diff --git a/metadata/V1/ClusterService.php b/metadata/V1/ClusterService.php
index 7d7df54..8801f61 100644
Binary files a/metadata/V1/ClusterService.php and b/metadata/V1/ClusterService.php differ
diff --git a/src/V1/AddonsConfig.php b/src/V1/AddonsConfig.php
index 9752fbe..164a22c 100644
--- a/src/V1/AddonsConfig.php
+++ b/src/V1/AddonsConfig.php
@@ -100,6 +100,12 @@ class AddonsConfig extends \Google\Protobuf\Internal\Message
* Generated from protobuf field .google.container.v1.StatefulHAConfig stateful_ha_config = 18 [(.google.api.field_behavior) = OPTIONAL];
*/
protected $stateful_ha_config = null;
+ /**
+ * Configuration for the Cloud Storage Parallelstore CSI driver.
+ *
+ * Generated from protobuf field .google.container.v1.ParallelstoreCsiDriverConfig parallelstore_csi_driver_config = 19;
+ */
+ protected $parallelstore_csi_driver_config = null;
/**
* Optional. Configuration for Ray Operator addon.
*
@@ -148,6 +154,8 @@ class AddonsConfig extends \Google\Protobuf\Internal\Message
* Configuration for the Cloud Storage Fuse CSI driver.
* @type \Google\Cloud\Container\V1\StatefulHAConfig $stateful_ha_config
* Optional. Configuration for the StatefulHA add-on.
+ * @type \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig $parallelstore_csi_driver_config
+ * Configuration for the Cloud Storage Parallelstore CSI driver.
* @type \Google\Cloud\Container\V1\RayOperatorConfig $ray_operator_config
* Optional. Configuration for Ray Operator addon.
* }
@@ -617,6 +625,42 @@ public function setStatefulHaConfig($var)
return $this;
}
+ /**
+ * Configuration for the Cloud Storage Parallelstore CSI driver.
+ *
+ * Generated from protobuf field .google.container.v1.ParallelstoreCsiDriverConfig parallelstore_csi_driver_config = 19;
+ * @return \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig|null
+ */
+ public function getParallelstoreCsiDriverConfig()
+ {
+ return $this->parallelstore_csi_driver_config;
+ }
+
+ public function hasParallelstoreCsiDriverConfig()
+ {
+ return isset($this->parallelstore_csi_driver_config);
+ }
+
+ public function clearParallelstoreCsiDriverConfig()
+ {
+ unset($this->parallelstore_csi_driver_config);
+ }
+
+ /**
+ * Configuration for the Cloud Storage Parallelstore CSI driver.
+ *
+ * Generated from protobuf field .google.container.v1.ParallelstoreCsiDriverConfig parallelstore_csi_driver_config = 19;
+ * @param \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig $var
+ * @return $this
+ */
+ public function setParallelstoreCsiDriverConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig::class);
+ $this->parallelstore_csi_driver_config = $var;
+
+ return $this;
+ }
+
/**
* Optional. Configuration for Ray Operator addon.
*
diff --git a/src/V1/Client/ClusterManagerClient.php b/src/V1/Client/ClusterManagerClient.php
index 5208382..1baf5f0 100644
--- a/src/V1/Client/ClusterManagerClient.php
+++ b/src/V1/Client/ClusterManagerClient.php
@@ -170,6 +170,53 @@ private static function getClientDefaults()
];
}
+ /**
+ * Formats a string containing the fully-qualified path to represent a ca_pool
+ * resource.
+ *
+ * @param string $project
+ * @param string $location
+ * @param string $caPool
+ *
+ * @return string The formatted ca_pool resource.
+ */
+ public static function caPoolName(string $project, string $location, string $caPool): string
+ {
+ return self::getPathTemplate('caPool')->render([
+ 'project' => $project,
+ 'location' => $location,
+ 'ca_pool' => $caPool,
+ ]);
+ }
+
+ /**
+ * Formats a string containing the fully-qualified path to represent a
+ * crypto_key_version resource.
+ *
+ * @param string $project
+ * @param string $location
+ * @param string $keyRing
+ * @param string $cryptoKey
+ * @param string $cryptoKeyVersion
+ *
+ * @return string The formatted crypto_key_version resource.
+ */
+ public static function cryptoKeyVersionName(
+ string $project,
+ string $location,
+ string $keyRing,
+ string $cryptoKey,
+ string $cryptoKeyVersion
+ ): string {
+ return self::getPathTemplate('cryptoKeyVersion')->render([
+ 'project' => $project,
+ 'location' => $location,
+ 'key_ring' => $keyRing,
+ 'crypto_key' => $cryptoKey,
+ 'crypto_key_version' => $cryptoKeyVersion,
+ ]);
+ }
+
/**
* Formats a string containing the fully-qualified path to represent a topic
* resource.
@@ -191,6 +238,8 @@ public static function topicName(string $project, string $topic): string
* Parses a formatted name string and returns an associative array of the components in the name.
* The following name formats are supported:
* Template: Pattern
+ * - caPool: projects/{project}/locations/{location}/caPools/{ca_pool}
+ * - cryptoKeyVersion: projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}
* - topic: projects/{project}/topics/{topic}
*
* The optional $template argument can be supplied to specify a particular pattern,
diff --git a/src/V1/Cluster.php b/src/V1/Cluster.php
index 2891e69..ef01339 100644
--- a/src/V1/Cluster.php
+++ b/src/V1/Cluster.php
@@ -199,8 +199,12 @@ class Cluster extends \Google\Protobuf\Internal\Message
protected $ip_allocation_policy = null;
/**
* The configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config]
+ * instead.
*
- * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22;
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22 [deprecated = true];
+ * @deprecated
*/
protected $master_authorized_networks_config = null;
/**
@@ -531,6 +535,12 @@ class Cluster extends \Google\Protobuf\Internal\Message
* Generated from protobuf field .google.container.v1.SecurityPostureConfig security_posture_config = 145;
*/
protected $security_posture_config = null;
+ /**
+ * Configuration for all cluster's control plane endpoints.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig control_plane_endpoints_config = 146;
+ */
+ protected $control_plane_endpoints_config = null;
/**
* Beta APIs Config
*
@@ -543,6 +553,18 @@ class Cluster extends \Google\Protobuf\Internal\Message
* Generated from protobuf field .google.container.v1.EnterpriseConfig enterprise_config = 149;
*/
protected $enterprise_config = null;
+ /**
+ * Secret CSI driver configuration.
+ *
+ * Generated from protobuf field .google.container.v1.SecretManagerConfig secret_manager_config = 150;
+ */
+ protected $secret_manager_config = null;
+ /**
+ * Enable/Disable Compliance Posture features for the cluster.
+ *
+ * Generated from protobuf field .google.container.v1.CompliancePostureConfig compliance_posture_config = 151;
+ */
+ protected $compliance_posture_config = null;
/**
* Output only. Reserved for future use.
*
@@ -555,6 +577,19 @@ class Cluster extends \Google\Protobuf\Internal\Message
* Generated from protobuf field optional bool satisfies_pzi = 153 [(.google.api.field_behavior) = OUTPUT_ONLY];
*/
protected $satisfies_pzi = null;
+ /**
+ * The Custom keys configuration for the cluster.
+ *
+ * Generated from protobuf field optional .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 154;
+ */
+ protected $user_managed_keys_config = null;
+ /**
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
+ *
+ * Generated from protobuf field optional .google.container.v1.RBACBindingConfig rbac_binding_config = 156;
+ */
+ protected $rbac_binding_config = null;
/**
* Constructor.
@@ -668,6 +703,9 @@ class Cluster extends \Google\Protobuf\Internal\Message
* Configuration for cluster IP allocation.
* @type \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $master_authorized_networks_config
* The configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config]
+ * instead.
* @type \Google\Cloud\Container\V1\MaintenancePolicy $maintenance_policy
* Configure the maintenance policy for this cluster.
* @type \Google\Cloud\Container\V1\BinaryAuthorization $binary_authorization
@@ -811,14 +849,25 @@ class Cluster extends \Google\Protobuf\Internal\Message
* Fleet information for the cluster.
* @type \Google\Cloud\Container\V1\SecurityPostureConfig $security_posture_config
* Enable/Disable Security Posture API features for the cluster.
+ * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $control_plane_endpoints_config
+ * Configuration for all cluster's control plane endpoints.
* @type \Google\Cloud\Container\V1\K8sBetaAPIConfig $enable_k8s_beta_apis
* Beta APIs Config
* @type \Google\Cloud\Container\V1\EnterpriseConfig $enterprise_config
* GKE Enterprise Configuration.
+ * @type \Google\Cloud\Container\V1\SecretManagerConfig $secret_manager_config
+ * Secret CSI driver configuration.
+ * @type \Google\Cloud\Container\V1\CompliancePostureConfig $compliance_posture_config
+ * Enable/Disable Compliance Posture features for the cluster.
* @type bool $satisfies_pzs
* Output only. Reserved for future use.
* @type bool $satisfies_pzi
* Output only. Reserved for future use.
+ * @type \Google\Cloud\Container\V1\UserManagedKeysConfig $user_managed_keys_config
+ * The Custom keys configuration for the cluster.
+ * @type \Google\Cloud\Container\V1\RBACBindingConfig $rbac_binding_config
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
* }
*/
public function __construct($data = NULL) {
@@ -1524,34 +1573,46 @@ public function setIpAllocationPolicy($var)
/**
* The configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config]
+ * instead.
*
- * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22;
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22 [deprecated = true];
* @return \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig|null
+ * @deprecated
*/
public function getMasterAuthorizedNetworksConfig()
{
+ @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
return $this->master_authorized_networks_config;
}
public function hasMasterAuthorizedNetworksConfig()
{
+ @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
return isset($this->master_authorized_networks_config);
}
public function clearMasterAuthorizedNetworksConfig()
{
+ @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
unset($this->master_authorized_networks_config);
}
/**
* The configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config]
+ * instead.
*
- * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22;
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22 [deprecated = true];
* @param \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $var
* @return $this
+ * @deprecated
*/
public function setMasterAuthorizedNetworksConfig($var)
{
+ @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig::class);
$this->master_authorized_networks_config = $var;
@@ -3104,6 +3165,42 @@ public function setSecurityPostureConfig($var)
return $this;
}
+ /**
+ * Configuration for all cluster's control plane endpoints.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig control_plane_endpoints_config = 146;
+ * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig|null
+ */
+ public function getControlPlaneEndpointsConfig()
+ {
+ return $this->control_plane_endpoints_config;
+ }
+
+ public function hasControlPlaneEndpointsConfig()
+ {
+ return isset($this->control_plane_endpoints_config);
+ }
+
+ public function clearControlPlaneEndpointsConfig()
+ {
+ unset($this->control_plane_endpoints_config);
+ }
+
+ /**
+ * Configuration for all cluster's control plane endpoints.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig control_plane_endpoints_config = 146;
+ * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $var
+ * @return $this
+ */
+ public function setControlPlaneEndpointsConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig::class);
+ $this->control_plane_endpoints_config = $var;
+
+ return $this;
+ }
+
/**
* Beta APIs Config
*
@@ -3176,6 +3273,78 @@ public function setEnterpriseConfig($var)
return $this;
}
+ /**
+ * Secret CSI driver configuration.
+ *
+ * Generated from protobuf field .google.container.v1.SecretManagerConfig secret_manager_config = 150;
+ * @return \Google\Cloud\Container\V1\SecretManagerConfig|null
+ */
+ public function getSecretManagerConfig()
+ {
+ return $this->secret_manager_config;
+ }
+
+ public function hasSecretManagerConfig()
+ {
+ return isset($this->secret_manager_config);
+ }
+
+ public function clearSecretManagerConfig()
+ {
+ unset($this->secret_manager_config);
+ }
+
+ /**
+ * Secret CSI driver configuration.
+ *
+ * Generated from protobuf field .google.container.v1.SecretManagerConfig secret_manager_config = 150;
+ * @param \Google\Cloud\Container\V1\SecretManagerConfig $var
+ * @return $this
+ */
+ public function setSecretManagerConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\SecretManagerConfig::class);
+ $this->secret_manager_config = $var;
+
+ return $this;
+ }
+
+ /**
+ * Enable/Disable Compliance Posture features for the cluster.
+ *
+ * Generated from protobuf field .google.container.v1.CompliancePostureConfig compliance_posture_config = 151;
+ * @return \Google\Cloud\Container\V1\CompliancePostureConfig|null
+ */
+ public function getCompliancePostureConfig()
+ {
+ return $this->compliance_posture_config;
+ }
+
+ public function hasCompliancePostureConfig()
+ {
+ return isset($this->compliance_posture_config);
+ }
+
+ public function clearCompliancePostureConfig()
+ {
+ unset($this->compliance_posture_config);
+ }
+
+ /**
+ * Enable/Disable Compliance Posture features for the cluster.
+ *
+ * Generated from protobuf field .google.container.v1.CompliancePostureConfig compliance_posture_config = 151;
+ * @param \Google\Cloud\Container\V1\CompliancePostureConfig $var
+ * @return $this
+ */
+ public function setCompliancePostureConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\CompliancePostureConfig::class);
+ $this->compliance_posture_config = $var;
+
+ return $this;
+ }
+
/**
* Output only. Reserved for future use.
*
@@ -3248,5 +3417,79 @@ public function setSatisfiesPzi($var)
return $this;
}
+ /**
+ * The Custom keys configuration for the cluster.
+ *
+ * Generated from protobuf field optional .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 154;
+ * @return \Google\Cloud\Container\V1\UserManagedKeysConfig|null
+ */
+ public function getUserManagedKeysConfig()
+ {
+ return $this->user_managed_keys_config;
+ }
+
+ public function hasUserManagedKeysConfig()
+ {
+ return isset($this->user_managed_keys_config);
+ }
+
+ public function clearUserManagedKeysConfig()
+ {
+ unset($this->user_managed_keys_config);
+ }
+
+ /**
+ * The Custom keys configuration for the cluster.
+ *
+ * Generated from protobuf field optional .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 154;
+ * @param \Google\Cloud\Container\V1\UserManagedKeysConfig $var
+ * @return $this
+ */
+ public function setUserManagedKeysConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\UserManagedKeysConfig::class);
+ $this->user_managed_keys_config = $var;
+
+ return $this;
+ }
+
+ /**
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
+ *
+ * Generated from protobuf field optional .google.container.v1.RBACBindingConfig rbac_binding_config = 156;
+ * @return \Google\Cloud\Container\V1\RBACBindingConfig|null
+ */
+ public function getRbacBindingConfig()
+ {
+ return $this->rbac_binding_config;
+ }
+
+ public function hasRbacBindingConfig()
+ {
+ return isset($this->rbac_binding_config);
+ }
+
+ public function clearRbacBindingConfig()
+ {
+ unset($this->rbac_binding_config);
+ }
+
+ /**
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
+ *
+ * Generated from protobuf field optional .google.container.v1.RBACBindingConfig rbac_binding_config = 156;
+ * @param \Google\Cloud\Container\V1\RBACBindingConfig $var
+ * @return $this
+ */
+ public function setRbacBindingConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\RBACBindingConfig::class);
+ $this->rbac_binding_config = $var;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/ClusterUpdate.php b/src/V1/ClusterUpdate.php
index 68b58c0..6ce484d 100644
--- a/src/V1/ClusterUpdate.php
+++ b/src/V1/ClusterUpdate.php
@@ -126,8 +126,12 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
private $desired_locations;
/**
* The desired configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config
+ * instead.
*
- * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12;
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12 [deprecated = true];
+ * @deprecated
*/
protected $desired_master_authorized_networks_config = null;
/**
@@ -175,8 +179,12 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint]
* for modifying other fields within
* [PrivateClusterConfig][google.container.v1.PrivateClusterConfig].
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.global_access
+ * instead.
*
- * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25;
+ * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25 [deprecated = true];
+ * @deprecated
*/
protected $desired_private_cluster_config = null;
/**
@@ -254,10 +262,31 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
protected $desired_service_external_ips_config = null;
/**
* Enable/Disable private endpoint for the cluster's master.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
*
- * Generated from protobuf field optional bool desired_enable_private_endpoint = 71;
+ * Generated from protobuf field optional bool desired_enable_private_endpoint = 71 [deprecated = true];
+ * @deprecated
*/
protected $desired_enable_private_endpoint = null;
+ /**
+ * Override the default setting of whether future created
+ * nodes have private IP addresses only, namely
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ *
+ * Generated from protobuf field optional bool desired_default_enable_private_nodes = 72;
+ */
+ protected $desired_default_enable_private_nodes = null;
+ /**
+ * [Control plane
+ * endpoints][google.container.v1.Cluster.control_plane_endpoints_config]
+ * configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig desired_control_plane_endpoints_config = 73;
+ */
+ protected $desired_control_plane_endpoints_config = null;
/**
* The Kubernetes version to change the master to.
* Users may specify either explicit versions offered by
@@ -400,6 +429,18 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* Generated from protobuf field optional bool desired_enable_cilium_clusterwide_network_policy = 138;
*/
protected $desired_enable_cilium_clusterwide_network_policy = null;
+ /**
+ * Enable/Disable Secret Manager Config.
+ *
+ * Generated from protobuf field optional .google.container.v1.SecretManagerConfig desired_secret_manager_config = 139;
+ */
+ protected $desired_secret_manager_config = null;
+ /**
+ * Enable/Disable Compliance Posture features for the cluster.
+ *
+ * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig desired_compliance_posture_config = 140;
+ */
+ protected $desired_compliance_posture_config = null;
/**
* The desired node kubelet config for the cluster.
*
@@ -413,6 +454,19 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* Generated from protobuf field .google.container.v1.NodeKubeletConfig desired_node_pool_auto_config_kubelet_config = 142;
*/
protected $desired_node_pool_auto_config_kubelet_config = null;
+ /**
+ * The Custom keys configuration for the cluster.
+ *
+ * Generated from protobuf field .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 143;
+ */
+ protected $user_managed_keys_config = null;
+ /**
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
+ *
+ * Generated from protobuf field optional .google.container.v1.RBACBindingConfig desired_rbac_binding_config = 144;
+ */
+ protected $desired_rbac_binding_config = null;
/**
* Constructor.
@@ -477,6 +531,9 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* pools and will result in nodes being added and/or removed.
* @type \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $desired_master_authorized_networks_config
* The desired configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config
+ * instead.
* @type \Google\Cloud\Container\V1\ClusterAutoscaling $desired_cluster_autoscaling
* Cluster-level autoscaling configuration.
* @type \Google\Cloud\Container\V1\BinaryAuthorization $desired_binary_authorization
@@ -502,6 +559,9 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint]
* for modifying other fields within
* [PrivateClusterConfig][google.container.v1.PrivateClusterConfig].
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.global_access
+ * instead.
* @type \Google\Cloud\Container\V1\IntraNodeVisibilityConfig $desired_intra_node_visibility_config
* The desired config of Intra-node visibility.
* @type \Google\Cloud\Container\V1\DefaultSnatStatus $desired_default_snat_status
@@ -529,6 +589,18 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* ExternalIPs field.
* @type bool $desired_enable_private_endpoint
* Enable/Disable private endpoint for the cluster's master.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
+ * @type bool $desired_default_enable_private_nodes
+ * Override the default setting of whether future created
+ * nodes have private IP addresses only, namely
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $desired_control_plane_endpoints_config
+ * [Control plane
+ * endpoints][google.container.v1.Cluster.control_plane_endpoints_config]
+ * configuration.
* @type string $desired_master_version
* The Kubernetes version to change the master to.
* Users may specify either explicit versions offered by
@@ -587,11 +659,20 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message
* Specify the details of in-transit encryption.
* @type bool $desired_enable_cilium_clusterwide_network_policy
* Enable/Disable Cilium Clusterwide Network Policy for the cluster.
+ * @type \Google\Cloud\Container\V1\SecretManagerConfig $desired_secret_manager_config
+ * Enable/Disable Secret Manager Config.
+ * @type \Google\Cloud\Container\V1\CompliancePostureConfig $desired_compliance_posture_config
+ * Enable/Disable Compliance Posture features for the cluster.
* @type \Google\Cloud\Container\V1\NodeKubeletConfig $desired_node_kubelet_config
* The desired node kubelet config for the cluster.
* @type \Google\Cloud\Container\V1\NodeKubeletConfig $desired_node_pool_auto_config_kubelet_config
* The desired node kubelet config for all auto-provisioned node pools
* in autopilot clusters and node auto-provisioning enabled clusters.
+ * @type \Google\Cloud\Container\V1\UserManagedKeysConfig $user_managed_keys_config
+ * The Custom keys configuration for the cluster.
+ * @type \Google\Cloud\Container\V1\RBACBindingConfig $desired_rbac_binding_config
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
* }
*/
public function __construct($data = NULL) {
@@ -1077,34 +1158,46 @@ public function setDesiredLocations($var)
/**
* The desired configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config
+ * instead.
*
- * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12;
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12 [deprecated = true];
* @return \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig|null
+ * @deprecated
*/
public function getDesiredMasterAuthorizedNetworksConfig()
{
+ @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
return $this->desired_master_authorized_networks_config;
}
public function hasDesiredMasterAuthorizedNetworksConfig()
{
+ @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
return isset($this->desired_master_authorized_networks_config);
}
public function clearDesiredMasterAuthorizedNetworksConfig()
{
+ @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
unset($this->desired_master_authorized_networks_config);
}
/**
* The desired configuration options for master authorized networks feature.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config
+ * instead.
*
- * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12;
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12 [deprecated = true];
* @param \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $var
* @return $this
+ * @deprecated
*/
public function setDesiredMasterAuthorizedNetworksConfig($var)
{
+ @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig::class);
$this->desired_master_authorized_networks_config = $var;
@@ -1304,22 +1397,29 @@ public function setDesiredVerticalPodAutoscaling($var)
* [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint]
* for modifying other fields within
* [PrivateClusterConfig][google.container.v1.PrivateClusterConfig].
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.global_access
+ * instead.
*
- * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25;
+ * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25 [deprecated = true];
* @return \Google\Cloud\Container\V1\PrivateClusterConfig|null
+ * @deprecated
*/
public function getDesiredPrivateClusterConfig()
{
+ @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED);
return $this->desired_private_cluster_config;
}
public function hasDesiredPrivateClusterConfig()
{
+ @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED);
return isset($this->desired_private_cluster_config);
}
public function clearDesiredPrivateClusterConfig()
{
+ @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED);
unset($this->desired_private_cluster_config);
}
@@ -1330,13 +1430,18 @@ public function clearDesiredPrivateClusterConfig()
* [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint]
* for modifying other fields within
* [PrivateClusterConfig][google.container.v1.PrivateClusterConfig].
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.global_access
+ * instead.
*
- * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25;
+ * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25 [deprecated = true];
* @param \Google\Cloud\Container\V1\PrivateClusterConfig $var
* @return $this
+ * @deprecated
*/
public function setDesiredPrivateClusterConfig($var)
{
+ @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\PrivateClusterConfig::class);
$this->desired_private_cluster_config = $var;
@@ -1759,40 +1864,134 @@ public function setDesiredServiceExternalIpsConfig($var)
/**
* Enable/Disable private endpoint for the cluster's master.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
*
- * Generated from protobuf field optional bool desired_enable_private_endpoint = 71;
+ * Generated from protobuf field optional bool desired_enable_private_endpoint = 71 [deprecated = true];
* @return bool
+ * @deprecated
*/
public function getDesiredEnablePrivateEndpoint()
{
+ @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED);
return isset($this->desired_enable_private_endpoint) ? $this->desired_enable_private_endpoint : false;
}
public function hasDesiredEnablePrivateEndpoint()
{
+ @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED);
return isset($this->desired_enable_private_endpoint);
}
public function clearDesiredEnablePrivateEndpoint()
{
+ @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED);
unset($this->desired_enable_private_endpoint);
}
/**
* Enable/Disable private endpoint for the cluster's master.
+ * Deprecated: Use
+ * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
*
- * Generated from protobuf field optional bool desired_enable_private_endpoint = 71;
+ * Generated from protobuf field optional bool desired_enable_private_endpoint = 71 [deprecated = true];
* @param bool $var
* @return $this
+ * @deprecated
*/
public function setDesiredEnablePrivateEndpoint($var)
{
+ @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkBool($var);
$this->desired_enable_private_endpoint = $var;
return $this;
}
+ /**
+ * Override the default setting of whether future created
+ * nodes have private IP addresses only, namely
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ *
+ * Generated from protobuf field optional bool desired_default_enable_private_nodes = 72;
+ * @return bool
+ */
+ public function getDesiredDefaultEnablePrivateNodes()
+ {
+ return isset($this->desired_default_enable_private_nodes) ? $this->desired_default_enable_private_nodes : false;
+ }
+
+ public function hasDesiredDefaultEnablePrivateNodes()
+ {
+ return isset($this->desired_default_enable_private_nodes);
+ }
+
+ public function clearDesiredDefaultEnablePrivateNodes()
+ {
+ unset($this->desired_default_enable_private_nodes);
+ }
+
+ /**
+ * Override the default setting of whether future created
+ * nodes have private IP addresses only, namely
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ *
+ * Generated from protobuf field optional bool desired_default_enable_private_nodes = 72;
+ * @param bool $var
+ * @return $this
+ */
+ public function setDesiredDefaultEnablePrivateNodes($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->desired_default_enable_private_nodes = $var;
+
+ return $this;
+ }
+
+ /**
+ * [Control plane
+ * endpoints][google.container.v1.Cluster.control_plane_endpoints_config]
+ * configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig desired_control_plane_endpoints_config = 73;
+ * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig|null
+ */
+ public function getDesiredControlPlaneEndpointsConfig()
+ {
+ return $this->desired_control_plane_endpoints_config;
+ }
+
+ public function hasDesiredControlPlaneEndpointsConfig()
+ {
+ return isset($this->desired_control_plane_endpoints_config);
+ }
+
+ public function clearDesiredControlPlaneEndpointsConfig()
+ {
+ unset($this->desired_control_plane_endpoints_config);
+ }
+
+ /**
+ * [Control plane
+ * endpoints][google.container.v1.Cluster.control_plane_endpoints_config]
+ * configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig desired_control_plane_endpoints_config = 73;
+ * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $var
+ * @return $this
+ */
+ public function setDesiredControlPlaneEndpointsConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig::class);
+ $this->desired_control_plane_endpoints_config = $var;
+
+ return $this;
+ }
+
/**
* The Kubernetes version to change the master to.
* Users may specify either explicit versions offered by
@@ -2551,6 +2750,78 @@ public function setDesiredEnableCiliumClusterwideNetworkPolicy($var)
return $this;
}
+ /**
+ * Enable/Disable Secret Manager Config.
+ *
+ * Generated from protobuf field optional .google.container.v1.SecretManagerConfig desired_secret_manager_config = 139;
+ * @return \Google\Cloud\Container\V1\SecretManagerConfig|null
+ */
+ public function getDesiredSecretManagerConfig()
+ {
+ return $this->desired_secret_manager_config;
+ }
+
+ public function hasDesiredSecretManagerConfig()
+ {
+ return isset($this->desired_secret_manager_config);
+ }
+
+ public function clearDesiredSecretManagerConfig()
+ {
+ unset($this->desired_secret_manager_config);
+ }
+
+ /**
+ * Enable/Disable Secret Manager Config.
+ *
+ * Generated from protobuf field optional .google.container.v1.SecretManagerConfig desired_secret_manager_config = 139;
+ * @param \Google\Cloud\Container\V1\SecretManagerConfig $var
+ * @return $this
+ */
+ public function setDesiredSecretManagerConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\SecretManagerConfig::class);
+ $this->desired_secret_manager_config = $var;
+
+ return $this;
+ }
+
+ /**
+ * Enable/Disable Compliance Posture features for the cluster.
+ *
+ * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig desired_compliance_posture_config = 140;
+ * @return \Google\Cloud\Container\V1\CompliancePostureConfig|null
+ */
+ public function getDesiredCompliancePostureConfig()
+ {
+ return $this->desired_compliance_posture_config;
+ }
+
+ public function hasDesiredCompliancePostureConfig()
+ {
+ return isset($this->desired_compliance_posture_config);
+ }
+
+ public function clearDesiredCompliancePostureConfig()
+ {
+ unset($this->desired_compliance_posture_config);
+ }
+
+ /**
+ * Enable/Disable Compliance Posture features for the cluster.
+ *
+ * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig desired_compliance_posture_config = 140;
+ * @param \Google\Cloud\Container\V1\CompliancePostureConfig $var
+ * @return $this
+ */
+ public function setDesiredCompliancePostureConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\CompliancePostureConfig::class);
+ $this->desired_compliance_posture_config = $var;
+
+ return $this;
+ }
+
/**
* The desired node kubelet config for the cluster.
*
@@ -2625,5 +2896,79 @@ public function setDesiredNodePoolAutoConfigKubeletConfig($var)
return $this;
}
+ /**
+ * The Custom keys configuration for the cluster.
+ *
+ * Generated from protobuf field .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 143;
+ * @return \Google\Cloud\Container\V1\UserManagedKeysConfig|null
+ */
+ public function getUserManagedKeysConfig()
+ {
+ return $this->user_managed_keys_config;
+ }
+
+ public function hasUserManagedKeysConfig()
+ {
+ return isset($this->user_managed_keys_config);
+ }
+
+ public function clearUserManagedKeysConfig()
+ {
+ unset($this->user_managed_keys_config);
+ }
+
+ /**
+ * The Custom keys configuration for the cluster.
+ *
+ * Generated from protobuf field .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 143;
+ * @param \Google\Cloud\Container\V1\UserManagedKeysConfig $var
+ * @return $this
+ */
+ public function setUserManagedKeysConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\UserManagedKeysConfig::class);
+ $this->user_managed_keys_config = $var;
+
+ return $this;
+ }
+
+ /**
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
+ *
+ * Generated from protobuf field optional .google.container.v1.RBACBindingConfig desired_rbac_binding_config = 144;
+ * @return \Google\Cloud\Container\V1\RBACBindingConfig|null
+ */
+ public function getDesiredRbacBindingConfig()
+ {
+ return $this->desired_rbac_binding_config;
+ }
+
+ public function hasDesiredRbacBindingConfig()
+ {
+ return isset($this->desired_rbac_binding_config);
+ }
+
+ public function clearDesiredRbacBindingConfig()
+ {
+ unset($this->desired_rbac_binding_config);
+ }
+
+ /**
+ * RBACBindingConfig allows user to restrict ClusterRoleBindings an
+ * RoleBindings that can be created.
+ *
+ * Generated from protobuf field optional .google.container.v1.RBACBindingConfig desired_rbac_binding_config = 144;
+ * @param \Google\Cloud\Container\V1\RBACBindingConfig $var
+ * @return $this
+ */
+ public function setDesiredRbacBindingConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\RBACBindingConfig::class);
+ $this->desired_rbac_binding_config = $var;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/CompliancePostureConfig.php b/src/V1/CompliancePostureConfig.php
new file mode 100644
index 0000000..f0ba2f3
--- /dev/null
+++ b/src/V1/CompliancePostureConfig.php
@@ -0,0 +1,112 @@
+google.container.v1.CompliancePostureConfig
+ */
+class CompliancePostureConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Defines the enablement mode for Compliance Posture.
+ *
+ * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig.Mode mode = 1;
+ */
+ protected $mode = null;
+ /**
+ * List of enabled compliance standards.
+ *
+ * Generated from protobuf field repeated .google.container.v1.CompliancePostureConfig.ComplianceStandard compliance_standards = 2;
+ */
+ private $compliance_standards;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type int $mode
+ * Defines the enablement mode for Compliance Posture.
+ * @type array<\Google\Cloud\Container\V1\CompliancePostureConfig\ComplianceStandard>|\Google\Protobuf\Internal\RepeatedField $compliance_standards
+ * List of enabled compliance standards.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Defines the enablement mode for Compliance Posture.
+ *
+ * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig.Mode mode = 1;
+ * @return int
+ */
+ public function getMode()
+ {
+ return isset($this->mode) ? $this->mode : 0;
+ }
+
+ public function hasMode()
+ {
+ return isset($this->mode);
+ }
+
+ public function clearMode()
+ {
+ unset($this->mode);
+ }
+
+ /**
+ * Defines the enablement mode for Compliance Posture.
+ *
+ * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig.Mode mode = 1;
+ * @param int $var
+ * @return $this
+ */
+ public function setMode($var)
+ {
+ GPBUtil::checkEnum($var, \Google\Cloud\Container\V1\CompliancePostureConfig\Mode::class);
+ $this->mode = $var;
+
+ return $this;
+ }
+
+ /**
+ * List of enabled compliance standards.
+ *
+ * Generated from protobuf field repeated .google.container.v1.CompliancePostureConfig.ComplianceStandard compliance_standards = 2;
+ * @return \Google\Protobuf\Internal\RepeatedField
+ */
+ public function getComplianceStandards()
+ {
+ return $this->compliance_standards;
+ }
+
+ /**
+ * List of enabled compliance standards.
+ *
+ * Generated from protobuf field repeated .google.container.v1.CompliancePostureConfig.ComplianceStandard compliance_standards = 2;
+ * @param array<\Google\Cloud\Container\V1\CompliancePostureConfig\ComplianceStandard>|\Google\Protobuf\Internal\RepeatedField $var
+ * @return $this
+ */
+ public function setComplianceStandards($var)
+ {
+ $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::MESSAGE, \Google\Cloud\Container\V1\CompliancePostureConfig\ComplianceStandard::class);
+ $this->compliance_standards = $arr;
+
+ return $this;
+ }
+
+}
+
diff --git a/src/V1/CompliancePostureConfig/ComplianceStandard.php b/src/V1/CompliancePostureConfig/ComplianceStandard.php
new file mode 100644
index 0000000..4657961
--- /dev/null
+++ b/src/V1/CompliancePostureConfig/ComplianceStandard.php
@@ -0,0 +1,78 @@
+google.container.v1.CompliancePostureConfig.ComplianceStandard
+ */
+class ComplianceStandard extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Name of the compliance standard.
+ *
+ * Generated from protobuf field optional string standard = 1;
+ */
+ protected $standard = null;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type string $standard
+ * Name of the compliance standard.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Name of the compliance standard.
+ *
+ * Generated from protobuf field optional string standard = 1;
+ * @return string
+ */
+ public function getStandard()
+ {
+ return isset($this->standard) ? $this->standard : '';
+ }
+
+ public function hasStandard()
+ {
+ return isset($this->standard);
+ }
+
+ public function clearStandard()
+ {
+ unset($this->standard);
+ }
+
+ /**
+ * Name of the compliance standard.
+ *
+ * Generated from protobuf field optional string standard = 1;
+ * @param string $var
+ * @return $this
+ */
+ public function setStandard($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->standard = $var;
+
+ return $this;
+ }
+
+}
+
+
diff --git a/src/V1/CompliancePostureConfig/Mode.php b/src/V1/CompliancePostureConfig/Mode.php
new file mode 100644
index 0000000..e5ad0c4
--- /dev/null
+++ b/src/V1/CompliancePostureConfig/Mode.php
@@ -0,0 +1,62 @@
+google.container.v1.CompliancePostureConfig.Mode
+ */
+class Mode
+{
+ /**
+ * Default value not specified.
+ *
+ * Generated from protobuf enum MODE_UNSPECIFIED = 0;
+ */
+ const MODE_UNSPECIFIED = 0;
+ /**
+ * Disables Compliance Posture features on the cluster.
+ *
+ * Generated from protobuf enum DISABLED = 1;
+ */
+ const DISABLED = 1;
+ /**
+ * Enables Compliance Posture features on the cluster.
+ *
+ * Generated from protobuf enum ENABLED = 2;
+ */
+ const ENABLED = 2;
+
+ private static $valueToName = [
+ self::MODE_UNSPECIFIED => 'MODE_UNSPECIFIED',
+ self::DISABLED => 'DISABLED',
+ self::ENABLED => 'ENABLED',
+ ];
+
+ public static function name($value)
+ {
+ if (!isset(self::$valueToName[$value])) {
+ throw new UnexpectedValueException(sprintf(
+ 'Enum %s has no name defined for value %s', __CLASS__, $value));
+ }
+ return self::$valueToName[$value];
+ }
+
+
+ public static function value($name)
+ {
+ $const = __CLASS__ . '::' . strtoupper($name);
+ if (!defined($const)) {
+ throw new UnexpectedValueException(sprintf(
+ 'Enum %s has no value defined for name %s', __CLASS__, $name));
+ }
+ return constant($const);
+ }
+}
+
+
diff --git a/src/V1/ControlPlaneEndpointsConfig.php b/src/V1/ControlPlaneEndpointsConfig.php
new file mode 100644
index 0000000..fccd480
--- /dev/null
+++ b/src/V1/ControlPlaneEndpointsConfig.php
@@ -0,0 +1,121 @@
+google.container.v1.ControlPlaneEndpointsConfig
+ */
+class ControlPlaneEndpointsConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * DNS endpoint configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig dns_endpoint_config = 1;
+ */
+ protected $dns_endpoint_config = null;
+ /**
+ * IP endpoints configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig ip_endpoints_config = 3;
+ */
+ protected $ip_endpoints_config = null;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig $dns_endpoint_config
+ * DNS endpoint configuration.
+ * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig $ip_endpoints_config
+ * IP endpoints configuration.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * DNS endpoint configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig dns_endpoint_config = 1;
+ * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig|null
+ */
+ public function getDnsEndpointConfig()
+ {
+ return $this->dns_endpoint_config;
+ }
+
+ public function hasDnsEndpointConfig()
+ {
+ return isset($this->dns_endpoint_config);
+ }
+
+ public function clearDnsEndpointConfig()
+ {
+ unset($this->dns_endpoint_config);
+ }
+
+ /**
+ * DNS endpoint configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig dns_endpoint_config = 1;
+ * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig $var
+ * @return $this
+ */
+ public function setDnsEndpointConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig::class);
+ $this->dns_endpoint_config = $var;
+
+ return $this;
+ }
+
+ /**
+ * IP endpoints configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig ip_endpoints_config = 3;
+ * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig|null
+ */
+ public function getIpEndpointsConfig()
+ {
+ return $this->ip_endpoints_config;
+ }
+
+ public function hasIpEndpointsConfig()
+ {
+ return isset($this->ip_endpoints_config);
+ }
+
+ public function clearIpEndpointsConfig()
+ {
+ unset($this->ip_endpoints_config);
+ }
+
+ /**
+ * IP endpoints configuration.
+ *
+ * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig ip_endpoints_config = 3;
+ * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig $var
+ * @return $this
+ */
+ public function setIpEndpointsConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig::class);
+ $this->ip_endpoints_config = $var;
+
+ return $this;
+ }
+
+}
+
diff --git a/src/V1/ControlPlaneEndpointsConfig/DNSEndpointConfig.php b/src/V1/ControlPlaneEndpointsConfig/DNSEndpointConfig.php
new file mode 100644
index 0000000..ac13124
--- /dev/null
+++ b/src/V1/ControlPlaneEndpointsConfig/DNSEndpointConfig.php
@@ -0,0 +1,132 @@
+google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig
+ */
+class DNSEndpointConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Output only. The cluster's DNS endpoint configuration.
+ * A DNS format address. This is accessible from the public internet.
+ * Ex: uid.us-central1.gke.goog.
+ * Always present, but the behavior may change according to the value of
+ * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic].
+ *
+ * Generated from protobuf field string endpoint = 2 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ */
+ protected $endpoint = '';
+ /**
+ * Controls whether user traffic is allowed over this endpoint. Note that
+ * GCP-managed services may still use the endpoint even if this is false.
+ *
+ * Generated from protobuf field optional bool allow_external_traffic = 3;
+ */
+ protected $allow_external_traffic = null;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type string $endpoint
+ * Output only. The cluster's DNS endpoint configuration.
+ * A DNS format address. This is accessible from the public internet.
+ * Ex: uid.us-central1.gke.goog.
+ * Always present, but the behavior may change according to the value of
+ * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic].
+ * @type bool $allow_external_traffic
+ * Controls whether user traffic is allowed over this endpoint. Note that
+ * GCP-managed services may still use the endpoint even if this is false.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Output only. The cluster's DNS endpoint configuration.
+ * A DNS format address. This is accessible from the public internet.
+ * Ex: uid.us-central1.gke.goog.
+ * Always present, but the behavior may change according to the value of
+ * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic].
+ *
+ * Generated from protobuf field string endpoint = 2 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @return string
+ */
+ public function getEndpoint()
+ {
+ return $this->endpoint;
+ }
+
+ /**
+ * Output only. The cluster's DNS endpoint configuration.
+ * A DNS format address. This is accessible from the public internet.
+ * Ex: uid.us-central1.gke.goog.
+ * Always present, but the behavior may change according to the value of
+ * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic].
+ *
+ * Generated from protobuf field string endpoint = 2 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @param string $var
+ * @return $this
+ */
+ public function setEndpoint($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->endpoint = $var;
+
+ return $this;
+ }
+
+ /**
+ * Controls whether user traffic is allowed over this endpoint. Note that
+ * GCP-managed services may still use the endpoint even if this is false.
+ *
+ * Generated from protobuf field optional bool allow_external_traffic = 3;
+ * @return bool
+ */
+ public function getAllowExternalTraffic()
+ {
+ return isset($this->allow_external_traffic) ? $this->allow_external_traffic : false;
+ }
+
+ public function hasAllowExternalTraffic()
+ {
+ return isset($this->allow_external_traffic);
+ }
+
+ public function clearAllowExternalTraffic()
+ {
+ unset($this->allow_external_traffic);
+ }
+
+ /**
+ * Controls whether user traffic is allowed over this endpoint. Note that
+ * GCP-managed services may still use the endpoint even if this is false.
+ *
+ * Generated from protobuf field optional bool allow_external_traffic = 3;
+ * @param bool $var
+ * @return $this
+ */
+ public function setAllowExternalTraffic($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->allow_external_traffic = $var;
+
+ return $this;
+ }
+
+}
+
+
diff --git a/src/V1/ControlPlaneEndpointsConfig/IPEndpointsConfig.php b/src/V1/ControlPlaneEndpointsConfig/IPEndpointsConfig.php
new file mode 100644
index 0000000..aef6559
--- /dev/null
+++ b/src/V1/ControlPlaneEndpointsConfig/IPEndpointsConfig.php
@@ -0,0 +1,380 @@
+google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig
+ */
+class IPEndpointsConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Controls whether to allow direct IP access.
+ *
+ * Generated from protobuf field optional bool enabled = 1;
+ */
+ protected $enabled = null;
+ /**
+ * Controls whether the control plane allows access through a public IP.
+ * It is invalid to specify both
+ * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same
+ * time.
+ *
+ * Generated from protobuf field optional bool enable_public_endpoint = 2;
+ */
+ protected $enable_public_endpoint = null;
+ /**
+ * Controls whether the control plane's private endpoint is accessible from
+ * sources in other regions.
+ * It is invalid to specify both
+ * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled]
+ * and this field at the same time.
+ *
+ * Generated from protobuf field optional bool global_access = 3;
+ */
+ protected $global_access = null;
+ /**
+ * Configuration of authorized networks. If enabled, restricts access to the
+ * control plane based on source IP.
+ * It is invalid to specify both
+ * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same
+ * time.
+ *
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig authorized_networks_config = 4;
+ */
+ protected $authorized_networks_config = null;
+ /**
+ * Output only. The external IP address of this cluster's control plane.
+ * Only populated if enabled.
+ *
+ * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ */
+ protected $public_endpoint = '';
+ /**
+ * Output only. The internal IP address of this cluster's control plane.
+ * Only populated if enabled.
+ *
+ * Generated from protobuf field string private_endpoint = 6 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ */
+ protected $private_endpoint = '';
+ /**
+ * Subnet to provision the master's private endpoint during cluster
+ * creation. Specified in projects/*/regions/*/subnetworks/* format. It is
+ * invalid to specify both
+ * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the
+ * same time.
+ *
+ * Generated from protobuf field string private_endpoint_subnetwork = 7;
+ */
+ protected $private_endpoint_subnetwork = '';
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type bool $enabled
+ * Controls whether to allow direct IP access.
+ * @type bool $enable_public_endpoint
+ * Controls whether the control plane allows access through a public IP.
+ * It is invalid to specify both
+ * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same
+ * time.
+ * @type bool $global_access
+ * Controls whether the control plane's private endpoint is accessible from
+ * sources in other regions.
+ * It is invalid to specify both
+ * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled]
+ * and this field at the same time.
+ * @type \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $authorized_networks_config
+ * Configuration of authorized networks. If enabled, restricts access to the
+ * control plane based on source IP.
+ * It is invalid to specify both
+ * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same
+ * time.
+ * @type string $public_endpoint
+ * Output only. The external IP address of this cluster's control plane.
+ * Only populated if enabled.
+ * @type string $private_endpoint
+ * Output only. The internal IP address of this cluster's control plane.
+ * Only populated if enabled.
+ * @type string $private_endpoint_subnetwork
+ * Subnet to provision the master's private endpoint during cluster
+ * creation. Specified in projects/*/regions/*/subnetworks/* format. It is
+ * invalid to specify both
+ * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the
+ * same time.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Controls whether to allow direct IP access.
+ *
+ * Generated from protobuf field optional bool enabled = 1;
+ * @return bool
+ */
+ public function getEnabled()
+ {
+ return isset($this->enabled) ? $this->enabled : false;
+ }
+
+ public function hasEnabled()
+ {
+ return isset($this->enabled);
+ }
+
+ public function clearEnabled()
+ {
+ unset($this->enabled);
+ }
+
+ /**
+ * Controls whether to allow direct IP access.
+ *
+ * Generated from protobuf field optional bool enabled = 1;
+ * @param bool $var
+ * @return $this
+ */
+ public function setEnabled($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->enabled = $var;
+
+ return $this;
+ }
+
+ /**
+ * Controls whether the control plane allows access through a public IP.
+ * It is invalid to specify both
+ * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same
+ * time.
+ *
+ * Generated from protobuf field optional bool enable_public_endpoint = 2;
+ * @return bool
+ */
+ public function getEnablePublicEndpoint()
+ {
+ return isset($this->enable_public_endpoint) ? $this->enable_public_endpoint : false;
+ }
+
+ public function hasEnablePublicEndpoint()
+ {
+ return isset($this->enable_public_endpoint);
+ }
+
+ public function clearEnablePublicEndpoint()
+ {
+ unset($this->enable_public_endpoint);
+ }
+
+ /**
+ * Controls whether the control plane allows access through a public IP.
+ * It is invalid to specify both
+ * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same
+ * time.
+ *
+ * Generated from protobuf field optional bool enable_public_endpoint = 2;
+ * @param bool $var
+ * @return $this
+ */
+ public function setEnablePublicEndpoint($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->enable_public_endpoint = $var;
+
+ return $this;
+ }
+
+ /**
+ * Controls whether the control plane's private endpoint is accessible from
+ * sources in other regions.
+ * It is invalid to specify both
+ * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled]
+ * and this field at the same time.
+ *
+ * Generated from protobuf field optional bool global_access = 3;
+ * @return bool
+ */
+ public function getGlobalAccess()
+ {
+ return isset($this->global_access) ? $this->global_access : false;
+ }
+
+ public function hasGlobalAccess()
+ {
+ return isset($this->global_access);
+ }
+
+ public function clearGlobalAccess()
+ {
+ unset($this->global_access);
+ }
+
+ /**
+ * Controls whether the control plane's private endpoint is accessible from
+ * sources in other regions.
+ * It is invalid to specify both
+ * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled]
+ * and this field at the same time.
+ *
+ * Generated from protobuf field optional bool global_access = 3;
+ * @param bool $var
+ * @return $this
+ */
+ public function setGlobalAccess($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->global_access = $var;
+
+ return $this;
+ }
+
+ /**
+ * Configuration of authorized networks. If enabled, restricts access to the
+ * control plane based on source IP.
+ * It is invalid to specify both
+ * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same
+ * time.
+ *
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig authorized_networks_config = 4;
+ * @return \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig|null
+ */
+ public function getAuthorizedNetworksConfig()
+ {
+ return $this->authorized_networks_config;
+ }
+
+ public function hasAuthorizedNetworksConfig()
+ {
+ return isset($this->authorized_networks_config);
+ }
+
+ public function clearAuthorizedNetworksConfig()
+ {
+ unset($this->authorized_networks_config);
+ }
+
+ /**
+ * Configuration of authorized networks. If enabled, restricts access to the
+ * control plane based on source IP.
+ * It is invalid to specify both
+ * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same
+ * time.
+ *
+ * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig authorized_networks_config = 4;
+ * @param \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $var
+ * @return $this
+ */
+ public function setAuthorizedNetworksConfig($var)
+ {
+ GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig::class);
+ $this->authorized_networks_config = $var;
+
+ return $this;
+ }
+
+ /**
+ * Output only. The external IP address of this cluster's control plane.
+ * Only populated if enabled.
+ *
+ * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @return string
+ */
+ public function getPublicEndpoint()
+ {
+ return $this->public_endpoint;
+ }
+
+ /**
+ * Output only. The external IP address of this cluster's control plane.
+ * Only populated if enabled.
+ *
+ * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @param string $var
+ * @return $this
+ */
+ public function setPublicEndpoint($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->public_endpoint = $var;
+
+ return $this;
+ }
+
+ /**
+ * Output only. The internal IP address of this cluster's control plane.
+ * Only populated if enabled.
+ *
+ * Generated from protobuf field string private_endpoint = 6 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @return string
+ */
+ public function getPrivateEndpoint()
+ {
+ return $this->private_endpoint;
+ }
+
+ /**
+ * Output only. The internal IP address of this cluster's control plane.
+ * Only populated if enabled.
+ *
+ * Generated from protobuf field string private_endpoint = 6 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @param string $var
+ * @return $this
+ */
+ public function setPrivateEndpoint($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->private_endpoint = $var;
+
+ return $this;
+ }
+
+ /**
+ * Subnet to provision the master's private endpoint during cluster
+ * creation. Specified in projects/*/regions/*/subnetworks/* format. It is
+ * invalid to specify both
+ * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the
+ * same time.
+ *
+ * Generated from protobuf field string private_endpoint_subnetwork = 7;
+ * @return string
+ */
+ public function getPrivateEndpointSubnetwork()
+ {
+ return $this->private_endpoint_subnetwork;
+ }
+
+ /**
+ * Subnet to provision the master's private endpoint during cluster
+ * creation. Specified in projects/*/regions/*/subnetworks/* format. It is
+ * invalid to specify both
+ * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the
+ * same time.
+ *
+ * Generated from protobuf field string private_endpoint_subnetwork = 7;
+ * @param string $var
+ * @return $this
+ */
+ public function setPrivateEndpointSubnetwork($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->private_endpoint_subnetwork = $var;
+
+ return $this;
+ }
+
+}
+
+
diff --git a/src/V1/EnterpriseConfig.php b/src/V1/EnterpriseConfig.php
index 87d3756..8f53cca 100644
--- a/src/V1/EnterpriseConfig.php
+++ b/src/V1/EnterpriseConfig.php
@@ -16,7 +16,7 @@
class EnterpriseConfig extends \Google\Protobuf\Internal\Message
{
/**
- * Output only. cluster_tier specifies the premium tier of the cluster.
+ * Output only. cluster_tier indicates the effective tier of the cluster.
*
* Generated from protobuf field .google.container.v1.EnterpriseConfig.ClusterTier cluster_tier = 1 [(.google.api.field_behavior) = OUTPUT_ONLY];
*/
@@ -29,7 +29,7 @@ class EnterpriseConfig extends \Google\Protobuf\Internal\Message
* Optional. Data for populating the Message object.
*
* @type int $cluster_tier
- * Output only. cluster_tier specifies the premium tier of the cluster.
+ * Output only. cluster_tier indicates the effective tier of the cluster.
* }
*/
public function __construct($data = NULL) {
@@ -38,7 +38,7 @@ public function __construct($data = NULL) {
}
/**
- * Output only. cluster_tier specifies the premium tier of the cluster.
+ * Output only. cluster_tier indicates the effective tier of the cluster.
*
* Generated from protobuf field .google.container.v1.EnterpriseConfig.ClusterTier cluster_tier = 1 [(.google.api.field_behavior) = OUTPUT_ONLY];
* @return int
@@ -49,7 +49,7 @@ public function getClusterTier()
}
/**
- * Output only. cluster_tier specifies the premium tier of the cluster.
+ * Output only. cluster_tier indicates the effective tier of the cluster.
*
* Generated from protobuf field .google.container.v1.EnterpriseConfig.ClusterTier cluster_tier = 1 [(.google.api.field_behavior) = OUTPUT_ONLY];
* @param int $var
diff --git a/src/V1/LoggingComponentConfig/Component.php b/src/V1/LoggingComponentConfig/Component.php
index 2e72c43..20604f8 100644
--- a/src/V1/LoggingComponentConfig/Component.php
+++ b/src/V1/LoggingComponentConfig/Component.php
@@ -49,6 +49,18 @@ class Component
* Generated from protobuf enum CONTROLLER_MANAGER = 5;
*/
const CONTROLLER_MANAGER = 5;
+ /**
+ * kcp-sshd
+ *
+ * Generated from protobuf enum KCP_SSHD = 7;
+ */
+ const KCP_SSHD = 7;
+ /**
+ * kcp connection logs
+ *
+ * Generated from protobuf enum KCP_CONNECTION = 8;
+ */
+ const KCP_CONNECTION = 8;
private static $valueToName = [
self::COMPONENT_UNSPECIFIED => 'COMPONENT_UNSPECIFIED',
@@ -57,6 +69,8 @@ class Component
self::APISERVER => 'APISERVER',
self::SCHEDULER => 'SCHEDULER',
self::CONTROLLER_MANAGER => 'CONTROLLER_MANAGER',
+ self::KCP_SSHD => 'KCP_SSHD',
+ self::KCP_CONNECTION => 'KCP_CONNECTION',
];
public static function name($value)
diff --git a/src/V1/MasterAuth.php b/src/V1/MasterAuth.php
index 0637bf5..86f08f6 100644
--- a/src/V1/MasterAuth.php
+++ b/src/V1/MasterAuth.php
@@ -61,7 +61,8 @@ class MasterAuth extends \Google\Protobuf\Internal\Message
protected $cluster_ca_certificate = '';
/**
* Output only. Base64-encoded public certificate used by clients to
- * authenticate to the cluster endpoint.
+ * authenticate to the cluster endpoint. Issued only if
+ * client_certificate_config is set.
*
* Generated from protobuf field string client_certificate = 101 [(.google.api.field_behavior) = OUTPUT_ONLY];
*/
@@ -106,7 +107,8 @@ class MasterAuth extends \Google\Protobuf\Internal\Message
* trust for the cluster.
* @type string $client_certificate
* Output only. Base64-encoded public certificate used by clients to
- * authenticate to the cluster endpoint.
+ * authenticate to the cluster endpoint. Issued only if
+ * client_certificate_config is set.
* @type string $client_key
* Output only. Base64-encoded private key used by clients to authenticate
* to the cluster endpoint.
@@ -273,7 +275,8 @@ public function setClusterCaCertificate($var)
/**
* Output only. Base64-encoded public certificate used by clients to
- * authenticate to the cluster endpoint.
+ * authenticate to the cluster endpoint. Issued only if
+ * client_certificate_config is set.
*
* Generated from protobuf field string client_certificate = 101 [(.google.api.field_behavior) = OUTPUT_ONLY];
* @return string
@@ -285,7 +288,8 @@ public function getClientCertificate()
/**
* Output only. Base64-encoded public certificate used by clients to
- * authenticate to the cluster endpoint.
+ * authenticate to the cluster endpoint. Issued only if
+ * client_certificate_config is set.
*
* Generated from protobuf field string client_certificate = 101 [(.google.api.field_behavior) = OUTPUT_ONLY];
* @param string $var
diff --git a/src/V1/MasterAuthorizedNetworksConfig.php b/src/V1/MasterAuthorizedNetworksConfig.php
index f2d4ee4..f136b3f 100644
--- a/src/V1/MasterAuthorizedNetworksConfig.php
+++ b/src/V1/MasterAuthorizedNetworksConfig.php
@@ -37,6 +37,12 @@ class MasterAuthorizedNetworksConfig extends \Google\Protobuf\Internal\Message
* Generated from protobuf field optional bool gcp_public_cidrs_access_enabled = 3;
*/
protected $gcp_public_cidrs_access_enabled = null;
+ /**
+ * Whether master authorized networks is enforced on private endpoint or not.
+ *
+ * Generated from protobuf field optional bool private_endpoint_enforcement_enabled = 5;
+ */
+ protected $private_endpoint_enforcement_enabled = null;
/**
* Constructor.
@@ -51,6 +57,8 @@ class MasterAuthorizedNetworksConfig extends \Google\Protobuf\Internal\Message
* Kubernetes master through HTTPS.
* @type bool $gcp_public_cidrs_access_enabled
* Whether master is accessbile via Google Compute Engine Public IP addresses.
+ * @type bool $private_endpoint_enforcement_enabled
+ * Whether master authorized networks is enforced on private endpoint or not.
* }
*/
public function __construct($data = NULL) {
@@ -148,5 +156,41 @@ public function setGcpPublicCidrsAccessEnabled($var)
return $this;
}
+ /**
+ * Whether master authorized networks is enforced on private endpoint or not.
+ *
+ * Generated from protobuf field optional bool private_endpoint_enforcement_enabled = 5;
+ * @return bool
+ */
+ public function getPrivateEndpointEnforcementEnabled()
+ {
+ return isset($this->private_endpoint_enforcement_enabled) ? $this->private_endpoint_enforcement_enabled : false;
+ }
+
+ public function hasPrivateEndpointEnforcementEnabled()
+ {
+ return isset($this->private_endpoint_enforcement_enabled);
+ }
+
+ public function clearPrivateEndpointEnforcementEnabled()
+ {
+ unset($this->private_endpoint_enforcement_enabled);
+ }
+
+ /**
+ * Whether master authorized networks is enforced on private endpoint or not.
+ *
+ * Generated from protobuf field optional bool private_endpoint_enforcement_enabled = 5;
+ * @param bool $var
+ * @return $this
+ */
+ public function setPrivateEndpointEnforcementEnabled($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->private_endpoint_enforcement_enabled = $var;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/NetworkConfig.php b/src/V1/NetworkConfig.php
index c10adc0..033e3ca 100644
--- a/src/V1/NetworkConfig.php
+++ b/src/V1/NetworkConfig.php
@@ -121,6 +121,16 @@ class NetworkConfig extends \Google\Protobuf\Internal\Message
* Generated from protobuf field optional bool enable_cilium_clusterwide_network_policy = 21;
*/
protected $enable_cilium_clusterwide_network_policy = null;
+ /**
+ * Controls whether by default nodes have private IP addresses only.
+ * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][]
+ * and this field at the same time.
+ * To update the default setting, use
+ * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes]
+ *
+ * Generated from protobuf field optional bool default_enable_private_nodes = 22;
+ */
+ protected $default_enable_private_nodes = null;
/**
* Constructor.
@@ -174,6 +184,12 @@ class NetworkConfig extends \Google\Protobuf\Internal\Message
* Now named inter-node transparent encryption.
* @type bool $enable_cilium_clusterwide_network_policy
* Whether CiliumClusterwideNetworkPolicy is enabled on this cluster.
+ * @type bool $default_enable_private_nodes
+ * Controls whether by default nodes have private IP addresses only.
+ * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][]
+ * and this field at the same time.
+ * To update the default setting, use
+ * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes]
* }
*/
public function __construct($data = NULL) {
@@ -683,5 +699,49 @@ public function setEnableCiliumClusterwideNetworkPolicy($var)
return $this;
}
+ /**
+ * Controls whether by default nodes have private IP addresses only.
+ * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][]
+ * and this field at the same time.
+ * To update the default setting, use
+ * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes]
+ *
+ * Generated from protobuf field optional bool default_enable_private_nodes = 22;
+ * @return bool
+ */
+ public function getDefaultEnablePrivateNodes()
+ {
+ return isset($this->default_enable_private_nodes) ? $this->default_enable_private_nodes : false;
+ }
+
+ public function hasDefaultEnablePrivateNodes()
+ {
+ return isset($this->default_enable_private_nodes);
+ }
+
+ public function clearDefaultEnablePrivateNodes()
+ {
+ unset($this->default_enable_private_nodes);
+ }
+
+ /**
+ * Controls whether by default nodes have private IP addresses only.
+ * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][]
+ * and this field at the same time.
+ * To update the default setting, use
+ * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes]
+ *
+ * Generated from protobuf field optional bool default_enable_private_nodes = 22;
+ * @param bool $var
+ * @return $this
+ */
+ public function setDefaultEnablePrivateNodes($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->default_enable_private_nodes = $var;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/NodeConfig.php b/src/V1/NodeConfig.php
index e3168f9..57436b5 100644
--- a/src/V1/NodeConfig.php
+++ b/src/V1/NodeConfig.php
@@ -337,12 +337,27 @@ class NodeConfig extends \Google\Protobuf\Internal\Message
* Generated from protobuf field repeated .google.container.v1.SecondaryBootDisk secondary_boot_disks = 48;
*/
private $secondary_boot_disks;
+ /**
+ * List of Storage Pools where boot disks are provisioned.
+ *
+ * Generated from protobuf field repeated string storage_pools = 49;
+ */
+ private $storage_pools;
/**
* Secondary boot disk update strategy.
*
* Generated from protobuf field optional .google.container.v1.SecondaryBootDiskUpdateStrategy secondary_boot_disk_update_strategy = 50;
*/
protected $secondary_boot_disk_update_strategy = null;
+ /**
+ * Output only. effective_cgroup_mode is the cgroup mode actually used by the
+ * node pool. It is determined by the cgroup mode specified in the
+ * LinuxNodeConfig or the default cgroup mode based on the cluster creation
+ * version.
+ *
+ * Generated from protobuf field .google.container.v1.NodeConfig.EffectiveCgroupMode effective_cgroup_mode = 55 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ */
+ protected $effective_cgroup_mode = 0;
/**
* Constructor.
@@ -516,8 +531,15 @@ class NodeConfig extends \Google\Protobuf\Internal\Message
* Optional. Reserved for future use.
* @type array<\Google\Cloud\Container\V1\SecondaryBootDisk>|\Google\Protobuf\Internal\RepeatedField $secondary_boot_disks
* List of secondary boot disks attached to the nodes.
+ * @type array|\Google\Protobuf\Internal\RepeatedField $storage_pools
+ * List of Storage Pools where boot disks are provisioned.
* @type \Google\Cloud\Container\V1\SecondaryBootDiskUpdateStrategy $secondary_boot_disk_update_strategy
* Secondary boot disk update strategy.
+ * @type int $effective_cgroup_mode
+ * Output only. effective_cgroup_mode is the cgroup mode actually used by the
+ * node pool. It is determined by the cgroup mode specified in the
+ * LinuxNodeConfig or the default cgroup mode based on the cluster creation
+ * version.
* }
*/
public function __construct($data = NULL) {
@@ -1873,6 +1895,32 @@ public function setSecondaryBootDisks($var)
return $this;
}
+ /**
+ * List of Storage Pools where boot disks are provisioned.
+ *
+ * Generated from protobuf field repeated string storage_pools = 49;
+ * @return \Google\Protobuf\Internal\RepeatedField
+ */
+ public function getStoragePools()
+ {
+ return $this->storage_pools;
+ }
+
+ /**
+ * List of Storage Pools where boot disks are provisioned.
+ *
+ * Generated from protobuf field repeated string storage_pools = 49;
+ * @param array|\Google\Protobuf\Internal\RepeatedField $var
+ * @return $this
+ */
+ public function setStoragePools($var)
+ {
+ $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING);
+ $this->storage_pools = $arr;
+
+ return $this;
+ }
+
/**
* Secondary boot disk update strategy.
*
@@ -1909,5 +1957,37 @@ public function setSecondaryBootDiskUpdateStrategy($var)
return $this;
}
+ /**
+ * Output only. effective_cgroup_mode is the cgroup mode actually used by the
+ * node pool. It is determined by the cgroup mode specified in the
+ * LinuxNodeConfig or the default cgroup mode based on the cluster creation
+ * version.
+ *
+ * Generated from protobuf field .google.container.v1.NodeConfig.EffectiveCgroupMode effective_cgroup_mode = 55 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @return int
+ */
+ public function getEffectiveCgroupMode()
+ {
+ return $this->effective_cgroup_mode;
+ }
+
+ /**
+ * Output only. effective_cgroup_mode is the cgroup mode actually used by the
+ * node pool. It is determined by the cgroup mode specified in the
+ * LinuxNodeConfig or the default cgroup mode based on the cluster creation
+ * version.
+ *
+ * Generated from protobuf field .google.container.v1.NodeConfig.EffectiveCgroupMode effective_cgroup_mode = 55 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * @param int $var
+ * @return $this
+ */
+ public function setEffectiveCgroupMode($var)
+ {
+ GPBUtil::checkEnum($var, \Google\Cloud\Container\V1\NodeConfig\EffectiveCgroupMode::class);
+ $this->effective_cgroup_mode = $var;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/NodeConfig/EffectiveCgroupMode.php b/src/V1/NodeConfig/EffectiveCgroupMode.php
new file mode 100644
index 0000000..aafc283
--- /dev/null
+++ b/src/V1/NodeConfig/EffectiveCgroupMode.php
@@ -0,0 +1,65 @@
+google.container.v1.NodeConfig.EffectiveCgroupMode
+ */
+class EffectiveCgroupMode
+{
+ /**
+ * EFFECTIVE_CGROUP_MODE_UNSPECIFIED means the cgroup configuration for the
+ * node pool is unspecified, i.e. the node pool is a Windows node pool.
+ *
+ * Generated from protobuf enum EFFECTIVE_CGROUP_MODE_UNSPECIFIED = 0;
+ */
+ const EFFECTIVE_CGROUP_MODE_UNSPECIFIED = 0;
+ /**
+ * CGROUP_MODE_V1 means the node pool is configured to use cgroupv1 for the
+ * cgroup configuration.
+ *
+ * Generated from protobuf enum EFFECTIVE_CGROUP_MODE_V1 = 1;
+ */
+ const EFFECTIVE_CGROUP_MODE_V1 = 1;
+ /**
+ * CGROUP_MODE_V2 means the node pool is configured to use cgroupv2 for the
+ * cgroup configuration.
+ *
+ * Generated from protobuf enum EFFECTIVE_CGROUP_MODE_V2 = 2;
+ */
+ const EFFECTIVE_CGROUP_MODE_V2 = 2;
+
+ private static $valueToName = [
+ self::EFFECTIVE_CGROUP_MODE_UNSPECIFIED => 'EFFECTIVE_CGROUP_MODE_UNSPECIFIED',
+ self::EFFECTIVE_CGROUP_MODE_V1 => 'EFFECTIVE_CGROUP_MODE_V1',
+ self::EFFECTIVE_CGROUP_MODE_V2 => 'EFFECTIVE_CGROUP_MODE_V2',
+ ];
+
+ public static function name($value)
+ {
+ if (!isset(self::$valueToName[$value])) {
+ throw new UnexpectedValueException(sprintf(
+ 'Enum %s has no name defined for value %s', __CLASS__, $value));
+ }
+ return self::$valueToName[$value];
+ }
+
+
+ public static function value($name)
+ {
+ $const = __CLASS__ . '::' . strtoupper($name);
+ if (!defined($const)) {
+ throw new UnexpectedValueException(sprintf(
+ 'Enum %s has no value defined for name %s', __CLASS__, $name));
+ }
+ return constant($const);
+ }
+}
+
+
diff --git a/src/V1/NodeNetworkConfig.php b/src/V1/NodeNetworkConfig.php
index 834f9cc..b038dcc 100644
--- a/src/V1/NodeNetworkConfig.php
+++ b/src/V1/NodeNetworkConfig.php
@@ -57,7 +57,7 @@ class NodeNetworkConfig extends \Google\Protobuf\Internal\Message
/**
* Whether nodes have internal IP addresses only.
* If enable_private_nodes is not specified, then the value is derived from
- * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes]
+ * [Cluster.NetworkConfig.default_enable_private_nodes][]
*
* Generated from protobuf field optional bool enable_private_nodes = 9;
*/
@@ -142,7 +142,7 @@ class NodeNetworkConfig extends \Google\Protobuf\Internal\Message
* @type bool $enable_private_nodes
* Whether nodes have internal IP addresses only.
* If enable_private_nodes is not specified, then the value is derived from
- * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes]
+ * [Cluster.NetworkConfig.default_enable_private_nodes][]
* @type \Google\Cloud\Container\V1\NodeNetworkConfig\NetworkPerformanceConfig $network_performance_config
* Network bandwidth tier configuration.
* @type \Google\Cloud\Container\V1\PodCIDROverprovisionConfig $pod_cidr_overprovision_config
@@ -296,7 +296,7 @@ public function setPodIpv4CidrBlock($var)
/**
* Whether nodes have internal IP addresses only.
* If enable_private_nodes is not specified, then the value is derived from
- * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes]
+ * [Cluster.NetworkConfig.default_enable_private_nodes][]
*
* Generated from protobuf field optional bool enable_private_nodes = 9;
* @return bool
@@ -319,7 +319,7 @@ public function clearEnablePrivateNodes()
/**
* Whether nodes have internal IP addresses only.
* If enable_private_nodes is not specified, then the value is derived from
- * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes]
+ * [Cluster.NetworkConfig.default_enable_private_nodes][]
*
* Generated from protobuf field optional bool enable_private_nodes = 9;
* @param bool $var
diff --git a/src/V1/ParallelstoreCsiDriverConfig.php b/src/V1/ParallelstoreCsiDriverConfig.php
new file mode 100644
index 0000000..b793bd2
--- /dev/null
+++ b/src/V1/ParallelstoreCsiDriverConfig.php
@@ -0,0 +1,71 @@
+google.container.v1.ParallelstoreCsiDriverConfig
+ */
+class ParallelstoreCsiDriverConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Whether the Cloud Storage Parallelstore CSI driver is enabled for this
+ * cluster.
+ *
+ * Generated from protobuf field bool enabled = 1;
+ */
+ protected $enabled = false;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type bool $enabled
+ * Whether the Cloud Storage Parallelstore CSI driver is enabled for this
+ * cluster.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Whether the Cloud Storage Parallelstore CSI driver is enabled for this
+ * cluster.
+ *
+ * Generated from protobuf field bool enabled = 1;
+ * @return bool
+ */
+ public function getEnabled()
+ {
+ return $this->enabled;
+ }
+
+ /**
+ * Whether the Cloud Storage Parallelstore CSI driver is enabled for this
+ * cluster.
+ *
+ * Generated from protobuf field bool enabled = 1;
+ * @param bool $var
+ * @return $this
+ */
+ public function setEnabled($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->enabled = $var;
+
+ return $this;
+ }
+
+}
+
diff --git a/src/V1/PrivateClusterConfig.php b/src/V1/PrivateClusterConfig.php
index 77b0254..a6c52fc 100644
--- a/src/V1/PrivateClusterConfig.php
+++ b/src/V1/PrivateClusterConfig.php
@@ -19,14 +19,23 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message
* Whether nodes have internal IP addresses only. If enabled, all nodes are
* given only RFC 1918 private addresses and communicate with the master via
* private networking.
+ * Deprecated: Use
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ * instead.
*
- * Generated from protobuf field bool enable_private_nodes = 1;
+ * Generated from protobuf field bool enable_private_nodes = 1 [deprecated = true];
+ * @deprecated
*/
protected $enable_private_nodes = false;
/**
* Whether the master's internal IP address is used as the cluster endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint]
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
*
- * Generated from protobuf field bool enable_private_endpoint = 2;
+ * Generated from protobuf field bool enable_private_endpoint = 2 [deprecated = true];
+ * @deprecated
*/
protected $enable_private_endpoint = false;
/**
@@ -40,14 +49,22 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message
protected $master_ipv4_cidr_block = '';
/**
* Output only. The internal IP address of this cluster's master endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint]
+ * instead.
*
- * Generated from protobuf field string private_endpoint = 4 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * Generated from protobuf field string private_endpoint = 4 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY];
+ * @deprecated
*/
protected $private_endpoint = '';
/**
* Output only. The external IP address of this cluster's master endpoint.
+ * Deprecated:Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint]
+ * instead.
*
- * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * Generated from protobuf field string public_endpoint = 5 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY];
+ * @deprecated
*/
protected $public_endpoint = '';
/**
@@ -58,15 +75,23 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message
protected $peering_name = '';
/**
* Controls master global access settings.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][]
+ * instead.
*
- * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8;
+ * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8 [deprecated = true];
+ * @deprecated
*/
protected $master_global_access_config = null;
/**
* Subnet to provision the master's private endpoint during cluster creation.
* Specified in projects/*/regions/*/subnetworks/* format.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork]
+ * instead.
*
- * Generated from protobuf field string private_endpoint_subnetwork = 10;
+ * Generated from protobuf field string private_endpoint_subnetwork = 10 [deprecated = true];
+ * @deprecated
*/
protected $private_endpoint_subnetwork = '';
@@ -80,8 +105,15 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message
* Whether nodes have internal IP addresses only. If enabled, all nodes are
* given only RFC 1918 private addresses and communicate with the master via
* private networking.
+ * Deprecated: Use
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ * instead.
* @type bool $enable_private_endpoint
* Whether the master's internal IP address is used as the cluster endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint]
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
* @type string $master_ipv4_cidr_block
* The IP range in CIDR notation to use for the hosted master network. This
* range will be used for assigning internal IP addresses to the master or
@@ -89,15 +121,27 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message
* any other ranges in use within the cluster's network.
* @type string $private_endpoint
* Output only. The internal IP address of this cluster's master endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint]
+ * instead.
* @type string $public_endpoint
* Output only. The external IP address of this cluster's master endpoint.
+ * Deprecated:Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint]
+ * instead.
* @type string $peering_name
* Output only. The peering name in the customer VPC used by this cluster.
* @type \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig $master_global_access_config
* Controls master global access settings.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][]
+ * instead.
* @type string $private_endpoint_subnetwork
* Subnet to provision the master's private endpoint during cluster creation.
* Specified in projects/*/regions/*/subnetworks/* format.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork]
+ * instead.
* }
*/
public function __construct($data = NULL) {
@@ -109,12 +153,17 @@ public function __construct($data = NULL) {
* Whether nodes have internal IP addresses only. If enabled, all nodes are
* given only RFC 1918 private addresses and communicate with the master via
* private networking.
+ * Deprecated: Use
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ * instead.
*
- * Generated from protobuf field bool enable_private_nodes = 1;
+ * Generated from protobuf field bool enable_private_nodes = 1 [deprecated = true];
* @return bool
+ * @deprecated
*/
public function getEnablePrivateNodes()
{
+ @trigger_error('enable_private_nodes is deprecated.', E_USER_DEPRECATED);
return $this->enable_private_nodes;
}
@@ -122,13 +171,18 @@ public function getEnablePrivateNodes()
* Whether nodes have internal IP addresses only. If enabled, all nodes are
* given only RFC 1918 private addresses and communicate with the master via
* private networking.
+ * Deprecated: Use
+ * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes]
+ * instead.
*
- * Generated from protobuf field bool enable_private_nodes = 1;
+ * Generated from protobuf field bool enable_private_nodes = 1 [deprecated = true];
* @param bool $var
* @return $this
+ * @deprecated
*/
public function setEnablePrivateNodes($var)
{
+ @trigger_error('enable_private_nodes is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkBool($var);
$this->enable_private_nodes = $var;
@@ -137,24 +191,36 @@ public function setEnablePrivateNodes($var)
/**
* Whether the master's internal IP address is used as the cluster endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint]
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
*
- * Generated from protobuf field bool enable_private_endpoint = 2;
+ * Generated from protobuf field bool enable_private_endpoint = 2 [deprecated = true];
* @return bool
+ * @deprecated
*/
public function getEnablePrivateEndpoint()
{
+ @trigger_error('enable_private_endpoint is deprecated.', E_USER_DEPRECATED);
return $this->enable_private_endpoint;
}
/**
* Whether the master's internal IP address is used as the cluster endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint]
+ * instead. Note that the value of enable_public_endpoint is reversed: if
+ * enable_private_endpoint is false, then enable_public_endpoint will be true.
*
- * Generated from protobuf field bool enable_private_endpoint = 2;
+ * Generated from protobuf field bool enable_private_endpoint = 2 [deprecated = true];
* @param bool $var
* @return $this
+ * @deprecated
*/
public function setEnablePrivateEndpoint($var)
{
+ @trigger_error('enable_private_endpoint is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkBool($var);
$this->enable_private_endpoint = $var;
@@ -195,24 +261,34 @@ public function setMasterIpv4CidrBlock($var)
/**
* Output only. The internal IP address of this cluster's master endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint]
+ * instead.
*
- * Generated from protobuf field string private_endpoint = 4 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * Generated from protobuf field string private_endpoint = 4 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY];
* @return string
+ * @deprecated
*/
public function getPrivateEndpoint()
{
+ @trigger_error('private_endpoint is deprecated.', E_USER_DEPRECATED);
return $this->private_endpoint;
}
/**
* Output only. The internal IP address of this cluster's master endpoint.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint]
+ * instead.
*
- * Generated from protobuf field string private_endpoint = 4 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * Generated from protobuf field string private_endpoint = 4 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY];
* @param string $var
* @return $this
+ * @deprecated
*/
public function setPrivateEndpoint($var)
{
+ @trigger_error('private_endpoint is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkString($var, True);
$this->private_endpoint = $var;
@@ -221,24 +297,34 @@ public function setPrivateEndpoint($var)
/**
* Output only. The external IP address of this cluster's master endpoint.
+ * Deprecated:Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint]
+ * instead.
*
- * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * Generated from protobuf field string public_endpoint = 5 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY];
* @return string
+ * @deprecated
*/
public function getPublicEndpoint()
{
+ @trigger_error('public_endpoint is deprecated.', E_USER_DEPRECATED);
return $this->public_endpoint;
}
/**
* Output only. The external IP address of this cluster's master endpoint.
+ * Deprecated:Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint]
+ * instead.
*
- * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY];
+ * Generated from protobuf field string public_endpoint = 5 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY];
* @param string $var
* @return $this
+ * @deprecated
*/
public function setPublicEndpoint($var)
{
+ @trigger_error('public_endpoint is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkString($var, True);
$this->public_endpoint = $var;
@@ -273,34 +359,46 @@ public function setPeeringName($var)
/**
* Controls master global access settings.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][]
+ * instead.
*
- * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8;
+ * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8 [deprecated = true];
* @return \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig|null
+ * @deprecated
*/
public function getMasterGlobalAccessConfig()
{
+ @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED);
return $this->master_global_access_config;
}
public function hasMasterGlobalAccessConfig()
{
+ @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED);
return isset($this->master_global_access_config);
}
public function clearMasterGlobalAccessConfig()
{
+ @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED);
unset($this->master_global_access_config);
}
/**
* Controls master global access settings.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][]
+ * instead.
*
- * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8;
+ * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8 [deprecated = true];
* @param \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig $var
* @return $this
+ * @deprecated
*/
public function setMasterGlobalAccessConfig($var)
{
+ @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig::class);
$this->master_global_access_config = $var;
@@ -310,25 +408,35 @@ public function setMasterGlobalAccessConfig($var)
/**
* Subnet to provision the master's private endpoint during cluster creation.
* Specified in projects/*/regions/*/subnetworks/* format.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork]
+ * instead.
*
- * Generated from protobuf field string private_endpoint_subnetwork = 10;
+ * Generated from protobuf field string private_endpoint_subnetwork = 10 [deprecated = true];
* @return string
+ * @deprecated
*/
public function getPrivateEndpointSubnetwork()
{
+ @trigger_error('private_endpoint_subnetwork is deprecated.', E_USER_DEPRECATED);
return $this->private_endpoint_subnetwork;
}
/**
* Subnet to provision the master's private endpoint during cluster creation.
* Specified in projects/*/regions/*/subnetworks/* format.
+ * Deprecated: Use
+ * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork]
+ * instead.
*
- * Generated from protobuf field string private_endpoint_subnetwork = 10;
+ * Generated from protobuf field string private_endpoint_subnetwork = 10 [deprecated = true];
* @param string $var
* @return $this
+ * @deprecated
*/
public function setPrivateEndpointSubnetwork($var)
{
+ @trigger_error('private_endpoint_subnetwork is deprecated.', E_USER_DEPRECATED);
GPBUtil::checkString($var, True);
$this->private_endpoint_subnetwork = $var;
diff --git a/src/V1/RBACBindingConfig.php b/src/V1/RBACBindingConfig.php
new file mode 100644
index 0000000..27a645f
--- /dev/null
+++ b/src/V1/RBACBindingConfig.php
@@ -0,0 +1,130 @@
+google.container.v1.RBACBindingConfig
+ */
+class RBACBindingConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjets system:anonymous or system:unauthenticated.
+ *
+ * Generated from protobuf field optional bool enable_insecure_binding_system_unauthenticated = 1;
+ */
+ protected $enable_insecure_binding_system_unauthenticated = null;
+ /**
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjects system:authenticated.
+ *
+ * Generated from protobuf field optional bool enable_insecure_binding_system_authenticated = 2;
+ */
+ protected $enable_insecure_binding_system_authenticated = null;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type bool $enable_insecure_binding_system_unauthenticated
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjets system:anonymous or system:unauthenticated.
+ * @type bool $enable_insecure_binding_system_authenticated
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjects system:authenticated.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjets system:anonymous or system:unauthenticated.
+ *
+ * Generated from protobuf field optional bool enable_insecure_binding_system_unauthenticated = 1;
+ * @return bool
+ */
+ public function getEnableInsecureBindingSystemUnauthenticated()
+ {
+ return isset($this->enable_insecure_binding_system_unauthenticated) ? $this->enable_insecure_binding_system_unauthenticated : false;
+ }
+
+ public function hasEnableInsecureBindingSystemUnauthenticated()
+ {
+ return isset($this->enable_insecure_binding_system_unauthenticated);
+ }
+
+ public function clearEnableInsecureBindingSystemUnauthenticated()
+ {
+ unset($this->enable_insecure_binding_system_unauthenticated);
+ }
+
+ /**
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjets system:anonymous or system:unauthenticated.
+ *
+ * Generated from protobuf field optional bool enable_insecure_binding_system_unauthenticated = 1;
+ * @param bool $var
+ * @return $this
+ */
+ public function setEnableInsecureBindingSystemUnauthenticated($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->enable_insecure_binding_system_unauthenticated = $var;
+
+ return $this;
+ }
+
+ /**
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjects system:authenticated.
+ *
+ * Generated from protobuf field optional bool enable_insecure_binding_system_authenticated = 2;
+ * @return bool
+ */
+ public function getEnableInsecureBindingSystemAuthenticated()
+ {
+ return isset($this->enable_insecure_binding_system_authenticated) ? $this->enable_insecure_binding_system_authenticated : false;
+ }
+
+ public function hasEnableInsecureBindingSystemAuthenticated()
+ {
+ return isset($this->enable_insecure_binding_system_authenticated);
+ }
+
+ public function clearEnableInsecureBindingSystemAuthenticated()
+ {
+ unset($this->enable_insecure_binding_system_authenticated);
+ }
+
+ /**
+ * Setting this to true will allow any ClusterRoleBinding and RoleBinding
+ * with subjects system:authenticated.
+ *
+ * Generated from protobuf field optional bool enable_insecure_binding_system_authenticated = 2;
+ * @param bool $var
+ * @return $this
+ */
+ public function setEnableInsecureBindingSystemAuthenticated($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->enable_insecure_binding_system_authenticated = $var;
+
+ return $this;
+ }
+
+}
+
diff --git a/src/V1/SecretManagerConfig.php b/src/V1/SecretManagerConfig.php
new file mode 100644
index 0000000..413ae66
--- /dev/null
+++ b/src/V1/SecretManagerConfig.php
@@ -0,0 +1,77 @@
+google.container.v1.SecretManagerConfig
+ */
+class SecretManagerConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * Enable/Disable Secret Manager Config.
+ *
+ * Generated from protobuf field optional bool enabled = 1;
+ */
+ protected $enabled = null;
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type bool $enabled
+ * Enable/Disable Secret Manager Config.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * Enable/Disable Secret Manager Config.
+ *
+ * Generated from protobuf field optional bool enabled = 1;
+ * @return bool
+ */
+ public function getEnabled()
+ {
+ return isset($this->enabled) ? $this->enabled : false;
+ }
+
+ public function hasEnabled()
+ {
+ return isset($this->enabled);
+ }
+
+ public function clearEnabled()
+ {
+ unset($this->enabled);
+ }
+
+ /**
+ * Enable/Disable Secret Manager Config.
+ *
+ * Generated from protobuf field optional bool enabled = 1;
+ * @param bool $var
+ * @return $this
+ */
+ public function setEnabled($var)
+ {
+ GPBUtil::checkBool($var);
+ $this->enabled = $var;
+
+ return $this;
+ }
+
+}
+
diff --git a/src/V1/ServerConfig/ReleaseChannelConfig.php b/src/V1/ServerConfig/ReleaseChannelConfig.php
index 1f57633..ba13f0b 100644
--- a/src/V1/ServerConfig/ReleaseChannelConfig.php
+++ b/src/V1/ServerConfig/ReleaseChannelConfig.php
@@ -33,6 +33,12 @@ class ReleaseChannelConfig extends \Google\Protobuf\Internal\Message
* Generated from protobuf field repeated string valid_versions = 4;
*/
private $valid_versions;
+ /**
+ * The auto upgrade target version for clusters on the channel.
+ *
+ * Generated from protobuf field string upgrade_target_version = 5;
+ */
+ protected $upgrade_target_version = '';
/**
* Constructor.
@@ -46,6 +52,8 @@ class ReleaseChannelConfig extends \Google\Protobuf\Internal\Message
* The default version for newly created clusters on the channel.
* @type array|\Google\Protobuf\Internal\RepeatedField $valid_versions
* List of valid versions for the channel.
+ * @type string $upgrade_target_version
+ * The auto upgrade target version for clusters on the channel.
* }
*/
public function __construct($data = NULL) {
@@ -131,6 +139,32 @@ public function setValidVersions($var)
return $this;
}
+ /**
+ * The auto upgrade target version for clusters on the channel.
+ *
+ * Generated from protobuf field string upgrade_target_version = 5;
+ * @return string
+ */
+ public function getUpgradeTargetVersion()
+ {
+ return $this->upgrade_target_version;
+ }
+
+ /**
+ * The auto upgrade target version for clusters on the channel.
+ *
+ * Generated from protobuf field string upgrade_target_version = 5;
+ * @param string $var
+ * @return $this
+ */
+ public function setUpgradeTargetVersion($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->upgrade_target_version = $var;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/UpdateNodePoolRequest.php b/src/V1/UpdateNodePoolRequest.php
index f87357e..819f61b 100644
--- a/src/V1/UpdateNodePoolRequest.php
+++ b/src/V1/UpdateNodePoolRequest.php
@@ -253,6 +253,13 @@ class UpdateNodePoolRequest extends \Google\Protobuf\Internal\Message
* Generated from protobuf field .google.container.v1.NodePool.QueuedProvisioning queued_provisioning = 42;
*/
protected $queued_provisioning = null;
+ /**
+ * List of Storage Pools where boot disks are provisioned.
+ * Existing Storage Pools will be replaced with storage-pools.
+ *
+ * Generated from protobuf field repeated string storage_pools = 43;
+ */
+ private $storage_pools;
/**
* Constructor.
@@ -370,6 +377,9 @@ class UpdateNodePoolRequest extends \Google\Protobuf\Internal\Message
* config.
* @type \Google\Cloud\Container\V1\NodePool\QueuedProvisioning $queued_provisioning
* Specifies the configuration of queued provisioning.
+ * @type array|\Google\Protobuf\Internal\RepeatedField $storage_pools
+ * List of Storage Pools where boot disks are provisioned.
+ * Existing Storage Pools will be replaced with storage-pools.
* }
*/
public function __construct($data = NULL) {
@@ -1475,5 +1485,33 @@ public function setQueuedProvisioning($var)
return $this;
}
+ /**
+ * List of Storage Pools where boot disks are provisioned.
+ * Existing Storage Pools will be replaced with storage-pools.
+ *
+ * Generated from protobuf field repeated string storage_pools = 43;
+ * @return \Google\Protobuf\Internal\RepeatedField
+ */
+ public function getStoragePools()
+ {
+ return $this->storage_pools;
+ }
+
+ /**
+ * List of Storage Pools where boot disks are provisioned.
+ * Existing Storage Pools will be replaced with storage-pools.
+ *
+ * Generated from protobuf field repeated string storage_pools = 43;
+ * @param array|\Google\Protobuf\Internal\RepeatedField $var
+ * @return $this
+ */
+ public function setStoragePools($var)
+ {
+ $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING);
+ $this->storage_pools = $arr;
+
+ return $this;
+ }
+
}
diff --git a/src/V1/UserManagedKeysConfig.php b/src/V1/UserManagedKeysConfig.php
new file mode 100644
index 0000000..60c2e53
--- /dev/null
+++ b/src/V1/UserManagedKeysConfig.php
@@ -0,0 +1,354 @@
+google.container.v1.UserManagedKeysConfig
+ */
+class UserManagedKeysConfig extends \Google\Protobuf\Internal\Message
+{
+ /**
+ * The Certificate Authority Service caPool to use for the cluster CA in this
+ * cluster.
+ *
+ * Generated from protobuf field string cluster_ca = 10 [(.google.api.resource_reference) = {
+ */
+ protected $cluster_ca = '';
+ /**
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd API CA in this cluster.
+ *
+ * Generated from protobuf field string etcd_api_ca = 11 [(.google.api.resource_reference) = {
+ */
+ protected $etcd_api_ca = '';
+ /**
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd peer CA in this cluster.
+ *
+ * Generated from protobuf field string etcd_peer_ca = 12 [(.google.api.resource_reference) = {
+ */
+ protected $etcd_peer_ca = '';
+ /**
+ * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ *
+ * Generated from protobuf field repeated string service_account_signing_keys = 13 [(.google.api.resource_reference) = {
+ */
+ private $service_account_signing_keys;
+ /**
+ * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ *
+ * Generated from protobuf field repeated string service_account_verification_keys = 14 [(.google.api.resource_reference) = {
+ */
+ private $service_account_verification_keys;
+ /**
+ * The Certificate Authority Service caPool to use for the aggregation CA in
+ * this cluster.
+ *
+ * Generated from protobuf field string aggregation_ca = 15 [(.google.api.resource_reference) = {
+ */
+ protected $aggregation_ca = '';
+ /**
+ * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control
+ * plane nodes.
+ *
+ * Generated from protobuf field string control_plane_disk_encryption_key = 16 [(.google.api.resource_reference) = {
+ */
+ protected $control_plane_disk_encryption_key = '';
+ /**
+ * Resource path of the Cloud KMS cryptoKey to use for encryption of internal
+ * etcd backups.
+ *
+ * Generated from protobuf field string gkeops_etcd_backup_encryption_key = 17 [(.google.api.resource_reference) = {
+ */
+ protected $gkeops_etcd_backup_encryption_key = '';
+
+ /**
+ * Constructor.
+ *
+ * @param array $data {
+ * Optional. Data for populating the Message object.
+ *
+ * @type string $cluster_ca
+ * The Certificate Authority Service caPool to use for the cluster CA in this
+ * cluster.
+ * @type string $etcd_api_ca
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd API CA in this cluster.
+ * @type string $etcd_peer_ca
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd peer CA in this cluster.
+ * @type array|\Google\Protobuf\Internal\RepeatedField $service_account_signing_keys
+ * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ * @type array|\Google\Protobuf\Internal\RepeatedField $service_account_verification_keys
+ * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ * @type string $aggregation_ca
+ * The Certificate Authority Service caPool to use for the aggregation CA in
+ * this cluster.
+ * @type string $control_plane_disk_encryption_key
+ * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control
+ * plane nodes.
+ * @type string $gkeops_etcd_backup_encryption_key
+ * Resource path of the Cloud KMS cryptoKey to use for encryption of internal
+ * etcd backups.
+ * }
+ */
+ public function __construct($data = NULL) {
+ \GPBMetadata\Google\Container\V1\ClusterService::initOnce();
+ parent::__construct($data);
+ }
+
+ /**
+ * The Certificate Authority Service caPool to use for the cluster CA in this
+ * cluster.
+ *
+ * Generated from protobuf field string cluster_ca = 10 [(.google.api.resource_reference) = {
+ * @return string
+ */
+ public function getClusterCa()
+ {
+ return $this->cluster_ca;
+ }
+
+ /**
+ * The Certificate Authority Service caPool to use for the cluster CA in this
+ * cluster.
+ *
+ * Generated from protobuf field string cluster_ca = 10 [(.google.api.resource_reference) = {
+ * @param string $var
+ * @return $this
+ */
+ public function setClusterCa($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->cluster_ca = $var;
+
+ return $this;
+ }
+
+ /**
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd API CA in this cluster.
+ *
+ * Generated from protobuf field string etcd_api_ca = 11 [(.google.api.resource_reference) = {
+ * @return string
+ */
+ public function getEtcdApiCa()
+ {
+ return $this->etcd_api_ca;
+ }
+
+ /**
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd API CA in this cluster.
+ *
+ * Generated from protobuf field string etcd_api_ca = 11 [(.google.api.resource_reference) = {
+ * @param string $var
+ * @return $this
+ */
+ public function setEtcdApiCa($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->etcd_api_ca = $var;
+
+ return $this;
+ }
+
+ /**
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd peer CA in this cluster.
+ *
+ * Generated from protobuf field string etcd_peer_ca = 12 [(.google.api.resource_reference) = {
+ * @return string
+ */
+ public function getEtcdPeerCa()
+ {
+ return $this->etcd_peer_ca;
+ }
+
+ /**
+ * Resource path of the Certificate Authority Service caPool to use for the
+ * etcd peer CA in this cluster.
+ *
+ * Generated from protobuf field string etcd_peer_ca = 12 [(.google.api.resource_reference) = {
+ * @param string $var
+ * @return $this
+ */
+ public function setEtcdPeerCa($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->etcd_peer_ca = $var;
+
+ return $this;
+ }
+
+ /**
+ * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ *
+ * Generated from protobuf field repeated string service_account_signing_keys = 13 [(.google.api.resource_reference) = {
+ * @return \Google\Protobuf\Internal\RepeatedField
+ */
+ public function getServiceAccountSigningKeys()
+ {
+ return $this->service_account_signing_keys;
+ }
+
+ /**
+ * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ *
+ * Generated from protobuf field repeated string service_account_signing_keys = 13 [(.google.api.resource_reference) = {
+ * @param array|\Google\Protobuf\Internal\RepeatedField $var
+ * @return $this
+ */
+ public function setServiceAccountSigningKeys($var)
+ {
+ $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING);
+ $this->service_account_signing_keys = $arr;
+
+ return $this;
+ }
+
+ /**
+ * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ *
+ * Generated from protobuf field repeated string service_account_verification_keys = 14 [(.google.api.resource_reference) = {
+ * @return \Google\Protobuf\Internal\RepeatedField
+ */
+ public function getServiceAccountVerificationKeys()
+ {
+ return $this->service_account_verification_keys;
+ }
+
+ /**
+ * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs
+ * issued by this cluster.
+ * Format:
+ * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}`
+ *
+ * Generated from protobuf field repeated string service_account_verification_keys = 14 [(.google.api.resource_reference) = {
+ * @param array|\Google\Protobuf\Internal\RepeatedField $var
+ * @return $this
+ */
+ public function setServiceAccountVerificationKeys($var)
+ {
+ $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING);
+ $this->service_account_verification_keys = $arr;
+
+ return $this;
+ }
+
+ /**
+ * The Certificate Authority Service caPool to use for the aggregation CA in
+ * this cluster.
+ *
+ * Generated from protobuf field string aggregation_ca = 15 [(.google.api.resource_reference) = {
+ * @return string
+ */
+ public function getAggregationCa()
+ {
+ return $this->aggregation_ca;
+ }
+
+ /**
+ * The Certificate Authority Service caPool to use for the aggregation CA in
+ * this cluster.
+ *
+ * Generated from protobuf field string aggregation_ca = 15 [(.google.api.resource_reference) = {
+ * @param string $var
+ * @return $this
+ */
+ public function setAggregationCa($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->aggregation_ca = $var;
+
+ return $this;
+ }
+
+ /**
+ * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control
+ * plane nodes.
+ *
+ * Generated from protobuf field string control_plane_disk_encryption_key = 16 [(.google.api.resource_reference) = {
+ * @return string
+ */
+ public function getControlPlaneDiskEncryptionKey()
+ {
+ return $this->control_plane_disk_encryption_key;
+ }
+
+ /**
+ * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control
+ * plane nodes.
+ *
+ * Generated from protobuf field string control_plane_disk_encryption_key = 16 [(.google.api.resource_reference) = {
+ * @param string $var
+ * @return $this
+ */
+ public function setControlPlaneDiskEncryptionKey($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->control_plane_disk_encryption_key = $var;
+
+ return $this;
+ }
+
+ /**
+ * Resource path of the Cloud KMS cryptoKey to use for encryption of internal
+ * etcd backups.
+ *
+ * Generated from protobuf field string gkeops_etcd_backup_encryption_key = 17 [(.google.api.resource_reference) = {
+ * @return string
+ */
+ public function getGkeopsEtcdBackupEncryptionKey()
+ {
+ return $this->gkeops_etcd_backup_encryption_key;
+ }
+
+ /**
+ * Resource path of the Cloud KMS cryptoKey to use for encryption of internal
+ * etcd backups.
+ *
+ * Generated from protobuf field string gkeops_etcd_backup_encryption_key = 17 [(.google.api.resource_reference) = {
+ * @param string $var
+ * @return $this
+ */
+ public function setGkeopsEtcdBackupEncryptionKey($var)
+ {
+ GPBUtil::checkString($var, True);
+ $this->gkeops_etcd_backup_encryption_key = $var;
+
+ return $this;
+ }
+
+}
+
diff --git a/src/V1/resources/cluster_manager_descriptor_config.php b/src/V1/resources/cluster_manager_descriptor_config.php
index 1b330b4..3d56431 100644
--- a/src/V1/resources/cluster_manager_descriptor_config.php
+++ b/src/V1/resources/cluster_manager_descriptor_config.php
@@ -998,6 +998,8 @@
],
],
'templateMap' => [
+ 'caPool' => 'projects/{project}/locations/{location}/caPools/{ca_pool}',
+ 'cryptoKeyVersion' => 'projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}',
'topic' => 'projects/{project}/topics/{topic}',
],
],