You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/gkehub_v1.projects.locations.features.html
+108Lines changed: 108 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -280,6 +280,33 @@ <h3>Method Details</h3>
280
280
},
281
281
},
282
282
},
283
+
"policycontroller": { # **Policy Controller**: State for a single cluster. # Policycontroller-specific state.
284
+
"clusterName": "A String", # The user-defined name for the cluster used by ClusterSelectors to group clusters together. This should match Membership's membership_name, unless the user installed PC on the cluster manually prior to enabling the PC hub feature. Unique within a Policy Controller installation.
285
+
"membershipSpec": { # **Policy Controller**: Configuration for a single cluster. Intended to parallel the PolicyController CR. # Membership configuration in the cluster. This represents the actual state in the cluster, while the MembershipSpec in the FeatureSpec represents the intended state
286
+
"policyControllerHubConfig": { # Configuration for Policy Controller # Policy Controller configuration for the cluster.
287
+
"auditIntervalSeconds": "A String", # Sets the interval for Policy Controller Audit Scans (in seconds). When set to 0, this disables audit functionality altogether.
288
+
"exemptableNamespaces": [ # The set of namespaces that are excluded from Policy Controller checks. Namespaces do not need to currently exist on the cluster.
289
+
"A String",
290
+
],
291
+
"installSpec": "A String", # The install_spec represents the intended state specified by the latest request that mutated install_spec in the feature spec, not the lifecycle state of the feature observed by the Hub feature controller that is reported in the feature state.
292
+
"logDeniesEnabled": True or False, # Logs all denies and dry run failures.
293
+
"referentialRulesEnabled": True or False, # Enables the ability to use Constraint Templates that reference to objects other than the object currently being evaluated.
294
+
"templateLibraryConfig": { # The config specifying which default library templates to install. # Configures the library templates to install along with Policy Controller.
295
+
"included": True or False, # Whether the standard template library should be installed or not.
296
+
},
297
+
},
298
+
"version": "A String", # Version of Policy Controller installed.
299
+
},
300
+
"policyControllerHubState": { # State of the Policy Controller. # Policy Controller state observed by the Policy Controller Hub
301
+
"deploymentStates": { # Map from deployment name to deployment state. Example deployments are gatekeeper-controller-manager, gatekeeper-audit deployment, and gatekeeper-mutation.
302
+
"a_key": "A String",
303
+
},
304
+
"version": { # The build version of Gatekeeper that Policy Controller is using. # The version of Gatekeeper Policy Controller deployed.
305
+
"version": "A String", # The gatekeeper image tag that is composed of ACM version, git tag, build number.
306
+
},
307
+
},
308
+
"state": "A String", # The lifecycle state Policy Controller is in.
309
+
},
283
310
"state": { # FeatureState describes the high-level state of a Feature. It may be used to describe a Feature's state at the environ-level, or per-membershop, depending on the context. # The high-level state of this Feature for a single membership.
284
311
"code": "A String", # The high-level, machine-readable status of this Feature.
285
312
"description": "A String", # A human-readable description of the current status.
@@ -557,6 +584,33 @@ <h3>Method Details</h3>
557
584
},
558
585
},
559
586
},
587
+
"policycontroller": { # **Policy Controller**: State for a single cluster. # Policycontroller-specific state.
588
+
"clusterName": "A String", # The user-defined name for the cluster used by ClusterSelectors to group clusters together. This should match Membership's membership_name, unless the user installed PC on the cluster manually prior to enabling the PC hub feature. Unique within a Policy Controller installation.
589
+
"membershipSpec": { # **Policy Controller**: Configuration for a single cluster. Intended to parallel the PolicyController CR. # Membership configuration in the cluster. This represents the actual state in the cluster, while the MembershipSpec in the FeatureSpec represents the intended state
590
+
"policyControllerHubConfig": { # Configuration for Policy Controller # Policy Controller configuration for the cluster.
591
+
"auditIntervalSeconds": "A String", # Sets the interval for Policy Controller Audit Scans (in seconds). When set to 0, this disables audit functionality altogether.
592
+
"exemptableNamespaces": [ # The set of namespaces that are excluded from Policy Controller checks. Namespaces do not need to currently exist on the cluster.
593
+
"A String",
594
+
],
595
+
"installSpec": "A String", # The install_spec represents the intended state specified by the latest request that mutated install_spec in the feature spec, not the lifecycle state of the feature observed by the Hub feature controller that is reported in the feature state.
596
+
"logDeniesEnabled": True or False, # Logs all denies and dry run failures.
597
+
"referentialRulesEnabled": True or False, # Enables the ability to use Constraint Templates that reference to objects other than the object currently being evaluated.
598
+
"templateLibraryConfig": { # The config specifying which default library templates to install. # Configures the library templates to install along with Policy Controller.
599
+
"included": True or False, # Whether the standard template library should be installed or not.
600
+
},
601
+
},
602
+
"version": "A String", # Version of Policy Controller installed.
603
+
},
604
+
"policyControllerHubState": { # State of the Policy Controller. # Policy Controller state observed by the Policy Controller Hub
605
+
"deploymentStates": { # Map from deployment name to deployment state. Example deployments are gatekeeper-controller-manager, gatekeeper-audit deployment, and gatekeeper-mutation.
606
+
"a_key": "A String",
607
+
},
608
+
"version": { # The build version of Gatekeeper that Policy Controller is using. # The version of Gatekeeper Policy Controller deployed.
609
+
"version": "A String", # The gatekeeper image tag that is composed of ACM version, git tag, build number.
610
+
},
611
+
},
612
+
"state": "A String", # The lifecycle state Policy Controller is in.
613
+
},
560
614
"state": { # FeatureState describes the high-level state of a Feature. It may be used to describe a Feature's state at the environ-level, or per-membershop, depending on the context. # The high-level state of this Feature for a single membership.
561
615
"code": "A String", # The high-level, machine-readable status of this Feature.
562
616
"description": "A String", # A human-readable description of the current status.
@@ -822,6 +876,33 @@ <h3>Method Details</h3>
822
876
},
823
877
},
824
878
},
879
+
"policycontroller": { # **Policy Controller**: State for a single cluster. # Policycontroller-specific state.
880
+
"clusterName": "A String", # The user-defined name for the cluster used by ClusterSelectors to group clusters together. This should match Membership's membership_name, unless the user installed PC on the cluster manually prior to enabling the PC hub feature. Unique within a Policy Controller installation.
881
+
"membershipSpec": { # **Policy Controller**: Configuration for a single cluster. Intended to parallel the PolicyController CR. # Membership configuration in the cluster. This represents the actual state in the cluster, while the MembershipSpec in the FeatureSpec represents the intended state
882
+
"policyControllerHubConfig": { # Configuration for Policy Controller # Policy Controller configuration for the cluster.
883
+
"auditIntervalSeconds": "A String", # Sets the interval for Policy Controller Audit Scans (in seconds). When set to 0, this disables audit functionality altogether.
884
+
"exemptableNamespaces": [ # The set of namespaces that are excluded from Policy Controller checks. Namespaces do not need to currently exist on the cluster.
885
+
"A String",
886
+
],
887
+
"installSpec": "A String", # The install_spec represents the intended state specified by the latest request that mutated install_spec in the feature spec, not the lifecycle state of the feature observed by the Hub feature controller that is reported in the feature state.
888
+
"logDeniesEnabled": True or False, # Logs all denies and dry run failures.
889
+
"referentialRulesEnabled": True or False, # Enables the ability to use Constraint Templates that reference to objects other than the object currently being evaluated.
890
+
"templateLibraryConfig": { # The config specifying which default library templates to install. # Configures the library templates to install along with Policy Controller.
891
+
"included": True or False, # Whether the standard template library should be installed or not.
892
+
},
893
+
},
894
+
"version": "A String", # Version of Policy Controller installed.
895
+
},
896
+
"policyControllerHubState": { # State of the Policy Controller. # Policy Controller state observed by the Policy Controller Hub
897
+
"deploymentStates": { # Map from deployment name to deployment state. Example deployments are gatekeeper-controller-manager, gatekeeper-audit deployment, and gatekeeper-mutation.
898
+
"a_key": "A String",
899
+
},
900
+
"version": { # The build version of Gatekeeper that Policy Controller is using. # The version of Gatekeeper Policy Controller deployed.
901
+
"version": "A String", # The gatekeeper image tag that is composed of ACM version, git tag, build number.
902
+
},
903
+
},
904
+
"state": "A String", # The lifecycle state Policy Controller is in.
905
+
},
825
906
"state": { # FeatureState describes the high-level state of a Feature. It may be used to describe a Feature's state at the environ-level, or per-membershop, depending on the context. # The high-level state of this Feature for a single membership.
826
907
"code": "A String", # The high-level, machine-readable status of this Feature.
827
908
"description": "A String", # A human-readable description of the current status.
@@ -1043,6 +1124,33 @@ <h3>Method Details</h3>
1043
1124
},
1044
1125
},
1045
1126
},
1127
+
"policycontroller": { # **Policy Controller**: State for a single cluster. # Policycontroller-specific state.
1128
+
"clusterName": "A String", # The user-defined name for the cluster used by ClusterSelectors to group clusters together. This should match Membership's membership_name, unless the user installed PC on the cluster manually prior to enabling the PC hub feature. Unique within a Policy Controller installation.
1129
+
"membershipSpec": { # **Policy Controller**: Configuration for a single cluster. Intended to parallel the PolicyController CR. # Membership configuration in the cluster. This represents the actual state in the cluster, while the MembershipSpec in the FeatureSpec represents the intended state
1130
+
"policyControllerHubConfig": { # Configuration for Policy Controller # Policy Controller configuration for the cluster.
1131
+
"auditIntervalSeconds": "A String", # Sets the interval for Policy Controller Audit Scans (in seconds). When set to 0, this disables audit functionality altogether.
1132
+
"exemptableNamespaces": [ # The set of namespaces that are excluded from Policy Controller checks. Namespaces do not need to currently exist on the cluster.
1133
+
"A String",
1134
+
],
1135
+
"installSpec": "A String", # The install_spec represents the intended state specified by the latest request that mutated install_spec in the feature spec, not the lifecycle state of the feature observed by the Hub feature controller that is reported in the feature state.
1136
+
"logDeniesEnabled": True or False, # Logs all denies and dry run failures.
1137
+
"referentialRulesEnabled": True or False, # Enables the ability to use Constraint Templates that reference to objects other than the object currently being evaluated.
1138
+
"templateLibraryConfig": { # The config specifying which default library templates to install. # Configures the library templates to install along with Policy Controller.
1139
+
"included": True or False, # Whether the standard template library should be installed or not.
1140
+
},
1141
+
},
1142
+
"version": "A String", # Version of Policy Controller installed.
1143
+
},
1144
+
"policyControllerHubState": { # State of the Policy Controller. # Policy Controller state observed by the Policy Controller Hub
1145
+
"deploymentStates": { # Map from deployment name to deployment state. Example deployments are gatekeeper-controller-manager, gatekeeper-audit deployment, and gatekeeper-mutation.
1146
+
"a_key": "A String",
1147
+
},
1148
+
"version": { # The build version of Gatekeeper that Policy Controller is using. # The version of Gatekeeper Policy Controller deployed.
1149
+
"version": "A String", # The gatekeeper image tag that is composed of ACM version, git tag, build number.
1150
+
},
1151
+
},
1152
+
"state": "A String", # The lifecycle state Policy Controller is in.
1153
+
},
1046
1154
"state": { # FeatureState describes the high-level state of a Feature. It may be used to describe a Feature's state at the environ-level, or per-membershop, depending on the context. # The high-level state of this Feature for a single membership.
1047
1155
"code": "A String", # The high-level, machine-readable status of this Feature.
1048
1156
"description": "A String", # A human-readable description of the current status.
0 commit comments