Skip to content

Commit 4f21ebf

Browse files
feat(compute): update the api
#### compute:alpha The following keys were deleted: - schemas.NodeGroupNode.properties.instanceConsumptionData (Total Keys: 2) The following keys were added: - schemas.AttachedDiskInitializeParams.properties.sourceInstantSnapshot.type (Total Keys: 1) - schemas.FirewallPolicyRuleMatcher.properties.destRegionCodes (Total Keys: 2) - schemas.FirewallPolicyRuleMatcher.properties.srcRegionCodes (Total Keys: 2) - schemas.ForwardingRule.properties.allowPscGlobalAccess.type (Total Keys: 1) - schemas.Instance.properties.params.$ref (Total Keys: 1) - schemas.InstanceParams (Total Keys: 4) - schemas.InstanceProperties.properties.resourceManagerTags (Total Keys: 2) - schemas.InstantSnapshot.properties.resourceStatus.$ref (Total Keys: 1) - schemas.InstantSnapshotResourceStatus (Total Keys: 4) - schemas.NodeGroupNode.properties.instanceConsumptionData (Total Keys: 2) - schemas.Snapshot.properties.snapshotType.type (Total Keys: 1) #### compute:beta The following keys were added: - schemas.AttachedDiskInitializeParams.properties.licenses (Total Keys: 2) - schemas.Instance.properties.params.$ref (Total Keys: 1) - schemas.InstanceParams (Total Keys: 4) - schemas.InstanceProperties.properties.resourceManagerTags (Total Keys: 2) - schemas.InterconnectAttachment.properties.candidateIpv6Subnets (Total Keys: 2) - schemas.InterconnectAttachment.properties.cloudRouterIpv6Address.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.cloudRouterIpv6InterfaceId.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.customerRouterIpv6Address.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.customerRouterIpv6InterfaceId.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.stackType.type (Total Keys: 1) - schemas.ServiceAttachment.properties.domainNames (Total Keys: 2) #### compute:v1 The following keys were added: - schemas.AttachedDiskInitializeParams.properties.licenses (Total Keys: 2) - schemas.InterconnectAttachment.properties.candidateIpv6Subnets (Total Keys: 2) - schemas.InterconnectAttachment.properties.cloudRouterIpv6Address.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.cloudRouterIpv6InterfaceId.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.customerRouterIpv6Address.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.customerRouterIpv6InterfaceId.type (Total Keys: 1) - schemas.InterconnectAttachment.properties.stackType.type (Total Keys: 1) - schemas.NetworkEndpointGroup.properties.pscTargetService.type (Total Keys: 1) - schemas.ServiceAttachment.properties.domainNames (Total Keys: 2)
1 parent 510a7ad commit 4f21ebf

File tree

76 files changed

+1285
-569
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+1285
-569
lines changed

docs/dyn/compute_alpha.disks.html

+5-4
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ <h2>Instance Methods</h2>
8888
<p class="firstline">Close httplib2 connections.</p>
8989
<p class="toc_element">
9090
<code><a href="#createSnapshot">createSnapshot(project, zone, disk, body=None, guestFlush=None, requestId=None, x__xgafv=None)</a></code></p>
91-
<p class="firstline">Creates a snapshot of a specified persistent disk.</p>
91+
<p class="firstline">Creates a snapshot of a specified persistent disk. For regular snapshot creation, consider using snapshots.insert instead, as that method supports more features, such as creating snapshots in a project different from the source disk project.</p>
9292
<p class="toc_element">
9393
<code><a href="#delete">delete(project, zone, disk, requestId=None, x__xgafv=None)</a></code></p>
9494
<p class="firstline">Deletes the specified persistent disk. Deleting a disk removes its data permanently and is irreversible. However, deleting a disk does not delete any snapshots previously made from the disk. You must separately delete snapshots.</p>
@@ -124,7 +124,7 @@ <h2>Instance Methods</h2>
124124
<p class="firstline">Returns permissions that a caller has on the specified resource.</p>
125125
<p class="toc_element">
126126
<code><a href="#update">update(project, zone, disk, body=None, paths=None, requestId=None, updateMask=None, x__xgafv=None)</a></code></p>
127-
<p class="firstline">Update the specified disk with the data included in the request. Update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.</p>
127+
<p class="firstline">Updates the specified disk with the data included in the request. The update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.</p>
128128
<h3>Method Details</h3>
129129
<div class="method">
130130
<code class="details" id="addResourcePolicies">addResourcePolicies(project, zone, disk, body=None, requestId=None, x__xgafv=None)</code>
@@ -365,7 +365,7 @@ <h3>Method Details</h3>
365365

366366
<div class="method">
367367
<code class="details" id="createSnapshot">createSnapshot(project, zone, disk, body=None, guestFlush=None, requestId=None, x__xgafv=None)</code>
368-
<pre>Creates a snapshot of a specified persistent disk.
368+
<pre>Creates a snapshot of a specified persistent disk. For regular snapshot creation, consider using snapshots.insert instead, as that method supports more features, such as creating snapshots in a project different from the source disk project.
369369

370370
Args:
371371
project: string, Project ID for this request. (required)
@@ -412,6 +412,7 @@ <h3>Method Details</h3>
412412
&quot;rsaEncryptedKey&quot;: &quot;A String&quot;, # Specifies an RFC 4648 base64 encoded, RSA-wrapped 2048-bit customer-supplied encryption key to either encrypt or decrypt this resource. You can provide either the rawKey or the rsaEncryptedKey. For example: &quot;rsaEncryptedKey&quot;: &quot;ieCx/NcW06PcT7Ep1X6LUTc/hLvUDYyzSZPPVCVPTVEohpeHASqC8uw5TzyO9U+Fka9JFH z0mBibXUInrC/jEk014kCK/NPjYgEMOyssZ4ZINPKxlUh2zn1bV+MCaTICrdmuSBTWlUUiFoD D6PYznLwh8ZNdaheCeZ8ewEXgFQ8V+sDroLaN3Xs3MDTXQEMMoNUXMCZEIpg9Vtp9x2oe==&quot; The key must meet the following requirements before you can provide it to Compute Engine: 1. The key is wrapped using a RSA public key certificate provided by Google. 2. After being wrapped, the key must be encoded in RFC 4648 base64 encoding. Gets the RSA public key certificate provided by Google at: https://cloud-certs.storage.googleapis.com/google-cloud-csek-ingress.pem
413413
&quot;sha256&quot;: &quot;A String&quot;, # [Output only] The RFC 4648 base64 encoded SHA-256 hash of the customer-supplied encryption key that protects this resource.
414414
},
415+
&quot;snapshotType&quot;: &quot;A String&quot;, # Indicates the type of the snapshot.
415416
&quot;sourceDisk&quot;: &quot;A String&quot;, # The source disk used to create this snapshot.
416417
&quot;sourceDiskEncryptionKey&quot;: { # The customer-supplied encryption key of the source disk. Required if the source disk is protected by a customer-supplied encryption key.
417418
&quot;kmsKeyName&quot;: &quot;A String&quot;, # The name of the encryption key that is stored in Google Cloud KMS. For example: &quot;kmsKeyName&quot;: &quot;projects/kms_project_id/locations/region/keyRings/ key_region/cryptoKeys/key
@@ -1537,7 +1538,7 @@ <h3>Method Details</h3>
15371538

15381539
<div class="method">
15391540
<code class="details" id="update">update(project, zone, disk, body=None, paths=None, requestId=None, updateMask=None, x__xgafv=None)</code>
1540-
<pre>Update the specified disk with the data included in the request. Update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.
1541+
<pre>Updates the specified disk with the data included in the request. The update is performed only on selected fields included as part of update-mask. Only the following fields can be modified: user_license.
15411542

15421543
Args:
15431544
project: string, Project ID for this request. (required)

docs/dyn/compute_alpha.firewallPolicies.html

+42
Original file line numberDiff line numberDiff line change
@@ -239,6 +239,9 @@ <h3>Method Details</h3>
239239
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
240240
&quot;A String&quot;,
241241
],
242+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
243+
&quot;A String&quot;,
244+
],
242245
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
243246
{
244247
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -256,6 +259,9 @@ <h3>Method Details</h3>
256259
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
257260
&quot;A String&quot;,
258261
],
262+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
263+
&quot;A String&quot;,
264+
],
259265
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
260266
{
261267
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.
@@ -529,6 +535,9 @@ <h3>Method Details</h3>
529535
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
530536
&quot;A String&quot;,
531537
],
538+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
539+
&quot;A String&quot;,
540+
],
532541
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
533542
{
534543
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -546,6 +555,9 @@ <h3>Method Details</h3>
546555
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
547556
&quot;A String&quot;,
548557
],
558+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
559+
&quot;A String&quot;,
560+
],
549561
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
550562
{
551563
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.
@@ -733,6 +745,9 @@ <h3>Method Details</h3>
733745
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
734746
&quot;A String&quot;,
735747
],
748+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
749+
&quot;A String&quot;,
750+
],
736751
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
737752
{
738753
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -750,6 +765,9 @@ <h3>Method Details</h3>
750765
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
751766
&quot;A String&quot;,
752767
],
768+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
769+
&quot;A String&quot;,
770+
],
753771
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
754772
{
755773
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.
@@ -820,6 +838,9 @@ <h3>Method Details</h3>
820838
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
821839
&quot;A String&quot;,
822840
],
841+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
842+
&quot;A String&quot;,
843+
],
823844
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
824845
{
825846
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -837,6 +858,9 @@ <h3>Method Details</h3>
837858
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
838859
&quot;A String&quot;,
839860
],
861+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
862+
&quot;A String&quot;,
863+
],
840864
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
841865
{
842866
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.
@@ -986,6 +1010,9 @@ <h3>Method Details</h3>
9861010
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
9871011
&quot;A String&quot;,
9881012
],
1013+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
1014+
&quot;A String&quot;,
1015+
],
9891016
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
9901017
{
9911018
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -1003,6 +1030,9 @@ <h3>Method Details</h3>
10031030
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
10041031
&quot;A String&quot;,
10051032
],
1033+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
1034+
&quot;A String&quot;,
1035+
],
10061036
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
10071037
{
10081038
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.
@@ -1202,6 +1232,9 @@ <h3>Method Details</h3>
12021232
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
12031233
&quot;A String&quot;,
12041234
],
1235+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
1236+
&quot;A String&quot;,
1237+
],
12051238
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
12061239
{
12071240
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -1219,6 +1252,9 @@ <h3>Method Details</h3>
12191252
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
12201253
&quot;A String&quot;,
12211254
],
1255+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
1256+
&quot;A String&quot;,
1257+
],
12221258
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
12231259
{
12241260
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.
@@ -1333,6 +1369,9 @@ <h3>Method Details</h3>
13331369
&quot;destIpRanges&quot;: [ # CIDR IP address range. Maximum number of destination CIDR IP ranges allowed is 5000.
13341370
&quot;A String&quot;,
13351371
],
1372+
&quot;destRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for destination of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of dest region codes allowed is 5000.
1373+
&quot;A String&quot;,
1374+
],
13361375
&quot;layer4Configs&quot;: [ # Pairs of IP protocols and ports that the rule should match.
13371376
{
13381377
&quot;ipProtocol&quot;: &quot;A String&quot;, # The IP protocol to which this rule applies. The protocol type is required when creating a firewall rule. This value can either be one of the following well known protocol strings (tcp, udp, icmp, esp, ah, ipip, sctp), or the IP protocol number.
@@ -1350,6 +1389,9 @@ <h3>Method Details</h3>
13501389
&quot;srcIpRanges&quot;: [ # CIDR IP address range. Maximum number of source CIDR IP ranges allowed is 5000.
13511390
&quot;A String&quot;,
13521391
],
1392+
&quot;srcRegionCodes&quot;: [ # Region codes whose IP addresses will be used to match for source of traffic. Should be specified as 2 letter country code defined as per ISO 3166 alpha-2 country codes. ex.&quot;US&quot; Maximum number of source region codes allowed is 5000.
1393+
&quot;A String&quot;,
1394+
],
13531395
&quot;srcSecureTags&quot;: [ # List of secure tag values, which should be matched at the source of the traffic. For INGRESS rule, if all the srcSecureTag are INEFFECTIVE, and there is no srcIpRange, this rule will be ignored. Maximum number of source tag values allowed is 256.
13541396
{
13551397
&quot;name&quot;: &quot;A String&quot;, # Name of the secure tag, created with TagManager&#x27;s TagValue API.

0 commit comments

Comments
 (0)