|
905 | 905 | }
|
906 | 906 | }
|
907 | 907 | },
|
908 |
| - "revision": "20210927", |
| 908 | + "revision": "20211015", |
909 | 909 | "rootUrl": "https://gkehub.googleapis.com/",
|
910 | 910 | "schemas": {
|
911 | 911 | "AuditConfig": {
|
|
983 | 983 | "type": "object"
|
984 | 984 | },
|
985 | 985 | "Binding": {
|
986 |
| - "description": "Associates `members` with a `role`.", |
| 986 | + "description": "Associates `members`, or principals, with a `role`.", |
987 | 987 | "id": "Binding",
|
988 | 988 | "properties": {
|
989 | 989 | "condition": {
|
990 | 990 | "$ref": "Expr",
|
991 |
| - "description": "The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the members in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies)." |
| 991 | + "description": "The condition that is associated with this binding. If the condition evaluates to `true`, then this binding applies to the current request. If the condition evaluates to `false`, then this binding does not apply to the current request. However, a different role binding might grant the same role to one or more of the principals in this binding. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies)." |
992 | 992 | },
|
993 | 993 | "members": {
|
994 |
| - "description": "Specifies the identities requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, ` [email protected]` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, ` [email protected]`. * `group:{emailid}`: An email address that represents a Google group. For example, ` [email protected]`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, ` [email protected]?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, ` [email protected]?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, ` [email protected]?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`. ", |
| 994 | + "description": "Specifies the principals requesting access for a Cloud Platform resource. `members` can have the following values: * `allUsers`: A special identifier that represents anyone who is on the internet; with or without a Google account. * `allAuthenticatedUsers`: A special identifier that represents anyone who is authenticated with a Google account or a service account. * `user:{emailid}`: An email address that represents a specific Google account. For example, ` [email protected]` . * `serviceAccount:{emailid}`: An email address that represents a service account. For example, ` [email protected]`. * `group:{emailid}`: An email address that represents a Google group. For example, ` [email protected]`. * `deleted:user:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a user that has been recently deleted. For example, ` [email protected]?uid=123456789012345678901`. If the user is recovered, this value reverts to `user:{emailid}` and the recovered user retains the role in the binding. * `deleted:serviceAccount:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a service account that has been recently deleted. For example, ` [email protected]?uid=123456789012345678901`. If the service account is undeleted, this value reverts to `serviceAccount:{emailid}` and the undeleted service account retains the role in the binding. * `deleted:group:{emailid}?uid={uniqueid}`: An email address (plus unique identifier) representing a Google group that has been recently deleted. For example, ` [email protected]?uid=123456789012345678901`. If the group is recovered, this value reverts to `group:{emailid}` and the recovered group retains the role in the binding. * `domain:{domain}`: The G Suite domain (primary) that represents all the users of that domain. For example, `google.com` or `example.com`. ", |
995 | 995 | "items": {
|
996 | 996 | "type": "string"
|
997 | 997 | },
|
998 | 998 | "type": "array"
|
999 | 999 | },
|
1000 | 1000 | "role": {
|
1001 |
| - "description": "Role that is assigned to `members`. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.", |
| 1001 | + "description": "Role that is assigned to the list of `members`, or principals. For example, `roles/viewer`, `roles/editor`, or `roles/owner`.", |
1002 | 1002 | "type": "string"
|
1003 | 1003 | }
|
1004 | 1004 | },
|
|
1037 | 1037 | "description": "Configuration for Config Sync",
|
1038 | 1038 | "id": "ConfigManagementConfigSync",
|
1039 | 1039 | "properties": {
|
| 1040 | + "enabled": { |
| 1041 | + "description": "Enables the installation of ConfigSync. If set to true, ConfigSync resources will be created and the other ConfigSync fields will be applied if exist. If set to false, all other ConfigSync fields will be ignored, ConfigSync resources will be deleted. If omitted, ConfigSync resources will be managed depends on the presence of git field.", |
| 1042 | + "type": "boolean" |
| 1043 | + }, |
1040 | 1044 | "git": {
|
1041 | 1045 | "$ref": "ConfigManagementGitConfig",
|
1042 | 1046 | "description": "Git repo configuration for the cluster."
|
|
2140 | 2144 | },
|
2141 | 2145 | "onPremCluster": {
|
2142 | 2146 | "$ref": "OnPremCluster",
|
2143 |
| - "description": "Optional. Specific information for a GKE On-Prem cluster." |
| 2147 | + "description": "Optional. Specific information for a GKE On-Prem cluster. An onprem user-cluster who has no resourceLink is not allowed to use this field, it should have a nil \"type\" instead." |
2144 | 2148 | }
|
2145 | 2149 | },
|
2146 | 2150 | "type": "object"
|
|
2326 | 2330 | "type": "object"
|
2327 | 2331 | },
|
2328 | 2332 | "Policy": {
|
2329 |
| - "description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members` to a single `role`. Members can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user: [email protected]\", \"group: [email protected]\", \"domain:google.com\", \"serviceAccount: [email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user: [email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } **YAML example:** bindings: - members: - user: [email protected] - group: [email protected] - domain:google.com - serviceAccount: [email protected] role: roles/resourcemanager.organizationAdmin - members: - user: [email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/).", |
| 2333 | + "description": "An Identity and Access Management (IAM) policy, which specifies access controls for Google Cloud resources. A `Policy` is a collection of `bindings`. A `binding` binds one or more `members`, or principals, to a single `role`. Principals can be user accounts, service accounts, Google groups, and domains (such as G Suite). A `role` is a named list of permissions; each `role` can be an IAM predefined role or a user-created custom role. For some types of Google Cloud resources, a `binding` can also specify a `condition`, which is a logical expression that allows access to a resource only if the expression evaluates to `true`. A condition can add constraints based on attributes of the request, the resource, or both. To learn which resources support conditions in their IAM policies, see the [IAM documentation](https://cloud.google.com/iam/help/conditions/resource-policies). **JSON example:** { \"bindings\": [ { \"role\": \"roles/resourcemanager.organizationAdmin\", \"members\": [ \"user: [email protected]\", \"group: [email protected]\", \"domain:google.com\", \"serviceAccount: [email protected]\" ] }, { \"role\": \"roles/resourcemanager.organizationViewer\", \"members\": [ \"user: [email protected]\" ], \"condition\": { \"title\": \"expirable access\", \"description\": \"Does not grant access after Sep 2020\", \"expression\": \"request.time < timestamp('2020-10-01T00:00:00.000Z')\", } } ], \"etag\": \"BwWWja0YfJA=\", \"version\": 3 } **YAML example:** bindings: - members: - user: [email protected] - group: [email protected] - domain:google.com - serviceAccount: [email protected] role: roles/resourcemanager.organizationAdmin - members: - user: [email protected] role: roles/resourcemanager.organizationViewer condition: title: expirable access description: Does not grant access after Sep 2020 expression: request.time < timestamp('2020-10-01T00:00:00.000Z') etag: BwWWja0YfJA= version: 3 For a description of IAM and its features, see the [IAM documentation](https://cloud.google.com/iam/docs/).", |
2330 | 2334 | "id": "Policy",
|
2331 | 2335 | "properties": {
|
2332 | 2336 | "auditConfigs": {
|
|
2337 | 2341 | "type": "array"
|
2338 | 2342 | },
|
2339 | 2343 | "bindings": {
|
2340 |
| - "description": "Associates a list of `members` to a `role`. Optionally, may specify a `condition` that determines how and when the `bindings` are applied. Each of the `bindings` must contain at least one member.", |
| 2344 | + "description": "Associates a list of `members`, or principals, with a `role`. Optionally, may specify a `condition` that determines how and when the `bindings` are applied. Each of the `bindings` must contain at least one principal. The `bindings` in a `Policy` can refer to up to 1,500 principals; up to 250 of these principals can be Google groups. Each occurrence of a principal counts towards these limits. For example, if the `bindings` grant 50 different roles to `user:[email protected]`, and not to any other principal, then you can add another 1,450 principals to the `bindings` in the `Policy`.", |
2341 | 2345 | "items": {
|
2342 | 2346 | "$ref": "Binding"
|
2343 | 2347 | },
|
|
0 commit comments