diff --git a/metadata/V1/ClusterService.php b/metadata/V1/ClusterService.php index 7d7df54..8801f61 100644 Binary files a/metadata/V1/ClusterService.php and b/metadata/V1/ClusterService.php differ diff --git a/src/V1/AddonsConfig.php b/src/V1/AddonsConfig.php index 9752fbe..164a22c 100644 --- a/src/V1/AddonsConfig.php +++ b/src/V1/AddonsConfig.php @@ -100,6 +100,12 @@ class AddonsConfig extends \Google\Protobuf\Internal\Message * Generated from protobuf field .google.container.v1.StatefulHAConfig stateful_ha_config = 18 [(.google.api.field_behavior) = OPTIONAL]; */ protected $stateful_ha_config = null; + /** + * Configuration for the Cloud Storage Parallelstore CSI driver. + * + * Generated from protobuf field .google.container.v1.ParallelstoreCsiDriverConfig parallelstore_csi_driver_config = 19; + */ + protected $parallelstore_csi_driver_config = null; /** * Optional. Configuration for Ray Operator addon. * @@ -148,6 +154,8 @@ class AddonsConfig extends \Google\Protobuf\Internal\Message * Configuration for the Cloud Storage Fuse CSI driver. * @type \Google\Cloud\Container\V1\StatefulHAConfig $stateful_ha_config * Optional. Configuration for the StatefulHA add-on. + * @type \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig $parallelstore_csi_driver_config + * Configuration for the Cloud Storage Parallelstore CSI driver. * @type \Google\Cloud\Container\V1\RayOperatorConfig $ray_operator_config * Optional. Configuration for Ray Operator addon. * } @@ -617,6 +625,42 @@ public function setStatefulHaConfig($var) return $this; } + /** + * Configuration for the Cloud Storage Parallelstore CSI driver. + * + * Generated from protobuf field .google.container.v1.ParallelstoreCsiDriverConfig parallelstore_csi_driver_config = 19; + * @return \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig|null + */ + public function getParallelstoreCsiDriverConfig() + { + return $this->parallelstore_csi_driver_config; + } + + public function hasParallelstoreCsiDriverConfig() + { + return isset($this->parallelstore_csi_driver_config); + } + + public function clearParallelstoreCsiDriverConfig() + { + unset($this->parallelstore_csi_driver_config); + } + + /** + * Configuration for the Cloud Storage Parallelstore CSI driver. + * + * Generated from protobuf field .google.container.v1.ParallelstoreCsiDriverConfig parallelstore_csi_driver_config = 19; + * @param \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig $var + * @return $this + */ + public function setParallelstoreCsiDriverConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ParallelstoreCsiDriverConfig::class); + $this->parallelstore_csi_driver_config = $var; + + return $this; + } + /** * Optional. Configuration for Ray Operator addon. * diff --git a/src/V1/Client/ClusterManagerClient.php b/src/V1/Client/ClusterManagerClient.php index 5208382..1baf5f0 100644 --- a/src/V1/Client/ClusterManagerClient.php +++ b/src/V1/Client/ClusterManagerClient.php @@ -170,6 +170,53 @@ private static function getClientDefaults() ]; } + /** + * Formats a string containing the fully-qualified path to represent a ca_pool + * resource. + * + * @param string $project + * @param string $location + * @param string $caPool + * + * @return string The formatted ca_pool resource. + */ + public static function caPoolName(string $project, string $location, string $caPool): string + { + return self::getPathTemplate('caPool')->render([ + 'project' => $project, + 'location' => $location, + 'ca_pool' => $caPool, + ]); + } + + /** + * Formats a string containing the fully-qualified path to represent a + * crypto_key_version resource. + * + * @param string $project + * @param string $location + * @param string $keyRing + * @param string $cryptoKey + * @param string $cryptoKeyVersion + * + * @return string The formatted crypto_key_version resource. + */ + public static function cryptoKeyVersionName( + string $project, + string $location, + string $keyRing, + string $cryptoKey, + string $cryptoKeyVersion + ): string { + return self::getPathTemplate('cryptoKeyVersion')->render([ + 'project' => $project, + 'location' => $location, + 'key_ring' => $keyRing, + 'crypto_key' => $cryptoKey, + 'crypto_key_version' => $cryptoKeyVersion, + ]); + } + /** * Formats a string containing the fully-qualified path to represent a topic * resource. @@ -191,6 +238,8 @@ public static function topicName(string $project, string $topic): string * Parses a formatted name string and returns an associative array of the components in the name. * The following name formats are supported: * Template: Pattern + * - caPool: projects/{project}/locations/{location}/caPools/{ca_pool} + * - cryptoKeyVersion: projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version} * - topic: projects/{project}/topics/{topic} * * The optional $template argument can be supplied to specify a particular pattern, diff --git a/src/V1/Cluster.php b/src/V1/Cluster.php index 2891e69..ef01339 100644 --- a/src/V1/Cluster.php +++ b/src/V1/Cluster.php @@ -199,8 +199,12 @@ class Cluster extends \Google\Protobuf\Internal\Message protected $ip_allocation_policy = null; /** * The configuration options for master authorized networks feature. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config] + * instead. * - * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22; + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22 [deprecated = true]; + * @deprecated */ protected $master_authorized_networks_config = null; /** @@ -531,6 +535,12 @@ class Cluster extends \Google\Protobuf\Internal\Message * Generated from protobuf field .google.container.v1.SecurityPostureConfig security_posture_config = 145; */ protected $security_posture_config = null; + /** + * Configuration for all cluster's control plane endpoints. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig control_plane_endpoints_config = 146; + */ + protected $control_plane_endpoints_config = null; /** * Beta APIs Config * @@ -543,6 +553,18 @@ class Cluster extends \Google\Protobuf\Internal\Message * Generated from protobuf field .google.container.v1.EnterpriseConfig enterprise_config = 149; */ protected $enterprise_config = null; + /** + * Secret CSI driver configuration. + * + * Generated from protobuf field .google.container.v1.SecretManagerConfig secret_manager_config = 150; + */ + protected $secret_manager_config = null; + /** + * Enable/Disable Compliance Posture features for the cluster. + * + * Generated from protobuf field .google.container.v1.CompliancePostureConfig compliance_posture_config = 151; + */ + protected $compliance_posture_config = null; /** * Output only. Reserved for future use. * @@ -555,6 +577,19 @@ class Cluster extends \Google\Protobuf\Internal\Message * Generated from protobuf field optional bool satisfies_pzi = 153 [(.google.api.field_behavior) = OUTPUT_ONLY]; */ protected $satisfies_pzi = null; + /** + * The Custom keys configuration for the cluster. + * + * Generated from protobuf field optional .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 154; + */ + protected $user_managed_keys_config = null; + /** + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. + * + * Generated from protobuf field optional .google.container.v1.RBACBindingConfig rbac_binding_config = 156; + */ + protected $rbac_binding_config = null; /** * Constructor. @@ -668,6 +703,9 @@ class Cluster extends \Google\Protobuf\Internal\Message * Configuration for cluster IP allocation. * @type \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $master_authorized_networks_config * The configuration options for master authorized networks feature. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config] + * instead. * @type \Google\Cloud\Container\V1\MaintenancePolicy $maintenance_policy * Configure the maintenance policy for this cluster. * @type \Google\Cloud\Container\V1\BinaryAuthorization $binary_authorization @@ -811,14 +849,25 @@ class Cluster extends \Google\Protobuf\Internal\Message * Fleet information for the cluster. * @type \Google\Cloud\Container\V1\SecurityPostureConfig $security_posture_config * Enable/Disable Security Posture API features for the cluster. + * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $control_plane_endpoints_config + * Configuration for all cluster's control plane endpoints. * @type \Google\Cloud\Container\V1\K8sBetaAPIConfig $enable_k8s_beta_apis * Beta APIs Config * @type \Google\Cloud\Container\V1\EnterpriseConfig $enterprise_config * GKE Enterprise Configuration. + * @type \Google\Cloud\Container\V1\SecretManagerConfig $secret_manager_config + * Secret CSI driver configuration. + * @type \Google\Cloud\Container\V1\CompliancePostureConfig $compliance_posture_config + * Enable/Disable Compliance Posture features for the cluster. * @type bool $satisfies_pzs * Output only. Reserved for future use. * @type bool $satisfies_pzi * Output only. Reserved for future use. + * @type \Google\Cloud\Container\V1\UserManagedKeysConfig $user_managed_keys_config + * The Custom keys configuration for the cluster. + * @type \Google\Cloud\Container\V1\RBACBindingConfig $rbac_binding_config + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. * } */ public function __construct($data = NULL) { @@ -1524,34 +1573,46 @@ public function setIpAllocationPolicy($var) /** * The configuration options for master authorized networks feature. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config] + * instead. * - * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22; + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22 [deprecated = true]; * @return \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig|null + * @deprecated */ public function getMasterAuthorizedNetworksConfig() { + @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); return $this->master_authorized_networks_config; } public function hasMasterAuthorizedNetworksConfig() { + @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); return isset($this->master_authorized_networks_config); } public function clearMasterAuthorizedNetworksConfig() { + @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); unset($this->master_authorized_networks_config); } /** * The configuration options for master authorized networks feature. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.authorized_networks_config] + * instead. * - * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22; + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig master_authorized_networks_config = 22 [deprecated = true]; * @param \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $var * @return $this + * @deprecated */ public function setMasterAuthorizedNetworksConfig($var) { + @trigger_error('master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig::class); $this->master_authorized_networks_config = $var; @@ -3104,6 +3165,42 @@ public function setSecurityPostureConfig($var) return $this; } + /** + * Configuration for all cluster's control plane endpoints. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig control_plane_endpoints_config = 146; + * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig|null + */ + public function getControlPlaneEndpointsConfig() + { + return $this->control_plane_endpoints_config; + } + + public function hasControlPlaneEndpointsConfig() + { + return isset($this->control_plane_endpoints_config); + } + + public function clearControlPlaneEndpointsConfig() + { + unset($this->control_plane_endpoints_config); + } + + /** + * Configuration for all cluster's control plane endpoints. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig control_plane_endpoints_config = 146; + * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $var + * @return $this + */ + public function setControlPlaneEndpointsConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig::class); + $this->control_plane_endpoints_config = $var; + + return $this; + } + /** * Beta APIs Config * @@ -3176,6 +3273,78 @@ public function setEnterpriseConfig($var) return $this; } + /** + * Secret CSI driver configuration. + * + * Generated from protobuf field .google.container.v1.SecretManagerConfig secret_manager_config = 150; + * @return \Google\Cloud\Container\V1\SecretManagerConfig|null + */ + public function getSecretManagerConfig() + { + return $this->secret_manager_config; + } + + public function hasSecretManagerConfig() + { + return isset($this->secret_manager_config); + } + + public function clearSecretManagerConfig() + { + unset($this->secret_manager_config); + } + + /** + * Secret CSI driver configuration. + * + * Generated from protobuf field .google.container.v1.SecretManagerConfig secret_manager_config = 150; + * @param \Google\Cloud\Container\V1\SecretManagerConfig $var + * @return $this + */ + public function setSecretManagerConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\SecretManagerConfig::class); + $this->secret_manager_config = $var; + + return $this; + } + + /** + * Enable/Disable Compliance Posture features for the cluster. + * + * Generated from protobuf field .google.container.v1.CompliancePostureConfig compliance_posture_config = 151; + * @return \Google\Cloud\Container\V1\CompliancePostureConfig|null + */ + public function getCompliancePostureConfig() + { + return $this->compliance_posture_config; + } + + public function hasCompliancePostureConfig() + { + return isset($this->compliance_posture_config); + } + + public function clearCompliancePostureConfig() + { + unset($this->compliance_posture_config); + } + + /** + * Enable/Disable Compliance Posture features for the cluster. + * + * Generated from protobuf field .google.container.v1.CompliancePostureConfig compliance_posture_config = 151; + * @param \Google\Cloud\Container\V1\CompliancePostureConfig $var + * @return $this + */ + public function setCompliancePostureConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\CompliancePostureConfig::class); + $this->compliance_posture_config = $var; + + return $this; + } + /** * Output only. Reserved for future use. * @@ -3248,5 +3417,79 @@ public function setSatisfiesPzi($var) return $this; } + /** + * The Custom keys configuration for the cluster. + * + * Generated from protobuf field optional .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 154; + * @return \Google\Cloud\Container\V1\UserManagedKeysConfig|null + */ + public function getUserManagedKeysConfig() + { + return $this->user_managed_keys_config; + } + + public function hasUserManagedKeysConfig() + { + return isset($this->user_managed_keys_config); + } + + public function clearUserManagedKeysConfig() + { + unset($this->user_managed_keys_config); + } + + /** + * The Custom keys configuration for the cluster. + * + * Generated from protobuf field optional .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 154; + * @param \Google\Cloud\Container\V1\UserManagedKeysConfig $var + * @return $this + */ + public function setUserManagedKeysConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\UserManagedKeysConfig::class); + $this->user_managed_keys_config = $var; + + return $this; + } + + /** + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. + * + * Generated from protobuf field optional .google.container.v1.RBACBindingConfig rbac_binding_config = 156; + * @return \Google\Cloud\Container\V1\RBACBindingConfig|null + */ + public function getRbacBindingConfig() + { + return $this->rbac_binding_config; + } + + public function hasRbacBindingConfig() + { + return isset($this->rbac_binding_config); + } + + public function clearRbacBindingConfig() + { + unset($this->rbac_binding_config); + } + + /** + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. + * + * Generated from protobuf field optional .google.container.v1.RBACBindingConfig rbac_binding_config = 156; + * @param \Google\Cloud\Container\V1\RBACBindingConfig $var + * @return $this + */ + public function setRbacBindingConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\RBACBindingConfig::class); + $this->rbac_binding_config = $var; + + return $this; + } + } diff --git a/src/V1/ClusterUpdate.php b/src/V1/ClusterUpdate.php index 68b58c0..6ce484d 100644 --- a/src/V1/ClusterUpdate.php +++ b/src/V1/ClusterUpdate.php @@ -126,8 +126,12 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message private $desired_locations; /** * The desired configuration options for master authorized networks feature. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config + * instead. * - * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12; + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12 [deprecated = true]; + * @deprecated */ protected $desired_master_authorized_networks_config = null; /** @@ -175,8 +179,12 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint] * for modifying other fields within * [PrivateClusterConfig][google.container.v1.PrivateClusterConfig]. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.global_access + * instead. * - * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25; + * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25 [deprecated = true]; + * @deprecated */ protected $desired_private_cluster_config = null; /** @@ -254,10 +262,31 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message protected $desired_service_external_ips_config = null; /** * Enable/Disable private endpoint for the cluster's master. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * - * Generated from protobuf field optional bool desired_enable_private_endpoint = 71; + * Generated from protobuf field optional bool desired_enable_private_endpoint = 71 [deprecated = true]; + * @deprecated */ protected $desired_enable_private_endpoint = null; + /** + * Override the default setting of whether future created + * nodes have private IP addresses only, namely + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * + * Generated from protobuf field optional bool desired_default_enable_private_nodes = 72; + */ + protected $desired_default_enable_private_nodes = null; + /** + * [Control plane + * endpoints][google.container.v1.Cluster.control_plane_endpoints_config] + * configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig desired_control_plane_endpoints_config = 73; + */ + protected $desired_control_plane_endpoints_config = null; /** * The Kubernetes version to change the master to. * Users may specify either explicit versions offered by @@ -400,6 +429,18 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * Generated from protobuf field optional bool desired_enable_cilium_clusterwide_network_policy = 138; */ protected $desired_enable_cilium_clusterwide_network_policy = null; + /** + * Enable/Disable Secret Manager Config. + * + * Generated from protobuf field optional .google.container.v1.SecretManagerConfig desired_secret_manager_config = 139; + */ + protected $desired_secret_manager_config = null; + /** + * Enable/Disable Compliance Posture features for the cluster. + * + * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig desired_compliance_posture_config = 140; + */ + protected $desired_compliance_posture_config = null; /** * The desired node kubelet config for the cluster. * @@ -413,6 +454,19 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * Generated from protobuf field .google.container.v1.NodeKubeletConfig desired_node_pool_auto_config_kubelet_config = 142; */ protected $desired_node_pool_auto_config_kubelet_config = null; + /** + * The Custom keys configuration for the cluster. + * + * Generated from protobuf field .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 143; + */ + protected $user_managed_keys_config = null; + /** + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. + * + * Generated from protobuf field optional .google.container.v1.RBACBindingConfig desired_rbac_binding_config = 144; + */ + protected $desired_rbac_binding_config = null; /** * Constructor. @@ -477,6 +531,9 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * pools and will result in nodes being added and/or removed. * @type \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $desired_master_authorized_networks_config * The desired configuration options for master authorized networks feature. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config + * instead. * @type \Google\Cloud\Container\V1\ClusterAutoscaling $desired_cluster_autoscaling * Cluster-level autoscaling configuration. * @type \Google\Cloud\Container\V1\BinaryAuthorization $desired_binary_authorization @@ -502,6 +559,9 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint] * for modifying other fields within * [PrivateClusterConfig][google.container.v1.PrivateClusterConfig]. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.global_access + * instead. * @type \Google\Cloud\Container\V1\IntraNodeVisibilityConfig $desired_intra_node_visibility_config * The desired config of Intra-node visibility. * @type \Google\Cloud\Container\V1\DefaultSnatStatus $desired_default_snat_status @@ -529,6 +589,18 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * ExternalIPs field. * @type bool $desired_enable_private_endpoint * Enable/Disable private endpoint for the cluster's master. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. + * @type bool $desired_default_enable_private_nodes + * Override the default setting of whether future created + * nodes have private IP addresses only, namely + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $desired_control_plane_endpoints_config + * [Control plane + * endpoints][google.container.v1.Cluster.control_plane_endpoints_config] + * configuration. * @type string $desired_master_version * The Kubernetes version to change the master to. * Users may specify either explicit versions offered by @@ -587,11 +659,20 @@ class ClusterUpdate extends \Google\Protobuf\Internal\Message * Specify the details of in-transit encryption. * @type bool $desired_enable_cilium_clusterwide_network_policy * Enable/Disable Cilium Clusterwide Network Policy for the cluster. + * @type \Google\Cloud\Container\V1\SecretManagerConfig $desired_secret_manager_config + * Enable/Disable Secret Manager Config. + * @type \Google\Cloud\Container\V1\CompliancePostureConfig $desired_compliance_posture_config + * Enable/Disable Compliance Posture features for the cluster. * @type \Google\Cloud\Container\V1\NodeKubeletConfig $desired_node_kubelet_config * The desired node kubelet config for the cluster. * @type \Google\Cloud\Container\V1\NodeKubeletConfig $desired_node_pool_auto_config_kubelet_config * The desired node kubelet config for all auto-provisioned node pools * in autopilot clusters and node auto-provisioning enabled clusters. + * @type \Google\Cloud\Container\V1\UserManagedKeysConfig $user_managed_keys_config + * The Custom keys configuration for the cluster. + * @type \Google\Cloud\Container\V1\RBACBindingConfig $desired_rbac_binding_config + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. * } */ public function __construct($data = NULL) { @@ -1077,34 +1158,46 @@ public function setDesiredLocations($var) /** * The desired configuration options for master authorized networks feature. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config + * instead. * - * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12; + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12 [deprecated = true]; * @return \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig|null + * @deprecated */ public function getDesiredMasterAuthorizedNetworksConfig() { + @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); return $this->desired_master_authorized_networks_config; } public function hasDesiredMasterAuthorizedNetworksConfig() { + @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); return isset($this->desired_master_authorized_networks_config); } public function clearDesiredMasterAuthorizedNetworksConfig() { + @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); unset($this->desired_master_authorized_networks_config); } /** * The desired configuration options for master authorized networks feature. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.authorized_networks_config + * instead. * - * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12; + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig desired_master_authorized_networks_config = 12 [deprecated = true]; * @param \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $var * @return $this + * @deprecated */ public function setDesiredMasterAuthorizedNetworksConfig($var) { + @trigger_error('desired_master_authorized_networks_config is deprecated.', E_USER_DEPRECATED); GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig::class); $this->desired_master_authorized_networks_config = $var; @@ -1304,22 +1397,29 @@ public function setDesiredVerticalPodAutoscaling($var) * [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint] * for modifying other fields within * [PrivateClusterConfig][google.container.v1.PrivateClusterConfig]. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.global_access + * instead. * - * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25; + * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25 [deprecated = true]; * @return \Google\Cloud\Container\V1\PrivateClusterConfig|null + * @deprecated */ public function getDesiredPrivateClusterConfig() { + @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED); return $this->desired_private_cluster_config; } public function hasDesiredPrivateClusterConfig() { + @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED); return isset($this->desired_private_cluster_config); } public function clearDesiredPrivateClusterConfig() { + @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED); unset($this->desired_private_cluster_config); } @@ -1330,13 +1430,18 @@ public function clearDesiredPrivateClusterConfig() * [ClusterUpdate.desired_enable_private_endpoint][google.container.v1.ClusterUpdate.desired_enable_private_endpoint] * for modifying other fields within * [PrivateClusterConfig][google.container.v1.PrivateClusterConfig]. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.global_access + * instead. * - * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25; + * Generated from protobuf field .google.container.v1.PrivateClusterConfig desired_private_cluster_config = 25 [deprecated = true]; * @param \Google\Cloud\Container\V1\PrivateClusterConfig $var * @return $this + * @deprecated */ public function setDesiredPrivateClusterConfig($var) { + @trigger_error('desired_private_cluster_config is deprecated.', E_USER_DEPRECATED); GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\PrivateClusterConfig::class); $this->desired_private_cluster_config = $var; @@ -1759,40 +1864,134 @@ public function setDesiredServiceExternalIpsConfig($var) /** * Enable/Disable private endpoint for the cluster's master. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * - * Generated from protobuf field optional bool desired_enable_private_endpoint = 71; + * Generated from protobuf field optional bool desired_enable_private_endpoint = 71 [deprecated = true]; * @return bool + * @deprecated */ public function getDesiredEnablePrivateEndpoint() { + @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED); return isset($this->desired_enable_private_endpoint) ? $this->desired_enable_private_endpoint : false; } public function hasDesiredEnablePrivateEndpoint() { + @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED); return isset($this->desired_enable_private_endpoint); } public function clearDesiredEnablePrivateEndpoint() { + @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED); unset($this->desired_enable_private_endpoint); } /** * Enable/Disable private endpoint for the cluster's master. + * Deprecated: Use + * desired_control_plane_endpoints_config.ip_endpoints_config.enable_public_endpoint + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * - * Generated from protobuf field optional bool desired_enable_private_endpoint = 71; + * Generated from protobuf field optional bool desired_enable_private_endpoint = 71 [deprecated = true]; * @param bool $var * @return $this + * @deprecated */ public function setDesiredEnablePrivateEndpoint($var) { + @trigger_error('desired_enable_private_endpoint is deprecated.', E_USER_DEPRECATED); GPBUtil::checkBool($var); $this->desired_enable_private_endpoint = $var; return $this; } + /** + * Override the default setting of whether future created + * nodes have private IP addresses only, namely + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * + * Generated from protobuf field optional bool desired_default_enable_private_nodes = 72; + * @return bool + */ + public function getDesiredDefaultEnablePrivateNodes() + { + return isset($this->desired_default_enable_private_nodes) ? $this->desired_default_enable_private_nodes : false; + } + + public function hasDesiredDefaultEnablePrivateNodes() + { + return isset($this->desired_default_enable_private_nodes); + } + + public function clearDesiredDefaultEnablePrivateNodes() + { + unset($this->desired_default_enable_private_nodes); + } + + /** + * Override the default setting of whether future created + * nodes have private IP addresses only, namely + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * + * Generated from protobuf field optional bool desired_default_enable_private_nodes = 72; + * @param bool $var + * @return $this + */ + public function setDesiredDefaultEnablePrivateNodes($var) + { + GPBUtil::checkBool($var); + $this->desired_default_enable_private_nodes = $var; + + return $this; + } + + /** + * [Control plane + * endpoints][google.container.v1.Cluster.control_plane_endpoints_config] + * configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig desired_control_plane_endpoints_config = 73; + * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig|null + */ + public function getDesiredControlPlaneEndpointsConfig() + { + return $this->desired_control_plane_endpoints_config; + } + + public function hasDesiredControlPlaneEndpointsConfig() + { + return isset($this->desired_control_plane_endpoints_config); + } + + public function clearDesiredControlPlaneEndpointsConfig() + { + unset($this->desired_control_plane_endpoints_config); + } + + /** + * [Control plane + * endpoints][google.container.v1.Cluster.control_plane_endpoints_config] + * configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig desired_control_plane_endpoints_config = 73; + * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig $var + * @return $this + */ + public function setDesiredControlPlaneEndpointsConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig::class); + $this->desired_control_plane_endpoints_config = $var; + + return $this; + } + /** * The Kubernetes version to change the master to. * Users may specify either explicit versions offered by @@ -2551,6 +2750,78 @@ public function setDesiredEnableCiliumClusterwideNetworkPolicy($var) return $this; } + /** + * Enable/Disable Secret Manager Config. + * + * Generated from protobuf field optional .google.container.v1.SecretManagerConfig desired_secret_manager_config = 139; + * @return \Google\Cloud\Container\V1\SecretManagerConfig|null + */ + public function getDesiredSecretManagerConfig() + { + return $this->desired_secret_manager_config; + } + + public function hasDesiredSecretManagerConfig() + { + return isset($this->desired_secret_manager_config); + } + + public function clearDesiredSecretManagerConfig() + { + unset($this->desired_secret_manager_config); + } + + /** + * Enable/Disable Secret Manager Config. + * + * Generated from protobuf field optional .google.container.v1.SecretManagerConfig desired_secret_manager_config = 139; + * @param \Google\Cloud\Container\V1\SecretManagerConfig $var + * @return $this + */ + public function setDesiredSecretManagerConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\SecretManagerConfig::class); + $this->desired_secret_manager_config = $var; + + return $this; + } + + /** + * Enable/Disable Compliance Posture features for the cluster. + * + * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig desired_compliance_posture_config = 140; + * @return \Google\Cloud\Container\V1\CompliancePostureConfig|null + */ + public function getDesiredCompliancePostureConfig() + { + return $this->desired_compliance_posture_config; + } + + public function hasDesiredCompliancePostureConfig() + { + return isset($this->desired_compliance_posture_config); + } + + public function clearDesiredCompliancePostureConfig() + { + unset($this->desired_compliance_posture_config); + } + + /** + * Enable/Disable Compliance Posture features for the cluster. + * + * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig desired_compliance_posture_config = 140; + * @param \Google\Cloud\Container\V1\CompliancePostureConfig $var + * @return $this + */ + public function setDesiredCompliancePostureConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\CompliancePostureConfig::class); + $this->desired_compliance_posture_config = $var; + + return $this; + } + /** * The desired node kubelet config for the cluster. * @@ -2625,5 +2896,79 @@ public function setDesiredNodePoolAutoConfigKubeletConfig($var) return $this; } + /** + * The Custom keys configuration for the cluster. + * + * Generated from protobuf field .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 143; + * @return \Google\Cloud\Container\V1\UserManagedKeysConfig|null + */ + public function getUserManagedKeysConfig() + { + return $this->user_managed_keys_config; + } + + public function hasUserManagedKeysConfig() + { + return isset($this->user_managed_keys_config); + } + + public function clearUserManagedKeysConfig() + { + unset($this->user_managed_keys_config); + } + + /** + * The Custom keys configuration for the cluster. + * + * Generated from protobuf field .google.container.v1.UserManagedKeysConfig user_managed_keys_config = 143; + * @param \Google\Cloud\Container\V1\UserManagedKeysConfig $var + * @return $this + */ + public function setUserManagedKeysConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\UserManagedKeysConfig::class); + $this->user_managed_keys_config = $var; + + return $this; + } + + /** + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. + * + * Generated from protobuf field optional .google.container.v1.RBACBindingConfig desired_rbac_binding_config = 144; + * @return \Google\Cloud\Container\V1\RBACBindingConfig|null + */ + public function getDesiredRbacBindingConfig() + { + return $this->desired_rbac_binding_config; + } + + public function hasDesiredRbacBindingConfig() + { + return isset($this->desired_rbac_binding_config); + } + + public function clearDesiredRbacBindingConfig() + { + unset($this->desired_rbac_binding_config); + } + + /** + * RBACBindingConfig allows user to restrict ClusterRoleBindings an + * RoleBindings that can be created. + * + * Generated from protobuf field optional .google.container.v1.RBACBindingConfig desired_rbac_binding_config = 144; + * @param \Google\Cloud\Container\V1\RBACBindingConfig $var + * @return $this + */ + public function setDesiredRbacBindingConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\RBACBindingConfig::class); + $this->desired_rbac_binding_config = $var; + + return $this; + } + } diff --git a/src/V1/CompliancePostureConfig.php b/src/V1/CompliancePostureConfig.php new file mode 100644 index 0000000..f0ba2f3 --- /dev/null +++ b/src/V1/CompliancePostureConfig.php @@ -0,0 +1,112 @@ +google.container.v1.CompliancePostureConfig + */ +class CompliancePostureConfig extends \Google\Protobuf\Internal\Message +{ + /** + * Defines the enablement mode for Compliance Posture. + * + * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig.Mode mode = 1; + */ + protected $mode = null; + /** + * List of enabled compliance standards. + * + * Generated from protobuf field repeated .google.container.v1.CompliancePostureConfig.ComplianceStandard compliance_standards = 2; + */ + private $compliance_standards; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type int $mode + * Defines the enablement mode for Compliance Posture. + * @type array<\Google\Cloud\Container\V1\CompliancePostureConfig\ComplianceStandard>|\Google\Protobuf\Internal\RepeatedField $compliance_standards + * List of enabled compliance standards. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Defines the enablement mode for Compliance Posture. + * + * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig.Mode mode = 1; + * @return int + */ + public function getMode() + { + return isset($this->mode) ? $this->mode : 0; + } + + public function hasMode() + { + return isset($this->mode); + } + + public function clearMode() + { + unset($this->mode); + } + + /** + * Defines the enablement mode for Compliance Posture. + * + * Generated from protobuf field optional .google.container.v1.CompliancePostureConfig.Mode mode = 1; + * @param int $var + * @return $this + */ + public function setMode($var) + { + GPBUtil::checkEnum($var, \Google\Cloud\Container\V1\CompliancePostureConfig\Mode::class); + $this->mode = $var; + + return $this; + } + + /** + * List of enabled compliance standards. + * + * Generated from protobuf field repeated .google.container.v1.CompliancePostureConfig.ComplianceStandard compliance_standards = 2; + * @return \Google\Protobuf\Internal\RepeatedField + */ + public function getComplianceStandards() + { + return $this->compliance_standards; + } + + /** + * List of enabled compliance standards. + * + * Generated from protobuf field repeated .google.container.v1.CompliancePostureConfig.ComplianceStandard compliance_standards = 2; + * @param array<\Google\Cloud\Container\V1\CompliancePostureConfig\ComplianceStandard>|\Google\Protobuf\Internal\RepeatedField $var + * @return $this + */ + public function setComplianceStandards($var) + { + $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::MESSAGE, \Google\Cloud\Container\V1\CompliancePostureConfig\ComplianceStandard::class); + $this->compliance_standards = $arr; + + return $this; + } + +} + diff --git a/src/V1/CompliancePostureConfig/ComplianceStandard.php b/src/V1/CompliancePostureConfig/ComplianceStandard.php new file mode 100644 index 0000000..4657961 --- /dev/null +++ b/src/V1/CompliancePostureConfig/ComplianceStandard.php @@ -0,0 +1,78 @@ +google.container.v1.CompliancePostureConfig.ComplianceStandard + */ +class ComplianceStandard extends \Google\Protobuf\Internal\Message +{ + /** + * Name of the compliance standard. + * + * Generated from protobuf field optional string standard = 1; + */ + protected $standard = null; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type string $standard + * Name of the compliance standard. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Name of the compliance standard. + * + * Generated from protobuf field optional string standard = 1; + * @return string + */ + public function getStandard() + { + return isset($this->standard) ? $this->standard : ''; + } + + public function hasStandard() + { + return isset($this->standard); + } + + public function clearStandard() + { + unset($this->standard); + } + + /** + * Name of the compliance standard. + * + * Generated from protobuf field optional string standard = 1; + * @param string $var + * @return $this + */ + public function setStandard($var) + { + GPBUtil::checkString($var, True); + $this->standard = $var; + + return $this; + } + +} + + diff --git a/src/V1/CompliancePostureConfig/Mode.php b/src/V1/CompliancePostureConfig/Mode.php new file mode 100644 index 0000000..e5ad0c4 --- /dev/null +++ b/src/V1/CompliancePostureConfig/Mode.php @@ -0,0 +1,62 @@ +google.container.v1.CompliancePostureConfig.Mode + */ +class Mode +{ + /** + * Default value not specified. + * + * Generated from protobuf enum MODE_UNSPECIFIED = 0; + */ + const MODE_UNSPECIFIED = 0; + /** + * Disables Compliance Posture features on the cluster. + * + * Generated from protobuf enum DISABLED = 1; + */ + const DISABLED = 1; + /** + * Enables Compliance Posture features on the cluster. + * + * Generated from protobuf enum ENABLED = 2; + */ + const ENABLED = 2; + + private static $valueToName = [ + self::MODE_UNSPECIFIED => 'MODE_UNSPECIFIED', + self::DISABLED => 'DISABLED', + self::ENABLED => 'ENABLED', + ]; + + public static function name($value) + { + if (!isset(self::$valueToName[$value])) { + throw new UnexpectedValueException(sprintf( + 'Enum %s has no name defined for value %s', __CLASS__, $value)); + } + return self::$valueToName[$value]; + } + + + public static function value($name) + { + $const = __CLASS__ . '::' . strtoupper($name); + if (!defined($const)) { + throw new UnexpectedValueException(sprintf( + 'Enum %s has no value defined for name %s', __CLASS__, $name)); + } + return constant($const); + } +} + + diff --git a/src/V1/ControlPlaneEndpointsConfig.php b/src/V1/ControlPlaneEndpointsConfig.php new file mode 100644 index 0000000..fccd480 --- /dev/null +++ b/src/V1/ControlPlaneEndpointsConfig.php @@ -0,0 +1,121 @@ +google.container.v1.ControlPlaneEndpointsConfig + */ +class ControlPlaneEndpointsConfig extends \Google\Protobuf\Internal\Message +{ + /** + * DNS endpoint configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig dns_endpoint_config = 1; + */ + protected $dns_endpoint_config = null; + /** + * IP endpoints configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig ip_endpoints_config = 3; + */ + protected $ip_endpoints_config = null; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig $dns_endpoint_config + * DNS endpoint configuration. + * @type \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig $ip_endpoints_config + * IP endpoints configuration. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * DNS endpoint configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig dns_endpoint_config = 1; + * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig|null + */ + public function getDnsEndpointConfig() + { + return $this->dns_endpoint_config; + } + + public function hasDnsEndpointConfig() + { + return isset($this->dns_endpoint_config); + } + + public function clearDnsEndpointConfig() + { + unset($this->dns_endpoint_config); + } + + /** + * DNS endpoint configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig dns_endpoint_config = 1; + * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig $var + * @return $this + */ + public function setDnsEndpointConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\DNSEndpointConfig::class); + $this->dns_endpoint_config = $var; + + return $this; + } + + /** + * IP endpoints configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig ip_endpoints_config = 3; + * @return \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig|null + */ + public function getIpEndpointsConfig() + { + return $this->ip_endpoints_config; + } + + public function hasIpEndpointsConfig() + { + return isset($this->ip_endpoints_config); + } + + public function clearIpEndpointsConfig() + { + unset($this->ip_endpoints_config); + } + + /** + * IP endpoints configuration. + * + * Generated from protobuf field .google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig ip_endpoints_config = 3; + * @param \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig $var + * @return $this + */ + public function setIpEndpointsConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\ControlPlaneEndpointsConfig\IPEndpointsConfig::class); + $this->ip_endpoints_config = $var; + + return $this; + } + +} + diff --git a/src/V1/ControlPlaneEndpointsConfig/DNSEndpointConfig.php b/src/V1/ControlPlaneEndpointsConfig/DNSEndpointConfig.php new file mode 100644 index 0000000..ac13124 --- /dev/null +++ b/src/V1/ControlPlaneEndpointsConfig/DNSEndpointConfig.php @@ -0,0 +1,132 @@ +google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig + */ +class DNSEndpointConfig extends \Google\Protobuf\Internal\Message +{ + /** + * Output only. The cluster's DNS endpoint configuration. + * A DNS format address. This is accessible from the public internet. + * Ex: uid.us-central1.gke.goog. + * Always present, but the behavior may change according to the value of + * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic]. + * + * Generated from protobuf field string endpoint = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + */ + protected $endpoint = ''; + /** + * Controls whether user traffic is allowed over this endpoint. Note that + * GCP-managed services may still use the endpoint even if this is false. + * + * Generated from protobuf field optional bool allow_external_traffic = 3; + */ + protected $allow_external_traffic = null; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type string $endpoint + * Output only. The cluster's DNS endpoint configuration. + * A DNS format address. This is accessible from the public internet. + * Ex: uid.us-central1.gke.goog. + * Always present, but the behavior may change according to the value of + * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic]. + * @type bool $allow_external_traffic + * Controls whether user traffic is allowed over this endpoint. Note that + * GCP-managed services may still use the endpoint even if this is false. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Output only. The cluster's DNS endpoint configuration. + * A DNS format address. This is accessible from the public internet. + * Ex: uid.us-central1.gke.goog. + * Always present, but the behavior may change according to the value of + * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic]. + * + * Generated from protobuf field string endpoint = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @return string + */ + public function getEndpoint() + { + return $this->endpoint; + } + + /** + * Output only. The cluster's DNS endpoint configuration. + * A DNS format address. This is accessible from the public internet. + * Ex: uid.us-central1.gke.goog. + * Always present, but the behavior may change according to the value of + * [DNSEndpointConfig.allow_external_traffic][google.container.v1.ControlPlaneEndpointsConfig.DNSEndpointConfig.allow_external_traffic]. + * + * Generated from protobuf field string endpoint = 2 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @param string $var + * @return $this + */ + public function setEndpoint($var) + { + GPBUtil::checkString($var, True); + $this->endpoint = $var; + + return $this; + } + + /** + * Controls whether user traffic is allowed over this endpoint. Note that + * GCP-managed services may still use the endpoint even if this is false. + * + * Generated from protobuf field optional bool allow_external_traffic = 3; + * @return bool + */ + public function getAllowExternalTraffic() + { + return isset($this->allow_external_traffic) ? $this->allow_external_traffic : false; + } + + public function hasAllowExternalTraffic() + { + return isset($this->allow_external_traffic); + } + + public function clearAllowExternalTraffic() + { + unset($this->allow_external_traffic); + } + + /** + * Controls whether user traffic is allowed over this endpoint. Note that + * GCP-managed services may still use the endpoint even if this is false. + * + * Generated from protobuf field optional bool allow_external_traffic = 3; + * @param bool $var + * @return $this + */ + public function setAllowExternalTraffic($var) + { + GPBUtil::checkBool($var); + $this->allow_external_traffic = $var; + + return $this; + } + +} + + diff --git a/src/V1/ControlPlaneEndpointsConfig/IPEndpointsConfig.php b/src/V1/ControlPlaneEndpointsConfig/IPEndpointsConfig.php new file mode 100644 index 0000000..aef6559 --- /dev/null +++ b/src/V1/ControlPlaneEndpointsConfig/IPEndpointsConfig.php @@ -0,0 +1,380 @@ +google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig + */ +class IPEndpointsConfig extends \Google\Protobuf\Internal\Message +{ + /** + * Controls whether to allow direct IP access. + * + * Generated from protobuf field optional bool enabled = 1; + */ + protected $enabled = null; + /** + * Controls whether the control plane allows access through a public IP. + * It is invalid to specify both + * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same + * time. + * + * Generated from protobuf field optional bool enable_public_endpoint = 2; + */ + protected $enable_public_endpoint = null; + /** + * Controls whether the control plane's private endpoint is accessible from + * sources in other regions. + * It is invalid to specify both + * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled] + * and this field at the same time. + * + * Generated from protobuf field optional bool global_access = 3; + */ + protected $global_access = null; + /** + * Configuration of authorized networks. If enabled, restricts access to the + * control plane based on source IP. + * It is invalid to specify both + * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same + * time. + * + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig authorized_networks_config = 4; + */ + protected $authorized_networks_config = null; + /** + * Output only. The external IP address of this cluster's control plane. + * Only populated if enabled. + * + * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY]; + */ + protected $public_endpoint = ''; + /** + * Output only. The internal IP address of this cluster's control plane. + * Only populated if enabled. + * + * Generated from protobuf field string private_endpoint = 6 [(.google.api.field_behavior) = OUTPUT_ONLY]; + */ + protected $private_endpoint = ''; + /** + * Subnet to provision the master's private endpoint during cluster + * creation. Specified in projects/*/regions/*/subnetworks/* format. It is + * invalid to specify both + * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the + * same time. + * + * Generated from protobuf field string private_endpoint_subnetwork = 7; + */ + protected $private_endpoint_subnetwork = ''; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type bool $enabled + * Controls whether to allow direct IP access. + * @type bool $enable_public_endpoint + * Controls whether the control plane allows access through a public IP. + * It is invalid to specify both + * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same + * time. + * @type bool $global_access + * Controls whether the control plane's private endpoint is accessible from + * sources in other regions. + * It is invalid to specify both + * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled] + * and this field at the same time. + * @type \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $authorized_networks_config + * Configuration of authorized networks. If enabled, restricts access to the + * control plane based on source IP. + * It is invalid to specify both + * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same + * time. + * @type string $public_endpoint + * Output only. The external IP address of this cluster's control plane. + * Only populated if enabled. + * @type string $private_endpoint + * Output only. The internal IP address of this cluster's control plane. + * Only populated if enabled. + * @type string $private_endpoint_subnetwork + * Subnet to provision the master's private endpoint during cluster + * creation. Specified in projects/*/regions/*/subnetworks/* format. It is + * invalid to specify both + * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the + * same time. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Controls whether to allow direct IP access. + * + * Generated from protobuf field optional bool enabled = 1; + * @return bool + */ + public function getEnabled() + { + return isset($this->enabled) ? $this->enabled : false; + } + + public function hasEnabled() + { + return isset($this->enabled); + } + + public function clearEnabled() + { + unset($this->enabled); + } + + /** + * Controls whether to allow direct IP access. + * + * Generated from protobuf field optional bool enabled = 1; + * @param bool $var + * @return $this + */ + public function setEnabled($var) + { + GPBUtil::checkBool($var); + $this->enabled = $var; + + return $this; + } + + /** + * Controls whether the control plane allows access through a public IP. + * It is invalid to specify both + * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same + * time. + * + * Generated from protobuf field optional bool enable_public_endpoint = 2; + * @return bool + */ + public function getEnablePublicEndpoint() + { + return isset($this->enable_public_endpoint) ? $this->enable_public_endpoint : false; + } + + public function hasEnablePublicEndpoint() + { + return isset($this->enable_public_endpoint); + } + + public function clearEnablePublicEndpoint() + { + unset($this->enable_public_endpoint); + } + + /** + * Controls whether the control plane allows access through a public IP. + * It is invalid to specify both + * [PrivateClusterConfig.enablePrivateEndpoint][] and this field at the same + * time. + * + * Generated from protobuf field optional bool enable_public_endpoint = 2; + * @param bool $var + * @return $this + */ + public function setEnablePublicEndpoint($var) + { + GPBUtil::checkBool($var); + $this->enable_public_endpoint = $var; + + return $this; + } + + /** + * Controls whether the control plane's private endpoint is accessible from + * sources in other regions. + * It is invalid to specify both + * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled] + * and this field at the same time. + * + * Generated from protobuf field optional bool global_access = 3; + * @return bool + */ + public function getGlobalAccess() + { + return isset($this->global_access) ? $this->global_access : false; + } + + public function hasGlobalAccess() + { + return isset($this->global_access); + } + + public function clearGlobalAccess() + { + unset($this->global_access); + } + + /** + * Controls whether the control plane's private endpoint is accessible from + * sources in other regions. + * It is invalid to specify both + * [PrivateClusterMasterGlobalAccessConfig.enabled][google.container.v1.PrivateClusterMasterGlobalAccessConfig.enabled] + * and this field at the same time. + * + * Generated from protobuf field optional bool global_access = 3; + * @param bool $var + * @return $this + */ + public function setGlobalAccess($var) + { + GPBUtil::checkBool($var); + $this->global_access = $var; + + return $this; + } + + /** + * Configuration of authorized networks. If enabled, restricts access to the + * control plane based on source IP. + * It is invalid to specify both + * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same + * time. + * + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig authorized_networks_config = 4; + * @return \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig|null + */ + public function getAuthorizedNetworksConfig() + { + return $this->authorized_networks_config; + } + + public function hasAuthorizedNetworksConfig() + { + return isset($this->authorized_networks_config); + } + + public function clearAuthorizedNetworksConfig() + { + unset($this->authorized_networks_config); + } + + /** + * Configuration of authorized networks. If enabled, restricts access to the + * control plane based on source IP. + * It is invalid to specify both + * [Cluster.masterAuthorizedNetworksConfig][] and this field at the same + * time. + * + * Generated from protobuf field .google.container.v1.MasterAuthorizedNetworksConfig authorized_networks_config = 4; + * @param \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig $var + * @return $this + */ + public function setAuthorizedNetworksConfig($var) + { + GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\MasterAuthorizedNetworksConfig::class); + $this->authorized_networks_config = $var; + + return $this; + } + + /** + * Output only. The external IP address of this cluster's control plane. + * Only populated if enabled. + * + * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @return string + */ + public function getPublicEndpoint() + { + return $this->public_endpoint; + } + + /** + * Output only. The external IP address of this cluster's control plane. + * Only populated if enabled. + * + * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @param string $var + * @return $this + */ + public function setPublicEndpoint($var) + { + GPBUtil::checkString($var, True); + $this->public_endpoint = $var; + + return $this; + } + + /** + * Output only. The internal IP address of this cluster's control plane. + * Only populated if enabled. + * + * Generated from protobuf field string private_endpoint = 6 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @return string + */ + public function getPrivateEndpoint() + { + return $this->private_endpoint; + } + + /** + * Output only. The internal IP address of this cluster's control plane. + * Only populated if enabled. + * + * Generated from protobuf field string private_endpoint = 6 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @param string $var + * @return $this + */ + public function setPrivateEndpoint($var) + { + GPBUtil::checkString($var, True); + $this->private_endpoint = $var; + + return $this; + } + + /** + * Subnet to provision the master's private endpoint during cluster + * creation. Specified in projects/*/regions/*/subnetworks/* format. It is + * invalid to specify both + * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the + * same time. + * + * Generated from protobuf field string private_endpoint_subnetwork = 7; + * @return string + */ + public function getPrivateEndpointSubnetwork() + { + return $this->private_endpoint_subnetwork; + } + + /** + * Subnet to provision the master's private endpoint during cluster + * creation. Specified in projects/*/regions/*/subnetworks/* format. It is + * invalid to specify both + * [PrivateClusterConfig.privateEndpointSubnetwork][] and this field at the + * same time. + * + * Generated from protobuf field string private_endpoint_subnetwork = 7; + * @param string $var + * @return $this + */ + public function setPrivateEndpointSubnetwork($var) + { + GPBUtil::checkString($var, True); + $this->private_endpoint_subnetwork = $var; + + return $this; + } + +} + + diff --git a/src/V1/EnterpriseConfig.php b/src/V1/EnterpriseConfig.php index 87d3756..8f53cca 100644 --- a/src/V1/EnterpriseConfig.php +++ b/src/V1/EnterpriseConfig.php @@ -16,7 +16,7 @@ class EnterpriseConfig extends \Google\Protobuf\Internal\Message { /** - * Output only. cluster_tier specifies the premium tier of the cluster. + * Output only. cluster_tier indicates the effective tier of the cluster. * * Generated from protobuf field .google.container.v1.EnterpriseConfig.ClusterTier cluster_tier = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; */ @@ -29,7 +29,7 @@ class EnterpriseConfig extends \Google\Protobuf\Internal\Message * Optional. Data for populating the Message object. * * @type int $cluster_tier - * Output only. cluster_tier specifies the premium tier of the cluster. + * Output only. cluster_tier indicates the effective tier of the cluster. * } */ public function __construct($data = NULL) { @@ -38,7 +38,7 @@ public function __construct($data = NULL) { } /** - * Output only. cluster_tier specifies the premium tier of the cluster. + * Output only. cluster_tier indicates the effective tier of the cluster. * * Generated from protobuf field .google.container.v1.EnterpriseConfig.ClusterTier cluster_tier = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; * @return int @@ -49,7 +49,7 @@ public function getClusterTier() } /** - * Output only. cluster_tier specifies the premium tier of the cluster. + * Output only. cluster_tier indicates the effective tier of the cluster. * * Generated from protobuf field .google.container.v1.EnterpriseConfig.ClusterTier cluster_tier = 1 [(.google.api.field_behavior) = OUTPUT_ONLY]; * @param int $var diff --git a/src/V1/LoggingComponentConfig/Component.php b/src/V1/LoggingComponentConfig/Component.php index 2e72c43..20604f8 100644 --- a/src/V1/LoggingComponentConfig/Component.php +++ b/src/V1/LoggingComponentConfig/Component.php @@ -49,6 +49,18 @@ class Component * Generated from protobuf enum CONTROLLER_MANAGER = 5; */ const CONTROLLER_MANAGER = 5; + /** + * kcp-sshd + * + * Generated from protobuf enum KCP_SSHD = 7; + */ + const KCP_SSHD = 7; + /** + * kcp connection logs + * + * Generated from protobuf enum KCP_CONNECTION = 8; + */ + const KCP_CONNECTION = 8; private static $valueToName = [ self::COMPONENT_UNSPECIFIED => 'COMPONENT_UNSPECIFIED', @@ -57,6 +69,8 @@ class Component self::APISERVER => 'APISERVER', self::SCHEDULER => 'SCHEDULER', self::CONTROLLER_MANAGER => 'CONTROLLER_MANAGER', + self::KCP_SSHD => 'KCP_SSHD', + self::KCP_CONNECTION => 'KCP_CONNECTION', ]; public static function name($value) diff --git a/src/V1/MasterAuth.php b/src/V1/MasterAuth.php index 0637bf5..86f08f6 100644 --- a/src/V1/MasterAuth.php +++ b/src/V1/MasterAuth.php @@ -61,7 +61,8 @@ class MasterAuth extends \Google\Protobuf\Internal\Message protected $cluster_ca_certificate = ''; /** * Output only. Base64-encoded public certificate used by clients to - * authenticate to the cluster endpoint. + * authenticate to the cluster endpoint. Issued only if + * client_certificate_config is set. * * Generated from protobuf field string client_certificate = 101 [(.google.api.field_behavior) = OUTPUT_ONLY]; */ @@ -106,7 +107,8 @@ class MasterAuth extends \Google\Protobuf\Internal\Message * trust for the cluster. * @type string $client_certificate * Output only. Base64-encoded public certificate used by clients to - * authenticate to the cluster endpoint. + * authenticate to the cluster endpoint. Issued only if + * client_certificate_config is set. * @type string $client_key * Output only. Base64-encoded private key used by clients to authenticate * to the cluster endpoint. @@ -273,7 +275,8 @@ public function setClusterCaCertificate($var) /** * Output only. Base64-encoded public certificate used by clients to - * authenticate to the cluster endpoint. + * authenticate to the cluster endpoint. Issued only if + * client_certificate_config is set. * * Generated from protobuf field string client_certificate = 101 [(.google.api.field_behavior) = OUTPUT_ONLY]; * @return string @@ -285,7 +288,8 @@ public function getClientCertificate() /** * Output only. Base64-encoded public certificate used by clients to - * authenticate to the cluster endpoint. + * authenticate to the cluster endpoint. Issued only if + * client_certificate_config is set. * * Generated from protobuf field string client_certificate = 101 [(.google.api.field_behavior) = OUTPUT_ONLY]; * @param string $var diff --git a/src/V1/MasterAuthorizedNetworksConfig.php b/src/V1/MasterAuthorizedNetworksConfig.php index f2d4ee4..f136b3f 100644 --- a/src/V1/MasterAuthorizedNetworksConfig.php +++ b/src/V1/MasterAuthorizedNetworksConfig.php @@ -37,6 +37,12 @@ class MasterAuthorizedNetworksConfig extends \Google\Protobuf\Internal\Message * Generated from protobuf field optional bool gcp_public_cidrs_access_enabled = 3; */ protected $gcp_public_cidrs_access_enabled = null; + /** + * Whether master authorized networks is enforced on private endpoint or not. + * + * Generated from protobuf field optional bool private_endpoint_enforcement_enabled = 5; + */ + protected $private_endpoint_enforcement_enabled = null; /** * Constructor. @@ -51,6 +57,8 @@ class MasterAuthorizedNetworksConfig extends \Google\Protobuf\Internal\Message * Kubernetes master through HTTPS. * @type bool $gcp_public_cidrs_access_enabled * Whether master is accessbile via Google Compute Engine Public IP addresses. + * @type bool $private_endpoint_enforcement_enabled + * Whether master authorized networks is enforced on private endpoint or not. * } */ public function __construct($data = NULL) { @@ -148,5 +156,41 @@ public function setGcpPublicCidrsAccessEnabled($var) return $this; } + /** + * Whether master authorized networks is enforced on private endpoint or not. + * + * Generated from protobuf field optional bool private_endpoint_enforcement_enabled = 5; + * @return bool + */ + public function getPrivateEndpointEnforcementEnabled() + { + return isset($this->private_endpoint_enforcement_enabled) ? $this->private_endpoint_enforcement_enabled : false; + } + + public function hasPrivateEndpointEnforcementEnabled() + { + return isset($this->private_endpoint_enforcement_enabled); + } + + public function clearPrivateEndpointEnforcementEnabled() + { + unset($this->private_endpoint_enforcement_enabled); + } + + /** + * Whether master authorized networks is enforced on private endpoint or not. + * + * Generated from protobuf field optional bool private_endpoint_enforcement_enabled = 5; + * @param bool $var + * @return $this + */ + public function setPrivateEndpointEnforcementEnabled($var) + { + GPBUtil::checkBool($var); + $this->private_endpoint_enforcement_enabled = $var; + + return $this; + } + } diff --git a/src/V1/NetworkConfig.php b/src/V1/NetworkConfig.php index c10adc0..033e3ca 100644 --- a/src/V1/NetworkConfig.php +++ b/src/V1/NetworkConfig.php @@ -121,6 +121,16 @@ class NetworkConfig extends \Google\Protobuf\Internal\Message * Generated from protobuf field optional bool enable_cilium_clusterwide_network_policy = 21; */ protected $enable_cilium_clusterwide_network_policy = null; + /** + * Controls whether by default nodes have private IP addresses only. + * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][] + * and this field at the same time. + * To update the default setting, use + * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes] + * + * Generated from protobuf field optional bool default_enable_private_nodes = 22; + */ + protected $default_enable_private_nodes = null; /** * Constructor. @@ -174,6 +184,12 @@ class NetworkConfig extends \Google\Protobuf\Internal\Message * Now named inter-node transparent encryption. * @type bool $enable_cilium_clusterwide_network_policy * Whether CiliumClusterwideNetworkPolicy is enabled on this cluster. + * @type bool $default_enable_private_nodes + * Controls whether by default nodes have private IP addresses only. + * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][] + * and this field at the same time. + * To update the default setting, use + * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes] * } */ public function __construct($data = NULL) { @@ -683,5 +699,49 @@ public function setEnableCiliumClusterwideNetworkPolicy($var) return $this; } + /** + * Controls whether by default nodes have private IP addresses only. + * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][] + * and this field at the same time. + * To update the default setting, use + * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes] + * + * Generated from protobuf field optional bool default_enable_private_nodes = 22; + * @return bool + */ + public function getDefaultEnablePrivateNodes() + { + return isset($this->default_enable_private_nodes) ? $this->default_enable_private_nodes : false; + } + + public function hasDefaultEnablePrivateNodes() + { + return isset($this->default_enable_private_nodes); + } + + public function clearDefaultEnablePrivateNodes() + { + unset($this->default_enable_private_nodes); + } + + /** + * Controls whether by default nodes have private IP addresses only. + * It is invalid to specify both [PrivateClusterConfig.enablePrivateNodes][] + * and this field at the same time. + * To update the default setting, use + * [ClusterUpdate.desired_default_enable_private_nodes][google.container.v1.ClusterUpdate.desired_default_enable_private_nodes] + * + * Generated from protobuf field optional bool default_enable_private_nodes = 22; + * @param bool $var + * @return $this + */ + public function setDefaultEnablePrivateNodes($var) + { + GPBUtil::checkBool($var); + $this->default_enable_private_nodes = $var; + + return $this; + } + } diff --git a/src/V1/NodeConfig.php b/src/V1/NodeConfig.php index e3168f9..57436b5 100644 --- a/src/V1/NodeConfig.php +++ b/src/V1/NodeConfig.php @@ -337,12 +337,27 @@ class NodeConfig extends \Google\Protobuf\Internal\Message * Generated from protobuf field repeated .google.container.v1.SecondaryBootDisk secondary_boot_disks = 48; */ private $secondary_boot_disks; + /** + * List of Storage Pools where boot disks are provisioned. + * + * Generated from protobuf field repeated string storage_pools = 49; + */ + private $storage_pools; /** * Secondary boot disk update strategy. * * Generated from protobuf field optional .google.container.v1.SecondaryBootDiskUpdateStrategy secondary_boot_disk_update_strategy = 50; */ protected $secondary_boot_disk_update_strategy = null; + /** + * Output only. effective_cgroup_mode is the cgroup mode actually used by the + * node pool. It is determined by the cgroup mode specified in the + * LinuxNodeConfig or the default cgroup mode based on the cluster creation + * version. + * + * Generated from protobuf field .google.container.v1.NodeConfig.EffectiveCgroupMode effective_cgroup_mode = 55 [(.google.api.field_behavior) = OUTPUT_ONLY]; + */ + protected $effective_cgroup_mode = 0; /** * Constructor. @@ -516,8 +531,15 @@ class NodeConfig extends \Google\Protobuf\Internal\Message * Optional. Reserved for future use. * @type array<\Google\Cloud\Container\V1\SecondaryBootDisk>|\Google\Protobuf\Internal\RepeatedField $secondary_boot_disks * List of secondary boot disks attached to the nodes. + * @type array|\Google\Protobuf\Internal\RepeatedField $storage_pools + * List of Storage Pools where boot disks are provisioned. * @type \Google\Cloud\Container\V1\SecondaryBootDiskUpdateStrategy $secondary_boot_disk_update_strategy * Secondary boot disk update strategy. + * @type int $effective_cgroup_mode + * Output only. effective_cgroup_mode is the cgroup mode actually used by the + * node pool. It is determined by the cgroup mode specified in the + * LinuxNodeConfig or the default cgroup mode based on the cluster creation + * version. * } */ public function __construct($data = NULL) { @@ -1873,6 +1895,32 @@ public function setSecondaryBootDisks($var) return $this; } + /** + * List of Storage Pools where boot disks are provisioned. + * + * Generated from protobuf field repeated string storage_pools = 49; + * @return \Google\Protobuf\Internal\RepeatedField + */ + public function getStoragePools() + { + return $this->storage_pools; + } + + /** + * List of Storage Pools where boot disks are provisioned. + * + * Generated from protobuf field repeated string storage_pools = 49; + * @param array|\Google\Protobuf\Internal\RepeatedField $var + * @return $this + */ + public function setStoragePools($var) + { + $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING); + $this->storage_pools = $arr; + + return $this; + } + /** * Secondary boot disk update strategy. * @@ -1909,5 +1957,37 @@ public function setSecondaryBootDiskUpdateStrategy($var) return $this; } + /** + * Output only. effective_cgroup_mode is the cgroup mode actually used by the + * node pool. It is determined by the cgroup mode specified in the + * LinuxNodeConfig or the default cgroup mode based on the cluster creation + * version. + * + * Generated from protobuf field .google.container.v1.NodeConfig.EffectiveCgroupMode effective_cgroup_mode = 55 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @return int + */ + public function getEffectiveCgroupMode() + { + return $this->effective_cgroup_mode; + } + + /** + * Output only. effective_cgroup_mode is the cgroup mode actually used by the + * node pool. It is determined by the cgroup mode specified in the + * LinuxNodeConfig or the default cgroup mode based on the cluster creation + * version. + * + * Generated from protobuf field .google.container.v1.NodeConfig.EffectiveCgroupMode effective_cgroup_mode = 55 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * @param int $var + * @return $this + */ + public function setEffectiveCgroupMode($var) + { + GPBUtil::checkEnum($var, \Google\Cloud\Container\V1\NodeConfig\EffectiveCgroupMode::class); + $this->effective_cgroup_mode = $var; + + return $this; + } + } diff --git a/src/V1/NodeConfig/EffectiveCgroupMode.php b/src/V1/NodeConfig/EffectiveCgroupMode.php new file mode 100644 index 0000000..aafc283 --- /dev/null +++ b/src/V1/NodeConfig/EffectiveCgroupMode.php @@ -0,0 +1,65 @@ +google.container.v1.NodeConfig.EffectiveCgroupMode + */ +class EffectiveCgroupMode +{ + /** + * EFFECTIVE_CGROUP_MODE_UNSPECIFIED means the cgroup configuration for the + * node pool is unspecified, i.e. the node pool is a Windows node pool. + * + * Generated from protobuf enum EFFECTIVE_CGROUP_MODE_UNSPECIFIED = 0; + */ + const EFFECTIVE_CGROUP_MODE_UNSPECIFIED = 0; + /** + * CGROUP_MODE_V1 means the node pool is configured to use cgroupv1 for the + * cgroup configuration. + * + * Generated from protobuf enum EFFECTIVE_CGROUP_MODE_V1 = 1; + */ + const EFFECTIVE_CGROUP_MODE_V1 = 1; + /** + * CGROUP_MODE_V2 means the node pool is configured to use cgroupv2 for the + * cgroup configuration. + * + * Generated from protobuf enum EFFECTIVE_CGROUP_MODE_V2 = 2; + */ + const EFFECTIVE_CGROUP_MODE_V2 = 2; + + private static $valueToName = [ + self::EFFECTIVE_CGROUP_MODE_UNSPECIFIED => 'EFFECTIVE_CGROUP_MODE_UNSPECIFIED', + self::EFFECTIVE_CGROUP_MODE_V1 => 'EFFECTIVE_CGROUP_MODE_V1', + self::EFFECTIVE_CGROUP_MODE_V2 => 'EFFECTIVE_CGROUP_MODE_V2', + ]; + + public static function name($value) + { + if (!isset(self::$valueToName[$value])) { + throw new UnexpectedValueException(sprintf( + 'Enum %s has no name defined for value %s', __CLASS__, $value)); + } + return self::$valueToName[$value]; + } + + + public static function value($name) + { + $const = __CLASS__ . '::' . strtoupper($name); + if (!defined($const)) { + throw new UnexpectedValueException(sprintf( + 'Enum %s has no value defined for name %s', __CLASS__, $name)); + } + return constant($const); + } +} + + diff --git a/src/V1/NodeNetworkConfig.php b/src/V1/NodeNetworkConfig.php index 834f9cc..b038dcc 100644 --- a/src/V1/NodeNetworkConfig.php +++ b/src/V1/NodeNetworkConfig.php @@ -57,7 +57,7 @@ class NodeNetworkConfig extends \Google\Protobuf\Internal\Message /** * Whether nodes have internal IP addresses only. * If enable_private_nodes is not specified, then the value is derived from - * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes] + * [Cluster.NetworkConfig.default_enable_private_nodes][] * * Generated from protobuf field optional bool enable_private_nodes = 9; */ @@ -142,7 +142,7 @@ class NodeNetworkConfig extends \Google\Protobuf\Internal\Message * @type bool $enable_private_nodes * Whether nodes have internal IP addresses only. * If enable_private_nodes is not specified, then the value is derived from - * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes] + * [Cluster.NetworkConfig.default_enable_private_nodes][] * @type \Google\Cloud\Container\V1\NodeNetworkConfig\NetworkPerformanceConfig $network_performance_config * Network bandwidth tier configuration. * @type \Google\Cloud\Container\V1\PodCIDROverprovisionConfig $pod_cidr_overprovision_config @@ -296,7 +296,7 @@ public function setPodIpv4CidrBlock($var) /** * Whether nodes have internal IP addresses only. * If enable_private_nodes is not specified, then the value is derived from - * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes] + * [Cluster.NetworkConfig.default_enable_private_nodes][] * * Generated from protobuf field optional bool enable_private_nodes = 9; * @return bool @@ -319,7 +319,7 @@ public function clearEnablePrivateNodes() /** * Whether nodes have internal IP addresses only. * If enable_private_nodes is not specified, then the value is derived from - * [cluster.privateClusterConfig.enablePrivateNodes][google.container.v1beta1.PrivateClusterConfig.enablePrivateNodes] + * [Cluster.NetworkConfig.default_enable_private_nodes][] * * Generated from protobuf field optional bool enable_private_nodes = 9; * @param bool $var diff --git a/src/V1/ParallelstoreCsiDriverConfig.php b/src/V1/ParallelstoreCsiDriverConfig.php new file mode 100644 index 0000000..b793bd2 --- /dev/null +++ b/src/V1/ParallelstoreCsiDriverConfig.php @@ -0,0 +1,71 @@ +google.container.v1.ParallelstoreCsiDriverConfig + */ +class ParallelstoreCsiDriverConfig extends \Google\Protobuf\Internal\Message +{ + /** + * Whether the Cloud Storage Parallelstore CSI driver is enabled for this + * cluster. + * + * Generated from protobuf field bool enabled = 1; + */ + protected $enabled = false; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type bool $enabled + * Whether the Cloud Storage Parallelstore CSI driver is enabled for this + * cluster. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Whether the Cloud Storage Parallelstore CSI driver is enabled for this + * cluster. + * + * Generated from protobuf field bool enabled = 1; + * @return bool + */ + public function getEnabled() + { + return $this->enabled; + } + + /** + * Whether the Cloud Storage Parallelstore CSI driver is enabled for this + * cluster. + * + * Generated from protobuf field bool enabled = 1; + * @param bool $var + * @return $this + */ + public function setEnabled($var) + { + GPBUtil::checkBool($var); + $this->enabled = $var; + + return $this; + } + +} + diff --git a/src/V1/PrivateClusterConfig.php b/src/V1/PrivateClusterConfig.php index 77b0254..a6c52fc 100644 --- a/src/V1/PrivateClusterConfig.php +++ b/src/V1/PrivateClusterConfig.php @@ -19,14 +19,23 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message * Whether nodes have internal IP addresses only. If enabled, all nodes are * given only RFC 1918 private addresses and communicate with the master via * private networking. + * Deprecated: Use + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * instead. * - * Generated from protobuf field bool enable_private_nodes = 1; + * Generated from protobuf field bool enable_private_nodes = 1 [deprecated = true]; + * @deprecated */ protected $enable_private_nodes = false; /** * Whether the master's internal IP address is used as the cluster endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint] + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * - * Generated from protobuf field bool enable_private_endpoint = 2; + * Generated from protobuf field bool enable_private_endpoint = 2 [deprecated = true]; + * @deprecated */ protected $enable_private_endpoint = false; /** @@ -40,14 +49,22 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message protected $master_ipv4_cidr_block = ''; /** * Output only. The internal IP address of this cluster's master endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint] + * instead. * - * Generated from protobuf field string private_endpoint = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * Generated from protobuf field string private_endpoint = 4 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY]; + * @deprecated */ protected $private_endpoint = ''; /** * Output only. The external IP address of this cluster's master endpoint. + * Deprecated:Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint] + * instead. * - * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * Generated from protobuf field string public_endpoint = 5 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY]; + * @deprecated */ protected $public_endpoint = ''; /** @@ -58,15 +75,23 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message protected $peering_name = ''; /** * Controls master global access settings. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][] + * instead. * - * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8; + * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8 [deprecated = true]; + * @deprecated */ protected $master_global_access_config = null; /** * Subnet to provision the master's private endpoint during cluster creation. * Specified in projects/*/regions/*/subnetworks/* format. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork] + * instead. * - * Generated from protobuf field string private_endpoint_subnetwork = 10; + * Generated from protobuf field string private_endpoint_subnetwork = 10 [deprecated = true]; + * @deprecated */ protected $private_endpoint_subnetwork = ''; @@ -80,8 +105,15 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message * Whether nodes have internal IP addresses only. If enabled, all nodes are * given only RFC 1918 private addresses and communicate with the master via * private networking. + * Deprecated: Use + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * instead. * @type bool $enable_private_endpoint * Whether the master's internal IP address is used as the cluster endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint] + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * @type string $master_ipv4_cidr_block * The IP range in CIDR notation to use for the hosted master network. This * range will be used for assigning internal IP addresses to the master or @@ -89,15 +121,27 @@ class PrivateClusterConfig extends \Google\Protobuf\Internal\Message * any other ranges in use within the cluster's network. * @type string $private_endpoint * Output only. The internal IP address of this cluster's master endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint] + * instead. * @type string $public_endpoint * Output only. The external IP address of this cluster's master endpoint. + * Deprecated:Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint] + * instead. * @type string $peering_name * Output only. The peering name in the customer VPC used by this cluster. * @type \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig $master_global_access_config * Controls master global access settings. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][] + * instead. * @type string $private_endpoint_subnetwork * Subnet to provision the master's private endpoint during cluster creation. * Specified in projects/*/regions/*/subnetworks/* format. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork] + * instead. * } */ public function __construct($data = NULL) { @@ -109,12 +153,17 @@ public function __construct($data = NULL) { * Whether nodes have internal IP addresses only. If enabled, all nodes are * given only RFC 1918 private addresses and communicate with the master via * private networking. + * Deprecated: Use + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * instead. * - * Generated from protobuf field bool enable_private_nodes = 1; + * Generated from protobuf field bool enable_private_nodes = 1 [deprecated = true]; * @return bool + * @deprecated */ public function getEnablePrivateNodes() { + @trigger_error('enable_private_nodes is deprecated.', E_USER_DEPRECATED); return $this->enable_private_nodes; } @@ -122,13 +171,18 @@ public function getEnablePrivateNodes() * Whether nodes have internal IP addresses only. If enabled, all nodes are * given only RFC 1918 private addresses and communicate with the master via * private networking. + * Deprecated: Use + * [NetworkConfig.default_enable_private_nodes][google.container.v1.NetworkConfig.default_enable_private_nodes] + * instead. * - * Generated from protobuf field bool enable_private_nodes = 1; + * Generated from protobuf field bool enable_private_nodes = 1 [deprecated = true]; * @param bool $var * @return $this + * @deprecated */ public function setEnablePrivateNodes($var) { + @trigger_error('enable_private_nodes is deprecated.', E_USER_DEPRECATED); GPBUtil::checkBool($var); $this->enable_private_nodes = $var; @@ -137,24 +191,36 @@ public function setEnablePrivateNodes($var) /** * Whether the master's internal IP address is used as the cluster endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint] + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * - * Generated from protobuf field bool enable_private_endpoint = 2; + * Generated from protobuf field bool enable_private_endpoint = 2 [deprecated = true]; * @return bool + * @deprecated */ public function getEnablePrivateEndpoint() { + @trigger_error('enable_private_endpoint is deprecated.', E_USER_DEPRECATED); return $this->enable_private_endpoint; } /** * Whether the master's internal IP address is used as the cluster endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_public_endpoint] + * instead. Note that the value of enable_public_endpoint is reversed: if + * enable_private_endpoint is false, then enable_public_endpoint will be true. * - * Generated from protobuf field bool enable_private_endpoint = 2; + * Generated from protobuf field bool enable_private_endpoint = 2 [deprecated = true]; * @param bool $var * @return $this + * @deprecated */ public function setEnablePrivateEndpoint($var) { + @trigger_error('enable_private_endpoint is deprecated.', E_USER_DEPRECATED); GPBUtil::checkBool($var); $this->enable_private_endpoint = $var; @@ -195,24 +261,34 @@ public function setMasterIpv4CidrBlock($var) /** * Output only. The internal IP address of this cluster's master endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint] + * instead. * - * Generated from protobuf field string private_endpoint = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * Generated from protobuf field string private_endpoint = 4 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY]; * @return string + * @deprecated */ public function getPrivateEndpoint() { + @trigger_error('private_endpoint is deprecated.', E_USER_DEPRECATED); return $this->private_endpoint; } /** * Output only. The internal IP address of this cluster's master endpoint. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint] + * instead. * - * Generated from protobuf field string private_endpoint = 4 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * Generated from protobuf field string private_endpoint = 4 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY]; * @param string $var * @return $this + * @deprecated */ public function setPrivateEndpoint($var) { + @trigger_error('private_endpoint is deprecated.', E_USER_DEPRECATED); GPBUtil::checkString($var, True); $this->private_endpoint = $var; @@ -221,24 +297,34 @@ public function setPrivateEndpoint($var) /** * Output only. The external IP address of this cluster's master endpoint. + * Deprecated:Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint] + * instead. * - * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * Generated from protobuf field string public_endpoint = 5 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY]; * @return string + * @deprecated */ public function getPublicEndpoint() { + @trigger_error('public_endpoint is deprecated.', E_USER_DEPRECATED); return $this->public_endpoint; } /** * Output only. The external IP address of this cluster's master endpoint. + * Deprecated:Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.public_endpoint] + * instead. * - * Generated from protobuf field string public_endpoint = 5 [(.google.api.field_behavior) = OUTPUT_ONLY]; + * Generated from protobuf field string public_endpoint = 5 [deprecated = true, (.google.api.field_behavior) = OUTPUT_ONLY]; * @param string $var * @return $this + * @deprecated */ public function setPublicEndpoint($var) { + @trigger_error('public_endpoint is deprecated.', E_USER_DEPRECATED); GPBUtil::checkString($var, True); $this->public_endpoint = $var; @@ -273,34 +359,46 @@ public function setPeeringName($var) /** * Controls master global access settings. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][] + * instead. * - * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8; + * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8 [deprecated = true]; * @return \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig|null + * @deprecated */ public function getMasterGlobalAccessConfig() { + @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED); return $this->master_global_access_config; } public function hasMasterGlobalAccessConfig() { + @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED); return isset($this->master_global_access_config); } public function clearMasterGlobalAccessConfig() { + @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED); unset($this->master_global_access_config); } /** * Controls master global access settings. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.enable_global_access][] + * instead. * - * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8; + * Generated from protobuf field .google.container.v1.PrivateClusterMasterGlobalAccessConfig master_global_access_config = 8 [deprecated = true]; * @param \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig $var * @return $this + * @deprecated */ public function setMasterGlobalAccessConfig($var) { + @trigger_error('master_global_access_config is deprecated.', E_USER_DEPRECATED); GPBUtil::checkMessage($var, \Google\Cloud\Container\V1\PrivateClusterMasterGlobalAccessConfig::class); $this->master_global_access_config = $var; @@ -310,25 +408,35 @@ public function setMasterGlobalAccessConfig($var) /** * Subnet to provision the master's private endpoint during cluster creation. * Specified in projects/*/regions/*/subnetworks/* format. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork] + * instead. * - * Generated from protobuf field string private_endpoint_subnetwork = 10; + * Generated from protobuf field string private_endpoint_subnetwork = 10 [deprecated = true]; * @return string + * @deprecated */ public function getPrivateEndpointSubnetwork() { + @trigger_error('private_endpoint_subnetwork is deprecated.', E_USER_DEPRECATED); return $this->private_endpoint_subnetwork; } /** * Subnet to provision the master's private endpoint during cluster creation. * Specified in projects/*/regions/*/subnetworks/* format. + * Deprecated: Use + * [ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork][google.container.v1.ControlPlaneEndpointsConfig.IPEndpointsConfig.private_endpoint_subnetwork] + * instead. * - * Generated from protobuf field string private_endpoint_subnetwork = 10; + * Generated from protobuf field string private_endpoint_subnetwork = 10 [deprecated = true]; * @param string $var * @return $this + * @deprecated */ public function setPrivateEndpointSubnetwork($var) { + @trigger_error('private_endpoint_subnetwork is deprecated.', E_USER_DEPRECATED); GPBUtil::checkString($var, True); $this->private_endpoint_subnetwork = $var; diff --git a/src/V1/RBACBindingConfig.php b/src/V1/RBACBindingConfig.php new file mode 100644 index 0000000..27a645f --- /dev/null +++ b/src/V1/RBACBindingConfig.php @@ -0,0 +1,130 @@ +google.container.v1.RBACBindingConfig + */ +class RBACBindingConfig extends \Google\Protobuf\Internal\Message +{ + /** + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjets system:anonymous or system:unauthenticated. + * + * Generated from protobuf field optional bool enable_insecure_binding_system_unauthenticated = 1; + */ + protected $enable_insecure_binding_system_unauthenticated = null; + /** + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjects system:authenticated. + * + * Generated from protobuf field optional bool enable_insecure_binding_system_authenticated = 2; + */ + protected $enable_insecure_binding_system_authenticated = null; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type bool $enable_insecure_binding_system_unauthenticated + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjets system:anonymous or system:unauthenticated. + * @type bool $enable_insecure_binding_system_authenticated + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjects system:authenticated. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjets system:anonymous or system:unauthenticated. + * + * Generated from protobuf field optional bool enable_insecure_binding_system_unauthenticated = 1; + * @return bool + */ + public function getEnableInsecureBindingSystemUnauthenticated() + { + return isset($this->enable_insecure_binding_system_unauthenticated) ? $this->enable_insecure_binding_system_unauthenticated : false; + } + + public function hasEnableInsecureBindingSystemUnauthenticated() + { + return isset($this->enable_insecure_binding_system_unauthenticated); + } + + public function clearEnableInsecureBindingSystemUnauthenticated() + { + unset($this->enable_insecure_binding_system_unauthenticated); + } + + /** + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjets system:anonymous or system:unauthenticated. + * + * Generated from protobuf field optional bool enable_insecure_binding_system_unauthenticated = 1; + * @param bool $var + * @return $this + */ + public function setEnableInsecureBindingSystemUnauthenticated($var) + { + GPBUtil::checkBool($var); + $this->enable_insecure_binding_system_unauthenticated = $var; + + return $this; + } + + /** + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjects system:authenticated. + * + * Generated from protobuf field optional bool enable_insecure_binding_system_authenticated = 2; + * @return bool + */ + public function getEnableInsecureBindingSystemAuthenticated() + { + return isset($this->enable_insecure_binding_system_authenticated) ? $this->enable_insecure_binding_system_authenticated : false; + } + + public function hasEnableInsecureBindingSystemAuthenticated() + { + return isset($this->enable_insecure_binding_system_authenticated); + } + + public function clearEnableInsecureBindingSystemAuthenticated() + { + unset($this->enable_insecure_binding_system_authenticated); + } + + /** + * Setting this to true will allow any ClusterRoleBinding and RoleBinding + * with subjects system:authenticated. + * + * Generated from protobuf field optional bool enable_insecure_binding_system_authenticated = 2; + * @param bool $var + * @return $this + */ + public function setEnableInsecureBindingSystemAuthenticated($var) + { + GPBUtil::checkBool($var); + $this->enable_insecure_binding_system_authenticated = $var; + + return $this; + } + +} + diff --git a/src/V1/SecretManagerConfig.php b/src/V1/SecretManagerConfig.php new file mode 100644 index 0000000..413ae66 --- /dev/null +++ b/src/V1/SecretManagerConfig.php @@ -0,0 +1,77 @@ +google.container.v1.SecretManagerConfig + */ +class SecretManagerConfig extends \Google\Protobuf\Internal\Message +{ + /** + * Enable/Disable Secret Manager Config. + * + * Generated from protobuf field optional bool enabled = 1; + */ + protected $enabled = null; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type bool $enabled + * Enable/Disable Secret Manager Config. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * Enable/Disable Secret Manager Config. + * + * Generated from protobuf field optional bool enabled = 1; + * @return bool + */ + public function getEnabled() + { + return isset($this->enabled) ? $this->enabled : false; + } + + public function hasEnabled() + { + return isset($this->enabled); + } + + public function clearEnabled() + { + unset($this->enabled); + } + + /** + * Enable/Disable Secret Manager Config. + * + * Generated from protobuf field optional bool enabled = 1; + * @param bool $var + * @return $this + */ + public function setEnabled($var) + { + GPBUtil::checkBool($var); + $this->enabled = $var; + + return $this; + } + +} + diff --git a/src/V1/ServerConfig/ReleaseChannelConfig.php b/src/V1/ServerConfig/ReleaseChannelConfig.php index 1f57633..ba13f0b 100644 --- a/src/V1/ServerConfig/ReleaseChannelConfig.php +++ b/src/V1/ServerConfig/ReleaseChannelConfig.php @@ -33,6 +33,12 @@ class ReleaseChannelConfig extends \Google\Protobuf\Internal\Message * Generated from protobuf field repeated string valid_versions = 4; */ private $valid_versions; + /** + * The auto upgrade target version for clusters on the channel. + * + * Generated from protobuf field string upgrade_target_version = 5; + */ + protected $upgrade_target_version = ''; /** * Constructor. @@ -46,6 +52,8 @@ class ReleaseChannelConfig extends \Google\Protobuf\Internal\Message * The default version for newly created clusters on the channel. * @type array|\Google\Protobuf\Internal\RepeatedField $valid_versions * List of valid versions for the channel. + * @type string $upgrade_target_version + * The auto upgrade target version for clusters on the channel. * } */ public function __construct($data = NULL) { @@ -131,6 +139,32 @@ public function setValidVersions($var) return $this; } + /** + * The auto upgrade target version for clusters on the channel. + * + * Generated from protobuf field string upgrade_target_version = 5; + * @return string + */ + public function getUpgradeTargetVersion() + { + return $this->upgrade_target_version; + } + + /** + * The auto upgrade target version for clusters on the channel. + * + * Generated from protobuf field string upgrade_target_version = 5; + * @param string $var + * @return $this + */ + public function setUpgradeTargetVersion($var) + { + GPBUtil::checkString($var, True); + $this->upgrade_target_version = $var; + + return $this; + } + } diff --git a/src/V1/UpdateNodePoolRequest.php b/src/V1/UpdateNodePoolRequest.php index f87357e..819f61b 100644 --- a/src/V1/UpdateNodePoolRequest.php +++ b/src/V1/UpdateNodePoolRequest.php @@ -253,6 +253,13 @@ class UpdateNodePoolRequest extends \Google\Protobuf\Internal\Message * Generated from protobuf field .google.container.v1.NodePool.QueuedProvisioning queued_provisioning = 42; */ protected $queued_provisioning = null; + /** + * List of Storage Pools where boot disks are provisioned. + * Existing Storage Pools will be replaced with storage-pools. + * + * Generated from protobuf field repeated string storage_pools = 43; + */ + private $storage_pools; /** * Constructor. @@ -370,6 +377,9 @@ class UpdateNodePoolRequest extends \Google\Protobuf\Internal\Message * config. * @type \Google\Cloud\Container\V1\NodePool\QueuedProvisioning $queued_provisioning * Specifies the configuration of queued provisioning. + * @type array|\Google\Protobuf\Internal\RepeatedField $storage_pools + * List of Storage Pools where boot disks are provisioned. + * Existing Storage Pools will be replaced with storage-pools. * } */ public function __construct($data = NULL) { @@ -1475,5 +1485,33 @@ public function setQueuedProvisioning($var) return $this; } + /** + * List of Storage Pools where boot disks are provisioned. + * Existing Storage Pools will be replaced with storage-pools. + * + * Generated from protobuf field repeated string storage_pools = 43; + * @return \Google\Protobuf\Internal\RepeatedField + */ + public function getStoragePools() + { + return $this->storage_pools; + } + + /** + * List of Storage Pools where boot disks are provisioned. + * Existing Storage Pools will be replaced with storage-pools. + * + * Generated from protobuf field repeated string storage_pools = 43; + * @param array|\Google\Protobuf\Internal\RepeatedField $var + * @return $this + */ + public function setStoragePools($var) + { + $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING); + $this->storage_pools = $arr; + + return $this; + } + } diff --git a/src/V1/UserManagedKeysConfig.php b/src/V1/UserManagedKeysConfig.php new file mode 100644 index 0000000..60c2e53 --- /dev/null +++ b/src/V1/UserManagedKeysConfig.php @@ -0,0 +1,354 @@ +google.container.v1.UserManagedKeysConfig + */ +class UserManagedKeysConfig extends \Google\Protobuf\Internal\Message +{ + /** + * The Certificate Authority Service caPool to use for the cluster CA in this + * cluster. + * + * Generated from protobuf field string cluster_ca = 10 [(.google.api.resource_reference) = { + */ + protected $cluster_ca = ''; + /** + * Resource path of the Certificate Authority Service caPool to use for the + * etcd API CA in this cluster. + * + * Generated from protobuf field string etcd_api_ca = 11 [(.google.api.resource_reference) = { + */ + protected $etcd_api_ca = ''; + /** + * Resource path of the Certificate Authority Service caPool to use for the + * etcd peer CA in this cluster. + * + * Generated from protobuf field string etcd_peer_ca = 12 [(.google.api.resource_reference) = { + */ + protected $etcd_peer_ca = ''; + /** + * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * + * Generated from protobuf field repeated string service_account_signing_keys = 13 [(.google.api.resource_reference) = { + */ + private $service_account_signing_keys; + /** + * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * + * Generated from protobuf field repeated string service_account_verification_keys = 14 [(.google.api.resource_reference) = { + */ + private $service_account_verification_keys; + /** + * The Certificate Authority Service caPool to use for the aggregation CA in + * this cluster. + * + * Generated from protobuf field string aggregation_ca = 15 [(.google.api.resource_reference) = { + */ + protected $aggregation_ca = ''; + /** + * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control + * plane nodes. + * + * Generated from protobuf field string control_plane_disk_encryption_key = 16 [(.google.api.resource_reference) = { + */ + protected $control_plane_disk_encryption_key = ''; + /** + * Resource path of the Cloud KMS cryptoKey to use for encryption of internal + * etcd backups. + * + * Generated from protobuf field string gkeops_etcd_backup_encryption_key = 17 [(.google.api.resource_reference) = { + */ + protected $gkeops_etcd_backup_encryption_key = ''; + + /** + * Constructor. + * + * @param array $data { + * Optional. Data for populating the Message object. + * + * @type string $cluster_ca + * The Certificate Authority Service caPool to use for the cluster CA in this + * cluster. + * @type string $etcd_api_ca + * Resource path of the Certificate Authority Service caPool to use for the + * etcd API CA in this cluster. + * @type string $etcd_peer_ca + * Resource path of the Certificate Authority Service caPool to use for the + * etcd peer CA in this cluster. + * @type array|\Google\Protobuf\Internal\RepeatedField $service_account_signing_keys + * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * @type array|\Google\Protobuf\Internal\RepeatedField $service_account_verification_keys + * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * @type string $aggregation_ca + * The Certificate Authority Service caPool to use for the aggregation CA in + * this cluster. + * @type string $control_plane_disk_encryption_key + * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control + * plane nodes. + * @type string $gkeops_etcd_backup_encryption_key + * Resource path of the Cloud KMS cryptoKey to use for encryption of internal + * etcd backups. + * } + */ + public function __construct($data = NULL) { + \GPBMetadata\Google\Container\V1\ClusterService::initOnce(); + parent::__construct($data); + } + + /** + * The Certificate Authority Service caPool to use for the cluster CA in this + * cluster. + * + * Generated from protobuf field string cluster_ca = 10 [(.google.api.resource_reference) = { + * @return string + */ + public function getClusterCa() + { + return $this->cluster_ca; + } + + /** + * The Certificate Authority Service caPool to use for the cluster CA in this + * cluster. + * + * Generated from protobuf field string cluster_ca = 10 [(.google.api.resource_reference) = { + * @param string $var + * @return $this + */ + public function setClusterCa($var) + { + GPBUtil::checkString($var, True); + $this->cluster_ca = $var; + + return $this; + } + + /** + * Resource path of the Certificate Authority Service caPool to use for the + * etcd API CA in this cluster. + * + * Generated from protobuf field string etcd_api_ca = 11 [(.google.api.resource_reference) = { + * @return string + */ + public function getEtcdApiCa() + { + return $this->etcd_api_ca; + } + + /** + * Resource path of the Certificate Authority Service caPool to use for the + * etcd API CA in this cluster. + * + * Generated from protobuf field string etcd_api_ca = 11 [(.google.api.resource_reference) = { + * @param string $var + * @return $this + */ + public function setEtcdApiCa($var) + { + GPBUtil::checkString($var, True); + $this->etcd_api_ca = $var; + + return $this; + } + + /** + * Resource path of the Certificate Authority Service caPool to use for the + * etcd peer CA in this cluster. + * + * Generated from protobuf field string etcd_peer_ca = 12 [(.google.api.resource_reference) = { + * @return string + */ + public function getEtcdPeerCa() + { + return $this->etcd_peer_ca; + } + + /** + * Resource path of the Certificate Authority Service caPool to use for the + * etcd peer CA in this cluster. + * + * Generated from protobuf field string etcd_peer_ca = 12 [(.google.api.resource_reference) = { + * @param string $var + * @return $this + */ + public function setEtcdPeerCa($var) + { + GPBUtil::checkString($var, True); + $this->etcd_peer_ca = $var; + + return $this; + } + + /** + * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * + * Generated from protobuf field repeated string service_account_signing_keys = 13 [(.google.api.resource_reference) = { + * @return \Google\Protobuf\Internal\RepeatedField + */ + public function getServiceAccountSigningKeys() + { + return $this->service_account_signing_keys; + } + + /** + * The Cloud KMS cryptoKeyVersions to use for signing service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * + * Generated from protobuf field repeated string service_account_signing_keys = 13 [(.google.api.resource_reference) = { + * @param array|\Google\Protobuf\Internal\RepeatedField $var + * @return $this + */ + public function setServiceAccountSigningKeys($var) + { + $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING); + $this->service_account_signing_keys = $arr; + + return $this; + } + + /** + * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * + * Generated from protobuf field repeated string service_account_verification_keys = 14 [(.google.api.resource_reference) = { + * @return \Google\Protobuf\Internal\RepeatedField + */ + public function getServiceAccountVerificationKeys() + { + return $this->service_account_verification_keys; + } + + /** + * The Cloud KMS cryptoKeyVersions to use for verifying service account JWTs + * issued by this cluster. + * Format: + * `projects/{project}/locations/{location}/keyRings/{keyring}/cryptoKeys/{cryptoKey}/cryptoKeyVersions/{cryptoKeyVersion}` + * + * Generated from protobuf field repeated string service_account_verification_keys = 14 [(.google.api.resource_reference) = { + * @param array|\Google\Protobuf\Internal\RepeatedField $var + * @return $this + */ + public function setServiceAccountVerificationKeys($var) + { + $arr = GPBUtil::checkRepeatedField($var, \Google\Protobuf\Internal\GPBType::STRING); + $this->service_account_verification_keys = $arr; + + return $this; + } + + /** + * The Certificate Authority Service caPool to use for the aggregation CA in + * this cluster. + * + * Generated from protobuf field string aggregation_ca = 15 [(.google.api.resource_reference) = { + * @return string + */ + public function getAggregationCa() + { + return $this->aggregation_ca; + } + + /** + * The Certificate Authority Service caPool to use for the aggregation CA in + * this cluster. + * + * Generated from protobuf field string aggregation_ca = 15 [(.google.api.resource_reference) = { + * @param string $var + * @return $this + */ + public function setAggregationCa($var) + { + GPBUtil::checkString($var, True); + $this->aggregation_ca = $var; + + return $this; + } + + /** + * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control + * plane nodes. + * + * Generated from protobuf field string control_plane_disk_encryption_key = 16 [(.google.api.resource_reference) = { + * @return string + */ + public function getControlPlaneDiskEncryptionKey() + { + return $this->control_plane_disk_encryption_key; + } + + /** + * The Cloud KMS cryptoKey to use for Confidential Hyperdisk on the control + * plane nodes. + * + * Generated from protobuf field string control_plane_disk_encryption_key = 16 [(.google.api.resource_reference) = { + * @param string $var + * @return $this + */ + public function setControlPlaneDiskEncryptionKey($var) + { + GPBUtil::checkString($var, True); + $this->control_plane_disk_encryption_key = $var; + + return $this; + } + + /** + * Resource path of the Cloud KMS cryptoKey to use for encryption of internal + * etcd backups. + * + * Generated from protobuf field string gkeops_etcd_backup_encryption_key = 17 [(.google.api.resource_reference) = { + * @return string + */ + public function getGkeopsEtcdBackupEncryptionKey() + { + return $this->gkeops_etcd_backup_encryption_key; + } + + /** + * Resource path of the Cloud KMS cryptoKey to use for encryption of internal + * etcd backups. + * + * Generated from protobuf field string gkeops_etcd_backup_encryption_key = 17 [(.google.api.resource_reference) = { + * @param string $var + * @return $this + */ + public function setGkeopsEtcdBackupEncryptionKey($var) + { + GPBUtil::checkString($var, True); + $this->gkeops_etcd_backup_encryption_key = $var; + + return $this; + } + +} + diff --git a/src/V1/resources/cluster_manager_descriptor_config.php b/src/V1/resources/cluster_manager_descriptor_config.php index 1b330b4..3d56431 100644 --- a/src/V1/resources/cluster_manager_descriptor_config.php +++ b/src/V1/resources/cluster_manager_descriptor_config.php @@ -998,6 +998,8 @@ ], ], 'templateMap' => [ + 'caPool' => 'projects/{project}/locations/{location}/caPools/{ca_pool}', + 'cryptoKeyVersion' => 'projects/{project}/locations/{location}/keyRings/{key_ring}/cryptoKeys/{crypto_key}/cryptoKeyVersions/{crypto_key_version}', 'topic' => 'projects/{project}/topics/{topic}', ], ],