Skip to content

gkeprivate: upgrade to 26.1.1 #19

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Nov 23, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
41 changes: 30 additions & 11 deletions gen/gkeprivate/GkeprivateConfig.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ type GkeprivateConfig struct {
// (Beta) Configure the Cloud Run load balancer type.
//
// External by default. Set to `LOAD_BALANCER_TYPE_INTERNAL` to configure as an internal load balancer.
CloudrunLoadBalancerType interface{} `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"`
CloudrunLoadBalancerType *string `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"`
// Cluster autoscaling configuration.
//
// See [more details](https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1beta1/projects.locations.clusters#clusterautoscaling)
Expand Down Expand Up @@ -134,7 +134,7 @@ type GkeprivateConfig struct {
EnableNetworkEgressExport *bool `field:"optional" json:"enableNetworkEgressExport" yaml:"enableNetworkEgressExport"`
// enabled - Enable the PodSecurityPolicy controller for this cluster.
//
// If enabled, pods must be valid under a PodSecurityPolicy to be created.
// If enabled, pods must be valid under a PodSecurityPolicy to be created. Pod Security Policy was removed from GKE clusters with version >= 1.25.0.
EnablePodSecurityPolicy *bool `field:"optional" json:"enablePodSecurityPolicy" yaml:"enablePodSecurityPolicy"`
// (Beta) Whether the master's internal IP address is used as the cluster endpoint.
EnablePrivateEndpoint *bool `field:"optional" json:"enablePrivateEndpoint" yaml:"enablePrivateEndpoint"`
Expand Down Expand Up @@ -168,9 +168,15 @@ type GkeprivateConfig struct {
// Default: 1000.
//
FirewallPriority *float64 `field:"optional" json:"firewallPriority" yaml:"firewallPriority"`
// (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver.
// The gateway api channel of this cluster.
//
// Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`.
GatewayApiChannel *string `field:"optional" json:"gatewayApiChannel" yaml:"gatewayApiChannel"`
// Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver.
// Default: true.
//
GcePdCsiDriver *bool `field:"optional" json:"gcePdCsiDriver" yaml:"gcePdCsiDriver"`
// (Beta) Whether Backup for GKE agent is enabled for this cluster.
// Whether Backup for GKE agent is enabled for this cluster.
GkeBackupAgentConfig *bool `field:"optional" json:"gkeBackupAgentConfig" yaml:"gkeBackupAgentConfig"`
// Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles.
GrantRegistryAccess *bool `field:"optional" json:"grantRegistryAccess" yaml:"grantRegistryAccess"`
Expand Down Expand Up @@ -250,7 +256,7 @@ type GkeprivateConfig struct {
MasterIpv4CidrBlock *string `field:"optional" json:"masterIpv4CidrBlock" yaml:"masterIpv4CidrBlock"`
// List of services to monitor: SYSTEM_COMPONENTS, WORKLOADS (provider version >= 3.89.0). Empty list is default GKE configuration.
MonitoringEnabledComponents *[]*string `field:"optional" json:"monitoringEnabledComponents" yaml:"monitoringEnabledComponents"`
// (Beta) Configuration for Managed Service for Prometheus.
// Configuration for Managed Service for Prometheus.
//
// Whether or not the managed collection is enabled.
MonitoringEnableManagedPrometheus *bool `field:"optional" json:"monitoringEnableManagedPrometheus" yaml:"monitoringEnableManagedPrometheus"`
Expand Down Expand Up @@ -297,6 +303,11 @@ type GkeprivateConfig struct {
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
//
NodePoolsOauthScopes *map[string]*[]*string `field:"optional" json:"nodePoolsOauthScopes" yaml:"nodePoolsOauthScopes"`
// Map of maps containing resource labels by node-pool name.
// Default: [object Object]
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
//
NodePoolsResourceLabels *map[string]*map[string]*string `field:"optional" json:"nodePoolsResourceLabels" yaml:"nodePoolsResourceLabels"`
// Map of lists containing node network tags by node-pool name.
// Default: [object Object]
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
Expand Down Expand Up @@ -329,7 +340,9 @@ type GkeprivateConfig struct {
RegistryProjectIds *[]*string `field:"optional" json:"registryProjectIds" yaml:"registryProjectIds"`
// The release channel of this cluster.
//
// Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`.
// Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`.
// Default: REGULAR.
//
ReleaseChannel *string `field:"optional" json:"releaseChannel" yaml:"releaseChannel"`
// Remove default node pool while setting up the cluster.
RemoveDefaultNodePool *bool `field:"optional" json:"removeDefaultNodePool" yaml:"removeDefaultNodePool"`
Expand All @@ -339,20 +352,26 @@ type GkeprivateConfig struct {
SandboxEnabled *bool `field:"optional" json:"sandboxEnabled" yaml:"sandboxEnabled"`
// The service account to run nodes as if not overridden in `node_pools`.
//
// The create_service_account variable default value (true) will cause a cluster-specific service account to be created.
// The create_service_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service_account_name variable.
ServiceAccount *string `field:"optional" json:"serviceAccount" yaml:"serviceAccount"`
// The name of the service account that will be created if create_service_account is true.
//
// If you wish to use an existing service account, use service_account variable.
ServiceAccountName *string `field:"optional" json:"serviceAccountName" yaml:"serviceAccountName"`
// Whether external ips specified by a service will be allowed in this cluster.
ServiceExternalIps *bool `field:"optional" json:"serviceExternalIps" yaml:"serviceExternalIps"`
// The log_config for shadow firewall rules.
//
// You can set this variable to `null` to disable logging.
// Default: [object Object].
//
ShadowFirewallRulesLogConfig interface{} `field:"optional" json:"shadowFirewallRulesLogConfig" yaml:"shadowFirewallRulesLogConfig"`
// The firewall priority of GKE shadow firewall rules.
//
// The priority should be less than default firewall, which is 1000.
// Default: 999.
//
ShadowFirewallRulesPriority *float64 `field:"optional" json:"shadowFirewallRulesPriority" yaml:"shadowFirewallRulesPriority"`
// Flag to skip all local-exec provisioners.
//
// It breaks `stub_domains` and `upstream_nameservers` variables functionality.
SkipProvisioners *bool `field:"optional" json:"skipProvisioners" yaml:"skipProvisioners"`
// Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server.
// Default: [object Object]
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
Expand Down
14 changes: 7 additions & 7 deletions gen/gkeprivate/Gkeprivate__checks.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,55 +90,55 @@ func validateGkeprivate_IsTerraformElementParameters(x interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val interface{}) error {
func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error {
func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}

return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error {
func (j *jsiiProxy_Gkeprivate) validateSetShadowFirewallRulesLogConfigParameters(val interface{}) error {
if val == nil {
return fmt.Errorf("parameter val is required, but nil was provided")
}
Expand Down
8 changes: 4 additions & 4 deletions gen/gkeprivate/Gkeprivate__no_checks.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,10 +32,6 @@ func validateGkeprivate_IsTerraformElementParameters(x interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error {
return nil
}
Expand All @@ -60,6 +56,10 @@ func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetShadowFirewallRulesLogConfigParameters(val interface{}) error {
return nil
}

func (j *jsiiProxy_Gkeprivate) validateSetSubnetworkParameters(val *string) error {
return nil
}
Expand Down
Loading