Skip to content

Commit

Permalink
feat: Automated regeneration of workstations v1 client (#18957)
Browse files Browse the repository at this point in the history
Auto-created at 2024-05-05 10:19:23 +0000 using the toys pull request generator.
  • Loading branch information
yoshi-code-bot committed May 5, 2024
1 parent bbc17ff commit 20e2a3d
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 15 deletions.
4 changes: 4 additions & 0 deletions generated/google-apis-workstations_v1/CHANGELOG.md
@@ -1,5 +1,9 @@
# Release history for google-apis-workstations_v1

### v0.10.0 (2024-05-05)

* Regenerated from discovery document revision 20240424

### v0.9.0 (2024-03-10)

* Regenerated from discovery document revision 20240301
Expand Down
Expand Up @@ -535,23 +535,22 @@ class GceInstance

# Optional. The email address of the service account for Cloud Workstations VMs
# created with this configuration. When specified, be sure that the service
# account has `logginglogEntries.create` permission on the project so it can
# write logs out to Cloud Logging. If using a custom container image, the
# service account must have [Artifact Registry Reader](https://cloud.google.com/
# artifact-registry/docs/access-control#roles) permission to pull the specified
# image. If you as the administrator want to be able to `ssh` into the
# underlying VM, you need to set this value to a service account for which you
# have the `iam.serviceAccounts.actAs` permission. Conversely, if you don't want
# anyone to be able to `ssh` into the underlying VM, use a service account where
# no one has that permission. If not set, VMs run with a service account
# provided by the Cloud Workstations service, and the image must be publicly
# accessible.
# account has `logging.logEntries.create` and `monitoring.timeSeries.create`
# permissions on the project so it can write logs out to Cloud Logging. If using
# a custom container image, the service account must have [Artifact Registry
# Reader](https://cloud.google.com/artifact-registry/docs/access-control#roles)
# permission to pull the specified image. If you as the administrator want to be
# able to `ssh` into the underlying VM, you need to set this value to a service
# account for which you have the `iam.serviceAccounts.actAs` permission.
# Conversely, if you don't want anyone to be able to `ssh` into the underlying
# VM, use a service account where no one has that permission. If not set, VMs
# run with a service account provided by the Cloud Workstations service, and the
# image must be publicly accessible.
# Corresponds to the JSON property `serviceAccount`
# @return [String]
attr_accessor :service_account

# Optional. Scopes to grant to the service_account. Various scopes are
# automatically added based on feature usage. When specified, users of
# Optional. Scopes to grant to the service_account. When specified, users of
# workstations under this configuration must have `iam.serviceAccounts.actAs` on
# the service account.
# Corresponds to the JSON property `serviceAccountScopes`
Expand Down
Expand Up @@ -16,13 +16,13 @@ module Google
module Apis
module WorkstationsV1
# Version of the google-apis-workstations_v1 gem
GEM_VERSION = "0.9.0"
GEM_VERSION = "0.10.0"

# Version of the code generator used to generate this client
GENERATOR_VERSION = "0.14.0"

# Revision of the discovery document this client was generated from
REVISION = "20240301"
REVISION = "20240424"
end
end
end

0 comments on commit 20e2a3d

Please sign in to comment.