@maxim_mazurok/gapi.client.gkehub-v1alpha 0.0.20240307 → 0.0.20240322
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +65 -1
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://gkehub.googleapis.com/$discovery/rest?version=v1alpha
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240322
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -682,6 +682,8 @@ declare namespace gapi.client {
|
|
|
682
682
|
azureadConfig?: IdentityServiceAzureADConfig;
|
|
683
683
|
/** GoogleConfig specific configuration. */
|
|
684
684
|
googleConfig?: IdentityServiceGoogleConfig;
|
|
685
|
+
/** LDAP specific configuration. */
|
|
686
|
+
ldapConfig?: IdentityServiceLdapConfig;
|
|
685
687
|
/** Identifier for auth config. */
|
|
686
688
|
name?: string;
|
|
687
689
|
/** OIDC specific configuration. */
|
|
@@ -711,6 +713,24 @@ declare namespace gapi.client {
|
|
|
711
713
|
/** Disable automatic configuration of Google Plugin on supported platforms. */
|
|
712
714
|
disable?: boolean;
|
|
713
715
|
}
|
|
716
|
+
interface IdentityServiceGroupConfig {
|
|
717
|
+
/** Required. The location of the subtree in the LDAP directory to search for group entries. */
|
|
718
|
+
baseDn?: string;
|
|
719
|
+
/** Optional. Optional filter to be used when searching for groups a user belongs to. This can be used to explicitly match only certain groups in order to reduce the amount of groups returned for each user. This defaults to "(objectClass=Group)". */
|
|
720
|
+
filter?: string;
|
|
721
|
+
/** Optional. The identifying name of each group a user belongs to. For example, if this is set to "distinguishedName" then RBACs and other group expectations should be written as full DNs. This defaults to "distinguishedName". */
|
|
722
|
+
idAttribute?: string;
|
|
723
|
+
}
|
|
724
|
+
interface IdentityServiceLdapConfig {
|
|
725
|
+
/** Optional. Contains the properties for locating and authenticating groups in the directory. */
|
|
726
|
+
group?: IdentityServiceGroupConfig;
|
|
727
|
+
/** Required. Server settings for the external LDAP server. */
|
|
728
|
+
server?: IdentityServiceServerConfig;
|
|
729
|
+
/** Required. Contains the credentials of the service account which is authorized to perform the LDAP search in the directory. The credentials can be supplied by the combination of the DN and password or the client certificate. */
|
|
730
|
+
serviceAccount?: IdentityServiceServiceAccountConfig;
|
|
731
|
+
/** Required. Defines where users exist in the LDAP directory. */
|
|
732
|
+
user?: IdentityServiceUserConfig;
|
|
733
|
+
}
|
|
714
734
|
interface IdentityServiceMembershipSpec {
|
|
715
735
|
/** A member may support multiple auth methods. */
|
|
716
736
|
authMethods?: IdentityServiceAuthMethod[];
|
|
@@ -773,6 +793,36 @@ declare namespace gapi.client {
|
|
|
773
793
|
/** Optional. Prefix to prepend to user name. */
|
|
774
794
|
userPrefix?: string;
|
|
775
795
|
}
|
|
796
|
+
interface IdentityServiceServerConfig {
|
|
797
|
+
/** Optional. Contains a Base64 encoded, PEM formatted certificate authority certificate for the LDAP server. This must be provided for the "ldaps" and "startTLS" connections. */
|
|
798
|
+
certificateAuthorityData?: string;
|
|
799
|
+
/** Optional. Defines the connection type to communicate with the LDAP server. If `starttls` or `ldaps` is specified, the certificate_authority_data should not be empty. */
|
|
800
|
+
connectionType?: string;
|
|
801
|
+
/** Required. Defines the hostname or IP of the LDAP server. Port is optional and will default to 389, if unspecified. For example, "ldap.server.example" or "10.10.10.10:389". */
|
|
802
|
+
host?: string;
|
|
803
|
+
}
|
|
804
|
+
interface IdentityServiceServiceAccountConfig {
|
|
805
|
+
/** Credentials for basic auth. */
|
|
806
|
+
simpleBindCredentials?: IdentityServiceSimpleBindCredentials;
|
|
807
|
+
}
|
|
808
|
+
interface IdentityServiceSimpleBindCredentials {
|
|
809
|
+
/** Required. The distinguished name(DN) of the service account object/user. */
|
|
810
|
+
dn?: string;
|
|
811
|
+
/** Output only. The encrypted password of the service account object/user. */
|
|
812
|
+
encryptedPassword?: string;
|
|
813
|
+
/** Required. Input only. The password of the service account object/user. */
|
|
814
|
+
password?: string;
|
|
815
|
+
}
|
|
816
|
+
interface IdentityServiceUserConfig {
|
|
817
|
+
/** Required. The location of the subtree in the LDAP directory to search for user entries. */
|
|
818
|
+
baseDn?: string;
|
|
819
|
+
/** Optional. Filter to apply when searching for the user. This can be used to further restrict the user accounts which are allowed to login. This defaults to "(objectClass=User)". */
|
|
820
|
+
filter?: string;
|
|
821
|
+
/** Optional. Determines which attribute to use as the user's identity after they are authenticated. This is distinct from the loginAttribute field to allow users to login with a username, but then have their actual identifier be an email address or full Distinguished Name (DN). For example, setting loginAttribute to "sAMAccountName" and identifierAttribute to "userPrincipalName" would allow a user to login as "bsmith", but actual RBAC policies for the user would be written as "bsmith@example.com". Using "userPrincipalName" is recommended since this will be unique for each user. This defaults to "userPrincipalName". */
|
|
822
|
+
idAttribute?: string;
|
|
823
|
+
/** Optional. The name of the attribute which matches against the input username. This is used to find the user in the LDAP database e.g. "(=)" and is combined with the optional filter field. This defaults to "userPrincipalName". */
|
|
824
|
+
loginAttribute?: string;
|
|
825
|
+
}
|
|
776
826
|
interface KubernetesMetadata {
|
|
777
827
|
/** Output only. Kubernetes API server version string as reported by `/version`. */
|
|
778
828
|
kubernetesApiServerVersion?: string;
|
|
@@ -1334,9 +1384,21 @@ declare namespace gapi.client {
|
|
|
1334
1384
|
/** Represents the specific type of a message. */
|
|
1335
1385
|
type?: ServiceMeshType;
|
|
1336
1386
|
}
|
|
1387
|
+
interface ServiceMeshCondition {
|
|
1388
|
+
/** Unique identifier of the condition which describes the condition recognizable to the user. */
|
|
1389
|
+
code?: string;
|
|
1390
|
+
/** A short summary about the issue. */
|
|
1391
|
+
details?: string;
|
|
1392
|
+
/** Links contains actionable information. */
|
|
1393
|
+
documentationLink?: string;
|
|
1394
|
+
/** Severity level of the condition. */
|
|
1395
|
+
severity?: string;
|
|
1396
|
+
}
|
|
1337
1397
|
interface ServiceMeshControlPlaneManagement {
|
|
1338
1398
|
/** Explanation of state. */
|
|
1339
1399
|
details?: ServiceMeshStatusDetails[];
|
|
1400
|
+
/** Output only. Implementation of managed control plane. */
|
|
1401
|
+
implementation?: string;
|
|
1340
1402
|
/** LifecycleState of control plane management. */
|
|
1341
1403
|
state?: string;
|
|
1342
1404
|
}
|
|
@@ -1361,6 +1423,8 @@ declare namespace gapi.client {
|
|
|
1361
1423
|
interface ServiceMeshMembershipState {
|
|
1362
1424
|
/** Output only. Results of running Service Mesh analyzers. */
|
|
1363
1425
|
analysisMessages?: ServiceMeshAnalysisMessage[];
|
|
1426
|
+
/** Output only. List of condition reporting membership statues */
|
|
1427
|
+
conditions?: ServiceMeshCondition[];
|
|
1364
1428
|
/** The API version (i.e. Istio CRD version) for configuring service mesh in this cluster. This version is influenced by the `default_channel` field. */
|
|
1365
1429
|
configApiVersion?: string;
|
|
1366
1430
|
/** Output only. Status of control plane management */
|