Skip to content

Commit

Permalink
chore: regenerate gkehub client (#18033)
Browse files Browse the repository at this point in the history
  • Loading branch information
yoshi-code-bot authored Sep 8, 2023
1 parent e922bc4 commit 08f4d97
Show file tree
Hide file tree
Showing 8 changed files with 32 additions and 74 deletions.
4 changes: 2 additions & 2 deletions clients/google-api-services-gkehub/v1/2.0.0/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
<dependency>
<groupId>com.google.apis</groupId>
<artifactId>google-api-services-gkehub</artifactId>
<version>v1-rev20230814-2.0.0</version>
<version>v1-rev20230901-2.0.0</version>
</dependency>
</dependencies>
</project>
Expand All @@ -35,7 +35,7 @@ repositories {
mavenCentral()
}
dependencies {
implementation 'com.google.apis:google-api-services-gkehub:v1-rev20230814-2.0.0'
implementation 'com.google.apis:google-api-services-gkehub:v1-rev20230901-2.0.0'
}
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -40,11 +40,12 @@ public final class Authority extends com.google.api.client.json.GenericJson {

/**
* Optional. A JSON Web Token (JWT) issuer URI. `issuer` must start with `https://` and be a valid
* URL with length <2000 characters. If set, then Google will allow valid OIDC tokens from this
* issuer to authenticate within the workload_identity_pool. OIDC discovery will be performed on
* this URI to validate tokens from the issuer. Clearing `issuer` disables Workload Identity.
* `issuer` cannot be directly modified; it must be cleared (and Workload Identity disabled)
* before using a new issuer (and re-enabling Workload Identity).
* URL with length <2000 characters, it must use `location` rather than `zone` for GKE clusters.
* If set, then Google will allow valid OIDC tokens from this issuer to authenticate within the
* workload_identity_pool. OIDC discovery will be performed on this URI to validate tokens from
* the issuer. Clearing `issuer` disables Workload Identity. `issuer` cannot be directly modified;
* it must be cleared (and Workload Identity disabled) before using a new issuer (and re-enabling
* Workload Identity).
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
Expand Down Expand Up @@ -88,11 +89,12 @@ public Authority setIdentityProvider(java.lang.String identityProvider) {

/**
* Optional. A JSON Web Token (JWT) issuer URI. `issuer` must start with `https://` and be a valid
* URL with length <2000 characters. If set, then Google will allow valid OIDC tokens from this
* issuer to authenticate within the workload_identity_pool. OIDC discovery will be performed on
* this URI to validate tokens from the issuer. Clearing `issuer` disables Workload Identity.
* `issuer` cannot be directly modified; it must be cleared (and Workload Identity disabled)
* before using a new issuer (and re-enabling Workload Identity).
* URL with length <2000 characters, it must use `location` rather than `zone` for GKE clusters.
* If set, then Google will allow valid OIDC tokens from this issuer to authenticate within the
* workload_identity_pool. OIDC discovery will be performed on this URI to validate tokens from
* the issuer. Clearing `issuer` disables Workload Identity. `issuer` cannot be directly modified;
* it must be cleared (and Workload Identity disabled) before using a new issuer (and re-enabling
* Workload Identity).
* @return value or {@code null} for none
*/
public java.lang.String getIssuer() {
Expand All @@ -101,11 +103,12 @@ public java.lang.String getIssuer() {

/**
* Optional. A JSON Web Token (JWT) issuer URI. `issuer` must start with `https://` and be a valid
* URL with length <2000 characters. If set, then Google will allow valid OIDC tokens from this
* issuer to authenticate within the workload_identity_pool. OIDC discovery will be performed on
* this URI to validate tokens from the issuer. Clearing `issuer` disables Workload Identity.
* `issuer` cannot be directly modified; it must be cleared (and Workload Identity disabled)
* before using a new issuer (and re-enabling Workload Identity).
* URL with length <2000 characters, it must use `location` rather than `zone` for GKE clusters.
* If set, then Google will allow valid OIDC tokens from this issuer to authenticate within the
* workload_identity_pool. OIDC discovery will be performed on this URI to validate tokens from
* the issuer. Clearing `issuer` disables Workload Identity. `issuer` cannot be directly modified;
* it must be cleared (and Workload Identity disabled) before using a new issuer (and re-enabling
* Workload Identity).
* @param issuer issuer or {@code null} for none
*/
public Authority setIssuer(java.lang.String issuer) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,13 +66,6 @@ public final class IdentityServiceAzureADConfig extends com.google.api.client.js
@com.google.api.client.util.Key
private java.lang.String tenant;

/**
* Optional. Claim in the AzureAD ID Token that holds the user details.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String userClaim;

/**
* ID for the registered client application that makes authentication requests to the Azure AD
* identity provider.
Expand Down Expand Up @@ -190,23 +183,6 @@ public IdentityServiceAzureADConfig setTenant(java.lang.String tenant) {
return this;
}

/**
* Optional. Claim in the AzureAD ID Token that holds the user details.
* @return value or {@code null} for none
*/
public java.lang.String getUserClaim() {
return userClaim;
}

/**
* Optional. Claim in the AzureAD ID Token that holds the user details.
* @param userClaim userClaim or {@code null} for none
*/
public IdentityServiceAzureADConfig setUserClaim(java.lang.String userClaim) {
this.userClaim = userClaim;
return this;
}

@Override
public IdentityServiceAzureADConfig set(String fieldName, Object value) {
return (IdentityServiceAzureADConfig) super.set(fieldName, value);
Expand Down
4 changes: 2 additions & 2 deletions clients/google-api-services-gkehub/v1/2.0.0/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@

<groupId>com.google.apis</groupId>
<artifactId>google-api-services-gkehub</artifactId>
<version>v1-rev20230814-2.0.0</version>
<name>GKE Hub API v1-rev20230814-2.0.0</name>
<version>v1-rev20230901-2.0.0</version>
<name>GKE Hub API v1-rev20230901-2.0.0</name>
<packaging>jar</packaging>

<inceptionYear>2011</inceptionYear>
Expand Down
4 changes: 2 additions & 2 deletions clients/google-api-services-gkehub/v1beta/2.0.0/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Add the following lines to your `pom.xml` file:
<dependency>
<groupId>com.google.apis</groupId>
<artifactId>google-api-services-gkehub</artifactId>
<version>v1beta-rev20230814-2.0.0</version>
<version>v1beta-rev20230901-2.0.0</version>
</dependency>
</dependencies>
</project>
Expand All @@ -35,7 +35,7 @@ repositories {
mavenCentral()
}
dependencies {
implementation 'com.google.apis:google-api-services-gkehub:v1beta-rev20230814-2.0.0'
implementation 'com.google.apis:google-api-services-gkehub:v1beta-rev20230901-2.0.0'
}
```

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,8 @@
public final class ConfigManagementMembershipSpec extends com.google.api.client.json.GenericJson {

/**
* Binauthz conifguration for the cluster.
* Binauthz conifguration for the cluster. Deprecated: This field will be ignored and should not
* be set.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
Expand Down Expand Up @@ -84,15 +85,17 @@ public final class ConfigManagementMembershipSpec extends com.google.api.client.
private java.lang.String version;

/**
* Binauthz conifguration for the cluster.
* Binauthz conifguration for the cluster. Deprecated: This field will be ignored and should not
* be set.
* @return value or {@code null} for none
*/
public ConfigManagementBinauthzConfig getBinauthz() {
return binauthz;
}

/**
* Binauthz conifguration for the cluster.
* Binauthz conifguration for the cluster. Deprecated: This field will be ignored and should not
* be set.
* @param binauthz binauthz or {@code null} for none
*/
public ConfigManagementMembershipSpec setBinauthz(ConfigManagementBinauthzConfig binauthz) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -66,13 +66,6 @@ public final class IdentityServiceAzureADConfig extends com.google.api.client.js
@com.google.api.client.util.Key
private java.lang.String tenant;

/**
* Optional. Claim in the AzureAD ID Token that holds the user details.
* The value may be {@code null}.
*/
@com.google.api.client.util.Key
private java.lang.String userClaim;

/**
* ID for the registered client application that makes authentication requests to the Azure AD
* identity provider.
Expand Down Expand Up @@ -190,23 +183,6 @@ public IdentityServiceAzureADConfig setTenant(java.lang.String tenant) {
return this;
}

/**
* Optional. Claim in the AzureAD ID Token that holds the user details.
* @return value or {@code null} for none
*/
public java.lang.String getUserClaim() {
return userClaim;
}

/**
* Optional. Claim in the AzureAD ID Token that holds the user details.
* @param userClaim userClaim or {@code null} for none
*/
public IdentityServiceAzureADConfig setUserClaim(java.lang.String userClaim) {
this.userClaim = userClaim;
return this;
}

@Override
public IdentityServiceAzureADConfig set(String fieldName, Object value) {
return (IdentityServiceAzureADConfig) super.set(fieldName, value);
Expand Down
4 changes: 2 additions & 2 deletions clients/google-api-services-gkehub/v1beta/2.0.0/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -8,8 +8,8 @@

<groupId>com.google.apis</groupId>
<artifactId>google-api-services-gkehub</artifactId>
<version>v1beta-rev20230814-2.0.0</version>
<name>GKE Hub API v1beta-rev20230814-2.0.0</name>
<version>v1beta-rev20230901-2.0.0</version>
<name>GKE Hub API v1beta-rev20230901-2.0.0</name>
<packaging>jar</packaging>

<inceptionYear>2011</inceptionYear>
Expand Down

0 comments on commit 08f4d97

Please sign in to comment.