Skip to content

Commit 77c1b9c

Browse files
feat(container): update the api
#### container:v1 The following keys were added: - schemas.ConfidentialNodes.properties.confidentialInstanceType.type (Total Keys: 1) #### container:v1beta1 The following keys were added: - schemas.ConfidentialNodes.properties.confidentialInstanceType.type (Total Keys: 1)
1 parent 1ad22bc commit 77c1b9c

10 files changed

+94
-6
lines changed

docs/dyn/container_v1.projects.locations.clusters.html

+9
Original file line numberDiff line numberDiff line change
@@ -406,6 +406,7 @@ <h3>Method Details</h3>
406406
},
407407
],
408408
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Configuration of Confidential Nodes. All the nodes in the cluster will be Confidential VM once enabled.
409+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
409410
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
410411
},
411412
&quot;controlPlaneEndpointsConfig&quot;: { # Configuration for all of the cluster&#x27;s control plane endpoints. # Configuration for all cluster&#x27;s control plane endpoints.
@@ -667,6 +668,7 @@ <h3>Method Details</h3>
667668
},
668669
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
669670
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
671+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
670672
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
671673
},
672674
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -944,6 +946,7 @@ <h3>Method Details</h3>
944946
},
945947
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
946948
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
949+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
947950
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
948951
},
949952
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -1601,6 +1604,7 @@ <h3>Method Details</h3>
16011604
},
16021605
],
16031606
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Configuration of Confidential Nodes. All the nodes in the cluster will be Confidential VM once enabled.
1607+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
16041608
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
16051609
},
16061610
&quot;controlPlaneEndpointsConfig&quot;: { # Configuration for all of the cluster&#x27;s control plane endpoints. # Configuration for all cluster&#x27;s control plane endpoints.
@@ -1862,6 +1866,7 @@ <h3>Method Details</h3>
18621866
},
18631867
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
18641868
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
1869+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
18651870
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
18661871
},
18671872
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -2139,6 +2144,7 @@ <h3>Method Details</h3>
21392144
},
21402145
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
21412146
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
2147+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
21422148
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
21432149
},
21442150
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -2660,6 +2666,7 @@ <h3>Method Details</h3>
26602666
},
26612667
],
26622668
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Configuration of Confidential Nodes. All the nodes in the cluster will be Confidential VM once enabled.
2669+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
26632670
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
26642671
},
26652672
&quot;controlPlaneEndpointsConfig&quot;: { # Configuration for all of the cluster&#x27;s control plane endpoints. # Configuration for all cluster&#x27;s control plane endpoints.
@@ -2921,6 +2928,7 @@ <h3>Method Details</h3>
29212928
},
29222929
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
29232930
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
2931+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
29242932
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
29252933
},
29262934
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -3198,6 +3206,7 @@ <h3>Method Details</h3>
31983206
},
31993207
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
32003208
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
3209+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
32013210
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
32023211
},
32033212
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.

docs/dyn/container_v1.projects.locations.clusters.nodePools.html

+4
Original file line numberDiff line numberDiff line change
@@ -196,6 +196,7 @@ <h3>Method Details</h3>
196196
},
197197
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
198198
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
199+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
199200
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
200201
},
201202
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -673,6 +674,7 @@ <h3>Method Details</h3>
673674
},
674675
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
675676
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
677+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
676678
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
677679
},
678680
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -977,6 +979,7 @@ <h3>Method Details</h3>
977979
},
978980
&quot;bootDiskKmsKey&quot;: &quot;A String&quot;, # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
979981
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
982+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
980983
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
981984
},
982985
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -1576,6 +1579,7 @@ <h3>Method Details</h3>
15761579
],
15771580
&quot;clusterId&quot;: &quot;A String&quot;, # Deprecated. The name of the cluster to upgrade. This field has been deprecated and replaced by the name field.
15781581
&quot;confidentialNodes&quot;: { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
1582+
&quot;confidentialInstanceType&quot;: &quot;A String&quot;, # Defines the type of technology used by the confidential node.
15791583
&quot;enabled&quot;: True or False, # Whether Confidential Nodes feature is enabled.
15801584
},
15811585
&quot;containerdConfig&quot;: { # ContainerdConfig contains configuration to customize containerd. # The desired containerd config for nodes in the node pool. Initiates an upgrade operation that recreates the nodes with the new config.

0 commit comments

Comments
 (0)