC.
+    #[serde(rename = "customTimeBefore")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub custom_time_before: Option<String>,
+    /// Number of days elapsed since the user-specified timestamp set on an object. The condition is satisfied if the days elapsed is at least this number. If no custom timestamp is specified on an object, the condition does not apply.
+    #[serde(rename = "daysSinceCustomTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub days_since_custom_time: Option<i32>,
+    /// Number of days elapsed since the noncurrent timestamp of an object. The condition is satisfied if the days elapsed is at least this number. This condition is relevant only for versioned objects. The value of the field must be a nonnegative integer. If it's zero, the object version will become eligible for Lifecycle action as soon as it becomes noncurrent.
+    #[serde(rename = "daysSinceNoncurrentTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub days_since_noncurrent_time: Option<i32>,
+    /// Relevant only for versioned objects. If the value is true, this condition matches live objects; if the value is false, it matches archived objects.
+    #[serde(rename = "isLive")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub is_live: Option<bool>,
+    /// A regular expression that satisfies the RE2 syntax. This condition is satisfied when the name of the object matches the RE2 pattern. Note: This feature is currently in the "Early Access" launch stage and is only available to a whitelisted set of users; that means that this feature may be changed in backward-incompatible ways and that it is not guaranteed to be released.
+    #[serde(rename = "matchesPattern")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub matches_pattern: Option<String>,
+    /// Objects having any of the storage classes specified by this condition will be matched. Values include MULTI_REGIONAL, REGIONAL, NEARLINE, COLDLINE, ARCHIVE, STANDARD, and DURABLE_REDUCED_AVAILABILITY.
+    #[serde(rename = "matchesStorageClass")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub matches_storage_class: Option<Vec<String>>,
+    /// A date in RFC 3339 format with only the date part (for instance, "2013-01-15"). This condition is satisfied when the noncurrent time on an object is before this date in UTC. This condition is relevant only for versioned objects.
+    #[serde(rename = "noncurrentTimeBefore")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub noncurrent_time_before: Option<String>,
+    /// Relevant only for versioned objects. If the value is N, this condition is satisfied when there are at least N versions (including the live version) newer than this version of the object.
+    #[serde(rename = "numNewerVersions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub num_newer_versions: Option<i32>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketLifecycleRule {
+    /// The action to take.
+    #[serde(rename = "action")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub action: Option<BucketLifecycleRuleAction>,
+    /// The condition(s) under which the action will be taken.
+    #[serde(rename = "condition")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub condition: Option<BucketLifecycleRuleCondition>,
+}
+
+/// The bucket's lifecycle configuration. See lifecycle management for more information.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketLifecycle {
+    /// A lifecycle management rule, which is made of an action to take and the condition(s) under which the action will be taken.
+    #[serde(rename = "rule")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub rule: Option<Vec<BucketLifecycleRule>>,
+}
+
+/// The bucket's logging configuration, which defines the destination bucket and optional name prefix for the current bucket's logs.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketLogging {
+    /// The destination bucket where the current bucket's logs should be placed.
+    #[serde(rename = "logBucket")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub log_bucket: Option<String>,
+    /// A prefix for log object names.
+    #[serde(rename = "logObjectPrefix")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub log_object_prefix: Option<String>,
+}
+
+/// The owner of the bucket. This is always the project team's owner group.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketOwner {
+    /// The entity, in the form project-owner-projectId.
+    #[serde(rename = "entity")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity: Option<String>,
+    /// The ID for the entity.
+    #[serde(rename = "entityId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity_id: Option<String>,
+}
+
+/// The bucket's retention policy. The retention policy enforces a minimum retention time for all objects contained in the bucket, based on their creation time. Any attempt to overwrite or delete objects younger than the retention period will result in a PERMISSION_DENIED error. An unlocked retention policy can be modified or removed from the bucket via a storage.buckets.update operation. A locked retention policy cannot be removed or shortened in duration for the lifetime of the bucket. Attempting to remove or decrease period of a locked retention policy will result in a PERMISSION_DENIED error.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketRetentionPolicy {
+    /// DateTime: Server-determined value that indicates the time from which policy was enforced and effective. This value is in RFC 3339 format.
+    #[serde(rename = "effectiveTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub effective_time: Option<DateTime<Utc>>,
+    /// Once locked, an object retention policy cannot be modified.
+    #[serde(rename = "isLocked")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub is_locked: Option<bool>,
+    /// i64: The duration in seconds that objects need to be retained. Retention duration must be greater than zero and less than 100 years. Note that enforcement of retention periods less than a day is not guaranteed. Such periods should only be used for testing purposes.
+    #[serde(rename = "retentionPeriod")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub retention_period: Option<String>,
+}
+
+/// The bucket's versioning configuration.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketVersioning {
+    /// While set to true, versioning is fully enabled for this bucket.
+    #[serde(rename = "enabled")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub enabled: Option<bool>,
+}
+
+/// The bucket's website configuration, controlling how the service behaves when accessing bucket contents as a web site. See the Static Website Examples for more information.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketWebsite {
+    /// If the requested object path is missing, the service will ensure the path has a trailing '/', append this suffix, and attempt to retrieve the resulting object. This allows the creation of index.html objects to represent directory pages.
+    #[serde(rename = "mainPageSuffix")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub main_page_suffix: Option<String>,
+    /// If the requested object path is missing, and any mainPageSuffix object is missing, if applicable, the service will return the named object from this bucket as the content for a 404 Not Found result.
+    #[serde(rename = "notFoundPage")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub not_found_page: Option<String>,
+}
+
+/// A bucket.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Bucket {
+    /// Access controls on the bucket.
+    #[serde(rename = "acl")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub acl: Option<Vec<BucketAccessControl>>,
+    /// The bucket's billing configuration.
+    #[serde(rename = "billing")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub billing: Option<BucketBilling>,
+    /// The bucket's Cross-Origin Resource Sharing (CORS) configuration.
+    #[serde(rename = "cors")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub cors: Option<Vec<BucketCors>>,
+    /// The default value for event-based hold on newly created objects in this bucket. Event-based hold is a way to retain objects indefinitely until an event occurs, signified by the hold's release. After being released, such objects will be subject to bucket-level retention (if any). One sample use case of this flag is for banks to hold loan documents for at least 3 years after loan is paid in full. Here, bucket-level retention is 3 years and the event is loan being paid in full. In this example, these objects will be held intact for any number of years until the event has occurred (event-based hold on the object is released) and then 3 more years after that. That means retention duration of the objects begins from the moment event-based hold transitioned from true to false. Objects under event-based hold cannot be deleted, overwritten or archived until the hold is removed.
+    #[serde(rename = "defaultEventBasedHold")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub default_event_based_hold: Option<bool>,
+    /// Default access controls to apply to new objects when no ACL is provided.
+    #[serde(rename = "defaultObjectAcl")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub default_object_acl: Option<Vec<ObjectAccessControl>>,
+    /// Encryption configuration for a bucket.
+    #[serde(rename = "encryption")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub encryption: Option<BucketEncryption>,
+    /// HTTP 1.1 Entity tag for the bucket.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// The bucket's IAM configuration.
+    #[serde(rename = "iamConfiguration")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub iam_configuration: Option<BucketIamConfiguration>,
+    /// The ID of the bucket. For buckets, the id and name properties are the same.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The kind of item this is. For buckets, this is always storage#bucket.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// User-provided labels, in key/value pairs.
+    #[serde(rename = "labels")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub labels: Option<HashMap<String, String>>,
+    /// The bucket's lifecycle configuration. See lifecycle management for more information.
+    #[serde(rename = "lifecycle")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub lifecycle: Option<BucketLifecycle>,
+    /// The location of the bucket. Object data for objects in the bucket resides in physical storage within this region. Defaults to US. See the developer's guide for the authoritative list.
+    #[serde(rename = "location")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub location: Option<String>,
+    /// The type of the bucket location.
+    #[serde(rename = "locationType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub location_type: Option<String>,
+    /// The bucket's logging configuration, which defines the destination bucket and optional name prefix for the current bucket's logs.
+    #[serde(rename = "logging")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub logging: Option<BucketLogging>,
+    /// i64: The metadata generation of this bucket.
+    #[serde(rename = "metageneration")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub metageneration: Option<String>,
+    /// The name of the bucket.
+    #[serde(rename = "name")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub name: Option<String>,
+    /// The owner of the bucket. This is always the project team's owner group.
+    #[serde(rename = "owner")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub owner: Option<BucketOwner>,
+    /// u64: The project number of the project the bucket belongs to.
+    #[serde(rename = "projectNumber")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub project_number: Option<String>,
+    /// The bucket's retention policy. The retention policy enforces a minimum retention time for all objects contained in the bucket, based on their creation time. Any attempt to overwrite or delete objects younger than the retention period will result in a PERMISSION_DENIED error. An unlocked retention policy can be modified or removed from the bucket via a storage.buckets.update operation. A locked retention policy cannot be removed or shortened in duration for the lifetime of the bucket. Attempting to remove or decrease period of a locked retention policy will result in a PERMISSION_DENIED error.
+    #[serde(rename = "retentionPolicy")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub retention_policy: Option<BucketRetentionPolicy>,
+    /// The URI of this bucket.
+    #[serde(rename = "selfLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub self_link: Option<String>,
+    /// The bucket's default storage class, used whenever no storageClass is specified for a newly-created object. This defines how objects in the bucket are stored and determines the SLA and the cost of storage. Values include MULTI_REGIONAL, REGIONAL, STANDARD, NEARLINE, COLDLINE, ARCHIVE, and DURABLE_REDUCED_AVAILABILITY. If this value is not specified when the bucket is created, it will default to STANDARD. For more information, see storage classes.
+    #[serde(rename = "storageClass")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub storage_class: Option<String>,
+    /// DateTime: The creation time of the bucket in RFC 3339 format.
+    #[serde(rename = "timeCreated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time_created: Option<DateTime<Utc>>,
+    /// DateTime: The modification time of the bucket in RFC 3339 format.
+    #[serde(rename = "updated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub updated: Option<DateTime<Utc>>,
+    /// The bucket's versioning configuration.
+    #[serde(rename = "versioning")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub versioning: Option<BucketVersioning>,
+    /// The bucket's website configuration, controlling how the service behaves when accessing bucket contents as a web site. See the Static Website Examples for more information.
+    #[serde(rename = "website")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub website: Option<BucketWebsite>,
+    /// The zone or zones from which the bucket is intended to use zonal quota. Requests for data from outside the specified affinities are still allowed but won't be able to use zonal quota. The zone or zones need to be within the bucket location otherwise the requests will fail with a 400 Bad Request response.
+    #[serde(rename = "zoneAffinity")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub zone_affinity: Option<Vec<String>>,
+}
+
+/// The project team associated with the entity, if any.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlProjectTeam {
+    /// The project number.
+    #[serde(rename = "projectNumber")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub project_number: Option<String>,
+    /// The team.
+    #[serde(rename = "team")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team: Option<String>,
+}
+
+/// An access-control entry.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControl {
+    /// The name of the bucket.
+    #[serde(rename = "bucket")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub bucket: Option<String>,
+    /// The domain associated with the entity, if any.
+    #[serde(rename = "domain")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub domain: Option<String>,
+    /// The email address associated with the entity, if any.
+    #[serde(rename = "email")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub email: Option<String>,
+    /// The entity holding the permission, in one of the following forms:  - user-userId  - user-email  - group-groupId  - group-email  - domain-domain  - project-team-projectId  - allUsers  - allAuthenticatedUsers Examples:  - The user liz@example.com would be user-liz@example.com.  - The group example@googlegroups.com would be group-example@googlegroups.com.  - To refer to all members of the Google Apps for Business domain example.com, the entity would be domain-example.com.
+    #[serde(rename = "entity")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity: Option<String>,
+    /// The ID for the entity, if any.
+    #[serde(rename = "entityId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity_id: Option<String>,
+    /// HTTP 1.1 Entity tag for the access-control entry.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// The ID of the access-control entry.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The kind of item this is. For bucket access control entries, this is always storage#bucketAccessControl.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The project team associated with the entity, if any.
+    #[serde(rename = "projectTeam")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub project_team: Option<BucketAccessControlProjectTeam>,
+    /// The access permission for the entity.
+    #[serde(rename = "role")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub role: Option<String>,
+    /// The link to this access-control entry.
+    #[serde(rename = "selfLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub self_link: Option<String>,
+}
+
+/// An access-control list.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControls {
+    /// The list of items.
+    #[serde(rename = "items")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub items: Option<Vec<BucketAccessControl>>,
+    /// The kind of item this is. For lists of bucket access control entries, this is always storage#bucketAccessControls.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+}
+
+/// A list of buckets.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Buckets {
+    /// The list of items.
+    #[serde(rename = "items")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub items: Option<Vec<Bucket>>,
+    /// The kind of item this is. For lists of buckets, this is always storage#buckets.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The continuation token, used to page through large result sets. Provide this value in a subsequent request to return the next page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+/// An notification channel used to watch for resource changes.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Channel {
+    /// The address where notifications are delivered for this channel.
+    #[serde(rename = "address")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub address: Option<String>,
+    /// i64: Date and time of notification channel expiration, expressed as a Unix timestamp, in milliseconds. Optional.
+    #[serde(rename = "expiration")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub expiration: Option<String>,
+    /// A UUID or similar unique string that identifies this channel.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// Identifies this as a notification channel used to watch for changes to a resource, which is "api#channel".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Additional parameters controlling delivery channel behavior. Optional.
+    #[serde(rename = "params")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub params: Option<HashMap<String, String>>,
+    /// A Boolean value to indicate whether payload is wanted. Optional.
+    #[serde(rename = "payload")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub payload: Option<bool>,
+    /// An opaque ID that identifies the resource being watched on this channel. Stable across different API versions.
+    #[serde(rename = "resourceId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resource_id: Option<String>,
+    /// A version-specific identifier for the watched resource.
+    #[serde(rename = "resourceUri")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resource_uri: Option<String>,
+    /// An arbitrary string delivered to the target address with each notification delivered over this channel. Optional.
+    #[serde(rename = "token")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub token: Option<String>,
+    /// The type of delivery mechanism used for this channel.
+    #[serde(rename = "type")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub typ: Option<String>,
+}
+
+/// Conditions that must be met for this operation to execute.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ComposeRequestSourceObjectsObjectPreconditions {
+    /// i64: Only perform the composition if the generation of the source object that would be used matches this value. If this value and a generation are both specified, they must be the same value or the call will fail.
+    #[serde(rename = "ifGenerationMatch")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub if_generation_match: Option<String>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ComposeRequestSourceObjects {
+    /// i64: The generation of this object to use as the source.
+    #[serde(rename = "generation")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub generation: Option<String>,
+    /// The source object's name. All source objects must reside in the same bucket.
+    #[serde(rename = "name")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub name: Option<String>,
+    /// Conditions that must be met for this operation to execute.
+    #[serde(rename = "objectPreconditions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub object_preconditions: Option<ComposeRequestSourceObjectsObjectPreconditions>,
+}
+
+/// A Compose request.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ComposeRequest {
+    #[serde(rename = "destination")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub destination: Option<Object>,
+    /// The kind of item this is.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The list of source objects that will be concatenated into a single object.
+    #[serde(rename = "sourceObjects")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub source_objects: Option<Vec<ComposeRequestSourceObjects>>,
+}
+
+/// Represents an expression text. Example: title: "User account presence" description: "Determines whether the request has a user account" expression: "size(request.user) > 0"
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Expr {
+    /// An optional description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
+    #[serde(rename = "description")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub description: Option<String>,
+    /// Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
+    #[serde(rename = "expression")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub expression: Option<String>,
+    /// An optional string indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
+    #[serde(rename = "location")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub location: Option<String>,
+    /// An optional title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
+    #[serde(rename = "title")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub title: Option<String>,
+}
+
+/// JSON template to produce a JSON-style HMAC Key resource for Create responses.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct HmacKey {
+    /// The kind of item this is. For HMAC keys, this is always storage#hmacKey.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    #[serde(rename = "metadata")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub metadata: Option<HmacKeyMetadata>,
+    /// HMAC secret key material.
+    #[serde(rename = "secret")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub secret: Option<String>,
+}
+
+/// JSON template to produce a JSON-style HMAC Key metadata resource.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct HmacKeyMetadata {
+    /// The ID of the HMAC Key.
+    #[serde(rename = "accessId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub access_id: Option<String>,
+    /// HTTP 1.1 Entity tag for the HMAC key.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// The ID of the HMAC key, including the Project ID and the Access ID.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The kind of item this is. For HMAC Key metadata, this is always storage#hmacKeyMetadata.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Project ID owning the service account to which the key authenticates.
+    #[serde(rename = "projectId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub project_id: Option<String>,
+    /// The link to this resource.
+    #[serde(rename = "selfLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub self_link: Option<String>,
+    /// The email address of the key's associated service account.
+    #[serde(rename = "serviceAccountEmail")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub service_account_email: Option<String>,
+    /// The state of the key. Can be one of ACTIVE, INACTIVE, or DELETED.
+    #[serde(rename = "state")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub state: Option<String>,
+    /// DateTime: The creation time of the HMAC key in RFC 3339 format.
+    #[serde(rename = "timeCreated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time_created: Option<DateTime<Utc>>,
+    /// DateTime: The last modification time of the HMAC key metadata in RFC 3339 format.
+    #[serde(rename = "updated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub updated: Option<DateTime<Utc>>,
+}
+
+/// A list of hmacKeys.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct HmacKeysMetadata {
+    /// The list of items.
+    #[serde(rename = "items")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub items: Option<Vec<HmacKeyMetadata>>,
+    /// The kind of item this is. For lists of hmacKeys, this is always storage#hmacKeysMetadata.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The continuation token, used to page through large result sets. Provide this value in a subsequent request to return the next page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+/// A subscription to receive Google PubSub notifications.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Notification {
+    /// An optional list of additional attributes to attach to each Cloud PubSub message published for this notification subscription.
+    #[serde(rename = "custom_attributes")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub custom_attributes: Option<HashMap<String, String>>,
+    /// HTTP 1.1 Entity tag for this subscription notification.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// If present, only send notifications about listed event types. If empty, sent notifications for all event types.
+    #[serde(rename = "event_types")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub event_types: Option<Vec<String>>,
+    /// The ID of the notification.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The kind of item this is. For notifications, this is always storage#notification.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// If present, only apply this notification configuration to object names that begin with this prefix.
+    #[serde(rename = "object_name_prefix")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub object_name_prefix: Option<String>,
+    /// The desired content of the Payload.
+    #[serde(rename = "payload_format")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub payload_format: Option<String>,
+    /// The canonical URL of this notification.
+    #[serde(rename = "selfLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub self_link: Option<String>,
+    /// The Cloud PubSub topic to which this subscription publishes. Formatted as: '//pubsub.googleapis.com/projects/{project-identifier}/topics/{my-topic}'
+    #[serde(rename = "topic")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub topic: Option<String>,
+}
+
+/// A list of notification subscriptions.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Notifications {
+    /// The list of items.
+    #[serde(rename = "items")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub items: Option<Vec<Notification>>,
+    /// The kind of item this is. For lists of notifications, this is always storage#notifications.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+}
+
+/// Metadata of customer-supplied encryption key, if the object is encrypted by such a key.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectCustomerEncryption {
+    /// The encryption algorithm.
+    #[serde(rename = "encryptionAlgorithm")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub encryption_algorithm: Option<String>,
+    /// SHA256 hash value of the encryption key.
+    #[serde(rename = "keySha256")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub key_sha256: Option<String>,
+}
+
+/// The owner of the object. This will always be the uploader of the object.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectOwner {
+    /// The entity, in the form user-userId.
+    #[serde(rename = "entity")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity: Option<String>,
+    /// The ID for the entity.
+    #[serde(rename = "entityId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity_id: Option<String>,
+}
+
+/// An object.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Object {
+    /// Access controls on the object.
+    #[serde(rename = "acl")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub acl: Option<Vec<ObjectAccessControl>>,
+    /// The name of the bucket containing this object.
+    #[serde(rename = "bucket")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub bucket: Option<String>,
+    /// Cache-Control directive for the object data. If omitted, and the object is accessible to all anonymous users, the default will be public, max-age=3600.
+    #[serde(rename = "cacheControl")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub cache_control: Option<String>,
+    /// Number of underlying components that make up this object. Components are accumulated by compose operations.
+    #[serde(rename = "componentCount")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub component_count: Option<i32>,
+    /// Content-Disposition of the object data.
+    #[serde(rename = "contentDisposition")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content_disposition: Option<String>,
+    /// Content-Encoding of the object data.
+    #[serde(rename = "contentEncoding")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content_encoding: Option<String>,
+    /// Content-Language of the object data.
+    #[serde(rename = "contentLanguage")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content_language: Option<String>,
+    /// Content-Type of the object data. If an object is stored without a Content-Type, it is served as application/octet-stream.
+    #[serde(rename = "contentType")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub content_type: Option<String>,
+    /// CRC32c checksum, as described in RFC 4960, Appendix B; encoded using base64 in big-endian byte order. For more information about using the CRC32c checksum, see Hashes and ETags: Best Practices.
+    #[serde(rename = "crc32c")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub crc32c: Option<String>,
+    /// DateTime: A timestamp in RFC 3339 format specified by the user for an object.
+    #[serde(rename = "customTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub custom_time: Option<DateTime<Utc>>,
+    /// Metadata of customer-supplied encryption key, if the object is encrypted by such a key.
+    #[serde(rename = "customerEncryption")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub customer_encryption: Option<ObjectCustomerEncryption>,
+    /// HTTP 1.1 Entity tag for the object.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// Whether an object is under event-based hold. Event-based hold is a way to retain objects until an event occurs, which is signified by the hold's release (i.e. this value is set to false). After being released (set to false), such objects will be subject to bucket-level retention (if any). One sample use case of this flag is for banks to hold loan documents for at least 3 years after loan is paid in full. Here, bucket-level retention is 3 years and the event is the loan being paid in full. In this example, these objects will be held intact for any number of years until the event has occurred (event-based hold on the object is released) and then 3 more years after that. That means retention duration of the objects begins from the moment event-based hold transitioned from true to false.
+    #[serde(rename = "eventBasedHold")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub event_based_hold: Option<bool>,
+    /// i64: The content generation of this object. Used for object versioning.
+    #[serde(rename = "generation")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub generation: Option<String>,
+    /// The ID of the object, including the bucket name, object name, and generation number.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The kind of item this is. For objects, this is always storage#object.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// Not currently supported. Specifying the parameter causes the request to fail with status code 400 - Bad Request.
+    #[serde(rename = "kmsKeyName")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kms_key_name: Option<String>,
+    /// MD5 hash of the data; encoded using base64. For more information about using the MD5 hash, see Hashes and ETags: Best Practices.
+    #[serde(rename = "md5Hash")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub md5_hash: Option<String>,
+    /// Media download link.
+    #[serde(rename = "mediaLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub media_link: Option<String>,
+    /// User-provided metadata, in key/value pairs.
+    #[serde(rename = "metadata")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub metadata: Option<HashMap<String, String>>,
+    /// i64: The version of the metadata for this object at this generation. Used for preconditions and for detecting changes in metadata. A metageneration number is only meaningful in the context of a particular generation of a particular object.
+    #[serde(rename = "metageneration")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub metageneration: Option<String>,
+    /// The name of the object. Required if not specified by URL parameter.
+    #[serde(rename = "name")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub name: Option<String>,
+    /// The owner of the object. This will always be the uploader of the object.
+    #[serde(rename = "owner")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub owner: Option<ObjectOwner>,
+    /// DateTime: A server-determined value that specifies the earliest time that the object's retention period expires. This value is in RFC 3339 format. Note 1: This field is not provided for objects with an active event-based hold, since retention expiration is unknown until the hold is removed. Note 2: This value can be provided even when temporary hold is set (so that the user can reason about policy without having to first unset the temporary hold).
+    #[serde(rename = "retentionExpirationTime")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub retention_expiration_time: Option<DateTime<Utc>>,
+    /// The link to this object.
+    #[serde(rename = "selfLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub self_link: Option<String>,
+    /// u64: Content-Length of the data in bytes.
+    #[serde(rename = "size")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub size: Option<String>,
+    /// Storage class of the object.
+    #[serde(rename = "storageClass")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub storage_class: Option<String>,
+    /// Whether an object is under temporary hold. While this flag is set to true, the object is protected against deletion and overwrites. A common use case of this flag is regulatory investigations where objects need to be retained while the investigation is ongoing. Note that unlike event-based hold, temporary hold does not impact retention expiration time of an object.
+    #[serde(rename = "temporaryHold")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub temporary_hold: Option<bool>,
+    /// DateTime: The creation time of the object in RFC 3339 format.
+    #[serde(rename = "timeCreated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time_created: Option<DateTime<Utc>>,
+    /// DateTime: The deletion time of the object in RFC 3339 format. Will be returned if and only if this version of the object has been deleted.
+    #[serde(rename = "timeDeleted")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time_deleted: Option<DateTime<Utc>>,
+    /// DateTime: The time at which the object's storage class was last changed. When the object is initially created, it will be set to timeCreated.
+    #[serde(rename = "timeStorageClassUpdated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub time_storage_class_updated: Option<DateTime<Utc>>,
+    /// DateTime: The modification time of the object metadata in RFC 3339 format.
+    #[serde(rename = "updated")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub updated: Option<DateTime<Utc>>,
+}
+
+/// The project team associated with the entity, if any.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlProjectTeam {
+    /// The project number.
+    #[serde(rename = "projectNumber")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub project_number: Option<String>,
+    /// The team.
+    #[serde(rename = "team")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub team: Option<String>,
+}
+
+/// An access-control entry.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControl {
+    /// The name of the bucket.
+    #[serde(rename = "bucket")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub bucket: Option<String>,
+    /// The domain associated with the entity, if any.
+    #[serde(rename = "domain")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub domain: Option<String>,
+    /// The email address associated with the entity, if any.
+    #[serde(rename = "email")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub email: Option<String>,
+    /// The entity holding the permission, in one of the following forms:  - user-userId  - user-email  - group-groupId  - group-email  - domain-domain  - project-team-projectId  - allUsers  - allAuthenticatedUsers Examples:  - The user liz@example.com would be user-liz@example.com.  - The group example@googlegroups.com would be group-example@googlegroups.com.  - To refer to all members of the Google Apps for Business domain example.com, the entity would be domain-example.com.
+    #[serde(rename = "entity")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity: Option<String>,
+    /// The ID for the entity, if any.
+    #[serde(rename = "entityId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub entity_id: Option<String>,
+    /// HTTP 1.1 Entity tag for the access-control entry.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// i64: The content generation of the object, if applied to an object.
+    #[serde(rename = "generation")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub generation: Option<String>,
+    /// The ID of the access-control entry.
+    #[serde(rename = "id")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub id: Option<String>,
+    /// The kind of item this is. For object access control entries, this is always storage#objectAccessControl.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The name of the object, if applied to an object.
+    #[serde(rename = "object")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub object: Option<String>,
+    /// The project team associated with the entity, if any.
+    #[serde(rename = "projectTeam")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub project_team: Option<ObjectAccessControlProjectTeam>,
+    /// The access permission for the entity.
+    #[serde(rename = "role")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub role: Option<String>,
+    /// The link to this access-control entry.
+    #[serde(rename = "selfLink")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub self_link: Option<String>,
+}
+
+/// An access-control list.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControls {
+    /// The list of items.
+    #[serde(rename = "items")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub items: Option<Vec<ObjectAccessControl>>,
+    /// The kind of item this is. For lists of object access control entries, this is always storage#objectAccessControls.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+}
+
+/// A list of objects.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Objects {
+    /// The list of items.
+    #[serde(rename = "items")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub items: Option<Vec<Object>>,
+    /// The kind of item this is. For lists of objects, this is always storage#objects.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The continuation token, used to page through large result sets. Provide this value in a subsequent request to return the next page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+    /// The list of prefixes of objects matching-but-not-listed up to and including the requested delimiter.
+    #[serde(rename = "prefixes")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub prefixes: Option<Vec<String>>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct PolicyBindings {
+    #[serde(rename = "condition")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub condition: Option<Expr>,
+    /// A collection of identifiers for members who may assume the provided role. Recognized identifiers are as follows:   - allUsers — A special identifier that represents anyone on the internet; with or without a Google account.   - allAuthenticatedUsers — A special identifier that represents anyone who is authenticated with a Google account or a service account.   - user:emailid — An email address that represents a specific account. For example, user:alice@gmail.com or user:joe@example.com.   - serviceAccount:emailid — An email address that represents a service account. For example,  serviceAccount:my-other-app@appspot.gserviceaccount.com .   - group:emailid — An email address that represents a Google group. For example, group:admins@example.com.   - domain:domain — A Google Apps domain name that represents all the users of that domain. For example, domain:google.com or domain:example.com.   - projectOwner:projectid — Owners of the given project. For example, projectOwner:my-example-project   - projectEditor:projectid — Editors of the given project. For example, projectEditor:my-example-project   - projectViewer:projectid — Viewers of the given project. For example, projectViewer:my-example-project
+    #[serde(rename = "members")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub members: Option<Vec<String>>,
+    /// The role to which members belong. Two types of roles are supported: new IAM roles, which grant permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The new IAM roles are:   - roles/storage.admin — Full control of Google Cloud Storage resources.   - roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects.   - roles/storage.objectCreator — Access to create objects in Google Cloud Storage.   - roles/storage.objectAdmin — Full control of Google Cloud Storage objects.   The legacy IAM roles are:   - roles/storage.legacyObjectReader — Read-only access to objects without listing. Equivalent to an ACL entry on an object with the READER role.   - roles/storage.legacyObjectOwner — Read/write access to existing objects without listing. Equivalent to an ACL entry on an object with the OWNER role.   - roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an ACL entry on a bucket with the READER role.   - roles/storage.legacyBucketWriter — Read access to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the WRITER role.   - roles/storage.legacyBucketOwner — Read and write access to existing buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the OWNER role.
+    #[serde(rename = "role")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub role: Option<String>,
+}
+
+/// A bucket/object IAM policy.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct Policy {
+    /// An association between a role, which comes with a set of permissions, and members who may assume that role.
+    #[serde(rename = "bindings")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub bindings: Option<Vec<PolicyBindings>>,
+    /// HTTP 1.1  Entity tag for the policy.
+    #[serde(rename = "etag")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub etag: Option<String>,
+    /// The kind of item this is. For policies, this is always storage#policy. This field is ignored on input.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The ID of the resource to which this policy belongs. Will be of the form projects/_/buckets/bucket for buckets, and projects/_/buckets/bucket/objects/object for objects. A specific generation may be specified by appending #generationNumber to the end of the object name, e.g. projects/_/buckets/my-bucket/objects/data.txt#17. The current generation can be denoted with #0. This field is ignored on input.
+    #[serde(rename = "resourceId")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resource_id: Option<String>,
+    /// The IAM policy format version.
+    #[serde(rename = "version")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub version: Option<i32>,
+}
+
+/// A rewrite response.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct RewriteResponse {
+    /// true if the copy is finished; otherwise, false if the copy is in progress. This property is always present in the response.
+    #[serde(rename = "done")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub done: Option<bool>,
+    /// The kind of item this is.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// i64: The total size of the object being copied in bytes. This property is always present in the response.
+    #[serde(rename = "objectSize")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub object_size: Option<String>,
+    #[serde(rename = "resource")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub resource: Option<Object>,
+    /// A token to use in subsequent requests to continue copying data. This token is present in the response only when there is more data to copy.
+    #[serde(rename = "rewriteToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub rewrite_token: Option<String>,
+    /// i64: The total bytes written so far, which can be used to provide a waiting user with a progress indicator. This property is always present in the response.
+    #[serde(rename = "totalBytesRewritten")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub total_bytes_rewritten: Option<String>,
+}
+
+/// A subscription to receive Google PubSub notifications.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ServiceAccount {
+    /// The ID of the notification.
+    #[serde(rename = "email_address")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub email_address: Option<String>,
+    /// The kind of item this is. For notifications, this is always storage#notification.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+}
+
+/// A storage.(buckets|objects).testIamPermissions response.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct TestIamPermissionsResponse {
+    /// The kind of item this is.
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The permissions held by the caller. Permissions are always of the format storage.resource.capability, where resource is one of buckets or objects. The supported permissions are as follows:   - storage.buckets.delete — Delete bucket.   - storage.buckets.get — Read bucket metadata.   - storage.buckets.getIamPolicy — Read bucket IAM policy.   - storage.buckets.create — Create bucket.   - storage.buckets.list — List buckets.   - storage.buckets.setIamPolicy — Update bucket IAM policy.   - storage.buckets.update — Update bucket metadata.   - storage.objects.delete — Delete object.   - storage.objects.get — Read object data and metadata.   - storage.objects.getIamPolicy — Read object IAM policy.   - storage.objects.create — Create object.   - storage.objects.list — List objects.   - storage.objects.setIamPolicy — Update object IAM policy.   - storage.objects.update — Update object metadata.
+    #[serde(rename = "permissions")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub permissions: Option<Vec<String>>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct StorageParams {
+    /// Data format for the response.
+    #[serde(rename = "alt")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub alt: Option<String>,
+    /// Selector specifying which fields to include in a partial response.
+    #[serde(rename = "fields")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub fields: Option<String>,
+    /// API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
+    #[serde(rename = "key")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub key: Option<String>,
+    /// OAuth 2.0 token for the current user.
+    #[serde(rename = "oauth_token")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub oauth_token: Option<String>,
+    /// Returns response with indentations and line breaks.
+    #[serde(rename = "prettyPrint")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub pretty_print: Option<bool>,
+    /// An opaque string that represents a user for quota purposes. Must not exceed 40 characters.
+    #[serde(rename = "quotaUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub quota_user: Option<String>,
+    /// Deprecated. Please use quotaUser instead.
+    #[serde(rename = "userIp")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub user_ip: Option<String>,
+}
+
+/// Parameters for the `bucketAccessControls.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketAccessControlsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `bucketAccessControls.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketAccessControlsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `bucketAccessControls.insert` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlsInsertParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketAccessControlsInsertParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `bucketAccessControls.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketAccessControlsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `bucketAccessControls.patch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlsPatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketAccessControlsPatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `bucketAccessControls.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketAccessControlsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketAccessControlsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If set, only deletes the bucket if its metageneration matches this value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: If set, only deletes the bucket if its metageneration does not match this value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Set of properties to return. Defaults to noAcl.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.getIamPolicy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsGetIamPolicyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The IAM policy format version to be returned. If the optionsRequestedPolicyVersion is for an older version that doesn't support part of the requested IAM policy, the request fails.
+    #[serde(rename = "optionsRequestedPolicyVersion")]
+    pub options_requested_policy_version: Option<i32>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsGetIamPolicyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.options_requested_policy_version {
+            write!(
+                f,
+                "&optionsRequestedPolicyVersion={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.insert` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsInsertParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Apply a predefined set of access controls to this bucket.
+    #[serde(rename = "predefinedAcl")]
+    pub predefined_acl: Option<String>,
+    /// Apply a predefined set of default object access controls to this bucket.
+    #[serde(rename = "predefinedDefaultObjectAcl")]
+    pub predefined_default_object_acl: Option<String>,
+    /// A valid API project identifier.
+    #[serde(rename = "project")]
+    pub project: String,
+    /// Set of properties to return. Defaults to noAcl, unless the bucket resource specifies acl or defaultObjectAcl properties, when it defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsInsertParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&project={}",
+            percent_encode(format!("{}", self.project).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        if let Some(ref v) = self.predefined_acl {
+            write!(
+                f,
+                "&predefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_default_object_acl {
+            write!(
+                f,
+                "&predefinedDefaultObjectAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Maximum number of buckets to return in a single response. The service will use this parameter or 1,000 items, whichever is smaller.
+    #[serde(rename = "maxResults")]
+    pub max_results: Option<u32>,
+    /// A previously-returned page token representing part of the larger set of results to view.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Filter results to buckets whose names begin with this prefix.
+    #[serde(rename = "prefix")]
+    pub prefix: Option<String>,
+    /// A valid API project identifier.
+    #[serde(rename = "project")]
+    pub project: String,
+    /// Set of properties to return. Defaults to noAcl.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&project={}",
+            percent_encode(format!("{}", self.project).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        if let Some(ref v) = self.max_results {
+            write!(
+                f,
+                "&maxResults={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.prefix {
+            write!(
+                f,
+                "&prefix={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.lockRetentionPolicy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsLockRetentionPolicyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: Makes the operation conditional on whether bucket's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsLockRetentionPolicyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&ifMetagenerationMatch={}",
+            percent_encode(
+                format!("{}", self.if_metageneration_match).as_bytes(),
+                NON_ALPHANUMERIC
+            )
+            .to_string()
+        )?;
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.patch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsPatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Apply a predefined set of access controls to this bucket.
+    #[serde(rename = "predefinedAcl")]
+    pub predefined_acl: Option<String>,
+    /// Apply a predefined set of default object access controls to this bucket.
+    #[serde(rename = "predefinedDefaultObjectAcl")]
+    pub predefined_default_object_acl: Option<String>,
+    /// Set of properties to return. Defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsPatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_acl {
+            write!(
+                f,
+                "&predefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_default_object_acl {
+            write!(
+                f,
+                "&predefinedDefaultObjectAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.setIamPolicy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsSetIamPolicyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsSetIamPolicyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.testIamPermissions` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsTestIamPermissionsParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// Permissions to test.
+    #[serde(rename = "permissions")]
+    pub permissions: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsTestIamPermissionsParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&permissions={}",
+            percent_encode(format!("{}", self.permissions).as_bytes(), NON_ALPHANUMERIC)
+                .to_string()
+        )?;
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `buckets.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct BucketsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Apply a predefined set of access controls to this bucket.
+    #[serde(rename = "predefinedAcl")]
+    pub predefined_acl: Option<String>,
+    /// Apply a predefined set of default object access controls to this bucket.
+    #[serde(rename = "predefinedDefaultObjectAcl")]
+    pub predefined_default_object_acl: Option<String>,
+    /// Set of properties to return. Defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for BucketsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_acl {
+            write!(
+                f,
+                "&predefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_default_object_acl {
+            write!(
+                f,
+                "&predefinedDefaultObjectAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `channels.stop` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ChannelsStopParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+}
+
+impl std::fmt::Display for ChannelsStopParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `defaultObjectAccessControls.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DefaultObjectAccessControlsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for DefaultObjectAccessControlsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `defaultObjectAccessControls.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DefaultObjectAccessControlsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for DefaultObjectAccessControlsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `defaultObjectAccessControls.insert` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DefaultObjectAccessControlsInsertParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for DefaultObjectAccessControlsInsertParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `defaultObjectAccessControls.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DefaultObjectAccessControlsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, only return default ACL listing if the bucket's current metageneration matches this value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: If present, only return default ACL listing if the bucket's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for DefaultObjectAccessControlsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `defaultObjectAccessControls.patch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DefaultObjectAccessControlsPatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for DefaultObjectAccessControlsPatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `defaultObjectAccessControls.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct DefaultObjectAccessControlsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for DefaultObjectAccessControlsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `notifications.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct NotificationsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// The parent bucket of the notification.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// ID of the notification to delete.
+    #[serde(rename = "notification")]
+    pub notification: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for NotificationsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `notifications.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct NotificationsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// The parent bucket of the notification.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// Notification ID
+    #[serde(rename = "notification")]
+    pub notification: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for NotificationsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `notifications.insert` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct NotificationsInsertParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// The parent bucket of the notification.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for NotificationsInsertParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `notifications.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct NotificationsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a Google Cloud Storage bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for NotificationsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objectAccessControls.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectAccessControlsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objectAccessControls.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectAccessControlsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objectAccessControls.insert` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlsInsertParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectAccessControlsInsertParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objectAccessControls.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectAccessControlsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objectAccessControls.patch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlsPatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectAccessControlsPatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objectAccessControls.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectAccessControlsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of a bucket.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
+    #[serde(rename = "entity")]
+    pub entity: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectAccessControlsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.compose` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsComposeParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket containing the source objects. The destination object is stored in this bucket.
+    #[serde(rename = "destinationBucket")]
+    pub destination_bucket: String,
+    /// Name of the new object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "destinationObject")]
+    pub destination_object: String,
+    /// Apply a predefined set of access controls to the destination object.
+    #[serde(rename = "destinationPredefinedAcl")]
+    pub destination_predefined_acl: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
+    #[serde(rename = "kmsKeyName")]
+    pub kms_key_name: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsComposeParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.destination_predefined_acl {
+            write!(
+                f,
+                "&destinationPredefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.kms_key_name {
+            write!(
+                f,
+                "&kmsKeyName={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.copy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsCopyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which to store the new object. Overrides the provided object metadata's bucket value, if any.For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "destinationBucket")]
+    pub destination_bucket: String,
+    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
+    #[serde(rename = "destinationKmsKeyName")]
+    pub destination_kms_key_name: Option<String>,
+    /// Name of the new object. Required when the object metadata is not otherwise provided. Overrides the object metadata's name value, if any.
+    #[serde(rename = "destinationObject")]
+    pub destination_object: String,
+    /// Apply a predefined set of access controls to the destination object.
+    #[serde(rename = "destinationPredefinedAcl")]
+    pub destination_predefined_acl: Option<String>,
+    /// i64: Makes the operation conditional on whether the destination object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the destination object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the destination object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the destination object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current generation matches the given value.
+    #[serde(rename = "ifSourceGenerationMatch")]
+    pub if_source_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current generation does not match the given value.
+    #[serde(rename = "ifSourceGenerationNotMatch")]
+    pub if_source_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current metageneration matches the given value.
+    #[serde(rename = "ifSourceMetagenerationMatch")]
+    pub if_source_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current metageneration does not match the given value.
+    #[serde(rename = "ifSourceMetagenerationNotMatch")]
+    pub if_source_metageneration_not_match: Option<String>,
+    /// Set of properties to return. Defaults to noAcl, unless the object resource specifies the acl property, when it defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// Name of the bucket in which to find the source object.
+    #[serde(rename = "sourceBucket")]
+    pub source_bucket: String,
+    /// i64: If present, selects a specific revision of the source object (as opposed to the latest version, the default).
+    #[serde(rename = "sourceGeneration")]
+    pub source_generation: Option<String>,
+    /// Name of the source object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "sourceObject")]
+    pub source_object: String,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsCopyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.destination_kms_key_name {
+            write!(
+                f,
+                "&destinationKmsKeyName={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.destination_predefined_acl {
+            write!(
+                f,
+                "&destinationPredefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_generation_match {
+            write!(
+                f,
+                "&ifSourceGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_generation_not_match {
+            write!(
+                f,
+                "&ifSourceGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_metageneration_match {
+            write!(
+                f,
+                "&ifSourceMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_metageneration_not_match {
+            write!(
+                f,
+                "&ifSourceMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.source_generation {
+            write!(
+                f,
+                "&sourceGeneration={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, permanently deletes a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// Set of properties to return. Defaults to noAcl.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.getIamPolicy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsGetIamPolicyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsGetIamPolicyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.insert` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsInsertParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which to store the new object. Overrides the provided object metadata's bucket value, if any.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// If set, sets the contentEncoding property of the final object to this value. Setting this parameter is equivalent to setting the contentEncoding metadata property. This can be useful when uploading an object with uploadType=media to indicate the encoding of the content being uploaded.
+    #[serde(rename = "contentEncoding")]
+    pub content_encoding: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
+    #[serde(rename = "kmsKeyName")]
+    pub kms_key_name: Option<String>,
+    /// Name of the object. Required when the object metadata is not otherwise provided. Overrides the object metadata's name value, if any. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "name")]
+    pub name: Option<String>,
+    /// Apply a predefined set of access controls to this object.
+    #[serde(rename = "predefinedAcl")]
+    pub predefined_acl: Option<String>,
+    /// Set of properties to return. Defaults to noAcl, unless the object resource specifies the acl property, when it defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsInsertParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.content_encoding {
+            write!(
+                f,
+                "&contentEncoding={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.kms_key_name {
+            write!(
+                f,
+                "&kmsKeyName={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.name {
+            write!(
+                f,
+                "&name={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_acl {
+            write!(
+                f,
+                "&predefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which to look for objects.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// Returns results in a directory-like mode. items will contain only objects whose names, aside from the prefix, do not contain delimiter. Objects whose names, aside from the prefix, contain delimiter will have their name, truncated after the delimiter, returned in prefixes. Duplicate prefixes are omitted.
+    #[serde(rename = "delimiter")]
+    pub delimiter: Option<String>,
+    /// Filter results to objects whose names are lexicographically before endOffset. If startOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
+    #[serde(rename = "endOffset")]
+    pub end_offset: Option<String>,
+    /// If true, objects that end in exactly one instance of delimiter will have their metadata included in items in addition to prefixes.
+    #[serde(rename = "includeTrailingDelimiter")]
+    pub include_trailing_delimiter: Option<bool>,
+    /// Maximum number of items plus prefixes to return in a single page of responses. As duplicate prefixes are omitted, fewer total results may be returned than requested. The service will use this parameter or 1,000 items, whichever is smaller.
+    #[serde(rename = "maxResults")]
+    pub max_results: Option<u32>,
+    /// A previously-returned page token representing part of the larger set of results to view.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Filter results to objects whose names begin with this prefix.
+    #[serde(rename = "prefix")]
+    pub prefix: Option<String>,
+    /// Set of properties to return. Defaults to noAcl.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// Filter results to objects whose names are lexicographically equal to or after startOffset. If endOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
+    #[serde(rename = "startOffset")]
+    pub start_offset: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+    /// If true, lists all versions of an object as distinct results. The default is false. For more information, see Object Versioning.
+    #[serde(rename = "versions")]
+    pub versions: Option<bool>,
+}
+
+impl std::fmt::Display for ObjectsListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.delimiter {
+            write!(
+                f,
+                "&delimiter={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.end_offset {
+            write!(
+                f,
+                "&endOffset={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_trailing_delimiter {
+            write!(
+                f,
+                "&includeTrailingDelimiter={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.max_results {
+            write!(
+                f,
+                "&maxResults={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.prefix {
+            write!(
+                f,
+                "&prefix={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.start_offset {
+            write!(
+                f,
+                "&startOffset={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.versions {
+            write!(
+                f,
+                "&versions={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.patch` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsPatchParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// Apply a predefined set of access controls to this object.
+    #[serde(rename = "predefinedAcl")]
+    pub predefined_acl: Option<String>,
+    /// Set of properties to return. Defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request, for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsPatchParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_acl {
+            write!(
+                f,
+                "&predefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.rewrite` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsRewriteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which to store the new object. Overrides the provided object metadata's bucket value, if any.
+    #[serde(rename = "destinationBucket")]
+    pub destination_bucket: String,
+    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
+    #[serde(rename = "destinationKmsKeyName")]
+    pub destination_kms_key_name: Option<String>,
+    /// Name of the new object. Required when the object metadata is not otherwise provided. Overrides the object metadata's name value, if any. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "destinationObject")]
+    pub destination_object: String,
+    /// Apply a predefined set of access controls to the destination object.
+    #[serde(rename = "destinationPredefinedAcl")]
+    pub destination_predefined_acl: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the destination object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the destination object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current generation matches the given value.
+    #[serde(rename = "ifSourceGenerationMatch")]
+    pub if_source_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current generation does not match the given value.
+    #[serde(rename = "ifSourceGenerationNotMatch")]
+    pub if_source_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current metageneration matches the given value.
+    #[serde(rename = "ifSourceMetagenerationMatch")]
+    pub if_source_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the source object's current metageneration does not match the given value.
+    #[serde(rename = "ifSourceMetagenerationNotMatch")]
+    pub if_source_metageneration_not_match: Option<String>,
+    /// i64: The maximum number of bytes that will be rewritten per rewrite request. Most callers shouldn't need to specify this parameter - it is primarily in place to support testing. If specified the value must be an integral multiple of 1 MiB (1048576). Also, this only applies to requests where the source and destination span locations and/or storage classes. Finally, this value must not change across rewrite calls else you'll get an error that the rewriteToken is invalid.
+    #[serde(rename = "maxBytesRewrittenPerCall")]
+    pub max_bytes_rewritten_per_call: Option<String>,
+    /// Set of properties to return. Defaults to noAcl, unless the object resource specifies the acl property, when it defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// Include this field (from the previous rewrite response) on each rewrite request after the first one, until the rewrite response 'done' flag is true. Calls that provide a rewriteToken can omit all other request fields, but if included those fields must match the values provided in the first rewrite request.
+    #[serde(rename = "rewriteToken")]
+    pub rewrite_token: Option<String>,
+    /// Name of the bucket in which to find the source object.
+    #[serde(rename = "sourceBucket")]
+    pub source_bucket: String,
+    /// i64: If present, selects a specific revision of the source object (as opposed to the latest version, the default).
+    #[serde(rename = "sourceGeneration")]
+    pub source_generation: Option<String>,
+    /// Name of the source object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "sourceObject")]
+    pub source_object: String,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsRewriteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.destination_kms_key_name {
+            write!(
+                f,
+                "&destinationKmsKeyName={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.destination_predefined_acl {
+            write!(
+                f,
+                "&destinationPredefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_generation_match {
+            write!(
+                f,
+                "&ifSourceGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_generation_not_match {
+            write!(
+                f,
+                "&ifSourceGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_metageneration_match {
+            write!(
+                f,
+                "&ifSourceMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_source_metageneration_not_match {
+            write!(
+                f,
+                "&ifSourceMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.max_bytes_rewritten_per_call {
+            write!(
+                f,
+                "&maxBytesRewrittenPerCall={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.rewrite_token {
+            write!(
+                f,
+                "&rewriteToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.source_generation {
+            write!(
+                f,
+                "&sourceGeneration={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.setIamPolicy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsSetIamPolicyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsSetIamPolicyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.testIamPermissions` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsTestIamPermissionsParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// Permissions to test.
+    #[serde(rename = "permissions")]
+    pub permissions: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsTestIamPermissionsParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&permissions={}",
+            percent_encode(format!("{}", self.permissions).as_bytes(), NON_ALPHANUMERIC)
+                .to_string()
+        )?;
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which the object resides.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
+    #[serde(rename = "generation")]
+    pub generation: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
+    #[serde(rename = "ifGenerationMatch")]
+    pub if_generation_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
+    #[serde(rename = "ifGenerationNotMatch")]
+    pub if_generation_not_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
+    #[serde(rename = "ifMetagenerationMatch")]
+    pub if_metageneration_match: Option<String>,
+    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
+    #[serde(rename = "ifMetagenerationNotMatch")]
+    pub if_metageneration_not_match: Option<String>,
+    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
+    #[serde(rename = "object")]
+    pub object: String,
+    /// Apply a predefined set of access controls to this object.
+    #[serde(rename = "predefinedAcl")]
+    pub predefined_acl: Option<String>,
+    /// Set of properties to return. Defaults to full.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ObjectsUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.generation {
+            write!(
+                f,
+                "&generation={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_match {
+            write!(
+                f,
+                "&ifGenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_generation_not_match {
+            write!(
+                f,
+                "&ifGenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_match {
+            write!(
+                f,
+                "&ifMetagenerationMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.if_metageneration_not_match {
+            write!(
+                f,
+                "&ifMetagenerationNotMatch={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.predefined_acl {
+            write!(
+                f,
+                "&predefinedAcl={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `objects.watchAll` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ObjectsWatchAllParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the bucket in which to look for objects.
+    #[serde(rename = "bucket")]
+    pub bucket: String,
+    /// Returns results in a directory-like mode. items will contain only objects whose names, aside from the prefix, do not contain delimiter. Objects whose names, aside from the prefix, contain delimiter will have their name, truncated after the delimiter, returned in prefixes. Duplicate prefixes are omitted.
+    #[serde(rename = "delimiter")]
+    pub delimiter: Option<String>,
+    /// Filter results to objects whose names are lexicographically before endOffset. If startOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
+    #[serde(rename = "endOffset")]
+    pub end_offset: Option<String>,
+    /// If true, objects that end in exactly one instance of delimiter will have their metadata included in items in addition to prefixes.
+    #[serde(rename = "includeTrailingDelimiter")]
+    pub include_trailing_delimiter: Option<bool>,
+    /// Maximum number of items plus prefixes to return in a single page of responses. As duplicate prefixes are omitted, fewer total results may be returned than requested. The service will use this parameter or 1,000 items, whichever is smaller.
+    #[serde(rename = "maxResults")]
+    pub max_results: Option<u32>,
+    /// A previously-returned page token representing part of the larger set of results to view.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Filter results to objects whose names begin with this prefix.
+    #[serde(rename = "prefix")]
+    pub prefix: Option<String>,
+    /// Set of properties to return. Defaults to noAcl.
+    #[serde(rename = "projection")]
+    pub projection: Option<String>,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// Filter results to objects whose names are lexicographically equal to or after startOffset. If endOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
+    #[serde(rename = "startOffset")]
+    pub start_offset: Option<String>,
+    /// The project to be billed for this request. Required for Requester Pays buckets.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+    /// If true, lists all versions of an object as distinct results. The default is false. For more information, see Object Versioning.
+    #[serde(rename = "versions")]
+    pub versions: Option<bool>,
+}
+
+impl std::fmt::Display for ObjectsWatchAllParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.delimiter {
+            write!(
+                f,
+                "&delimiter={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.end_offset {
+            write!(
+                f,
+                "&endOffset={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.include_trailing_delimiter {
+            write!(
+                f,
+                "&includeTrailingDelimiter={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.max_results {
+            write!(
+                f,
+                "&maxResults={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.prefix {
+            write!(
+                f,
+                "&prefix={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.projection {
+            write!(
+                f,
+                "&projection={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.start_offset {
+            write!(
+                f,
+                "&startOffset={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.versions {
+            write!(
+                f,
+                "&versions={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `hmacKeys.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ProjectsHmacKeysCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Project ID owning the service account.
+    #[serde(rename = "projectId")]
+    pub project_id: String,
+    /// Email address of the service account.
+    #[serde(rename = "serviceAccountEmail")]
+    pub service_account_email: String,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ProjectsHmacKeysCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&serviceAccountEmail={}",
+            percent_encode(
+                format!("{}", self.service_account_email).as_bytes(),
+                NON_ALPHANUMERIC
+            )
+            .to_string()
+        )?;
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `hmacKeys.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ProjectsHmacKeysDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the HMAC key to be deleted.
+    #[serde(rename = "accessId")]
+    pub access_id: String,
+    /// Project ID owning the requested key
+    #[serde(rename = "projectId")]
+    pub project_id: String,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ProjectsHmacKeysDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `hmacKeys.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ProjectsHmacKeysGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the HMAC key.
+    #[serde(rename = "accessId")]
+    pub access_id: String,
+    /// Project ID owning the service account of the requested key.
+    #[serde(rename = "projectId")]
+    pub project_id: String,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ProjectsHmacKeysGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `hmacKeys.list` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ProjectsHmacKeysListParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Maximum number of items to return in a single page of responses. The service uses this parameter or 250 items, whichever is smaller. The max number of items per page will also be limited by the number of distinct service accounts in the response. If the number of service accounts in a single response is too high, the page will truncated and a next page token will be returned.
+    #[serde(rename = "maxResults")]
+    pub max_results: Option<u32>,
+    /// A previously-returned page token representing part of the larger set of results to view.
+    #[serde(rename = "pageToken")]
+    pub page_token: Option<String>,
+    /// Name of the project in which to look for HMAC keys.
+    #[serde(rename = "projectId")]
+    pub project_id: String,
+    /// If present, only keys for the given service account are returned.
+    #[serde(rename = "serviceAccountEmail")]
+    pub service_account_email: Option<String>,
+    /// Whether or not to show keys in the DELETED state.
+    #[serde(rename = "showDeletedKeys")]
+    pub show_deleted_keys: Option<bool>,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ProjectsHmacKeysListParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.max_results {
+            write!(
+                f,
+                "&maxResults={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.page_token {
+            write!(
+                f,
+                "&pageToken={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.service_account_email {
+            write!(
+                f,
+                "&serviceAccountEmail={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.show_deleted_keys {
+            write!(
+                f,
+                "&showDeletedKeys={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `hmacKeys.update` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ProjectsHmacKeysUpdateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Name of the HMAC key being updated.
+    #[serde(rename = "accessId")]
+    pub access_id: String,
+    /// Project ID owning the service account of the updated key.
+    #[serde(rename = "projectId")]
+    pub project_id: String,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ProjectsHmacKeysUpdateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `serviceAccount.get` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct ProjectsServiceAccountGetParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub storage_params: Option<StorageParams>,
+    /// Project ID
+    #[serde(rename = "projectId")]
+    pub project_id: String,
+    /// The project to be billed for this request if the target bucket is requester-pays bucket.
+    #[serde(rename = "provisionalUserProject")]
+    pub provisional_user_project: Option<String>,
+    /// The project to be billed for this request.
+    #[serde(rename = "userProject")]
+    pub user_project: Option<String>,
+}
+
+impl std::fmt::Display for ProjectsServiceAccountGetParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.provisional_user_project {
+            write!(
+                f,
+                "&provisionalUserProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_project {
+            write!(
+                f,
+                "&userProject={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+impl std::fmt::Display for StorageParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.alt {
+            write!(
+                f,
+                "&alt={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.fields {
+            write!(
+                f,
+                "&fields={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.key {
+            write!(
+                f,
+                "&key={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.oauth_token {
+            write!(
+                f,
+                "&oauth_token={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.pretty_print {
+            write!(
+                f,
+                "&prettyPrint={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.quota_user {
+            write!(
+                f,
+                "&quotaUser={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_ip {
+            write!(
+                f,
+                "&userIp={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// The Storage BucketAccessControls service represents the BucketAccessControls resource.
+pub struct BucketAccessControlsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl BucketAccessControlsService {
+    /// Create a new BucketAccessControlsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> BucketAccessControlsService {
+        BucketAccessControlsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Permanently deletes the ACL entry for the specified entity on the specified bucket.
+    pub async fn delete(&mut self, params: &BucketAccessControlsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "b/{bucket}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Returns the ACL entry for the specified entity on the specified bucket.
+    pub async fn get(
+        &mut self,
+        params: &BucketAccessControlsGetParams,
+    ) -> Result<BucketAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Creates a new ACL entry on the specified bucket.
+    pub async fn insert(
+        &mut self,
+        params: &BucketAccessControlsInsertParams,
+        req: &BucketAccessControl,
+    ) -> Result<BucketAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/acl",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Retrieves ACL entries on the specified bucket.
+    pub async fn list(
+        &mut self,
+        params: &BucketAccessControlsListParams,
+    ) -> Result<BucketAccessControls> {
+        let rel_path = format!(
+            "b/{bucket}/acl",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Patches an ACL entry on the specified bucket.
+    pub async fn patch(
+        &mut self,
+        params: &BucketAccessControlsPatchParams,
+        req: &BucketAccessControl,
+    ) -> Result<BucketAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+
+    /// Updates an ACL entry on the specified bucket.
+    pub async fn update(
+        &mut self,
+        params: &BucketAccessControlsUpdateParams,
+        req: &BucketAccessControl,
+    ) -> Result<BucketAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+}
+
+/// The Storage Buckets service represents the Buckets resource.
+pub struct BucketsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl BucketsService {
+    /// Create a new BucketsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> BucketsService {
+        BucketsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Permanently deletes an empty bucket.
+    pub async fn delete(&mut self, params: &BucketsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "b/{bucket}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Returns metadata for the specified bucket.
+    pub async fn get(&mut self, params: &BucketsGetParams) -> Result<Bucket> {
+        let rel_path = format!(
+            "b/{bucket}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Returns an IAM policy for the specified bucket.
+    pub async fn get_iam_policy(&mut self, params: &BucketsGetIamPolicyParams) -> Result<Policy> {
+        let rel_path = format!(
+            "b/{bucket}/iam",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Creates a new bucket.
+    pub async fn insert(&mut self, params: &BucketsInsertParams, req: &Bucket) -> Result<Bucket> {
+        let rel_path = format!("b",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Retrieves a list of buckets for a given project.
+    pub async fn list(&mut self, params: &BucketsListParams) -> Result<Buckets> {
+        let rel_path = format!("b",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Locks retention policy on a bucket.
+    pub async fn lock_retention_policy(
+        &mut self,
+        params: &BucketsLockRetentionPolicyParams,
+    ) -> Result<Bucket> {
+        let rel_path = format!(
+            "b/{bucket}/lockRetentionPolicy",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Patches a bucket. Changes to the bucket will be readable immediately after writing, but configuration changes may take time to propagate.
+    pub async fn patch(&mut self, params: &BucketsPatchParams, req: &Bucket) -> Result<Bucket> {
+        let rel_path = format!(
+            "b/{bucket}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+
+    /// Updates an IAM policy for the specified bucket.
+    pub async fn set_iam_policy(
+        &mut self,
+        params: &BucketsSetIamPolicyParams,
+        req: &Policy,
+    ) -> Result<Policy> {
+        let rel_path = format!(
+            "b/{bucket}/iam",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+
+    /// Tests a set of permissions on the given bucket to see which, if any, are held by the caller.
+    pub async fn test_iam_permissions(
+        &mut self,
+        params: &BucketsTestIamPermissionsParams,
+    ) -> Result<TestIamPermissionsResponse> {
+        let rel_path = format!(
+            "b/{bucket}/iam/testPermissions",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates a bucket. Changes to the bucket will be readable immediately after writing, but configuration changes may take time to propagate.
+    pub async fn update(&mut self, params: &BucketsUpdateParams, req: &Bucket) -> Result<Bucket> {
+        let rel_path = format!(
+            "b/{bucket}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+}
+
+/// The Storage Channels service represents the Channels resource.
+pub struct ChannelsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ChannelsService {
+    /// Create a new ChannelsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ChannelsService {
+        ChannelsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Stop watching resources through this channel
+    pub async fn stop(&mut self, params: &ChannelsStopParams, req: &Channel) -> Result<()> {
+        let rel_path = format!("channels/stop",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+}
+
+/// The Storage DefaultObjectAccessControls service represents the DefaultObjectAccessControls resource.
+pub struct DefaultObjectAccessControlsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl DefaultObjectAccessControlsService {
+    /// Create a new DefaultObjectAccessControlsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> DefaultObjectAccessControlsService {
+        DefaultObjectAccessControlsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Permanently deletes the default object ACL entry for the specified entity on the specified bucket.
+    pub async fn delete(&mut self, params: &DefaultObjectAccessControlsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "b/{bucket}/defaultObjectAcl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Returns the default object ACL entry for the specified entity on the specified bucket.
+    pub async fn get(
+        &mut self,
+        params: &DefaultObjectAccessControlsGetParams,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/defaultObjectAcl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Creates a new default object ACL entry on the specified bucket.
+    pub async fn insert(
+        &mut self,
+        params: &DefaultObjectAccessControlsInsertParams,
+        req: &ObjectAccessControl,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/defaultObjectAcl",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Retrieves default object ACL entries on the specified bucket.
+    pub async fn list(
+        &mut self,
+        params: &DefaultObjectAccessControlsListParams,
+    ) -> Result<ObjectAccessControls> {
+        let rel_path = format!(
+            "b/{bucket}/defaultObjectAcl",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Patches a default object ACL entry on the specified bucket.
+    pub async fn patch(
+        &mut self,
+        params: &DefaultObjectAccessControlsPatchParams,
+        req: &ObjectAccessControl,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/defaultObjectAcl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+
+    /// Updates a default object ACL entry on the specified bucket.
+    pub async fn update(
+        &mut self,
+        params: &DefaultObjectAccessControlsUpdateParams,
+        req: &ObjectAccessControl,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/defaultObjectAcl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+}
+
+/// The Storage Notifications service represents the Notifications resource.
+pub struct NotificationsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl NotificationsService {
+    /// Create a new NotificationsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> NotificationsService {
+        NotificationsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Permanently deletes a notification subscription.
+    pub async fn delete(&mut self, params: &NotificationsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "b/{bucket}/notificationConfigs/{notification}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            notification = percent_encode(params.notification.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// View a notification configuration.
+    pub async fn get(&mut self, params: &NotificationsGetParams) -> Result<Notification> {
+        let rel_path = format!(
+            "b/{bucket}/notificationConfigs/{notification}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            notification = percent_encode(params.notification.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Creates a notification subscription for a given bucket.
+    pub async fn insert(
+        &mut self,
+        params: &NotificationsInsertParams,
+        req: &Notification,
+    ) -> Result<Notification> {
+        let rel_path = format!(
+            "b/{bucket}/notificationConfigs",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Retrieves a list of notification subscriptions for a given bucket.
+    pub async fn list(&mut self, params: &NotificationsListParams) -> Result<Notifications> {
+        let rel_path = format!(
+            "b/{bucket}/notificationConfigs",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+}
+
+/// The Storage ObjectAccessControls service represents the ObjectAccessControls resource.
+pub struct ObjectAccessControlsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ObjectAccessControlsService {
+    /// Create a new ObjectAccessControlsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ObjectAccessControlsService {
+        ObjectAccessControlsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Permanently deletes the ACL entry for the specified entity on the specified object.
+    pub async fn delete(&mut self, params: &ObjectAccessControlsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Returns the ACL entry for the specified entity on the specified object.
+    pub async fn get(
+        &mut self,
+        params: &ObjectAccessControlsGetParams,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Creates a new ACL entry on the specified object.
+    pub async fn insert(
+        &mut self,
+        params: &ObjectAccessControlsInsertParams,
+        req: &ObjectAccessControl,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/acl",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Retrieves ACL entries on the specified object.
+    pub async fn list(
+        &mut self,
+        params: &ObjectAccessControlsListParams,
+    ) -> Result<ObjectAccessControls> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/acl",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Patches an ACL entry on the specified object.
+    pub async fn patch(
+        &mut self,
+        params: &ObjectAccessControlsPatchParams,
+        req: &ObjectAccessControl,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+
+    /// Updates an ACL entry on the specified object.
+    pub async fn update(
+        &mut self,
+        params: &ObjectAccessControlsUpdateParams,
+        req: &ObjectAccessControl,
+    ) -> Result<ObjectAccessControl> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/acl/{entity}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
+            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+}
+
+/// The Storage Objects service represents the Objects resource.
+pub struct ObjectsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ObjectsService {
+    /// Create a new ObjectsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ObjectsService {
+        ObjectsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Concatenates a list of existing objects into a new object in the same bucket.
+    pub async fn compose(
+        &mut self,
+        params: &ObjectsComposeParams,
+        req: &ComposeRequest,
+    ) -> Result<Object> {
+        let rel_path = format!(
+            "b/{destinationBucket}/o/{destinationObject}/compose",
+            destinationBucket =
+                percent_encode(params.destination_bucket.as_bytes(), NON_ALPHANUMERIC),
+            destinationObject =
+                percent_encode(params.destination_object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Copies a source object to a destination object. Optionally overrides metadata.
+    pub async fn copy(&mut self, params: &ObjectsCopyParams, req: &Object) -> Result<Object> {
+        let rel_path = format!(
+            "b/{sourceBucket}/o/{sourceObject}/copyTo/b/{destinationBucket}/o/{destinationObject}",
+            sourceBucket = percent_encode(params.source_bucket.as_bytes(), NON_ALPHANUMERIC),
+            sourceObject = percent_encode(params.source_object.as_bytes(), NON_ALPHANUMERIC),
+            destinationBucket =
+                percent_encode(params.destination_bucket.as_bytes(), NON_ALPHANUMERIC),
+            destinationObject =
+                percent_encode(params.destination_object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Deletes an object and its metadata. Deletions are permanent if versioning is not enabled for the bucket, or if the generation parameter is used.
+    pub async fn delete(&mut self, params: &ObjectsDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Retrieves an object or its metadata.
+    ///
+    /// This method potentially downloads data. See documentation of `Download`.
+    pub async fn get<'a>(
+        &'a mut self,
+        params: &ObjectsGetParams,
+    ) -> Result<Download<'a, EmptyRequest, Object>> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+
+        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
+    }
+
+    /// Returns an IAM policy for the specified object.
+    pub async fn get_iam_policy(&mut self, params: &ObjectsGetIamPolicyParams) -> Result<Policy> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/iam",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Stores a new object and metadata.
+    pub async fn insert(&mut self, params: &ObjectsInsertParams, req: &Object) -> Result<Object> {
+        let rel_path = format!(
+            "b/{bucket}/o",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Stores a new object and metadata.
+    ///
+    /// This method is a variant of `insert()`, taking data for upload. It performs a multipart upload.
+    pub async fn insert_upload(
+        &mut self,
+        params: &ObjectsInsertParams,
+        req: &Object,
+        data: hyper::body::Bytes,
+    ) -> Result<Object> {
+        let rel_path = format!(
+            "/upload/storage/v1/b/{bucket}/o",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=multipart{params}", params = params);
+
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+
+        do_upload_multipart(&self.client, &full_uri, &headers, "POST", opt_request, data).await
+    }
+
+    /// Stores a new object and metadata.
+    ///
+    /// This method is a variant of `insert()`, taking data for upload.
+    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
+    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
+    /// you choose for the upload.
+    pub async fn insert_resumable_upload<'client>(
+        &'client mut self,
+        params: &ObjectsInsertParams,
+        req: &Object,
+    ) -> Result<ResumableUpload<'client, Object>> {
+        let rel_path = format!(
+            "/resumable/upload/storage/v1/b/{bucket}/o",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=resumable{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
+            do_request_with_headers(&self.client, &full_uri, &headers, "POST", opt_request).await?;
+        if let Some(dest) = headers.get(hyper::header::LOCATION) {
+            use std::convert::TryFrom;
+            Ok(ResumableUpload::new(
+                hyper::Uri::try_from(dest.to_str()?)?,
+                &self.client,
+                5 * 1024 * 1024,
+            ))
+        } else {
+            Err(Error::from(ApiError::RedirectError(format!(
+                "Resumable upload response didn't contain Location: {:?}",
+                headers
+            )))
+            .context(format!("{:?}", headers)))?
+        }
+    }
+
+    /// Retrieves a list of objects matching the criteria.
+    pub async fn list(&mut self, params: &ObjectsListParams) -> Result<Objects> {
+        let rel_path = format!(
+            "b/{bucket}/o",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Patches an object's metadata.
+    pub async fn patch(&mut self, params: &ObjectsPatchParams, req: &Object) -> Result<Object> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
+    }
+
+    /// Rewrites a source object to a destination object. Optionally overrides metadata.
+    pub async fn rewrite(
+        &mut self,
+        params: &ObjectsRewriteParams,
+        req: &Object,
+    ) -> Result<RewriteResponse> {
+        let rel_path = format!("b/{sourceBucket}/o/{sourceObject}/rewriteTo/b/{destinationBucket}/o/{destinationObject}", sourceBucket=percent_encode(params.source_bucket.as_bytes(), NON_ALPHANUMERIC),sourceObject=percent_encode(params.source_object.as_bytes(), NON_ALPHANUMERIC),destinationBucket=percent_encode(params.destination_bucket.as_bytes(), NON_ALPHANUMERIC),destinationObject=percent_encode(params.destination_object.as_bytes(), NON_ALPHANUMERIC));
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Updates an IAM policy for the specified object.
+    pub async fn set_iam_policy(
+        &mut self,
+        params: &ObjectsSetIamPolicyParams,
+        req: &Policy,
+    ) -> Result<Policy> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/iam",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+
+    /// Tests a set of permissions on the given object to see which, if any, are held by the caller.
+    pub async fn test_iam_permissions(
+        &mut self,
+        params: &ObjectsTestIamPermissionsParams,
+    ) -> Result<TestIamPermissionsResponse> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}/iam/testPermissions",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates an object's metadata.
+    pub async fn update(&mut self, params: &ObjectsUpdateParams, req: &Object) -> Result<Object> {
+        let rel_path = format!(
+            "b/{bucket}/o/{object}",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
+            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+
+    /// Watch for changes on all objects in a bucket.
+    pub async fn watch_all(
+        &mut self,
+        params: &ObjectsWatchAllParams,
+        req: &Channel,
+    ) -> Result<Channel> {
+        let rel_path = format!(
+            "b/{bucket}/o/watch",
+            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+}
+
+/// The Storage Projects service represents the Projects resource.
+pub struct ProjectsService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ProjectsService {
+    /// Create a new ProjectsService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ProjectsService {
+        ProjectsService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+}
+
+/// The Storage ProjectsHmacKeys service represents the ProjectsHmacKeys resource.
+pub struct ProjectsHmacKeysService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ProjectsHmacKeysService {
+    /// Create a new ProjectsHmacKeysService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ProjectsHmacKeysService {
+        ProjectsHmacKeysService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a new HMAC key for the specified service account.
+    pub async fn create(&mut self, params: &ProjectsHmacKeysCreateParams) -> Result<HmacKey> {
+        let rel_path = format!(
+            "projects/{projectId}/hmacKeys",
+            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Deletes an HMAC key.
+    pub async fn delete(&mut self, params: &ProjectsHmacKeysDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "projects/{projectId}/hmacKeys/{accessId}",
+            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC),
+            accessId = percent_encode(params.access_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Retrieves an HMAC key's metadata
+    pub async fn get(&mut self, params: &ProjectsHmacKeysGetParams) -> Result<HmacKeyMetadata> {
+        let rel_path = format!(
+            "projects/{projectId}/hmacKeys/{accessId}",
+            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC),
+            accessId = percent_encode(params.access_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadOnly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Retrieves a list of HMAC keys matching the criteria.
+    pub async fn list(&mut self, params: &ProjectsHmacKeysListParams) -> Result<HmacKeysMetadata> {
+        let rel_path = format!(
+            "projects/{projectId}/hmacKeys",
+            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadOnly.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+
+    /// Updates the state of an HMAC key. See the HMAC Key resource descriptor for valid states.
+    pub async fn update(
+        &mut self,
+        params: &ProjectsHmacKeysUpdateParams,
+        req: &HmacKeyMetadata,
+    ) -> Result<HmacKeyMetadata> {
+        let rel_path = format!(
+            "projects/{projectId}/hmacKeys/{accessId}",
+            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC),
+            accessId = percent_encode(params.access_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
+    }
+}
+
+/// The Storage ProjectsServiceAccount service represents the ProjectsServiceAccount resource.
+pub struct ProjectsServiceAccountService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl ProjectsServiceAccountService {
+    /// Create a new ProjectsServiceAccountService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> ProjectsServiceAccountService {
+        ProjectsServiceAccountService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://storage.googleapis.com/storage/v1/".into(),
+            root_url: "https://storage.googleapis.com/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Get the email address of this project's Google Cloud Storage service account.
+    pub async fn get(
+        &mut self,
+        params: &ProjectsServiceAccountGetParams,
+    ) -> Result<ServiceAccount> {
+        let rel_path = format!(
+            "projects/{projectId}/serviceAccount",
+            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.storage_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
+    }
+}
--- a/gcs_example/Cargo.lock	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1233 +0,0 @@
-# This file is automatically @generated by Cargo.
-# It is not intended for manual editing.
-[[package]]
-name = "aho-corasick"
-version = "0.7.14"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b476ce7103678b0c6d3d395dbbae31d48ff910bd28be979ba5d48c6351131d0d"
-dependencies = [
- "memchr",
-]
-
-[[package]]
-name = "ansi_term"
-version = "0.11.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ee49baf6cb617b853aa8d93bf420db2383fab46d314482ca2803b40d5fde979b"
-dependencies = [
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "anyhow"
-version = "1.0.33"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
-
-[[package]]
-name = "arrayref"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
-
-[[package]]
-name = "async-google-apis-common"
-version = "0.1.7"
-dependencies = [
- "anyhow",
- "chrono",
- "futures",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "radix64",
- "serde",
- "serde_json",
- "tokio",
- "yup-oauth2",
-]
-
-[[package]]
-name = "atty"
-version = "0.2.14"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
-dependencies = [
- "hermit-abi",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "autocfg"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
-
-[[package]]
-name = "base64"
-version = "0.11.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
-
-[[package]]
-name = "base64"
-version = "0.12.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
-
-[[package]]
-name = "bitflags"
-version = "1.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
-
-[[package]]
-name = "bumpalo"
-version = "3.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
-
-[[package]]
-name = "bytes"
-version = "0.5.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
-
-[[package]]
-name = "cc"
-version = "1.0.61"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
-
-[[package]]
-name = "cfg-if"
-version = "0.1.10"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
-
-[[package]]
-name = "chrono"
-version = "0.4.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
-dependencies = [
- "libc",
- "num-integer",
- "num-traits",
- "serde",
- "time",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "clap"
-version = "2.33.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "37e58ac78573c40708d45522f0d80fa2f01cc4f9b4e2bf749807255454312002"
-dependencies = [
- "ansi_term",
- "atty",
- "bitflags",
- "strsim",
- "textwrap",
- "unicode-width",
- "vec_map",
-]
-
-[[package]]
-name = "core-foundation"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "core-foundation-sys"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
-
-[[package]]
-name = "ct-logs"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
-dependencies = [
- "sct",
-]
-
-[[package]]
-name = "env_logger"
-version = "0.8.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "54532e3223c5af90a6a757c90b5c5521564b07e5e7a958681bcd2afad421cdcd"
-dependencies = [
- "atty",
- "humantime",
- "log",
- "regex",
- "termcolor",
-]
-
-[[package]]
-name = "fnv"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
-
-[[package]]
-name = "fuchsia-zircon"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
-dependencies = [
- "bitflags",
- "fuchsia-zircon-sys",
-]
-
-[[package]]
-name = "fuchsia-zircon-sys"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
-
-[[package]]
-name = "futures"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "95314d38584ffbfda215621d723e0a3906f032e03ae5551e650058dac83d4797"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-executor",
- "futures-io",
- "futures-sink",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-channel"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0448174b01148032eed37ac4aed28963aaaa8cfa93569a08e5b479bbc6c2c151"
-dependencies = [
- "futures-core",
- "futures-sink",
-]
-
-[[package]]
-name = "futures-core"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "18eaa56102984bed2c88ea39026cff3ce3b4c7f508ca970cedf2450ea10d4e46"
-
-[[package]]
-name = "futures-executor"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f5f8e0c9258abaea85e78ebdda17ef9666d390e987f006be6080dfe354b708cb"
-dependencies = [
- "futures-core",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-io"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e1798854a4727ff944a7b12aa999f58ce7aa81db80d2dfaaf2ba06f065ddd2b"
-
-[[package]]
-name = "futures-macro"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e36fccf3fc58563b4a14d265027c627c3b665d7fed489427e88e7cc929559efe"
-dependencies = [
- "proc-macro-hack",
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "futures-sink"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e3ca3f17d6e8804ae5d3df7a7d35b2b3a6fe89dac84b31872720fc3060a0b11"
-
-[[package]]
-name = "futures-task"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "96d502af37186c4fef99453df03e374683f8a1eec9dcc1e66b3b82dc8278ce3c"
-dependencies = [
- "once_cell",
-]
-
-[[package]]
-name = "futures-util"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "abcb44342f62e6f3e8ac427b8aa815f724fd705dfad060b18ac7866c15bb8e34"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-io",
- "futures-macro",
- "futures-sink",
- "futures-task",
- "memchr",
- "pin-project 1.0.1",
- "pin-utils",
- "proc-macro-hack",
- "proc-macro-nested",
- "slab",
-]
-
-[[package]]
-name = "gcs_example"
-version = "0.1.0"
-dependencies = [
- "anyhow",
- "async-google-apis-common",
- "chrono",
- "clap",
- "env_logger",
- "hyper",
- "hyper-rustls",
- "serde",
- "tokio",
-]
-
-[[package]]
-name = "h2"
-version = "0.2.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5e4728fd124914ad25e99e3d15a9361a879f6620f63cb56bbb08f95abb97a535"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "futures-sink",
- "futures-util",
- "http",
- "indexmap",
- "slab",
- "tokio",
- "tokio-util",
- "tracing",
- "tracing-futures",
-]
-
-[[package]]
-name = "hashbrown"
-version = "0.9.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
-
-[[package]]
-name = "hermit-abi"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "http"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
-dependencies = [
- "bytes",
- "fnv",
- "itoa",
-]
-
-[[package]]
-name = "http-body"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
-dependencies = [
- "bytes",
- "http",
-]
-
-[[package]]
-name = "httparse"
-version = "1.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
-
-[[package]]
-name = "httpdate"
-version = "0.3.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
-
-[[package]]
-name = "humantime"
-version = "2.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3c1ad908cc71012b7bea4d0c53ba96a8cba9962f048fa68d143376143d863b7a"
-
-[[package]]
-name = "hyper"
-version = "0.13.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
-dependencies = [
- "bytes",
- "futures-channel",
- "futures-core",
- "futures-util",
- "h2",
- "http",
- "http-body",
- "httparse",
- "httpdate",
- "itoa",
- "pin-project 0.4.27",
- "socket2",
- "tokio",
- "tower-service",
- "tracing",
- "want",
-]
-
-[[package]]
-name = "hyper-rustls"
-version = "0.20.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
-dependencies = [
- "bytes",
- "ct-logs",
- "futures-util",
- "hyper",
- "log",
- "rustls",
- "rustls-native-certs",
- "tokio",
- "tokio-rustls",
- "webpki",
-]
-
-[[package]]
-name = "idna"
-version = "0.2.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
-dependencies = [
- "matches",
- "unicode-bidi",
- "unicode-normalization",
-]
-
-[[package]]
-name = "indexmap"
-version = "1.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
-dependencies = [
- "autocfg",
- "hashbrown",
-]
-
-[[package]]
-name = "iovec"
-version = "0.1.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "itoa"
-version = "0.4.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
-
-[[package]]
-name = "js-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
-dependencies = [
- "wasm-bindgen",
-]
-
-[[package]]
-name = "kernel32-sys"
-version = "0.2.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "lazy_static"
-version = "1.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
-
-[[package]]
-name = "libc"
-version = "0.2.80"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d58d1b70b004888f764dfbf6a26a3b0342a1632d33968e4a179d8011c760614"
-
-[[package]]
-name = "log"
-version = "0.4.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
-dependencies = [
- "cfg-if",
-]
-
-[[package]]
-name = "matches"
-version = "0.1.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
-
-[[package]]
-name = "memchr"
-version = "2.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
-
-[[package]]
-name = "mio"
-version = "0.6.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
-dependencies = [
- "cfg-if",
- "fuchsia-zircon",
- "fuchsia-zircon-sys",
- "iovec",
- "kernel32-sys",
- "libc",
- "log",
- "miow",
- "net2",
- "slab",
- "winapi 0.2.8",
-]
-
-[[package]]
-name = "miow"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
-dependencies = [
- "kernel32-sys",
- "net2",
- "winapi 0.2.8",
- "ws2_32-sys",
-]
-
-[[package]]
-name = "net2"
-version = "0.2.35"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
-dependencies = [
- "cfg-if",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "num-integer"
-version = "0.1.43"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
-dependencies = [
- "autocfg",
- "num-traits",
-]
-
-[[package]]
-name = "num-traits"
-version = "0.2.12"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
-dependencies = [
- "autocfg",
-]
-
-[[package]]
-name = "once_cell"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
-
-[[package]]
-name = "openssl-probe"
-version = "0.1.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
-
-[[package]]
-name = "percent-encoding"
-version = "2.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
-
-[[package]]
-name = "pin-project"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
-dependencies = [
- "pin-project-internal 0.4.27",
-]
-
-[[package]]
-name = "pin-project"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ee41d838744f60d959d7074e3afb6b35c7456d0f61cad38a24e35e6553f73841"
-dependencies = [
- "pin-project-internal 1.0.1",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "81a4ffa594b66bff340084d4081df649a7dc049ac8d7fc458d8e628bfbbb2f86"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-lite"
-version = "0.1.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b"
-
-[[package]]
-name = "pin-utils"
-version = "0.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
-
-[[package]]
-name = "proc-macro-hack"
-version = "0.5.18"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
-
-[[package]]
-name = "proc-macro-nested"
-version = "0.1.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
-
-[[package]]
-name = "proc-macro2"
-version = "1.0.24"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
-dependencies = [
- "unicode-xid",
-]
-
-[[package]]
-name = "quote"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
-dependencies = [
- "proc-macro2",
-]
-
-[[package]]
-name = "radix64"
-version = "0.6.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
-dependencies = [
- "arrayref",
- "cfg-if",
-]
-
-[[package]]
-name = "redox_syscall"
-version = "0.1.57"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
-
-[[package]]
-name = "regex"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8963b85b8ce3074fecffde43b4b0dded83ce2f367dc8d363afc56679f3ee820b"
-dependencies = [
- "aho-corasick",
- "memchr",
- "regex-syntax",
- "thread_local",
-]
-
-[[package]]
-name = "regex-syntax"
-version = "0.6.20"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8cab7a364d15cde1e505267766a2d3c4e22a843e1a601f0fa7564c0f82ced11c"
-
-[[package]]
-name = "ring"
-version = "0.16.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
-dependencies = [
- "cc",
- "libc",
- "once_cell",
- "spin",
- "untrusted",
- "web-sys",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "rustls"
-version = "0.17.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
-dependencies = [
- "base64 0.11.0",
- "log",
- "ring",
- "sct",
- "webpki",
-]
-
-[[package]]
-name = "rustls-native-certs"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
-dependencies = [
- "openssl-probe",
- "rustls",
- "schannel",
- "security-framework",
-]
-
-[[package]]
-name = "ryu"
-version = "1.0.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
-
-[[package]]
-name = "schannel"
-version = "0.1.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
-dependencies = [
- "lazy_static",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "sct"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "seahash"
-version = "4.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
-
-[[package]]
-name = "security-framework"
-version = "0.4.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
-dependencies = [
- "bitflags",
- "core-foundation",
- "core-foundation-sys",
- "libc",
- "security-framework-sys",
-]
-
-[[package]]
-name = "security-framework-sys"
-version = "0.4.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "serde"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
-dependencies = [
- "serde_derive",
-]
-
-[[package]]
-name = "serde_derive"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "serde_json"
-version = "1.0.59"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
-dependencies = [
- "itoa",
- "ryu",
- "serde",
-]
-
-[[package]]
-name = "slab"
-version = "0.4.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
-
-[[package]]
-name = "socket2"
-version = "0.3.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
-dependencies = [
- "cfg-if",
- "libc",
- "redox_syscall",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "spin"
-version = "0.5.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
-
-[[package]]
-name = "strsim"
-version = "0.8.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8ea5119cdb4c55b55d432abb513a0429384878c15dde60cc77b1c99de1a95a6a"
-
-[[package]]
-name = "syn"
-version = "1.0.48"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cc371affeffc477f42a221a1e4297aedcea33d47d19b61455588bd9d8f6b19ac"
-dependencies = [
- "proc-macro2",
- "quote",
- "unicode-xid",
-]
-
-[[package]]
-name = "termcolor"
-version = "1.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f"
-dependencies = [
- "winapi-util",
-]
-
-[[package]]
-name = "textwrap"
-version = "0.11.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d326610f408c7a4eb6f51c37c330e496b08506c9457c9d34287ecc38809fb060"
-dependencies = [
- "unicode-width",
-]
-
-[[package]]
-name = "thread_local"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "time"
-version = "0.1.44"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
-dependencies = [
- "libc",
- "wasi",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "tinyvec"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
-
-[[package]]
-name = "tokio"
-version = "0.2.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "iovec",
- "lazy_static",
- "memchr",
- "mio",
- "pin-project-lite",
- "slab",
- "tokio-macros",
-]
-
-[[package]]
-name = "tokio-macros"
-version = "0.2.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "tokio-rustls"
-version = "0.13.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
-dependencies = [
- "futures-core",
- "rustls",
- "tokio",
- "webpki",
-]
-
-[[package]]
-name = "tokio-util"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
-dependencies = [
- "bytes",
- "futures-core",
- "futures-sink",
- "log",
- "pin-project-lite",
- "tokio",
-]
-
-[[package]]
-name = "tower-service"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
-
-[[package]]
-name = "tracing"
-version = "0.1.21"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
-dependencies = [
- "cfg-if",
- "log",
- "pin-project-lite",
- "tracing-core",
-]
-
-[[package]]
-name = "tracing-core"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "tracing-futures"
-version = "0.2.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c"
-dependencies = [
- "pin-project 0.4.27",
- "tracing",
-]
-
-[[package]]
-name = "try-lock"
-version = "0.2.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
-
-[[package]]
-name = "unicode-bidi"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
-dependencies = [
- "matches",
-]
-
-[[package]]
-name = "unicode-normalization"
-version = "0.1.13"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
-dependencies = [
- "tinyvec",
-]
-
-[[package]]
-name = "unicode-width"
-version = "0.1.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "9337591893a19b88d8d87f2cec1e73fad5cdfd10e5a6f349f498ad6ea2ffb1e3"
-
-[[package]]
-name = "unicode-xid"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
-
-[[package]]
-name = "untrusted"
-version = "0.7.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
-
-[[package]]
-name = "url"
-version = "2.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
-dependencies = [
- "idna",
- "matches",
- "percent-encoding",
-]
-
-[[package]]
-name = "vec_map"
-version = "0.8.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f1bddf1187be692e79c5ffeab891132dfb0f236ed36a43c7ed39f1165ee20191"
-
-[[package]]
-name = "want"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
-dependencies = [
- "log",
- "try-lock",
-]
-
-[[package]]
-name = "wasi"
-version = "0.10.0+wasi-snapshot-preview1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
-
-[[package]]
-name = "wasm-bindgen"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
-dependencies = [
- "cfg-if",
- "wasm-bindgen-macro",
-]
-
-[[package]]
-name = "wasm-bindgen-backend"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
-dependencies = [
- "bumpalo",
- "lazy_static",
- "log",
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-macro"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
-dependencies = [
- "quote",
- "wasm-bindgen-macro-support",
-]
-
-[[package]]
-name = "wasm-bindgen-macro-support"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-backend",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-shared"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
-
-[[package]]
-name = "web-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
-dependencies = [
- "js-sys",
- "wasm-bindgen",
-]
-
-[[package]]
-name = "webpki"
-version = "0.21.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "winapi"
-version = "0.2.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
-
-[[package]]
-name = "winapi"
-version = "0.3.9"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
-dependencies = [
- "winapi-i686-pc-windows-gnu",
- "winapi-x86_64-pc-windows-gnu",
-]
-
-[[package]]
-name = "winapi-build"
-version = "0.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
-
-[[package]]
-name = "winapi-i686-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
-
-[[package]]
-name = "winapi-util"
-version = "0.1.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
-dependencies = [
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "winapi-x86_64-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
-
-[[package]]
-name = "ws2_32-sys"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "yup-oauth2"
-version = "4.1.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "92ed435d48d4c834ee654443dd3330399f9656506d7477ec645df58e406a25db"
-dependencies = [
- "base64 0.12.3",
- "chrono",
- "futures",
- "http",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "rustls",
- "seahash",
- "serde",
- "serde_json",
- "tokio",
- "url",
-]
--- a/gcs_example/Cargo.toml	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,19 +0,0 @@
-[package]
-name = "gcs_example"
-version = "0.1.0"
-authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
-edition = "2018"
-
-# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
-
-[dependencies]
-async-google-apis-common = { path = "../async-google-apis-common" }
-
-anyhow = "~1.0"
-chrono = "~0.4"
-clap = "~2.33"
-serde = "~1.0"
-env_logger = "~0.8"
-hyper-rustls = "~0.20"
-hyper = "~0.13"
-tokio = { version = "~0.2", features = ["rt-core", "io-util", "macros", "fs"] }
--- a/gcs_example/README.md	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,34 +0,0 @@
-# `gcs_example`
-
-This example binary can upload/download/list objects in Google Cloud Storage
-buckets.
-
-## Usage
-
-Expects a service account key in the
-`client_secret.json` file. You can download it from the Cloud console, and it
-should look roughly like this:
-
-```json
-{
-  "type": "service_account",
-  "project_id": "project",
-  "private_key_id": "...key id...",
-  "private_key": "...private key...",
-  "client_email": "account@project.iam.gserviceaccount.com",
-  "client_id": "106100510664759551719",
-  "auth_uri": "https://accounts.google.com/o/oauth2/auth",
-  "token_uri": "https://oauth2.googleapis.com/token",
-  "auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
-  "client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/account@project.iam.gserviceaccount.com"
-}
-```
-
-You can then find out more by running
-
-```bash
-$ gcs_example --help
-```
-
-Run with `RUST_LOG=debug` in order to see an accurate record of HTTP requests
-being sent and received.
--- a/gcs_example/src/main.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,227 +0,0 @@
-mod storage_v1_types;
-
-use anyhow::Context;
-use async_google_apis_common as common;
-use env_logger;
-
-use std::path::Path;
-
-/// Create a new HTTPS client.
-fn https_client() -> common::TlsClient {
-    let conn = hyper_rustls::HttpsConnector::new();
-    let cl = hyper::Client::builder().build(conn);
-    cl
-}
-
-async fn upload_file(
-    mut cl: storage_v1_types::ObjectsService,
-    bucket: &str,
-    p: &Path,
-    prefix: &str,
-) -> common::Result<()> {
-    let mut params = storage_v1_types::ObjectsInsertParams::default();
-    params.bucket = bucket.into();
-    assert!(prefix.ends_with("/") || prefix.is_empty());
-    params.name = Some(prefix.to_string() + p.file_name().unwrap().to_str().unwrap());
-    let obj = storage_v1_types::Object::default();
-
-    let f = tokio::fs::OpenOptions::new().read(true).open(p).await?;
-    let result = cl
-        .insert_resumable_upload(&params, &obj)
-        .await?
-        .set_max_chunksize(1024 * 1024 * 5)?
-        .upload_file(f)
-        .await?;
-
-    println!("Uploaded object: {:?}", result);
-
-    Ok(())
-}
-
-async fn download_file(
-    mut cl: storage_v1_types::ObjectsService,
-    bucket: &str,
-    id: &str,
-) -> common::Result<()> {
-    // Set alt=media for download.
-    let mut gparams = storage_v1_types::StorageParams::default();
-    gparams.alt = Some("media".into());
-    let mut params = storage_v1_types::ObjectsGetParams::default();
-    params.storage_params = Some(gparams);
-    params.bucket = bucket.into();
-    params.object = id.into();
-
-    let id = id.replace("/", "_");
-    let mut f = tokio::fs::OpenOptions::new()
-        .write(true)
-        .create(true)
-        .open(id)
-        .await?;
-    let mut download = cl.get(&params).await?;
-
-    // Now run the actual download.
-    let result = download.do_it(Some(&mut f)).await?;
-    match result {
-        common::DownloadResult::Downloaded => println!("Downloaded object successfully."),
-        common::DownloadResult::Response(_) => panic!("Received response but expected download."),
-    }
-
-    Ok(())
-}
-
-fn print_objects(objs: &storage_v1_types::Objects) {
-    if let Some(ref objs) = objs.items {
-        for obj in objs.iter() {
-            println!(
-                "{} ({} B), class {}. Created @ {} by {}. => {}",
-                obj.name.as_ref().unwrap_or(&"(unknown name)".into()),
-                obj.size.as_ref().unwrap_or(&"(unknown size)".into()),
-                obj.storage_class
-                    .as_ref()
-                    .unwrap_or(&"(unknown class)".into()),
-                obj.time_created
-                    .as_ref()
-                    .map(|dt| format!("{}", dt))
-                    .unwrap_or("(unknown time)".into()),
-                obj.owner
-                    .as_ref()
-                    .unwrap_or(&Default::default())
-                    .entity
-                    .as_ref()
-                    .unwrap_or(&"".into()),
-                obj.media_link.as_ref().unwrap_or(&"(unknown link)".into())
-            );
-        }
-    }
-}
-
-async fn list_objects(
-    mut cl: storage_v1_types::ObjectsService,
-    bucket: &str,
-    prefix: &str,
-) -> common::Result<()> {
-    let mut params = storage_v1_types::ObjectsListParams::default();
-    params.bucket = bucket.into();
-    params.prefix = Some(prefix.into());
-    params.storage_params = Some(storage_v1_types::StorageParams::default());
-    params.storage_params.as_mut().unwrap().fields = Some("*".into());
-
-    let mut npt = None;
-    loop {
-        params.page_token = npt.take();
-        let result = cl.list(&params).await?;
-        print_objects(&result);
-        if result.next_page_token.is_some() {
-            npt = result.next_page_token.clone();
-        } else {
-            break;
-        }
-    }
-    Ok(())
-}
-
-async fn rm_object(
-    mut cl: storage_v1_types::ObjectsService,
-    bucket: &str,
-    id: &str,
-) -> common::Result<()> {
-    let mut params = storage_v1_types::ObjectsDeleteParams::default();
-    params.bucket = bucket.into();
-    params.object = id.into();
-
-    cl.delete(&params).await
-}
-
-#[tokio::main]
-async fn main() {
-    env_logger::init();
-
-    let matches = clap::App::new("gcs_example")
-        .version("0.1")
-        .about("Upload objects to GCS.")
-        .arg(
-            clap::Arg::with_name("BUCKET")
-                .help("target bucket")
-                .long("bucket")
-                .required(true)
-                .short("b")
-                .takes_value(true),
-        )
-        .arg(
-            clap::Arg::with_name("ACTION")
-                .help("What to do.")
-                .long("action")
-                .possible_values(&["get", "list", "put", "rm"])
-                .required(true)
-                .short("a")
-                .takes_value(true),
-        )
-        .arg(
-            clap::Arg::with_name("PREFIX")
-                .help("When listing with -a list: Prefix of objects to list. When uploading with -a put: Prefix to prepend to filename.")
-                .long("prefix")
-                .short("p")
-                .takes_value(true),
-        )
-        .arg(
-            clap::Arg::with_name("FILE_OR_OBJECT")
-                .help("File to upload")
-                .index(1),
-        )
-        .get_matches();
-
-    let https_client = https_client();
-    let service_account_key = common::yup_oauth2::read_service_account_key("client_secret.json")
-        .await
-        .map_err(anyhow::Error::from)
-        .context("client_secret.json")
-        .unwrap();
-    let authenticator =
-        common::yup_oauth2::ServiceAccountAuthenticator::builder(service_account_key)
-            .hyper_client(https_client.clone())
-            .persist_tokens_to_disk("tokencache.json")
-            .build()
-            .await
-            .expect("ServiceAccount authenticator failed.");
-    let authenticator = std::rc::Rc::new(authenticator);
-
-    let action = matches.value_of("ACTION").expect("--action is required.");
-    let buck = matches
-        .value_of("BUCKET")
-        .expect("--bucket is a mandatory argument.");
-
-    let cl = storage_v1_types::ObjectsService::new(https_client, authenticator);
-
-    if action == "get" {
-        let obj = matches
-            .value_of("FILE_OR_OBJECT")
-            .expect("OBJECT is a mandatory argument.");
-        download_file(cl, buck, obj)
-            .await
-            .expect("Download failed :(");
-    } else if action == "put" {
-        let fp = matches
-            .value_of("FILE_OR_OBJECT")
-            .expect("FILE is a mandatory argument.");
-        let mut pre = matches.value_of("PREFIX").unwrap_or("").to_string();
-        if !pre.ends_with("/") && !pre.is_empty() {
-            pre = pre.to_string() + "/";
-        }
-        upload_file(cl, buck, Path::new(&fp), &pre)
-            .await
-            .expect("Upload failed :(");
-        return;
-    } else if action == "list" {
-        let prefix = matches.value_of("PREFIX").unwrap_or("");
-        list_objects(cl, buck, prefix)
-            .await
-            .expect("List failed :(");
-        return;
-    } else if action == "rm" {
-        let obj = matches
-            .value_of("FILE_OR_OBJECT")
-            .expect("OBJECT is a mandatory argument.");
-        rm_object(cl, buck, obj).await.expect("rm failed :(");
-        return;
-    }
-}
--- a/gcs_example/src/storage_v1_types.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,7010 +0,0 @@
-#![allow(unused_variables, unused_mut, dead_code)]
-//! This file was generated by async-google-apis. (https://github.com/dermesser/async-google-apis)
-//!
-//! (c) 2020 Lewin Bormann <lbo@spheniscida.de>
-//!
-//! ## Getting started
-//!
-//! **Tip**: Take a look at those types ending in `...Service`. These represent API resources
-//! and contain methods to interact with an API. The remaining types are used by those methods
-//! and can be explored starting from a method you want to use.
-//!
-//! I'd be happy if you let me know about your use case of this code.
-//!
-//! THIS FILE HAS BEEN GENERATED -- SAVE ANY MODIFICATIONS BEFORE REPLACING.
-
-use async_google_apis_common::*;
-
-/// Scopes of this API. Convertible to their string representation with `AsRef`.
-#[derive(Debug, Clone, Copy)]
-pub enum StorageScopes {
-    /// View and manage your data across Google Cloud Platform services
-    ///
-    /// URL: https://www.googleapis.com/auth/cloud-platform
-    CloudPlatform,
-    /// View your data across Google Cloud Platform services
-    ///
-    /// URL: https://www.googleapis.com/auth/cloud-platform.read-only
-    CloudPlatformReadOnly,
-    /// Manage your data and permissions in Google Cloud Storage
-    ///
-    /// URL: https://www.googleapis.com/auth/devstorage.full_control
-    DevstorageFullControl,
-    /// View your data in Google Cloud Storage
-    ///
-    /// URL: https://www.googleapis.com/auth/devstorage.read_only
-    DevstorageReadOnly,
-    /// Manage your data in Google Cloud Storage
-    ///
-    /// URL: https://www.googleapis.com/auth/devstorage.read_write
-    DevstorageReadWrite,
-}
-
-impl std::convert::AsRef<str> for StorageScopes {
-    fn as_ref(&self) -> &'static str {
-        match self {
-            StorageScopes::CloudPlatform => "https://www.googleapis.com/auth/cloud-platform",
-            StorageScopes::CloudPlatformReadOnly => {
-                "https://www.googleapis.com/auth/cloud-platform.read-only"
-            }
-            StorageScopes::DevstorageFullControl => {
-                "https://www.googleapis.com/auth/devstorage.full_control"
-            }
-            StorageScopes::DevstorageReadOnly => {
-                "https://www.googleapis.com/auth/devstorage.read_only"
-            }
-            StorageScopes::DevstorageReadWrite => {
-                "https://www.googleapis.com/auth/devstorage.read_write"
-            }
-        }
-    }
-}
-
-/// The bucket's billing configuration.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketBilling {
-    /// When set to true, Requester Pays is enabled for this bucket.
-    #[serde(rename = "requesterPays")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub requester_pays: Option<bool>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketCors {
-    /// The value, in seconds, to return in the  Access-Control-Max-Age header used in preflight responses.
-    #[serde(rename = "maxAgeSeconds")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub max_age_seconds: Option<i32>,
-    /// The list of HTTP methods on which to include CORS response headers, (GET, OPTIONS, POST, etc) Note: "*" is permitted in the list of methods, and means "any method".
-    #[serde(rename = "method")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub method: Option<Vec<String>>,
-    /// The list of Origins eligible to receive CORS response headers. Note: "*" is permitted in the list of origins, and means "any Origin".
-    #[serde(rename = "origin")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub origin: Option<Vec<String>>,
-    /// The list of HTTP headers other than the simple response headers to give permission for the user-agent to share across domains.
-    #[serde(rename = "responseHeader")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub response_header: Option<Vec<String>>,
-}
-
-/// Encryption configuration for a bucket.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketEncryption {
-    /// A Cloud KMS key that will be used to encrypt objects inserted into this bucket, if no encryption method is specified.
-    #[serde(rename = "defaultKmsKeyName")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub default_kms_key_name: Option<String>,
-}
-
-/// The bucket's uniform bucket-level access configuration. The feature was formerly known as Bucket Policy Only. For backward compatibility, this field will be populated with identical information as the uniformBucketLevelAccess field. We recommend using the uniformBucketLevelAccess field to enable and disable the feature.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketIamConfigurationBucketPolicyOnly {
-    /// If set, access is controlled only by bucket-level or above IAM policies.
-    #[serde(rename = "enabled")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub enabled: Option<bool>,
-    /// DateTime: The deadline for changing iamConfiguration.bucketPolicyOnly.enabled from true to false in RFC 3339 format. iamConfiguration.bucketPolicyOnly.enabled may be changed from true to false until the locked time, after which the field is immutable.
-    #[serde(rename = "lockedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub locked_time: Option<DateTime<Utc>>,
-}
-
-/// The bucket's uniform bucket-level access configuration.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketIamConfigurationUniformBucketLevelAccess {
-    /// If set, access is controlled only by bucket-level or above IAM policies.
-    #[serde(rename = "enabled")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub enabled: Option<bool>,
-    /// DateTime: The deadline for changing iamConfiguration.uniformBucketLevelAccess.enabled from true to false in RFC 3339  format. iamConfiguration.uniformBucketLevelAccess.enabled may be changed from true to false until the locked time, after which the field is immutable.
-    #[serde(rename = "lockedTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub locked_time: Option<DateTime<Utc>>,
-}
-
-/// The bucket's IAM configuration.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketIamConfiguration {
-    /// The bucket's uniform bucket-level access configuration. The feature was formerly known as Bucket Policy Only. For backward compatibility, this field will be populated with identical information as the uniformBucketLevelAccess field. We recommend using the uniformBucketLevelAccess field to enable and disable the feature.
-    #[serde(rename = "bucketPolicyOnly")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub bucket_policy_only: Option<BucketIamConfigurationBucketPolicyOnly>,
-    /// The bucket's uniform bucket-level access configuration.
-    #[serde(rename = "uniformBucketLevelAccess")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub uniform_bucket_level_access: Option<BucketIamConfigurationUniformBucketLevelAccess>,
-}
-
-/// The action to take.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketLifecycleRuleAction {
-    /// Target storage class. Required iff the type of the action is SetStorageClass.
-    #[serde(rename = "storageClass")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub storage_class: Option<String>,
-    /// Type of the action. Currently, only Delete and SetStorageClass are supported.
-    #[serde(rename = "type")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub typ: Option<String>,
-}
-
-/// The condition(s) under which the action will be taken.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketLifecycleRuleCondition {
-    /// Age of an object (in days). This condition is satisfied when an object reaches the specified age.
-    #[serde(rename = "age")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub age: Option<i32>,
-    /// A date in RFC 3339 format with only the date part (for instance, "2013-01-15"). This condition is satisfied when an object is created before midnight of the specified date in UTC.
-    #[serde(rename = "createdBefore")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub created_before: Option<String>,
-    /// A date in RFC 3339 format with only the date part (for instance, "2013-01-15"). This condition is satisfied when the custom time on an object is before this date in UTC.
-    #[serde(rename = "customTimeBefore")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub custom_time_before: Option<String>,
-    /// Number of days elapsed since the user-specified timestamp set on an object. The condition is satisfied if the days elapsed is at least this number. If no custom timestamp is specified on an object, the condition does not apply.
-    #[serde(rename = "daysSinceCustomTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub days_since_custom_time: Option<i32>,
-    /// Number of days elapsed since the noncurrent timestamp of an object. The condition is satisfied if the days elapsed is at least this number. This condition is relevant only for versioned objects. The value of the field must be a nonnegative integer. If it's zero, the object version will become eligible for Lifecycle action as soon as it becomes noncurrent.
-    #[serde(rename = "daysSinceNoncurrentTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub days_since_noncurrent_time: Option<i32>,
-    /// Relevant only for versioned objects. If the value is true, this condition matches live objects; if the value is false, it matches archived objects.
-    #[serde(rename = "isLive")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub is_live: Option<bool>,
-    /// A regular expression that satisfies the RE2 syntax. This condition is satisfied when the name of the object matches the RE2 pattern. Note: This feature is currently in the "Early Access" launch stage and is only available to a whitelisted set of users; that means that this feature may be changed in backward-incompatible ways and that it is not guaranteed to be released.
-    #[serde(rename = "matchesPattern")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub matches_pattern: Option<String>,
-    /// Objects having any of the storage classes specified by this condition will be matched. Values include MULTI_REGIONAL, REGIONAL, NEARLINE, COLDLINE, ARCHIVE, STANDARD, and DURABLE_REDUCED_AVAILABILITY.
-    #[serde(rename = "matchesStorageClass")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub matches_storage_class: Option<Vec<String>>,
-    /// A date in RFC 3339 format with only the date part (for instance, "2013-01-15"). This condition is satisfied when the noncurrent time on an object is before this date in UTC. This condition is relevant only for versioned objects.
-    #[serde(rename = "noncurrentTimeBefore")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub noncurrent_time_before: Option<String>,
-    /// Relevant only for versioned objects. If the value is N, this condition is satisfied when there are at least N versions (including the live version) newer than this version of the object.
-    #[serde(rename = "numNewerVersions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub num_newer_versions: Option<i32>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketLifecycleRule {
-    /// The action to take.
-    #[serde(rename = "action")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub action: Option<BucketLifecycleRuleAction>,
-    /// The condition(s) under which the action will be taken.
-    #[serde(rename = "condition")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub condition: Option<BucketLifecycleRuleCondition>,
-}
-
-/// The bucket's lifecycle configuration. See lifecycle management for more information.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketLifecycle {
-    /// A lifecycle management rule, which is made of an action to take and the condition(s) under which the action will be taken.
-    #[serde(rename = "rule")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub rule: Option<Vec<BucketLifecycleRule>>,
-}
-
-/// The bucket's logging configuration, which defines the destination bucket and optional name prefix for the current bucket's logs.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketLogging {
-    /// The destination bucket where the current bucket's logs should be placed.
-    #[serde(rename = "logBucket")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub log_bucket: Option<String>,
-    /// A prefix for log object names.
-    #[serde(rename = "logObjectPrefix")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub log_object_prefix: Option<String>,
-}
-
-/// The owner of the bucket. This is always the project team's owner group.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketOwner {
-    /// The entity, in the form project-owner-projectId.
-    #[serde(rename = "entity")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity: Option<String>,
-    /// The ID for the entity.
-    #[serde(rename = "entityId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity_id: Option<String>,
-}
-
-/// The bucket's retention policy. The retention policy enforces a minimum retention time for all objects contained in the bucket, based on their creation time. Any attempt to overwrite or delete objects younger than the retention period will result in a PERMISSION_DENIED error. An unlocked retention policy can be modified or removed from the bucket via a storage.buckets.update operation. A locked retention policy cannot be removed or shortened in duration for the lifetime of the bucket. Attempting to remove or decrease period of a locked retention policy will result in a PERMISSION_DENIED error.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketRetentionPolicy {
-    /// DateTime: Server-determined value that indicates the time from which policy was enforced and effective. This value is in RFC 3339 format.
-    #[serde(rename = "effectiveTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub effective_time: Option<DateTime<Utc>>,
-    /// Once locked, an object retention policy cannot be modified.
-    #[serde(rename = "isLocked")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub is_locked: Option<bool>,
-    /// i64: The duration in seconds that objects need to be retained. Retention duration must be greater than zero and less than 100 years. Note that enforcement of retention periods less than a day is not guaranteed. Such periods should only be used for testing purposes.
-    #[serde(rename = "retentionPeriod")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub retention_period: Option<String>,
-}
-
-/// The bucket's versioning configuration.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketVersioning {
-    /// While set to true, versioning is fully enabled for this bucket.
-    #[serde(rename = "enabled")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub enabled: Option<bool>,
-}
-
-/// The bucket's website configuration, controlling how the service behaves when accessing bucket contents as a web site. See the Static Website Examples for more information.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketWebsite {
-    /// If the requested object path is missing, the service will ensure the path has a trailing '/', append this suffix, and attempt to retrieve the resulting object. This allows the creation of index.html objects to represent directory pages.
-    #[serde(rename = "mainPageSuffix")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub main_page_suffix: Option<String>,
-    /// If the requested object path is missing, and any mainPageSuffix object is missing, if applicable, the service will return the named object from this bucket as the content for a 404 Not Found result.
-    #[serde(rename = "notFoundPage")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub not_found_page: Option<String>,
-}
-
-/// A bucket.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Bucket {
-    /// Access controls on the bucket.
-    #[serde(rename = "acl")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub acl: Option<Vec<BucketAccessControl>>,
-    /// The bucket's billing configuration.
-    #[serde(rename = "billing")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub billing: Option<BucketBilling>,
-    /// The bucket's Cross-Origin Resource Sharing (CORS) configuration.
-    #[serde(rename = "cors")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub cors: Option<Vec<BucketCors>>,
-    /// The default value for event-based hold on newly created objects in this bucket. Event-based hold is a way to retain objects indefinitely until an event occurs, signified by the hold's release. After being released, such objects will be subject to bucket-level retention (if any). One sample use case of this flag is for banks to hold loan documents for at least 3 years after loan is paid in full. Here, bucket-level retention is 3 years and the event is loan being paid in full. In this example, these objects will be held intact for any number of years until the event has occurred (event-based hold on the object is released) and then 3 more years after that. That means retention duration of the objects begins from the moment event-based hold transitioned from true to false. Objects under event-based hold cannot be deleted, overwritten or archived until the hold is removed.
-    #[serde(rename = "defaultEventBasedHold")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub default_event_based_hold: Option<bool>,
-    /// Default access controls to apply to new objects when no ACL is provided.
-    #[serde(rename = "defaultObjectAcl")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub default_object_acl: Option<Vec<ObjectAccessControl>>,
-    /// Encryption configuration for a bucket.
-    #[serde(rename = "encryption")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub encryption: Option<BucketEncryption>,
-    /// HTTP 1.1 Entity tag for the bucket.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// The bucket's IAM configuration.
-    #[serde(rename = "iamConfiguration")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub iam_configuration: Option<BucketIamConfiguration>,
-    /// The ID of the bucket. For buckets, the id and name properties are the same.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The kind of item this is. For buckets, this is always storage#bucket.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// User-provided labels, in key/value pairs.
-    #[serde(rename = "labels")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub labels: Option<HashMap<String, String>>,
-    /// The bucket's lifecycle configuration. See lifecycle management for more information.
-    #[serde(rename = "lifecycle")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub lifecycle: Option<BucketLifecycle>,
-    /// The location of the bucket. Object data for objects in the bucket resides in physical storage within this region. Defaults to US. See the developer's guide for the authoritative list.
-    #[serde(rename = "location")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub location: Option<String>,
-    /// The type of the bucket location.
-    #[serde(rename = "locationType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub location_type: Option<String>,
-    /// The bucket's logging configuration, which defines the destination bucket and optional name prefix for the current bucket's logs.
-    #[serde(rename = "logging")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub logging: Option<BucketLogging>,
-    /// i64: The metadata generation of this bucket.
-    #[serde(rename = "metageneration")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub metageneration: Option<String>,
-    /// The name of the bucket.
-    #[serde(rename = "name")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub name: Option<String>,
-    /// The owner of the bucket. This is always the project team's owner group.
-    #[serde(rename = "owner")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub owner: Option<BucketOwner>,
-    /// u64: The project number of the project the bucket belongs to.
-    #[serde(rename = "projectNumber")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub project_number: Option<String>,
-    /// The bucket's retention policy. The retention policy enforces a minimum retention time for all objects contained in the bucket, based on their creation time. Any attempt to overwrite or delete objects younger than the retention period will result in a PERMISSION_DENIED error. An unlocked retention policy can be modified or removed from the bucket via a storage.buckets.update operation. A locked retention policy cannot be removed or shortened in duration for the lifetime of the bucket. Attempting to remove or decrease period of a locked retention policy will result in a PERMISSION_DENIED error.
-    #[serde(rename = "retentionPolicy")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub retention_policy: Option<BucketRetentionPolicy>,
-    /// The URI of this bucket.
-    #[serde(rename = "selfLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub self_link: Option<String>,
-    /// The bucket's default storage class, used whenever no storageClass is specified for a newly-created object. This defines how objects in the bucket are stored and determines the SLA and the cost of storage. Values include MULTI_REGIONAL, REGIONAL, STANDARD, NEARLINE, COLDLINE, ARCHIVE, and DURABLE_REDUCED_AVAILABILITY. If this value is not specified when the bucket is created, it will default to STANDARD. For more information, see storage classes.
-    #[serde(rename = "storageClass")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub storage_class: Option<String>,
-    /// DateTime: The creation time of the bucket in RFC 3339 format.
-    #[serde(rename = "timeCreated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time_created: Option<DateTime<Utc>>,
-    /// DateTime: The modification time of the bucket in RFC 3339 format.
-    #[serde(rename = "updated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub updated: Option<DateTime<Utc>>,
-    /// The bucket's versioning configuration.
-    #[serde(rename = "versioning")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub versioning: Option<BucketVersioning>,
-    /// The bucket's website configuration, controlling how the service behaves when accessing bucket contents as a web site. See the Static Website Examples for more information.
-    #[serde(rename = "website")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub website: Option<BucketWebsite>,
-    /// The zone or zones from which the bucket is intended to use zonal quota. Requests for data from outside the specified affinities are still allowed but won't be able to use zonal quota. The zone or zones need to be within the bucket location otherwise the requests will fail with a 400 Bad Request response.
-    #[serde(rename = "zoneAffinity")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub zone_affinity: Option<Vec<String>>,
-}
-
-/// The project team associated with the entity, if any.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlProjectTeam {
-    /// The project number.
-    #[serde(rename = "projectNumber")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub project_number: Option<String>,
-    /// The team.
-    #[serde(rename = "team")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team: Option<String>,
-}
-
-/// An access-control entry.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControl {
-    /// The name of the bucket.
-    #[serde(rename = "bucket")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub bucket: Option<String>,
-    /// The domain associated with the entity, if any.
-    #[serde(rename = "domain")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub domain: Option<String>,
-    /// The email address associated with the entity, if any.
-    #[serde(rename = "email")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub email: Option<String>,
-    /// The entity holding the permission, in one of the following forms:  - user-userId  - user-email  - group-groupId  - group-email  - domain-domain  - project-team-projectId  - allUsers  - allAuthenticatedUsers Examples:  - The user liz@example.com would be user-liz@example.com.  - The group example@googlegroups.com would be group-example@googlegroups.com.  - To refer to all members of the Google Apps for Business domain example.com, the entity would be domain-example.com.
-    #[serde(rename = "entity")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity: Option<String>,
-    /// The ID for the entity, if any.
-    #[serde(rename = "entityId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity_id: Option<String>,
-    /// HTTP 1.1 Entity tag for the access-control entry.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// The ID of the access-control entry.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The kind of item this is. For bucket access control entries, this is always storage#bucketAccessControl.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The project team associated with the entity, if any.
-    #[serde(rename = "projectTeam")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub project_team: Option<BucketAccessControlProjectTeam>,
-    /// The access permission for the entity.
-    #[serde(rename = "role")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub role: Option<String>,
-    /// The link to this access-control entry.
-    #[serde(rename = "selfLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub self_link: Option<String>,
-}
-
-/// An access-control list.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControls {
-    /// The list of items.
-    #[serde(rename = "items")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub items: Option<Vec<BucketAccessControl>>,
-    /// The kind of item this is. For lists of bucket access control entries, this is always storage#bucketAccessControls.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-}
-
-/// A list of buckets.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Buckets {
-    /// The list of items.
-    #[serde(rename = "items")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub items: Option<Vec<Bucket>>,
-    /// The kind of item this is. For lists of buckets, this is always storage#buckets.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The continuation token, used to page through large result sets. Provide this value in a subsequent request to return the next page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-/// An notification channel used to watch for resource changes.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Channel {
-    /// The address where notifications are delivered for this channel.
-    #[serde(rename = "address")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub address: Option<String>,
-    /// i64: Date and time of notification channel expiration, expressed as a Unix timestamp, in milliseconds. Optional.
-    #[serde(rename = "expiration")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub expiration: Option<String>,
-    /// A UUID or similar unique string that identifies this channel.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// Identifies this as a notification channel used to watch for changes to a resource, which is "api#channel".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Additional parameters controlling delivery channel behavior. Optional.
-    #[serde(rename = "params")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub params: Option<HashMap<String, String>>,
-    /// A Boolean value to indicate whether payload is wanted. Optional.
-    #[serde(rename = "payload")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub payload: Option<bool>,
-    /// An opaque ID that identifies the resource being watched on this channel. Stable across different API versions.
-    #[serde(rename = "resourceId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resource_id: Option<String>,
-    /// A version-specific identifier for the watched resource.
-    #[serde(rename = "resourceUri")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resource_uri: Option<String>,
-    /// An arbitrary string delivered to the target address with each notification delivered over this channel. Optional.
-    #[serde(rename = "token")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub token: Option<String>,
-    /// The type of delivery mechanism used for this channel.
-    #[serde(rename = "type")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub typ: Option<String>,
-}
-
-/// Conditions that must be met for this operation to execute.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ComposeRequestSourceObjectsObjectPreconditions {
-    /// i64: Only perform the composition if the generation of the source object that would be used matches this value. If this value and a generation are both specified, they must be the same value or the call will fail.
-    #[serde(rename = "ifGenerationMatch")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub if_generation_match: Option<String>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ComposeRequestSourceObjects {
-    /// i64: The generation of this object to use as the source.
-    #[serde(rename = "generation")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub generation: Option<String>,
-    /// The source object's name. All source objects must reside in the same bucket.
-    #[serde(rename = "name")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub name: Option<String>,
-    /// Conditions that must be met for this operation to execute.
-    #[serde(rename = "objectPreconditions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub object_preconditions: Option<ComposeRequestSourceObjectsObjectPreconditions>,
-}
-
-/// A Compose request.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ComposeRequest {
-    #[serde(rename = "destination")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub destination: Option<Object>,
-    /// The kind of item this is.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The list of source objects that will be concatenated into a single object.
-    #[serde(rename = "sourceObjects")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub source_objects: Option<Vec<ComposeRequestSourceObjects>>,
-}
-
-/// Represents an expression text. Example: title: "User account presence" description: "Determines whether the request has a user account" expression: "size(request.user) > 0"
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Expr {
-    /// An optional description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
-    #[serde(rename = "description")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub description: Option<String>,
-    /// Textual representation of an expression in Common Expression Language syntax. The application context of the containing message determines which well-known feature set of CEL is supported.
-    #[serde(rename = "expression")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub expression: Option<String>,
-    /// An optional string indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
-    #[serde(rename = "location")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub location: Option<String>,
-    /// An optional title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
-    #[serde(rename = "title")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub title: Option<String>,
-}
-
-/// JSON template to produce a JSON-style HMAC Key resource for Create responses.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct HmacKey {
-    /// The kind of item this is. For HMAC keys, this is always storage#hmacKey.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    #[serde(rename = "metadata")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub metadata: Option<HmacKeyMetadata>,
-    /// HMAC secret key material.
-    #[serde(rename = "secret")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub secret: Option<String>,
-}
-
-/// JSON template to produce a JSON-style HMAC Key metadata resource.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct HmacKeyMetadata {
-    /// The ID of the HMAC Key.
-    #[serde(rename = "accessId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub access_id: Option<String>,
-    /// HTTP 1.1 Entity tag for the HMAC key.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// The ID of the HMAC key, including the Project ID and the Access ID.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The kind of item this is. For HMAC Key metadata, this is always storage#hmacKeyMetadata.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Project ID owning the service account to which the key authenticates.
-    #[serde(rename = "projectId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub project_id: Option<String>,
-    /// The link to this resource.
-    #[serde(rename = "selfLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub self_link: Option<String>,
-    /// The email address of the key's associated service account.
-    #[serde(rename = "serviceAccountEmail")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub service_account_email: Option<String>,
-    /// The state of the key. Can be one of ACTIVE, INACTIVE, or DELETED.
-    #[serde(rename = "state")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub state: Option<String>,
-    /// DateTime: The creation time of the HMAC key in RFC 3339 format.
-    #[serde(rename = "timeCreated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time_created: Option<DateTime<Utc>>,
-    /// DateTime: The last modification time of the HMAC key metadata in RFC 3339 format.
-    #[serde(rename = "updated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub updated: Option<DateTime<Utc>>,
-}
-
-/// A list of hmacKeys.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct HmacKeysMetadata {
-    /// The list of items.
-    #[serde(rename = "items")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub items: Option<Vec<HmacKeyMetadata>>,
-    /// The kind of item this is. For lists of hmacKeys, this is always storage#hmacKeysMetadata.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The continuation token, used to page through large result sets. Provide this value in a subsequent request to return the next page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-/// A subscription to receive Google PubSub notifications.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Notification {
-    /// An optional list of additional attributes to attach to each Cloud PubSub message published for this notification subscription.
-    #[serde(rename = "custom_attributes")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub custom_attributes: Option<HashMap<String, String>>,
-    /// HTTP 1.1 Entity tag for this subscription notification.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// If present, only send notifications about listed event types. If empty, sent notifications for all event types.
-    #[serde(rename = "event_types")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub event_types: Option<Vec<String>>,
-    /// The ID of the notification.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The kind of item this is. For notifications, this is always storage#notification.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// If present, only apply this notification configuration to object names that begin with this prefix.
-    #[serde(rename = "object_name_prefix")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub object_name_prefix: Option<String>,
-    /// The desired content of the Payload.
-    #[serde(rename = "payload_format")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub payload_format: Option<String>,
-    /// The canonical URL of this notification.
-    #[serde(rename = "selfLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub self_link: Option<String>,
-    /// The Cloud PubSub topic to which this subscription publishes. Formatted as: '//pubsub.googleapis.com/projects/{project-identifier}/topics/{my-topic}'
-    #[serde(rename = "topic")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub topic: Option<String>,
-}
-
-/// A list of notification subscriptions.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Notifications {
-    /// The list of items.
-    #[serde(rename = "items")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub items: Option<Vec<Notification>>,
-    /// The kind of item this is. For lists of notifications, this is always storage#notifications.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-}
-
-/// Metadata of customer-supplied encryption key, if the object is encrypted by such a key.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectCustomerEncryption {
-    /// The encryption algorithm.
-    #[serde(rename = "encryptionAlgorithm")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub encryption_algorithm: Option<String>,
-    /// SHA256 hash value of the encryption key.
-    #[serde(rename = "keySha256")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub key_sha256: Option<String>,
-}
-
-/// The owner of the object. This will always be the uploader of the object.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectOwner {
-    /// The entity, in the form user-userId.
-    #[serde(rename = "entity")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity: Option<String>,
-    /// The ID for the entity.
-    #[serde(rename = "entityId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity_id: Option<String>,
-}
-
-/// An object.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Object {
-    /// Access controls on the object.
-    #[serde(rename = "acl")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub acl: Option<Vec<ObjectAccessControl>>,
-    /// The name of the bucket containing this object.
-    #[serde(rename = "bucket")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub bucket: Option<String>,
-    /// Cache-Control directive for the object data. If omitted, and the object is accessible to all anonymous users, the default will be public, max-age=3600.
-    #[serde(rename = "cacheControl")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub cache_control: Option<String>,
-    /// Number of underlying components that make up this object. Components are accumulated by compose operations.
-    #[serde(rename = "componentCount")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub component_count: Option<i32>,
-    /// Content-Disposition of the object data.
-    #[serde(rename = "contentDisposition")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content_disposition: Option<String>,
-    /// Content-Encoding of the object data.
-    #[serde(rename = "contentEncoding")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content_encoding: Option<String>,
-    /// Content-Language of the object data.
-    #[serde(rename = "contentLanguage")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content_language: Option<String>,
-    /// Content-Type of the object data. If an object is stored without a Content-Type, it is served as application/octet-stream.
-    #[serde(rename = "contentType")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub content_type: Option<String>,
-    /// CRC32c checksum, as described in RFC 4960, Appendix B; encoded using base64 in big-endian byte order. For more information about using the CRC32c checksum, see Hashes and ETags: Best Practices.
-    #[serde(rename = "crc32c")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub crc32c: Option<String>,
-    /// DateTime: A timestamp in RFC 3339 format specified by the user for an object.
-    #[serde(rename = "customTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub custom_time: Option<DateTime<Utc>>,
-    /// Metadata of customer-supplied encryption key, if the object is encrypted by such a key.
-    #[serde(rename = "customerEncryption")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub customer_encryption: Option<ObjectCustomerEncryption>,
-    /// HTTP 1.1 Entity tag for the object.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// Whether an object is under event-based hold. Event-based hold is a way to retain objects until an event occurs, which is signified by the hold's release (i.e. this value is set to false). After being released (set to false), such objects will be subject to bucket-level retention (if any). One sample use case of this flag is for banks to hold loan documents for at least 3 years after loan is paid in full. Here, bucket-level retention is 3 years and the event is the loan being paid in full. In this example, these objects will be held intact for any number of years until the event has occurred (event-based hold on the object is released) and then 3 more years after that. That means retention duration of the objects begins from the moment event-based hold transitioned from true to false.
-    #[serde(rename = "eventBasedHold")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub event_based_hold: Option<bool>,
-    /// i64: The content generation of this object. Used for object versioning.
-    #[serde(rename = "generation")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub generation: Option<String>,
-    /// The ID of the object, including the bucket name, object name, and generation number.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The kind of item this is. For objects, this is always storage#object.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// Not currently supported. Specifying the parameter causes the request to fail with status code 400 - Bad Request.
-    #[serde(rename = "kmsKeyName")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kms_key_name: Option<String>,
-    /// MD5 hash of the data; encoded using base64. For more information about using the MD5 hash, see Hashes and ETags: Best Practices.
-    #[serde(rename = "md5Hash")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub md5_hash: Option<String>,
-    /// Media download link.
-    #[serde(rename = "mediaLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub media_link: Option<String>,
-    /// User-provided metadata, in key/value pairs.
-    #[serde(rename = "metadata")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub metadata: Option<HashMap<String, String>>,
-    /// i64: The version of the metadata for this object at this generation. Used for preconditions and for detecting changes in metadata. A metageneration number is only meaningful in the context of a particular generation of a particular object.
-    #[serde(rename = "metageneration")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub metageneration: Option<String>,
-    /// The name of the object. Required if not specified by URL parameter.
-    #[serde(rename = "name")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub name: Option<String>,
-    /// The owner of the object. This will always be the uploader of the object.
-    #[serde(rename = "owner")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub owner: Option<ObjectOwner>,
-    /// DateTime: A server-determined value that specifies the earliest time that the object's retention period expires. This value is in RFC 3339 format. Note 1: This field is not provided for objects with an active event-based hold, since retention expiration is unknown until the hold is removed. Note 2: This value can be provided even when temporary hold is set (so that the user can reason about policy without having to first unset the temporary hold).
-    #[serde(rename = "retentionExpirationTime")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub retention_expiration_time: Option<DateTime<Utc>>,
-    /// The link to this object.
-    #[serde(rename = "selfLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub self_link: Option<String>,
-    /// u64: Content-Length of the data in bytes.
-    #[serde(rename = "size")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub size: Option<String>,
-    /// Storage class of the object.
-    #[serde(rename = "storageClass")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub storage_class: Option<String>,
-    /// Whether an object is under temporary hold. While this flag is set to true, the object is protected against deletion and overwrites. A common use case of this flag is regulatory investigations where objects need to be retained while the investigation is ongoing. Note that unlike event-based hold, temporary hold does not impact retention expiration time of an object.
-    #[serde(rename = "temporaryHold")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub temporary_hold: Option<bool>,
-    /// DateTime: The creation time of the object in RFC 3339 format.
-    #[serde(rename = "timeCreated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time_created: Option<DateTime<Utc>>,
-    /// DateTime: The deletion time of the object in RFC 3339 format. Will be returned if and only if this version of the object has been deleted.
-    #[serde(rename = "timeDeleted")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time_deleted: Option<DateTime<Utc>>,
-    /// DateTime: The time at which the object's storage class was last changed. When the object is initially created, it will be set to timeCreated.
-    #[serde(rename = "timeStorageClassUpdated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub time_storage_class_updated: Option<DateTime<Utc>>,
-    /// DateTime: The modification time of the object metadata in RFC 3339 format.
-    #[serde(rename = "updated")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub updated: Option<DateTime<Utc>>,
-}
-
-/// The project team associated with the entity, if any.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlProjectTeam {
-    /// The project number.
-    #[serde(rename = "projectNumber")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub project_number: Option<String>,
-    /// The team.
-    #[serde(rename = "team")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub team: Option<String>,
-}
-
-/// An access-control entry.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControl {
-    /// The name of the bucket.
-    #[serde(rename = "bucket")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub bucket: Option<String>,
-    /// The domain associated with the entity, if any.
-    #[serde(rename = "domain")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub domain: Option<String>,
-    /// The email address associated with the entity, if any.
-    #[serde(rename = "email")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub email: Option<String>,
-    /// The entity holding the permission, in one of the following forms:  - user-userId  - user-email  - group-groupId  - group-email  - domain-domain  - project-team-projectId  - allUsers  - allAuthenticatedUsers Examples:  - The user liz@example.com would be user-liz@example.com.  - The group example@googlegroups.com would be group-example@googlegroups.com.  - To refer to all members of the Google Apps for Business domain example.com, the entity would be domain-example.com.
-    #[serde(rename = "entity")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity: Option<String>,
-    /// The ID for the entity, if any.
-    #[serde(rename = "entityId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub entity_id: Option<String>,
-    /// HTTP 1.1 Entity tag for the access-control entry.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// i64: The content generation of the object, if applied to an object.
-    #[serde(rename = "generation")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub generation: Option<String>,
-    /// The ID of the access-control entry.
-    #[serde(rename = "id")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub id: Option<String>,
-    /// The kind of item this is. For object access control entries, this is always storage#objectAccessControl.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The name of the object, if applied to an object.
-    #[serde(rename = "object")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub object: Option<String>,
-    /// The project team associated with the entity, if any.
-    #[serde(rename = "projectTeam")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub project_team: Option<ObjectAccessControlProjectTeam>,
-    /// The access permission for the entity.
-    #[serde(rename = "role")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub role: Option<String>,
-    /// The link to this access-control entry.
-    #[serde(rename = "selfLink")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub self_link: Option<String>,
-}
-
-/// An access-control list.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControls {
-    /// The list of items.
-    #[serde(rename = "items")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub items: Option<Vec<ObjectAccessControl>>,
-    /// The kind of item this is. For lists of object access control entries, this is always storage#objectAccessControls.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-}
-
-/// A list of objects.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Objects {
-    /// The list of items.
-    #[serde(rename = "items")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub items: Option<Vec<Object>>,
-    /// The kind of item this is. For lists of objects, this is always storage#objects.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The continuation token, used to page through large result sets. Provide this value in a subsequent request to return the next page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-    /// The list of prefixes of objects matching-but-not-listed up to and including the requested delimiter.
-    #[serde(rename = "prefixes")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub prefixes: Option<Vec<String>>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct PolicyBindings {
-    #[serde(rename = "condition")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub condition: Option<Expr>,
-    /// A collection of identifiers for members who may assume the provided role. Recognized identifiers are as follows:   - allUsers — A special identifier that represents anyone on the internet; with or without a Google account.   - allAuthenticatedUsers — A special identifier that represents anyone who is authenticated with a Google account or a service account.   - user:emailid — An email address that represents a specific account. For example, user:alice@gmail.com or user:joe@example.com.   - serviceAccount:emailid — An email address that represents a service account. For example,  serviceAccount:my-other-app@appspot.gserviceaccount.com .   - group:emailid — An email address that represents a Google group. For example, group:admins@example.com.   - domain:domain — A Google Apps domain name that represents all the users of that domain. For example, domain:google.com or domain:example.com.   - projectOwner:projectid — Owners of the given project. For example, projectOwner:my-example-project   - projectEditor:projectid — Editors of the given project. For example, projectEditor:my-example-project   - projectViewer:projectid — Viewers of the given project. For example, projectViewer:my-example-project
-    #[serde(rename = "members")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub members: Option<Vec<String>>,
-    /// The role to which members belong. Two types of roles are supported: new IAM roles, which grant permissions that do not map directly to those provided by ACLs, and legacy IAM roles, which do map directly to ACL permissions. All roles are of the format roles/storage.specificRole. The new IAM roles are:   - roles/storage.admin — Full control of Google Cloud Storage resources.   - roles/storage.objectViewer — Read-Only access to Google Cloud Storage objects.   - roles/storage.objectCreator — Access to create objects in Google Cloud Storage.   - roles/storage.objectAdmin — Full control of Google Cloud Storage objects.   The legacy IAM roles are:   - roles/storage.legacyObjectReader — Read-only access to objects without listing. Equivalent to an ACL entry on an object with the READER role.   - roles/storage.legacyObjectOwner — Read/write access to existing objects without listing. Equivalent to an ACL entry on an object with the OWNER role.   - roles/storage.legacyBucketReader — Read access to buckets with object listing. Equivalent to an ACL entry on a bucket with the READER role.   - roles/storage.legacyBucketWriter — Read access to buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the WRITER role.   - roles/storage.legacyBucketOwner — Read and write access to existing buckets with object listing/creation/deletion. Equivalent to an ACL entry on a bucket with the OWNER role.
-    #[serde(rename = "role")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub role: Option<String>,
-}
-
-/// A bucket/object IAM policy.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct Policy {
-    /// An association between a role, which comes with a set of permissions, and members who may assume that role.
-    #[serde(rename = "bindings")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub bindings: Option<Vec<PolicyBindings>>,
-    /// HTTP 1.1  Entity tag for the policy.
-    #[serde(rename = "etag")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub etag: Option<String>,
-    /// The kind of item this is. For policies, this is always storage#policy. This field is ignored on input.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The ID of the resource to which this policy belongs. Will be of the form projects/_/buckets/bucket for buckets, and projects/_/buckets/bucket/objects/object for objects. A specific generation may be specified by appending #generationNumber to the end of the object name, e.g. projects/_/buckets/my-bucket/objects/data.txt#17. The current generation can be denoted with #0. This field is ignored on input.
-    #[serde(rename = "resourceId")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resource_id: Option<String>,
-    /// The IAM policy format version.
-    #[serde(rename = "version")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub version: Option<i32>,
-}
-
-/// A rewrite response.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct RewriteResponse {
-    /// true if the copy is finished; otherwise, false if the copy is in progress. This property is always present in the response.
-    #[serde(rename = "done")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub done: Option<bool>,
-    /// The kind of item this is.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// i64: The total size of the object being copied in bytes. This property is always present in the response.
-    #[serde(rename = "objectSize")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub object_size: Option<String>,
-    #[serde(rename = "resource")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub resource: Option<Object>,
-    /// A token to use in subsequent requests to continue copying data. This token is present in the response only when there is more data to copy.
-    #[serde(rename = "rewriteToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub rewrite_token: Option<String>,
-    /// i64: The total bytes written so far, which can be used to provide a waiting user with a progress indicator. This property is always present in the response.
-    #[serde(rename = "totalBytesRewritten")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub total_bytes_rewritten: Option<String>,
-}
-
-/// A subscription to receive Google PubSub notifications.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ServiceAccount {
-    /// The ID of the notification.
-    #[serde(rename = "email_address")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub email_address: Option<String>,
-    /// The kind of item this is. For notifications, this is always storage#notification.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-}
-
-/// A storage.(buckets|objects).testIamPermissions response.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct TestIamPermissionsResponse {
-    /// The kind of item this is.
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The permissions held by the caller. Permissions are always of the format storage.resource.capability, where resource is one of buckets or objects. The supported permissions are as follows:   - storage.buckets.delete — Delete bucket.   - storage.buckets.get — Read bucket metadata.   - storage.buckets.getIamPolicy — Read bucket IAM policy.   - storage.buckets.create — Create bucket.   - storage.buckets.list — List buckets.   - storage.buckets.setIamPolicy — Update bucket IAM policy.   - storage.buckets.update — Update bucket metadata.   - storage.objects.delete — Delete object.   - storage.objects.get — Read object data and metadata.   - storage.objects.getIamPolicy — Read object IAM policy.   - storage.objects.create — Create object.   - storage.objects.list — List objects.   - storage.objects.setIamPolicy — Update object IAM policy.   - storage.objects.update — Update object metadata.
-    #[serde(rename = "permissions")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub permissions: Option<Vec<String>>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct StorageParams {
-    /// Data format for the response.
-    #[serde(rename = "alt")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub alt: Option<String>,
-    /// Selector specifying which fields to include in a partial response.
-    #[serde(rename = "fields")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub fields: Option<String>,
-    /// API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
-    #[serde(rename = "key")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub key: Option<String>,
-    /// OAuth 2.0 token for the current user.
-    #[serde(rename = "oauth_token")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub oauth_token: Option<String>,
-    /// Returns response with indentations and line breaks.
-    #[serde(rename = "prettyPrint")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub pretty_print: Option<bool>,
-    /// An opaque string that represents a user for quota purposes. Must not exceed 40 characters.
-    #[serde(rename = "quotaUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub quota_user: Option<String>,
-    /// Deprecated. Please use quotaUser instead.
-    #[serde(rename = "userIp")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub user_ip: Option<String>,
-}
-
-/// Parameters for the `bucketAccessControls.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketAccessControlsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `bucketAccessControls.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketAccessControlsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `bucketAccessControls.insert` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlsInsertParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketAccessControlsInsertParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `bucketAccessControls.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketAccessControlsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `bucketAccessControls.patch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlsPatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketAccessControlsPatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `bucketAccessControls.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketAccessControlsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketAccessControlsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If set, only deletes the bucket if its metageneration matches this value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: If set, only deletes the bucket if its metageneration does not match this value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Set of properties to return. Defaults to noAcl.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.getIamPolicy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsGetIamPolicyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The IAM policy format version to be returned. If the optionsRequestedPolicyVersion is for an older version that doesn't support part of the requested IAM policy, the request fails.
-    #[serde(rename = "optionsRequestedPolicyVersion")]
-    pub options_requested_policy_version: Option<i32>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsGetIamPolicyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.options_requested_policy_version {
-            write!(
-                f,
-                "&optionsRequestedPolicyVersion={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.insert` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsInsertParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Apply a predefined set of access controls to this bucket.
-    #[serde(rename = "predefinedAcl")]
-    pub predefined_acl: Option<String>,
-    /// Apply a predefined set of default object access controls to this bucket.
-    #[serde(rename = "predefinedDefaultObjectAcl")]
-    pub predefined_default_object_acl: Option<String>,
-    /// A valid API project identifier.
-    #[serde(rename = "project")]
-    pub project: String,
-    /// Set of properties to return. Defaults to noAcl, unless the bucket resource specifies acl or defaultObjectAcl properties, when it defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsInsertParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&project={}",
-            percent_encode(format!("{}", self.project).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        if let Some(ref v) = self.predefined_acl {
-            write!(
-                f,
-                "&predefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_default_object_acl {
-            write!(
-                f,
-                "&predefinedDefaultObjectAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Maximum number of buckets to return in a single response. The service will use this parameter or 1,000 items, whichever is smaller.
-    #[serde(rename = "maxResults")]
-    pub max_results: Option<u32>,
-    /// A previously-returned page token representing part of the larger set of results to view.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Filter results to buckets whose names begin with this prefix.
-    #[serde(rename = "prefix")]
-    pub prefix: Option<String>,
-    /// A valid API project identifier.
-    #[serde(rename = "project")]
-    pub project: String,
-    /// Set of properties to return. Defaults to noAcl.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&project={}",
-            percent_encode(format!("{}", self.project).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        if let Some(ref v) = self.max_results {
-            write!(
-                f,
-                "&maxResults={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.prefix {
-            write!(
-                f,
-                "&prefix={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.lockRetentionPolicy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsLockRetentionPolicyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: Makes the operation conditional on whether bucket's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsLockRetentionPolicyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&ifMetagenerationMatch={}",
-            percent_encode(
-                format!("{}", self.if_metageneration_match).as_bytes(),
-                NON_ALPHANUMERIC
-            )
-            .to_string()
-        )?;
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.patch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsPatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Apply a predefined set of access controls to this bucket.
-    #[serde(rename = "predefinedAcl")]
-    pub predefined_acl: Option<String>,
-    /// Apply a predefined set of default object access controls to this bucket.
-    #[serde(rename = "predefinedDefaultObjectAcl")]
-    pub predefined_default_object_acl: Option<String>,
-    /// Set of properties to return. Defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsPatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_acl {
-            write!(
-                f,
-                "&predefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_default_object_acl {
-            write!(
-                f,
-                "&predefinedDefaultObjectAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.setIamPolicy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsSetIamPolicyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsSetIamPolicyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.testIamPermissions` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsTestIamPermissionsParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// Permissions to test.
-    #[serde(rename = "permissions")]
-    pub permissions: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsTestIamPermissionsParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&permissions={}",
-            percent_encode(format!("{}", self.permissions).as_bytes(), NON_ALPHANUMERIC)
-                .to_string()
-        )?;
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `buckets.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct BucketsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the return of the bucket metadata conditional on whether the bucket's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Apply a predefined set of access controls to this bucket.
-    #[serde(rename = "predefinedAcl")]
-    pub predefined_acl: Option<String>,
-    /// Apply a predefined set of default object access controls to this bucket.
-    #[serde(rename = "predefinedDefaultObjectAcl")]
-    pub predefined_default_object_acl: Option<String>,
-    /// Set of properties to return. Defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for BucketsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_acl {
-            write!(
-                f,
-                "&predefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_default_object_acl {
-            write!(
-                f,
-                "&predefinedDefaultObjectAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `channels.stop` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ChannelsStopParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-}
-
-impl std::fmt::Display for ChannelsStopParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `defaultObjectAccessControls.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DefaultObjectAccessControlsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for DefaultObjectAccessControlsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `defaultObjectAccessControls.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DefaultObjectAccessControlsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for DefaultObjectAccessControlsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `defaultObjectAccessControls.insert` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DefaultObjectAccessControlsInsertParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for DefaultObjectAccessControlsInsertParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `defaultObjectAccessControls.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DefaultObjectAccessControlsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, only return default ACL listing if the bucket's current metageneration matches this value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: If present, only return default ACL listing if the bucket's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for DefaultObjectAccessControlsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `defaultObjectAccessControls.patch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DefaultObjectAccessControlsPatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for DefaultObjectAccessControlsPatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `defaultObjectAccessControls.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct DefaultObjectAccessControlsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for DefaultObjectAccessControlsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `notifications.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct NotificationsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// The parent bucket of the notification.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// ID of the notification to delete.
-    #[serde(rename = "notification")]
-    pub notification: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for NotificationsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `notifications.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct NotificationsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// The parent bucket of the notification.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// Notification ID
-    #[serde(rename = "notification")]
-    pub notification: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for NotificationsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `notifications.insert` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct NotificationsInsertParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// The parent bucket of the notification.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for NotificationsInsertParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `notifications.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct NotificationsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a Google Cloud Storage bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for NotificationsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objectAccessControls.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectAccessControlsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objectAccessControls.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectAccessControlsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objectAccessControls.insert` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlsInsertParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectAccessControlsInsertParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objectAccessControls.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectAccessControlsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objectAccessControls.patch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlsPatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectAccessControlsPatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objectAccessControls.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectAccessControlsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of a bucket.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// The entity holding the permission. Can be user-userId, user-emailAddress, group-groupId, group-emailAddress, allUsers, or allAuthenticatedUsers.
-    #[serde(rename = "entity")]
-    pub entity: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectAccessControlsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.compose` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsComposeParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket containing the source objects. The destination object is stored in this bucket.
-    #[serde(rename = "destinationBucket")]
-    pub destination_bucket: String,
-    /// Name of the new object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "destinationObject")]
-    pub destination_object: String,
-    /// Apply a predefined set of access controls to the destination object.
-    #[serde(rename = "destinationPredefinedAcl")]
-    pub destination_predefined_acl: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
-    #[serde(rename = "kmsKeyName")]
-    pub kms_key_name: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsComposeParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.destination_predefined_acl {
-            write!(
-                f,
-                "&destinationPredefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.kms_key_name {
-            write!(
-                f,
-                "&kmsKeyName={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.copy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsCopyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which to store the new object. Overrides the provided object metadata's bucket value, if any.For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "destinationBucket")]
-    pub destination_bucket: String,
-    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
-    #[serde(rename = "destinationKmsKeyName")]
-    pub destination_kms_key_name: Option<String>,
-    /// Name of the new object. Required when the object metadata is not otherwise provided. Overrides the object metadata's name value, if any.
-    #[serde(rename = "destinationObject")]
-    pub destination_object: String,
-    /// Apply a predefined set of access controls to the destination object.
-    #[serde(rename = "destinationPredefinedAcl")]
-    pub destination_predefined_acl: Option<String>,
-    /// i64: Makes the operation conditional on whether the destination object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the destination object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the destination object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the destination object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current generation matches the given value.
-    #[serde(rename = "ifSourceGenerationMatch")]
-    pub if_source_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current generation does not match the given value.
-    #[serde(rename = "ifSourceGenerationNotMatch")]
-    pub if_source_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current metageneration matches the given value.
-    #[serde(rename = "ifSourceMetagenerationMatch")]
-    pub if_source_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current metageneration does not match the given value.
-    #[serde(rename = "ifSourceMetagenerationNotMatch")]
-    pub if_source_metageneration_not_match: Option<String>,
-    /// Set of properties to return. Defaults to noAcl, unless the object resource specifies the acl property, when it defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// Name of the bucket in which to find the source object.
-    #[serde(rename = "sourceBucket")]
-    pub source_bucket: String,
-    /// i64: If present, selects a specific revision of the source object (as opposed to the latest version, the default).
-    #[serde(rename = "sourceGeneration")]
-    pub source_generation: Option<String>,
-    /// Name of the source object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "sourceObject")]
-    pub source_object: String,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsCopyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.destination_kms_key_name {
-            write!(
-                f,
-                "&destinationKmsKeyName={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.destination_predefined_acl {
-            write!(
-                f,
-                "&destinationPredefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_generation_match {
-            write!(
-                f,
-                "&ifSourceGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_generation_not_match {
-            write!(
-                f,
-                "&ifSourceGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_metageneration_match {
-            write!(
-                f,
-                "&ifSourceMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_metageneration_not_match {
-            write!(
-                f,
-                "&ifSourceMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.source_generation {
-            write!(
-                f,
-                "&sourceGeneration={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, permanently deletes a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// Set of properties to return. Defaults to noAcl.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.getIamPolicy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsGetIamPolicyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsGetIamPolicyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.insert` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsInsertParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which to store the new object. Overrides the provided object metadata's bucket value, if any.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// If set, sets the contentEncoding property of the final object to this value. Setting this parameter is equivalent to setting the contentEncoding metadata property. This can be useful when uploading an object with uploadType=media to indicate the encoding of the content being uploaded.
-    #[serde(rename = "contentEncoding")]
-    pub content_encoding: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
-    #[serde(rename = "kmsKeyName")]
-    pub kms_key_name: Option<String>,
-    /// Name of the object. Required when the object metadata is not otherwise provided. Overrides the object metadata's name value, if any. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "name")]
-    pub name: Option<String>,
-    /// Apply a predefined set of access controls to this object.
-    #[serde(rename = "predefinedAcl")]
-    pub predefined_acl: Option<String>,
-    /// Set of properties to return. Defaults to noAcl, unless the object resource specifies the acl property, when it defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsInsertParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.content_encoding {
-            write!(
-                f,
-                "&contentEncoding={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.kms_key_name {
-            write!(
-                f,
-                "&kmsKeyName={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.name {
-            write!(
-                f,
-                "&name={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_acl {
-            write!(
-                f,
-                "&predefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which to look for objects.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// Returns results in a directory-like mode. items will contain only objects whose names, aside from the prefix, do not contain delimiter. Objects whose names, aside from the prefix, contain delimiter will have their name, truncated after the delimiter, returned in prefixes. Duplicate prefixes are omitted.
-    #[serde(rename = "delimiter")]
-    pub delimiter: Option<String>,
-    /// Filter results to objects whose names are lexicographically before endOffset. If startOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
-    #[serde(rename = "endOffset")]
-    pub end_offset: Option<String>,
-    /// If true, objects that end in exactly one instance of delimiter will have their metadata included in items in addition to prefixes.
-    #[serde(rename = "includeTrailingDelimiter")]
-    pub include_trailing_delimiter: Option<bool>,
-    /// Maximum number of items plus prefixes to return in a single page of responses. As duplicate prefixes are omitted, fewer total results may be returned than requested. The service will use this parameter or 1,000 items, whichever is smaller.
-    #[serde(rename = "maxResults")]
-    pub max_results: Option<u32>,
-    /// A previously-returned page token representing part of the larger set of results to view.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Filter results to objects whose names begin with this prefix.
-    #[serde(rename = "prefix")]
-    pub prefix: Option<String>,
-    /// Set of properties to return. Defaults to noAcl.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// Filter results to objects whose names are lexicographically equal to or after startOffset. If endOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
-    #[serde(rename = "startOffset")]
-    pub start_offset: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-    /// If true, lists all versions of an object as distinct results. The default is false. For more information, see Object Versioning.
-    #[serde(rename = "versions")]
-    pub versions: Option<bool>,
-}
-
-impl std::fmt::Display for ObjectsListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.delimiter {
-            write!(
-                f,
-                "&delimiter={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.end_offset {
-            write!(
-                f,
-                "&endOffset={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_trailing_delimiter {
-            write!(
-                f,
-                "&includeTrailingDelimiter={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.max_results {
-            write!(
-                f,
-                "&maxResults={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.prefix {
-            write!(
-                f,
-                "&prefix={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.start_offset {
-            write!(
-                f,
-                "&startOffset={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.versions {
-            write!(
-                f,
-                "&versions={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.patch` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsPatchParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// Apply a predefined set of access controls to this object.
-    #[serde(rename = "predefinedAcl")]
-    pub predefined_acl: Option<String>,
-    /// Set of properties to return. Defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request, for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsPatchParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_acl {
-            write!(
-                f,
-                "&predefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.rewrite` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsRewriteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which to store the new object. Overrides the provided object metadata's bucket value, if any.
-    #[serde(rename = "destinationBucket")]
-    pub destination_bucket: String,
-    /// Resource name of the Cloud KMS key, of the form projects/my-project/locations/global/keyRings/my-kr/cryptoKeys/my-key, that will be used to encrypt the object. Overrides the object metadata's kms_key_name value, if any.
-    #[serde(rename = "destinationKmsKeyName")]
-    pub destination_kms_key_name: Option<String>,
-    /// Name of the new object. Required when the object metadata is not otherwise provided. Overrides the object metadata's name value, if any. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "destinationObject")]
-    pub destination_object: String,
-    /// Apply a predefined set of access controls to the destination object.
-    #[serde(rename = "destinationPredefinedAcl")]
-    pub destination_predefined_acl: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the destination object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the destination object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current generation matches the given value.
-    #[serde(rename = "ifSourceGenerationMatch")]
-    pub if_source_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current generation does not match the given value.
-    #[serde(rename = "ifSourceGenerationNotMatch")]
-    pub if_source_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current metageneration matches the given value.
-    #[serde(rename = "ifSourceMetagenerationMatch")]
-    pub if_source_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the source object's current metageneration does not match the given value.
-    #[serde(rename = "ifSourceMetagenerationNotMatch")]
-    pub if_source_metageneration_not_match: Option<String>,
-    /// i64: The maximum number of bytes that will be rewritten per rewrite request. Most callers shouldn't need to specify this parameter - it is primarily in place to support testing. If specified the value must be an integral multiple of 1 MiB (1048576). Also, this only applies to requests where the source and destination span locations and/or storage classes. Finally, this value must not change across rewrite calls else you'll get an error that the rewriteToken is invalid.
-    #[serde(rename = "maxBytesRewrittenPerCall")]
-    pub max_bytes_rewritten_per_call: Option<String>,
-    /// Set of properties to return. Defaults to noAcl, unless the object resource specifies the acl property, when it defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// Include this field (from the previous rewrite response) on each rewrite request after the first one, until the rewrite response 'done' flag is true. Calls that provide a rewriteToken can omit all other request fields, but if included those fields must match the values provided in the first rewrite request.
-    #[serde(rename = "rewriteToken")]
-    pub rewrite_token: Option<String>,
-    /// Name of the bucket in which to find the source object.
-    #[serde(rename = "sourceBucket")]
-    pub source_bucket: String,
-    /// i64: If present, selects a specific revision of the source object (as opposed to the latest version, the default).
-    #[serde(rename = "sourceGeneration")]
-    pub source_generation: Option<String>,
-    /// Name of the source object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "sourceObject")]
-    pub source_object: String,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsRewriteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.destination_kms_key_name {
-            write!(
-                f,
-                "&destinationKmsKeyName={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.destination_predefined_acl {
-            write!(
-                f,
-                "&destinationPredefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_generation_match {
-            write!(
-                f,
-                "&ifSourceGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_generation_not_match {
-            write!(
-                f,
-                "&ifSourceGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_metageneration_match {
-            write!(
-                f,
-                "&ifSourceMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_source_metageneration_not_match {
-            write!(
-                f,
-                "&ifSourceMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.max_bytes_rewritten_per_call {
-            write!(
-                f,
-                "&maxBytesRewrittenPerCall={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.rewrite_token {
-            write!(
-                f,
-                "&rewriteToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.source_generation {
-            write!(
-                f,
-                "&sourceGeneration={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.setIamPolicy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsSetIamPolicyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsSetIamPolicyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.testIamPermissions` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsTestIamPermissionsParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// Permissions to test.
-    #[serde(rename = "permissions")]
-    pub permissions: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsTestIamPermissionsParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&permissions={}",
-            percent_encode(format!("{}", self.permissions).as_bytes(), NON_ALPHANUMERIC)
-                .to_string()
-        )?;
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which the object resides.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// i64: If present, selects a specific revision of this object (as opposed to the latest version, the default).
-    #[serde(rename = "generation")]
-    pub generation: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation matches the given value. Setting to 0 makes the operation succeed only if there are no live versions of the object.
-    #[serde(rename = "ifGenerationMatch")]
-    pub if_generation_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current generation does not match the given value. If no live object exists, the precondition fails. Setting to 0 makes the operation succeed only if there is a live version of the object.
-    #[serde(rename = "ifGenerationNotMatch")]
-    pub if_generation_not_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration matches the given value.
-    #[serde(rename = "ifMetagenerationMatch")]
-    pub if_metageneration_match: Option<String>,
-    /// i64: Makes the operation conditional on whether the object's current metageneration does not match the given value.
-    #[serde(rename = "ifMetagenerationNotMatch")]
-    pub if_metageneration_not_match: Option<String>,
-    /// Name of the object. For information about how to URL encode object names to be path safe, see Encoding URI Path Parts.
-    #[serde(rename = "object")]
-    pub object: String,
-    /// Apply a predefined set of access controls to this object.
-    #[serde(rename = "predefinedAcl")]
-    pub predefined_acl: Option<String>,
-    /// Set of properties to return. Defaults to full.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ObjectsUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.generation {
-            write!(
-                f,
-                "&generation={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_match {
-            write!(
-                f,
-                "&ifGenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_generation_not_match {
-            write!(
-                f,
-                "&ifGenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_match {
-            write!(
-                f,
-                "&ifMetagenerationMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.if_metageneration_not_match {
-            write!(
-                f,
-                "&ifMetagenerationNotMatch={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.predefined_acl {
-            write!(
-                f,
-                "&predefinedAcl={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `objects.watchAll` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ObjectsWatchAllParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the bucket in which to look for objects.
-    #[serde(rename = "bucket")]
-    pub bucket: String,
-    /// Returns results in a directory-like mode. items will contain only objects whose names, aside from the prefix, do not contain delimiter. Objects whose names, aside from the prefix, contain delimiter will have their name, truncated after the delimiter, returned in prefixes. Duplicate prefixes are omitted.
-    #[serde(rename = "delimiter")]
-    pub delimiter: Option<String>,
-    /// Filter results to objects whose names are lexicographically before endOffset. If startOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
-    #[serde(rename = "endOffset")]
-    pub end_offset: Option<String>,
-    /// If true, objects that end in exactly one instance of delimiter will have their metadata included in items in addition to prefixes.
-    #[serde(rename = "includeTrailingDelimiter")]
-    pub include_trailing_delimiter: Option<bool>,
-    /// Maximum number of items plus prefixes to return in a single page of responses. As duplicate prefixes are omitted, fewer total results may be returned than requested. The service will use this parameter or 1,000 items, whichever is smaller.
-    #[serde(rename = "maxResults")]
-    pub max_results: Option<u32>,
-    /// A previously-returned page token representing part of the larger set of results to view.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Filter results to objects whose names begin with this prefix.
-    #[serde(rename = "prefix")]
-    pub prefix: Option<String>,
-    /// Set of properties to return. Defaults to noAcl.
-    #[serde(rename = "projection")]
-    pub projection: Option<String>,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// Filter results to objects whose names are lexicographically equal to or after startOffset. If endOffset is also set, the objects listed will have names between startOffset (inclusive) and endOffset (exclusive).
-    #[serde(rename = "startOffset")]
-    pub start_offset: Option<String>,
-    /// The project to be billed for this request. Required for Requester Pays buckets.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-    /// If true, lists all versions of an object as distinct results. The default is false. For more information, see Object Versioning.
-    #[serde(rename = "versions")]
-    pub versions: Option<bool>,
-}
-
-impl std::fmt::Display for ObjectsWatchAllParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.delimiter {
-            write!(
-                f,
-                "&delimiter={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.end_offset {
-            write!(
-                f,
-                "&endOffset={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.include_trailing_delimiter {
-            write!(
-                f,
-                "&includeTrailingDelimiter={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.max_results {
-            write!(
-                f,
-                "&maxResults={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.prefix {
-            write!(
-                f,
-                "&prefix={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.projection {
-            write!(
-                f,
-                "&projection={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.start_offset {
-            write!(
-                f,
-                "&startOffset={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.versions {
-            write!(
-                f,
-                "&versions={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `hmacKeys.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ProjectsHmacKeysCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Project ID owning the service account.
-    #[serde(rename = "projectId")]
-    pub project_id: String,
-    /// Email address of the service account.
-    #[serde(rename = "serviceAccountEmail")]
-    pub service_account_email: String,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ProjectsHmacKeysCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&serviceAccountEmail={}",
-            percent_encode(
-                format!("{}", self.service_account_email).as_bytes(),
-                NON_ALPHANUMERIC
-            )
-            .to_string()
-        )?;
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `hmacKeys.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ProjectsHmacKeysDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the HMAC key to be deleted.
-    #[serde(rename = "accessId")]
-    pub access_id: String,
-    /// Project ID owning the requested key
-    #[serde(rename = "projectId")]
-    pub project_id: String,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ProjectsHmacKeysDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `hmacKeys.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ProjectsHmacKeysGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the HMAC key.
-    #[serde(rename = "accessId")]
-    pub access_id: String,
-    /// Project ID owning the service account of the requested key.
-    #[serde(rename = "projectId")]
-    pub project_id: String,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ProjectsHmacKeysGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `hmacKeys.list` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ProjectsHmacKeysListParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Maximum number of items to return in a single page of responses. The service uses this parameter or 250 items, whichever is smaller. The max number of items per page will also be limited by the number of distinct service accounts in the response. If the number of service accounts in a single response is too high, the page will truncated and a next page token will be returned.
-    #[serde(rename = "maxResults")]
-    pub max_results: Option<u32>,
-    /// A previously-returned page token representing part of the larger set of results to view.
-    #[serde(rename = "pageToken")]
-    pub page_token: Option<String>,
-    /// Name of the project in which to look for HMAC keys.
-    #[serde(rename = "projectId")]
-    pub project_id: String,
-    /// If present, only keys for the given service account are returned.
-    #[serde(rename = "serviceAccountEmail")]
-    pub service_account_email: Option<String>,
-    /// Whether or not to show keys in the DELETED state.
-    #[serde(rename = "showDeletedKeys")]
-    pub show_deleted_keys: Option<bool>,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ProjectsHmacKeysListParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.max_results {
-            write!(
-                f,
-                "&maxResults={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.page_token {
-            write!(
-                f,
-                "&pageToken={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.service_account_email {
-            write!(
-                f,
-                "&serviceAccountEmail={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.show_deleted_keys {
-            write!(
-                f,
-                "&showDeletedKeys={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `hmacKeys.update` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ProjectsHmacKeysUpdateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Name of the HMAC key being updated.
-    #[serde(rename = "accessId")]
-    pub access_id: String,
-    /// Project ID owning the service account of the updated key.
-    #[serde(rename = "projectId")]
-    pub project_id: String,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ProjectsHmacKeysUpdateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `serviceAccount.get` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct ProjectsServiceAccountGetParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub storage_params: Option<StorageParams>,
-    /// Project ID
-    #[serde(rename = "projectId")]
-    pub project_id: String,
-    /// The project to be billed for this request if the target bucket is requester-pays bucket.
-    #[serde(rename = "provisionalUserProject")]
-    pub provisional_user_project: Option<String>,
-    /// The project to be billed for this request.
-    #[serde(rename = "userProject")]
-    pub user_project: Option<String>,
-}
-
-impl std::fmt::Display for ProjectsServiceAccountGetParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.provisional_user_project {
-            write!(
-                f,
-                "&provisionalUserProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_project {
-            write!(
-                f,
-                "&userProject={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-impl std::fmt::Display for StorageParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.alt {
-            write!(
-                f,
-                "&alt={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.fields {
-            write!(
-                f,
-                "&fields={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.key {
-            write!(
-                f,
-                "&key={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.oauth_token {
-            write!(
-                f,
-                "&oauth_token={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.pretty_print {
-            write!(
-                f,
-                "&prettyPrint={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.quota_user {
-            write!(
-                f,
-                "&quotaUser={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_ip {
-            write!(
-                f,
-                "&userIp={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// The Storage BucketAccessControls service represents the BucketAccessControls resource.
-pub struct BucketAccessControlsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl BucketAccessControlsService {
-    /// Create a new BucketAccessControlsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> BucketAccessControlsService {
-        BucketAccessControlsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Permanently deletes the ACL entry for the specified entity on the specified bucket.
-    pub async fn delete(&mut self, params: &BucketAccessControlsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "b/{bucket}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Returns the ACL entry for the specified entity on the specified bucket.
-    pub async fn get(
-        &mut self,
-        params: &BucketAccessControlsGetParams,
-    ) -> Result<BucketAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Creates a new ACL entry on the specified bucket.
-    pub async fn insert(
-        &mut self,
-        params: &BucketAccessControlsInsertParams,
-        req: &BucketAccessControl,
-    ) -> Result<BucketAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/acl",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Retrieves ACL entries on the specified bucket.
-    pub async fn list(
-        &mut self,
-        params: &BucketAccessControlsListParams,
-    ) -> Result<BucketAccessControls> {
-        let rel_path = format!(
-            "b/{bucket}/acl",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Patches an ACL entry on the specified bucket.
-    pub async fn patch(
-        &mut self,
-        params: &BucketAccessControlsPatchParams,
-        req: &BucketAccessControl,
-    ) -> Result<BucketAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-
-    /// Updates an ACL entry on the specified bucket.
-    pub async fn update(
-        &mut self,
-        params: &BucketAccessControlsUpdateParams,
-        req: &BucketAccessControl,
-    ) -> Result<BucketAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-}
-
-/// The Storage Buckets service represents the Buckets resource.
-pub struct BucketsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl BucketsService {
-    /// Create a new BucketsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> BucketsService {
-        BucketsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Permanently deletes an empty bucket.
-    pub async fn delete(&mut self, params: &BucketsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "b/{bucket}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Returns metadata for the specified bucket.
-    pub async fn get(&mut self, params: &BucketsGetParams) -> Result<Bucket> {
-        let rel_path = format!(
-            "b/{bucket}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Returns an IAM policy for the specified bucket.
-    pub async fn get_iam_policy(&mut self, params: &BucketsGetIamPolicyParams) -> Result<Policy> {
-        let rel_path = format!(
-            "b/{bucket}/iam",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Creates a new bucket.
-    pub async fn insert(&mut self, params: &BucketsInsertParams, req: &Bucket) -> Result<Bucket> {
-        let rel_path = format!("b",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Retrieves a list of buckets for a given project.
-    pub async fn list(&mut self, params: &BucketsListParams) -> Result<Buckets> {
-        let rel_path = format!("b",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Locks retention policy on a bucket.
-    pub async fn lock_retention_policy(
-        &mut self,
-        params: &BucketsLockRetentionPolicyParams,
-    ) -> Result<Bucket> {
-        let rel_path = format!(
-            "b/{bucket}/lockRetentionPolicy",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Patches a bucket. Changes to the bucket will be readable immediately after writing, but configuration changes may take time to propagate.
-    pub async fn patch(&mut self, params: &BucketsPatchParams, req: &Bucket) -> Result<Bucket> {
-        let rel_path = format!(
-            "b/{bucket}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-
-    /// Updates an IAM policy for the specified bucket.
-    pub async fn set_iam_policy(
-        &mut self,
-        params: &BucketsSetIamPolicyParams,
-        req: &Policy,
-    ) -> Result<Policy> {
-        let rel_path = format!(
-            "b/{bucket}/iam",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-
-    /// Tests a set of permissions on the given bucket to see which, if any, are held by the caller.
-    pub async fn test_iam_permissions(
-        &mut self,
-        params: &BucketsTestIamPermissionsParams,
-    ) -> Result<TestIamPermissionsResponse> {
-        let rel_path = format!(
-            "b/{bucket}/iam/testPermissions",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates a bucket. Changes to the bucket will be readable immediately after writing, but configuration changes may take time to propagate.
-    pub async fn update(&mut self, params: &BucketsUpdateParams, req: &Bucket) -> Result<Bucket> {
-        let rel_path = format!(
-            "b/{bucket}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-}
-
-/// The Storage Channels service represents the Channels resource.
-pub struct ChannelsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ChannelsService {
-    /// Create a new ChannelsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ChannelsService {
-        ChannelsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Stop watching resources through this channel
-    pub async fn stop(&mut self, params: &ChannelsStopParams, req: &Channel) -> Result<()> {
-        let rel_path = format!("channels/stop",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-}
-
-/// The Storage DefaultObjectAccessControls service represents the DefaultObjectAccessControls resource.
-pub struct DefaultObjectAccessControlsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl DefaultObjectAccessControlsService {
-    /// Create a new DefaultObjectAccessControlsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> DefaultObjectAccessControlsService {
-        DefaultObjectAccessControlsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Permanently deletes the default object ACL entry for the specified entity on the specified bucket.
-    pub async fn delete(&mut self, params: &DefaultObjectAccessControlsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "b/{bucket}/defaultObjectAcl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Returns the default object ACL entry for the specified entity on the specified bucket.
-    pub async fn get(
-        &mut self,
-        params: &DefaultObjectAccessControlsGetParams,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/defaultObjectAcl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Creates a new default object ACL entry on the specified bucket.
-    pub async fn insert(
-        &mut self,
-        params: &DefaultObjectAccessControlsInsertParams,
-        req: &ObjectAccessControl,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/defaultObjectAcl",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Retrieves default object ACL entries on the specified bucket.
-    pub async fn list(
-        &mut self,
-        params: &DefaultObjectAccessControlsListParams,
-    ) -> Result<ObjectAccessControls> {
-        let rel_path = format!(
-            "b/{bucket}/defaultObjectAcl",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Patches a default object ACL entry on the specified bucket.
-    pub async fn patch(
-        &mut self,
-        params: &DefaultObjectAccessControlsPatchParams,
-        req: &ObjectAccessControl,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/defaultObjectAcl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-
-    /// Updates a default object ACL entry on the specified bucket.
-    pub async fn update(
-        &mut self,
-        params: &DefaultObjectAccessControlsUpdateParams,
-        req: &ObjectAccessControl,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/defaultObjectAcl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-}
-
-/// The Storage Notifications service represents the Notifications resource.
-pub struct NotificationsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl NotificationsService {
-    /// Create a new NotificationsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> NotificationsService {
-        NotificationsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Permanently deletes a notification subscription.
-    pub async fn delete(&mut self, params: &NotificationsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "b/{bucket}/notificationConfigs/{notification}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            notification = percent_encode(params.notification.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// View a notification configuration.
-    pub async fn get(&mut self, params: &NotificationsGetParams) -> Result<Notification> {
-        let rel_path = format!(
-            "b/{bucket}/notificationConfigs/{notification}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            notification = percent_encode(params.notification.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Creates a notification subscription for a given bucket.
-    pub async fn insert(
-        &mut self,
-        params: &NotificationsInsertParams,
-        req: &Notification,
-    ) -> Result<Notification> {
-        let rel_path = format!(
-            "b/{bucket}/notificationConfigs",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Retrieves a list of notification subscriptions for a given bucket.
-    pub async fn list(&mut self, params: &NotificationsListParams) -> Result<Notifications> {
-        let rel_path = format!(
-            "b/{bucket}/notificationConfigs",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-}
-
-/// The Storage ObjectAccessControls service represents the ObjectAccessControls resource.
-pub struct ObjectAccessControlsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ObjectAccessControlsService {
-    /// Create a new ObjectAccessControlsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ObjectAccessControlsService {
-        ObjectAccessControlsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Permanently deletes the ACL entry for the specified entity on the specified object.
-    pub async fn delete(&mut self, params: &ObjectAccessControlsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Returns the ACL entry for the specified entity on the specified object.
-    pub async fn get(
-        &mut self,
-        params: &ObjectAccessControlsGetParams,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Creates a new ACL entry on the specified object.
-    pub async fn insert(
-        &mut self,
-        params: &ObjectAccessControlsInsertParams,
-        req: &ObjectAccessControl,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/acl",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Retrieves ACL entries on the specified object.
-    pub async fn list(
-        &mut self,
-        params: &ObjectAccessControlsListParams,
-    ) -> Result<ObjectAccessControls> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/acl",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Patches an ACL entry on the specified object.
-    pub async fn patch(
-        &mut self,
-        params: &ObjectAccessControlsPatchParams,
-        req: &ObjectAccessControl,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-
-    /// Updates an ACL entry on the specified object.
-    pub async fn update(
-        &mut self,
-        params: &ObjectAccessControlsUpdateParams,
-        req: &ObjectAccessControl,
-    ) -> Result<ObjectAccessControl> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/acl/{entity}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC),
-            entity = percent_encode(params.entity.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-}
-
-/// The Storage Objects service represents the Objects resource.
-pub struct ObjectsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ObjectsService {
-    /// Create a new ObjectsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ObjectsService {
-        ObjectsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Concatenates a list of existing objects into a new object in the same bucket.
-    pub async fn compose(
-        &mut self,
-        params: &ObjectsComposeParams,
-        req: &ComposeRequest,
-    ) -> Result<Object> {
-        let rel_path = format!(
-            "b/{destinationBucket}/o/{destinationObject}/compose",
-            destinationBucket =
-                percent_encode(params.destination_bucket.as_bytes(), NON_ALPHANUMERIC),
-            destinationObject =
-                percent_encode(params.destination_object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Copies a source object to a destination object. Optionally overrides metadata.
-    pub async fn copy(&mut self, params: &ObjectsCopyParams, req: &Object) -> Result<Object> {
-        let rel_path = format!(
-            "b/{sourceBucket}/o/{sourceObject}/copyTo/b/{destinationBucket}/o/{destinationObject}",
-            sourceBucket = percent_encode(params.source_bucket.as_bytes(), NON_ALPHANUMERIC),
-            sourceObject = percent_encode(params.source_object.as_bytes(), NON_ALPHANUMERIC),
-            destinationBucket =
-                percent_encode(params.destination_bucket.as_bytes(), NON_ALPHANUMERIC),
-            destinationObject =
-                percent_encode(params.destination_object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Deletes an object and its metadata. Deletions are permanent if versioning is not enabled for the bucket, or if the generation parameter is used.
-    pub async fn delete(&mut self, params: &ObjectsDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Retrieves an object or its metadata.
-    ///
-    /// This method potentially downloads data. See documentation of `Download`.
-    pub async fn get<'a>(
-        &'a mut self,
-        params: &ObjectsGetParams,
-    ) -> Result<Download<'a, EmptyRequest, Object>> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-
-        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
-    }
-
-    /// Returns an IAM policy for the specified object.
-    pub async fn get_iam_policy(&mut self, params: &ObjectsGetIamPolicyParams) -> Result<Policy> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/iam",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Stores a new object and metadata.
-    pub async fn insert(&mut self, params: &ObjectsInsertParams, req: &Object) -> Result<Object> {
-        let rel_path = format!(
-            "b/{bucket}/o",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Stores a new object and metadata.
-    ///
-    /// This method is a variant of `insert()`, taking data for upload. It performs a multipart upload.
-    pub async fn insert_upload(
-        &mut self,
-        params: &ObjectsInsertParams,
-        req: &Object,
-        data: hyper::body::Bytes,
-    ) -> Result<Object> {
-        let rel_path = format!(
-            "/upload/storage/v1/b/{bucket}/o",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=multipart{params}", params = params);
-
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-
-        do_upload_multipart(&self.client, &full_uri, &headers, "POST", opt_request, data).await
-    }
-
-    /// Stores a new object and metadata.
-    ///
-    /// This method is a variant of `insert()`, taking data for upload.
-    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
-    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
-    /// you choose for the upload.
-    pub async fn insert_resumable_upload<'client>(
-        &'client mut self,
-        params: &ObjectsInsertParams,
-        req: &Object,
-    ) -> Result<ResumableUpload<'client, Object>> {
-        let rel_path = format!(
-            "/resumable/upload/storage/v1/b/{bucket}/o",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=resumable{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
-            do_request_with_headers(&self.client, &full_uri, &headers, "POST", opt_request).await?;
-        if let Some(dest) = headers.get(hyper::header::LOCATION) {
-            use std::convert::TryFrom;
-            Ok(ResumableUpload::new(
-                hyper::Uri::try_from(dest.to_str()?)?,
-                &self.client,
-                5 * 1024 * 1024,
-            ))
-        } else {
-            Err(Error::from(ApiError::RedirectError(format!(
-                "Resumable upload response didn't contain Location: {:?}",
-                headers
-            )))
-            .context(format!("{:?}", headers)))?
-        }
-    }
-
-    /// Retrieves a list of objects matching the criteria.
-    pub async fn list(&mut self, params: &ObjectsListParams) -> Result<Objects> {
-        let rel_path = format!(
-            "b/{bucket}/o",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Patches an object's metadata.
-    pub async fn patch(&mut self, params: &ObjectsPatchParams, req: &Object) -> Result<Object> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PATCH", opt_request).await
-    }
-
-    /// Rewrites a source object to a destination object. Optionally overrides metadata.
-    pub async fn rewrite(
-        &mut self,
-        params: &ObjectsRewriteParams,
-        req: &Object,
-    ) -> Result<RewriteResponse> {
-        let rel_path = format!("b/{sourceBucket}/o/{sourceObject}/rewriteTo/b/{destinationBucket}/o/{destinationObject}", sourceBucket=percent_encode(params.source_bucket.as_bytes(), NON_ALPHANUMERIC),sourceObject=percent_encode(params.source_object.as_bytes(), NON_ALPHANUMERIC),destinationBucket=percent_encode(params.destination_bucket.as_bytes(), NON_ALPHANUMERIC),destinationObject=percent_encode(params.destination_object.as_bytes(), NON_ALPHANUMERIC));
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Updates an IAM policy for the specified object.
-    pub async fn set_iam_policy(
-        &mut self,
-        params: &ObjectsSetIamPolicyParams,
-        req: &Policy,
-    ) -> Result<Policy> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/iam",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-
-    /// Tests a set of permissions on the given object to see which, if any, are held by the caller.
-    pub async fn test_iam_permissions(
-        &mut self,
-        params: &ObjectsTestIamPermissionsParams,
-    ) -> Result<TestIamPermissionsResponse> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}/iam/testPermissions",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates an object's metadata.
-    pub async fn update(&mut self, params: &ObjectsUpdateParams, req: &Object) -> Result<Object> {
-        let rel_path = format!(
-            "b/{bucket}/o/{object}",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC),
-            object = percent_encode(params.object.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-
-    /// Watch for changes on all objects in a bucket.
-    pub async fn watch_all(
-        &mut self,
-        params: &ObjectsWatchAllParams,
-        req: &Channel,
-    ) -> Result<Channel> {
-        let rel_path = format!(
-            "b/{bucket}/o/watch",
-            bucket = percent_encode(params.bucket.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-}
-
-/// The Storage Projects service represents the Projects resource.
-pub struct ProjectsService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ProjectsService {
-    /// Create a new ProjectsService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ProjectsService {
-        ProjectsService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-}
-
-/// The Storage ProjectsHmacKeys service represents the ProjectsHmacKeys resource.
-pub struct ProjectsHmacKeysService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ProjectsHmacKeysService {
-    /// Create a new ProjectsHmacKeysService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ProjectsHmacKeysService {
-        ProjectsHmacKeysService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a new HMAC key for the specified service account.
-    pub async fn create(&mut self, params: &ProjectsHmacKeysCreateParams) -> Result<HmacKey> {
-        let rel_path = format!(
-            "projects/{projectId}/hmacKeys",
-            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Deletes an HMAC key.
-    pub async fn delete(&mut self, params: &ProjectsHmacKeysDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "projects/{projectId}/hmacKeys/{accessId}",
-            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC),
-            accessId = percent_encode(params.access_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Retrieves an HMAC key's metadata
-    pub async fn get(&mut self, params: &ProjectsHmacKeysGetParams) -> Result<HmacKeyMetadata> {
-        let rel_path = format!(
-            "projects/{projectId}/hmacKeys/{accessId}",
-            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC),
-            accessId = percent_encode(params.access_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadOnly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Retrieves a list of HMAC keys matching the criteria.
-    pub async fn list(&mut self, params: &ProjectsHmacKeysListParams) -> Result<HmacKeysMetadata> {
-        let rel_path = format!(
-            "projects/{projectId}/hmacKeys",
-            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadOnly.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-
-    /// Updates the state of an HMAC key. See the HMAC Key resource descriptor for valid states.
-    pub async fn update(
-        &mut self,
-        params: &ProjectsHmacKeysUpdateParams,
-        req: &HmacKeyMetadata,
-    ) -> Result<HmacKeyMetadata> {
-        let rel_path = format!(
-            "projects/{projectId}/hmacKeys/{accessId}",
-            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC),
-            accessId = percent_encode(params.access_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageFullControl.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "PUT", opt_request).await
-    }
-}
-
-/// The Storage ProjectsServiceAccount service represents the ProjectsServiceAccount resource.
-pub struct ProjectsServiceAccountService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl ProjectsServiceAccountService {
-    /// Create a new ProjectsServiceAccountService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> ProjectsServiceAccountService {
-        ProjectsServiceAccountService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://storage.googleapis.com/storage/v1/".into(),
-            root_url: "https://storage.googleapis.com/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of StorageScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Get the email address of this project's Google Cloud Storage service account.
-    pub async fn get(
-        &mut self,
-        params: &ProjectsServiceAccountGetParams,
-    ) -> Result<ServiceAccount> {
-        let rel_path = format!(
-            "projects/{projectId}/serviceAccount",
-            projectId = percent_encode(params.project_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &[StorageScopes::DevstorageReadWrite.as_ref().to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.storage_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "GET", opt_request).await
-    }
-}
--- a/manual_demo/Cargo.lock	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1139 +0,0 @@
-# This file is automatically @generated by Cargo.
-# It is not intended for manual editing.
-[[package]]
-name = "anyhow"
-version = "1.0.33"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
-
-[[package]]
-name = "arc-swap"
-version = "0.4.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d25d88fd6b8041580a654f9d0c581a047baee2b3efee13275f2fc392fc75034"
-
-[[package]]
-name = "arrayref"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
-
-[[package]]
-name = "async-google-apis-common"
-version = "0.1.7"
-dependencies = [
- "anyhow",
- "chrono",
- "futures",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "radix64",
- "serde",
- "serde_json",
- "tokio",
- "yup-oauth2",
-]
-
-[[package]]
-name = "autocfg"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
-
-[[package]]
-name = "base64"
-version = "0.11.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
-
-[[package]]
-name = "base64"
-version = "0.12.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
-
-[[package]]
-name = "base64"
-version = "0.13.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "904dfeac50f3cdaba28fc6f57fdcddb75f49ed61346676a78c4ffe55877802fd"
-
-[[package]]
-name = "bitflags"
-version = "1.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
-
-[[package]]
-name = "bumpalo"
-version = "3.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
-
-[[package]]
-name = "bytes"
-version = "0.5.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
-
-[[package]]
-name = "cc"
-version = "1.0.61"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
-
-[[package]]
-name = "cfg-if"
-version = "0.1.10"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
-
-[[package]]
-name = "chrono"
-version = "0.4.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
-dependencies = [
- "libc",
- "num-integer",
- "num-traits",
- "serde",
- "time",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "core-foundation"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "core-foundation-sys"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
-
-[[package]]
-name = "ct-logs"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
-dependencies = [
- "sct",
-]
-
-[[package]]
-name = "fnv"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
-
-[[package]]
-name = "fuchsia-zircon"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
-dependencies = [
- "bitflags",
- "fuchsia-zircon-sys",
-]
-
-[[package]]
-name = "fuchsia-zircon-sys"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
-
-[[package]]
-name = "futures"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5d8e3078b7b2a8a671cb7a3d17b4760e4181ea243227776ba83fd043b4ca034e"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-executor",
- "futures-io",
- "futures-sink",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-channel"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a7a4d35f7401e948629c9c3d6638fb9bf94e0b2121e96c3b428cc4e631f3eb74"
-dependencies = [
- "futures-core",
- "futures-sink",
-]
-
-[[package]]
-name = "futures-core"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d674eaa0056896d5ada519900dbf97ead2e46a7b6621e8160d79e2f2e1e2784b"
-
-[[package]]
-name = "futures-executor"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cc709ca1da6f66143b8c9bec8e6260181869893714e9b5a490b169b0414144ab"
-dependencies = [
- "futures-core",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-io"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5fc94b64bb39543b4e432f1790b6bf18e3ee3b74653c5449f63310e9a74b123c"
-
-[[package]]
-name = "futures-macro"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f57ed14da4603b2554682e9f2ff3c65d7567b53188db96cb71538217fc64581b"
-dependencies = [
- "proc-macro-hack",
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "futures-sink"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0d8764258ed64ebc5d9ed185cf86a95db5cac810269c5d20ececb32e0088abbd"
-
-[[package]]
-name = "futures-task"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4dd26820a9f3637f1302da8bceba3ff33adbe53464b54ca24d4e2d4f1db30f94"
-dependencies = [
- "once_cell",
-]
-
-[[package]]
-name = "futures-util"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8a894a0acddba51a2d49a6f4263b1e64b8c579ece8af50fa86503d52cd1eea34"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-io",
- "futures-macro",
- "futures-sink",
- "futures-task",
- "memchr",
- "pin-project",
- "pin-utils",
- "proc-macro-hack",
- "proc-macro-nested",
- "slab",
-]
-
-[[package]]
-name = "h2"
-version = "0.2.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "993f9e0baeed60001cf565546b0d3dbe6a6ad23f2bd31644a133c641eccf6d53"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "futures-sink",
- "futures-util",
- "http",
- "indexmap",
- "slab",
- "tokio",
- "tokio-util",
- "tracing",
-]
-
-[[package]]
-name = "hashbrown"
-version = "0.9.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
-
-[[package]]
-name = "hermit-abi"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "http"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
-dependencies = [
- "bytes",
- "fnv",
- "itoa",
-]
-
-[[package]]
-name = "http-body"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
-dependencies = [
- "bytes",
- "http",
-]
-
-[[package]]
-name = "httparse"
-version = "1.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
-
-[[package]]
-name = "httpdate"
-version = "0.3.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
-
-[[package]]
-name = "hyper"
-version = "0.13.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
-dependencies = [
- "bytes",
- "futures-channel",
- "futures-core",
- "futures-util",
- "h2",
- "http",
- "http-body",
- "httparse",
- "httpdate",
- "itoa",
- "pin-project",
- "socket2",
- "tokio",
- "tower-service",
- "tracing",
- "want",
-]
-
-[[package]]
-name = "hyper-rustls"
-version = "0.20.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
-dependencies = [
- "bytes",
- "ct-logs",
- "futures-util",
- "hyper",
- "log",
- "rustls",
- "rustls-native-certs",
- "tokio",
- "tokio-rustls",
- "webpki",
-]
-
-[[package]]
-name = "idna"
-version = "0.2.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
-dependencies = [
- "matches",
- "unicode-bidi",
- "unicode-normalization",
-]
-
-[[package]]
-name = "indexmap"
-version = "1.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
-dependencies = [
- "autocfg",
- "hashbrown",
-]
-
-[[package]]
-name = "iovec"
-version = "0.1.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "itoa"
-version = "0.4.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
-
-[[package]]
-name = "js-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
-dependencies = [
- "wasm-bindgen",
-]
-
-[[package]]
-name = "kernel32-sys"
-version = "0.2.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "lazy_static"
-version = "1.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
-
-[[package]]
-name = "libc"
-version = "0.2.79"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2448f6066e80e3bfc792e9c98bf705b4b0fc6e8ef5b43e5889aff0eaa9c58743"
-
-[[package]]
-name = "log"
-version = "0.4.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
-dependencies = [
- "cfg-if",
-]
-
-[[package]]
-name = "manual_demo"
-version = "0.1.0"
-dependencies = [
- "anyhow",
- "async-google-apis-common",
- "base64 0.13.0",
- "chrono",
- "hyper",
- "hyper-rustls",
- "serde",
- "serde_json",
- "tokio",
- "yup-oauth2",
-]
-
-[[package]]
-name = "matches"
-version = "0.1.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
-
-[[package]]
-name = "memchr"
-version = "2.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
-
-[[package]]
-name = "mio"
-version = "0.6.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
-dependencies = [
- "cfg-if",
- "fuchsia-zircon",
- "fuchsia-zircon-sys",
- "iovec",
- "kernel32-sys",
- "libc",
- "log",
- "miow 0.2.1",
- "net2",
- "slab",
- "winapi 0.2.8",
-]
-
-[[package]]
-name = "mio-named-pipes"
-version = "0.1.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0840c1c50fd55e521b247f949c241c9997709f23bd7f023b9762cd561e935656"
-dependencies = [
- "log",
- "mio",
- "miow 0.3.5",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "mio-uds"
-version = "0.6.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "afcb699eb26d4332647cc848492bbc15eafb26f08d0304550d5aa1f612e066f0"
-dependencies = [
- "iovec",
- "libc",
- "mio",
-]
-
-[[package]]
-name = "miow"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
-dependencies = [
- "kernel32-sys",
- "net2",
- "winapi 0.2.8",
- "ws2_32-sys",
-]
-
-[[package]]
-name = "miow"
-version = "0.3.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "07b88fb9795d4d36d62a012dfbf49a8f5cf12751f36d31a9dbe66d528e58979e"
-dependencies = [
- "socket2",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "net2"
-version = "0.2.35"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
-dependencies = [
- "cfg-if",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "num-integer"
-version = "0.1.43"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
-dependencies = [
- "autocfg",
- "num-traits",
-]
-
-[[package]]
-name = "num-traits"
-version = "0.2.12"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
-dependencies = [
- "autocfg",
-]
-
-[[package]]
-name = "num_cpus"
-version = "1.13.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "05499f3756671c15885fee9034446956fff3f243d6077b91e5767df161f766b3"
-dependencies = [
- "hermit-abi",
- "libc",
-]
-
-[[package]]
-name = "once_cell"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
-
-[[package]]
-name = "openssl-probe"
-version = "0.1.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
-
-[[package]]
-name = "percent-encoding"
-version = "2.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
-
-[[package]]
-name = "pin-project"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
-dependencies = [
- "pin-project-internal",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-lite"
-version = "0.1.10"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e555d9e657502182ac97b539fb3dae8b79cda19e3e4f8ffb5e8de4f18df93c95"
-
-[[package]]
-name = "pin-utils"
-version = "0.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
-
-[[package]]
-name = "proc-macro-hack"
-version = "0.5.18"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
-
-[[package]]
-name = "proc-macro-nested"
-version = "0.1.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
-
-[[package]]
-name = "proc-macro2"
-version = "1.0.24"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
-dependencies = [
- "unicode-xid",
-]
-
-[[package]]
-name = "quote"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
-dependencies = [
- "proc-macro2",
-]
-
-[[package]]
-name = "radix64"
-version = "0.6.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
-dependencies = [
- "arrayref",
- "cfg-if",
-]
-
-[[package]]
-name = "redox_syscall"
-version = "0.1.57"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
-
-[[package]]
-name = "ring"
-version = "0.16.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
-dependencies = [
- "cc",
- "libc",
- "once_cell",
- "spin",
- "untrusted",
- "web-sys",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "rustls"
-version = "0.17.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
-dependencies = [
- "base64 0.11.0",
- "log",
- "ring",
- "sct",
- "webpki",
-]
-
-[[package]]
-name = "rustls-native-certs"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
-dependencies = [
- "openssl-probe",
- "rustls",
- "schannel",
- "security-framework",
-]
-
-[[package]]
-name = "ryu"
-version = "1.0.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
-
-[[package]]
-name = "schannel"
-version = "0.1.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
-dependencies = [
- "lazy_static",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "sct"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "seahash"
-version = "4.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
-
-[[package]]
-name = "security-framework"
-version = "0.4.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
-dependencies = [
- "bitflags",
- "core-foundation",
- "core-foundation-sys",
- "libc",
- "security-framework-sys",
-]
-
-[[package]]
-name = "security-framework-sys"
-version = "0.4.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "serde"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
-dependencies = [
- "serde_derive",
-]
-
-[[package]]
-name = "serde_derive"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "serde_json"
-version = "1.0.59"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
-dependencies = [
- "itoa",
- "ryu",
- "serde",
-]
-
-[[package]]
-name = "signal-hook-registry"
-version = "1.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a3e12110bc539e657a646068aaf5eb5b63af9d0c1f7b29c97113fad80e15f035"
-dependencies = [
- "arc-swap",
- "libc",
-]
-
-[[package]]
-name = "slab"
-version = "0.4.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
-
-[[package]]
-name = "socket2"
-version = "0.3.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
-dependencies = [
- "cfg-if",
- "libc",
- "redox_syscall",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "spin"
-version = "0.5.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
-
-[[package]]
-name = "syn"
-version = "1.0.44"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e03e57e4fcbfe7749842d53e24ccb9aa12b7252dbe5e91d2acad31834c8b8fdd"
-dependencies = [
- "proc-macro2",
- "quote",
- "unicode-xid",
-]
-
-[[package]]
-name = "time"
-version = "0.1.44"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
-dependencies = [
- "libc",
- "wasi",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "tinyvec"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
-
-[[package]]
-name = "tokio"
-version = "0.2.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "iovec",
- "lazy_static",
- "libc",
- "memchr",
- "mio",
- "mio-named-pipes",
- "mio-uds",
- "num_cpus",
- "pin-project-lite",
- "signal-hook-registry",
- "slab",
- "tokio-macros",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "tokio-macros"
-version = "0.2.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "tokio-rustls"
-version = "0.13.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
-dependencies = [
- "futures-core",
- "rustls",
- "tokio",
- "webpki",
-]
-
-[[package]]
-name = "tokio-util"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
-dependencies = [
- "bytes",
- "futures-core",
- "futures-sink",
- "log",
- "pin-project-lite",
- "tokio",
-]
-
-[[package]]
-name = "tower-service"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
-
-[[package]]
-name = "tracing"
-version = "0.1.21"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
-dependencies = [
- "cfg-if",
- "log",
- "pin-project-lite",
- "tracing-core",
-]
-
-[[package]]
-name = "tracing-core"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "try-lock"
-version = "0.2.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
-
-[[package]]
-name = "unicode-bidi"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
-dependencies = [
- "matches",
-]
-
-[[package]]
-name = "unicode-normalization"
-version = "0.1.13"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
-dependencies = [
- "tinyvec",
-]
-
-[[package]]
-name = "unicode-xid"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
-
-[[package]]
-name = "untrusted"
-version = "0.7.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
-
-[[package]]
-name = "url"
-version = "2.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
-dependencies = [
- "idna",
- "matches",
- "percent-encoding",
-]
-
-[[package]]
-name = "want"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
-dependencies = [
- "log",
- "try-lock",
-]
-
-[[package]]
-name = "wasi"
-version = "0.10.0+wasi-snapshot-preview1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
-
-[[package]]
-name = "wasm-bindgen"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
-dependencies = [
- "cfg-if",
- "wasm-bindgen-macro",
-]
-
-[[package]]
-name = "wasm-bindgen-backend"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
-dependencies = [
- "bumpalo",
- "lazy_static",
- "log",
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-macro"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
-dependencies = [
- "quote",
- "wasm-bindgen-macro-support",
-]
-
-[[package]]
-name = "wasm-bindgen-macro-support"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-backend",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-shared"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
-
-[[package]]
-name = "web-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
-dependencies = [
- "js-sys",
- "wasm-bindgen",
-]
-
-[[package]]
-name = "webpki"
-version = "0.21.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "winapi"
-version = "0.2.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
-
-[[package]]
-name = "winapi"
-version = "0.3.9"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
-dependencies = [
- "winapi-i686-pc-windows-gnu",
- "winapi-x86_64-pc-windows-gnu",
-]
-
-[[package]]
-name = "winapi-build"
-version = "0.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
-
-[[package]]
-name = "winapi-i686-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
-
-[[package]]
-name = "winapi-x86_64-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
-
-[[package]]
-name = "ws2_32-sys"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "yup-oauth2"
-version = "4.1.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "749192b9464694a95dbaf0586e845c835b315e38d491aa2766a8477aaadb48ec"
-dependencies = [
- "base64 0.12.3",
- "chrono",
- "futures",
- "http",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "rustls",
- "seahash",
- "serde",
- "serde_json",
- "tokio",
- "url",
-]
--- a/manual_demo/Cargo.toml	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,21 +0,0 @@
-[package]
-name = "manual_demo"
-version = "0.1.0"
-authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
-edition = "2018"
-publish = false
-
-# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
-
-[dependencies]
-async-google-apis-common = { path = "../async-google-apis-common/" }
-
-chrono = "~0.4"
-hyper = "~0.13"
-hyper-rustls = "~0.20"
-serde = "~1.0"
-serde_json = "~1.0"
-tokio = { version = "~0.2", features = ["full"] }
-yup-oauth2 = "~4"
-anyhow = "~1.0"
-base64 = "~0.13"
--- a/manual_demo/src/drive_v3_types.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
-../../generate/gen/drive_v3_types.rs
\ No newline at end of file
--- a/manual_demo/src/main.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,54 +0,0 @@
-// A manual client for a Google API (e.g. Drive), to test what makes sense and what doesn't.
-
-use async_google_apis_common as agac;
-
-mod discovery_v1_types;
-mod drive_v3_types;
-
-use discovery_v1_types as disc;
-use drive_v3_types as drive;
-
-use yup_oauth2::InstalledFlowAuthenticator;
-
-fn https_client() -> agac::TlsClient {
-    let conn = hyper_rustls::HttpsConnector::new();
-    let cl = hyper::Client::builder().build(conn);
-    cl
-}
-
-#[tokio::main]
-async fn main() {
-    let sec = yup_oauth2::read_application_secret("client_secret.json")
-        .await
-        .expect("client secret couldn't be read.");
-
-    let mut auth = InstalledFlowAuthenticator::builder(
-        sec,
-        yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
-    )
-    .persist_tokens_to_disk("tokencache.json")
-    .build()
-    .await
-    .expect("installed flow authenticator!");
-
-    let scopes = &["https://www.googleapis.com/auth/drive.file"];
-
-    let mut cl = https_client();
-    let mut disc_svc = disc::ApisService::new(cl);
-
-    let params = disc::ApisListParams::default();
-    println!(
-        "{}",
-        serde_json::to_string_pretty(&disc_svc.list(&params).await.unwrap()).unwrap()
-    );
-
-    let mut params = disc::ApisGetRestParams {
-        api: "drive".into(),
-        version: "v3".into(),
-        ..Default::default()
-    };
-    println!(
-        "{}",
-        serde_json::to_string_pretty(&disc_svc.get_rest(&params).await.unwrap()).unwrap()
-    );
-}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/README.md	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,2 @@
+This directory contains various things that clients of this library don't need
+to care about :-)
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/manual_demo/Cargo.lock	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,1139 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
+name = "anyhow"
+version = "1.0.33"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
+
+[[package]]
+name = "arc-swap"
+version = "0.4.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d25d88fd6b8041580a654f9d0c581a047baee2b3efee13275f2fc392fc75034"
+
+[[package]]
+name = "arrayref"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
+
+[[package]]
+name = "async-google-apis-common"
+version = "0.1.7"
+dependencies = [
+ "anyhow",
+ "chrono",
+ "futures",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "radix64",
+ "serde",
+ "serde_json",
+ "tokio",
+ "yup-oauth2",
+]
+
+[[package]]
+name = "autocfg"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
+
+[[package]]
+name = "base64"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
+
+[[package]]
+name = "base64"
+version = "0.12.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
+
+[[package]]
+name = "base64"
+version = "0.13.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "904dfeac50f3cdaba28fc6f57fdcddb75f49ed61346676a78c4ffe55877802fd"
+
+[[package]]
+name = "bitflags"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
+
+[[package]]
+name = "bumpalo"
+version = "3.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
+
+[[package]]
+name = "bytes"
+version = "0.5.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
+
+[[package]]
+name = "cc"
+version = "1.0.61"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
+
+[[package]]
+name = "cfg-if"
+version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
+
+[[package]]
+name = "chrono"
+version = "0.4.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
+dependencies = [
+ "libc",
+ "num-integer",
+ "num-traits",
+ "serde",
+ "time",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "core-foundation"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "core-foundation-sys"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
+
+[[package]]
+name = "ct-logs"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
+dependencies = [
+ "sct",
+]
+
+[[package]]
+name = "fnv"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
+
+[[package]]
+name = "fuchsia-zircon"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
+dependencies = [
+ "bitflags",
+ "fuchsia-zircon-sys",
+]
+
+[[package]]
+name = "fuchsia-zircon-sys"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
+
+[[package]]
+name = "futures"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5d8e3078b7b2a8a671cb7a3d17b4760e4181ea243227776ba83fd043b4ca034e"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-executor",
+ "futures-io",
+ "futures-sink",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-channel"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a7a4d35f7401e948629c9c3d6638fb9bf94e0b2121e96c3b428cc4e631f3eb74"
+dependencies = [
+ "futures-core",
+ "futures-sink",
+]
+
+[[package]]
+name = "futures-core"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d674eaa0056896d5ada519900dbf97ead2e46a7b6621e8160d79e2f2e1e2784b"
+
+[[package]]
+name = "futures-executor"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cc709ca1da6f66143b8c9bec8e6260181869893714e9b5a490b169b0414144ab"
+dependencies = [
+ "futures-core",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-io"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5fc94b64bb39543b4e432f1790b6bf18e3ee3b74653c5449f63310e9a74b123c"
+
+[[package]]
+name = "futures-macro"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f57ed14da4603b2554682e9f2ff3c65d7567b53188db96cb71538217fc64581b"
+dependencies = [
+ "proc-macro-hack",
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "futures-sink"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0d8764258ed64ebc5d9ed185cf86a95db5cac810269c5d20ececb32e0088abbd"
+
+[[package]]
+name = "futures-task"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4dd26820a9f3637f1302da8bceba3ff33adbe53464b54ca24d4e2d4f1db30f94"
+dependencies = [
+ "once_cell",
+]
+
+[[package]]
+name = "futures-util"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8a894a0acddba51a2d49a6f4263b1e64b8c579ece8af50fa86503d52cd1eea34"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-io",
+ "futures-macro",
+ "futures-sink",
+ "futures-task",
+ "memchr",
+ "pin-project",
+ "pin-utils",
+ "proc-macro-hack",
+ "proc-macro-nested",
+ "slab",
+]
+
+[[package]]
+name = "h2"
+version = "0.2.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "993f9e0baeed60001cf565546b0d3dbe6a6ad23f2bd31644a133c641eccf6d53"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "futures-sink",
+ "futures-util",
+ "http",
+ "indexmap",
+ "slab",
+ "tokio",
+ "tokio-util",
+ "tracing",
+]
+
+[[package]]
+name = "hashbrown"
+version = "0.9.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
+
+[[package]]
+name = "hermit-abi"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "http"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
+dependencies = [
+ "bytes",
+ "fnv",
+ "itoa",
+]
+
+[[package]]
+name = "http-body"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
+dependencies = [
+ "bytes",
+ "http",
+]
+
+[[package]]
+name = "httparse"
+version = "1.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
+
+[[package]]
+name = "httpdate"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
+
+[[package]]
+name = "hyper"
+version = "0.13.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
+dependencies = [
+ "bytes",
+ "futures-channel",
+ "futures-core",
+ "futures-util",
+ "h2",
+ "http",
+ "http-body",
+ "httparse",
+ "httpdate",
+ "itoa",
+ "pin-project",
+ "socket2",
+ "tokio",
+ "tower-service",
+ "tracing",
+ "want",
+]
+
+[[package]]
+name = "hyper-rustls"
+version = "0.20.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
+dependencies = [
+ "bytes",
+ "ct-logs",
+ "futures-util",
+ "hyper",
+ "log",
+ "rustls",
+ "rustls-native-certs",
+ "tokio",
+ "tokio-rustls",
+ "webpki",
+]
+
+[[package]]
+name = "idna"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
+dependencies = [
+ "matches",
+ "unicode-bidi",
+ "unicode-normalization",
+]
+
+[[package]]
+name = "indexmap"
+version = "1.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
+dependencies = [
+ "autocfg",
+ "hashbrown",
+]
+
+[[package]]
+name = "iovec"
+version = "0.1.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "itoa"
+version = "0.4.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
+
+[[package]]
+name = "js-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
+dependencies = [
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "kernel32-sys"
+version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "lazy_static"
+version = "1.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
+
+[[package]]
+name = "libc"
+version = "0.2.79"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2448f6066e80e3bfc792e9c98bf705b4b0fc6e8ef5b43e5889aff0eaa9c58743"
+
+[[package]]
+name = "log"
+version = "0.4.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
+dependencies = [
+ "cfg-if",
+]
+
+[[package]]
+name = "manual_demo"
+version = "0.1.0"
+dependencies = [
+ "anyhow",
+ "async-google-apis-common",
+ "base64 0.13.0",
+ "chrono",
+ "hyper",
+ "hyper-rustls",
+ "serde",
+ "serde_json",
+ "tokio",
+ "yup-oauth2",
+]
+
+[[package]]
+name = "matches"
+version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
+
+[[package]]
+name = "memchr"
+version = "2.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
+
+[[package]]
+name = "mio"
+version = "0.6.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
+dependencies = [
+ "cfg-if",
+ "fuchsia-zircon",
+ "fuchsia-zircon-sys",
+ "iovec",
+ "kernel32-sys",
+ "libc",
+ "log",
+ "miow 0.2.1",
+ "net2",
+ "slab",
+ "winapi 0.2.8",
+]
+
+[[package]]
+name = "mio-named-pipes"
+version = "0.1.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0840c1c50fd55e521b247f949c241c9997709f23bd7f023b9762cd561e935656"
+dependencies = [
+ "log",
+ "mio",
+ "miow 0.3.5",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "mio-uds"
+version = "0.6.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "afcb699eb26d4332647cc848492bbc15eafb26f08d0304550d5aa1f612e066f0"
+dependencies = [
+ "iovec",
+ "libc",
+ "mio",
+]
+
+[[package]]
+name = "miow"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
+dependencies = [
+ "kernel32-sys",
+ "net2",
+ "winapi 0.2.8",
+ "ws2_32-sys",
+]
+
+[[package]]
+name = "miow"
+version = "0.3.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "07b88fb9795d4d36d62a012dfbf49a8f5cf12751f36d31a9dbe66d528e58979e"
+dependencies = [
+ "socket2",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "net2"
+version = "0.2.35"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "num-integer"
+version = "0.1.43"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
+dependencies = [
+ "autocfg",
+ "num-traits",
+]
+
+[[package]]
+name = "num-traits"
+version = "0.2.12"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
+dependencies = [
+ "autocfg",
+]
+
+[[package]]
+name = "num_cpus"
+version = "1.13.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "05499f3756671c15885fee9034446956fff3f243d6077b91e5767df161f766b3"
+dependencies = [
+ "hermit-abi",
+ "libc",
+]
+
+[[package]]
+name = "once_cell"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
+
+[[package]]
+name = "openssl-probe"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
+
+[[package]]
+name = "percent-encoding"
+version = "2.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
+
+[[package]]
+name = "pin-project"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
+dependencies = [
+ "pin-project-internal",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-lite"
+version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e555d9e657502182ac97b539fb3dae8b79cda19e3e4f8ffb5e8de4f18df93c95"
+
+[[package]]
+name = "pin-utils"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
+
+[[package]]
+name = "proc-macro-hack"
+version = "0.5.18"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
+
+[[package]]
+name = "proc-macro-nested"
+version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
+
+[[package]]
+name = "proc-macro2"
+version = "1.0.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
+dependencies = [
+ "unicode-xid",
+]
+
+[[package]]
+name = "quote"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
+dependencies = [
+ "proc-macro2",
+]
+
+[[package]]
+name = "radix64"
+version = "0.6.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
+dependencies = [
+ "arrayref",
+ "cfg-if",
+]
+
+[[package]]
+name = "redox_syscall"
+version = "0.1.57"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
+
+[[package]]
+name = "ring"
+version = "0.16.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
+dependencies = [
+ "cc",
+ "libc",
+ "once_cell",
+ "spin",
+ "untrusted",
+ "web-sys",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "rustls"
+version = "0.17.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
+dependencies = [
+ "base64 0.11.0",
+ "log",
+ "ring",
+ "sct",
+ "webpki",
+]
+
+[[package]]
+name = "rustls-native-certs"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
+dependencies = [
+ "openssl-probe",
+ "rustls",
+ "schannel",
+ "security-framework",
+]
+
+[[package]]
+name = "ryu"
+version = "1.0.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
+
+[[package]]
+name = "schannel"
+version = "0.1.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
+dependencies = [
+ "lazy_static",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "sct"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "seahash"
+version = "4.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
+
+[[package]]
+name = "security-framework"
+version = "0.4.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
+dependencies = [
+ "bitflags",
+ "core-foundation",
+ "core-foundation-sys",
+ "libc",
+ "security-framework-sys",
+]
+
+[[package]]
+name = "security-framework-sys"
+version = "0.4.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "serde"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
+dependencies = [
+ "serde_derive",
+]
+
+[[package]]
+name = "serde_derive"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "serde_json"
+version = "1.0.59"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
+dependencies = [
+ "itoa",
+ "ryu",
+ "serde",
+]
+
+[[package]]
+name = "signal-hook-registry"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a3e12110bc539e657a646068aaf5eb5b63af9d0c1f7b29c97113fad80e15f035"
+dependencies = [
+ "arc-swap",
+ "libc",
+]
+
+[[package]]
+name = "slab"
+version = "0.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
+
+[[package]]
+name = "socket2"
+version = "0.3.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "redox_syscall",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "spin"
+version = "0.5.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
+
+[[package]]
+name = "syn"
+version = "1.0.44"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e03e57e4fcbfe7749842d53e24ccb9aa12b7252dbe5e91d2acad31834c8b8fdd"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "unicode-xid",
+]
+
+[[package]]
+name = "time"
+version = "0.1.44"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
+dependencies = [
+ "libc",
+ "wasi",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "tinyvec"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
+
+[[package]]
+name = "tokio"
+version = "0.2.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "iovec",
+ "lazy_static",
+ "libc",
+ "memchr",
+ "mio",
+ "mio-named-pipes",
+ "mio-uds",
+ "num_cpus",
+ "pin-project-lite",
+ "signal-hook-registry",
+ "slab",
+ "tokio-macros",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "tokio-macros"
+version = "0.2.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "tokio-rustls"
+version = "0.13.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
+dependencies = [
+ "futures-core",
+ "rustls",
+ "tokio",
+ "webpki",
+]
+
+[[package]]
+name = "tokio-util"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
+dependencies = [
+ "bytes",
+ "futures-core",
+ "futures-sink",
+ "log",
+ "pin-project-lite",
+ "tokio",
+]
+
+[[package]]
+name = "tower-service"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
+
+[[package]]
+name = "tracing"
+version = "0.1.21"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
+dependencies = [
+ "cfg-if",
+ "log",
+ "pin-project-lite",
+ "tracing-core",
+]
+
+[[package]]
+name = "tracing-core"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "try-lock"
+version = "0.2.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
+
+[[package]]
+name = "unicode-bidi"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
+dependencies = [
+ "matches",
+]
+
+[[package]]
+name = "unicode-normalization"
+version = "0.1.13"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
+dependencies = [
+ "tinyvec",
+]
+
+[[package]]
+name = "unicode-xid"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
+
+[[package]]
+name = "untrusted"
+version = "0.7.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
+
+[[package]]
+name = "url"
+version = "2.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
+dependencies = [
+ "idna",
+ "matches",
+ "percent-encoding",
+]
+
+[[package]]
+name = "want"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
+dependencies = [
+ "log",
+ "try-lock",
+]
+
+[[package]]
+name = "wasi"
+version = "0.10.0+wasi-snapshot-preview1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
+
+[[package]]
+name = "wasm-bindgen"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
+dependencies = [
+ "cfg-if",
+ "wasm-bindgen-macro",
+]
+
+[[package]]
+name = "wasm-bindgen-backend"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
+dependencies = [
+ "bumpalo",
+ "lazy_static",
+ "log",
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-macro"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
+dependencies = [
+ "quote",
+ "wasm-bindgen-macro-support",
+]
+
+[[package]]
+name = "wasm-bindgen-macro-support"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-backend",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-shared"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
+
+[[package]]
+name = "web-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
+dependencies = [
+ "js-sys",
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "webpki"
+version = "0.21.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "winapi"
+version = "0.2.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
+
+[[package]]
+name = "winapi"
+version = "0.3.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
+dependencies = [
+ "winapi-i686-pc-windows-gnu",
+ "winapi-x86_64-pc-windows-gnu",
+]
+
+[[package]]
+name = "winapi-build"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
+
+[[package]]
+name = "winapi-i686-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
+
+[[package]]
+name = "winapi-x86_64-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
+
+[[package]]
+name = "ws2_32-sys"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "yup-oauth2"
+version = "4.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "749192b9464694a95dbaf0586e845c835b315e38d491aa2766a8477aaadb48ec"
+dependencies = [
+ "base64 0.12.3",
+ "chrono",
+ "futures",
+ "http",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "rustls",
+ "seahash",
+ "serde",
+ "serde_json",
+ "tokio",
+ "url",
+]
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/manual_demo/Cargo.toml	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,21 @@
+[package]
+name = "manual_demo"
+version = "0.1.0"
+authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
+edition = "2018"
+publish = false
+
+# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
+
+[dependencies]
+async-google-apis-common = { path = "../async-google-apis-common/" }
+
+chrono = "~0.4"
+hyper = "~0.13"
+hyper-rustls = "~0.20"
+serde = "~1.0"
+serde_json = "~1.0"
+tokio = { version = "~0.2", features = ["full"] }
+yup-oauth2 = "~4"
+anyhow = "~1.0"
+base64 = "~0.13"
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/manual_demo/README.md	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,4 @@
+# `manual_demo`
+
+Don't worry about this. It's used to test individual features of dependencies
+for writing the generated code.
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/manual_demo/src/drive_v3_types.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,1 @@
+../../generate/gen/drive_v3_types.rs
\ No newline at end of file
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/manual_demo/src/main.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,54 @@
+// A manual client for a Google API (e.g. Drive), to test what makes sense and what doesn't.
+
+use async_google_apis_common as agac;
+
+mod discovery_v1_types;
+mod drive_v3_types;
+
+use discovery_v1_types as disc;
+use drive_v3_types as drive;
+
+use yup_oauth2::InstalledFlowAuthenticator;
+
+fn https_client() -> agac::TlsClient {
+    let conn = hyper_rustls::HttpsConnector::new();
+    let cl = hyper::Client::builder().build(conn);
+    cl
+}
+
+#[tokio::main]
+async fn main() {
+    let sec = yup_oauth2::read_application_secret("client_secret.json")
+        .await
+        .expect("client secret couldn't be read.");
+
+    let mut auth = InstalledFlowAuthenticator::builder(
+        sec,
+        yup_oauth2::InstalledFlowReturnMethod::HTTPRedirect,
+    )
+    .persist_tokens_to_disk("tokencache.json")
+    .build()
+    .await
+    .expect("installed flow authenticator!");
+
+    let scopes = &["https://www.googleapis.com/auth/drive.file"];
+
+    let mut cl = https_client();
+    let mut disc_svc = disc::ApisService::new(cl);
+
+    let params = disc::ApisListParams::default();
+    println!(
+        "{}",
+        serde_json::to_string_pretty(&disc_svc.list(&params).await.unwrap()).unwrap()
+    );
+
+    let mut params = disc::ApisGetRestParams {
+        api: "drive".into(),
+        version: "v3".into(),
+        ..Default::default()
+    };
+    println!(
+        "{}",
+        serde_json::to_string_pretty(&disc_svc.get_rest(&params).await.unwrap()).unwrap()
+    );
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/manual_demo/src/photoslibrary_v1_types.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,1 @@
+../../generate/gen/photoslibrary_v1_types.rs
\ No newline at end of file
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/test_integration/Cargo.lock	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,1419 @@
+# This file is automatically @generated by Cargo.
+# It is not intended for manual editing.
+[[package]]
+name = "aho-corasick"
+version = "0.7.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b476ce7103678b0c6d3d395dbbae31d48ff910bd28be979ba5d48c6351131d0d"
+dependencies = [
+ "memchr",
+]
+
+[[package]]
+name = "anyhow"
+version = "1.0.33"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
+
+[[package]]
+name = "arc-swap"
+version = "0.4.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d25d88fd6b8041580a654f9d0c581a047baee2b3efee13275f2fc392fc75034"
+
+[[package]]
+name = "arrayref"
+version = "0.3.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
+
+[[package]]
+name = "assert-json-diff"
+version = "1.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4259cbe96513d2f1073027a259fc2ca917feb3026a5a8d984e3628e490255cc0"
+dependencies = [
+ "extend",
+ "serde",
+ "serde_json",
+]
+
+[[package]]
+name = "async-google-apis-common"
+version = "0.1.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f50b43c3fc70e03c36aac2dd256c97bdc07f0875d7fc28a0d76e1ed4c18999d5"
+dependencies = [
+ "anyhow",
+ "chrono",
+ "futures",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "radix64",
+ "serde",
+ "serde_json",
+ "tokio",
+ "yup-oauth2",
+]
+
+[[package]]
+name = "atty"
+version = "0.2.14"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
+dependencies = [
+ "hermit-abi",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "autocfg"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
+
+[[package]]
+name = "base64"
+version = "0.11.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
+
+[[package]]
+name = "base64"
+version = "0.12.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
+
+[[package]]
+name = "bitflags"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
+
+[[package]]
+name = "bumpalo"
+version = "3.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
+
+[[package]]
+name = "bytes"
+version = "0.5.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
+
+[[package]]
+name = "cc"
+version = "1.0.61"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
+
+[[package]]
+name = "cfg-if"
+version = "0.1.10"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
+
+[[package]]
+name = "chrono"
+version = "0.4.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
+dependencies = [
+ "libc",
+ "num-integer",
+ "num-traits",
+ "serde",
+ "time",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "colored"
+version = "1.9.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f4ffc801dacf156c5854b9df4f425a626539c3a6ef7893cc0c5084a23f0b6c59"
+dependencies = [
+ "atty",
+ "lazy_static",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "core-foundation"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "core-foundation-sys"
+version = "0.7.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
+
+[[package]]
+name = "ct-logs"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
+dependencies = [
+ "sct",
+]
+
+[[package]]
+name = "difference"
+version = "2.0.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "524cbf6897b527295dff137cec09ecf3a05f4fddffd7dfcd1585403449e74198"
+
+[[package]]
+name = "dtoa"
+version = "0.4.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "134951f4028bdadb9b84baf4232681efbf277da25144b9b0ad65df75946c422b"
+
+[[package]]
+name = "env_logger"
+version = "0.8.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "54532e3223c5af90a6a757c90b5c5521564b07e5e7a958681bcd2afad421cdcd"
+dependencies = [
+ "atty",
+ "humantime",
+ "log",
+ "regex",
+ "termcolor",
+]
+
+[[package]]
+name = "extend"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f47da3a72ec598d9c8937a7ebca8962a5c7a1f28444e38c2b33c771ba3f55f05"
+dependencies = [
+ "proc-macro-error",
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "fnv"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
+
+[[package]]
+name = "fuchsia-zircon"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
+dependencies = [
+ "bitflags",
+ "fuchsia-zircon-sys",
+]
+
+[[package]]
+name = "fuchsia-zircon-sys"
+version = "0.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
+
+[[package]]
+name = "futures"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "95314d38584ffbfda215621d723e0a3906f032e03ae5551e650058dac83d4797"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-executor",
+ "futures-io",
+ "futures-sink",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-channel"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0448174b01148032eed37ac4aed28963aaaa8cfa93569a08e5b479bbc6c2c151"
+dependencies = [
+ "futures-core",
+ "futures-sink",
+]
+
+[[package]]
+name = "futures-core"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "18eaa56102984bed2c88ea39026cff3ce3b4c7f508ca970cedf2450ea10d4e46"
+
+[[package]]
+name = "futures-executor"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f5f8e0c9258abaea85e78ebdda17ef9666d390e987f006be6080dfe354b708cb"
+dependencies = [
+ "futures-core",
+ "futures-task",
+ "futures-util",
+]
+
+[[package]]
+name = "futures-io"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e1798854a4727ff944a7b12aa999f58ce7aa81db80d2dfaaf2ba06f065ddd2b"
+
+[[package]]
+name = "futures-macro"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e36fccf3fc58563b4a14d265027c627c3b665d7fed489427e88e7cc929559efe"
+dependencies = [
+ "proc-macro-hack",
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "futures-sink"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0e3ca3f17d6e8804ae5d3df7a7d35b2b3a6fe89dac84b31872720fc3060a0b11"
+
+[[package]]
+name = "futures-task"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "96d502af37186c4fef99453df03e374683f8a1eec9dcc1e66b3b82dc8278ce3c"
+dependencies = [
+ "once_cell",
+]
+
+[[package]]
+name = "futures-util"
+version = "0.3.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "abcb44342f62e6f3e8ac427b8aa815f724fd705dfad060b18ac7866c15bb8e34"
+dependencies = [
+ "futures-channel",
+ "futures-core",
+ "futures-io",
+ "futures-macro",
+ "futures-sink",
+ "futures-task",
+ "memchr",
+ "pin-project 1.0.1",
+ "pin-utils",
+ "proc-macro-hack",
+ "proc-macro-nested",
+ "slab",
+]
+
+[[package]]
+name = "getrandom"
+version = "0.1.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "fc587bc0ec293155d5bfa6b9891ec18a1e330c234f896ea47fbada4cadbe47e6"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "wasi 0.9.0+wasi-snapshot-preview1",
+]
+
+[[package]]
+name = "h2"
+version = "0.2.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5e4728fd124914ad25e99e3d15a9361a879f6620f63cb56bbb08f95abb97a535"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "futures-sink",
+ "futures-util",
+ "http",
+ "indexmap",
+ "slab",
+ "tokio",
+ "tokio-util",
+ "tracing",
+ "tracing-futures",
+]
+
+[[package]]
+name = "hashbrown"
+version = "0.9.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
+
+[[package]]
+name = "hermit-abi"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "http"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
+dependencies = [
+ "bytes",
+ "fnv",
+ "itoa",
+]
+
+[[package]]
+name = "http-body"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
+dependencies = [
+ "bytes",
+ "http",
+]
+
+[[package]]
+name = "httparse"
+version = "1.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
+
+[[package]]
+name = "httpdate"
+version = "0.3.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
+
+[[package]]
+name = "humantime"
+version = "2.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3c1ad908cc71012b7bea4d0c53ba96a8cba9962f048fa68d143376143d863b7a"
+
+[[package]]
+name = "hyper"
+version = "0.13.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
+dependencies = [
+ "bytes",
+ "futures-channel",
+ "futures-core",
+ "futures-util",
+ "h2",
+ "http",
+ "http-body",
+ "httparse",
+ "httpdate",
+ "itoa",
+ "pin-project 0.4.27",
+ "socket2",
+ "tokio",
+ "tower-service",
+ "tracing",
+ "want",
+]
+
+[[package]]
+name = "hyper-rustls"
+version = "0.20.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
+dependencies = [
+ "bytes",
+ "ct-logs",
+ "futures-util",
+ "hyper",
+ "log",
+ "rustls",
+ "rustls-native-certs",
+ "tokio",
+ "tokio-rustls",
+ "webpki",
+]
+
+[[package]]
+name = "idna"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
+dependencies = [
+ "matches",
+ "unicode-bidi",
+ "unicode-normalization",
+]
+
+[[package]]
+name = "indexmap"
+version = "1.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
+dependencies = [
+ "autocfg",
+ "hashbrown",
+]
+
+[[package]]
+name = "iovec"
+version = "0.1.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
+dependencies = [
+ "libc",
+]
+
+[[package]]
+name = "itoa"
+version = "0.4.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
+
+[[package]]
+name = "js-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
+dependencies = [
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "kernel32-sys"
+version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "lazy_static"
+version = "1.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
+
+[[package]]
+name = "libc"
+version = "0.2.80"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4d58d1b70b004888f764dfbf6a26a3b0342a1632d33968e4a179d8011c760614"
+
+[[package]]
+name = "log"
+version = "0.4.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
+dependencies = [
+ "cfg-if",
+]
+
+[[package]]
+name = "matches"
+version = "0.1.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
+
+[[package]]
+name = "memchr"
+version = "2.3.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
+
+[[package]]
+name = "mio"
+version = "0.6.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
+dependencies = [
+ "cfg-if",
+ "fuchsia-zircon",
+ "fuchsia-zircon-sys",
+ "iovec",
+ "kernel32-sys",
+ "libc",
+ "log",
+ "miow 0.2.1",
+ "net2",
+ "slab",
+ "winapi 0.2.8",
+]
+
+[[package]]
+name = "mio-named-pipes"
+version = "0.1.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "0840c1c50fd55e521b247f949c241c9997709f23bd7f023b9762cd561e935656"
+dependencies = [
+ "log",
+ "mio",
+ "miow 0.3.5",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "mio-uds"
+version = "0.6.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "afcb699eb26d4332647cc848492bbc15eafb26f08d0304550d5aa1f612e066f0"
+dependencies = [
+ "iovec",
+ "libc",
+ "mio",
+]
+
+[[package]]
+name = "miow"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
+dependencies = [
+ "kernel32-sys",
+ "net2",
+ "winapi 0.2.8",
+ "ws2_32-sys",
+]
+
+[[package]]
+name = "miow"
+version = "0.3.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "07b88fb9795d4d36d62a012dfbf49a8f5cf12751f36d31a9dbe66d528e58979e"
+dependencies = [
+ "socket2",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "mockito"
+version = "0.27.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3a634720d366bcbce30fb05871a35da229cef101ad0b2ea4e46cf5abf031a273"
+dependencies = [
+ "assert-json-diff",
+ "colored",
+ "difference",
+ "httparse",
+ "lazy_static",
+ "log",
+ "rand",
+ "regex",
+ "serde_json",
+ "serde_urlencoded",
+]
+
+[[package]]
+name = "net2"
+version = "0.2.35"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "num-integer"
+version = "0.1.43"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
+dependencies = [
+ "autocfg",
+ "num-traits",
+]
+
+[[package]]
+name = "num-traits"
+version = "0.2.12"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
+dependencies = [
+ "autocfg",
+]
+
+[[package]]
+name = "num_cpus"
+version = "1.13.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "05499f3756671c15885fee9034446956fff3f243d6077b91e5767df161f766b3"
+dependencies = [
+ "hermit-abi",
+ "libc",
+]
+
+[[package]]
+name = "once_cell"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
+
+[[package]]
+name = "openssl-probe"
+version = "0.1.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
+
+[[package]]
+name = "percent-encoding"
+version = "2.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
+
+[[package]]
+name = "pin-project"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
+dependencies = [
+ "pin-project-internal 0.4.27",
+]
+
+[[package]]
+name = "pin-project"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ee41d838744f60d959d7074e3afb6b35c7456d0f61cad38a24e35e6553f73841"
+dependencies = [
+ "pin-project-internal 1.0.1",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "0.4.27"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-internal"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "81a4ffa594b66bff340084d4081df649a7dc049ac8d7fc458d8e628bfbbb2f86"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "pin-project-lite"
+version = "0.1.11"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b"
+
+[[package]]
+name = "pin-utils"
+version = "0.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
+
+[[package]]
+name = "ppv-lite86"
+version = "0.2.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c36fa947111f5c62a733b652544dd0016a43ce89619538a8ef92724a6f501a20"
+
+[[package]]
+name = "proc-macro-error"
+version = "1.0.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "da25490ff9892aab3fcf7c36f08cfb902dd3e71ca0f9f9517bea02a73a5ce38c"
+dependencies = [
+ "proc-macro-error-attr",
+ "proc-macro2",
+ "quote",
+ "syn",
+ "version_check",
+]
+
+[[package]]
+name = "proc-macro-error-attr"
+version = "1.0.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a1be40180e52ecc98ad80b184934baf3d0d29f979574e439af5a55274b35f869"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "version_check",
+]
+
+[[package]]
+name = "proc-macro-hack"
+version = "0.5.18"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
+
+[[package]]
+name = "proc-macro-nested"
+version = "0.1.6"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
+
+[[package]]
+name = "proc-macro2"
+version = "1.0.24"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
+dependencies = [
+ "unicode-xid",
+]
+
+[[package]]
+name = "quote"
+version = "1.0.7"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
+dependencies = [
+ "proc-macro2",
+]
+
+[[package]]
+name = "radix64"
+version = "0.6.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
+dependencies = [
+ "arrayref",
+ "cfg-if",
+]
+
+[[package]]
+name = "rand"
+version = "0.7.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03"
+dependencies = [
+ "getrandom",
+ "libc",
+ "rand_chacha",
+ "rand_core",
+ "rand_hc",
+]
+
+[[package]]
+name = "rand_chacha"
+version = "0.2.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402"
+dependencies = [
+ "ppv-lite86",
+ "rand_core",
+]
+
+[[package]]
+name = "rand_core"
+version = "0.5.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19"
+dependencies = [
+ "getrandom",
+]
+
+[[package]]
+name = "rand_hc"
+version = "0.2.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c"
+dependencies = [
+ "rand_core",
+]
+
+[[package]]
+name = "redox_syscall"
+version = "0.1.57"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
+
+[[package]]
+name = "regex"
+version = "1.4.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8963b85b8ce3074fecffde43b4b0dded83ce2f367dc8d363afc56679f3ee820b"
+dependencies = [
+ "aho-corasick",
+ "memchr",
+ "regex-syntax",
+ "thread_local",
+]
+
+[[package]]
+name = "regex-syntax"
+version = "0.6.20"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8cab7a364d15cde1e505267766a2d3c4e22a843e1a601f0fa7564c0f82ced11c"
+
+[[package]]
+name = "ring"
+version = "0.16.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
+dependencies = [
+ "cc",
+ "libc",
+ "once_cell",
+ "spin",
+ "untrusted",
+ "web-sys",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "rustls"
+version = "0.17.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
+dependencies = [
+ "base64 0.11.0",
+ "log",
+ "ring",
+ "sct",
+ "webpki",
+]
+
+[[package]]
+name = "rustls-native-certs"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
+dependencies = [
+ "openssl-probe",
+ "rustls",
+ "schannel",
+ "security-framework",
+]
+
+[[package]]
+name = "ryu"
+version = "1.0.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
+
+[[package]]
+name = "schannel"
+version = "0.1.19"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
+dependencies = [
+ "lazy_static",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "sct"
+version = "0.6.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "seahash"
+version = "4.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
+
+[[package]]
+name = "security-framework"
+version = "0.4.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
+dependencies = [
+ "bitflags",
+ "core-foundation",
+ "core-foundation-sys",
+ "libc",
+ "security-framework-sys",
+]
+
+[[package]]
+name = "security-framework-sys"
+version = "0.4.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
+dependencies = [
+ "core-foundation-sys",
+ "libc",
+]
+
+[[package]]
+name = "serde"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
+dependencies = [
+ "serde_derive",
+]
+
+[[package]]
+name = "serde_derive"
+version = "1.0.117"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "serde_json"
+version = "1.0.59"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
+dependencies = [
+ "itoa",
+ "ryu",
+ "serde",
+]
+
+[[package]]
+name = "serde_urlencoded"
+version = "0.6.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "9ec5d77e2d4c73717816afac02670d5c4f534ea95ed430442cad02e7a6e32c97"
+dependencies = [
+ "dtoa",
+ "itoa",
+ "serde",
+ "url",
+]
+
+[[package]]
+name = "signal-hook-registry"
+version = "1.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a3e12110bc539e657a646068aaf5eb5b63af9d0c1f7b29c97113fad80e15f035"
+dependencies = [
+ "arc-swap",
+ "libc",
+]
+
+[[package]]
+name = "slab"
+version = "0.4.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
+
+[[package]]
+name = "socket2"
+version = "0.3.15"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
+dependencies = [
+ "cfg-if",
+ "libc",
+ "redox_syscall",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "spin"
+version = "0.5.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
+
+[[package]]
+name = "syn"
+version = "1.0.48"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cc371affeffc477f42a221a1e4297aedcea33d47d19b61455588bd9d8f6b19ac"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "unicode-xid",
+]
+
+[[package]]
+name = "termcolor"
+version = "1.1.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f"
+dependencies = [
+ "winapi-util",
+]
+
+[[package]]
+name = "test_integration"
+version = "0.1.0"
+dependencies = [
+ "anyhow",
+ "async-google-apis-common",
+ "env_logger",
+ "futures",
+ "hyper",
+ "hyper-rustls",
+ "mockito",
+ "serde",
+ "tokio",
+]
+
+[[package]]
+name = "thread_local"
+version = "1.0.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "time"
+version = "0.1.44"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
+dependencies = [
+ "libc",
+ "wasi 0.10.0+wasi-snapshot-preview1",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "tinyvec"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
+
+[[package]]
+name = "tokio"
+version = "0.2.22"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
+dependencies = [
+ "bytes",
+ "fnv",
+ "futures-core",
+ "iovec",
+ "lazy_static",
+ "libc",
+ "memchr",
+ "mio",
+ "mio-named-pipes",
+ "mio-uds",
+ "num_cpus",
+ "pin-project-lite",
+ "signal-hook-registry",
+ "slab",
+ "tokio-macros",
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "tokio-macros"
+version = "0.2.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+]
+
+[[package]]
+name = "tokio-rustls"
+version = "0.13.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
+dependencies = [
+ "futures-core",
+ "rustls",
+ "tokio",
+ "webpki",
+]
+
+[[package]]
+name = "tokio-util"
+version = "0.3.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
+dependencies = [
+ "bytes",
+ "futures-core",
+ "futures-sink",
+ "log",
+ "pin-project-lite",
+ "tokio",
+]
+
+[[package]]
+name = "tower-service"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
+
+[[package]]
+name = "tracing"
+version = "0.1.21"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
+dependencies = [
+ "cfg-if",
+ "log",
+ "pin-project-lite",
+ "tracing-core",
+]
+
+[[package]]
+name = "tracing-core"
+version = "0.1.17"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
+dependencies = [
+ "lazy_static",
+]
+
+[[package]]
+name = "tracing-futures"
+version = "0.2.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c"
+dependencies = [
+ "pin-project 0.4.27",
+ "tracing",
+]
+
+[[package]]
+name = "try-lock"
+version = "0.2.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
+
+[[package]]
+name = "unicode-bidi"
+version = "0.3.4"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
+dependencies = [
+ "matches",
+]
+
+[[package]]
+name = "unicode-normalization"
+version = "0.1.13"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
+dependencies = [
+ "tinyvec",
+]
+
+[[package]]
+name = "unicode-xid"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
+
+[[package]]
+name = "untrusted"
+version = "0.7.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
+
+[[package]]
+name = "url"
+version = "2.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
+dependencies = [
+ "idna",
+ "matches",
+ "percent-encoding",
+]
+
+[[package]]
+name = "version_check"
+version = "0.9.2"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "b5a972e5669d67ba988ce3dc826706fb0a8b01471c088cb0b6110b805cc36aed"
+
+[[package]]
+name = "want"
+version = "0.3.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
+dependencies = [
+ "log",
+ "try-lock",
+]
+
+[[package]]
+name = "wasi"
+version = "0.9.0+wasi-snapshot-preview1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519"
+
+[[package]]
+name = "wasi"
+version = "0.10.0+wasi-snapshot-preview1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
+
+[[package]]
+name = "wasm-bindgen"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
+dependencies = [
+ "cfg-if",
+ "wasm-bindgen-macro",
+]
+
+[[package]]
+name = "wasm-bindgen-backend"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
+dependencies = [
+ "bumpalo",
+ "lazy_static",
+ "log",
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-macro"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
+dependencies = [
+ "quote",
+ "wasm-bindgen-macro-support",
+]
+
+[[package]]
+name = "wasm-bindgen-macro-support"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
+dependencies = [
+ "proc-macro2",
+ "quote",
+ "syn",
+ "wasm-bindgen-backend",
+ "wasm-bindgen-shared",
+]
+
+[[package]]
+name = "wasm-bindgen-shared"
+version = "0.2.68"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
+
+[[package]]
+name = "web-sys"
+version = "0.3.45"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
+dependencies = [
+ "js-sys",
+ "wasm-bindgen",
+]
+
+[[package]]
+name = "webpki"
+version = "0.21.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
+dependencies = [
+ "ring",
+ "untrusted",
+]
+
+[[package]]
+name = "winapi"
+version = "0.2.8"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
+
+[[package]]
+name = "winapi"
+version = "0.3.9"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
+dependencies = [
+ "winapi-i686-pc-windows-gnu",
+ "winapi-x86_64-pc-windows-gnu",
+]
+
+[[package]]
+name = "winapi-build"
+version = "0.1.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
+
+[[package]]
+name = "winapi-i686-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
+
+[[package]]
+name = "winapi-util"
+version = "0.1.5"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
+dependencies = [
+ "winapi 0.3.9",
+]
+
+[[package]]
+name = "winapi-x86_64-pc-windows-gnu"
+version = "0.4.0"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
+
+[[package]]
+name = "ws2_32-sys"
+version = "0.2.1"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
+dependencies = [
+ "winapi 0.2.8",
+ "winapi-build",
+]
+
+[[package]]
+name = "yup-oauth2"
+version = "4.1.3"
+source = "registry+https://github.com/rust-lang/crates.io-index"
+checksum = "92ed435d48d4c834ee654443dd3330399f9656506d7477ec645df58e406a25db"
+dependencies = [
+ "base64 0.12.3",
+ "chrono",
+ "futures",
+ "http",
+ "hyper",
+ "hyper-rustls",
+ "log",
+ "percent-encoding",
+ "rustls",
+ "seahash",
+ "serde",
+ "serde_json",
+ "tokio",
+ "url",
+]
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/test_integration/Cargo.toml	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,19 @@
+[package]
+name = "test_integration"
+version = "0.1.0"
+authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
+edition = "2018"
+
+# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
+
+[dependencies]
+async-google-apis-common = "~0.1"
+
+anyhow = "~1.0"
+serde = "~1.0"
+env_logger = "~0.8"
+futures = "~0.3"
+hyper = "~0.13"
+hyper-rustls = "~0.20"
+mockito = "~0.27"
+tokio = { version = "~0.2", features = ["full"] }
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/test_integration/client_secret.json	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,14 @@
+{
+  "installed": {
+    "client_id": "902216714886-8obvm3pn22b0jktllc0f0rufcbuvtrhg.apps.borgac.net",
+    "project_id": "integration-test-243420",
+    "auth_uri": "https://accounts.borgac.net/oauth2/",
+    "token_uri": "https://accounts.borgac.net/token",
+    "auth_provider_x509_cert_url": "https://accounts.borgac.net/oauth2/v1/certs",
+    "client_secret": "somesecret",
+    "redirect_uris": [
+      "urn:ietf:wg:oauth:2.0:oob",
+      "http://localhost"
+    ]
+  }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/test_integration/src/integration_test_v1_types.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,639 @@
+#![allow(unused_variables, unused_mut, dead_code)]
+//! This file was generated by async-google-apis. (https://github.com/dermesser/async-google-apis)
+//!
+//! (c) 2020 Lewin Bormann <lbo@spheniscida.de>
+//!
+//! ## Getting started
+//!
+//! **Tip**: Take a look at those types ending in `...Service`. These represent API resources
+//! and contain methods to interact with an API. The remaining types are used by those methods
+//! and can be explored starting from a method you want to use.
+//!
+//! I'd be happy if you let me know about your use case of this code.
+//!
+//! THIS FILE HAS BEEN GENERATED -- SAVE ANY MODIFICATIONS BEFORE REPLACING.
+
+use async_google_apis_common::*;
+
+/// Scopes of this API. Convertible to their string representation with `AsRef`.
+#[derive(Debug, Clone, Copy)]
+pub enum IntegrationTestScopes {
+    /// See, edit, create, and delete all of your Google integrationtest files
+    ///
+    /// URL: https://example.borgac.net/auth/integrationtest
+    Integrationtest,
+    /// View and manage metadata of files in your Google integrationtest
+    ///
+    /// URL: https://example.borgac.net/auth/integrationtest.metadata
+    IntegrationtestMetadata,
+}
+
+impl std::convert::AsRef<str> for IntegrationTestScopes {
+    fn as_ref(&self) -> &'static str {
+        match self {
+            IntegrationTestScopes::Integrationtest => {
+                "https://example.borgac.net/auth/integrationtest"
+            }
+            IntegrationTestScopes::IntegrationtestMetadata => {
+                "https://example.borgac.net/auth/integrationtest.metadata"
+            }
+        }
+    }
+}
+
+/// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileCapabilities {
+    /// Whether the current user can add children to this folder. This is always false when the item is not a folder.
+    #[serde(rename = "canAddChildren")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_add_children: Option<bool>,
+    /// Whether the current user can comment on this file.
+    #[serde(rename = "canComment")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub can_comment: Option<bool>,
+}
+
+/// The metadata for a file.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct File {
+    /// A collection of arbitrary key-value pairs which are private to the requesting app. Entries with null values are cleared in update and copy requests.
+    #[serde(rename = "appProperties")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub app_properties: Option<HashMap<String, String>>,
+    /// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
+    #[serde(rename = "capabilities")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub capabilities: Option<FileCapabilities>,
+}
+
+/// A list of files.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FileList {
+    /// The list of files. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
+    #[serde(rename = "files")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub files: Option<Vec<File>>,
+    /// Whether the search process was incomplete. If true, then some search results may be missing, since all documents were not searched. This may occur when searching multiple drives with the "allDrives" corpora, but all corpora could not be searched. When this happens, it is suggested that clients narrow their query by choosing a different corpus such as "user" or "drive".
+    #[serde(rename = "incompleteSearch")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub incomplete_search: Option<bool>,
+    /// Identifies what kind of resource this is. Value: the fixed string "drive#fileList".
+    #[serde(rename = "kind")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub kind: Option<String>,
+    /// The page token for the next page of files. This will be absent if the end of the files list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
+    #[serde(rename = "nextPageToken")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub next_page_token: Option<String>,
+}
+
+///
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct IntegrationTestParams {
+    /// Data format for the response.
+    #[serde(rename = "alt")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub alt: Option<String>,
+    /// Selector specifying which fields to include in a partial response.
+    #[serde(rename = "fields")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub fields: Option<String>,
+    /// API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
+    #[serde(rename = "key")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub key: Option<String>,
+    /// OAuth 2.0 token for the current user.
+    #[serde(rename = "oauth_token")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub oauth_token: Option<String>,
+    /// Returns response with indentations and line breaks.
+    #[serde(rename = "prettyPrint")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub pretty_print: Option<bool>,
+    /// An opaque string that represents a user for quota purposes. Must not exceed 40 characters.
+    #[serde(rename = "quotaUser")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub quota_user: Option<String>,
+    /// Deprecated. Please use quotaUser instead.
+    #[serde(rename = "userIp")]
+    #[serde(skip_serializing_if = "Option::is_none")]
+    pub user_ip: Option<String>,
+}
+
+/// Parameters for the `files.copy` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesCopyParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub integration_test_params: Option<IntegrationTestParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+}
+
+impl std::fmt::Display for FilesCopyParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.create` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesCreateParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub integration_test_params: Option<IntegrationTestParams>,
+    /// Whether to use the uploaded content as indexable text.
+    #[serde(rename = "useContentAsIndexableText")]
+    pub use_content_as_indexable_text: Option<bool>,
+}
+
+impl std::fmt::Display for FilesCreateParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.use_content_as_indexable_text {
+            write!(
+                f,
+                "&useContentAsIndexableText={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.delete` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesDeleteParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub integration_test_params: Option<IntegrationTestParams>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// Whether the requesting application supports both My Drives and shared drives.
+    #[serde(rename = "supportsAllDrives")]
+    pub supports_all_drives: Option<bool>,
+    /// Deprecated use supportsAllDrives instead.
+    #[serde(rename = "supportsTeamDrives")]
+    pub supports_team_drives: Option<bool>,
+}
+
+impl std::fmt::Display for FilesDeleteParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_all_drives {
+            write!(
+                f,
+                "&supportsAllDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.supports_team_drives {
+            write!(
+                f,
+                "&supportsTeamDrives={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.emptyTrash` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesEmptyTrashParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub integration_test_params: Option<IntegrationTestParams>,
+    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
+    #[serde(rename = "enforceSingleParent")]
+    pub enforce_single_parent: Option<bool>,
+}
+
+impl std::fmt::Display for FilesEmptyTrashParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.enforce_single_parent {
+            write!(
+                f,
+                "&enforceSingleParent={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// Parameters for the `files.export` method.
+#[derive(Serialize, Deserialize, Debug, Clone, Default)]
+pub struct FilesExportParams {
+    /// General attributes applying to any API call
+    #[serde(flatten)]
+    pub integration_test_params: Option<IntegrationTestParams>,
+    /// The ID of the file.
+    #[serde(rename = "fileId")]
+    pub file_id: String,
+    /// The MIME type of the format requested for this export.
+    #[serde(rename = "mimeType")]
+    pub mime_type: String,
+}
+
+impl std::fmt::Display for FilesExportParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        write!(
+            f,
+            "&mimeType={}",
+            percent_encode(format!("{}", self.mime_type).as_bytes(), NON_ALPHANUMERIC).to_string()
+        )?;
+        Ok(())
+    }
+}
+
+impl std::fmt::Display for IntegrationTestParams {
+    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
+        if let Some(ref v) = self.alt {
+            write!(
+                f,
+                "&alt={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.fields {
+            write!(
+                f,
+                "&fields={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.key {
+            write!(
+                f,
+                "&key={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.oauth_token {
+            write!(
+                f,
+                "&oauth_token={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.pretty_print {
+            write!(
+                f,
+                "&prettyPrint={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.quota_user {
+            write!(
+                f,
+                "&quotaUser={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        if let Some(ref v) = self.user_ip {
+            write!(
+                f,
+                "&userIp={}",
+                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
+            )?;
+        }
+        Ok(())
+    }
+}
+
+/// The Integration_test Files service represents the Files resource.
+pub struct FilesService {
+    client: TlsClient,
+    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
+    scopes: Vec<String>,
+
+    base_url: String,
+    root_url: String,
+}
+
+impl FilesService {
+    /// Create a new FilesService object. The easiest way to call this is wrapping the Authenticator
+    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
+    /// This way, one authenticator can be shared among several services.
+    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
+        client: TlsClient,
+        auth: A,
+    ) -> FilesService {
+        FilesService {
+            client: client,
+            authenticator: Box::new(auth),
+            scopes: vec![],
+            base_url: "https://example.borgac.net/integrationAPI".into(),
+            root_url: "https://example.borgac.net/".into(),
+        }
+    }
+
+    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn base_url(&self) -> String {
+        if self.base_url.ends_with("/") {
+            return self.base_url.clone();
+        }
+        return self.base_url.clone() + "/";
+    }
+    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
+    fn root_url(&self) -> String {
+        if self.root_url.ends_with("/") {
+            return self.root_url.clone();
+        }
+        return self.root_url.clone();
+    }
+    /// Returns appropriate URLs for relative and absolute paths.
+    fn format_path(&self, path: &str) -> String {
+        if path.starts_with("/") {
+            return self.root_url().trim_end_matches("/").to_string() + path;
+        } else {
+            return self.base_url() + path;
+        }
+    }
+
+    #[cfg(test)]
+    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
+    /// whereas `root` is the URL relative to which absolute paths are interpreted.
+    pub fn set_urls(&mut self, base: String, root: String) {
+        self.base_url = base;
+        self.root_url = root;
+    }
+
+    /// Explicitly select which scopes should be requested for authorization. Otherwise,
+    /// a possibly too large scope will be requested.
+    ///
+    /// It is most convenient to supply a vec or slice of Integration_testScopes enum values.
+    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
+        self.scopes = scopes
+            .as_ref()
+            .into_iter()
+            .map(|s| s.as_ref().to_string())
+            .collect();
+    }
+
+    /// Creates a copy of a file and applies any requested updates with patch semantics. Folders cannot be copied.
+    pub async fn copy(&mut self, params: &FilesCopyParams, req: &File) -> Result<File> {
+        let rel_path = format!(
+            "files/{fileId}/copy",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+        println!("{}", path);
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive.photos.readonly".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Creates a new file.
+    pub async fn create(&mut self, params: &FilesCreateParams, req: &File) -> Result<File> {
+        let rel_path = format!("files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
+    }
+
+    /// Creates a new file.
+    ///
+    /// This method is a variant of `create()`, taking data for upload. It performs a multipart upload.
+    pub async fn create_upload(
+        &mut self,
+        params: &FilesCreateParams,
+        req: &File,
+        data: hyper::body::Bytes,
+    ) -> Result<File> {
+        let rel_path = format!("/upload/drive/v3/files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=multipart{params}", params = params);
+
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+
+        do_upload_multipart(&self.client, &full_uri, &headers, "POST", opt_request, data).await
+    }
+
+    /// Creates a new file.
+    ///
+    /// This method is a variant of `create()`, taking data for upload.
+    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
+    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
+    /// you choose for the upload.
+    pub async fn create_resumable_upload<'client>(
+        &'client mut self,
+        params: &FilesCreateParams,
+        req: &File,
+    ) -> Result<ResumableUpload<'client, File>> {
+        let rel_path = format!("/resumable/upload/drive/v3/files",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?uploadType=resumable{params}", params = params);
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        let opt_request = Some(req);
+        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
+            do_request_with_headers(&self.client, &full_uri, &headers, "POST", opt_request).await?;
+        if let Some(dest) = headers.get(hyper::header::LOCATION) {
+            use std::convert::TryFrom;
+            Ok(ResumableUpload::new(
+                hyper::Uri::try_from(dest.to_str()?)?,
+                &self.client,
+                5 * 1024 * 1024,
+            ))
+        } else {
+            Err(Error::from(ApiError::RedirectError(format!(
+                "Resumable upload response didn't contain Location: {:?}",
+                headers
+            )))
+            .context(format!("{:?}", headers)))?
+        }
+    }
+
+    /// Permanently deletes a file owned by the user without moving it to the trash. If the file belongs to a shared drive the user must be an organizer on the parent. If the target is a folder, all descendants owned by the user are also deleted.
+    pub async fn delete(&mut self, params: &FilesDeleteParams) -> Result<()> {
+        let rel_path = format!(
+            "files/{fileId}",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Permanently deletes all of the user's trashed files.
+    pub async fn empty_trash(&mut self, params: &FilesEmptyTrashParams) -> Result<()> {
+        let rel_path = format!("files/trash",);
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+
+        let opt_request: Option<&EmptyRequest> = None;
+        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
+    }
+
+    /// Exports a Google Doc to the requested MIME type and returns the exported content. Please note that the exported content is limited to 10MB.
+    ///
+    /// This method potentially downloads data. See documentation of `Download`.
+    pub async fn export<'a>(
+        &'a mut self,
+        params: &FilesExportParams,
+    ) -> Result<Download<'a, EmptyRequest, ()>> {
+        let rel_path = format!(
+            "files/{fileId}/export",
+            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
+        );
+        let path = self.format_path(rel_path.as_str());
+
+        let mut headers = vec![];
+        let tok;
+        if self.scopes.is_empty() {
+            let scopes = &["https://www.googleapis.com/auth/drive.readonly".to_string()];
+            tok = self.authenticator.token(scopes).await?;
+        } else {
+            tok = self.authenticator.token(&self.scopes).await?;
+        }
+        headers.push((
+            hyper::header::AUTHORIZATION,
+            format!("Bearer {token}", token = tok.as_str()),
+        ));
+
+        let mut url_params = format!("?{params}", params = params);
+        if let Some(ref api_params) = &params.integration_test_params {
+            url_params.push_str(&format!("{}", api_params));
+        }
+
+        let full_uri = path + &url_params;
+        let opt_request: Option<&EmptyRequest> = None;
+
+        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
+    }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/test_integration/src/lib.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,134 @@
+mod integration_test_v1_types;
+
+use async_google_apis_common as agac;
+use integration_test_v1_types as inttest;
+
+#[cfg(test)]
+mod tests {
+    use super::*;
+    use mockito;
+    use tokio;
+
+    const CLIENT_ID: &str = "myclientid.apps._dev.borgac.net";
+    const CLIENT_SECRET: &str = "mysecret";
+    const PROJECT_ID: &str = "integration-test-243420";
+    const AUTH_PATH: &str = "/oauth2/";
+    const TOKEN_PATH: &str = "/token/";
+
+    const API_LOCATION: &str = "/integrationAPI/";
+
+    struct AutoDelegate {}
+
+    impl agac::yup_oauth2::authenticator_delegate::InstalledFlowDelegate for AutoDelegate {
+        fn present_user_url<'a>(
+            &'a self,
+            url: &'a str,
+            _need_code: bool,
+        ) -> std::pin::Pin<Box<dyn std::future::Future<Output = Result<String, String>> + Send + 'a>>
+        {
+            println!("user directed to: {}", url);
+            return Box::pin(futures::future::ok("returned_code".into()));
+        }
+    }
+
+    fn url_for_path(path: &str) -> String {
+        if path.starts_with("/") {
+            return mockito::server_url() + path;
+        }
+        return mockito::server_url() + "/" + path;
+    }
+
+    async fn read_client_secret() -> agac::yup_oauth2::ApplicationSecret {
+        let mut appsec = agac::yup_oauth2::read_application_secret("client_secret.json")
+            .await
+            .unwrap();
+        appsec.client_id = CLIENT_ID.into();
+        appsec.client_secret = CLIENT_SECRET.into();
+        appsec.project_id = Some(PROJECT_ID.into());
+        appsec.auth_uri = url_for_path(AUTH_PATH);
+        appsec.token_uri = url_for_path(TOKEN_PATH);
+        appsec.auth_provider_x509_cert_url = None;
+        appsec
+    }
+
+    async fn authenticator(
+        cl: agac::TlsClient,
+    ) -> agac::yup_oauth2::authenticator::Authenticator<agac::TlsConnr> {
+        let appsec = read_client_secret().await;
+        let auth = agac::yup_oauth2::InstalledFlowAuthenticator::builder(
+            appsec,
+            agac::yup_oauth2::InstalledFlowReturnMethod::Interactive,
+        )
+        .flow_delegate(Box::new(AutoDelegate {}))
+        .hyper_client(cl)
+        .build()
+        .await
+        .unwrap();
+        auth
+    }
+
+    fn oauth_mock() -> mockito::Mock {
+        mockito::mock("POST", "/token/")
+                .with_status(200)
+                .match_header("content-type", "application/x-www-form-urlencoded")
+                .match_body("code=returned_code&client_id=myclientid.apps._dev.borgac.net&client_secret=mysecret&redirect_uri=urn%3Aietf%3Awg%3Aoauth%3A2.0%3Aoob&grant_type=authorization_code")
+                .with_body(r#" { "access_token": "returned_access_token!", "refresh_token": "returned_refresh_token!", "token_type": "bearer" } "#)
+                .create()
+    }
+
+    fn hyper_client() -> agac::TlsClient {
+        hyper::Client::builder().build(hyper_rustls::HttpsConnector::new())
+    }
+
+    fn files_service(
+        cl: agac::TlsClient,
+        auth: agac::yup_oauth2::authenticator::Authenticator<agac::TlsConnr>,
+    ) -> inttest::FilesService {
+        let mut fs = inttest::FilesService::new(cl, Box::new(auth));
+        fs.set_urls(mockito::server_url() + API_LOCATION, mockito::server_url());
+        fs
+    }
+
+    #[tokio::test]
+    async fn it_works() {
+        mockito::start();
+        println!("Mockito running at {}", mockito::server_url());
+    }
+
+    #[tokio::test]
+    async fn test_oauth_provider() {
+        mockito::start();
+        let cl = hyper_client();
+        let auth = authenticator(cl.clone()).await;
+
+        let mock = oauth_mock();
+        let tok = auth
+            .token(&["https://oauth.borgac.net/test"])
+            .await
+            .unwrap();
+        println!("Obtained token: {:?}", tok);
+        mock.assert();
+    }
+
+    #[tokio::test]
+    async fn test_basic_files_api() {
+        mockito::start();
+        let cl = hyper_client();
+        let auth = authenticator(cl.clone()).await;
+        let mut svc = files_service(cl, auth);
+
+        // Mandatory for token fetching.
+        let _om = oauth_mock();
+
+        let mock = mockito::mock("PUT", "/integrationAPI/files/file_id_to_copy/copy")
+            .with_status(200)
+            .create();
+
+        let mut fsp = inttest::FilesCopyParams::default();
+        fsp.file_id = "file_id_to_copy".into();
+        let f = inttest::File::default();
+        let result = svc.copy(&fsp, &f).await.unwrap();
+
+        mock.assert();
+    }
+}
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/res/test_integration/src/main.rs	Wed Nov 25 12:45:45 2020 +0100
@@ -0,0 +1,3 @@
+fn main() {
+    println!("Hello, world!");
+}
--- a/test_integration/Cargo.lock	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1419 +0,0 @@
-# This file is automatically @generated by Cargo.
-# It is not intended for manual editing.
-[[package]]
-name = "aho-corasick"
-version = "0.7.14"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b476ce7103678b0c6d3d395dbbae31d48ff910bd28be979ba5d48c6351131d0d"
-dependencies = [
- "memchr",
-]
-
-[[package]]
-name = "anyhow"
-version = "1.0.33"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a1fd36ffbb1fb7c834eac128ea8d0e310c5aeb635548f9d58861e1308d46e71c"
-
-[[package]]
-name = "arc-swap"
-version = "0.4.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d25d88fd6b8041580a654f9d0c581a047baee2b3efee13275f2fc392fc75034"
-
-[[package]]
-name = "arrayref"
-version = "0.3.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a4c527152e37cf757a3f78aae5a06fbeefdb07ccc535c980a3208ee3060dd544"
-
-[[package]]
-name = "assert-json-diff"
-version = "1.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4259cbe96513d2f1073027a259fc2ca917feb3026a5a8d984e3628e490255cc0"
-dependencies = [
- "extend",
- "serde",
- "serde_json",
-]
-
-[[package]]
-name = "async-google-apis-common"
-version = "0.1.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f50b43c3fc70e03c36aac2dd256c97bdc07f0875d7fc28a0d76e1ed4c18999d5"
-dependencies = [
- "anyhow",
- "chrono",
- "futures",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "radix64",
- "serde",
- "serde_json",
- "tokio",
- "yup-oauth2",
-]
-
-[[package]]
-name = "atty"
-version = "0.2.14"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d9b39be18770d11421cdb1b9947a45dd3f37e93092cbf377614828a319d5fee8"
-dependencies = [
- "hermit-abi",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "autocfg"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cdb031dd78e28731d87d56cc8ffef4a8f36ca26c38fe2de700543e627f8a464a"
-
-[[package]]
-name = "base64"
-version = "0.11.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b41b7ea54a0c9d92199de89e20e58d49f02f8e699814ef3fdf266f6f748d15c7"
-
-[[package]]
-name = "base64"
-version = "0.12.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3441f0f7b02788e948e47f457ca01f1d7e6d92c693bc132c22b087d3141c03ff"
-
-[[package]]
-name = "bitflags"
-version = "1.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
-
-[[package]]
-name = "bumpalo"
-version = "3.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e8c087f005730276d1096a652e92a8bacee2e2472bcc9715a74d2bec38b5820"
-
-[[package]]
-name = "bytes"
-version = "0.5.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e4cec68f03f32e44924783795810fa50a7035d8c8ebe78580ad7e6c703fba38"
-
-[[package]]
-name = "cc"
-version = "1.0.61"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ed67cbde08356238e75fc4656be4749481eeffb09e19f320a25237d5221c985d"
-
-[[package]]
-name = "cfg-if"
-version = "0.1.10"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4785bdd1c96b2a846b2bd7cc02e86b6b3dbf14e7e53446c4f54c92a361040822"
-
-[[package]]
-name = "chrono"
-version = "0.4.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "670ad68c9088c2a963aaa298cb369688cf3f9465ce5e2d4ca10e6e0098a1ce73"
-dependencies = [
- "libc",
- "num-integer",
- "num-traits",
- "serde",
- "time",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "colored"
-version = "1.9.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f4ffc801dacf156c5854b9df4f425a626539c3a6ef7893cc0c5084a23f0b6c59"
-dependencies = [
- "atty",
- "lazy_static",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "core-foundation"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "57d24c7a13c43e870e37c1556b74555437870a04514f7685f5b354e090567171"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "core-foundation-sys"
-version = "0.7.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b3a71ab494c0b5b860bdc8407ae08978052417070c2ced38573a9157ad75b8ac"
-
-[[package]]
-name = "ct-logs"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d3686f5fa27dbc1d76c751300376e167c5a43387f44bb451fd1c24776e49113"
-dependencies = [
- "sct",
-]
-
-[[package]]
-name = "difference"
-version = "2.0.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "524cbf6897b527295dff137cec09ecf3a05f4fddffd7dfcd1585403449e74198"
-
-[[package]]
-name = "dtoa"
-version = "0.4.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "134951f4028bdadb9b84baf4232681efbf277da25144b9b0ad65df75946c422b"
-
-[[package]]
-name = "env_logger"
-version = "0.8.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "54532e3223c5af90a6a757c90b5c5521564b07e5e7a958681bcd2afad421cdcd"
-dependencies = [
- "atty",
- "humantime",
- "log",
- "regex",
- "termcolor",
-]
-
-[[package]]
-name = "extend"
-version = "0.1.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f47da3a72ec598d9c8937a7ebca8962a5c7a1f28444e38c2b33c771ba3f55f05"
-dependencies = [
- "proc-macro-error",
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "fnv"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3f9eec918d3f24069decb9af1554cad7c880e2da24a9afd88aca000531ab82c1"
-
-[[package]]
-name = "fuchsia-zircon"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2e9763c69ebaae630ba35f74888db465e49e259ba1bc0eda7d06f4a067615d82"
-dependencies = [
- "bitflags",
- "fuchsia-zircon-sys",
-]
-
-[[package]]
-name = "fuchsia-zircon-sys"
-version = "0.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3dcaa9ae7725d12cdb85b3ad99a434db70b468c09ded17e012d86b5c1010f7a7"
-
-[[package]]
-name = "futures"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "95314d38584ffbfda215621d723e0a3906f032e03ae5551e650058dac83d4797"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-executor",
- "futures-io",
- "futures-sink",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-channel"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0448174b01148032eed37ac4aed28963aaaa8cfa93569a08e5b479bbc6c2c151"
-dependencies = [
- "futures-core",
- "futures-sink",
-]
-
-[[package]]
-name = "futures-core"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "18eaa56102984bed2c88ea39026cff3ce3b4c7f508ca970cedf2450ea10d4e46"
-
-[[package]]
-name = "futures-executor"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f5f8e0c9258abaea85e78ebdda17ef9666d390e987f006be6080dfe354b708cb"
-dependencies = [
- "futures-core",
- "futures-task",
- "futures-util",
-]
-
-[[package]]
-name = "futures-io"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e1798854a4727ff944a7b12aa999f58ce7aa81db80d2dfaaf2ba06f065ddd2b"
-
-[[package]]
-name = "futures-macro"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e36fccf3fc58563b4a14d265027c627c3b665d7fed489427e88e7cc929559efe"
-dependencies = [
- "proc-macro-hack",
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "futures-sink"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0e3ca3f17d6e8804ae5d3df7a7d35b2b3a6fe89dac84b31872720fc3060a0b11"
-
-[[package]]
-name = "futures-task"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "96d502af37186c4fef99453df03e374683f8a1eec9dcc1e66b3b82dc8278ce3c"
-dependencies = [
- "once_cell",
-]
-
-[[package]]
-name = "futures-util"
-version = "0.3.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "abcb44342f62e6f3e8ac427b8aa815f724fd705dfad060b18ac7866c15bb8e34"
-dependencies = [
- "futures-channel",
- "futures-core",
- "futures-io",
- "futures-macro",
- "futures-sink",
- "futures-task",
- "memchr",
- "pin-project 1.0.1",
- "pin-utils",
- "proc-macro-hack",
- "proc-macro-nested",
- "slab",
-]
-
-[[package]]
-name = "getrandom"
-version = "0.1.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "fc587bc0ec293155d5bfa6b9891ec18a1e330c234f896ea47fbada4cadbe47e6"
-dependencies = [
- "cfg-if",
- "libc",
- "wasi 0.9.0+wasi-snapshot-preview1",
-]
-
-[[package]]
-name = "h2"
-version = "0.2.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5e4728fd124914ad25e99e3d15a9361a879f6620f63cb56bbb08f95abb97a535"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "futures-sink",
- "futures-util",
- "http",
- "indexmap",
- "slab",
- "tokio",
- "tokio-util",
- "tracing",
- "tracing-futures",
-]
-
-[[package]]
-name = "hashbrown"
-version = "0.9.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d7afe4a420e3fe79967a00898cc1f4db7c8a49a9333a29f8a4bd76a253d5cd04"
-
-[[package]]
-name = "hermit-abi"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5aca5565f760fb5b220e499d72710ed156fdb74e631659e99377d9ebfbd13ae8"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "http"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "28d569972648b2c512421b5f2a405ad6ac9666547189d0c5477a3f200f3e02f9"
-dependencies = [
- "bytes",
- "fnv",
- "itoa",
-]
-
-[[package]]
-name = "http-body"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "13d5ff830006f7646652e057693569bfe0d51760c0085a071769d142a205111b"
-dependencies = [
- "bytes",
- "http",
-]
-
-[[package]]
-name = "httparse"
-version = "1.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cd179ae861f0c2e53da70d892f5f3029f9594be0c41dc5269cd371691b1dc2f9"
-
-[[package]]
-name = "httpdate"
-version = "0.3.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "494b4d60369511e7dea41cf646832512a94e542f68bb9c49e54518e0f468eb47"
-
-[[package]]
-name = "humantime"
-version = "2.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3c1ad908cc71012b7bea4d0c53ba96a8cba9962f048fa68d143376143d863b7a"
-
-[[package]]
-name = "hyper"
-version = "0.13.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2f3afcfae8af5ad0576a31e768415edb627824129e8e5a29b8bfccb2f234e835"
-dependencies = [
- "bytes",
- "futures-channel",
- "futures-core",
- "futures-util",
- "h2",
- "http",
- "http-body",
- "httparse",
- "httpdate",
- "itoa",
- "pin-project 0.4.27",
- "socket2",
- "tokio",
- "tower-service",
- "tracing",
- "want",
-]
-
-[[package]]
-name = "hyper-rustls"
-version = "0.20.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac965ea399ec3a25ac7d13b8affd4b8f39325cca00858ddf5eb29b79e6b14b08"
-dependencies = [
- "bytes",
- "ct-logs",
- "futures-util",
- "hyper",
- "log",
- "rustls",
- "rustls-native-certs",
- "tokio",
- "tokio-rustls",
- "webpki",
-]
-
-[[package]]
-name = "idna"
-version = "0.2.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "02e2673c30ee86b5b96a9cb52ad15718aa1f966f5ab9ad54a8b95d5ca33120a9"
-dependencies = [
- "matches",
- "unicode-bidi",
- "unicode-normalization",
-]
-
-[[package]]
-name = "indexmap"
-version = "1.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "55e2e4c765aa53a0424761bf9f41aa7a6ac1efa87238f59560640e27fca028f2"
-dependencies = [
- "autocfg",
- "hashbrown",
-]
-
-[[package]]
-name = "iovec"
-version = "0.1.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b2b3ea6ff95e175473f8ffe6a7eb7c00d054240321b84c57051175fe3c1e075e"
-dependencies = [
- "libc",
-]
-
-[[package]]
-name = "itoa"
-version = "0.4.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
-
-[[package]]
-name = "js-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ca059e81d9486668f12d455a4ea6daa600bd408134cd17e3d3fb5a32d1f016f8"
-dependencies = [
- "wasm-bindgen",
-]
-
-[[package]]
-name = "kernel32-sys"
-version = "0.2.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7507624b29483431c0ba2d82aece8ca6cdba9382bff4ddd0f7490560c056098d"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "lazy_static"
-version = "1.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
-
-[[package]]
-name = "libc"
-version = "0.2.80"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4d58d1b70b004888f764dfbf6a26a3b0342a1632d33968e4a179d8011c760614"
-
-[[package]]
-name = "log"
-version = "0.4.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4fabed175da42fed1fa0746b0ea71f412aa9d35e76e95e59b192c64b9dc2bf8b"
-dependencies = [
- "cfg-if",
-]
-
-[[package]]
-name = "matches"
-version = "0.1.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "7ffc5c5338469d4d3ea17d269fa8ea3512ad247247c30bd2df69e68309ed0a08"
-
-[[package]]
-name = "memchr"
-version = "2.3.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3728d817d99e5ac407411fa471ff9800a778d88a24685968b36824eaf4bee400"
-
-[[package]]
-name = "mio"
-version = "0.6.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "fce347092656428bc8eaf6201042cb551b8d67855af7374542a92a0fbfcac430"
-dependencies = [
- "cfg-if",
- "fuchsia-zircon",
- "fuchsia-zircon-sys",
- "iovec",
- "kernel32-sys",
- "libc",
- "log",
- "miow 0.2.1",
- "net2",
- "slab",
- "winapi 0.2.8",
-]
-
-[[package]]
-name = "mio-named-pipes"
-version = "0.1.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "0840c1c50fd55e521b247f949c241c9997709f23bd7f023b9762cd561e935656"
-dependencies = [
- "log",
- "mio",
- "miow 0.3.5",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "mio-uds"
-version = "0.6.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "afcb699eb26d4332647cc848492bbc15eafb26f08d0304550d5aa1f612e066f0"
-dependencies = [
- "iovec",
- "libc",
- "mio",
-]
-
-[[package]]
-name = "miow"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8c1f2f3b1cf331de6896aabf6e9d55dca90356cc9960cca7eaaf408a355ae919"
-dependencies = [
- "kernel32-sys",
- "net2",
- "winapi 0.2.8",
- "ws2_32-sys",
-]
-
-[[package]]
-name = "miow"
-version = "0.3.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "07b88fb9795d4d36d62a012dfbf49a8f5cf12751f36d31a9dbe66d528e58979e"
-dependencies = [
- "socket2",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "mockito"
-version = "0.27.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3a634720d366bcbce30fb05871a35da229cef101ad0b2ea4e46cf5abf031a273"
-dependencies = [
- "assert-json-diff",
- "colored",
- "difference",
- "httparse",
- "lazy_static",
- "log",
- "rand",
- "regex",
- "serde_json",
- "serde_urlencoded",
-]
-
-[[package]]
-name = "net2"
-version = "0.2.35"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "3ebc3ec692ed7c9a255596c67808dee269f64655d8baf7b4f0638e51ba1d6853"
-dependencies = [
- "cfg-if",
- "libc",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "num-integer"
-version = "0.1.43"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8d59457e662d541ba17869cf51cf177c0b5f0cbf476c66bdc90bf1edac4f875b"
-dependencies = [
- "autocfg",
- "num-traits",
-]
-
-[[package]]
-name = "num-traits"
-version = "0.2.12"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac267bcc07f48ee5f8935ab0d24f316fb722d7a1292e2913f0cc196b29ffd611"
-dependencies = [
- "autocfg",
-]
-
-[[package]]
-name = "num_cpus"
-version = "1.13.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "05499f3756671c15885fee9034446956fff3f243d6077b91e5767df161f766b3"
-dependencies = [
- "hermit-abi",
- "libc",
-]
-
-[[package]]
-name = "once_cell"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "260e51e7efe62b592207e9e13a68e43692a7a279171d6ba57abd208bf23645ad"
-
-[[package]]
-name = "openssl-probe"
-version = "0.1.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "77af24da69f9d9341038eba93a073b1fdaaa1b788221b00a69bce9e762cb32de"
-
-[[package]]
-name = "percent-encoding"
-version = "2.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d4fd5641d01c8f18a23da7b6fe29298ff4b55afcccdf78973b24cf3175fee32e"
-
-[[package]]
-name = "pin-project"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2ffbc8e94b38ea3d2d8ba92aea2983b503cd75d0888d75b86bb37970b5698e15"
-dependencies = [
- "pin-project-internal 0.4.27",
-]
-
-[[package]]
-name = "pin-project"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ee41d838744f60d959d7074e3afb6b35c7456d0f61cad38a24e35e6553f73841"
-dependencies = [
- "pin-project-internal 1.0.1",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "0.4.27"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "65ad2ae56b6abe3a1ee25f15ee605bacadb9a764edaba9c2bf4103800d4a1895"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-internal"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "81a4ffa594b66bff340084d4081df649a7dc049ac8d7fc458d8e628bfbbb2f86"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "pin-project-lite"
-version = "0.1.11"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c917123afa01924fc84bb20c4c03f004d9c38e5127e3c039bbf7f4b9c76a2f6b"
-
-[[package]]
-name = "pin-utils"
-version = "0.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8b870d8c151b6f2fb93e84a13146138f05d02ed11c7e7c54f8826aaaf7c9f184"
-
-[[package]]
-name = "ppv-lite86"
-version = "0.2.9"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c36fa947111f5c62a733b652544dd0016a43ce89619538a8ef92724a6f501a20"
-
-[[package]]
-name = "proc-macro-error"
-version = "1.0.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "da25490ff9892aab3fcf7c36f08cfb902dd3e71ca0f9f9517bea02a73a5ce38c"
-dependencies = [
- "proc-macro-error-attr",
- "proc-macro2",
- "quote",
- "syn",
- "version_check",
-]
-
-[[package]]
-name = "proc-macro-error-attr"
-version = "1.0.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a1be40180e52ecc98ad80b184934baf3d0d29f979574e439af5a55274b35f869"
-dependencies = [
- "proc-macro2",
- "quote",
- "version_check",
-]
-
-[[package]]
-name = "proc-macro-hack"
-version = "0.5.18"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "99c605b9a0adc77b7211c6b1f722dcb613d68d66859a44f3d485a6da332b0598"
-
-[[package]]
-name = "proc-macro-nested"
-version = "0.1.6"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "eba180dafb9038b050a4c280019bbedf9f2467b61e5d892dcad585bb57aadc5a"
-
-[[package]]
-name = "proc-macro2"
-version = "1.0.24"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1e0704ee1a7e00d7bb417d0770ea303c1bccbabf0ef1667dae92b5967f5f8a71"
-dependencies = [
- "unicode-xid",
-]
-
-[[package]]
-name = "quote"
-version = "1.0.7"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
-dependencies = [
- "proc-macro2",
-]
-
-[[package]]
-name = "radix64"
-version = "0.6.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "999718fa65c3be3a74f3f6dae5a98526ff436ea58a82a574f0de89eecd342bee"
-dependencies = [
- "arrayref",
- "cfg-if",
-]
-
-[[package]]
-name = "rand"
-version = "0.7.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6a6b1679d49b24bbfe0c803429aa1874472f50d9b363131f0e89fc356b544d03"
-dependencies = [
- "getrandom",
- "libc",
- "rand_chacha",
- "rand_core",
- "rand_hc",
-]
-
-[[package]]
-name = "rand_chacha"
-version = "0.2.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f4c8ed856279c9737206bf725bf36935d8666ead7aa69b52be55af369d193402"
-dependencies = [
- "ppv-lite86",
- "rand_core",
-]
-
-[[package]]
-name = "rand_core"
-version = "0.5.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "90bde5296fc891b0cef12a6d03ddccc162ce7b2aff54160af9338f8d40df6d19"
-dependencies = [
- "getrandom",
-]
-
-[[package]]
-name = "rand_hc"
-version = "0.2.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ca3129af7b92a17112d59ad498c6f81eaf463253766b90396d39ea7a39d6613c"
-dependencies = [
- "rand_core",
-]
-
-[[package]]
-name = "redox_syscall"
-version = "0.1.57"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "41cc0f7e4d5d4544e8861606a285bb08d3e70712ccc7d2b84d7c0ccfaf4b05ce"
-
-[[package]]
-name = "regex"
-version = "1.4.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8963b85b8ce3074fecffde43b4b0dded83ce2f367dc8d363afc56679f3ee820b"
-dependencies = [
- "aho-corasick",
- "memchr",
- "regex-syntax",
- "thread_local",
-]
-
-[[package]]
-name = "regex-syntax"
-version = "0.6.20"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8cab7a364d15cde1e505267766a2d3c4e22a843e1a601f0fa7564c0f82ced11c"
-
-[[package]]
-name = "ring"
-version = "0.16.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "952cd6b98c85bbc30efa1ba5783b8abf12fec8b3287ffa52605b9432313e34e4"
-dependencies = [
- "cc",
- "libc",
- "once_cell",
- "spin",
- "untrusted",
- "web-sys",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "rustls"
-version = "0.17.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c0d4a31f5d68413404705d6982529b0e11a9aacd4839d1d6222ee3b8cb4015e1"
-dependencies = [
- "base64 0.11.0",
- "log",
- "ring",
- "sct",
- "webpki",
-]
-
-[[package]]
-name = "rustls-native-certs"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a75ffeb84a6bd9d014713119542ce415db3a3e4748f0bfce1e1416cd224a23a5"
-dependencies = [
- "openssl-probe",
- "rustls",
- "schannel",
- "security-framework",
-]
-
-[[package]]
-name = "ryu"
-version = "1.0.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
-
-[[package]]
-name = "schannel"
-version = "0.1.19"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "8f05ba609c234e60bee0d547fe94a4c7e9da733d1c962cf6e59efa4cd9c8bc75"
-dependencies = [
- "lazy_static",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "sct"
-version = "0.6.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e3042af939fca8c3453b7af0f1c66e533a15a86169e39de2657310ade8f98d3c"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "seahash"
-version = "4.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "39ee459cae272d224928ca09a1df5406da984f263dc544f9f8bde92a8c3dc916"
-
-[[package]]
-name = "security-framework"
-version = "0.4.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "64808902d7d99f78eaddd2b4e2509713babc3dc3c85ad6f4c447680f3c01e535"
-dependencies = [
- "bitflags",
- "core-foundation",
- "core-foundation-sys",
- "libc",
- "security-framework-sys",
-]
-
-[[package]]
-name = "security-framework-sys"
-version = "0.4.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "17bf11d99252f512695eb468de5516e5cf75455521e69dfe343f3b74e4748405"
-dependencies = [
- "core-foundation-sys",
- "libc",
-]
-
-[[package]]
-name = "serde"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b88fa983de7720629c9387e9f517353ed404164b1e482c970a90c1a4aaf7dc1a"
-dependencies = [
- "serde_derive",
-]
-
-[[package]]
-name = "serde_derive"
-version = "1.0.117"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cbd1ae72adb44aab48f325a02444a5fc079349a8d804c1fc922aed3f7454c74e"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "serde_json"
-version = "1.0.59"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "dcac07dbffa1c65e7f816ab9eba78eb142c6d44410f4eeba1e26e4f5dfa56b95"
-dependencies = [
- "itoa",
- "ryu",
- "serde",
-]
-
-[[package]]
-name = "serde_urlencoded"
-version = "0.6.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "9ec5d77e2d4c73717816afac02670d5c4f534ea95ed430442cad02e7a6e32c97"
-dependencies = [
- "dtoa",
- "itoa",
- "serde",
- "url",
-]
-
-[[package]]
-name = "signal-hook-registry"
-version = "1.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a3e12110bc539e657a646068aaf5eb5b63af9d0c1f7b29c97113fad80e15f035"
-dependencies = [
- "arc-swap",
- "libc",
-]
-
-[[package]]
-name = "slab"
-version = "0.4.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "c111b5bd5695e56cffe5129854aa230b39c93a305372fdbb2668ca2394eea9f8"
-
-[[package]]
-name = "socket2"
-version = "0.3.15"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b1fa70dc5c8104ec096f4fe7ede7a221d35ae13dcd19ba1ad9a81d2cab9a1c44"
-dependencies = [
- "cfg-if",
- "libc",
- "redox_syscall",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "spin"
-version = "0.5.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
-
-[[package]]
-name = "syn"
-version = "1.0.48"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cc371affeffc477f42a221a1e4297aedcea33d47d19b61455588bd9d8f6b19ac"
-dependencies = [
- "proc-macro2",
- "quote",
- "unicode-xid",
-]
-
-[[package]]
-name = "termcolor"
-version = "1.1.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "bb6bfa289a4d7c5766392812c0a1f4c1ba45afa1ad47803c11e1f407d846d75f"
-dependencies = [
- "winapi-util",
-]
-
-[[package]]
-name = "test_integration"
-version = "0.1.0"
-dependencies = [
- "anyhow",
- "async-google-apis-common",
- "env_logger",
- "futures",
- "hyper",
- "hyper-rustls",
- "mockito",
- "serde",
- "tokio",
-]
-
-[[package]]
-name = "thread_local"
-version = "1.0.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d40c6d1b69745a6ec6fb1ca717914848da4b44ae29d9b3080cbee91d72a69b14"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "time"
-version = "0.1.44"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6db9e6914ab8b1ae1c260a4ae7a49b6c5611b40328a735b21862567685e73255"
-dependencies = [
- "libc",
- "wasi 0.10.0+wasi-snapshot-preview1",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "tinyvec"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "238ce071d267c5710f9d31451efec16c5ee22de34df17cc05e56cbc92e967117"
-
-[[package]]
-name = "tokio"
-version = "0.2.22"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5d34ca54d84bf2b5b4d7d31e901a8464f7b60ac145a284fba25ceb801f2ddccd"
-dependencies = [
- "bytes",
- "fnv",
- "futures-core",
- "iovec",
- "lazy_static",
- "libc",
- "memchr",
- "mio",
- "mio-named-pipes",
- "mio-uds",
- "num_cpus",
- "pin-project-lite",
- "signal-hook-registry",
- "slab",
- "tokio-macros",
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "tokio-macros"
-version = "0.2.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f0c3acc6aa564495a0f2e1d59fab677cd7f81a19994cfc7f3ad0e64301560389"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
-]
-
-[[package]]
-name = "tokio-rustls"
-version = "0.13.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "15cb62a0d2770787abc96e99c1cd98fcf17f94959f3af63ca85bdfb203f051b4"
-dependencies = [
- "futures-core",
- "rustls",
- "tokio",
- "webpki",
-]
-
-[[package]]
-name = "tokio-util"
-version = "0.3.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "be8242891f2b6cbef26a2d7e8605133c2c554cd35b3e4948ea892d6d68436499"
-dependencies = [
- "bytes",
- "futures-core",
- "futures-sink",
- "log",
- "pin-project-lite",
- "tokio",
-]
-
-[[package]]
-name = "tower-service"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "e987b6bf443f4b5b3b6f38704195592cca41c5bb7aedd3c3693c7081f8289860"
-
-[[package]]
-name = "tracing"
-version = "0.1.21"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b0987850db3733619253fe60e17cb59b82d37c7e6c0236bb81e4d6b87c879f27"
-dependencies = [
- "cfg-if",
- "log",
- "pin-project-lite",
- "tracing-core",
-]
-
-[[package]]
-name = "tracing-core"
-version = "0.1.17"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f50de3927f93d202783f4513cda820ab47ef17f624b03c096e86ef00c67e6b5f"
-dependencies = [
- "lazy_static",
-]
-
-[[package]]
-name = "tracing-futures"
-version = "0.2.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab7bb6f14721aa00656086e9335d363c5c8747bae02ebe32ea2c7dece5689b4c"
-dependencies = [
- "pin-project 0.4.27",
- "tracing",
-]
-
-[[package]]
-name = "try-lock"
-version = "0.2.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "59547bce71d9c38b83d9c0e92b6066c4253371f15005def0c30d9657f50c7642"
-
-[[package]]
-name = "unicode-bidi"
-version = "0.3.4"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "49f2bd0c6468a8230e1db229cff8029217cf623c767ea5d60bfbd42729ea54d5"
-dependencies = [
- "matches",
-]
-
-[[package]]
-name = "unicode-normalization"
-version = "0.1.13"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6fb19cf769fa8c6a80a162df694621ebeb4dafb606470b2b2fce0be40a98a977"
-dependencies = [
- "tinyvec",
-]
-
-[[package]]
-name = "unicode-xid"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
-
-[[package]]
-name = "untrusted"
-version = "0.7.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "a156c684c91ea7d62626509bce3cb4e1d9ed5c4d978f7b4352658f96a4c26b4a"
-
-[[package]]
-name = "url"
-version = "2.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "829d4a8476c35c9bf0bbce5a3b23f4106f79728039b726d292bb93bc106787cb"
-dependencies = [
- "idna",
- "matches",
- "percent-encoding",
-]
-
-[[package]]
-name = "version_check"
-version = "0.9.2"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "b5a972e5669d67ba988ce3dc826706fb0a8b01471c088cb0b6110b805cc36aed"
-
-[[package]]
-name = "want"
-version = "0.3.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ce8a968cb1cd110d136ff8b819a556d6fb6d919363c61534f6860c7eb172ba0"
-dependencies = [
- "log",
- "try-lock",
-]
-
-[[package]]
-name = "wasi"
-version = "0.9.0+wasi-snapshot-preview1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "cccddf32554fecc6acb585f82a32a72e28b48f8c4c1883ddfeeeaa96f7d8e519"
-
-[[package]]
-name = "wasi"
-version = "0.10.0+wasi-snapshot-preview1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1a143597ca7c7793eff794def352d41792a93c481eb1042423ff7ff72ba2c31f"
-
-[[package]]
-name = "wasm-bindgen"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1ac64ead5ea5f05873d7c12b545865ca2b8d28adfc50a49b84770a3a97265d42"
-dependencies = [
- "cfg-if",
- "wasm-bindgen-macro",
-]
-
-[[package]]
-name = "wasm-bindgen-backend"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f22b422e2a757c35a73774860af8e112bff612ce6cb604224e8e47641a9e4f68"
-dependencies = [
- "bumpalo",
- "lazy_static",
- "log",
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-macro"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "6b13312a745c08c469f0b292dd2fcd6411dba5f7160f593da6ef69b64e407038"
-dependencies = [
- "quote",
- "wasm-bindgen-macro-support",
-]
-
-[[package]]
-name = "wasm-bindgen-macro-support"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "f249f06ef7ee334cc3b8ff031bfc11ec99d00f34d86da7498396dc1e3b1498fe"
-dependencies = [
- "proc-macro2",
- "quote",
- "syn",
- "wasm-bindgen-backend",
- "wasm-bindgen-shared",
-]
-
-[[package]]
-name = "wasm-bindgen-shared"
-version = "0.2.68"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "1d649a3145108d7d3fbcde896a468d1bd636791823c9921135218ad89be08307"
-
-[[package]]
-name = "web-sys"
-version = "0.3.45"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "4bf6ef87ad7ae8008e15a355ce696bed26012b7caa21605188cfd8214ab51e2d"
-dependencies = [
- "js-sys",
- "wasm-bindgen",
-]
-
-[[package]]
-name = "webpki"
-version = "0.21.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ab146130f5f790d45f82aeeb09e55a256573373ec64409fc19a6fb82fb1032ae"
-dependencies = [
- "ring",
- "untrusted",
-]
-
-[[package]]
-name = "winapi"
-version = "0.2.8"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "167dc9d6949a9b857f3451275e911c3f44255842c1f7a76f33c55103a909087a"
-
-[[package]]
-name = "winapi"
-version = "0.3.9"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "5c839a674fcd7a98952e593242ea400abe93992746761e38641405d28b00f419"
-dependencies = [
- "winapi-i686-pc-windows-gnu",
- "winapi-x86_64-pc-windows-gnu",
-]
-
-[[package]]
-name = "winapi-build"
-version = "0.1.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "2d315eee3b34aca4797b2da6b13ed88266e6d612562a0c46390af8299fc699bc"
-
-[[package]]
-name = "winapi-i686-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "ac3b87c63620426dd9b991e5ce0329eff545bccbbb34f3be09ff6fb6ab51b7b6"
-
-[[package]]
-name = "winapi-util"
-version = "0.1.5"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "70ec6ce85bb158151cae5e5c87f95a8e97d2c0c4b001223f33a334e3ce5de178"
-dependencies = [
- "winapi 0.3.9",
-]
-
-[[package]]
-name = "winapi-x86_64-pc-windows-gnu"
-version = "0.4.0"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "712e227841d057c1ee1cd2fb22fa7e5a5461ae8e48fa2ca79ec42cfc1931183f"
-
-[[package]]
-name = "ws2_32-sys"
-version = "0.2.1"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "d59cefebd0c892fa2dd6de581e937301d8552cb44489cdff035c6187cb63fa5e"
-dependencies = [
- "winapi 0.2.8",
- "winapi-build",
-]
-
-[[package]]
-name = "yup-oauth2"
-version = "4.1.3"
-source = "registry+https://github.com/rust-lang/crates.io-index"
-checksum = "92ed435d48d4c834ee654443dd3330399f9656506d7477ec645df58e406a25db"
-dependencies = [
- "base64 0.12.3",
- "chrono",
- "futures",
- "http",
- "hyper",
- "hyper-rustls",
- "log",
- "percent-encoding",
- "rustls",
- "seahash",
- "serde",
- "serde_json",
- "tokio",
- "url",
-]
--- a/test_integration/Cargo.toml	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,19 +0,0 @@
-[package]
-name = "test_integration"
-version = "0.1.0"
-authors = ["Lewin Bormann <lewin@lewin-bormann.info>"]
-edition = "2018"
-
-# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
-
-[dependencies]
-async-google-apis-common = "~0.1"
-
-anyhow = "~1.0"
-serde = "~1.0"
-env_logger = "~0.8"
-futures = "~0.3"
-hyper = "~0.13"
-hyper-rustls = "~0.20"
-mockito = "~0.27"
-tokio = { version = "~0.2", features = ["full"] }
--- a/test_integration/client_secret.json	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,14 +0,0 @@
-{
-  "installed": {
-    "client_id": "902216714886-8obvm3pn22b0jktllc0f0rufcbuvtrhg.apps.borgac.net",
-    "project_id": "integration-test-243420",
-    "auth_uri": "https://accounts.borgac.net/oauth2/",
-    "token_uri": "https://accounts.borgac.net/token",
-    "auth_provider_x509_cert_url": "https://accounts.borgac.net/oauth2/v1/certs",
-    "client_secret": "somesecret",
-    "redirect_uris": [
-      "urn:ietf:wg:oauth:2.0:oob",
-      "http://localhost"
-    ]
-  }
-}
--- a/test_integration/src/integration_test_v1_types.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,639 +0,0 @@
-#![allow(unused_variables, unused_mut, dead_code)]
-//! This file was generated by async-google-apis. (https://github.com/dermesser/async-google-apis)
-//!
-//! (c) 2020 Lewin Bormann <lbo@spheniscida.de>
-//!
-//! ## Getting started
-//!
-//! **Tip**: Take a look at those types ending in `...Service`. These represent API resources
-//! and contain methods to interact with an API. The remaining types are used by those methods
-//! and can be explored starting from a method you want to use.
-//!
-//! I'd be happy if you let me know about your use case of this code.
-//!
-//! THIS FILE HAS BEEN GENERATED -- SAVE ANY MODIFICATIONS BEFORE REPLACING.
-
-use async_google_apis_common::*;
-
-/// Scopes of this API. Convertible to their string representation with `AsRef`.
-#[derive(Debug, Clone, Copy)]
-pub enum IntegrationTestScopes {
-    /// See, edit, create, and delete all of your Google integrationtest files
-    ///
-    /// URL: https://example.borgac.net/auth/integrationtest
-    Integrationtest,
-    /// View and manage metadata of files in your Google integrationtest
-    ///
-    /// URL: https://example.borgac.net/auth/integrationtest.metadata
-    IntegrationtestMetadata,
-}
-
-impl std::convert::AsRef<str> for IntegrationTestScopes {
-    fn as_ref(&self) -> &'static str {
-        match self {
-            IntegrationTestScopes::Integrationtest => {
-                "https://example.borgac.net/auth/integrationtest"
-            }
-            IntegrationTestScopes::IntegrationtestMetadata => {
-                "https://example.borgac.net/auth/integrationtest.metadata"
-            }
-        }
-    }
-}
-
-/// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileCapabilities {
-    /// Whether the current user can add children to this folder. This is always false when the item is not a folder.
-    #[serde(rename = "canAddChildren")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_add_children: Option<bool>,
-    /// Whether the current user can comment on this file.
-    #[serde(rename = "canComment")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub can_comment: Option<bool>,
-}
-
-/// The metadata for a file.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct File {
-    /// A collection of arbitrary key-value pairs which are private to the requesting app. Entries with null values are cleared in update and copy requests.
-    #[serde(rename = "appProperties")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub app_properties: Option<HashMap<String, String>>,
-    /// Capabilities the current user has on this file. Each capability corresponds to a fine-grained action that a user may take.
-    #[serde(rename = "capabilities")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub capabilities: Option<FileCapabilities>,
-}
-
-/// A list of files.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FileList {
-    /// The list of files. If nextPageToken is populated, then this list may be incomplete and an additional page of results should be fetched.
-    #[serde(rename = "files")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub files: Option<Vec<File>>,
-    /// Whether the search process was incomplete. If true, then some search results may be missing, since all documents were not searched. This may occur when searching multiple drives with the "allDrives" corpora, but all corpora could not be searched. When this happens, it is suggested that clients narrow their query by choosing a different corpus such as "user" or "drive".
-    #[serde(rename = "incompleteSearch")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub incomplete_search: Option<bool>,
-    /// Identifies what kind of resource this is. Value: the fixed string "drive#fileList".
-    #[serde(rename = "kind")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub kind: Option<String>,
-    /// The page token for the next page of files. This will be absent if the end of the files list has been reached. If the token is rejected for any reason, it should be discarded, and pagination should be restarted from the first page of results.
-    #[serde(rename = "nextPageToken")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub next_page_token: Option<String>,
-}
-
-///
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct IntegrationTestParams {
-    /// Data format for the response.
-    #[serde(rename = "alt")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub alt: Option<String>,
-    /// Selector specifying which fields to include in a partial response.
-    #[serde(rename = "fields")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub fields: Option<String>,
-    /// API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token.
-    #[serde(rename = "key")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub key: Option<String>,
-    /// OAuth 2.0 token for the current user.
-    #[serde(rename = "oauth_token")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub oauth_token: Option<String>,
-    /// Returns response with indentations and line breaks.
-    #[serde(rename = "prettyPrint")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub pretty_print: Option<bool>,
-    /// An opaque string that represents a user for quota purposes. Must not exceed 40 characters.
-    #[serde(rename = "quotaUser")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub quota_user: Option<String>,
-    /// Deprecated. Please use quotaUser instead.
-    #[serde(rename = "userIp")]
-    #[serde(skip_serializing_if = "Option::is_none")]
-    pub user_ip: Option<String>,
-}
-
-/// Parameters for the `files.copy` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesCopyParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub integration_test_params: Option<IntegrationTestParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-}
-
-impl std::fmt::Display for FilesCopyParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.create` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesCreateParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub integration_test_params: Option<IntegrationTestParams>,
-    /// Whether to use the uploaded content as indexable text.
-    #[serde(rename = "useContentAsIndexableText")]
-    pub use_content_as_indexable_text: Option<bool>,
-}
-
-impl std::fmt::Display for FilesCreateParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.use_content_as_indexable_text {
-            write!(
-                f,
-                "&useContentAsIndexableText={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.delete` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesDeleteParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub integration_test_params: Option<IntegrationTestParams>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// Whether the requesting application supports both My Drives and shared drives.
-    #[serde(rename = "supportsAllDrives")]
-    pub supports_all_drives: Option<bool>,
-    /// Deprecated use supportsAllDrives instead.
-    #[serde(rename = "supportsTeamDrives")]
-    pub supports_team_drives: Option<bool>,
-}
-
-impl std::fmt::Display for FilesDeleteParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_all_drives {
-            write!(
-                f,
-                "&supportsAllDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.supports_team_drives {
-            write!(
-                f,
-                "&supportsTeamDrives={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.emptyTrash` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesEmptyTrashParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub integration_test_params: Option<IntegrationTestParams>,
-    /// Set to true to opt in to API behavior that aims for all items to have exactly one parent. This parameter will only take effect if the item is not in a shared drive. If an item's last parent is deleted but the item itself is not, the item will be placed under its owner's root.
-    #[serde(rename = "enforceSingleParent")]
-    pub enforce_single_parent: Option<bool>,
-}
-
-impl std::fmt::Display for FilesEmptyTrashParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.enforce_single_parent {
-            write!(
-                f,
-                "&enforceSingleParent={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// Parameters for the `files.export` method.
-#[derive(Serialize, Deserialize, Debug, Clone, Default)]
-pub struct FilesExportParams {
-    /// General attributes applying to any API call
-    #[serde(flatten)]
-    pub integration_test_params: Option<IntegrationTestParams>,
-    /// The ID of the file.
-    #[serde(rename = "fileId")]
-    pub file_id: String,
-    /// The MIME type of the format requested for this export.
-    #[serde(rename = "mimeType")]
-    pub mime_type: String,
-}
-
-impl std::fmt::Display for FilesExportParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        write!(
-            f,
-            "&mimeType={}",
-            percent_encode(format!("{}", self.mime_type).as_bytes(), NON_ALPHANUMERIC).to_string()
-        )?;
-        Ok(())
-    }
-}
-
-impl std::fmt::Display for IntegrationTestParams {
-    fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result {
-        if let Some(ref v) = self.alt {
-            write!(
-                f,
-                "&alt={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.fields {
-            write!(
-                f,
-                "&fields={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.key {
-            write!(
-                f,
-                "&key={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.oauth_token {
-            write!(
-                f,
-                "&oauth_token={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.pretty_print {
-            write!(
-                f,
-                "&prettyPrint={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.quota_user {
-            write!(
-                f,
-                "&quotaUser={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        if let Some(ref v) = self.user_ip {
-            write!(
-                f,
-                "&userIp={}",
-                percent_encode(format!("{}", v).as_bytes(), NON_ALPHANUMERIC).to_string()
-            )?;
-        }
-        Ok(())
-    }
-}
-
-/// The Integration_test Files service represents the Files resource.
-pub struct FilesService {
-    client: TlsClient,
-    authenticator: Box<dyn 'static + std::ops::Deref<Target = Authenticator>>,
-    scopes: Vec<String>,
-
-    base_url: String,
-    root_url: String,
-}
-
-impl FilesService {
-    /// Create a new FilesService object. The easiest way to call this is wrapping the Authenticator
-    /// into an `Rc`: `new(client.clone(), Rc::new(authenticator))`.
-    /// This way, one authenticator can be shared among several services.
-    pub fn new<A: 'static + std::ops::Deref<Target = Authenticator>>(
-        client: TlsClient,
-        auth: A,
-    ) -> FilesService {
-        FilesService {
-            client: client,
-            authenticator: Box::new(auth),
-            scopes: vec![],
-            base_url: "https://example.borgac.net/integrationAPI".into(),
-            root_url: "https://example.borgac.net/".into(),
-        }
-    }
-
-    /// Provide the base URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn base_url(&self) -> String {
-        if self.base_url.ends_with("/") {
-            return self.base_url.clone();
-        }
-        return self.base_url.clone() + "/";
-    }
-    /// Provide the root URL of this API. The returned URL is guaranteed to end with a '/'.
-    fn root_url(&self) -> String {
-        if self.root_url.ends_with("/") {
-            return self.root_url.clone();
-        }
-        return self.root_url.clone();
-    }
-    /// Returns appropriate URLs for relative and absolute paths.
-    fn format_path(&self, path: &str) -> String {
-        if path.starts_with("/") {
-            return self.root_url().trim_end_matches("/").to_string() + path;
-        } else {
-            return self.base_url() + path;
-        }
-    }
-
-    #[cfg(test)]
-    /// Override API URLs. `base` is the base path relative to which (relative) method paths are interpreted,
-    /// whereas `root` is the URL relative to which absolute paths are interpreted.
-    pub fn set_urls(&mut self, base: String, root: String) {
-        self.base_url = base;
-        self.root_url = root;
-    }
-
-    /// Explicitly select which scopes should be requested for authorization. Otherwise,
-    /// a possibly too large scope will be requested.
-    ///
-    /// It is most convenient to supply a vec or slice of Integration_testScopes enum values.
-    pub fn set_scopes<S: AsRef<str>, T: AsRef<[S]>>(&mut self, scopes: T) {
-        self.scopes = scopes
-            .as_ref()
-            .into_iter()
-            .map(|s| s.as_ref().to_string())
-            .collect();
-    }
-
-    /// Creates a copy of a file and applies any requested updates with patch semantics. Folders cannot be copied.
-    pub async fn copy(&mut self, params: &FilesCopyParams, req: &File) -> Result<File> {
-        let rel_path = format!(
-            "files/{fileId}/copy",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-        println!("{}", path);
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive.photos.readonly".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Creates a new file.
-    pub async fn create(&mut self, params: &FilesCreateParams, req: &File) -> Result<File> {
-        let rel_path = format!("files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        do_request(&self.client, &full_uri, &headers, "POST", opt_request).await
-    }
-
-    /// Creates a new file.
-    ///
-    /// This method is a variant of `create()`, taking data for upload. It performs a multipart upload.
-    pub async fn create_upload(
-        &mut self,
-        params: &FilesCreateParams,
-        req: &File,
-        data: hyper::body::Bytes,
-    ) -> Result<File> {
-        let rel_path = format!("/upload/drive/v3/files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=multipart{params}", params = params);
-
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-
-        do_upload_multipart(&self.client, &full_uri, &headers, "POST", opt_request, data).await
-    }
-
-    /// Creates a new file.
-    ///
-    /// This method is a variant of `create()`, taking data for upload.
-    /// It returns a `ResumableUpload` upload manager which you can use to stream larger amounts
-    /// of data to the API. The result of this call will be returned by the `ResumableUpload` method
-    /// you choose for the upload.
-    pub async fn create_resumable_upload<'client>(
-        &'client mut self,
-        params: &FilesCreateParams,
-        req: &File,
-    ) -> Result<ResumableUpload<'client, File>> {
-        let rel_path = format!("/resumable/upload/drive/v3/files",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?uploadType=resumable{params}", params = params);
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        let opt_request = Some(req);
-        let (_resp, headers): (EmptyResponse, hyper::HeaderMap) =
-            do_request_with_headers(&self.client, &full_uri, &headers, "POST", opt_request).await?;
-        if let Some(dest) = headers.get(hyper::header::LOCATION) {
-            use std::convert::TryFrom;
-            Ok(ResumableUpload::new(
-                hyper::Uri::try_from(dest.to_str()?)?,
-                &self.client,
-                5 * 1024 * 1024,
-            ))
-        } else {
-            Err(Error::from(ApiError::RedirectError(format!(
-                "Resumable upload response didn't contain Location: {:?}",
-                headers
-            )))
-            .context(format!("{:?}", headers)))?
-        }
-    }
-
-    /// Permanently deletes a file owned by the user without moving it to the trash. If the file belongs to a shared drive the user must be an organizer on the parent. If the target is a folder, all descendants owned by the user are also deleted.
-    pub async fn delete(&mut self, params: &FilesDeleteParams) -> Result<()> {
-        let rel_path = format!(
-            "files/{fileId}",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive.file".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Permanently deletes all of the user's trashed files.
-    pub async fn empty_trash(&mut self, params: &FilesEmptyTrashParams) -> Result<()> {
-        let rel_path = format!("files/trash",);
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-
-        let opt_request: Option<&EmptyRequest> = None;
-        do_request(&self.client, &full_uri, &headers, "DELETE", opt_request).await
-    }
-
-    /// Exports a Google Doc to the requested MIME type and returns the exported content. Please note that the exported content is limited to 10MB.
-    ///
-    /// This method potentially downloads data. See documentation of `Download`.
-    pub async fn export<'a>(
-        &'a mut self,
-        params: &FilesExportParams,
-    ) -> Result<Download<'a, EmptyRequest, ()>> {
-        let rel_path = format!(
-            "files/{fileId}/export",
-            fileId = percent_encode(params.file_id.as_bytes(), NON_ALPHANUMERIC)
-        );
-        let path = self.format_path(rel_path.as_str());
-
-        let mut headers = vec![];
-        let tok;
-        if self.scopes.is_empty() {
-            let scopes = &["https://www.googleapis.com/auth/drive.readonly".to_string()];
-            tok = self.authenticator.token(scopes).await?;
-        } else {
-            tok = self.authenticator.token(&self.scopes).await?;
-        }
-        headers.push((
-            hyper::header::AUTHORIZATION,
-            format!("Bearer {token}", token = tok.as_str()),
-        ));
-
-        let mut url_params = format!("?{params}", params = params);
-        if let Some(ref api_params) = &params.integration_test_params {
-            url_params.push_str(&format!("{}", api_params));
-        }
-
-        let full_uri = path + &url_params;
-        let opt_request: Option<&EmptyRequest> = None;
-
-        do_download(&self.client, &full_uri, headers, "GET".into(), opt_request).await
-    }
-}
--- a/test_integration/src/lib.rs	Thu Oct 29 22:05:55 2020 +0100
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,134 +0,0 @@
-mod integration_test_v1_types;
-
-use async_google_apis_common as agac;
-use integration_test_v1_types as inttest;
-
-#[cfg(test)]
-mod tests {
-    use super::*;
-    use mockito;
-    use tokio;
-
-    const CLIENT_ID: &str = "myclientid.apps._dev.borgac.net";
-    const CLIENT_SECRET: &str = "mysecret";
-    const PROJECT_ID: &str = "integration-test-243420";
-    const AUTH_PATH: &str = "/oauth2/";
-    const TOKEN_PATH: &str = "/token/";
-
-    const API_LOCATION: &str = "/integrationAPI/";
-
-    struct AutoDelegate {}
-
-    impl agac::yup_oauth2::authenticator_delegate::InstalledFlowDelegate for AutoDelegate {
-        fn present_user_url<'a>(
-            &'a self,
-            url: &'a str,
-            _need_code: bool,
-        ) -> std::pin::Pin<Box<dyn std::future::Future<Output = Result<String, String>> + Send + 'a>>
-        {
-            println!("user directed to: {}", url);
-            return Box::pin(futures::future::ok("returned_code".into()));
-        }
-    }
-
-    fn url_for_path(path: &str) -> String {
-        if path.starts_with("/") {
-            return mockito::server_url() + path;
-        }
-        return mockito::server_url() + "/" + path;
-    }
-
-    async fn read_client_secret() -> agac::yup_oauth2::ApplicationSecret {
-        let mut appsec = agac::yup_oauth2::read_application_secret("client_secret.json")
-            .await
-            .unwrap();
-        appsec.client_id = CLIENT_ID.into();
-        appsec.client_secret = CLIENT_SECRET.into();
-        appsec.project_id = Some(PROJECT_ID.into());
-        appsec.auth_uri = url_for_path(AUTH_PATH);
-        appsec.token_uri = url_for_path(TOKEN_PATH);
-        appsec.auth_provider_x509_cert_url = None;
-        appsec
-    }
-
-    async fn authenticator(
-        cl: agac::TlsClient,
-    ) -> agac::yup_oauth2::authenticator::Authenticator<agac::TlsConnr> {
-        let appsec = read_client_secret().await;
-        let auth = agac::yup_oauth2::InstalledFlowAuthenticator::builder(
-            appsec,
-            agac::yup_oauth2::InstalledFlowReturnMethod::Interactive,
-        )
-        .flow_delegate(Box::new(AutoDelegate {}))
-        .hyper_client(cl)
-        .build()
-        .await
-        .unwrap();
-        auth
-    }
-
-    fn oauth_mock() -> mockito::Mock {
-        mockito::mock("POST", "/token/")
-                .with_status(200)
-                .match_header("content-type", "application/x-www-form-urlencoded")
-                .match_body("code=returned_code&client_id=myclientid.apps._dev.borgac.net&client_secret=mysecret&redirect_uri=urn%3Aietf%3Awg%3Aoauth%3A2.0%3Aoob&grant_type=authorization_code")
-                .with_body(r#" { "access_token": "returned_access_token!", "refresh_token": "returned_refresh_token!", "token_type": "bearer" } "#)
-                .create()
-    }
-
-    fn hyper_client() -> agac::TlsClient {
-        hyper::Client::builder().build(hyper_rustls::HttpsConnector::new())
-    }
-
-    fn files_service(
-        cl: agac::TlsClient,
-        auth: agac::yup_oauth2::authenticator::Authenticator<agac::TlsConnr>,
-    ) -> inttest::FilesService {
-        let mut fs = inttest::FilesService::new(cl, Box::new(auth));
-        fs.set_urls(mockito::server_url() + API_LOCATION, mockito::server_url());
-        fs
-    }
-
-    #[tokio::test]
-    async fn it_works() {
-        mockito::start();
-        println!("Mockito running at {}", mockito::server_url());
-    }
-
-    #[tokio::test]
-    async fn test_oauth_provider() {
-        mockito::start();
-        let cl = hyper_client();
-        let auth = authenticator(cl.clone()).await;
-
-        let mock = oauth_mock();
-        let tok = auth
-            .token(&["https://oauth.borgac.net/test"])
-            .await
-            .unwrap();
-        println!("Obtained token: {:?}", tok);
-        mock.assert();
-    }
-
-    #[tokio::test]
-    async fn test_basic_files_api() {
-        mockito::start();
-        let cl = hyper_client();
-        let auth = authenticator(cl.clone()).await;
-        let mut svc = files_service(cl, auth);
-
-        // Mandatory for token fetching.
-        let _om = oauth_mock();
-
-        let mock = mockito::mock("PUT", "/integrationAPI/files/file_id_to_copy/copy")
-            .with_status(200)
-            .create();
-
-        let mut fsp = inttest::FilesCopyParams::default();
-        fsp.file_id = "file_id_to_copy".into();
-        let f = inttest::File::default();
-        let result = svc.copy(&fsp, &f).await.unwrap();
-
-        mock.assert();
-    }
-}