Skip to content

Commit c798230

Browse files
yoshi-automationsofisl
authored andcommitted
feat(container): update the API
#### container:v1beta1 The following keys were added: - schemas.Cluster.properties.rbacBindingConfig.$ref - schemas.Cluster.properties.rbacBindingConfig.description - schemas.ClusterUpdate.properties.desiredRbacBindingConfig.$ref - schemas.ClusterUpdate.properties.desiredRbacBindingConfig.description - schemas.RBACBindingConfig.description - schemas.RBACBindingConfig.id - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemAuthenticated.description - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemAuthenticated.type - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemUnauthenticated.description - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemUnauthenticated.type - schemas.RBACBindingConfig.type The following keys were changed: - schemas.MasterAuth.properties.clientCertificate.description #### container:v1 The following keys were added: - schemas.Cluster.properties.rbacBindingConfig.$ref - schemas.Cluster.properties.rbacBindingConfig.description - schemas.Cluster.properties.secretManagerConfig.$ref - schemas.Cluster.properties.secretManagerConfig.description - schemas.ClusterUpdate.properties.desiredRbacBindingConfig.$ref - schemas.ClusterUpdate.properties.desiredRbacBindingConfig.description - schemas.ClusterUpdate.properties.desiredSecretManagerConfig.$ref - schemas.ClusterUpdate.properties.desiredSecretManagerConfig.description - schemas.NodeConfig.properties.storagePools.description - schemas.NodeConfig.properties.storagePools.items.type - schemas.NodeConfig.properties.storagePools.type - schemas.RBACBindingConfig.description - schemas.RBACBindingConfig.id - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemAuthenticated.description - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemAuthenticated.type - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemUnauthenticated.description - schemas.RBACBindingConfig.properties.enableInsecureBindingSystemUnauthenticated.type - schemas.RBACBindingConfig.type - schemas.SecretManagerConfig.description - schemas.SecretManagerConfig.id - schemas.SecretManagerConfig.properties.enabled.description - schemas.SecretManagerConfig.properties.enabled.type - schemas.SecretManagerConfig.type - schemas.UpdateNodePoolRequest.properties.storagePools.description - schemas.UpdateNodePoolRequest.properties.storagePools.items.type - schemas.UpdateNodePoolRequest.properties.storagePools.type The following keys were changed: - schemas.MasterAuth.properties.clientCertificate.description
1 parent e313580 commit c798230

File tree

4 files changed

+152
-6
lines changed

4 files changed

+152
-6
lines changed

discovery/container-v1.json

Lines changed: 58 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2540,7 +2540,7 @@
25402540
}
25412541
}
25422542
},
2543-
"revision": "20240722",
2543+
"revision": "20240806",
25442544
"rootUrl": "https://container.googleapis.com/",
25452545
"schemas": {
25462546
"AcceleratorConfig": {
@@ -3369,6 +3369,10 @@
33693369
"$ref": "PrivateClusterConfig",
33703370
"description": "Configuration for private cluster."
33713371
},
3372+
"rbacBindingConfig": {
3373+
"$ref": "RBACBindingConfig",
3374+
"description": "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
3375+
},
33723376
"releaseChannel": {
33733377
"$ref": "ReleaseChannel",
33743378
"description": "Release channel configuration. If left unspecified on cluster creation and a version is specified, the cluster is enrolled in the most mature release channel where the version is available (first checking STABLE, then REGULAR, and finally RAPID). Otherwise, if no release channel configuration and no version is specified, the cluster is enrolled in the REGULAR channel with its default version."
@@ -3394,6 +3398,10 @@
33943398
"readOnly": true,
33953399
"type": "boolean"
33963400
},
3401+
"secretManagerConfig": {
3402+
"$ref": "SecretManagerConfig",
3403+
"description": "Secret CSI driver configuration."
3404+
},
33973405
"securityPostureConfig": {
33983406
"$ref": "SecurityPostureConfig",
33993407
"description": "Enable/Disable Security Posture API features for the cluster."
@@ -3752,6 +3760,10 @@
37523760
],
37533761
"type": "string"
37543762
},
3763+
"desiredRbacBindingConfig": {
3764+
"$ref": "RBACBindingConfig",
3765+
"description": "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
3766+
},
37553767
"desiredReleaseChannel": {
37563768
"$ref": "ReleaseChannel",
37573769
"description": "The desired release channel configuration."
@@ -3760,6 +3772,10 @@
37603772
"$ref": "ResourceUsageExportConfig",
37613773
"description": "The desired configuration for exporting resource usage."
37623774
},
3775+
"desiredSecretManagerConfig": {
3776+
"$ref": "SecretManagerConfig",
3777+
"description": "Enable/Disable Secret Manager Config."
3778+
},
37633779
"desiredSecurityPostureConfig": {
37643780
"$ref": "SecurityPostureConfig",
37653781
"description": "Enable/Disable Security Posture API features for the cluster."
@@ -4952,7 +4968,7 @@
49524968
"id": "MasterAuth",
49534969
"properties": {
49544970
"clientCertificate": {
4955-
"description": "Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint.",
4971+
"description": "Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint. Issued only if client_certificate_config is set.",
49564972
"readOnly": true,
49574973
"type": "string"
49584974
},
@@ -5482,6 +5498,13 @@
54825498
"description": "Spot flag for enabling Spot VM, which is a rebrand of the existing preemptible flag.",
54835499
"type": "boolean"
54845500
},
5501+
"storagePools": {
5502+
"description": "List of Storage Pools where boot disks are provisioned.",
5503+
"items": {
5504+
"type": "string"
5505+
},
5506+
"type": "array"
5507+
},
54855508
"tags": {
54865509
"description": "The list of instance tags applied to all nodes. Tags are used to identify valid sources or targets for network firewalls and are specified by the client during cluster or node pool creation. Each tag within the list must comply with RFC1035.",
54875510
"items": {
@@ -6301,6 +6324,21 @@
63016324
},
63026325
"type": "object"
63036326
},
6327+
"RBACBindingConfig": {
6328+
"description": "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.",
6329+
"id": "RBACBindingConfig",
6330+
"properties": {
6331+
"enableInsecureBindingSystemAuthenticated": {
6332+
"description": "Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjects system:authenticated.",
6333+
"type": "boolean"
6334+
},
6335+
"enableInsecureBindingSystemUnauthenticated": {
6336+
"description": "Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjets system:anonymous or system:unauthenticated.",
6337+
"type": "boolean"
6338+
}
6339+
},
6340+
"type": "object"
6341+
},
63046342
"RangeInfo": {
63056343
"description": "RangeInfo contains the range name and the range utilization by this cluster.",
63066344
"id": "RangeInfo",
@@ -6621,6 +6659,17 @@
66216659
"properties": {},
66226660
"type": "object"
66236661
},
6662+
"SecretManagerConfig": {
6663+
"description": "SecretManagerConfig is config for secret manager enablement.",
6664+
"id": "SecretManagerConfig",
6665+
"properties": {
6666+
"enabled": {
6667+
"description": "Enable/Disable Secret Manager Config.",
6668+
"type": "boolean"
6669+
}
6670+
},
6671+
"type": "object"
6672+
},
66246673
"SecurityBulletinEvent": {
66256674
"description": "SecurityBulletinEvent is a notification sent to customers when a security bulletin has been posted that they are vulnerable to.",
66266675
"id": "SecurityBulletinEvent",
@@ -7581,6 +7630,13 @@
75817630
"$ref": "ResourceManagerTags",
75827631
"description": "Desired resource manager tag keys and values to be attached to the nodes for managing Compute Engine firewalls using Network Firewall Policies. Existing tags will be replaced with new values."
75837632
},
7633+
"storagePools": {
7634+
"description": "List of Storage Pools where boot disks are provisioned. Existing Storage Pools will be replaced with storage-pools.",
7635+
"items": {
7636+
"type": "string"
7637+
},
7638+
"type": "array"
7639+
},
75847640
"tags": {
75857641
"$ref": "NetworkTags",
75867642
"description": "The desired network tags to be applied to all nodes in the node pool. If this field is not present, the tags will not be changed. Otherwise, the existing network tags will be *replaced* with the provided tags."

discovery/container-v1beta1.json

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2565,7 +2565,7 @@
25652565
}
25662566
}
25672567
},
2568-
"revision": "20240730",
2568+
"revision": "20240806",
25692569
"rootUrl": "https://container.googleapis.com/",
25702570
"schemas": {
25712571
"AcceleratorConfig": {
@@ -3505,6 +3505,10 @@
35053505
"deprecated": true,
35063506
"description": "Deprecated: Use SecurityPostureConfig instead. Enable/Disable Protect API features for the cluster."
35073507
},
3508+
"rbacBindingConfig": {
3509+
"$ref": "RBACBindingConfig",
3510+
"description": "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
3511+
},
35083512
"releaseChannel": {
35093513
"$ref": "ReleaseChannel",
35103514
"description": "Release channel configuration. If left unspecified on cluster creation and a version is specified, the cluster is enrolled in the most mature release channel where the version is available (first checking STABLE, then REGULAR, and finally RAPID). Otherwise, if no release channel configuration and no version is specified, the cluster is enrolled in the REGULAR channel with its default version."
@@ -3948,6 +3952,10 @@
39483952
"deprecated": true,
39493953
"description": "Deprecated: Use DesiredSecurityPostureConfig instead. Enable/Disable Protect API features for the cluster."
39503954
},
3955+
"desiredRbacBindingConfig": {
3956+
"$ref": "RBACBindingConfig",
3957+
"description": "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
3958+
},
39513959
"desiredReleaseChannel": {
39523960
"$ref": "ReleaseChannel",
39533961
"description": "The desired release channel configuration."
@@ -5361,7 +5369,7 @@
53615369
"id": "MasterAuth",
53625370
"properties": {
53635371
"clientCertificate": {
5364-
"description": "Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint.",
5372+
"description": "Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint. Issued only if client_certificate_config is set.",
53655373
"readOnly": true,
53665374
"type": "string"
53675375
},
@@ -6829,6 +6837,21 @@
68296837
},
68306838
"type": "object"
68316839
},
6840+
"RBACBindingConfig": {
6841+
"description": "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.",
6842+
"id": "RBACBindingConfig",
6843+
"properties": {
6844+
"enableInsecureBindingSystemAuthenticated": {
6845+
"description": "Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjects system:authenticated.",
6846+
"type": "boolean"
6847+
},
6848+
"enableInsecureBindingSystemUnauthenticated": {
6849+
"description": "Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjets system:anonymous or system:unauthenticated.",
6850+
"type": "boolean"
6851+
}
6852+
},
6853+
"type": "object"
6854+
},
68326855
"RangeInfo": {
68336856
"description": "RangeInfo contains the range name and the range utilization by this cluster.",
68346857
"id": "RangeInfo",

src/apis/container/v1.ts

Lines changed: 47 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -771,6 +771,10 @@ export namespace container_v1 {
771771
* Configuration for private cluster.
772772
*/
773773
privateClusterConfig?: Schema$PrivateClusterConfig;
774+
/**
775+
* RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
776+
*/
777+
rbacBindingConfig?: Schema$RBACBindingConfig;
774778
/**
775779
* Release channel configuration. If left unspecified on cluster creation and a version is specified, the cluster is enrolled in the most mature release channel where the version is available (first checking STABLE, then REGULAR, and finally RAPID). Otherwise, if no release channel configuration and no version is specified, the cluster is enrolled in the REGULAR channel with its default version.
776780
*/
@@ -791,6 +795,10 @@ export namespace container_v1 {
791795
* Output only. Reserved for future use.
792796
*/
793797
satisfiesPzs?: boolean | null;
798+
/**
799+
* Secret CSI driver configuration.
800+
*/
801+
secretManagerConfig?: Schema$SecretManagerConfig;
794802
/**
795803
* Enable/Disable Security Posture API features for the cluster.
796804
*/
@@ -1058,6 +1066,10 @@ export namespace container_v1 {
10581066
* The desired state of IPv6 connectivity to Google Services.
10591067
*/
10601068
desiredPrivateIpv6GoogleAccess?: string | null;
1069+
/**
1070+
* RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
1071+
*/
1072+
desiredRbacBindingConfig?: Schema$RBACBindingConfig;
10611073
/**
10621074
* The desired release channel configuration.
10631075
*/
@@ -1066,6 +1078,10 @@ export namespace container_v1 {
10661078
* The desired configuration for exporting resource usage.
10671079
*/
10681080
desiredResourceUsageExportConfig?: Schema$ResourceUsageExportConfig;
1081+
/**
1082+
* Enable/Disable Secret Manager Config.
1083+
*/
1084+
desiredSecretManagerConfig?: Schema$SecretManagerConfig;
10691085
/**
10701086
* Enable/Disable Security Posture API features for the cluster.
10711087
*/
@@ -1870,7 +1886,7 @@ export namespace container_v1 {
18701886
*/
18711887
export interface Schema$MasterAuth {
18721888
/**
1873-
* Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint.
1889+
* Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint. Issued only if client_certificate_config is set.
18741890
*/
18751891
clientCertificate?: string | null;
18761892
/**
@@ -2242,6 +2258,10 @@ export namespace container_v1 {
22422258
* Spot flag for enabling Spot VM, which is a rebrand of the existing preemptible flag.
22432259
*/
22442260
spot?: boolean | null;
2261+
/**
2262+
* List of Storage Pools where boot disks are provisioned.
2263+
*/
2264+
storagePools?: string[] | null;
22452265
/**
22462266
* The list of instance tags applied to all nodes. Tags are used to identify valid sources or targets for network firewalls and are specified by the client during cluster or node pool creation. Each tag within the list must comply with RFC1035.
22472267
*/
@@ -2839,6 +2859,19 @@ export namespace container_v1 {
28392859
*/
28402860
rayClusterMonitoringConfig?: Schema$RayClusterMonitoringConfig;
28412861
}
2862+
/**
2863+
* RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
2864+
*/
2865+
export interface Schema$RBACBindingConfig {
2866+
/**
2867+
* Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjects system:authenticated.
2868+
*/
2869+
enableInsecureBindingSystemAuthenticated?: boolean | null;
2870+
/**
2871+
* Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjets system:anonymous or system:unauthenticated.
2872+
*/
2873+
enableInsecureBindingSystemUnauthenticated?: boolean | null;
2874+
}
28422875
/**
28432876
* Represents an arbitrary window of time that recurs.
28442877
*/
@@ -3002,6 +3035,15 @@ export namespace container_v1 {
30023035
* SecondaryBootDiskUpdateStrategy is a placeholder which will be extended in the future to define different options for updating secondary boot disks.
30033036
*/
30043037
export interface Schema$SecondaryBootDiskUpdateStrategy {}
3038+
/**
3039+
* SecretManagerConfig is config for secret manager enablement.
3040+
*/
3041+
export interface Schema$SecretManagerConfig {
3042+
/**
3043+
* Enable/Disable Secret Manager Config.
3044+
*/
3045+
enabled?: boolean | null;
3046+
}
30053047
/**
30063048
* SecurityBulletinEvent is a notification sent to customers when a security bulletin has been posted that they are vulnerable to.
30073049
*/
@@ -3714,6 +3756,10 @@ export namespace container_v1 {
37143756
* Desired resource manager tag keys and values to be attached to the nodes for managing Compute Engine firewalls using Network Firewall Policies. Existing tags will be replaced with new values.
37153757
*/
37163758
resourceManagerTags?: Schema$ResourceManagerTags;
3759+
/**
3760+
* List of Storage Pools where boot disks are provisioned. Existing Storage Pools will be replaced with storage-pools.
3761+
*/
3762+
storagePools?: string[] | null;
37173763
/**
37183764
* The desired network tags to be applied to all nodes in the node pool. If this field is not present, the tags will not be changed. Otherwise, the existing network tags will be *replaced* with the provided tags.
37193765
*/

src/apis/container/v1beta1.ts

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -849,6 +849,10 @@ export namespace container_v1beta1 {
849849
* Deprecated: Use SecurityPostureConfig instead. Enable/Disable Protect API features for the cluster.
850850
*/
851851
protectConfig?: Schema$ProtectConfig;
852+
/**
853+
* RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
854+
*/
855+
rbacBindingConfig?: Schema$RBACBindingConfig;
852856
/**
853857
* Release channel configuration. If left unspecified on cluster creation and a version is specified, the cluster is enrolled in the most mature release channel where the version is available (first checking STABLE, then REGULAR, and finally RAPID). Otherwise, if no release channel configuration and no version is specified, the cluster is enrolled in the REGULAR channel with its default version.
854858
*/
@@ -1181,6 +1185,10 @@ export namespace container_v1beta1 {
11811185
* Deprecated: Use DesiredSecurityPostureConfig instead. Enable/Disable Protect API features for the cluster.
11821186
*/
11831187
desiredProtectConfig?: Schema$ProtectConfig;
1188+
/**
1189+
* RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
1190+
*/
1191+
desiredRbacBindingConfig?: Schema$RBACBindingConfig;
11841192
/**
11851193
* The desired release channel configuration.
11861194
*/
@@ -2134,7 +2142,7 @@ export namespace container_v1beta1 {
21342142
*/
21352143
export interface Schema$MasterAuth {
21362144
/**
2137-
* Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint.
2145+
* Output only. Base64-encoded public certificate used by clients to authenticate to the cluster endpoint. Issued only if client_certificate_config is set.
21382146
*/
21392147
clientCertificate?: string | null;
21402148
/**
@@ -3171,6 +3179,19 @@ export namespace container_v1beta1 {
31713179
*/
31723180
rayClusterMonitoringConfig?: Schema$RayClusterMonitoringConfig;
31733181
}
3182+
/**
3183+
* RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
3184+
*/
3185+
export interface Schema$RBACBindingConfig {
3186+
/**
3187+
* Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjects system:authenticated.
3188+
*/
3189+
enableInsecureBindingSystemAuthenticated?: boolean | null;
3190+
/**
3191+
* Setting this to true will allow any ClusterRoleBinding and RoleBinding with subjets system:anonymous or system:unauthenticated.
3192+
*/
3193+
enableInsecureBindingSystemUnauthenticated?: boolean | null;
3194+
}
31743195
/**
31753196
* Represents an arbitrary window of time that recurs.
31763197
*/

0 commit comments

Comments
 (0)