google-apis-sqladmin_v1 0.44.0 → 0.45.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7de21da4e3fc0b629989a9179b1cc13e83a316445c17a3cedabcf219bb114669
4
- data.tar.gz: 1cb216841ce13a33bf04bd1ce58998571c131238ddc20c24969638bfa53ad401
3
+ metadata.gz: 61eec3cbe925b9bcb0252ccfc07def1f4a2a5200e42ba573fc05e8e62b6a8373
4
+ data.tar.gz: 3c91e2cb1ea79058a100dd8205b845137a7e2cfb9f797ecfde872b2b1faa9df2
5
5
  SHA512:
6
- metadata.gz: 10ff88a1db84bd389b4e18ec7d549fe81030d2f1d173bcbe8727124c80a410f60abfa7b370a570f8f07470262e80d21cbd657dfabb705f2fec0971dcd38e7f69
7
- data.tar.gz: 77818390b4f48ae93c8db67f2c407009862e050545c83fac0c7279d7f1fcf057ffc9eb34a55d13ffc0365d13395c97295823954e82482452ed0aa056914cdc6e
6
+ metadata.gz: 2333984ab0e56ab9b0b242a130e53495d3f0e2fbc9616b3ff973654ed80e1926fd7b46451a514cbc026f1a5b53c3bb4ea38c392ef0530362a61ab936de476f2f
7
+ data.tar.gz: 322d02a0701e99efc6b436a87512bf7d5572a702f2cf561844c2ca816ebdc749688f2a689c835e62f60096a8b76396ad9f347304ef52e92e187368acfaa2b5ee
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-sqladmin_v1
2
2
 
3
+ ### v0.45.0 (2023-10-22)
4
+
5
+ * Regenerated from discovery document revision 20231017
6
+
3
7
  ### v0.44.0 (2023-10-08)
4
8
 
5
9
  * Regenerated from discovery document revision 20231004
@@ -1784,14 +1784,17 @@ module Google
1784
1784
  attr_accessor :recovery_only
1785
1785
  alias_method :recovery_only?, :recovery_only
1786
1786
 
1787
- # Optional. StopAt keyword for transaction log import, Applies to Cloud SQL for
1788
- # SQL Server only
1787
+ # Optional. The timestamp when the import should stop. This timestamp is in the [
1788
+ # RFC 3339](https://tools.ietf.org/html/rfc3339) format (for example, `2023-10-
1789
+ # 01T16:19:00.094`). This field is equivalent to the STOPAT keyword and applies
1790
+ # to Cloud SQL for SQL Server only.
1789
1791
  # Corresponds to the JSON property `stopAt`
1790
1792
  # @return [String]
1791
1793
  attr_accessor :stop_at
1792
1794
 
1793
- # Optional. StopAtMark keyword for transaction log import, Applies to Cloud SQL
1794
- # for SQL Server only
1795
+ # Optional. The marked transaction where the import should stop. This field is
1796
+ # equivalent to the STOPATMARK keyword and applies to Cloud SQL for SQL Server
1797
+ # only.
1795
1798
  # Corresponds to the JSON property `stopAtMark`
1796
1799
  # @return [String]
1797
1800
  attr_accessor :stop_at_mark
@@ -2279,33 +2282,31 @@ module Google
2279
2282
  # @return [Google::Apis::SqladminV1::PscConfig]
2280
2283
  attr_accessor :psc_config
2281
2284
 
2282
- # LINT.IfChange(require_ssl_deprecate) Whether SSL/TLS connections over IP are
2283
- # enforced or not. If set to false, allow both non-SSL/non-TLS and SSL/TLS
2284
- # connections. For SSL/TLS connections, the client certificate will not be
2285
- # verified. If set to true, only allow connections encrypted with SSL/TLS and
2286
- # with valid client certificates. If you want to enforce SSL/TLS without
2287
- # enforcing the requirement for valid client certificates, use the `ssl_mode`
2288
- # flag instead of the legacy `require_ssl` flag. LINT.ThenChange(//depot/google3/
2289
- # java/com/google/storage/speckle/boss/admin/actions/InstanceUpdateAction.java:
2290
- # update_api_temp_fix)
2285
+ # Whether SSL/TLS connections over IP are enforced. If set to false, then allow
2286
+ # both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the
2287
+ # client certificate won't be verified. If set to true, then only allow
2288
+ # connections encrypted with SSL/TLS and with valid client certificates. If you
2289
+ # want to enforce SSL/TLS without enforcing the requirement for valid client
2290
+ # certificates, then use the `ssl_mode` flag instead of the legacy `require_ssl`
2291
+ # flag.
2291
2292
  # Corresponds to the JSON property `requireSsl`
2292
2293
  # @return [Boolean]
2293
2294
  attr_accessor :require_ssl
2294
2295
  alias_method :require_ssl?, :require_ssl
2295
2296
 
2296
- # Specify how SSL/TLS will be enforced in database connections. This flag is
2297
- # only supported for PostgreSQL. Use the legacy `require_ssl` flag for enforcing
2298
- # SSL/TLS in MySQL and SQL Server. But, for PostgreSQL, it is recommended to use
2299
- # the `ssl_mode` flag instead of the legacy `require_ssl` flag. To avoid the
2300
- # conflict between those flags in PostgreSQL, only the following value pairs are
2301
- # valid: ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED, require_ssl=false; ssl_mode=
2302
- # ENCRYPTED_ONLY, require_ssl=false; ssl_mode=
2303
- # TRUSTED_CLIENT_CERTIFICATE_REQUIRED, require_ssl=true; Note that the value of `
2304
- # ssl_mode` gets priority over the value of the legacy `require_ssl`. For
2305
- # example, for the pair `ssl_mode=ENCRYPTED_ONLY, require_ssl=false`, the `
2297
+ # Specify how SSL/TLS is enforced in database connections. This flag is
2298
+ # supported only for PostgreSQL. Use the legacy `require_ssl` flag for enforcing
2299
+ # SSL/TLS in MySQL and SQL Server. But, for PostgreSQL, use the `ssl_mode` flag
2300
+ # instead of the legacy `require_ssl` flag. To avoid the conflict between those
2301
+ # flags in PostgreSQL, only the following value pairs are valid: * `ssl_mode=
2302
+ # ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=
2303
+ # ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=
2304
+ # TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` Note that the
2305
+ # value of `ssl_mode` gets priority over the value of the legacy `require_ssl`.
2306
+ # For example, for the pair `ssl_mode=ENCRYPTED_ONLY, require_ssl=false`, the `
2306
2307
  # ssl_mode=ENCRYPTED_ONLY` means "only accepts SSL connection", while the `
2307
2308
  # require_ssl=false` means "both non-SSL and SSL connections are allowed". The
2308
- # database will respect `ssl_mode` in this case and only accept SSL connections.
2309
+ # database respects `ssl_mode` in this case and only accepts SSL connections.
2309
2310
  # Corresponds to the JSON property `sslMode`
2310
2311
  # @return [String]
2311
2312
  attr_accessor :ssl_mode
@@ -2919,13 +2920,6 @@ module Google
2919
2920
  # @return [String]
2920
2921
  attr_accessor :complexity
2921
2922
 
2922
- # Disallow credentials that have been previously compromised by a public data
2923
- # breach.
2924
- # Corresponds to the JSON property `disallowCompromisedCredentials`
2925
- # @return [Boolean]
2926
- attr_accessor :disallow_compromised_credentials
2927
- alias_method :disallow_compromised_credentials?, :disallow_compromised_credentials
2928
-
2929
2923
  # Disallow username as a part of the password.
2930
2924
  # Corresponds to the JSON property `disallowUsernameSubstring`
2931
2925
  # @return [Boolean]
@@ -2961,7 +2955,6 @@ module Google
2961
2955
  # Update properties of this object
2962
2956
  def update!(**args)
2963
2957
  @complexity = args[:complexity] if args.key?(:complexity)
2964
- @disallow_compromised_credentials = args[:disallow_compromised_credentials] if args.key?(:disallow_compromised_credentials)
2965
2958
  @disallow_username_substring = args[:disallow_username_substring] if args.key?(:disallow_username_substring)
2966
2959
  @enable_password_policy = args[:enable_password_policy] if args.key?(:enable_password_policy)
2967
2960
  @min_length = args[:min_length] if args.key?(:min_length)
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SqladminV1
18
18
  # Version of the google-apis-sqladmin_v1 gem
19
- GEM_VERSION = "0.44.0"
19
+ GEM_VERSION = "0.45.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.12.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20231004"
25
+ REVISION = "20231017"
26
26
  end
27
27
  end
28
28
  end
@@ -1368,7 +1368,6 @@ module Google
1368
1368
  # @private
1369
1369
  class Representation < Google::Apis::Core::JsonRepresentation
1370
1370
  property :complexity, as: 'complexity'
1371
- property :disallow_compromised_credentials, as: 'disallowCompromisedCredentials'
1372
1371
  property :disallow_username_substring, as: 'disallowUsernameSubstring'
1373
1372
  property :enable_password_policy, as: 'enablePasswordPolicy'
1374
1373
  property :min_length, as: 'minLength'
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-sqladmin_v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.44.0
4
+ version: 0.45.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-10-08 00:00:00.000000000 Z
11
+ date: 2023-10-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-sqladmin_v1/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-sqladmin_v1/v0.44.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-sqladmin_v1/v0.45.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-sqladmin_v1
63
63
  post_install_message:
64
64
  rdoc_options: []