google-apis-sqladmin_v1beta4 0.56.0 → 0.57.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: e5fdd518376963f34ca7f26080f6ed97ba4ededfc2362887cd646796dae54f42
4
- data.tar.gz: 7378317a7ae01525dc2cc5ea4c49c617ea7ba322f838b46c54f8e3a37753e2ad
3
+ metadata.gz: f6b06d6236c0532fe4a92184d552a10241d43613f0a30643d98111b8dd13ffd2
4
+ data.tar.gz: e48126490b1bfb6ea99ae7809acdfc327802b727bf166597eb39eca61befecc7
5
5
  SHA512:
6
- metadata.gz: 5f0c47c2d136f131b3293ef3d2d5095cabda9fc13a393f8817f636f71bc66613e4a3849ccf768059b4c9e9aa8aa0fcf18f567e45622fbdf15ada0fdf36c6a995
7
- data.tar.gz: c1db8465bb597698cce76b564f0b294338c95b01b5bcc2bdd692cc4987f1d175a590ca7246607155dc25fcdb0fd231f32d6ed68a74b0ea157cfbcd9f209df86e
6
+ metadata.gz: 3d49d36d3ba609c68d575cd0e39cd405ea71858407cc5653d2bc56651442198ec828e80f0a3b56505e0952b99caa9e41b4cb3e90b7ebade0b0baf061568cc7a0
7
+ data.tar.gz: cf79d467f0fb1d4324f6a5ee1659419a0167fa09f1786e94d8825fa388654f32f952246ee7b4c9b8afa8b90048805c917d3043661164216ffacf4b749a75b2e4
data/CHANGELOG.md CHANGED
@@ -1,5 +1,9 @@
1
1
  # Release history for google-apis-sqladmin_v1beta4
2
2
 
3
+ ### v0.57.0 (2023-10-22)
4
+
5
+ * Regenerated from discovery document revision 20231017
6
+
3
7
  ### v0.56.0 (2023-10-08)
4
8
 
5
9
  * Regenerated from discovery document revision 20231004
@@ -1785,14 +1785,17 @@ module Google
1785
1785
  attr_accessor :recovery_only
1786
1786
  alias_method :recovery_only?, :recovery_only
1787
1787
 
1788
- # Optional. StopAt keyword for transaction log import, Applies to Cloud SQL for
1789
- # SQL Server only
1788
+ # Optional. The timestamp when the import should stop. This timestamp is in the [
1789
+ # RFC 3339](https://tools.ietf.org/html/rfc3339) format (for example, `2023-10-
1790
+ # 01T16:19:00.094`). This field is equivalent to the STOPAT keyword and applies
1791
+ # to Cloud SQL for SQL Server only.
1790
1792
  # Corresponds to the JSON property `stopAt`
1791
1793
  # @return [String]
1792
1794
  attr_accessor :stop_at
1793
1795
 
1794
- # Optional. StopAtMark keyword for transaction log import, Applies to Cloud SQL
1795
- # for SQL Server only
1796
+ # Optional. The marked transaction where the import should stop. This field is
1797
+ # equivalent to the STOPATMARK keyword and applies to Cloud SQL for SQL Server
1798
+ # only.
1796
1799
  # Corresponds to the JSON property `stopAtMark`
1797
1800
  # @return [String]
1798
1801
  attr_accessor :stop_at_mark
@@ -2280,33 +2283,31 @@ module Google
2280
2283
  # @return [Google::Apis::SqladminV1beta4::PscConfig]
2281
2284
  attr_accessor :psc_config
2282
2285
 
2283
- # LINT.IfChange(require_ssl_deprecate) Whether SSL/TLS connections over IP are
2284
- # enforced or not. If set to false, allow both non-SSL/non-TLS and SSL/TLS
2285
- # connections. For SSL/TLS connections, the client certificate will not be
2286
- # verified. If set to true, only allow connections encrypted with SSL/TLS and
2287
- # with valid client certificates. If you want to enforce SSL/TLS without
2288
- # enforcing the requirement for valid client certificates, use the `ssl_mode`
2289
- # flag instead of the legacy `require_ssl` flag. LINT.ThenChange(//depot/google3/
2290
- # java/com/google/storage/speckle/boss/admin/actions/InstanceUpdateAction.java:
2291
- # update_api_temp_fix)
2286
+ # Whether SSL/TLS connections over IP are enforced. If set to false, then allow
2287
+ # both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the
2288
+ # client certificate won't be verified. If set to true, then only allow
2289
+ # connections encrypted with SSL/TLS and with valid client certificates. If you
2290
+ # want to enforce SSL/TLS without enforcing the requirement for valid client
2291
+ # certificates, then use the `ssl_mode` flag instead of the legacy `require_ssl`
2292
+ # flag.
2292
2293
  # Corresponds to the JSON property `requireSsl`
2293
2294
  # @return [Boolean]
2294
2295
  attr_accessor :require_ssl
2295
2296
  alias_method :require_ssl?, :require_ssl
2296
2297
 
2297
- # Specify how SSL/TLS will be enforced in database connections. This flag is
2298
- # only supported for PostgreSQL. Use the legacy `require_ssl` flag for enforcing
2299
- # SSL/TLS in MySQL and SQL Server. But, for PostgreSQL, it is recommended to use
2300
- # the `ssl_mode` flag instead of the legacy `require_ssl` flag. To avoid the
2301
- # conflict between those flags in PostgreSQL, only the following value pairs are
2302
- # valid: ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED, require_ssl=false; ssl_mode=
2303
- # ENCRYPTED_ONLY, require_ssl=false; ssl_mode=
2304
- # TRUSTED_CLIENT_CERTIFICATE_REQUIRED, require_ssl=true; Note that the value of `
2305
- # ssl_mode` gets priority over the value of the legacy `require_ssl`. For
2306
- # example, for the pair `ssl_mode=ENCRYPTED_ONLY, require_ssl=false`, the `
2298
+ # Specify how SSL/TLS is enforced in database connections. This flag is
2299
+ # supported only for PostgreSQL. Use the legacy `require_ssl` flag for enforcing
2300
+ # SSL/TLS in MySQL and SQL Server. But, for PostgreSQL, use the `ssl_mode` flag
2301
+ # instead of the legacy `require_ssl` flag. To avoid the conflict between those
2302
+ # flags in PostgreSQL, only the following value pairs are valid: * `ssl_mode=
2303
+ # ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=
2304
+ # ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=
2305
+ # TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` Note that the
2306
+ # value of `ssl_mode` gets priority over the value of the legacy `require_ssl`.
2307
+ # For example, for the pair `ssl_mode=ENCRYPTED_ONLY, require_ssl=false`, the `
2307
2308
  # ssl_mode=ENCRYPTED_ONLY` means "only accepts SSL connection", while the `
2308
2309
  # require_ssl=false` means "both non-SSL and SSL connections are allowed". The
2309
- # database will respect `ssl_mode` in this case and only accept SSL connections.
2310
+ # database respects `ssl_mode` in this case and only accepts SSL connections.
2310
2311
  # Corresponds to the JSON property `sslMode`
2311
2312
  # @return [String]
2312
2313
  attr_accessor :ssl_mode
@@ -2920,13 +2921,6 @@ module Google
2920
2921
  # @return [String]
2921
2922
  attr_accessor :complexity
2922
2923
 
2923
- # Disallow credentials that have been previously compromised by a public data
2924
- # breach.
2925
- # Corresponds to the JSON property `disallowCompromisedCredentials`
2926
- # @return [Boolean]
2927
- attr_accessor :disallow_compromised_credentials
2928
- alias_method :disallow_compromised_credentials?, :disallow_compromised_credentials
2929
-
2930
2924
  # Disallow username as a part of the password.
2931
2925
  # Corresponds to the JSON property `disallowUsernameSubstring`
2932
2926
  # @return [Boolean]
@@ -2962,7 +2956,6 @@ module Google
2962
2956
  # Update properties of this object
2963
2957
  def update!(**args)
2964
2958
  @complexity = args[:complexity] if args.key?(:complexity)
2965
- @disallow_compromised_credentials = args[:disallow_compromised_credentials] if args.key?(:disallow_compromised_credentials)
2966
2959
  @disallow_username_substring = args[:disallow_username_substring] if args.key?(:disallow_username_substring)
2967
2960
  @enable_password_policy = args[:enable_password_policy] if args.key?(:enable_password_policy)
2968
2961
  @min_length = args[:min_length] if args.key?(:min_length)
@@ -16,13 +16,13 @@ module Google
16
16
  module Apis
17
17
  module SqladminV1beta4
18
18
  # Version of the google-apis-sqladmin_v1beta4 gem
19
- GEM_VERSION = "0.56.0"
19
+ GEM_VERSION = "0.57.0"
20
20
 
21
21
  # Version of the code generator used to generate this client
22
22
  GENERATOR_VERSION = "0.12.0"
23
23
 
24
24
  # Revision of the discovery document this client was generated from
25
- REVISION = "20231004"
25
+ REVISION = "20231017"
26
26
  end
27
27
  end
28
28
  end
@@ -1368,7 +1368,6 @@ module Google
1368
1368
  # @private
1369
1369
  class Representation < Google::Apis::Core::JsonRepresentation
1370
1370
  property :complexity, as: 'complexity'
1371
- property :disallow_compromised_credentials, as: 'disallowCompromisedCredentials'
1372
1371
  property :disallow_username_substring, as: 'disallowUsernameSubstring'
1373
1372
  property :enable_password_policy, as: 'enablePasswordPolicy'
1374
1373
  property :min_length, as: 'minLength'
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-apis-sqladmin_v1beta4
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.56.0
4
+ version: 0.57.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-10-08 00:00:00.000000000 Z
11
+ date: 2023-10-22 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-apis-core
@@ -58,7 +58,7 @@ licenses:
58
58
  metadata:
59
59
  bug_tracker_uri: https://github.com/googleapis/google-api-ruby-client/issues
60
60
  changelog_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-sqladmin_v1beta4/CHANGELOG.md
61
- documentation_uri: https://googleapis.dev/ruby/google-apis-sqladmin_v1beta4/v0.56.0
61
+ documentation_uri: https://googleapis.dev/ruby/google-apis-sqladmin_v1beta4/v0.57.0
62
62
  source_code_uri: https://github.com/googleapis/google-api-ruby-client/tree/main/generated/google-apis-sqladmin_v1beta4
63
63
  post_install_message:
64
64
  rdoc_options: []