Skip to content

Commit

Permalink
feat(compute): update the api
Browse files Browse the repository at this point in the history
#### compute:alpha

The following keys were added:
- schemas.Scheduling.properties.windowsLicenseOptimizationMode.type (Total Keys: 1)
- schemas.SecurityPolicy.properties.shortName (Total Keys: 2)
- schemas.SecurityPolicyAssociation.properties.excludedFolders (Total Keys: 2)
- schemas.SecurityPolicyAssociation.properties.excludedProjects (Total Keys: 2)
- schemas.SecurityPolicyAssociation.properties.shortName.type (Total Keys: 1)
  • Loading branch information
yoshi-automation committed May 10, 2024
1 parent cc45b1f commit b494533
Show file tree
Hide file tree
Showing 23 changed files with 403 additions and 204 deletions.
48 changes: 24 additions & 24 deletions docs/dyn/compute_alpha.healthChecks.html

Large diffs are not rendered by default.

20 changes: 12 additions & 8 deletions docs/dyn/compute_alpha.instanceTemplates.html

Large diffs are not rendered by default.

43 changes: 25 additions & 18 deletions docs/dyn/compute_alpha.instances.html

Large diffs are not rendered by default.

30 changes: 18 additions & 12 deletions docs/dyn/compute_alpha.machineImages.html

Large diffs are not rendered by default.

53 changes: 53 additions & 0 deletions docs/dyn/compute_alpha.organizationSecurityPolicies.html

Large diffs are not rendered by default.

40 changes: 20 additions & 20 deletions docs/dyn/compute_alpha.regionHealthChecks.html

Large diffs are not rendered by default.

15 changes: 9 additions & 6 deletions docs/dyn/compute_alpha.regionInstanceTemplates.html

Large diffs are not rendered by default.

5 changes: 3 additions & 2 deletions docs/dyn/compute_alpha.regionInstances.html
Original file line number Diff line number Diff line change
Expand Up @@ -259,7 +259,7 @@ <h3>Method Details</h3>
&quot;natIP&quot;: &quot;A String&quot;, # Applies to accessConfigs (IPv4) only. An external IP address associated with this instance. Specify an unused static external IP address available to the project or leave this field undefined to use an IP from a shared ephemeral IP address pool. If you specify a static external IP address, it must live in the same region as the zone of the instance.
&quot;networkTier&quot;: &quot;A String&quot;, # This signifies the networking tier used for configuring this access configuration and can only take the following values: PREMIUM, STANDARD. If an AccessConfig is specified without a valid external IP address, an ephemeral IP will be created with this networkTier. If an AccessConfig with a valid external IP address is specified, it must match that of the networkTier associated with the Address resource owning that IP.
&quot;publicDnsName&quot;: &quot;A String&quot;, # [Output Only] The public DNS domain name for the instance.
&quot;publicPtrDomainName&quot;: &quot;A String&quot;, # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be createc for first IP in associated external IPv6 range.
&quot;publicPtrDomainName&quot;: &quot;A String&quot;, # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be created for first IP in associated external IPv6 range.
&quot;securityPolicy&quot;: &quot;A String&quot;, # [Output Only] The resource URL for the security policy associated with this access config.
&quot;setPublicDns&quot;: True or False, # Specifies whether a public DNS &#x27;A&#x27; record should be created for the external IP address of this access configuration.
&quot;setPublicPtr&quot;: True or False, # Specifies whether a public DNS &#x27;PTR&#x27; record should be created to map the external IP address of the instance to a DNS domain name. This field is not used in ipv6AccessConfig. A default PTR record will be created if the VM has external IPv6 range associated.
Expand All @@ -284,7 +284,7 @@ <h3>Method Details</h3>
&quot;natIP&quot;: &quot;A String&quot;, # Applies to accessConfigs (IPv4) only. An external IP address associated with this instance. Specify an unused static external IP address available to the project or leave this field undefined to use an IP from a shared ephemeral IP address pool. If you specify a static external IP address, it must live in the same region as the zone of the instance.
&quot;networkTier&quot;: &quot;A String&quot;, # This signifies the networking tier used for configuring this access configuration and can only take the following values: PREMIUM, STANDARD. If an AccessConfig is specified without a valid external IP address, an ephemeral IP will be created with this networkTier. If an AccessConfig with a valid external IP address is specified, it must match that of the networkTier associated with the Address resource owning that IP.
&quot;publicDnsName&quot;: &quot;A String&quot;, # [Output Only] The public DNS domain name for the instance.
&quot;publicPtrDomainName&quot;: &quot;A String&quot;, # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be createc for first IP in associated external IPv6 range.
&quot;publicPtrDomainName&quot;: &quot;A String&quot;, # The DNS domain name for the public PTR record. You can set this field only if the `setPublicPtr` field is enabled in accessConfig. If this field is unspecified in ipv6AccessConfig, a default PTR record will be created for first IP in associated external IPv6 range.
&quot;securityPolicy&quot;: &quot;A String&quot;, # [Output Only] The resource URL for the security policy associated with this access config.
&quot;setPublicDns&quot;: True or False, # Specifies whether a public DNS &#x27;A&#x27; record should be created for the external IP address of this access configuration.
&quot;setPublicPtr&quot;: True or False, # Specifies whether a public DNS &#x27;PTR&#x27; record should be created to map the external IP address of the instance to a DNS domain name. This field is not used in ipv6AccessConfig. A default PTR record will be created if the VM has external IPv6 range associated.
Expand Down Expand Up @@ -383,6 +383,7 @@ <h3>Method Details</h3>
&quot;preemptible&quot;: True or False, # Defines whether the instance is preemptible. This can only be set during instance creation or while the instance is stopped and therefore, in a `TERMINATED` state. See Instance Life Cycle for more information on the possible instance states.
&quot;provisioningModel&quot;: &quot;A String&quot;, # Specifies the provisioning model of the instance.
&quot;terminationTime&quot;: &quot;A String&quot;, # Specifies the timestamp, when the instance will be terminated, in RFC3339 text format. If specified, the instance termination action will be performed at the termination time.
&quot;windowsLicenseOptimizationMode&quot;: &quot;A String&quot;, # Represents the Windows Server License Optimization Mode of the VM. If unspecified, the default mode is `OFF`.
},
&quot;secureTags&quot;: [ # [Input Only] Secure tags to apply to this instance. Maximum number of secure tags allowed is 50. Note that for MachineImage, this is not supported yet.
&quot;A String&quot;,
Expand Down
32 changes: 32 additions & 0 deletions docs/dyn/compute_alpha.regionSecurityPolicies.html
Original file line number Diff line number Diff line change
Expand Up @@ -601,8 +601,15 @@ <h3>Method Details</h3>
{
&quot;attachmentId&quot;: &quot;A String&quot;, # The resource that the security policy is attached to.
&quot;displayName&quot;: &quot;A String&quot;, # [Output Only] The display name of the security policy of the association.
&quot;excludedFolders&quot;: [ # A list of folders to exclude from the security policy.
&quot;A String&quot;,
],
&quot;excludedProjects&quot;: [ # A list of projects to exclude from the security policy.
&quot;A String&quot;,
],
&quot;name&quot;: &quot;A String&quot;, # The name for an association.
&quot;securityPolicyId&quot;: &quot;A String&quot;, # [Output Only] The security policy ID of the association.
&quot;shortName&quot;: &quot;A String&quot;, # [Output Only] The short name of the security policy of the association.
},
],
&quot;cloudArmorConfig&quot;: { # Configuration options for Cloud Armor.
Expand Down Expand Up @@ -800,6 +807,7 @@ <h3>Method Details</h3>
],
&quot;selfLink&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for the resource.
&quot;selfLinkWithId&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for this resource with the resource id.
&quot;shortName&quot;: &quot;A String&quot;, # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
&quot;type&quot;: &quot;A String&quot;, # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google&#x27;s cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
&quot;userDefinedFields&quot;: [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: &quot;ipv4_fragment_offset&quot; base: IPV4 offset: 6 size: 2 mask: &quot;0x1fff&quot;
{
Expand Down Expand Up @@ -1058,8 +1066,15 @@ <h3>Method Details</h3>
{
&quot;attachmentId&quot;: &quot;A String&quot;, # The resource that the security policy is attached to.
&quot;displayName&quot;: &quot;A String&quot;, # [Output Only] The display name of the security policy of the association.
&quot;excludedFolders&quot;: [ # A list of folders to exclude from the security policy.
&quot;A String&quot;,
],
&quot;excludedProjects&quot;: [ # A list of projects to exclude from the security policy.
&quot;A String&quot;,
],
&quot;name&quot;: &quot;A String&quot;, # The name for an association.
&quot;securityPolicyId&quot;: &quot;A String&quot;, # [Output Only] The security policy ID of the association.
&quot;shortName&quot;: &quot;A String&quot;, # [Output Only] The short name of the security policy of the association.
},
],
&quot;cloudArmorConfig&quot;: { # Configuration options for Cloud Armor.
Expand Down Expand Up @@ -1257,6 +1272,7 @@ <h3>Method Details</h3>
],
&quot;selfLink&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for the resource.
&quot;selfLinkWithId&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for this resource with the resource id.
&quot;shortName&quot;: &quot;A String&quot;, # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
&quot;type&quot;: &quot;A String&quot;, # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google&#x27;s cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
&quot;userDefinedFields&quot;: [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: &quot;ipv4_fragment_offset&quot; base: IPV4 offset: 6 size: 2 mask: &quot;0x1fff&quot;
{
Expand Down Expand Up @@ -1460,8 +1476,15 @@ <h3>Method Details</h3>
{
&quot;attachmentId&quot;: &quot;A String&quot;, # The resource that the security policy is attached to.
&quot;displayName&quot;: &quot;A String&quot;, # [Output Only] The display name of the security policy of the association.
&quot;excludedFolders&quot;: [ # A list of folders to exclude from the security policy.
&quot;A String&quot;,
],
&quot;excludedProjects&quot;: [ # A list of projects to exclude from the security policy.
&quot;A String&quot;,
],
&quot;name&quot;: &quot;A String&quot;, # The name for an association.
&quot;securityPolicyId&quot;: &quot;A String&quot;, # [Output Only] The security policy ID of the association.
&quot;shortName&quot;: &quot;A String&quot;, # [Output Only] The short name of the security policy of the association.
},
],
&quot;cloudArmorConfig&quot;: { # Configuration options for Cloud Armor.
Expand Down Expand Up @@ -1659,6 +1682,7 @@ <h3>Method Details</h3>
],
&quot;selfLink&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for the resource.
&quot;selfLinkWithId&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for this resource with the resource id.
&quot;shortName&quot;: &quot;A String&quot;, # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
&quot;type&quot;: &quot;A String&quot;, # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google&#x27;s cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
&quot;userDefinedFields&quot;: [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: &quot;ipv4_fragment_offset&quot; base: IPV4 offset: 6 size: 2 mask: &quot;0x1fff&quot;
{
Expand Down Expand Up @@ -1762,8 +1786,15 @@ <h3>Method Details</h3>
{
&quot;attachmentId&quot;: &quot;A String&quot;, # The resource that the security policy is attached to.
&quot;displayName&quot;: &quot;A String&quot;, # [Output Only] The display name of the security policy of the association.
&quot;excludedFolders&quot;: [ # A list of folders to exclude from the security policy.
&quot;A String&quot;,
],
&quot;excludedProjects&quot;: [ # A list of projects to exclude from the security policy.
&quot;A String&quot;,
],
&quot;name&quot;: &quot;A String&quot;, # The name for an association.
&quot;securityPolicyId&quot;: &quot;A String&quot;, # [Output Only] The security policy ID of the association.
&quot;shortName&quot;: &quot;A String&quot;, # [Output Only] The short name of the security policy of the association.
},
],
&quot;cloudArmorConfig&quot;: { # Configuration options for Cloud Armor.
Expand Down Expand Up @@ -1961,6 +1992,7 @@ <h3>Method Details</h3>
],
&quot;selfLink&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for the resource.
&quot;selfLinkWithId&quot;: &quot;A String&quot;, # [Output Only] Server-defined URL for this resource with the resource id.
&quot;shortName&quot;: &quot;A String&quot;, # User-provided name of the organization security policy. The name should be unique in the organization in which the security policy is created. This should only be used when SecurityPolicyType is CLOUD_ARMOR. The name must be 1-63 characters long, and comply with https://www.ietf.org/rfc/rfc1035.txt. Specifically, the name must be 1-63 characters long and match the regular expression `[a-z]([-a-z0-9]*[a-z0-9])?` which means the first character must be a lowercase letter, and all following characters must be a dash, lowercase letter, or digit, except the last character, which cannot be a dash.
&quot;type&quot;: &quot;A String&quot;, # The type indicates the intended use of the security policy. - CLOUD_ARMOR: Cloud Armor backend security policies can be configured to filter incoming HTTP requests targeting backend services. They filter requests before they hit the origin servers. - CLOUD_ARMOR_EDGE: Cloud Armor edge security policies can be configured to filter incoming HTTP requests targeting backend services (including Cloud CDN-enabled) as well as backend buckets (Cloud Storage). They filter requests before the request is served from Google&#x27;s cache. - CLOUD_ARMOR_INTERNAL_SERVICE: Cloud Armor internal service policies can be configured to filter HTTP requests targeting services managed by Traffic Director in a service mesh. They filter requests before the request is served from the application. - CLOUD_ARMOR_NETWORK: Cloud Armor network policies can be configured to filter packets targeting network load balancing resources such as backend services, target pools, target instances, and instances with external IPs. They filter requests before the request is served from the application. This field can be set only at resource creation time.
&quot;userDefinedFields&quot;: [ # Definitions of user-defined fields for CLOUD_ARMOR_NETWORK policies. A user-defined field consists of up to 4 bytes extracted from a fixed offset in the packet, relative to the IPv4, IPv6, TCP, or UDP header, with an optional mask to select certain bits. Rules may then specify matching values for these fields. Example: userDefinedFields: - name: &quot;ipv4_fragment_offset&quot; base: IPV4 offset: 6 size: 2 mask: &quot;0x1fff&quot;
{
Expand Down
Loading

0 comments on commit b494533

Please sign in to comment.