Skip to content

Commit

Permalink
feat(all): auto-regenerate discovery clients (#2394)
Browse files Browse the repository at this point in the history
  • Loading branch information
yoshi-automation authored Feb 3, 2024
1 parent e5a7a15 commit 140fb54
Show file tree
Hide file tree
Showing 19 changed files with 2,757 additions and 286 deletions.
2 changes: 1 addition & 1 deletion api-list.json
Original file line number Diff line number Diff line change
Expand Up @@ -772,7 +772,7 @@
"name": "batch",
"version": "v1",
"title": "Batch API",
"description": "An API to manage the running of batch jobs on Google Cloud Platform.",
"description": "An API to manage the running of batch resources on Google Cloud Platform.",
"discoveryRestUrl": "https://batch.googleapis.com/$discovery/rest?version=v1",
"icons": {
"x16": "https://www.gstatic.com/images/branding/product/1x/googleg_16dp.png",
Expand Down
10 changes: 5 additions & 5 deletions batch/v1/batch-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -561,7 +561,7 @@
}
}
},
"revision": "20240112",
"revision": "20240202",
"rootUrl": "https://batch.googleapis.com/",
"schemas": {
"Accelerator": {
Expand Down Expand Up @@ -1108,11 +1108,11 @@
"type": "string"
},
"password": {
"description": "Optional password for logging in to a docker registry. If password matches `projects/*/secrets/*/versions/*` then Batch will read the password from the Secret Manager;",
"description": "Required if the container image is from a private Docker registry. The password to login to the Docker registry that contains the image. For security, it is strongly recommended to specify an encrypted password by using a Secret Manager secret: `projects/*/secrets/*/versions/*`. Warning: If you specify the password using plain text, you risk the password being exposed to any users who can view the job or its logs. To avoid this risk, specify a secret that contains the password instead. Learn more about [Secret Manager](https://cloud.google.com/secret-manager/docs/) and [using Secret Manager with Batch](https://cloud.google.com/batch/docs/create-run-job-secret-manager).",
"type": "string"
},
"username": {
"description": "Optional username for logging in to a docker registry. If username matches `projects/*/secrets/*/versions/*` then Batch will read the username from the Secret Manager.",
"description": "Required if the container image is from a private Docker registry. The username to login to the Docker registry that contains the image. You can either specify the username directly by using plain text or specify an encrypted username by using a Secret Manager secret: `projects/*/secrets/*/versions/*`. However, using a secret is recommended for enhanced security. Caution: If you specify the username using plain text, you risk the username being exposed to any users who can view the job or its logs. To avoid this risk, specify a secret that contains the username instead. Learn more about [Secret Manager](https://cloud.google.com/secret-manager/docs/) and [using Secret Manager with Batch](https://cloud.google.com/batch/docs/create-run-job-secret-manager).",
"type": "string"
},
"volumes": {
Expand Down Expand Up @@ -2093,11 +2093,11 @@
"type": "boolean"
},
"requireHostsFile": {
"description": "When true, Batch will populate a file with a list of all VMs assigned to the TaskGroup and set the BATCH_HOSTS_FILE environment variable to the path of that file. Defaults to false.",
"description": "When true, Batch will populate a file with a list of all VMs assigned to the TaskGroup and set the BATCH_HOSTS_FILE environment variable to the path of that file. Defaults to false. The host file supports up to 1000 VMs.",
"type": "boolean"
},
"runAsNonRoot": {
"description": "Optional. If not set or set to false, Batch uses the root user to execute runnables. If set to true, Batch will make sure to run the runnables using a non-root user. Currently, the non-root user Batch used is generated by OS Login. For more information, see [About OS Login](https://cloud.google.com/compute/docs/oslogin).",
"description": "Optional. If not set or set to false, Batch uses the root user to execute runnables. If set to true, Batch runs the runnables using a non-root user. Currently, the non-root user Batch used is generated by OS Login. For more information, see [About OS Login](https://cloud.google.com/compute/docs/oslogin).",
"type": "boolean"
},
"schedulingPolicy": {
Expand Down
40 changes: 29 additions & 11 deletions batch/v1/batch-gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

111 changes: 109 additions & 2 deletions cloudbuild/v2/cloudbuild-api.json
Original file line number Diff line number Diff line change
Expand Up @@ -844,7 +844,7 @@
}
}
},
"revision": "20231231",
"revision": "20240130",
"rootUrl": "https://cloudbuild.googleapis.com/",
"schemas": {
"AuditConfig": {
Expand Down Expand Up @@ -939,7 +939,7 @@
"type": "array"
},
"role": {
"description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.",
"description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`. For an overview of the IAM roles and permissions, see the [IAM documentation](https://cloud.google.com/iam/docs/roles-overview). For a list of the available pre-defined roles, see [here](https://cloud.google.com/iam/docs/understanding-roles).",
"type": "string"
}
},
Expand Down Expand Up @@ -1867,6 +1867,14 @@
"readOnly": true,
"type": "string"
},
"gcbParams": {
"additionalProperties": {
"type": "string"
},
"description": "Output only. GCB default params.",
"readOnly": true,
"type": "object"
},
"name": {
"description": "Output only. The `PipelineRun` name with format `projects/{project}/locations/{location}/pipelineRuns/{pipeline_run}`",
"readOnly": true,
Expand Down Expand Up @@ -1899,11 +1907,19 @@
"$ref": "PipelineSpec",
"description": "PipelineSpec defines the desired state of Pipeline."
},
"provenance": {
"$ref": "Provenance",
"description": "Optional. Provenance configuration."
},
"resolvedPipelineSpec": {
"$ref": "PipelineSpec",
"description": "Output only. The exact PipelineSpec used to instantiate the run.",
"readOnly": true
},
"security": {
"$ref": "Security",
"description": "Optional. Security configuration."
},
"serviceAccount": {
"description": "Service account used in the Pipeline.",
"type": "string"
Expand Down Expand Up @@ -1937,6 +1953,10 @@
"readOnly": true,
"type": "string"
},
"worker": {
"$ref": "Worker",
"description": "Optional. Worker configuration."
},
"workerPool": {
"description": "Output only. The WorkerPool used to run this PipelineRun.",
"readOnly": true,
Expand Down Expand Up @@ -2139,6 +2159,57 @@
},
"type": "object"
},
"Provenance": {
"description": "Provenance configuration.",
"id": "Provenance",
"properties": {
"enabled": {
"description": "Optional. Provenance push mode.",
"enum": [
"ENABLED_UNSPECIFIED",
"REQUIRED",
"OPTIMISTIC",
"DISABLED"
],
"enumDescriptions": [
"Default to disabled (before AA regionalization), optimistic after",
"Provenance failures would fail the run",
"GCB will attempt to push to artifact analaysis and build state would not be impacted by the push failures.",
"Disable the provenance push entirely."
],
"type": "string"
},
"region": {
"description": "Optional. Provenance region.",
"enum": [
"REGION_UNSPECIFIED",
"GLOBAL"
],
"enumDescriptions": [
"The PipelineRun/TaskRun/Workflow will be rejected. Update this comment to push to the same region as the run in Artifact Analysis when it's regionalized.",
"Push provenance to Artifact Analysis in global region."
],
"type": "string"
},
"storage": {
"description": "Optional. Where provenance is stored.",
"enum": [
"STORAGE_UNSPECIFIED",
"PREFER_ARTIFACT_PROJECT",
"ARTIFACT_PROJECT_ONLY",
"BUILD_PROJECT_ONLY"
],
"enumDescriptions": [
"Default PREFER_ARTIFACT_PROJECT.",
"GCB will attempt to push provenance to the artifact project. If it is not available, fallback to build project.",
"Only push to artifact project.",
"Only push to build project."
],
"type": "string"
}
},
"type": "object"
},
"Repository": {
"description": "A repository associated to a parent connection.",
"id": "Repository",
Expand Down Expand Up @@ -2242,6 +2313,31 @@
},
"type": "object"
},
"Security": {
"description": "Security configuration.",
"id": "Security",
"properties": {
"privilegeMode": {
"description": "Optional. Privilege mode.",
"enum": [
"PRIVILEGE_MODE_UNSPECIFIED",
"PRIVILEGED",
"UNPRIVILEGED"
],
"enumDescriptions": [
"Default to PRIVILEGED.",
"Privileged mode.",
"Unprivileged mode."
],
"type": "string"
},
"serviceAccount": {
"description": "IAM service account whose credentials will be used at runtime.",
"type": "string"
}
},
"type": "object"
},
"SecurityContext": {
"description": "Security options the container should be run with.",
"id": "SecurityContext",
Expand Down Expand Up @@ -2777,6 +2873,17 @@
},
"type": "object"
},
"Worker": {
"description": "Configuration for the worker.",
"id": "Worker",
"properties": {
"machineType": {
"description": "Optional. Machine type of a worker, default is \"e2-standard-2\".",
"type": "string"
}
},
"type": "object"
},
"WorkspaceBinding": {
"description": "WorkspaceBinding maps a workspace to a Volume. PipelineRef can be used to refer to a specific instance of a Pipeline.",
"id": "WorkspaceBinding",
Expand Down
Loading

0 comments on commit 140fb54

Please sign in to comment.