Skip to content

Commit e624d1b

Browse files
feat(gkeonprem): update the api
#### gkeonprem:v1 The following keys were deleted: - schemas.EnrollVmwareAdminClusterRequest.properties.localName.type (Total Keys: 1) The following keys were added: - resources.projects.resources.locations.resources.bareMetalClusters.resources.bareMetalNodePools.methods.get.parameters.view (Total Keys: 2) - resources.projects.resources.locations.resources.bareMetalClusters.resources.bareMetalNodePools.methods.list.parameters.view (Total Keys: 2) - resources.projects.resources.locations.resources.bareMetalClusters.resources.bareMetalNodePools.methods.patch.parameters.allowMissing (Total Keys: 2) - resources.projects.resources.locations.resources.bareMetalStandaloneClusters.resources.bareMetalStandaloneNodePools.methods.enroll (Total Keys: 12) - resources.projects.resources.locations.resources.vmwareAdminClusters.methods.get.parameters.view (Total Keys: 2) - resources.projects.resources.locations.resources.vmwareClusters.resources.vmwareNodePools.methods.get.parameters.view (Total Keys: 2) - resources.projects.resources.locations.resources.vmwareClusters.resources.vmwareNodePools.methods.list.parameters.view (Total Keys: 2) - resources.projects.resources.locations.resources.vmwareClusters.resources.vmwareNodePools.methods.unenroll.parameters.allowMissing (Total Keys: 2) - schemas.EnrollBareMetalStandaloneNodePoolRequest (Total Keys: 4) - schemas.OperationMetadata.properties.controlPlaneDisconnected (Total Keys: 2)
1 parent 410ef82 commit e624d1b

10 files changed

+454
-63
lines changed

docs/dyn/gkeonprem_v1.projects.locations.bareMetalAdminClusters.html

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ <h3>Method Details</h3>
147147
],
148148
&quot;controlPlaneNodePoolConfig&quot;: { # BareMetalAdminControlPlaneNodePoolConfig specifies the control plane node pool configuration. We have a control plane specific node pool config so that we can flexible about supporting control plane specific fields in the future. # Configures the node pool running the control plane. If specified the corresponding NodePool will be created for the cluster&#x27;s control plane. The NodePool will have the same name and namespace as the cluster.
149149
&quot;nodePoolConfig&quot;: { # BareMetalNodePoolConfig describes the configuration of all nodes within a given bare metal node pool. # The generic configuration for a node pool running the control plane.
150-
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for baremetal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the baremetal machines.
150+
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for bare metal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the bare metal machines.
151151
&quot;registryBurst&quot;: 42, # The maximum size of bursty pulls, temporarily allows pulls to burst to this number, while still not exceeding registry_pull_qps. The value must not be a negative number. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 10.
152152
&quot;registryPullQps&quot;: 42, # The limit of registry pulls per second. Setting this value to 0 means no limit. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 5.
153153
&quot;serializeImagePullsDisabled&quot;: True or False, # Prevents the Kubelet from pulling multiple images at a time. We recommend *not* changing the default value on nodes that run docker daemon with version &lt; 1.9 or an Another Union File System (Aufs) storage backend. Issue https://github.com/kubernetes/kubernetes/issues/10959 has more details.
@@ -243,7 +243,7 @@ <h3>Method Details</h3>
243243
&quot;reconciling&quot;: True or False, # Output only. If set, there are currently changes in flight to the bare metal Admin Cluster.
244244
&quot;securityConfig&quot;: { # Specifies the security related settings for the bare metal admin cluster. # Security related configuration.
245245
&quot;authorization&quot;: { # Authorization defines the On-Prem cluster authorization configuration to bootstrap onto the admin cluster. # Configures user access to the admin cluster.
246-
&quot;adminUsers&quot;: [ # Required. For VMware user, bare metal user and standalone clusters, users that will be granted the cluster-admin role on the cluster, providing full access to the cluster. For bare metal Admin cluster, users will be granted the view role, which is a view only access.
246+
&quot;adminUsers&quot;: [ # Required. For VMware and bare metal user clusters, users will be granted the cluster-admin role on the cluster, which provides full administrative access to the cluster. For bare metal admin clusters, users will be granted the cluster-view role, which limits users to read-only access.
247247
{ # ClusterUser configures user principals for an RBAC policy.
248248
&quot;username&quot;: &quot;A String&quot;, # Required. The name of the user, e.g. `[email protected]`.
249249
},
@@ -405,7 +405,7 @@ <h3>Method Details</h3>
405405
],
406406
&quot;controlPlaneNodePoolConfig&quot;: { # BareMetalAdminControlPlaneNodePoolConfig specifies the control plane node pool configuration. We have a control plane specific node pool config so that we can flexible about supporting control plane specific fields in the future. # Configures the node pool running the control plane. If specified the corresponding NodePool will be created for the cluster&#x27;s control plane. The NodePool will have the same name and namespace as the cluster.
407407
&quot;nodePoolConfig&quot;: { # BareMetalNodePoolConfig describes the configuration of all nodes within a given bare metal node pool. # The generic configuration for a node pool running the control plane.
408-
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for baremetal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the baremetal machines.
408+
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for bare metal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the bare metal machines.
409409
&quot;registryBurst&quot;: 42, # The maximum size of bursty pulls, temporarily allows pulls to burst to this number, while still not exceeding registry_pull_qps. The value must not be a negative number. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 10.
410410
&quot;registryPullQps&quot;: 42, # The limit of registry pulls per second. Setting this value to 0 means no limit. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 5.
411411
&quot;serializeImagePullsDisabled&quot;: True or False, # Prevents the Kubelet from pulling multiple images at a time. We recommend *not* changing the default value on nodes that run docker daemon with version &lt; 1.9 or an Another Union File System (Aufs) storage backend. Issue https://github.com/kubernetes/kubernetes/issues/10959 has more details.
@@ -501,7 +501,7 @@ <h3>Method Details</h3>
501501
&quot;reconciling&quot;: True or False, # Output only. If set, there are currently changes in flight to the bare metal Admin Cluster.
502502
&quot;securityConfig&quot;: { # Specifies the security related settings for the bare metal admin cluster. # Security related configuration.
503503
&quot;authorization&quot;: { # Authorization defines the On-Prem cluster authorization configuration to bootstrap onto the admin cluster. # Configures user access to the admin cluster.
504-
&quot;adminUsers&quot;: [ # Required. For VMware user, bare metal user and standalone clusters, users that will be granted the cluster-admin role on the cluster, providing full access to the cluster. For bare metal Admin cluster, users will be granted the view role, which is a view only access.
504+
&quot;adminUsers&quot;: [ # Required. For VMware and bare metal user clusters, users will be granted the cluster-admin role on the cluster, which provides full administrative access to the cluster. For bare metal admin clusters, users will be granted the cluster-view role, which limits users to read-only access.
505505
{ # ClusterUser configures user principals for an RBAC policy.
506506
&quot;username&quot;: &quot;A String&quot;, # Required. The name of the user, e.g. `[email protected]`.
507507
},
@@ -629,7 +629,7 @@ <h3>Method Details</h3>
629629
],
630630
&quot;controlPlaneNodePoolConfig&quot;: { # BareMetalAdminControlPlaneNodePoolConfig specifies the control plane node pool configuration. We have a control plane specific node pool config so that we can flexible about supporting control plane specific fields in the future. # Configures the node pool running the control plane. If specified the corresponding NodePool will be created for the cluster&#x27;s control plane. The NodePool will have the same name and namespace as the cluster.
631631
&quot;nodePoolConfig&quot;: { # BareMetalNodePoolConfig describes the configuration of all nodes within a given bare metal node pool. # The generic configuration for a node pool running the control plane.
632-
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for baremetal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the baremetal machines.
632+
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for bare metal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the bare metal machines.
633633
&quot;registryBurst&quot;: 42, # The maximum size of bursty pulls, temporarily allows pulls to burst to this number, while still not exceeding registry_pull_qps. The value must not be a negative number. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 10.
634634
&quot;registryPullQps&quot;: 42, # The limit of registry pulls per second. Setting this value to 0 means no limit. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 5.
635635
&quot;serializeImagePullsDisabled&quot;: True or False, # Prevents the Kubelet from pulling multiple images at a time. We recommend *not* changing the default value on nodes that run docker daemon with version &lt; 1.9 or an Another Union File System (Aufs) storage backend. Issue https://github.com/kubernetes/kubernetes/issues/10959 has more details.
@@ -725,7 +725,7 @@ <h3>Method Details</h3>
725725
&quot;reconciling&quot;: True or False, # Output only. If set, there are currently changes in flight to the bare metal Admin Cluster.
726726
&quot;securityConfig&quot;: { # Specifies the security related settings for the bare metal admin cluster. # Security related configuration.
727727
&quot;authorization&quot;: { # Authorization defines the On-Prem cluster authorization configuration to bootstrap onto the admin cluster. # Configures user access to the admin cluster.
728-
&quot;adminUsers&quot;: [ # Required. For VMware user, bare metal user and standalone clusters, users that will be granted the cluster-admin role on the cluster, providing full access to the cluster. For bare metal Admin cluster, users will be granted the view role, which is a view only access.
728+
&quot;adminUsers&quot;: [ # Required. For VMware and bare metal user clusters, users will be granted the cluster-admin role on the cluster, which provides full administrative access to the cluster. For bare metal admin clusters, users will be granted the cluster-view role, which limits users to read-only access.
729729
{ # ClusterUser configures user principals for an RBAC policy.
730730
&quot;username&quot;: &quot;A String&quot;, # Required. The name of the user, e.g. `[email protected]`.
731731
},
@@ -824,7 +824,7 @@ <h3>Method Details</h3>
824824
],
825825
&quot;controlPlaneNodePoolConfig&quot;: { # BareMetalAdminControlPlaneNodePoolConfig specifies the control plane node pool configuration. We have a control plane specific node pool config so that we can flexible about supporting control plane specific fields in the future. # Configures the node pool running the control plane. If specified the corresponding NodePool will be created for the cluster&#x27;s control plane. The NodePool will have the same name and namespace as the cluster.
826826
&quot;nodePoolConfig&quot;: { # BareMetalNodePoolConfig describes the configuration of all nodes within a given bare metal node pool. # The generic configuration for a node pool running the control plane.
827-
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for baremetal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the baremetal machines.
827+
&quot;kubeletConfig&quot;: { # KubeletConfig defines the modifiable kubelet configurations for bare metal machines. Note: this list includes fields supported in GKE (see https://cloud.google.com/kubernetes-engine/docs/how-to/node-system-config#kubelet-options). # The modifiable kubelet configurations for the bare metal machines.
828828
&quot;registryBurst&quot;: 42, # The maximum size of bursty pulls, temporarily allows pulls to burst to this number, while still not exceeding registry_pull_qps. The value must not be a negative number. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 10.
829829
&quot;registryPullQps&quot;: 42, # The limit of registry pulls per second. Setting this value to 0 means no limit. Updating this field may impact scalability by changing the amount of traffic produced by image pulls. Defaults to 5.
830830
&quot;serializeImagePullsDisabled&quot;: True or False, # Prevents the Kubelet from pulling multiple images at a time. We recommend *not* changing the default value on nodes that run docker daemon with version &lt; 1.9 or an Another Union File System (Aufs) storage backend. Issue https://github.com/kubernetes/kubernetes/issues/10959 has more details.
@@ -920,7 +920,7 @@ <h3>Method Details</h3>
920920
&quot;reconciling&quot;: True or False, # Output only. If set, there are currently changes in flight to the bare metal Admin Cluster.
921921
&quot;securityConfig&quot;: { # Specifies the security related settings for the bare metal admin cluster. # Security related configuration.
922922
&quot;authorization&quot;: { # Authorization defines the On-Prem cluster authorization configuration to bootstrap onto the admin cluster. # Configures user access to the admin cluster.
923-
&quot;adminUsers&quot;: [ # Required. For VMware user, bare metal user and standalone clusters, users that will be granted the cluster-admin role on the cluster, providing full access to the cluster. For bare metal Admin cluster, users will be granted the view role, which is a view only access.
923+
&quot;adminUsers&quot;: [ # Required. For VMware and bare metal user clusters, users will be granted the cluster-admin role on the cluster, which provides full administrative access to the cluster. For bare metal admin clusters, users will be granted the cluster-view role, which limits users to read-only access.
924924
{ # ClusterUser configures user principals for an RBAC policy.
925925
&quot;username&quot;: &quot;A String&quot;, # Required. The name of the user, e.g. `[email protected]`.
926926
},

0 commit comments

Comments
 (0)