google-cloud-gke_multi_cloud-v1 0.10.1 → 0.11.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/lib/google/cloud/gke_multi_cloud/v1/attached_clusters/client.rb +2 -1
- data/lib/google/cloud/gke_multi_cloud/v1/attached_clusters/rest/client.rb +2 -1
- data/lib/google/cloud/gke_multi_cloud/v1/version.rb +1 -1
- data/lib/google/cloud/gkemulticloud/v1/attached_resources_pb.rb +1 -1
- data/lib/google/cloud/gkemulticloud/v1/aws_resources_pb.rb +1 -1
- data/lib/google/cloud/gkemulticloud/v1/common_resources_pb.rb +4 -1
- data/proto_docs/google/cloud/gkemulticloud/v1/attached_resources.rb +3 -0
- data/proto_docs/google/cloud/gkemulticloud/v1/attached_service.rb +2 -1
- data/proto_docs/google/cloud/gkemulticloud/v1/aws_resources.rb +4 -1
- data/proto_docs/google/cloud/gkemulticloud/v1/azure_resources.rb +1 -1
- data/proto_docs/google/cloud/gkemulticloud/v1/common_resources.rb +74 -0
- metadata +8 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cac8b32a44af8c0b227d8434d3068c2af5f56ed723387dcbd6d7a6ef8693a74b
|
4
|
+
data.tar.gz: 7c4e678307265920ce85019d0993bd142c0f4b8b068c03d5a2f79c8ecc9656f9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 43533a6a794f5a7f88e1139b0a7eb2a2d20ee56bd02b40964d638ac77eaf79092baf8a2d34d35da46d8a91215bc1f93ab4f8ec7fa46308312d5fec200dc20bd4
|
7
|
+
data.tar.gz: 28c0cd27a3f9eff155f4f4ee50b25e79d1d5d0fa92526026b6135aa41eaa33fe11011377f164c4a2fcf88c3d4e0162c791a3bd42d77818835ba27f3dec3d0705
|
data/README.md
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
# Ruby Client for the Anthos Multi-Cloud V1 API
|
2
2
|
|
3
|
-
|
3
|
+
GKE Multi-Cloud provides a way to manage Kubernetes clusters that run on AWS and Azure infrastructure using the GKE Multi-Cloud API. Combined with Connect, you can manage Kubernetes clusters on Google Cloud, AWS, and Azure from the Google Cloud Console. When you create a cluster with GKE Multi-Cloud, Google creates the resources needed and brings up a cluster on your behalf. You can deploy workloads with the GKE Multi-Cloud API or the gcloud and kubectl command-line tools.
|
4
4
|
|
5
5
|
Anthos Multi-Cloud provides a way to manage Kubernetes clusters that run on AWS and Azure infrastructure using the Anthos Multi-Cloud API. Combined with Connect, you can manage Kubernetes clusters on Google Cloud, AWS, and Azure from the Google Cloud Console.
|
6
6
|
|
@@ -375,6 +375,7 @@ module Google
|
|
375
375
|
# * `platform_version`.
|
376
376
|
# * `proxy_config.kubernetes_secret.name`.
|
377
377
|
# * `proxy_config.kubernetes_secret.namespace`.
|
378
|
+
# * `security_posture_config.vulnerability_mode`
|
378
379
|
#
|
379
380
|
# @yield [response, operation] Access the result along with the RPC operation
|
380
381
|
# @yieldparam response [::Gapic::Operation]
|
@@ -498,7 +499,7 @@ module Google
|
|
498
499
|
# @param distribution [::String]
|
499
500
|
# Required. The Kubernetes distribution of the underlying attached cluster.
|
500
501
|
#
|
501
|
-
# Supported values: ["eks", "aks"].
|
502
|
+
# Supported values: ["eks", "aks", "generic"].
|
502
503
|
# @param proxy_config [::Google::Cloud::GkeMultiCloud::V1::AttachedProxyConfig, ::Hash]
|
503
504
|
# Optional. Proxy configuration for outbound HTTP(S) traffic.
|
504
505
|
#
|
@@ -361,6 +361,7 @@ module Google
|
|
361
361
|
# * `platform_version`.
|
362
362
|
# * `proxy_config.kubernetes_secret.name`.
|
363
363
|
# * `proxy_config.kubernetes_secret.namespace`.
|
364
|
+
# * `security_posture_config.vulnerability_mode`
|
364
365
|
# @yield [result, operation] Access the result along with the TransportOperation object
|
365
366
|
# @yieldparam result [::Gapic::Operation]
|
366
367
|
# @yieldparam operation [::Gapic::Rest::TransportOperation]
|
@@ -477,7 +478,7 @@ module Google
|
|
477
478
|
# @param distribution [::String]
|
478
479
|
# Required. The Kubernetes distribution of the underlying attached cluster.
|
479
480
|
#
|
480
|
-
# Supported values: ["eks", "aks"].
|
481
|
+
# Supported values: ["eks", "aks", "generic"].
|
481
482
|
# @param proxy_config [::Google::Cloud::GkeMultiCloud::V1::AttachedProxyConfig, ::Hash]
|
482
483
|
# Optional. Proxy configuration for outbound HTTP(S) traffic.
|
483
484
|
# @yield [result, operation] Access the result along with the TransportOperation object
|
@@ -10,7 +10,7 @@ require 'google/cloud/gkemulticloud/v1/common_resources_pb'
|
|
10
10
|
require 'google/protobuf/timestamp_pb'
|
11
11
|
|
12
12
|
|
13
|
-
descriptor_data = "\n6google/cloud/gkemulticloud/v1/attached_resources.proto\x12\x1dgoogle.cloud.gkemulticloud.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x34google/cloud/gkemulticloud/v1/common_resources.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\
|
13
|
+
descriptor_data = "\n6google/cloud/gkemulticloud/v1/attached_resources.proto\x12\x1dgoogle.cloud.gkemulticloud.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x34google/cloud/gkemulticloud/v1/common_resources.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"\xce\x0c\n\x0f\x41ttachedCluster\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x18\n\x0b\x64\x65scription\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12K\n\x0boidc_config\x18\x03 \x01(\x0b\x32\x31.google.cloud.gkemulticloud.v1.AttachedOidcConfigB\x03\xe0\x41\x02\x12\x1d\n\x10platform_version\x18\x04 \x01(\tB\x03\xe0\x41\x02\x12\x19\n\x0c\x64istribution\x18\x10 \x01(\tB\x03\xe0\x41\x02\x12\x1b\n\x0e\x63luster_region\x18\x16 \x01(\tB\x03\xe0\x41\x03\x12\x38\n\x05\x66leet\x18\x05 \x01(\x0b\x32$.google.cloud.gkemulticloud.v1.FleetB\x03\xe0\x41\x02\x12H\n\x05state\x18\x06 \x01(\x0e\x32\x34.google.cloud.gkemulticloud.v1.AttachedCluster.StateB\x03\xe0\x41\x03\x12\x10\n\x03uid\x18\x07 \x01(\tB\x03\xe0\x41\x03\x12\x18\n\x0breconciling\x18\x08 \x01(\x08\x42\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\t \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\n \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x0c\n\x04\x65tag\x18\x0b \x01(\t\x12\x1f\n\x12kubernetes_version\x18\x0c \x01(\tB\x03\xe0\x41\x03\x12Y\n\x0b\x61nnotations\x18\r \x03(\x0b\x32?.google.cloud.gkemulticloud.v1.AttachedCluster.AnnotationsEntryB\x03\xe0\x41\x01\x12\\\n\x18workload_identity_config\x18\x0e \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.WorkloadIdentityConfigB\x03\xe0\x41\x03\x12I\n\x0elogging_config\x18\x0f \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.LoggingConfigB\x03\xe0\x41\x01\x12H\n\x06\x65rrors\x18\x14 \x03(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AttachedClusterErrorB\x03\xe0\x41\x03\x12X\n\rauthorization\x18\x15 \x01(\x0b\x32<.google.cloud.gkemulticloud.v1.AttachedClustersAuthorizationB\x03\xe0\x41\x01\x12O\n\x11monitoring_config\x18\x17 \x01(\x0b\x32/.google.cloud.gkemulticloud.v1.MonitoringConfigB\x03\xe0\x41\x01\x12M\n\x0cproxy_config\x18\x18 \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.AttachedProxyConfigB\x03\xe0\x41\x01\x12U\n\x14\x62inary_authorization\x18\x19 \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.BinaryAuthorizationB\x03\xe0\x41\x01\x12Z\n\x17security_posture_config\x18\x1a \x01(\x0b\x32\x34.google.cloud.gkemulticloud.v1.SecurityPostureConfigB\x03\xe0\x41\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"u\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x10\n\x0cPROVISIONING\x10\x01\x12\x0b\n\x07RUNNING\x10\x02\x12\x0f\n\x0bRECONCILING\x10\x03\x12\x0c\n\x08STOPPING\x10\x04\x12\t\n\x05\x45RROR\x10\x05\x12\x0c\n\x08\x44\x45GRADED\x10\x06:~\xea\x41{\n,gkemulticloud.googleapis.com/AttachedCluster\x12Kprojects/{project}/locations/{location}/attachedClusters/{attached_cluster}\"\xbd\x01\n\x1d\x41ttachedClustersAuthorization\x12L\n\x0b\x61\x64min_users\x18\x01 \x03(\x0b\x32\x32.google.cloud.gkemulticloud.v1.AttachedClusterUserB\x03\xe0\x41\x01\x12N\n\x0c\x61\x64min_groups\x18\x02 \x03(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AttachedClusterGroupB\x03\xe0\x41\x01\",\n\x13\x41ttachedClusterUser\x12\x15\n\x08username\x18\x01 \x01(\tB\x03\xe0\x41\x02\"*\n\x14\x41ttachedClusterGroup\x12\x12\n\x05group\x18\x01 \x01(\tB\x03\xe0\x41\x02\";\n\x12\x41ttachedOidcConfig\x12\x12\n\nissuer_url\x18\x01 \x01(\t\x12\x11\n\x04jwks\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\"\xee\x01\n\x14\x41ttachedServerConfig\x12\x0c\n\x04name\x18\x01 \x01(\t\x12R\n\x0evalid_versions\x18\x02 \x03(\x0b\x32:.google.cloud.gkemulticloud.v1.AttachedPlatformVersionInfo:t\xea\x41q\n1gkemulticloud.googleapis.com/AttachedServerConfig\x12<projects/{project}/locations/{location}/attachedServerConfig\".\n\x1b\x41ttachedPlatformVersionInfo\x12\x0f\n\x07version\x18\x01 \x01(\t\"\'\n\x14\x41ttachedClusterError\x12\x0f\n\x07message\x18\x01 \x01(\t\"a\n\x13\x41ttachedProxyConfig\x12J\n\x11kubernetes_secret\x18\x01 \x01(\x0b\x32/.google.cloud.gkemulticloud.v1.KubernetesSecret\"3\n\x10KubernetesSecret\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x11\n\tnamespace\x18\x02 \x01(\tB\xe9\x01\n!com.google.cloud.gkemulticloud.v1B\x16\x41ttachedResourcesProtoP\x01ZGcloud.google.com/go/gkemulticloud/apiv1/gkemulticloudpb;gkemulticloudpb\xaa\x02\x1dGoogle.Cloud.GkeMultiCloud.V1\xca\x02\x1dGoogle\\Cloud\\GkeMultiCloud\\V1\xea\x02 Google::Cloud::GkeMultiCloud::V1b\x06proto3"
|
14
14
|
|
15
15
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
16
16
|
|
@@ -11,7 +11,7 @@ require 'google/protobuf/timestamp_pb'
|
|
11
11
|
require 'google/type/date_pb'
|
12
12
|
|
13
13
|
|
14
|
-
descriptor_data = "\n1google/cloud/gkemulticloud/v1/aws_resources.proto\x12\x1dgoogle.cloud.gkemulticloud.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x34google/cloud/gkemulticloud/v1/common_resources.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x16google/type/date.proto\"\x9d\x0b\n\nAwsCluster\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x18\n\x0b\x64\x65scription\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12L\n\nnetworking\x18\x03 \x01(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AwsClusterNetworkingB\x03\xe0\x41\x02\x12\x17\n\naws_region\x18\x04 \x01(\tB\x03\xe0\x41\x02\x12J\n\rcontrol_plane\x18\x05 \x01(\x0b\x32..google.cloud.gkemulticloud.v1.AwsControlPlaneB\x03\xe0\x41\x02\x12K\n\rauthorization\x18\x0f \x01(\x0b\x32/.google.cloud.gkemulticloud.v1.AwsAuthorizationB\x03\xe0\x41\x02\x12\x43\n\x05state\x18\x07 \x01(\x0e\x32/.google.cloud.gkemulticloud.v1.AwsCluster.StateB\x03\xe0\x41\x03\x12\x15\n\x08\x65ndpoint\x18\x08 \x01(\tB\x03\xe0\x41\x03\x12\x10\n\x03uid\x18\t \x01(\tB\x03\xe0\x41\x03\x12\x18\n\x0breconciling\x18\n \x01(\x08\x42\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x0c \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x0c\n\x04\x65tag\x18\r \x01(\t\x12T\n\x0b\x61nnotations\x18\x0e \x03(\x0b\x32:.google.cloud.gkemulticloud.v1.AwsCluster.AnnotationsEntryB\x03\xe0\x41\x01\x12\\\n\x18workload_identity_config\x18\x10 \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.WorkloadIdentityConfigB\x03\xe0\x41\x03\x12#\n\x16\x63luster_ca_certificate\x18\x11 \x01(\tB\x03\xe0\x41\x03\x12\x38\n\x05\x66leet\x18\x12 \x01(\x0b\x32$.google.cloud.gkemulticloud.v1.FleetB\x03\xe0\x41\x02\x12I\n\x0elogging_config\x18\x13 \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.LoggingConfigB\x03\xe0\x41\x01\x12\x43\n\x06\x65rrors\x18\x14 \x03(\x0b\x32..google.cloud.gkemulticloud.v1.AwsClusterErrorB\x03\xe0\x41\x03\x12O\n\x11monitoring_config\x18\x15 \x01(\x0b\x32/.google.cloud.gkemulticloud.v1.MonitoringConfigB\x03\xe0\x41\x01\x12U\n\x14\x62inary_authorization\x18\x16 \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.BinaryAuthorizationB\x03\xe0\x41\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"u\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x10\n\x0cPROVISIONING\x10\x01\x12\x0b\n\x07RUNNING\x10\x02\x12\x0f\n\x0bRECONCILING\x10\x03\x12\x0c\n\x08STOPPING\x10\x04\x12\t\n\x05\x45RROR\x10\x05\x12\x0c\n\x08\x44\x45GRADED\x10\x06:o\xea\x41l\n\'gkemulticloud.googleapis.com/AwsCluster\x12\x41projects/{project}/locations/{location}/awsClusters/{aws_cluster}\"\xa8\x07\n\x0f\x41wsControlPlane\x12\x14\n\x07version\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x1a\n\rinstance_type\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12\x44\n\nssh_config\x18\x0e \x01(\x0b\x32+.google.cloud.gkemulticloud.v1.AwsSshConfigB\x03\xe0\x41\x01\x12\x17\n\nsubnet_ids\x18\x04 \x03(\tB\x03\xe0\x41\x02\x12\x1f\n\x12security_group_ids\x18\x05 \x03(\tB\x03\xe0\x41\x01\x12!\n\x14iam_instance_profile\x18\x07 \x01(\tB\x03\xe0\x41\x02\x12J\n\x0broot_volume\x18\x08 \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsVolumeTemplateB\x03\xe0\x41\x01\x12J\n\x0bmain_volume\x18\t \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsVolumeTemplateB\x03\xe0\x41\x01\x12V\n\x13\x64\x61tabase_encryption\x18\n \x01(\x0b\x32\x34.google.cloud.gkemulticloud.v1.AwsDatabaseEncryptionB\x03\xe0\x41\x02\x12K\n\x04tags\x18\x0b \x03(\x0b\x32\x38.google.cloud.gkemulticloud.v1.AwsControlPlane.TagsEntryB\x03\xe0\x41\x01\x12\x62\n\x1b\x61ws_services_authentication\x18\x0c \x01(\x0b\x32\x38.google.cloud.gkemulticloud.v1.AwsServicesAuthenticationB\x03\xe0\x41\x02\x12H\n\x0cproxy_config\x18\x10 \x01(\x0b\x32-.google.cloud.gkemulticloud.v1.AwsProxyConfigB\x03\xe0\x41\x01\x12R\n\x11\x63onfig_encryption\x18\x11 \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.AwsConfigEncryptionB\x03\xe0\x41\x02\x12T\n\x12instance_placement\x18\x12 \x01(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AwsInstancePlacementB\x03\xe0\x41\x01\x1a+\n\tTagsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"R\n\x19\x41wsServicesAuthentication\x12\x15\n\x08role_arn\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x1e\n\x11role_session_name\x18\x02 \x01(\tB\x03\xe0\x41\x01\"\xa6\x01\n\x10\x41wsAuthorization\x12G\n\x0b\x61\x64min_users\x18\x01 \x03(\x0b\x32-.google.cloud.gkemulticloud.v1.AwsClusterUserB\x03\xe0\x41\x01\x12I\n\x0c\x61\x64min_groups\x18\x02 \x03(\x0b\x32..google.cloud.gkemulticloud.v1.AwsClusterGroupB\x03\xe0\x41\x01\"\'\n\x0e\x41wsClusterUser\x12\x15\n\x08username\x18\x01 \x01(\tB\x03\xe0\x41\x02\"%\n\x0f\x41wsClusterGroup\x12\x12\n\x05group\x18\x01 \x01(\tB\x03\xe0\x41\x02\"1\n\x15\x41wsDatabaseEncryption\x12\x18\n\x0bkms_key_arn\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\x84\x02\n\x11\x41wsVolumeTemplate\x12\x15\n\x08size_gib\x18\x01 \x01(\x05\x42\x03\xe0\x41\x01\x12U\n\x0bvolume_type\x18\x02 \x01(\x0e\x32;.google.cloud.gkemulticloud.v1.AwsVolumeTemplate.VolumeTypeB\x03\xe0\x41\x01\x12\x11\n\x04iops\x18\x03 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\nthroughput\x18\x05 \x01(\x05\x42\x03\xe0\x41\x01\x12\x18\n\x0bkms_key_arn\x18\x04 \x01(\tB\x03\xe0\x41\x01\";\n\nVolumeType\x12\x1b\n\x17VOLUME_TYPE_UNSPECIFIED\x10\x00\x12\x07\n\x03GP2\x10\x01\x12\x07\n\x03GP3\x10\x02\"\xa9\x01\n\x14\x41wsClusterNetworking\x12\x13\n\x06vpc_id\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12$\n\x17pod_address_cidr_blocks\x18\x02 \x03(\tB\x03\xe0\x41\x02\x12(\n\x1bservice_address_cidr_blocks\x18\x03 \x03(\tB\x03\xe0\x41\x02\x12,\n\x1fper_node_pool_sg_rules_disabled\x18\x05 \x01(\x08\x42\x03\xe0\x41\x01\"\x8e\t\n\x0b\x41wsNodePool\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x14\n\x07version\x18\x03 \x01(\tB\x03\xe0\x41\x02\x12\x41\n\x06\x63onfig\x18\x1c \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.AwsNodeConfigB\x03\xe0\x41\x02\x12O\n\x0b\x61utoscaling\x18\x19 \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.AwsNodePoolAutoscalingB\x03\xe0\x41\x02\x12\x16\n\tsubnet_id\x18\x06 \x01(\tB\x03\xe0\x41\x02\x12\x44\n\x05state\x18\x10 \x01(\x0e\x32\x30.google.cloud.gkemulticloud.v1.AwsNodePool.StateB\x03\xe0\x41\x03\x12\x10\n\x03uid\x18\x11 \x01(\tB\x03\xe0\x41\x03\x12\x18\n\x0breconciling\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x13 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x0c\n\x04\x65tag\x18\x15 \x01(\t\x12U\n\x0b\x61nnotations\x18\x16 \x03(\x0b\x32;.google.cloud.gkemulticloud.v1.AwsNodePool.AnnotationsEntryB\x03\xe0\x41\x01\x12R\n\x13max_pods_constraint\x18\x1b \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.MaxPodsConstraintB\x03\xe0\x41\x02\x12\x44\n\x06\x65rrors\x18\x1d \x03(\x0b\x32/.google.cloud.gkemulticloud.v1.AwsNodePoolErrorB\x03\xe0\x41\x03\x12I\n\nmanagement\x18\x1e \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsNodeManagementB\x03\xe0\x41\x01\x12K\n\x0fupdate_settings\x18 \x01(\x0b\x32-.google.cloud.gkemulticloud.v1.UpdateSettingsB\x03\xe0\x41\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"u\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x10\n\x0cPROVISIONING\x10\x01\x12\x0b\n\x07RUNNING\x10\x02\x12\x0f\n\x0bRECONCILING\x10\x03\x12\x0c\n\x08STOPPING\x10\x04\x12\t\n\x05\x45RROR\x10\x05\x12\x0c\n\x08\x44\x45GRADED\x10\x06:\x8e\x01\xea\x41\x8a\x01\n(gkemulticloud.googleapis.com/AwsNodePool\x12^projects/{project}/locations/{location}/awsClusters/{aws_cluster}/awsNodePools/{aws_node_pool}\"[\n\x0eUpdateSettings\x12I\n\x0esurge_settings\x18\x01 \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.SurgeSettingsB\x03\xe0\x41\x01\"E\n\rSurgeSettings\x12\x16\n\tmax_surge\x18\x01 \x01(\x05\x42\x03\xe0\x41\x01\x12\x1c\n\x0fmax_unavailable\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\"-\n\x11\x41wsNodeManagement\x12\x18\n\x0b\x61uto_repair\x18\x01 \x01(\x08\x42\x03\xe0\x41\x01\"\xfa\x07\n\rAwsNodeConfig\x12\x1a\n\rinstance_type\x18\x01 \x01(\tB\x03\xe0\x41\x01\x12J\n\x0broot_volume\x18\x02 \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsVolumeTemplateB\x03\xe0\x41\x01\x12=\n\x06taints\x18\x03 \x03(\x0b\x32(.google.cloud.gkemulticloud.v1.NodeTaintB\x03\xe0\x41\x01\x12M\n\x06labels\x18\x04 \x03(\x0b\x32\x38.google.cloud.gkemulticloud.v1.AwsNodeConfig.LabelsEntryB\x03\xe0\x41\x01\x12I\n\x04tags\x18\x05 \x03(\x0b\x32\x36.google.cloud.gkemulticloud.v1.AwsNodeConfig.TagsEntryB\x03\xe0\x41\x01\x12!\n\x14iam_instance_profile\x18\x06 \x01(\tB\x03\xe0\x41\x02\x12\x17\n\nimage_type\x18\x0b \x01(\tB\x03\xe0\x41\x01\x12\x44\n\nssh_config\x18\t \x01(\x0b\x32+.google.cloud.gkemulticloud.v1.AwsSshConfigB\x03\xe0\x41\x01\x12\x1f\n\x12security_group_ids\x18\n \x03(\tB\x03\xe0\x41\x01\x12H\n\x0cproxy_config\x18\x0c \x01(\x0b\x32-.google.cloud.gkemulticloud.v1.AwsProxyConfigB\x03\xe0\x41\x01\x12R\n\x11\x63onfig_encryption\x18\r \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.AwsConfigEncryptionB\x03\xe0\x41\x02\x12T\n\x12instance_placement\x18\x0e \x01(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AwsInstancePlacementB\x03\xe0\x41\x01\x12p\n\x1e\x61utoscaling_metrics_collection\x18\x0f \x01(\x0b\x32\x43.google.cloud.gkemulticloud.v1.AwsAutoscalingGroupMetricsCollectionB\x03\xe0\x41\x01\x12\x43\n\x0bspot_config\x18\x10 \x01(\x0b\x32).google.cloud.gkemulticloud.v1.SpotConfigB\x03\xe0\x41\x01\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a+\n\tTagsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"R\n\x16\x41wsNodePoolAutoscaling\x12\x1b\n\x0emin_node_count\x18\x01 \x01(\x05\x42\x03\xe0\x41\x02\x12\x1b\n\x0emax_node_count\x18\x02 \x01(\x05\x42\x03\xe0\x41\x02\"\xd4\x01\n\x0f\x41wsOpenIdConfig\x12\x0e\n\x06issuer\x18\x01 \x01(\t\x12\x10\n\x08jwks_uri\x18\x02 \x01(\t\x12 \n\x18response_types_supported\x18\x03 \x03(\t\x12\x1f\n\x17subject_types_supported\x18\x04 \x03(\t\x12-\n%id_token_signing_alg_values_supported\x18\x05 \x03(\t\x12\x18\n\x10\x63laims_supported\x18\x06 \x03(\t\x12\x13\n\x0bgrant_types\x18\x07 \x03(\t\"B\n\x0e\x41wsJsonWebKeys\x12\x30\n\x04keys\x18\x01 \x03(\x0b\x32\".google.cloud.gkemulticloud.v1.Jwk\"\xf4\x01\n\x0f\x41wsServerConfig\x12\x0c\n\x04name\x18\x01 \x01(\t\x12H\n\x0evalid_versions\x18\x02 \x03(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsK8sVersionInfo\x12\x1d\n\x15supported_aws_regions\x18\x03 \x03(\t:j\xea\x41g\n,gkemulticloud.googleapis.com/AwsServerConfig\x12\x37projects/{project}/locations/{location}/awsServerConfig\"\xb4\x01\n\x11\x41wsK8sVersionInfo\x12\x0f\n\x07version\x18\x01 \x01(\t\x12\x14\n\x07\x65nabled\x18\x03 \x01(\x08\x42\x03\xe0\x41\x01\x12\x18\n\x0b\x65nd_of_life\x18\x04 \x01(\x08\x42\x03\xe0\x41\x01\x12\x30\n\x10\x65nd_of_life_date\x18\x05 \x01(\x0b\x32\x11.google.type.DateB\x03\xe0\x41\x01\x12,\n\x0crelease_date\x18\x06 \x01(\x0b\x32\x11.google.type.DateB\x03\xe0\x41\x01\")\n\x0c\x41wsSshConfig\x12\x19\n\x0c\x65\x63\x32_key_pair\x18\x01 \x01(\tB\x03\xe0\x41\x02\"<\n\x0e\x41wsProxyConfig\x12\x12\n\nsecret_arn\x18\x01 \x01(\t\x12\x16\n\x0esecret_version\x18\x02 \x01(\t\"/\n\x13\x41wsConfigEncryption\x12\x18\n\x0bkms_key_arn\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\xb3\x01\n\x14\x41wsInstancePlacement\x12Q\n\x07tenancy\x18\x01 \x01(\x0e\x32;.google.cloud.gkemulticloud.v1.AwsInstancePlacement.TenancyB\x03\xe0\x41\x02\"H\n\x07Tenancy\x12\x17\n\x13TENANCY_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x44\x45\x46\x41ULT\x10\x01\x12\r\n\tDEDICATED\x10\x02\x12\x08\n\x04HOST\x10\x03\"V\n$AwsAutoscalingGroupMetricsCollection\x12\x18\n\x0bgranularity\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x14\n\x07metrics\x18\x02 \x03(\tB\x03\xe0\x41\x01\")\n\nSpotConfig\x12\x1b\n\x0einstance_types\x18\x01 \x03(\tB\x03\xe0\x41\x02\"\"\n\x0f\x41wsClusterError\x12\x0f\n\x07message\x18\x01 \x01(\t\"#\n\x10\x41wsNodePoolError\x12\x0f\n\x07message\x18\x01 \x01(\tB\xe4\x01\n!com.google.cloud.gkemulticloud.v1B\x11\x41wsResourcesProtoP\x01ZGcloud.google.com/go/gkemulticloud/apiv1/gkemulticloudpb;gkemulticloudpb\xaa\x02\x1dGoogle.Cloud.GkeMultiCloud.V1\xca\x02\x1dGoogle\\Cloud\\GkeMultiCloud\\V1\xea\x02 Google::Cloud::GkeMultiCloud::V1b\x06proto3"
|
14
|
+
descriptor_data = "\n1google/cloud/gkemulticloud/v1/aws_resources.proto\x12\x1dgoogle.cloud.gkemulticloud.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x34google/cloud/gkemulticloud/v1/common_resources.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x16google/type/date.proto\"\x9d\x0b\n\nAwsCluster\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x18\n\x0b\x64\x65scription\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12L\n\nnetworking\x18\x03 \x01(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AwsClusterNetworkingB\x03\xe0\x41\x02\x12\x17\n\naws_region\x18\x04 \x01(\tB\x03\xe0\x41\x02\x12J\n\rcontrol_plane\x18\x05 \x01(\x0b\x32..google.cloud.gkemulticloud.v1.AwsControlPlaneB\x03\xe0\x41\x02\x12K\n\rauthorization\x18\x0f \x01(\x0b\x32/.google.cloud.gkemulticloud.v1.AwsAuthorizationB\x03\xe0\x41\x02\x12\x43\n\x05state\x18\x07 \x01(\x0e\x32/.google.cloud.gkemulticloud.v1.AwsCluster.StateB\x03\xe0\x41\x03\x12\x15\n\x08\x65ndpoint\x18\x08 \x01(\tB\x03\xe0\x41\x03\x12\x10\n\x03uid\x18\t \x01(\tB\x03\xe0\x41\x03\x12\x18\n\x0breconciling\x18\n \x01(\x08\x42\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x0b \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x0c \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x0c\n\x04\x65tag\x18\r \x01(\t\x12T\n\x0b\x61nnotations\x18\x0e \x03(\x0b\x32:.google.cloud.gkemulticloud.v1.AwsCluster.AnnotationsEntryB\x03\xe0\x41\x01\x12\\\n\x18workload_identity_config\x18\x10 \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.WorkloadIdentityConfigB\x03\xe0\x41\x03\x12#\n\x16\x63luster_ca_certificate\x18\x11 \x01(\tB\x03\xe0\x41\x03\x12\x38\n\x05\x66leet\x18\x12 \x01(\x0b\x32$.google.cloud.gkemulticloud.v1.FleetB\x03\xe0\x41\x02\x12I\n\x0elogging_config\x18\x13 \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.LoggingConfigB\x03\xe0\x41\x01\x12\x43\n\x06\x65rrors\x18\x14 \x03(\x0b\x32..google.cloud.gkemulticloud.v1.AwsClusterErrorB\x03\xe0\x41\x03\x12O\n\x11monitoring_config\x18\x15 \x01(\x0b\x32/.google.cloud.gkemulticloud.v1.MonitoringConfigB\x03\xe0\x41\x01\x12U\n\x14\x62inary_authorization\x18\x16 \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.BinaryAuthorizationB\x03\xe0\x41\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"u\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x10\n\x0cPROVISIONING\x10\x01\x12\x0b\n\x07RUNNING\x10\x02\x12\x0f\n\x0bRECONCILING\x10\x03\x12\x0c\n\x08STOPPING\x10\x04\x12\t\n\x05\x45RROR\x10\x05\x12\x0c\n\x08\x44\x45GRADED\x10\x06:o\xea\x41l\n\'gkemulticloud.googleapis.com/AwsCluster\x12\x41projects/{project}/locations/{location}/awsClusters/{aws_cluster}\"\xa8\x07\n\x0f\x41wsControlPlane\x12\x14\n\x07version\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x1a\n\rinstance_type\x18\x02 \x01(\tB\x03\xe0\x41\x01\x12\x44\n\nssh_config\x18\x0e \x01(\x0b\x32+.google.cloud.gkemulticloud.v1.AwsSshConfigB\x03\xe0\x41\x01\x12\x17\n\nsubnet_ids\x18\x04 \x03(\tB\x03\xe0\x41\x02\x12\x1f\n\x12security_group_ids\x18\x05 \x03(\tB\x03\xe0\x41\x01\x12!\n\x14iam_instance_profile\x18\x07 \x01(\tB\x03\xe0\x41\x02\x12J\n\x0broot_volume\x18\x08 \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsVolumeTemplateB\x03\xe0\x41\x01\x12J\n\x0bmain_volume\x18\t \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsVolumeTemplateB\x03\xe0\x41\x01\x12V\n\x13\x64\x61tabase_encryption\x18\n \x01(\x0b\x32\x34.google.cloud.gkemulticloud.v1.AwsDatabaseEncryptionB\x03\xe0\x41\x02\x12K\n\x04tags\x18\x0b \x03(\x0b\x32\x38.google.cloud.gkemulticloud.v1.AwsControlPlane.TagsEntryB\x03\xe0\x41\x01\x12\x62\n\x1b\x61ws_services_authentication\x18\x0c \x01(\x0b\x32\x38.google.cloud.gkemulticloud.v1.AwsServicesAuthenticationB\x03\xe0\x41\x02\x12H\n\x0cproxy_config\x18\x10 \x01(\x0b\x32-.google.cloud.gkemulticloud.v1.AwsProxyConfigB\x03\xe0\x41\x01\x12R\n\x11\x63onfig_encryption\x18\x11 \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.AwsConfigEncryptionB\x03\xe0\x41\x02\x12T\n\x12instance_placement\x18\x12 \x01(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AwsInstancePlacementB\x03\xe0\x41\x01\x1a+\n\tTagsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"R\n\x19\x41wsServicesAuthentication\x12\x15\n\x08role_arn\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x1e\n\x11role_session_name\x18\x02 \x01(\tB\x03\xe0\x41\x01\"\xa6\x01\n\x10\x41wsAuthorization\x12G\n\x0b\x61\x64min_users\x18\x01 \x03(\x0b\x32-.google.cloud.gkemulticloud.v1.AwsClusterUserB\x03\xe0\x41\x01\x12I\n\x0c\x61\x64min_groups\x18\x02 \x03(\x0b\x32..google.cloud.gkemulticloud.v1.AwsClusterGroupB\x03\xe0\x41\x01\"\'\n\x0e\x41wsClusterUser\x12\x15\n\x08username\x18\x01 \x01(\tB\x03\xe0\x41\x02\"%\n\x0f\x41wsClusterGroup\x12\x12\n\x05group\x18\x01 \x01(\tB\x03\xe0\x41\x02\"1\n\x15\x41wsDatabaseEncryption\x12\x18\n\x0bkms_key_arn\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\x84\x02\n\x11\x41wsVolumeTemplate\x12\x15\n\x08size_gib\x18\x01 \x01(\x05\x42\x03\xe0\x41\x01\x12U\n\x0bvolume_type\x18\x02 \x01(\x0e\x32;.google.cloud.gkemulticloud.v1.AwsVolumeTemplate.VolumeTypeB\x03\xe0\x41\x01\x12\x11\n\x04iops\x18\x03 \x01(\x05\x42\x03\xe0\x41\x01\x12\x17\n\nthroughput\x18\x05 \x01(\x05\x42\x03\xe0\x41\x01\x12\x18\n\x0bkms_key_arn\x18\x04 \x01(\tB\x03\xe0\x41\x01\";\n\nVolumeType\x12\x1b\n\x17VOLUME_TYPE_UNSPECIFIED\x10\x00\x12\x07\n\x03GP2\x10\x01\x12\x07\n\x03GP3\x10\x02\"\xa9\x01\n\x14\x41wsClusterNetworking\x12\x13\n\x06vpc_id\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12$\n\x17pod_address_cidr_blocks\x18\x02 \x03(\tB\x03\xe0\x41\x02\x12(\n\x1bservice_address_cidr_blocks\x18\x03 \x03(\tB\x03\xe0\x41\x02\x12,\n\x1fper_node_pool_sg_rules_disabled\x18\x05 \x01(\x08\x42\x03\xe0\x41\x01\"\xdd\t\n\x0b\x41wsNodePool\x12\x0c\n\x04name\x18\x01 \x01(\t\x12\x14\n\x07version\x18\x03 \x01(\tB\x03\xe0\x41\x02\x12\x41\n\x06\x63onfig\x18\x1c \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.AwsNodeConfigB\x03\xe0\x41\x02\x12O\n\x0b\x61utoscaling\x18\x19 \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.AwsNodePoolAutoscalingB\x03\xe0\x41\x02\x12\x16\n\tsubnet_id\x18\x06 \x01(\tB\x03\xe0\x41\x02\x12\x44\n\x05state\x18\x10 \x01(\x0e\x32\x30.google.cloud.gkemulticloud.v1.AwsNodePool.StateB\x03\xe0\x41\x03\x12\x10\n\x03uid\x18\x11 \x01(\tB\x03\xe0\x41\x03\x12\x18\n\x0breconciling\x18\x12 \x01(\x08\x42\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x13 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0bupdate_time\x18\x14 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x0c\n\x04\x65tag\x18\x15 \x01(\t\x12U\n\x0b\x61nnotations\x18\x16 \x03(\x0b\x32;.google.cloud.gkemulticloud.v1.AwsNodePool.AnnotationsEntryB\x03\xe0\x41\x01\x12R\n\x13max_pods_constraint\x18\x1b \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.MaxPodsConstraintB\x03\xe0\x41\x02\x12\x44\n\x06\x65rrors\x18\x1d \x03(\x0b\x32/.google.cloud.gkemulticloud.v1.AwsNodePoolErrorB\x03\xe0\x41\x03\x12I\n\nmanagement\x18\x1e \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsNodeManagementB\x03\xe0\x41\x01\x12M\n\x0ekubelet_config\x18\x1f \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.NodeKubeletConfigB\x03\xe0\x41\x01\x12K\n\x0fupdate_settings\x18 \x01(\x0b\x32-.google.cloud.gkemulticloud.v1.UpdateSettingsB\x03\xe0\x41\x01\x1a\x32\n\x10\x41nnotationsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"u\n\x05State\x12\x15\n\x11STATE_UNSPECIFIED\x10\x00\x12\x10\n\x0cPROVISIONING\x10\x01\x12\x0b\n\x07RUNNING\x10\x02\x12\x0f\n\x0bRECONCILING\x10\x03\x12\x0c\n\x08STOPPING\x10\x04\x12\t\n\x05\x45RROR\x10\x05\x12\x0c\n\x08\x44\x45GRADED\x10\x06:\x8e\x01\xea\x41\x8a\x01\n(gkemulticloud.googleapis.com/AwsNodePool\x12^projects/{project}/locations/{location}/awsClusters/{aws_cluster}/awsNodePools/{aws_node_pool}\"[\n\x0eUpdateSettings\x12I\n\x0esurge_settings\x18\x01 \x01(\x0b\x32,.google.cloud.gkemulticloud.v1.SurgeSettingsB\x03\xe0\x41\x01\"E\n\rSurgeSettings\x12\x16\n\tmax_surge\x18\x01 \x01(\x05\x42\x03\xe0\x41\x01\x12\x1c\n\x0fmax_unavailable\x18\x02 \x01(\x05\x42\x03\xe0\x41\x01\"-\n\x11\x41wsNodeManagement\x12\x18\n\x0b\x61uto_repair\x18\x01 \x01(\x08\x42\x03\xe0\x41\x01\"\xfa\x07\n\rAwsNodeConfig\x12\x1a\n\rinstance_type\x18\x01 \x01(\tB\x03\xe0\x41\x01\x12J\n\x0broot_volume\x18\x02 \x01(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsVolumeTemplateB\x03\xe0\x41\x01\x12=\n\x06taints\x18\x03 \x03(\x0b\x32(.google.cloud.gkemulticloud.v1.NodeTaintB\x03\xe0\x41\x01\x12M\n\x06labels\x18\x04 \x03(\x0b\x32\x38.google.cloud.gkemulticloud.v1.AwsNodeConfig.LabelsEntryB\x03\xe0\x41\x01\x12I\n\x04tags\x18\x05 \x03(\x0b\x32\x36.google.cloud.gkemulticloud.v1.AwsNodeConfig.TagsEntryB\x03\xe0\x41\x01\x12!\n\x14iam_instance_profile\x18\x06 \x01(\tB\x03\xe0\x41\x02\x12\x17\n\nimage_type\x18\x0b \x01(\tB\x03\xe0\x41\x01\x12\x44\n\nssh_config\x18\t \x01(\x0b\x32+.google.cloud.gkemulticloud.v1.AwsSshConfigB\x03\xe0\x41\x01\x12\x1f\n\x12security_group_ids\x18\n \x03(\tB\x03\xe0\x41\x01\x12H\n\x0cproxy_config\x18\x0c \x01(\x0b\x32-.google.cloud.gkemulticloud.v1.AwsProxyConfigB\x03\xe0\x41\x01\x12R\n\x11\x63onfig_encryption\x18\r \x01(\x0b\x32\x32.google.cloud.gkemulticloud.v1.AwsConfigEncryptionB\x03\xe0\x41\x02\x12T\n\x12instance_placement\x18\x0e \x01(\x0b\x32\x33.google.cloud.gkemulticloud.v1.AwsInstancePlacementB\x03\xe0\x41\x01\x12p\n\x1e\x61utoscaling_metrics_collection\x18\x0f \x01(\x0b\x32\x43.google.cloud.gkemulticloud.v1.AwsAutoscalingGroupMetricsCollectionB\x03\xe0\x41\x01\x12\x43\n\x0bspot_config\x18\x10 \x01(\x0b\x32).google.cloud.gkemulticloud.v1.SpotConfigB\x03\xe0\x41\x01\x1a-\n\x0bLabelsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\x1a+\n\tTagsEntry\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t:\x02\x38\x01\"R\n\x16\x41wsNodePoolAutoscaling\x12\x1b\n\x0emin_node_count\x18\x01 \x01(\x05\x42\x03\xe0\x41\x02\x12\x1b\n\x0emax_node_count\x18\x02 \x01(\x05\x42\x03\xe0\x41\x02\"\xd4\x01\n\x0f\x41wsOpenIdConfig\x12\x0e\n\x06issuer\x18\x01 \x01(\t\x12\x10\n\x08jwks_uri\x18\x02 \x01(\t\x12 \n\x18response_types_supported\x18\x03 \x03(\t\x12\x1f\n\x17subject_types_supported\x18\x04 \x03(\t\x12-\n%id_token_signing_alg_values_supported\x18\x05 \x03(\t\x12\x18\n\x10\x63laims_supported\x18\x06 \x03(\t\x12\x13\n\x0bgrant_types\x18\x07 \x03(\t\"B\n\x0e\x41wsJsonWebKeys\x12\x30\n\x04keys\x18\x01 \x03(\x0b\x32\".google.cloud.gkemulticloud.v1.Jwk\"\xf4\x01\n\x0f\x41wsServerConfig\x12\x0c\n\x04name\x18\x01 \x01(\t\x12H\n\x0evalid_versions\x18\x02 \x03(\x0b\x32\x30.google.cloud.gkemulticloud.v1.AwsK8sVersionInfo\x12\x1d\n\x15supported_aws_regions\x18\x03 \x03(\t:j\xea\x41g\n,gkemulticloud.googleapis.com/AwsServerConfig\x12\x37projects/{project}/locations/{location}/awsServerConfig\"\xb4\x01\n\x11\x41wsK8sVersionInfo\x12\x0f\n\x07version\x18\x01 \x01(\t\x12\x14\n\x07\x65nabled\x18\x03 \x01(\x08\x42\x03\xe0\x41\x01\x12\x18\n\x0b\x65nd_of_life\x18\x04 \x01(\x08\x42\x03\xe0\x41\x01\x12\x30\n\x10\x65nd_of_life_date\x18\x05 \x01(\x0b\x32\x11.google.type.DateB\x03\xe0\x41\x01\x12,\n\x0crelease_date\x18\x06 \x01(\x0b\x32\x11.google.type.DateB\x03\xe0\x41\x01\")\n\x0c\x41wsSshConfig\x12\x19\n\x0c\x65\x63\x32_key_pair\x18\x01 \x01(\tB\x03\xe0\x41\x02\"<\n\x0e\x41wsProxyConfig\x12\x12\n\nsecret_arn\x18\x01 \x01(\t\x12\x16\n\x0esecret_version\x18\x02 \x01(\t\"/\n\x13\x41wsConfigEncryption\x12\x18\n\x0bkms_key_arn\x18\x01 \x01(\tB\x03\xe0\x41\x02\"\xb3\x01\n\x14\x41wsInstancePlacement\x12Q\n\x07tenancy\x18\x01 \x01(\x0e\x32;.google.cloud.gkemulticloud.v1.AwsInstancePlacement.TenancyB\x03\xe0\x41\x02\"H\n\x07Tenancy\x12\x17\n\x13TENANCY_UNSPECIFIED\x10\x00\x12\x0b\n\x07\x44\x45\x46\x41ULT\x10\x01\x12\r\n\tDEDICATED\x10\x02\x12\x08\n\x04HOST\x10\x03\"V\n$AwsAutoscalingGroupMetricsCollection\x12\x18\n\x0bgranularity\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x14\n\x07metrics\x18\x02 \x03(\tB\x03\xe0\x41\x01\")\n\nSpotConfig\x12\x1b\n\x0einstance_types\x18\x01 \x03(\tB\x03\xe0\x41\x02\"\"\n\x0f\x41wsClusterError\x12\x0f\n\x07message\x18\x01 \x01(\t\"#\n\x10\x41wsNodePoolError\x12\x0f\n\x07message\x18\x01 \x01(\tB\xe4\x01\n!com.google.cloud.gkemulticloud.v1B\x11\x41wsResourcesProtoP\x01ZGcloud.google.com/go/gkemulticloud/apiv1/gkemulticloudpb;gkemulticloudpb\xaa\x02\x1dGoogle.Cloud.GkeMultiCloud.V1\xca\x02\x1dGoogle\\Cloud\\GkeMultiCloud\\V1\xea\x02 Google::Cloud::GkeMultiCloud::V1b\x06proto3"
|
15
15
|
|
16
16
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
17
17
|
|
@@ -8,7 +8,7 @@ require 'google/api/field_behavior_pb'
|
|
8
8
|
require 'google/protobuf/timestamp_pb'
|
9
9
|
|
10
10
|
|
11
|
-
descriptor_data = "\n4google/cloud/gkemulticloud/v1/common_resources.proto\x12\x1dgoogle.cloud.gkemulticloud.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"r\n\x03Jwk\x12\x0b\n\x03kty\x18\x01 \x01(\t\x12\x0b\n\x03\x61lg\x18\x02 \x01(\t\x12\x0b\n\x03use\x18\x03 \x01(\t\x12\x0b\n\x03kid\x18\x04 \x01(\t\x12\t\n\x01n\x18\x05 \x01(\t\x12\t\n\x01\x65\x18\x06 \x01(\t\x12\t\n\x01x\x18\x07 \x01(\t\x12\t\n\x01y\x18\x08 \x01(\t\x12\x0b\n\x03\x63rv\x18\t \x01(\t\"^\n\x16WorkloadIdentityConfig\x12\x12\n\nissuer_uri\x18\x01 \x01(\t\x12\x15\n\rworkload_pool\x18\x02 \x01(\t\x12\x19\n\x11identity_provider\x18\x03 \x01(\t\"3\n\x11MaxPodsConstraint\x12\x1e\n\x11max_pods_per_node\x18\x01 \x01(\x03\x42\x03\xe0\x41\x02\"\x80\x02\n\x11OperationMetadata\x12\x34\n\x0b\x63reate_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x31\n\x08\x65nd_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x13\n\x06target\x18\x03 \x01(\tB\x03\xe0\x41\x03\x12\x1a\n\rstatus_detail\x18\x04 \x01(\tB\x03\xe0\x41\x03\x12\x19\n\x0c\x65rror_detail\x18\x05 \x01(\tB\x03\xe0\x41\x03\x12\x11\n\x04verb\x18\x07 \x01(\tB\x03\xe0\x41\x03\x12#\n\x16requested_cancellation\x18\x06 \x01(\x08\x42\x03\xe0\x41\x03\"\xd2\x01\n\tNodeTaint\x12\x10\n\x03key\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x12\n\x05value\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x44\n\x06\x65\x66\x66\x65\x63t\x18\x03 \x01(\x0e\x32/.google.cloud.gkemulticloud.v1.NodeTaint.EffectB\x03\xe0\x41\x02\"Y\n\x06\x45\x66\x66\x65\x63t\x12\x16\n\x12\x45\x46\x46\x45\x43T_UNSPECIFIED\x10\x00\x12\x0f\n\x0bNO_SCHEDULE\x10\x01\x12\x16\n\x12PREFER_NO_SCHEDULE\x10\x02\x12\x0e\n\nNO_EXECUTE\x10\x03\"6\n\x05\x46leet\x12\x14\n\x07project\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x17\n\nmembership\x18\x02 \x01(\tB\x03\xe0\x41\x03\"`\n\rLoggingConfig\x12O\n\x10\x63omponent_config\x18\x01 \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.LoggingComponentConfig\"\xc2\x01\n\x16LoggingComponentConfig\x12Z\n\x11\x65nable_components\x18\x01 \x03(\x0e\x32?.google.cloud.gkemulticloud.v1.LoggingComponentConfig.Component\"L\n\tComponent\x12\x19\n\x15\x43OMPONENT_UNSPECIFIED\x10\x00\x12\x15\n\x11SYSTEM_COMPONENTS\x10\x01\x12\r\n\tWORKLOADS\x10\x02\"m\n\x10MonitoringConfig\x12Y\n\x19managed_prometheus_config\x18\x02 \x01(\x0b\x32\x36.google.cloud.gkemulticloud.v1.ManagedPrometheusConfig\"*\n\x17ManagedPrometheusConfig\x12\x0f\n\x07\x65nabled\x18\x01 \x01(\x08\"\xd8\x01\n\x13\x42inaryAuthorization\x12Z\n\x0f\x65valuation_mode\x18\x01 \x01(\x0e\x32\x41.google.cloud.gkemulticloud.v1.BinaryAuthorization.EvaluationMode\"e\n\x0e\x45valuationMode\x12\x1f\n\x1b\x45VALUATION_MODE_UNSPECIFIED\x10\x00\x12\x0c\n\x08\x44ISABLED\x10\x01\x12$\n PROJECT_SINGLETON_POLICY_ENFORCE\x10\x02\x42\xe7\x01\n!com.google.cloud.gkemulticloud.v1B\x14\x43ommonResourcesProtoP\x01ZGcloud.google.com/go/gkemulticloud/apiv1/gkemulticloudpb;gkemulticloudpb\xaa\x02\x1dGoogle.Cloud.GkeMultiCloud.V1\xca\x02\x1dGoogle\\Cloud\\GkeMultiCloud\\V1\xea\x02 Google::Cloud::GkeMultiCloud::V1b\x06proto3"
|
11
|
+
descriptor_data = "\n4google/cloud/gkemulticloud/v1/common_resources.proto\x12\x1dgoogle.cloud.gkemulticloud.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x1fgoogle/protobuf/timestamp.proto\"r\n\x03Jwk\x12\x0b\n\x03kty\x18\x01 \x01(\t\x12\x0b\n\x03\x61lg\x18\x02 \x01(\t\x12\x0b\n\x03use\x18\x03 \x01(\t\x12\x0b\n\x03kid\x18\x04 \x01(\t\x12\t\n\x01n\x18\x05 \x01(\t\x12\t\n\x01\x65\x18\x06 \x01(\t\x12\t\n\x01x\x18\x07 \x01(\t\x12\t\n\x01y\x18\x08 \x01(\t\x12\x0b\n\x03\x63rv\x18\t \x01(\t\"^\n\x16WorkloadIdentityConfig\x12\x12\n\nissuer_uri\x18\x01 \x01(\t\x12\x15\n\rworkload_pool\x18\x02 \x01(\t\x12\x19\n\x11identity_provider\x18\x03 \x01(\t\"3\n\x11MaxPodsConstraint\x12\x1e\n\x11max_pods_per_node\x18\x01 \x01(\x03\x42\x03\xe0\x41\x02\"\x80\x02\n\x11OperationMetadata\x12\x34\n\x0b\x63reate_time\x18\x01 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x31\n\x08\x65nd_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x13\n\x06target\x18\x03 \x01(\tB\x03\xe0\x41\x03\x12\x1a\n\rstatus_detail\x18\x04 \x01(\tB\x03\xe0\x41\x03\x12\x19\n\x0c\x65rror_detail\x18\x05 \x01(\tB\x03\xe0\x41\x03\x12\x11\n\x04verb\x18\x07 \x01(\tB\x03\xe0\x41\x03\x12#\n\x16requested_cancellation\x18\x06 \x01(\x08\x42\x03\xe0\x41\x03\"\xd2\x01\n\tNodeTaint\x12\x10\n\x03key\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x12\n\x05value\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12\x44\n\x06\x65\x66\x66\x65\x63t\x18\x03 \x01(\x0e\x32/.google.cloud.gkemulticloud.v1.NodeTaint.EffectB\x03\xe0\x41\x02\"Y\n\x06\x45\x66\x66\x65\x63t\x12\x16\n\x12\x45\x46\x46\x45\x43T_UNSPECIFIED\x10\x00\x12\x0f\n\x0bNO_SCHEDULE\x10\x01\x12\x16\n\x12PREFER_NO_SCHEDULE\x10\x02\x12\x0e\n\nNO_EXECUTE\x10\x03\"\xae\x02\n\x11NodeKubeletConfig\x12\x33\n&insecure_kubelet_readonly_port_enabled\x18\x01 \x01(\x08\x42\x03\xe0\x41\x01\x12$\n\x12\x63pu_manager_policy\x18\x02 \x01(\tB\x03\xe0\x41\x01H\x00\x88\x01\x01\x12\x1f\n\rcpu_cfs_quota\x18\x03 \x01(\x08\x42\x03\xe0\x41\x01H\x01\x88\x01\x01\x12&\n\x14\x63pu_cfs_quota_period\x18\x04 \x01(\tB\x03\xe0\x41\x01H\x02\x88\x01\x01\x12 \n\x0epod_pids_limit\x18\x05 \x01(\x03\x42\x03\xe0\x41\x01H\x03\x88\x01\x01\x42\x15\n\x13_cpu_manager_policyB\x10\n\x0e_cpu_cfs_quotaB\x17\n\x15_cpu_cfs_quota_periodB\x11\n\x0f_pod_pids_limit\"6\n\x05\x46leet\x12\x14\n\x07project\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x17\n\nmembership\x18\x02 \x01(\tB\x03\xe0\x41\x03\"`\n\rLoggingConfig\x12O\n\x10\x63omponent_config\x18\x01 \x01(\x0b\x32\x35.google.cloud.gkemulticloud.v1.LoggingComponentConfig\"\xc2\x01\n\x16LoggingComponentConfig\x12Z\n\x11\x65nable_components\x18\x01 \x03(\x0e\x32?.google.cloud.gkemulticloud.v1.LoggingComponentConfig.Component\"L\n\tComponent\x12\x19\n\x15\x43OMPONENT_UNSPECIFIED\x10\x00\x12\x15\n\x11SYSTEM_COMPONENTS\x10\x01\x12\r\n\tWORKLOADS\x10\x02\"m\n\x10MonitoringConfig\x12Y\n\x19managed_prometheus_config\x18\x02 \x01(\x0b\x32\x36.google.cloud.gkemulticloud.v1.ManagedPrometheusConfig\"*\n\x17ManagedPrometheusConfig\x12\x0f\n\x07\x65nabled\x18\x01 \x01(\x08\"\xd8\x01\n\x13\x42inaryAuthorization\x12Z\n\x0f\x65valuation_mode\x18\x01 \x01(\x0e\x32\x41.google.cloud.gkemulticloud.v1.BinaryAuthorization.EvaluationMode\"e\n\x0e\x45valuationMode\x12\x1f\n\x1b\x45VALUATION_MODE_UNSPECIFIED\x10\x00\x12\x0c\n\x08\x44ISABLED\x10\x01\x12$\n PROJECT_SINGLETON_POLICY_ENFORCE\x10\x02\"\xee\x01\n\x15SecurityPostureConfig\x12\x62\n\x12vulnerability_mode\x18\x01 \x01(\x0e\x32\x46.google.cloud.gkemulticloud.v1.SecurityPostureConfig.VulnerabilityMode\"q\n\x11VulnerabilityMode\x12\"\n\x1eVULNERABILITY_MODE_UNSPECIFIED\x10\x00\x12\x1a\n\x16VULNERABILITY_DISABLED\x10\x01\x12\x1c\n\x18VULNERABILITY_ENTERPRISE\x10\x02\x42\xe7\x01\n!com.google.cloud.gkemulticloud.v1B\x14\x43ommonResourcesProtoP\x01ZGcloud.google.com/go/gkemulticloud/apiv1/gkemulticloudpb;gkemulticloudpb\xaa\x02\x1dGoogle.Cloud.GkeMultiCloud.V1\xca\x02\x1dGoogle\\Cloud\\GkeMultiCloud\\V1\xea\x02 Google::Cloud::GkeMultiCloud::V1b\x06proto3"
|
12
12
|
|
13
13
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
14
14
|
|
@@ -45,6 +45,7 @@ module Google
|
|
45
45
|
OperationMetadata = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.OperationMetadata").msgclass
|
46
46
|
NodeTaint = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.NodeTaint").msgclass
|
47
47
|
NodeTaint::Effect = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.NodeTaint.Effect").enummodule
|
48
|
+
NodeKubeletConfig = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.NodeKubeletConfig").msgclass
|
48
49
|
Fleet = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.Fleet").msgclass
|
49
50
|
LoggingConfig = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.LoggingConfig").msgclass
|
50
51
|
LoggingComponentConfig = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.LoggingComponentConfig").msgclass
|
@@ -53,6 +54,8 @@ module Google
|
|
53
54
|
ManagedPrometheusConfig = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.ManagedPrometheusConfig").msgclass
|
54
55
|
BinaryAuthorization = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.BinaryAuthorization").msgclass
|
55
56
|
BinaryAuthorization::EvaluationMode = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.BinaryAuthorization.EvaluationMode").enummodule
|
57
|
+
SecurityPostureConfig = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.SecurityPostureConfig").msgclass
|
58
|
+
SecurityPostureConfig::VulnerabilityMode = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.gkemulticloud.v1.SecurityPostureConfig.VulnerabilityMode").enummodule
|
56
59
|
end
|
57
60
|
end
|
58
61
|
end
|
@@ -116,6 +116,9 @@ module Google
|
|
116
116
|
# @!attribute [rw] binary_authorization
|
117
117
|
# @return [::Google::Cloud::GkeMultiCloud::V1::BinaryAuthorization]
|
118
118
|
# Optional. Binary Authorization configuration for this cluster.
|
119
|
+
# @!attribute [rw] security_posture_config
|
120
|
+
# @return [::Google::Cloud::GkeMultiCloud::V1::SecurityPostureConfig]
|
121
|
+
# Optional. Security Posture configuration for this cluster.
|
119
122
|
class AttachedCluster
|
120
123
|
include ::Google::Protobuf::MessageExts
|
121
124
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -138,7 +138,7 @@ module Google
|
|
138
138
|
# @return [::String]
|
139
139
|
# Required. The Kubernetes distribution of the underlying attached cluster.
|
140
140
|
#
|
141
|
-
# Supported values: ["eks", "aks"].
|
141
|
+
# Supported values: ["eks", "aks", "generic"].
|
142
142
|
# @!attribute [rw] proxy_config
|
143
143
|
# @return [::Google::Cloud::GkeMultiCloud::V1::AttachedProxyConfig]
|
144
144
|
# Optional. Proxy configuration for outbound HTTP(S) traffic.
|
@@ -173,6 +173,7 @@ module Google
|
|
173
173
|
# * `platform_version`.
|
174
174
|
# * `proxy_config.kubernetes_secret.name`.
|
175
175
|
# * `proxy_config.kubernetes_secret.namespace`.
|
176
|
+
# * `security_posture_config.vulnerability_mode`
|
176
177
|
class UpdateAttachedClusterRequest
|
177
178
|
include ::Google::Protobuf::MessageExts
|
178
179
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -457,6 +457,9 @@ module Google
|
|
457
457
|
# @!attribute [rw] management
|
458
458
|
# @return [::Google::Cloud::GkeMultiCloud::V1::AwsNodeManagement]
|
459
459
|
# Optional. The Management configuration for this node pool.
|
460
|
+
# @!attribute [rw] kubelet_config
|
461
|
+
# @return [::Google::Cloud::GkeMultiCloud::V1::NodeKubeletConfig]
|
462
|
+
# Optional. Node kubelet configs.
|
460
463
|
# @!attribute [rw] update_settings
|
461
464
|
# @return [::Google::Cloud::GkeMultiCloud::V1::UpdateSettings]
|
462
465
|
# Optional. Update settings control the speed and disruption of the update.
|
@@ -769,7 +772,7 @@ module Google
|
|
769
772
|
#
|
770
773
|
# The secret must be a JSON encoded proxy configuration
|
771
774
|
# as described in
|
772
|
-
# https://cloud.google.com/
|
775
|
+
# https://cloud.google.com/kubernetes-engine/multi-cloud/docs/aws/how-to/use-a-proxy#create_a_proxy_configuration_file
|
773
776
|
# @!attribute [rw] secret_version
|
774
777
|
# @return [::String]
|
775
778
|
# The version string of the AWS Secret Manager secret that contains the
|
@@ -337,7 +337,7 @@ module Google
|
|
337
337
|
#
|
338
338
|
# The secret must be a JSON encoded proxy configuration
|
339
339
|
# as described in
|
340
|
-
# https://cloud.google.com/
|
340
|
+
# https://cloud.google.com/kubernetes-engine/multi-cloud/docs/azure/how-to/use-a-proxy#create_a_proxy_configuration_file
|
341
341
|
#
|
342
342
|
# Secret ids are formatted as
|
343
343
|
# `https://<key-vault-name>.vault.azure.net/secrets/<secret-name>/<secret-version>`.
|
@@ -148,6 +148,57 @@ module Google
|
|
148
148
|
end
|
149
149
|
end
|
150
150
|
|
151
|
+
# Configuration for node pool kubelet options.
|
152
|
+
# @!attribute [rw] insecure_kubelet_readonly_port_enabled
|
153
|
+
# @return [::Boolean]
|
154
|
+
# Optional. Enable the insecure kubelet read only port.
|
155
|
+
# @!attribute [rw] cpu_manager_policy
|
156
|
+
# @return [::String]
|
157
|
+
# Optional. Control the CPU management policy on the node.
|
158
|
+
# See
|
159
|
+
# https://kubernetes.io/docs/tasks/administer-cluster/cpu-management-policies/
|
160
|
+
#
|
161
|
+
# The following values are allowed.
|
162
|
+
# * "none": the default, which represents the existing scheduling behavior.
|
163
|
+
# * "static": allows pods with certain resource characteristics to be granted
|
164
|
+
# increased CPU affinity and exclusivity on the node.
|
165
|
+
# The default value is 'none' if unspecified.
|
166
|
+
# @!attribute [rw] cpu_cfs_quota
|
167
|
+
# @return [::Boolean]
|
168
|
+
# Optional. Enable CPU CFS quota enforcement for containers that specify CPU
|
169
|
+
# limits.
|
170
|
+
#
|
171
|
+
# This option is enabled by default which makes kubelet use CFS quota
|
172
|
+
# (https://www.kernel.org/doc/Documentation/scheduler/sched-bwc.txt) to
|
173
|
+
# enforce container CPU limits. Otherwise, CPU limits will not be enforced at
|
174
|
+
# all.
|
175
|
+
#
|
176
|
+
# Disable this option to mitigate CPU throttling problems while still having
|
177
|
+
# your pods to be in Guaranteed QoS class by specifying the CPU limits.
|
178
|
+
#
|
179
|
+
# The default value is 'true' if unspecified.
|
180
|
+
# @!attribute [rw] cpu_cfs_quota_period
|
181
|
+
# @return [::String]
|
182
|
+
# Optional. Set the CPU CFS quota period value 'cpu.cfs_period_us'.
|
183
|
+
#
|
184
|
+
# The string must be a sequence of decimal numbers, each with optional
|
185
|
+
# fraction and a unit suffix, such as "300ms".
|
186
|
+
# Valid time units are "ns", "us" (or "µs"), "ms", "s", "m", "h".
|
187
|
+
# The value must be a positive duration.
|
188
|
+
#
|
189
|
+
# The default value is '100ms' if unspecified.
|
190
|
+
# @!attribute [rw] pod_pids_limit
|
191
|
+
# @return [::Integer]
|
192
|
+
# Optional. Set the Pod PID limits. See
|
193
|
+
# https://kubernetes.io/docs/concepts/policy/pid-limiting/#pod-pid-limits
|
194
|
+
#
|
195
|
+
# Controls the maximum number of processes allowed to run in a pod. The value
|
196
|
+
# must be greater than or equal to 1024 and less than 4194304.
|
197
|
+
class NodeKubeletConfig
|
198
|
+
include ::Google::Protobuf::MessageExts
|
199
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
200
|
+
end
|
201
|
+
|
151
202
|
# Fleet related configuration.
|
152
203
|
#
|
153
204
|
# Fleets are a Google Cloud concept for logically organizing clusters,
|
@@ -247,6 +298,29 @@ module Google
|
|
247
298
|
PROJECT_SINGLETON_POLICY_ENFORCE = 2
|
248
299
|
end
|
249
300
|
end
|
301
|
+
|
302
|
+
# SecurityPostureConfig defines the flags needed to enable/disable features for
|
303
|
+
# the Security Posture API.
|
304
|
+
# @!attribute [rw] vulnerability_mode
|
305
|
+
# @return [::Google::Cloud::GkeMultiCloud::V1::SecurityPostureConfig::VulnerabilityMode]
|
306
|
+
# Sets which mode to use for vulnerability scanning.
|
307
|
+
class SecurityPostureConfig
|
308
|
+
include ::Google::Protobuf::MessageExts
|
309
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
310
|
+
|
311
|
+
# VulnerabilityMode defines enablement mode for vulnerability scanning.
|
312
|
+
module VulnerabilityMode
|
313
|
+
# Default value not specified.
|
314
|
+
VULNERABILITY_MODE_UNSPECIFIED = 0
|
315
|
+
|
316
|
+
# Disables vulnerability scanning on the cluster.
|
317
|
+
VULNERABILITY_DISABLED = 1
|
318
|
+
|
319
|
+
# Applies the Security Posture's vulnerability on cluster Enterprise level
|
320
|
+
# features.
|
321
|
+
VULNERABILITY_ENTERPRISE = 2
|
322
|
+
end
|
323
|
+
end
|
250
324
|
end
|
251
325
|
end
|
252
326
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-gke_multi_cloud-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.11.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-09-20 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: gapic-common
|
@@ -142,11 +142,10 @@ requirements: []
|
|
142
142
|
rubygems_version: 3.5.6
|
143
143
|
signing_key:
|
144
144
|
specification_version: 4
|
145
|
-
summary:
|
146
|
-
|
147
|
-
|
148
|
-
|
149
|
-
|
150
|
-
|
151
|
-
tools.
|
145
|
+
summary: GKE Multi-Cloud provides a way to manage Kubernetes clusters that run on
|
146
|
+
AWS and Azure infrastructure using the GKE Multi-Cloud API. Combined with Connect,
|
147
|
+
you can manage Kubernetes clusters on Google Cloud, AWS, and Azure from the Google
|
148
|
+
Cloud Console. When you create a cluster with GKE Multi-Cloud, Google creates the
|
149
|
+
resources needed and brings up a cluster on your behalf. You can deploy workloads
|
150
|
+
with the GKE Multi-Cloud API or the gcloud and kubectl command-line tools.
|
152
151
|
test_files: []
|