Skip to content

Commit

Permalink
feat(servicenetworking): update the API
Browse files Browse the repository at this point in the history
#### servicenetworking:v1beta

The following keys were changed:
- schemas.PolicyBinding.properties.role.description

#### servicenetworking:v1

The following keys were added:
- schemas.AddSubnetworkRequest.properties.skipRequestedAddressValidation.description
- schemas.AddSubnetworkRequest.properties.skipRequestedAddressValidation.type

The following keys were changed:
- schemas.PolicyBinding.properties.role.description
  • Loading branch information
yoshi-automation authored and sofisl committed Aug 27, 2024
1 parent 144ba15 commit e673e80
Show file tree
Hide file tree
Showing 4 changed files with 14 additions and 6 deletions.
8 changes: 6 additions & 2 deletions discovery/servicenetworking-v1.json
Original file line number Diff line number Diff line change
Expand Up @@ -1029,7 +1029,7 @@
}
}
},
"revision": "20240716",
"revision": "20240820",
"rootUrl": "https://servicenetworking.googleapis.com/",
"schemas": {
"AddDnsRecordSetMetadata": {
Expand Down Expand Up @@ -1211,6 +1211,10 @@
},
"type": "array"
},
"skipRequestedAddressValidation": {
"description": "Optional. Skips validating if the requested_address is in use by SN VPC’s peering group. Compute Engine will still perform this check and fail the request if the requested_address is in use. Note that Compute Engine does not check for the existence of dynamic routes when performing this check. Caller of this API should make sure that there are no dynamic routes overlapping with the requested_address/prefix_length IP address range otherwise the created subnet could cause misrouting.",
"type": "boolean"
},
"subnetwork": {
"description": "Required. A name for the new subnet. For information about the naming requirements, see [subnetwork](/compute/docs/reference/rest/v1/subnetworks) in the Compute API documentation.",
"type": "string"
Expand Down Expand Up @@ -3219,7 +3223,7 @@
"type": "string"
},
"role": {
"description": "Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/compute.xpnAdmin' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project",
"description": "Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/tpu.xpnAgent' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project - 'roles/monitoring.viewer' applied on the shared VPC host project",
"type": "string"
}
},
Expand Down
4 changes: 2 additions & 2 deletions discovery/servicenetworking-v1beta.json
Original file line number Diff line number Diff line change
Expand Up @@ -307,7 +307,7 @@
}
}
},
"revision": "20240716",
"revision": "20240820",
"rootUrl": "https://servicenetworking.googleapis.com/",
"schemas": {
"AddDnsRecordSetMetadata": {
Expand Down Expand Up @@ -2243,7 +2243,7 @@
"type": "string"
},
"role": {
"description": "Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/compute.xpnAdmin' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project",
"description": "Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/tpu.xpnAgent' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project - 'roles/monitoring.viewer' applied on the shared VPC host project",
"type": "string"
}
},
Expand Down
6 changes: 5 additions & 1 deletion src/apis/servicenetworking/v1.ts
Original file line number Diff line number Diff line change
Expand Up @@ -275,6 +275,10 @@ export namespace servicenetworking_v1 {
* Optional. A list of secondary IP ranges to be created within the new subnetwork.
*/
secondaryIpRangeSpecs?: Schema$SecondaryIpRangeSpec[];
/**
* Optional. Skips validating if the requested_address is in use by SN VPC’s peering group. Compute Engine will still perform this check and fail the request if the requested_address is in use. Note that Compute Engine does not check for the existence of dynamic routes when performing this check. Caller of this API should make sure that there are no dynamic routes overlapping with the requested_address/prefix_length IP address range otherwise the created subnet could cause misrouting.
*/
skipRequestedAddressValidation?: boolean | null;
/**
* Required. A name for the new subnet. For information about the naming requirements, see [subnetwork](/compute/docs/reference/rest/v1/subnetworks) in the Compute API documentation.
*/
Expand Down Expand Up @@ -1670,7 +1674,7 @@ export namespace servicenetworking_v1 {
*/
member?: string | null;
/**
* Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/compute.xpnAdmin' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project
* Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/tpu.xpnAgent' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project - 'roles/monitoring.viewer' applied on the shared VPC host project
*/
role?: string | null;
}
Expand Down
2 changes: 1 addition & 1 deletion src/apis/servicenetworking/v1beta.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1469,7 +1469,7 @@ export namespace servicenetworking_v1beta {
*/
member?: string | null;
/**
* Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/compute.xpnAdmin' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project
* Required. Role to apply. Only allowlisted roles can be used at the specified granularity. The role must be one of the following: - 'roles/container.hostServiceAgentUser' applied on the shared VPC host project - 'roles/compute.securityAdmin' applied on the shared VPC host project - 'roles/compute.networkAdmin' applied on the shared VPC host project - 'roles/tpu.xpnAgent' applied on the shared VPC host project - 'roles/dns.admin' applied on the shared VPC host project - 'roles/logging.admin' applied on the shared VPC host project - 'roles/monitoring.viewer' applied on the shared VPC host project
*/
role?: string | null;
}
Expand Down

0 comments on commit e673e80

Please sign in to comment.