Skip to content

Commit

Permalink
gkeprivate: upgrade to 26.1.1
Browse files Browse the repository at this point in the history
  • Loading branch information
michaellzc committed Nov 23, 2023
1 parent a4267ab commit 31be1b4
Show file tree
Hide file tree
Showing 7 changed files with 140 additions and 46 deletions.
41 changes: 30 additions & 11 deletions gen/gkeprivate/GkeprivateConfig.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ type GkeprivateConfig struct {
// (Beta) Configure the Cloud Run load balancer type.
//
// External by default. Set to `LOAD_BALANCER_TYPE_INTERNAL` to configure as an internal load balancer.
CloudrunLoadBalancerType interface{} `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"`
CloudrunLoadBalancerType *string `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"`
// Cluster autoscaling configuration.
//
// See [more details](https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1beta1/projects.locations.clusters#clusterautoscaling)
Expand Down Expand Up @@ -134,7 +134,7 @@ type GkeprivateConfig struct {
EnableNetworkEgressExport *bool `field:"optional" json:"enableNetworkEgressExport" yaml:"enableNetworkEgressExport"`
// enabled - Enable the PodSecurityPolicy controller for this cluster.
//
// If enabled, pods must be valid under a PodSecurityPolicy to be created.
// If enabled, pods must be valid under a PodSecurityPolicy to be created. Pod Security Policy was removed from GKE clusters with version >= 1.25.0.
EnablePodSecurityPolicy *bool `field:"optional" json:"enablePodSecurityPolicy" yaml:"enablePodSecurityPolicy"`
// (Beta) Whether the master's internal IP address is used as the cluster endpoint.
EnablePrivateEndpoint *bool `field:"optional" json:"enablePrivateEndpoint" yaml:"enablePrivateEndpoint"`
Expand Down Expand Up @@ -168,9 +168,15 @@ type GkeprivateConfig struct {
// Default: 1000.
//
FirewallPriority *float64 `field:"optional" json:"firewallPriority" yaml:"firewallPriority"`
// (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver.
// The gateway api channel of this cluster.
//
// Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`.
GatewayApiChannel *string `field:"optional" json:"gatewayApiChannel" yaml:"gatewayApiChannel"`
// Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver.
// Default: true.
//
GcePdCsiDriver *bool `field:"optional" json:"gcePdCsiDriver" yaml:"gcePdCsiDriver"`
// (Beta) Whether Backup for GKE agent is enabled for this cluster.
// Whether Backup for GKE agent is enabled for this cluster.
GkeBackupAgentConfig *bool `field:"optional" json:"gkeBackupAgentConfig" yaml:"gkeBackupAgentConfig"`
// Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles.
GrantRegistryAccess *bool `field:"optional" json:"grantRegistryAccess" yaml:"grantRegistryAccess"`
Expand Down Expand Up @@ -250,7 +256,7 @@ type GkeprivateConfig struct {
MasterIpv4CidrBlock *string `field:"optional" json:"masterIpv4CidrBlock" yaml:"masterIpv4CidrBlock"`
// List of services to monitor: SYSTEM_COMPONENTS, WORKLOADS (provider version >= 3.89.0). Empty list is default GKE configuration.
MonitoringEnabledComponents *[]*string `field:"optional" json:"monitoringEnabledComponents" yaml:"monitoringEnabledComponents"`
// (Beta) Configuration for Managed Service for Prometheus.
// Configuration for Managed Service for Prometheus.
//
// Whether or not the managed collection is enabled.
MonitoringEnableManagedPrometheus *bool `field:"optional" json:"monitoringEnableManagedPrometheus" yaml:"monitoringEnableManagedPrometheus"`
Expand Down Expand Up @@ -297,6 +303,11 @@ type GkeprivateConfig struct {
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
//
NodePoolsOauthScopes *map[string]*[]*string `field:"optional" json:"nodePoolsOauthScopes" yaml:"nodePoolsOauthScopes"`
// Map of maps containing resource labels by node-pool name.
// Default: [object Object]
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
//
NodePoolsResourceLabels *map[string]*map[string]*string `field:"optional" json:"nodePoolsResourceLabels" yaml:"nodePoolsResourceLabels"`
// Map of lists containing node network tags by node-pool name.
// Default: [object Object]
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
Expand Down Expand Up @@ -329,7 +340,9 @@ type GkeprivateConfig struct {
RegistryProjectIds *[]*string `field:"optional" json:"registryProjectIds" yaml:"registryProjectIds"`
// The release channel of this cluster.
//
// Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`.
// Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`.
// Default: REGULAR.
//
ReleaseChannel *string `field:"optional" json:"releaseChannel" yaml:"releaseChannel"`
// Remove default node pool while setting up the cluster.
RemoveDefaultNodePool *bool `field:"optional" json:"removeDefaultNodePool" yaml:"removeDefaultNodePool"`
Expand All @@ -339,20 +352,26 @@ type GkeprivateConfig struct {
SandboxEnabled *bool `field:"optional" json:"sandboxEnabled" yaml:"sandboxEnabled"`
// The service account to run nodes as if not overridden in `node_pools`.
//
// The create_service_account variable default value (true) will cause a cluster-specific service account to be created.
// The create_service_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service_account_name variable.
ServiceAccount *string `field:"optional" json:"serviceAccount" yaml:"serviceAccount"`
// The name of the service account that will be created if create_service_account is true.
//
// If you wish to use an existing service account, use service_account variable.
ServiceAccountName *string `field:"optional" json:"serviceAccountName" yaml:"serviceAccountName"`
// Whether external ips specified by a service will be allowed in this cluster.
ServiceExternalIps *bool `field:"optional" json:"serviceExternalIps" yaml:"serviceExternalIps"`
// The log_config for shadow firewall rules.
//
// You can set this variable to `null` to disable logging.
// Default: [object Object].
//
ShadowFirewallRulesLogConfig interface{} `field:"optional" json:"shadowFirewallRulesLogConfig" yaml:"shadowFirewallRulesLogConfig"`
// The firewall priority of GKE shadow firewall rules.
//
// The priority should be less than default firewall, which is 1000.
// Default: 999.
//
ShadowFirewallRulesPriority *float64 `field:"optional" json:"shadowFirewallRulesPriority" yaml:"shadowFirewallRulesPriority"`
// Flag to skip all local-exec provisioners.
//
// It breaks `stub_domains` and `upstream_nameservers` variables functionality.
SkipProvisioners *bool `field:"optional" json:"skipProvisioners" yaml:"skipProvisioners"`
// Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server.
// Default: [object Object]
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
Expand Down
14 changes: 7 additions & 7 deletions gen/gkeprivate/Gkeprivate__checks.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,55 +90,55 @@ func validateGkeprivate_IsTerraformElementParameters(x interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val interface{}) error {
func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error {
func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetShadowFirewallRulesLogConfigParameters(val interface{}) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}
Expand Down
8 changes: 4 additions & 4 deletions gen/gkeprivate/Gkeprivate__no_checks.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,10 +32,6 @@ func validateGkeprivate_IsTerraformElementParameters(x interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error {
return nil
}
Expand All @@ -60,6 +56,10 @@ func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetShadowFirewallRulesLogConfigParameters(val interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetSubnetworkParameters(val *string) error {
return nil
}
Expand Down
Loading

0 comments on commit 31be1b4

Please sign in to comment.