feat: Add new gcloud commands, API clients, and third-party libraries across various services.

This commit is contained in:
2026-01-01 20:26:35 +01:00
parent 5e23cbece0
commit a19e592eb7
25221 changed files with 8324611 additions and 0 deletions

View File

@@ -0,0 +1,28 @@
# -*- coding: utf-8 -*- #
# Copyright 2019 Google Inc. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Command group for Managed Microsoft AD domains."""
from __future__ import absolute_import
from __future__ import division
from __future__ import unicode_literals
from googlecloudsdk.calliope import base
@base.ReleaseTracks(base.ReleaseTrack.GA,
base.ReleaseTrack.BETA,
base.ReleaseTrack.ALPHA)
class Domains(base.Group):
"""Manage Managed Microsoft AD domains."""

View File

@@ -0,0 +1,76 @@
- release_tracks: [GA, BETA, ALPHA]
help_text:
brief: |
Create a Microsoft Active Directory Trust between a Managed Microsoft AD domain and another
domain.
description: |
Create a Microsoft Active Directory Trust between a Managed Microsoft AD domain and another
domain.
This command can fail for the following reasons:
* The domain specified does not exist.
* The active account does not have permission to access the given
domain.
* A trust already exists with the same target domain name.
* The active account does not have permission to create AD trusts.
examples: |
The following command creates an external, bidirectional AD trust between `my-domain.com` and
`target-domain.com`.
$ {command} my-domain.com --target-domain-name=target-domain.com
--target-dns-ip-addresses=10.177.0.2 --type=EXTERNAL --direction=BIDIRECTIONAL
--selective-authentication=false --async
async:
collection: managedidentities.projects.locations.global.operations
request:
api_version: v1
collection: managedidentities.projects.locations.global.domains
method: attachTrust
modify_request_hooks:
- googlecloudsdk.command_lib.active_directory.trust_create_util:AddExtraTrustCreateArgs
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.active_directory.resources:domain
help_text: |
Name of the Managed Microsoft AD domain you want to create an AD trust from.
params:
- arg_name: target-domain-name
api_field: attachTrustRequest.trust.targetDomainName
required: true
help_text: |
Target domain name for the Managed Microsoft AD Trust.
- arg_name: target-dns-ip-addresses
api_field: attachTrustRequest.trust.targetDnsIpAddresses
required: true
help_text: |
Target DNS server IP addresses that can resolve the target domain.
Only IPv4 is supported.
- arg_name: type
default: "FOREST"
api_field: attachTrustRequest.trust.trustType
help_text: |
Type of the trust. Must be FOREST or EXTERNAL. Default is FOREST.
- arg_name: direction
default: "BIDIRECTIONAL"
api_field: attachTrustRequest.trust.trustDirection
help_text: |
Direction of the trust.
Must be one of: INBOUND, OUTBOUND, BIDIRECTIONAL. Default is BIDIRECTIONAL.
- arg_name: selective-authentication
default: false
api_field: attachTrustRequest.trust.selectiveAuthentication
help_text: |
If specified, trusted side will only have selective access to approved set of resources.
Otherwise, the trusted side has forest/domain wide access. Default is false.
- arg_name: handshake-secret
api_field: attachTrustRequest.trust.trustHandshakeSecret
help_text: |
Trust handshake secret with target domain. The secret will not be stored. If not specified,
command will prompt user for secret.

View File

@@ -0,0 +1,44 @@
- release_tracks: [GA, BETA, ALPHA]
help_text:
brief: |
Delete an Active Directory Trust between a Managed Microsoft AD domain and a target domain.
description: |
Delete an Active Directory trust between a Managed Microsoft AD domain and a target domain.
This command can fail for the following reasons:
* The domain specified does not exist.
* The active account does not have permission to access the given
domain.
* The AD trust specified does not exist.
* The active account does not have permission to access the given
AD trust.
examples: |
The following command deletes an AD trust between `my-ad-domain.com` and
`my-target-domain.com`.
$ {command} my-ad-domain.com --target-domain-name=my-target-domain.com
async:
collection: managedidentities.projects.locations.global.operations
input:
confirmation_prompt: |
You are about to delete a trust from [{__name__}].
request:
api_version: v1
collection: managedidentities.projects.locations.global.domains
method: detachTrust
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.active_directory.resources:domain
help_text: |
Name of the Managed Microsoft AD domain you want to delete a trust from.
params:
- arg_name: target-domain-name
api_field: detachTrustRequest.trust.targetDomainName
required: true
help_text: |
Target domain name for the Managed Microsoft AD trust you want to delete.

View File

@@ -0,0 +1,50 @@
- release_tracks: [GA, BETA, ALPHA]
help_text:
brief: |
Update target DNS IP addresses for a Managed Microsoft AD trust.
description: |
Update target DNS IP addresses for a Managed Microsoft AD trust between the
managed domain and the target domain.
This command can fail for the following reasons:
* The domain specified does not exist.
* The active account does not have permission to access the given
domain.
* The AD trust specified does not exist.
* The active account does not have permission to access the given
AD trust.
examples: |
The following command updates the target DNS IP address for the AD trust
between `my-domain.com` and ` my-target-domain.com` to `10.177.0.3`.
$ {command} my-domain.com --target-domain-name=my-target-domain.com
--target-dns-ip-addresses=10.177.0.3
async:
collection: managedidentities.projects.locations.global.operations
request:
api_version: v1
collection: managedidentities.projects.locations.global.domains
method: reconfigureTrust
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.active_directory.resources:domain
help_text: |
Name of the Managed Microsoft AD trust for which you want to update
target DNS IP Addresses.
params:
- arg_name: target-domain-name
api_field: reconfigureTrustRequest.targetDomainName
required: true
help_text: |
Target domain name for the Managed Microsoft AD trust you want to update.
- arg_name: target-dns-ip-addresses
api_field: reconfigureTrustRequest.targetDnsIpAddresses
required: true
help_text: |
DNS server IP addresses that can resolve the target domain.
Only IPv4 is supported.

View File

@@ -0,0 +1,43 @@
- release_tracks: [GA, BETA, ALPHA]
help_text:
brief: |
Validate the state of a Managed Microsoft AD trust.
description: |
Validate the state of a Managed Microsoft AD trust.
Verify that the trust has been properly created and that the domains/forests can
communicate with each other.
This command can fail for the following reasons:
* The AD domain specified does not exist.
* The active account does not have permission to access the given
AD domain.
* The AD trust specified does not exist.
* The active account does not have permission to access the given
AD trust.
examples: |
The following command validates state for an AD trust with the given target
domain name ` my-target-domain.com`.
$ {command} my-domain.com --target-domain-name=my-target-domain.com
async:
collection: managedidentities.projects.locations.global.operations
request:
api_version: v1
collection: managedidentities.projects.locations.global.domains
method: validateTrust
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.active_directory.resources:domain
help_text: |
Name of the the Managed Microsoft AD trust for which you want to validate state.
params:
- arg_name: target-domain-name
api_field: validateTrustRequest.trust.targetDomainName
required: true
help_text: |
Target domain name of the Managed Microsoft AD Active Directory trust you want to validate.