@maxim_mazurok/gapi.client.gkehub-v1alpha 0.0.20240307 → 0.0.20240322

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.d.ts +65 -1
  2. package/package.json +1 -1
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://gkehub.googleapis.com/$discovery/rest?version=v1alpha
12
- // Revision: 20240307
12
+ // Revision: 20240322
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -682,6 +682,8 @@ declare namespace gapi.client {
682
682
  azureadConfig?: IdentityServiceAzureADConfig;
683
683
  /** GoogleConfig specific configuration. */
684
684
  googleConfig?: IdentityServiceGoogleConfig;
685
+ /** LDAP specific configuration. */
686
+ ldapConfig?: IdentityServiceLdapConfig;
685
687
  /** Identifier for auth config. */
686
688
  name?: string;
687
689
  /** OIDC specific configuration. */
@@ -711,6 +713,24 @@ declare namespace gapi.client {
711
713
  /** Disable automatic configuration of Google Plugin on supported platforms. */
712
714
  disable?: boolean;
713
715
  }
716
+ interface IdentityServiceGroupConfig {
717
+ /** Required. The location of the subtree in the LDAP directory to search for group entries. */
718
+ baseDn?: string;
719
+ /** Optional. Optional filter to be used when searching for groups a user belongs to. This can be used to explicitly match only certain groups in order to reduce the amount of groups returned for each user. This defaults to "(objectClass=Group)". */
720
+ filter?: string;
721
+ /** Optional. The identifying name of each group a user belongs to. For example, if this is set to "distinguishedName" then RBACs and other group expectations should be written as full DNs. This defaults to "distinguishedName". */
722
+ idAttribute?: string;
723
+ }
724
+ interface IdentityServiceLdapConfig {
725
+ /** Optional. Contains the properties for locating and authenticating groups in the directory. */
726
+ group?: IdentityServiceGroupConfig;
727
+ /** Required. Server settings for the external LDAP server. */
728
+ server?: IdentityServiceServerConfig;
729
+ /** Required. Contains the credentials of the service account which is authorized to perform the LDAP search in the directory. The credentials can be supplied by the combination of the DN and password or the client certificate. */
730
+ serviceAccount?: IdentityServiceServiceAccountConfig;
731
+ /** Required. Defines where users exist in the LDAP directory. */
732
+ user?: IdentityServiceUserConfig;
733
+ }
714
734
  interface IdentityServiceMembershipSpec {
715
735
  /** A member may support multiple auth methods. */
716
736
  authMethods?: IdentityServiceAuthMethod[];
@@ -773,6 +793,36 @@ declare namespace gapi.client {
773
793
  /** Optional. Prefix to prepend to user name. */
774
794
  userPrefix?: string;
775
795
  }
796
+ interface IdentityServiceServerConfig {
797
+ /** Optional. Contains a Base64 encoded, PEM formatted certificate authority certificate for the LDAP server. This must be provided for the "ldaps" and "startTLS" connections. */
798
+ certificateAuthorityData?: string;
799
+ /** Optional. Defines the connection type to communicate with the LDAP server. If `starttls` or `ldaps` is specified, the certificate_authority_data should not be empty. */
800
+ connectionType?: string;
801
+ /** Required. Defines the hostname or IP of the LDAP server. Port is optional and will default to 389, if unspecified. For example, "ldap.server.example" or "10.10.10.10:389". */
802
+ host?: string;
803
+ }
804
+ interface IdentityServiceServiceAccountConfig {
805
+ /** Credentials for basic auth. */
806
+ simpleBindCredentials?: IdentityServiceSimpleBindCredentials;
807
+ }
808
+ interface IdentityServiceSimpleBindCredentials {
809
+ /** Required. The distinguished name(DN) of the service account object/user. */
810
+ dn?: string;
811
+ /** Output only. The encrypted password of the service account object/user. */
812
+ encryptedPassword?: string;
813
+ /** Required. Input only. The password of the service account object/user. */
814
+ password?: string;
815
+ }
816
+ interface IdentityServiceUserConfig {
817
+ /** Required. The location of the subtree in the LDAP directory to search for user entries. */
818
+ baseDn?: string;
819
+ /** Optional. Filter to apply when searching for the user. This can be used to further restrict the user accounts which are allowed to login. This defaults to "(objectClass=User)". */
820
+ filter?: string;
821
+ /** Optional. Determines which attribute to use as the user's identity after they are authenticated. This is distinct from the loginAttribute field to allow users to login with a username, but then have their actual identifier be an email address or full Distinguished Name (DN). For example, setting loginAttribute to "sAMAccountName" and identifierAttribute to "userPrincipalName" would allow a user to login as "bsmith", but actual RBAC policies for the user would be written as "bsmith@example.com". Using "userPrincipalName" is recommended since this will be unique for each user. This defaults to "userPrincipalName". */
822
+ idAttribute?: string;
823
+ /** Optional. The name of the attribute which matches against the input username. This is used to find the user in the LDAP database e.g. "(=)" and is combined with the optional filter field. This defaults to "userPrincipalName". */
824
+ loginAttribute?: string;
825
+ }
776
826
  interface KubernetesMetadata {
777
827
  /** Output only. Kubernetes API server version string as reported by `/version`. */
778
828
  kubernetesApiServerVersion?: string;
@@ -1334,9 +1384,21 @@ declare namespace gapi.client {
1334
1384
  /** Represents the specific type of a message. */
1335
1385
  type?: ServiceMeshType;
1336
1386
  }
1387
+ interface ServiceMeshCondition {
1388
+ /** Unique identifier of the condition which describes the condition recognizable to the user. */
1389
+ code?: string;
1390
+ /** A short summary about the issue. */
1391
+ details?: string;
1392
+ /** Links contains actionable information. */
1393
+ documentationLink?: string;
1394
+ /** Severity level of the condition. */
1395
+ severity?: string;
1396
+ }
1337
1397
  interface ServiceMeshControlPlaneManagement {
1338
1398
  /** Explanation of state. */
1339
1399
  details?: ServiceMeshStatusDetails[];
1400
+ /** Output only. Implementation of managed control plane. */
1401
+ implementation?: string;
1340
1402
  /** LifecycleState of control plane management. */
1341
1403
  state?: string;
1342
1404
  }
@@ -1361,6 +1423,8 @@ declare namespace gapi.client {
1361
1423
  interface ServiceMeshMembershipState {
1362
1424
  /** Output only. Results of running Service Mesh analyzers. */
1363
1425
  analysisMessages?: ServiceMeshAnalysisMessage[];
1426
+ /** Output only. List of condition reporting membership statues */
1427
+ conditions?: ServiceMeshCondition[];
1364
1428
  /** The API version (i.e. Istio CRD version) for configuring service mesh in this cluster. This version is influenced by the `default_channel` field. */
1365
1429
  configApiVersion?: string;
1366
1430
  /** Output only. Status of control plane management */
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.gkehub-v1alpha",
3
- "version": "0.0.20240307",
3
+ "version": "0.0.20240322",
4
4
  "description": "TypeScript typings for GKE Hub API v1alpha",
5
5
  "repository": {
6
6
  "type": "git",