Skip to content

Commit 45eeda3

Browse files
feat(workstations): update the api
#### workstations:v1beta The following keys were deleted: - schemas.Empty (Total Keys: 2) - schemas.OperationMetadata.properties.cancelRequested (Total Keys: 2) - schemas.OperationMetadata.properties.statusDetail (Total Keys: 2) The following keys were added: - schemas.CustomerEncryptionKey (Total Keys: 4) - schemas.GoogleProtobufEmpty (Total Keys: 2) - schemas.OperationMetadata.properties.requestedCancellation (Total Keys: 2) - schemas.OperationMetadata.properties.statusMessage (Total Keys: 2) - schemas.WorkstationConfig.properties.encryptionKey.$ref (Total Keys: 1) The following keys were changed: - resources.projects.resources.locations.resources.operations.methods.cancel.response.$ref (Total Keys: 1) - resources.projects.resources.locations.resources.operations.methods.delete.response.$ref (Total Keys: 1)
1 parent bbe99d6 commit 45eeda3

4 files changed

+68
-29
lines changed

docs/dyn/workstations_v1beta.projects.locations.workstationClusters.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ <h3>Method Details</h3>
143143
&quot;privateClusterConfig&quot;: { # Configuration options for private clusters. # Configuration for private cluster.
144144
&quot;clusterHostname&quot;: &quot;A String&quot;, # Output only. Hostname for the workstation cluster. This field will be populated only when private endpoint is enabled. To access workstations in the cluster, create a new DNS zone mapping this domain name to an internal IP address and a forwarding rule mapping that address to the service attachment.
145145
&quot;enablePrivateEndpoint&quot;: True or False, # Immutable. Whether Workstations endpoint is private.
146-
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using (Private Service Connect)[https://cloud.google.com/vpc/docs/configure-private-service-connect-services].
146+
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-services).
147147
},
148148
&quot;reconciling&quot;: True or False, # Output only. Indicates whether this resource is currently being updated to match its intended state.
149149
&quot;subnetwork&quot;: &quot;A String&quot;, # Immutable. Name of the Compute Engine subnetwork in which instances associated with this cluster will be created. Must be part of the subnetwork specified for this cluster.
@@ -262,7 +262,7 @@ <h3>Method Details</h3>
262262
&quot;privateClusterConfig&quot;: { # Configuration options for private clusters. # Configuration for private cluster.
263263
&quot;clusterHostname&quot;: &quot;A String&quot;, # Output only. Hostname for the workstation cluster. This field will be populated only when private endpoint is enabled. To access workstations in the cluster, create a new DNS zone mapping this domain name to an internal IP address and a forwarding rule mapping that address to the service attachment.
264264
&quot;enablePrivateEndpoint&quot;: True or False, # Immutable. Whether Workstations endpoint is private.
265-
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using (Private Service Connect)[https://cloud.google.com/vpc/docs/configure-private-service-connect-services].
265+
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-services).
266266
},
267267
&quot;reconciling&quot;: True or False, # Output only. Indicates whether this resource is currently being updated to match its intended state.
268268
&quot;subnetwork&quot;: &quot;A String&quot;, # Immutable. Name of the Compute Engine subnetwork in which instances associated with this cluster will be created. Must be part of the subnetwork specified for this cluster.
@@ -321,7 +321,7 @@ <h3>Method Details</h3>
321321
&quot;privateClusterConfig&quot;: { # Configuration options for private clusters. # Configuration for private cluster.
322322
&quot;clusterHostname&quot;: &quot;A String&quot;, # Output only. Hostname for the workstation cluster. This field will be populated only when private endpoint is enabled. To access workstations in the cluster, create a new DNS zone mapping this domain name to an internal IP address and a forwarding rule mapping that address to the service attachment.
323323
&quot;enablePrivateEndpoint&quot;: True or False, # Immutable. Whether Workstations endpoint is private.
324-
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using (Private Service Connect)[https://cloud.google.com/vpc/docs/configure-private-service-connect-services].
324+
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-services).
325325
},
326326
&quot;reconciling&quot;: True or False, # Output only. Indicates whether this resource is currently being updated to match its intended state.
327327
&quot;subnetwork&quot;: &quot;A String&quot;, # Immutable. Name of the Compute Engine subnetwork in which instances associated with this cluster will be created. Must be part of the subnetwork specified for this cluster.
@@ -383,7 +383,7 @@ <h3>Method Details</h3>
383383
&quot;privateClusterConfig&quot;: { # Configuration options for private clusters. # Configuration for private cluster.
384384
&quot;clusterHostname&quot;: &quot;A String&quot;, # Output only. Hostname for the workstation cluster. This field will be populated only when private endpoint is enabled. To access workstations in the cluster, create a new DNS zone mapping this domain name to an internal IP address and a forwarding rule mapping that address to the service attachment.
385385
&quot;enablePrivateEndpoint&quot;: True or False, # Immutable. Whether Workstations endpoint is private.
386-
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using (Private Service Connect)[https://cloud.google.com/vpc/docs/configure-private-service-connect-services].
386+
&quot;serviceAttachmentUri&quot;: &quot;A String&quot;, # Output only. Service attachment URI for the workstation cluster. The service attachemnt is created when private endpoint is enabled. To access workstations in the cluster, configure access to the managed service using [Private Service Connect](https://cloud.google.com/vpc/docs/configure-private-service-connect-services).
387387
},
388388
&quot;reconciling&quot;: True or False, # Output only. Indicates whether this resource is currently being updated to match its intended state.
389389
&quot;subnetwork&quot;: &quot;A String&quot;, # Immutable. Name of the Compute Engine subnetwork in which instances associated with this cluster will be created. Must be part of the subnetwork specified for this cluster.

docs/dyn/workstations_v1beta.projects.locations.workstationClusters.workstationConfigs.html

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,10 @@ <h3>Method Details</h3>
163163
&quot;degraded&quot;: True or False, # Output only. Whether this resource is in degraded mode, in which case it may require user action to restore full functionality. Details can be found in the `conditions` field.
164164
&quot;deleteTime&quot;: &quot;A String&quot;, # Output only. Time when this resource was soft-deleted.
165165
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name for this resource.
166+
&quot;encryptionKey&quot;: { # A customer-specified encryption key for the Compute Engine resources of this workstation configuration. # Encrypts resources of this workstation configuration using a customer-specified encryption key. If specified, the boot disk of the Compute Engine instance and the persistent disk will be encrypted using this encryption key. If this field is not set, the disks will be encrypted using a generated key. Customer-specified encryption keys do not protect disk metadata. If the customer-specified encryption key is rotated, when the workstation instance is stopped, the system will attempt to recreate the persistent disk with the new version of the key. Be sure to keep older versions of the key until the persistent disk is recreated. Otherwise, data on the persistent disk will be lost. If the encryption key is revoked, the workstation session will automatically be stopped within 7 hours.
167+
&quot;kmsKey&quot;: &quot;A String&quot;, # The name of the encryption key that is stored in Google Cloud KMS, for example, `projects/PROJECT_ID/locations/REGION/keyRings/KEY_RING/cryptoKeys/KEY_NAME`.
168+
&quot;kmsKeyServiceAccount&quot;: &quot;A String&quot;, # The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. However, it is recommended to use a separate service account and to follow KMS best practices mentioned at https://cloud.google.com/kms/docs/separation-of-duties
169+
},
166170
&quot;etag&quot;: &quot;A String&quot;, # Checksum computed by the server. May be sent on update and delete requests to ensure that the client has an up-to-date value before proceeding.
167171
&quot;host&quot;: { # Runtime host for a workstation. # Runtime host for the workstation.
168172
&quot;gceInstance&quot;: { # A runtime using a Compute Engine instance. # Specifies a Compute Engine instance as the host.
@@ -322,6 +326,10 @@ <h3>Method Details</h3>
322326
&quot;degraded&quot;: True or False, # Output only. Whether this resource is in degraded mode, in which case it may require user action to restore full functionality. Details can be found in the `conditions` field.
323327
&quot;deleteTime&quot;: &quot;A String&quot;, # Output only. Time when this resource was soft-deleted.
324328
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name for this resource.
329+
&quot;encryptionKey&quot;: { # A customer-specified encryption key for the Compute Engine resources of this workstation configuration. # Encrypts resources of this workstation configuration using a customer-specified encryption key. If specified, the boot disk of the Compute Engine instance and the persistent disk will be encrypted using this encryption key. If this field is not set, the disks will be encrypted using a generated key. Customer-specified encryption keys do not protect disk metadata. If the customer-specified encryption key is rotated, when the workstation instance is stopped, the system will attempt to recreate the persistent disk with the new version of the key. Be sure to keep older versions of the key until the persistent disk is recreated. Otherwise, data on the persistent disk will be lost. If the encryption key is revoked, the workstation session will automatically be stopped within 7 hours.
330+
&quot;kmsKey&quot;: &quot;A String&quot;, # The name of the encryption key that is stored in Google Cloud KMS, for example, `projects/PROJECT_ID/locations/REGION/keyRings/KEY_RING/cryptoKeys/KEY_NAME`.
331+
&quot;kmsKeyServiceAccount&quot;: &quot;A String&quot;, # The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. However, it is recommended to use a separate service account and to follow KMS best practices mentioned at https://cloud.google.com/kms/docs/separation-of-duties
332+
},
325333
&quot;etag&quot;: &quot;A String&quot;, # Checksum computed by the server. May be sent on update and delete requests to ensure that the client has an up-to-date value before proceeding.
326334
&quot;host&quot;: { # Runtime host for a workstation. # Runtime host for the workstation.
327335
&quot;gceInstance&quot;: { # A runtime using a Compute Engine instance. # Specifies a Compute Engine instance as the host.
@@ -469,6 +477,10 @@ <h3>Method Details</h3>
469477
&quot;degraded&quot;: True or False, # Output only. Whether this resource is in degraded mode, in which case it may require user action to restore full functionality. Details can be found in the `conditions` field.
470478
&quot;deleteTime&quot;: &quot;A String&quot;, # Output only. Time when this resource was soft-deleted.
471479
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name for this resource.
480+
&quot;encryptionKey&quot;: { # A customer-specified encryption key for the Compute Engine resources of this workstation configuration. # Encrypts resources of this workstation configuration using a customer-specified encryption key. If specified, the boot disk of the Compute Engine instance and the persistent disk will be encrypted using this encryption key. If this field is not set, the disks will be encrypted using a generated key. Customer-specified encryption keys do not protect disk metadata. If the customer-specified encryption key is rotated, when the workstation instance is stopped, the system will attempt to recreate the persistent disk with the new version of the key. Be sure to keep older versions of the key until the persistent disk is recreated. Otherwise, data on the persistent disk will be lost. If the encryption key is revoked, the workstation session will automatically be stopped within 7 hours.
481+
&quot;kmsKey&quot;: &quot;A String&quot;, # The name of the encryption key that is stored in Google Cloud KMS, for example, `projects/PROJECT_ID/locations/REGION/keyRings/KEY_RING/cryptoKeys/KEY_NAME`.
482+
&quot;kmsKeyServiceAccount&quot;: &quot;A String&quot;, # The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. However, it is recommended to use a separate service account and to follow KMS best practices mentioned at https://cloud.google.com/kms/docs/separation-of-duties
483+
},
472484
&quot;etag&quot;: &quot;A String&quot;, # Checksum computed by the server. May be sent on update and delete requests to ensure that the client has an up-to-date value before proceeding.
473485
&quot;host&quot;: { # Runtime host for a workstation. # Runtime host for the workstation.
474486
&quot;gceInstance&quot;: { # A runtime using a Compute Engine instance. # Specifies a Compute Engine instance as the host.
@@ -570,6 +582,10 @@ <h3>Method Details</h3>
570582
&quot;degraded&quot;: True or False, # Output only. Whether this resource is in degraded mode, in which case it may require user action to restore full functionality. Details can be found in the `conditions` field.
571583
&quot;deleteTime&quot;: &quot;A String&quot;, # Output only. Time when this resource was soft-deleted.
572584
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name for this resource.
585+
&quot;encryptionKey&quot;: { # A customer-specified encryption key for the Compute Engine resources of this workstation configuration. # Encrypts resources of this workstation configuration using a customer-specified encryption key. If specified, the boot disk of the Compute Engine instance and the persistent disk will be encrypted using this encryption key. If this field is not set, the disks will be encrypted using a generated key. Customer-specified encryption keys do not protect disk metadata. If the customer-specified encryption key is rotated, when the workstation instance is stopped, the system will attempt to recreate the persistent disk with the new version of the key. Be sure to keep older versions of the key until the persistent disk is recreated. Otherwise, data on the persistent disk will be lost. If the encryption key is revoked, the workstation session will automatically be stopped within 7 hours.
586+
&quot;kmsKey&quot;: &quot;A String&quot;, # The name of the encryption key that is stored in Google Cloud KMS, for example, `projects/PROJECT_ID/locations/REGION/keyRings/KEY_RING/cryptoKeys/KEY_NAME`.
587+
&quot;kmsKeyServiceAccount&quot;: &quot;A String&quot;, # The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. However, it is recommended to use a separate service account and to follow KMS best practices mentioned at https://cloud.google.com/kms/docs/separation-of-duties
588+
},
573589
&quot;etag&quot;: &quot;A String&quot;, # Checksum computed by the server. May be sent on update and delete requests to ensure that the client has an up-to-date value before proceeding.
574590
&quot;host&quot;: { # Runtime host for a workstation. # Runtime host for the workstation.
575591
&quot;gceInstance&quot;: { # A runtime using a Compute Engine instance. # Specifies a Compute Engine instance as the host.
@@ -686,6 +702,10 @@ <h3>Method Details</h3>
686702
&quot;degraded&quot;: True or False, # Output only. Whether this resource is in degraded mode, in which case it may require user action to restore full functionality. Details can be found in the `conditions` field.
687703
&quot;deleteTime&quot;: &quot;A String&quot;, # Output only. Time when this resource was soft-deleted.
688704
&quot;displayName&quot;: &quot;A String&quot;, # Human-readable name for this resource.
705+
&quot;encryptionKey&quot;: { # A customer-specified encryption key for the Compute Engine resources of this workstation configuration. # Encrypts resources of this workstation configuration using a customer-specified encryption key. If specified, the boot disk of the Compute Engine instance and the persistent disk will be encrypted using this encryption key. If this field is not set, the disks will be encrypted using a generated key. Customer-specified encryption keys do not protect disk metadata. If the customer-specified encryption key is rotated, when the workstation instance is stopped, the system will attempt to recreate the persistent disk with the new version of the key. Be sure to keep older versions of the key until the persistent disk is recreated. Otherwise, data on the persistent disk will be lost. If the encryption key is revoked, the workstation session will automatically be stopped within 7 hours.
706+
&quot;kmsKey&quot;: &quot;A String&quot;, # The name of the encryption key that is stored in Google Cloud KMS, for example, `projects/PROJECT_ID/locations/REGION/keyRings/KEY_RING/cryptoKeys/KEY_NAME`.
707+
&quot;kmsKeyServiceAccount&quot;: &quot;A String&quot;, # The service account being used for the encryption request for the given KMS key. If absent, the Compute Engine default service account is used. However, it is recommended to use a separate service account and to follow KMS best practices mentioned at https://cloud.google.com/kms/docs/separation-of-duties
708+
},
689709
&quot;etag&quot;: &quot;A String&quot;, # Checksum computed by the server. May be sent on update and delete requests to ensure that the client has an up-to-date value before proceeding.
690710
&quot;host&quot;: { # Runtime host for a workstation. # Runtime host for the workstation.
691711
&quot;gceInstance&quot;: { # A runtime using a Compute Engine instance. # Specifies a Compute Engine instance as the host.

0 commit comments

Comments
 (0)