|
1195 | 1195 | }
|
1196 | 1196 | }
|
1197 | 1197 | },
|
1198 |
| - "revision": "20240130", |
| 1198 | + "revision": "20240301", |
1199 | 1199 | "rootUrl": "https://workstations.googleapis.com/",
|
1200 | 1200 | "schemas": {
|
| 1201 | + "Accelerator": { |
| 1202 | + "description": "An accelerator card attached to the instance.", |
| 1203 | + "id": "Accelerator", |
| 1204 | + "properties": { |
| 1205 | + "count": { |
| 1206 | + "description": "Optional. Number of accelerator cards exposed to the instance.", |
| 1207 | + "format": "int32", |
| 1208 | + "type": "integer" |
| 1209 | + }, |
| 1210 | + "type": { |
| 1211 | + "description": "Optional. Type of accelerator resource to attach to the instance, for example, `\"nvidia-tesla-p100\"`.", |
| 1212 | + "type": "string" |
| 1213 | + } |
| 1214 | + }, |
| 1215 | + "type": "object" |
| 1216 | + }, |
1201 | 1217 | "AuditConfig": {
|
1202 | 1218 | "description": "Specifies the audit configuration for a service. The configuration determines which permission types are logged, and what identities, if any, are exempted from logging. An AuditConfig must have one or more AuditLogConfigs. If there are AuditConfigs for both `allServices` and a specific service, the union of the two AuditConfigs is used for that service: the log_types specified in each AuditConfig are enabled, and the exempted_members in each AuditLogConfig are exempted. Example Policy with multiple AuditConfigs: { \"audit_configs\": [ { \"service\": \"allServices\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\", \"exempted_members\": [ \"user: [email protected]\" ] }, { \"log_type\": \"DATA_WRITE\" }, { \"log_type\": \"ADMIN_READ\" } ] }, { \"service\": \"sampleservice.googleapis.com\", \"audit_log_configs\": [ { \"log_type\": \"DATA_READ\" }, { \"log_type\": \"DATA_WRITE\", \"exempted_members\": [ \"user: [email protected]\" ] } ] } ] } For sampleservice, this policy enables DATA_READ, DATA_WRITE and ADMIN_READ logging. It also exempts ` [email protected]` from DATA_READ logging, and ` [email protected]` from DATA_WRITE logging.",
|
1203 | 1219 | "id": "AuditConfig",
|
|
1341 | 1357 | },
|
1342 | 1358 | "type": "object"
|
1343 | 1359 | },
|
| 1360 | + "EphemeralDirectory": { |
| 1361 | + "description": "An ephemeral directory which won't persist across workstation sessions. It is freshly created on every workstation start operation.", |
| 1362 | + "id": "EphemeralDirectory", |
| 1363 | + "properties": { |
| 1364 | + "gcePd": { |
| 1365 | + "$ref": "GcePersistentDisk", |
| 1366 | + "description": "An EphemeralDirectory backed by a Compute Engine persistent disk." |
| 1367 | + }, |
| 1368 | + "mountPath": { |
| 1369 | + "description": "Required. Location of this directory in the running workstation.", |
| 1370 | + "type": "string" |
| 1371 | + } |
| 1372 | + }, |
| 1373 | + "type": "object" |
| 1374 | + }, |
1344 | 1375 | "Expr": {
|
1345 | 1376 | "description": "Represents a textual expression in the Common Expression Language (CEL) syntax. CEL is a C-like expression language. The syntax and semantics of CEL are documented at https://github.com/google/cel-spec. Example (Comparison): title: \"Summary size limit\" description: \"Determines if a summary is less than 100 chars\" expression: \"document.summary.size() < 100\" Example (Equality): title: \"Requestor is owner\" description: \"Determines if requestor is the document owner\" expression: \"document.owner == request.auth.claims.email\" Example (Logic): title: \"Public documents\" description: \"Determine whether the document should be publicly visible\" expression: \"document.type != 'private' && document.type != 'internal'\" Example (Data Manipulation): title: \"Notification string\" description: \"Create a notification string with a timestamp.\" expression: \"'New message received at ' + string(document.create_time)\" The exact variables and functions that may be referenced within an expression are determined by the service that evaluates it. See the service documentation for additional information.",
|
1346 | 1377 | "id": "Expr",
|
|
1379 | 1410 | "description": "A runtime using a Compute Engine instance.",
|
1380 | 1411 | "id": "GceInstance",
|
1381 | 1412 | "properties": {
|
| 1413 | + "accelerators": { |
| 1414 | + "description": "Optional. A list of the type and count of accelerator cards attached to the instance.", |
| 1415 | + "items": { |
| 1416 | + "$ref": "Accelerator" |
| 1417 | + }, |
| 1418 | + "type": "array" |
| 1419 | + }, |
1382 | 1420 | "bootDiskSizeGb": {
|
1383 | 1421 | "description": "Optional. The size of the boot disk for the VM in gigabytes (GB). The minimum boot disk size is `30` GB. Defaults to `50` GB.",
|
1384 | 1422 | "format": "int32",
|
|
1392 | 1430 | "description": "Optional. When set to true, disables public IP addresses for VMs. If you disable public IP addresses, you must set up Private Google Access or Cloud NAT on your network. If you use Private Google Access and you use `private.googleapis.com` or `restricted.googleapis.com` for Container Registry and Artifact Registry, make sure that you set up DNS records for domains `*.gcr.io` and `*.pkg.dev`. Defaults to false (VMs have public IP addresses).",
|
1393 | 1431 | "type": "boolean"
|
1394 | 1432 | },
|
| 1433 | + "disableSsh": { |
| 1434 | + "description": "Optional. Whether to disable SSH access to the VM.", |
| 1435 | + "type": "boolean" |
| 1436 | + }, |
1395 | 1437 | "enableNestedVirtualization": {
|
1396 |
| - "description": "Optional. Whether to enable nested virtualization on Cloud Workstations VMs created under this workstation configuration. Nested virtualization lets you run virtual machine (VM) instances inside your workstation. Before enabling nested virtualization, consider the following important considerations. Cloud Workstations instances are subject to the [same restrictions as Compute Engine instances](https://cloud.google.com/compute/docs/instances/nested-virtualization/overview#restrictions): * **Organization policy**: projects, folders, or organizations may be restricted from creating nested VMs if the **Disable VM nested virtualization** constraint is enforced in the organization policy. For more information, see the Compute Engine section, [Checking whether nested virtualization is allowed](https://cloud.google.com/compute/docs/instances/nested-virtualization/managing-constraint#checking_whether_nested_virtualization_is_allowed). * **Performance**: nested VMs might experience a 10% or greater decrease in performance for workloads that are CPU-bound and possibly greater than a 10% decrease for workloads that are input/output bound. * **Machine Type**: nested virtualization can only be enabled on workstation configurations that specify a machine_type in the N1 or N2 machine series. * **GPUs**: nested virtualization may not be enabled on workstation configurations with accelerators. * **Operating System**: Because [Container-Optimized OS](https://cloud.google.com/compute/docs/images/os-details#container-optimized_os_cos) does not support nested virtualization, when nested virtualization is enabled, the underlying Compute Engine VM instances boot from an [Ubuntu LTS](https://cloud.google.com/compute/docs/images/os-details#ubuntu_lts) image.", |
| 1438 | + "description": "Optional. Whether to enable nested virtualization on Cloud Workstations VMs created using this workstation configuration. Nested virtualization lets you run virtual machine (VM) instances inside your workstation. Before enabling nested virtualization, consider the following important considerations. Cloud Workstations instances are subject to the [same restrictions as Compute Engine instances](https://cloud.google.com/compute/docs/instances/nested-virtualization/overview#restrictions): * **Organization policy**: projects, folders, or organizations may be restricted from creating nested VMs if the **Disable VM nested virtualization** constraint is enforced in the organization policy. For more information, see the Compute Engine section, [Checking whether nested virtualization is allowed](https://cloud.google.com/compute/docs/instances/nested-virtualization/managing-constraint#checking_whether_nested_virtualization_is_allowed). * **Performance**: nested VMs might experience a 10% or greater decrease in performance for workloads that are CPU-bound and possibly greater than a 10% decrease for workloads that are input/output bound. * **Machine Type**: nested virtualization can only be enabled on workstation configurations that specify a machine_type in the N1 or N2 machine series. * **GPUs**: nested virtualization may not be enabled on workstation configurations with accelerators. * **Operating System**: Because [Container-Optimized OS](https://cloud.google.com/compute/docs/images/os-details#container-optimized_os_cos) does not support nested virtualization, when nested virtualization is enabled, the underlying Compute Engine VM instances boot from an [Ubuntu LTS](https://cloud.google.com/compute/docs/images/os-details#ubuntu_lts) image.", |
1397 | 1439 | "type": "boolean"
|
1398 | 1440 | },
|
1399 | 1441 | "machineType": {
|
|
1436 | 1478 | },
|
1437 | 1479 | "type": "object"
|
1438 | 1480 | },
|
| 1481 | + "GcePersistentDisk": { |
| 1482 | + "description": "An EphemeralDirectory is backed by a Compute Engine persistent disk.", |
| 1483 | + "id": "GcePersistentDisk", |
| 1484 | + "properties": { |
| 1485 | + "diskType": { |
| 1486 | + "description": "Optional. Type of the disk to use. Defaults to `\"pd-standard\"`.", |
| 1487 | + "type": "string" |
| 1488 | + }, |
| 1489 | + "readOnly": { |
| 1490 | + "description": "Optional. Whether the disk is read only. If true, the disk may be shared by multiple VMs and source_snapshot must be set.", |
| 1491 | + "type": "boolean" |
| 1492 | + }, |
| 1493 | + "sourceImage": { |
| 1494 | + "description": "Optional. Name of the disk image to use as the source for the disk. Must be empty if source_snapshot is set. Updating source_image will update content in the ephemeral directory after the workstation is restarted. This field is mutable.", |
| 1495 | + "type": "string" |
| 1496 | + }, |
| 1497 | + "sourceSnapshot": { |
| 1498 | + "description": "Optional. Name of the snapshot to use as the source for the disk. Must be empty if source_image is set. Must be empty if read_only is false. Updating source_snapshot will update content in the ephemeral directory after the workstation is restarted. This field is mutable.", |
| 1499 | + "type": "string" |
| 1500 | + } |
| 1501 | + }, |
| 1502 | + "type": "object" |
| 1503 | + }, |
1439 | 1504 | "GceRegionalPersistentDisk": {
|
1440 |
| - "description": "A PersistentDirectory backed by a Compute Engine regional persistent disk. The persistent_directories field is repeated, but it may contain only one entry. It creates a [persistent disk](https://cloud.google.com/compute/docs/disks/persistent-disks) that mounts to the workstation VM at `/home` when the session starts and detaches when the session ends. If this field is empty, workstations created with this configuration do not have a persistent home directory.", |
| 1505 | + "description": "A Persistent Directory backed by a Compute Engine regional persistent disk. The persistent_directories field is repeated, but it may contain only one entry. It creates a [persistent disk](https://cloud.google.com/compute/docs/disks/persistent-disks) that mounts to the workstation VM at `/home` when the session starts and detaches when the session ends. If this field is empty, workstations created with this configuration do not have a persistent home directory.", |
1441 | 1506 | "id": "GceRegionalPersistentDisk",
|
1442 | 1507 | "properties": {
|
1443 | 1508 | "diskType": {
|
|
2247 | 2312 | "type": "string"
|
2248 | 2313 | },
|
2249 | 2314 | "disableTcpConnections": {
|
2250 |
| - "description": "Optional. Disables support for plain TCP connections in the workstation. By default the service supports TCP connections via a websocket relay. Setting this option to true disables that relay, which prevents the usage of services that require plain tcp connections, such as ssh. When enabled, all communication must occur over https or wss.", |
| 2315 | + "description": "Optional. Disables support for plain TCP connections in the workstation. By default the service supports TCP connections through a websocket relay. Setting this option to true disables that relay, which prevents the usage of services that require plain TCP connections, such as SSH. When enabled, all communication must occur over HTTPS or WSS.", |
2251 | 2316 | "type": "boolean"
|
2252 | 2317 | },
|
2253 | 2318 | "displayName": {
|
|
2262 | 2327 | "$ref": "CustomerEncryptionKey",
|
2263 | 2328 | "description": "Immutable. Encrypts resources of this workstation configuration using a customer-managed encryption key (CMEK). If specified, the boot disk of the Compute Engine instance and the persistent disk are encrypted using this encryption key. If this field is not set, the disks are encrypted using a generated key. Customer-managed encryption keys do not protect disk metadata. If the customer-managed encryption key is rotated, when the workstation instance is stopped, the system attempts to recreate the persistent disk with the new version of the key. Be sure to keep older versions of the key until the persistent disk is recreated. Otherwise, data on the persistent disk might be lost. If the encryption key is revoked, the workstation session automatically stops within 7 hours. Immutable after the workstation configuration is created."
|
2264 | 2329 | },
|
| 2330 | + "ephemeralDirectories": { |
| 2331 | + "description": "Optional. Ephemeral directories which won't persist across workstation sessions.", |
| 2332 | + "items": { |
| 2333 | + "$ref": "EphemeralDirectory" |
| 2334 | + }, |
| 2335 | + "type": "array" |
| 2336 | + }, |
2265 | 2337 | "etag": {
|
2266 | 2338 | "description": "Optional. Checksum computed by the server. May be sent on update and delete requests to make sure that the client has an up-to-date value before proceeding.",
|
2267 | 2339 | "type": "string"
|
|
0 commit comments