Skip to content

Commit

Permalink
feat(all): auto-regenerate discovery clients (#2831)
Browse files Browse the repository at this point in the history
  • Loading branch information
yoshi-automation authored Oct 20, 2024
1 parent 64042ed commit d094279
Show file tree
Hide file tree
Showing 36 changed files with 703 additions and 100 deletions.
6 changes: 5 additions & 1 deletion apikeys/v2/apikeys-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -396,7 +396,7 @@
}
}
},
"revision": "20240811",
"revision": "20241016",
"rootUrl": "https://apikeys.googleapis.com/",
"schemas": {
"Operation": {
Expand Down Expand Up @@ -593,6 +593,10 @@
"$ref": "V2Restrictions",
"description": "Key restrictions."
},
"serviceAccountEmail": {
"description": "Optional. The email address of [the service account](https://cloud.google.com/iam/docs/service-accounts) the key is bound to.",
"type": "string"
},
"uid": {
"description": "Output only. Unique id in UUID4 format.",
"readOnly": true,
Expand Down
3 changes: 3 additions & 0 deletions apikeys/v2/apikeys-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

67 changes: 60 additions & 7 deletions artifactregistry/v1/artifactregistry-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -2334,7 +2334,7 @@
],
"parameters": {
"name": {
"description": "The name of the rule, for example: \"projects/p1/locations/us-central1/repositories/repo1/rules/rule1\".",
"description": "The name of the rule, for example: `projects/p1/locations/us-central1/repositories/repo1/rules/rule1`.",
"location": "path",
"pattern": "^projects/[^/]+/locations/[^/]+/repositories/[^/]+/rules/[^/]+$",
"required": true,
Expand Down Expand Up @@ -2439,7 +2439,7 @@
}
}
},
"revision": "20241010",
"revision": "20241011",
"rootUrl": "https://artifactregistry.googleapis.com/",
"schemas": {
"AptArtifact": {
Expand Down Expand Up @@ -3101,11 +3101,11 @@
"type": "object"
},
"GoogleDevtoolsArtifactregistryV1Rule": {
"description": "A Rule applies to repository or package level. It defines the deny or allow action of the operation when the conditions in the rule are met.",
"description": "A rule defines the deny or allow action of the operation it applies to and the conditions required for the rule to apply. You can set one rule for an entire repository and one rule for each package within.",
"id": "GoogleDevtoolsArtifactregistryV1Rule",
"properties": {
"action": {
"description": "The action this rule makes.",
"description": "The action this rule takes.",
"enum": [
"ACTION_UNSPECIFIED",
"ALLOW",
Expand All @@ -3120,10 +3120,10 @@
},
"condition": {
"$ref": "Expr",
"description": "Optional. The condition of the rule in CEL expression. If not provided, the rule matches all the objects."
"description": "Optional. A CEL expression for conditions that must be met in order for the rule to apply. If not provided, the rule matches all objects."
},
"name": {
"description": "The name of the rule, for example: \"projects/p1/locations/us-central1/repositories/repo1/rules/rule1\".",
"description": "The name of the rule, for example: `projects/p1/locations/us-central1/repositories/repo1/rules/rule1`.",
"type": "string"
},
"operation": {
Expand All @@ -3138,7 +3138,7 @@
"type": "string"
},
"packageId": {
"description": "The package ID the rule applies to. If empty, this rule applies to all the packages inside the repository.",
"description": "The package ID the rule applies to. If empty, this rule applies to all packages inside the repository.",
"type": "string"
}
},
Expand Down Expand Up @@ -4174,6 +4174,10 @@
"virtualRepositoryConfig": {
"$ref": "VirtualRepositoryConfig",
"description": "Configuration specific for a Virtual Repository."
},
"vulnerabilityScanningConfig": {
"$ref": "VulnerabilityScanningConfig",
"description": "Optional. Config and state for vulnerability scanning of resources within this Repository."
}
},
"type": "object"
Expand Down Expand Up @@ -4619,6 +4623,55 @@
},
"type": "object"
},
"VulnerabilityScanningConfig": {
"description": "Config on whether to perform vulnerability scanning for resources in this repository, as well as output fields describing current state.",
"id": "VulnerabilityScanningConfig",
"properties": {
"enablementConfig": {
"description": "Optional. Config for whether this repository has vulnerability scanning disabled.",
"enum": [
"ENABLEMENT_CONFIG_UNSPECIFIED",
"INHERITED",
"DISABLED"
],
"enumDescriptions": [
"Not set. This will be treated as INHERITED.",
"Scanning is Enabled, but dependent on API enablement.",
"No automatic vulnerability scanning will be performed for this repository."
],
"type": "string"
},
"enablementState": {
"description": "Output only. State of feature enablement, combining repository enablement config and API enablement state.",
"enum": [
"ENABLEMENT_STATE_UNSPECIFIED",
"SCANNING_UNSUPPORTED",
"SCANNING_DISABLED",
"SCANNING_ACTIVE"
],
"enumDescriptions": [
"Enablement state is unclear.",
"Repository does not support vulnerability scanning.",
"Vulnerability scanning is disabled for this repository.",
"Vulnerability scanning is active for this repository."
],
"readOnly": true,
"type": "string"
},
"enablementStateReason": {
"description": "Output only. Reason for the repository state.",
"readOnly": true,
"type": "string"
},
"lastEnableTime": {
"description": "Output only. The last time this repository config was enabled.",
"format": "google-datetime",
"readOnly": true,
"type": "string"
}
},
"type": "object"
},
"YumArtifact": {
"description": "A detailed representation of a Yum artifact.",
"id": "YumArtifact",
Expand Down
70 changes: 61 additions & 9 deletions artifactregistry/v1/artifactregistry-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions beyondcorp/v1alpha/beyondcorp-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -4408,7 +4408,7 @@
}
}
},
"revision": "20241004",
"revision": "20241011",
"rootUrl": "https://beyondcorp.googleapis.com/",
"schemas": {
"AllocatedConnection": {
Expand Down Expand Up @@ -6766,7 +6766,7 @@
},
"type": "array"
},
"targetVpcNetwork": {
"targetNetwork": {
"description": "Required. The name of the Target VPC network name in the format: `projects/{project}/global/networks/{network}",
"type": "string"
}
Expand Down
4 changes: 2 additions & 2 deletions beyondcorp/v1alpha/beyondcorp-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

52 changes: 51 additions & 1 deletion clouddeploy/v1/clouddeploy-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -2289,7 +2289,7 @@
}
}
},
"revision": "20241002",
"revision": "20241010",
"rootUrl": "https://clouddeploy.googleapis.com/",
"schemas": {
"AbandonReleaseRequest": {
Expand Down Expand Up @@ -2442,6 +2442,27 @@
"properties": {},
"type": "object"
},
"AssociatedEntities": {
"description": "Information about entities associated with a `Target`.",
"id": "AssociatedEntities",
"properties": {
"anthosClusters": {
"description": "Optional. Information specifying Anthos clusters as associated entities.",
"items": {
"$ref": "AnthosCluster"
},
"type": "array"
},
"gkeClusters": {
"description": "Optional. Information specifying GKE clusters as associated entities.",
"items": {
"$ref": "GkeCluster"
},
"type": "array"
}
},
"type": "object"
},
"AuditConfig": {
"description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user:jose@example.com\" ] }, { \"log_type\": \"DATA_WRITE\" }, { \"log_type\": \"ADMIN_READ\" } ] }, { \"service\": \"sampleservice.googleapis.com\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\" }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user:aliya@example.com\" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts `jose@example.com` from DATA_READ logging, and `aliya@example.com` from DATA_WRITE logging.",
"id": "AuditConfig",
Expand Down Expand Up @@ -3989,6 +4010,10 @@
"description": "Optional. The label to use when selecting Pods for the Deployment and Service resources. This label must already be present in both resources.",
"type": "string"
},
"routeDestinations": {
"$ref": "RouteDestinations",
"description": "Optional. Route destinations allow configuring the Gateway API HTTPRoute to be deployed to additional clusters. This option is available for multi-cluster service mesh set ups that require the route to exist in the clusters that call the service. If unspecified, the HTTPRoute will only be deployed to the Target cluster."
},
"routeUpdateWaitTime": {
"description": "Optional. The time to wait for route updates to propagate. The maximum configurable time is 3 hours, in seconds format. If unspecified, there is no wait time.",
"format": "google-duration",
Expand Down Expand Up @@ -6308,6 +6333,24 @@
},
"type": "object"
},
"RouteDestinations": {
"description": "Information about route destinations for the Gateway API service mesh.",
"id": "RouteDestinations",
"properties": {
"destinationIds": {
"description": "Required. The clusters where the Gateway API HTTPRoute resource will be deployed to. Valid entries include the associated entities IDs configured in the Target resource and \"@self\" to include the Target cluster.",
"items": {
"type": "string"
},
"type": "array"
},
"propagateService": {
"description": "Optional. Whether to propagate the Kubernetes Service to the route destination clusters. The Service will always be deployed to the Target cluster even if the HTTPRoute is not. This option may be used to facilitiate successful DNS lookup in the route destination clusters. Can only be set to true if destinations are specified.",
"type": "boolean"
}
},
"type": "object"
},
"RuntimeConfig": {
"description": "RuntimeConfig contains the runtime specific configurations for a deployment strategy.",
"id": "RuntimeConfig",
Expand Down Expand Up @@ -6622,6 +6665,13 @@
"$ref": "AnthosCluster",
"description": "Optional. Information specifying an Anthos Cluster."
},
"associatedEntities": {
"additionalProperties": {
"$ref": "AssociatedEntities"
},
"description": "Optional. Map of entity IDs to their associated entities. Associated entities allows specifying places other than the deployment target for specific features. For example, the Gateway API canary can be configured to deploy the HTTPRoute to a different cluster(s) than the deployment cluster using associated entities. An entity ID must consist of lower-case letters, numbers, and hyphens, start with a letter and end with a letter or a number, and have a max length of 63 characters. In other words, it must match the following regex: `^[a-z]([a-z0-9-]{0,61}[a-z0-9])?$`.",
"type": "object"
},
"createTime": {
"description": "Output only. Time at which the `Target` was created.",
"format": "google-datetime",
Expand Down
Loading

0 comments on commit d094279

Please sign in to comment.