feat: Add new gcloud commands, API clients, and third-party libraries across various services.

This commit is contained in:
2026-01-01 20:26:35 +01:00
parent 5e23cbece0
commit a19e592eb7
25221 changed files with 8324611 additions and 0 deletions

View File

@@ -0,0 +1,30 @@
# -*- coding: utf-8 -*- #
# Copyright 2022 Google LLC. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Command group for Artifact Registry packages."""
from __future__ import absolute_import
from __future__ import division
from __future__ import unicode_literals
from googlecloudsdk.calliope import base
@base.DefaultUniverseOnly
@base.ReleaseTracks(base.ReleaseTrack.ALPHA, base.ReleaseTrack.BETA,
base.ReleaseTrack.GA)
class Generic(base.Group):
"""Manage Artifact Registry VPC Service Controls configuration for remote repositories."""
category = base.CI_CD_CATEGORY

View File

@@ -0,0 +1,31 @@
- release_tracks: [ALPHA, BETA, GA]
help_text:
brief: |
Allow Artifact Registry remote repositories inside a service perimeter to retrieve data from their upstream sources outside of the perimeter.
description: |
Allow Artifact Registry remote repositories inside a service perimeter to retrieve data from their upstream sources outside of the perimeter.
This command can fail for the following reasons:
* Lack of permission - "accesscontextmanager.policies.update".
* The resource could be outside of the VPC SC perimeter.
* Lack of permission - "artifactregistry.vpcscconfigs.update"
examples: |
The following command allows remote repositories in the project my-project and in the region us--west1 to retrieve data from upstream sources outside the perimeter:
$ {command} --project=my-project --location=us-west1
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.artifacts.resources:location
is_positional: false
help_text: |
The Artifact Registry VPC SC config to update.
request: &request
api_version: v1
disable_resource_check: true
method: updateVpcscConfig
collection: artifactregistry.projects.locations
issue_request_hook: googlecloudsdk.command_lib.artifacts.util:AllowVPCSCConfig

View File

@@ -0,0 +1,31 @@
- release_tracks: [ALPHA, BETA, GA]
help_text:
brief: |
Deny access to upstream sources outside the service perimeter for Artifact Registry remote repositories inside the perimeter.
description: |
Deny access to upstream sources outside the service perimeter for Artifact Registry remote repositories inside the perimeter.
This command can fail for the following reasons:
* Lack of permission - "accesscontextmanager.policies.update".
* The resource could be outside of the VPC SC perimeter.
* Lack of permission - "artifactregistry.vpcscconfigs.update"
examples: |
The following command denies access to upstream sources outside the service perimeter for remote repositories in the project my-project and in the region us--west1:
$ {command} --project=my-project --location=us-west1
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.artifacts.resources:location
is_positional: false
help_text: |
The Artifact Registry VPC SC config to update.
request: &request
api_version: v1
disable_resource_check: true
method: updateVpcscConfig
collection: artifactregistry.projects.locations
issue_request_hook: googlecloudsdk.command_lib.artifacts.util:DenyVPCSCConfig

View File

@@ -0,0 +1,30 @@
- release_tracks: [ALPHA, BETA, GA]
help_text:
brief: |
Describe the current Artifact Registry configuration for VPC Service Controls.
description: |
Describe the current Artifact Registry configuration for VPC Service Controls.
This command can fail for the following reasons:
* Lack of permission - "accesscontextmanager.policies.get".
* The resource could be outside of the VPC SC perimeter.
* Lack of permission - "artifactregistry.vpcscconfigs.get"
examples: |
The following command returns the current VPC Service Controls configuration for the project my-project and region us-west1:
$ {command} --project=my-project --location=us-west1
arguments:
resource:
spec: !REF googlecloudsdk.command_lib.artifacts.resources:location
is_positional: false
help_text: |
The Artifact Registry VPC SC configs to describe.
request: &request
api_version: v1
disable_resource_check: true
collection: artifactregistry.projects.locations
issue_request_hook: googlecloudsdk.command_lib.artifacts.util:GetVPCSCConfig