You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/google-api-services-workstations/v1/2.0.0/com/google/api/services/workstations/v1/model/GceInstance.java
+15-18Lines changed: 15 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -129,9 +129,9 @@ public final class GceInstance extends com.google.api.client.json.GenericJson {
129
129
130
130
/**
131
131
* Optional. The email address of the service account for Cloud Workstations VMs created with this
132
-
* configuration. When specified, be sure that the service account has `logginglogEntries.create`
133
-
* permission on the project so it can write logs out to Cloud Logging. If using a custom
134
-
* container image, the service account must have [Artifact Registry
132
+
* configuration. When specified, be sure that the service account has `logging.logEntries.create`
133
+
* and `monitoring.timeSeries.create` permissions on the project so it can write logs out to Cloud
134
+
* Logging. If using a custom container image, the service account must have [Artifact Registry
135
135
* Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles) permission to
136
136
* pull the specified image. If you as the administrator want to be able to `ssh` into the
137
137
* underlying VM, you need to set this value to a service account for which you have the
@@ -145,9 +145,8 @@ public final class GceInstance extends com.google.api.client.json.GenericJson {
145
145
privatejava.lang.StringserviceAccount;
146
146
147
147
/**
148
-
* Optional. Scopes to grant to the service_account. Various scopes are automatically added based
149
-
* on feature usage. When specified, users of workstations under this configuration must have
150
-
* `iam.serviceAccounts.actAs` on the service account.
148
+
* Optional. Scopes to grant to the service_account. When specified, users of workstations under
149
+
* this configuration must have `iam.serviceAccounts.actAs` on the service account.
151
150
* The value may be {@code null}.
152
151
*/
153
152
@com.google.api.client.util.Key
@@ -381,9 +380,9 @@ public GceInstance setPooledInstances(java.lang.Integer pooledInstances) {
381
380
382
381
/**
383
382
* Optional. The email address of the service account for Cloud Workstations VMs created with this
384
-
* configuration. When specified, be sure that the service account has `logginglogEntries.create`
385
-
* permission on the project so it can write logs out to Cloud Logging. If using a custom
386
-
* container image, the service account must have [Artifact Registry
383
+
* configuration. When specified, be sure that the service account has `logging.logEntries.create`
384
+
* and `monitoring.timeSeries.create` permissions on the project so it can write logs out to Cloud
385
+
* Logging. If using a custom container image, the service account must have [Artifact Registry
387
386
* Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles) permission to
388
387
* pull the specified image. If you as the administrator want to be able to `ssh` into the
389
388
* underlying VM, you need to set this value to a service account for which you have the
@@ -399,9 +398,9 @@ public java.lang.String getServiceAccount() {
399
398
400
399
/**
401
400
* Optional. The email address of the service account for Cloud Workstations VMs created with this
402
-
* configuration. When specified, be sure that the service account has `logginglogEntries.create`
403
-
* permission on the project so it can write logs out to Cloud Logging. If using a custom
404
-
* container image, the service account must have [Artifact Registry
401
+
* configuration. When specified, be sure that the service account has `logging.logEntries.create`
402
+
* and `monitoring.timeSeries.create` permissions on the project so it can write logs out to Cloud
403
+
* Logging. If using a custom container image, the service account must have [Artifact Registry
405
404
* Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles) permission to
406
405
* pull the specified image. If you as the administrator want to be able to `ssh` into the
407
406
* underlying VM, you need to set this value to a service account for which you have the
@@ -417,19 +416,17 @@ public GceInstance setServiceAccount(java.lang.String serviceAccount) {
417
416
}
418
417
419
418
/**
420
-
* Optional. Scopes to grant to the service_account. Various scopes are automatically added based
421
-
* on feature usage. When specified, users of workstations under this configuration must have
422
-
* `iam.serviceAccounts.actAs` on the service account.
419
+
* Optional. Scopes to grant to the service_account. When specified, users of workstations under
420
+
* this configuration must have `iam.serviceAccounts.actAs` on the service account.
Copy file name to clipboardExpand all lines: clients/google-api-services-workstations/v1beta/2.0.0/com/google/api/services/workstations/v1beta/model/GceInstance.java
+15-18Lines changed: 15 additions & 18 deletions
Original file line number
Diff line number
Diff line change
@@ -143,9 +143,9 @@ public final class GceInstance extends com.google.api.client.json.GenericJson {
143
143
144
144
/**
145
145
* Optional. The email address of the service account for Cloud Workstations VMs created with this
146
-
* configuration. When specified, be sure that the service account has `logginglogEntries.create`
147
-
* permission on the project so it can write logs out to Cloud Logging. If using a custom
148
-
* container image, the service account must have [Artifact Registry
146
+
* configuration. When specified, be sure that the service account has `logging.logEntries.create`
147
+
* and `monitoring.timeSeries.create` permissions on the project so it can write logs out to Cloud
148
+
* Logging. If using a custom container image, the service account must have [Artifact Registry
149
149
* Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles) permission to
150
150
* pull the specified image. If you as the administrator want to be able to `ssh` into the
151
151
* underlying VM, you need to set this value to a service account for which you have the
@@ -159,9 +159,8 @@ public final class GceInstance extends com.google.api.client.json.GenericJson {
159
159
privatejava.lang.StringserviceAccount;
160
160
161
161
/**
162
-
* Optional. Scopes to grant to the service_account. Various scopes are automatically added based
163
-
* on feature usage. When specified, users of workstations under this configuration must have
164
-
* `iam.serviceAccounts.actAs` on the service account.
162
+
* Optional. Scopes to grant to the service_account. When specified, users of workstations under
163
+
* this configuration must have `iam.serviceAccounts.actAs` on the service account.
165
164
* The value may be {@code null}.
166
165
*/
167
166
@com.google.api.client.util.Key
@@ -423,9 +422,9 @@ public GceInstance setPooledInstances(java.lang.Integer pooledInstances) {
423
422
424
423
/**
425
424
* Optional. The email address of the service account for Cloud Workstations VMs created with this
426
-
* configuration. When specified, be sure that the service account has `logginglogEntries.create`
427
-
* permission on the project so it can write logs out to Cloud Logging. If using a custom
428
-
* container image, the service account must have [Artifact Registry
425
+
* configuration. When specified, be sure that the service account has `logging.logEntries.create`
426
+
* and `monitoring.timeSeries.create` permissions on the project so it can write logs out to Cloud
427
+
* Logging. If using a custom container image, the service account must have [Artifact Registry
429
428
* Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles) permission to
430
429
* pull the specified image. If you as the administrator want to be able to `ssh` into the
431
430
* underlying VM, you need to set this value to a service account for which you have the
@@ -441,9 +440,9 @@ public java.lang.String getServiceAccount() {
441
440
442
441
/**
443
442
* Optional. The email address of the service account for Cloud Workstations VMs created with this
444
-
* configuration. When specified, be sure that the service account has `logginglogEntries.create`
445
-
* permission on the project so it can write logs out to Cloud Logging. If using a custom
446
-
* container image, the service account must have [Artifact Registry
443
+
* configuration. When specified, be sure that the service account has `logging.logEntries.create`
444
+
* and `monitoring.timeSeries.create` permissions on the project so it can write logs out to Cloud
445
+
* Logging. If using a custom container image, the service account must have [Artifact Registry
447
446
* Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles) permission to
448
447
* pull the specified image. If you as the administrator want to be able to `ssh` into the
449
448
* underlying VM, you need to set this value to a service account for which you have the
@@ -459,19 +458,17 @@ public GceInstance setServiceAccount(java.lang.String serviceAccount) {
459
458
}
460
459
461
460
/**
462
-
* Optional. Scopes to grant to the service_account. Various scopes are automatically added based
463
-
* on feature usage. When specified, users of workstations under this configuration must have
464
-
* `iam.serviceAccounts.actAs` on the service account.
461
+
* Optional. Scopes to grant to the service_account. When specified, users of workstations under
462
+
* this configuration must have `iam.serviceAccounts.actAs` on the service account.
0 commit comments