@maxim_mazurok/gapi.client.sqladmin-v1 0.0.20240709 → 0.0.20240724
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +13 -3
- package/package.json +1 -1
- package/readme.md +2 -2
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://sqladmin.googleapis.com/$discovery/rest?version=v1
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240724
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -127,6 +127,8 @@ declare namespace gapi.client {
|
|
|
127
127
|
kind?: string;
|
|
128
128
|
/** Location of the backups. */
|
|
129
129
|
location?: string;
|
|
130
|
+
/** Output only. The maximum chargeable bytes for the backup. */
|
|
131
|
+
maxChargeableBytes?: string;
|
|
130
132
|
/** The URI of this resource. */
|
|
131
133
|
selfLink?: string;
|
|
132
134
|
/** The time the backup operation actually started in UTC timezone in [RFC 3339](https://tools.ietf.org/html/rfc3339) format, for example `2012-11-15T16:19:00.094Z`. */
|
|
@@ -191,6 +193,8 @@ declare namespace gapi.client {
|
|
|
191
193
|
region?: string;
|
|
192
194
|
/** SSL configuration. */
|
|
193
195
|
serverCaCert?: SslCert;
|
|
196
|
+
/** Specify what type of CA is used for the server certificate. */
|
|
197
|
+
serverCaMode?: string;
|
|
194
198
|
}
|
|
195
199
|
interface Database {
|
|
196
200
|
/** The Cloud SQL charset value. */
|
|
@@ -287,6 +291,8 @@ declare namespace gapi.client {
|
|
|
287
291
|
replicationCluster?: ReplicationCluster;
|
|
288
292
|
/** Initial root password. Use only on creation. You must set root passwords before you can connect to PostgreSQL instances. */
|
|
289
293
|
rootPassword?: string;
|
|
294
|
+
/** Output only. This status indicates whether the instance satisfies PZI. The status is reserved for future use. */
|
|
295
|
+
satisfiesPzi?: boolean;
|
|
290
296
|
/** This status indicates whether the instance satisfies PZS. The status is reserved for future use. */
|
|
291
297
|
satisfiesPzs?: boolean;
|
|
292
298
|
/** The start time of any upcoming scheduled maintenance for this instance. */
|
|
@@ -306,6 +312,8 @@ declare namespace gapi.client {
|
|
|
306
312
|
state?: string;
|
|
307
313
|
/** If the instance state is SUSPENDED, the reason for the suspension. */
|
|
308
314
|
suspensionReason?: string[];
|
|
315
|
+
/** Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage. */
|
|
316
|
+
switchTransactionLogsToCloudStorageEnabled?: boolean;
|
|
309
317
|
/** Output only. All database versions that are available for upgrade. */
|
|
310
318
|
upgradableDatabaseVersions?: AvailableDatabaseVersion[];
|
|
311
319
|
/** Output only. The dns name of the primary instance in a replication group. */
|
|
@@ -663,6 +671,8 @@ declare namespace gapi.client {
|
|
|
663
671
|
pscConfig?: PscConfig;
|
|
664
672
|
/** Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag. */
|
|
665
673
|
requireSsl?: boolean;
|
|
674
|
+
/** Specify what type of CA is used for the server certificate. */
|
|
675
|
+
serverCaMode?: string;
|
|
666
676
|
/** Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections. */
|
|
667
677
|
sslMode?: string;
|
|
668
678
|
}
|
|
@@ -1829,7 +1839,7 @@ declare namespace gapi.client {
|
|
|
1829
1839
|
},
|
|
1830
1840
|
body: InstancesAcquireSsrsLeaseRequest
|
|
1831
1841
|
): Request<SqlInstancesAcquireSsrsLeaseResponse>;
|
|
1832
|
-
/** Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. */
|
|
1842
|
+
/** Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate. */
|
|
1833
1843
|
addServerCa(request?: {
|
|
1834
1844
|
/** V1 error format. */
|
|
1835
1845
|
'$.xgafv'?: string;
|
|
@@ -2712,7 +2722,7 @@ declare namespace gapi.client {
|
|
|
2712
2722
|
},
|
|
2713
2723
|
body: InstancesRestoreBackupRequest
|
|
2714
2724
|
): Request<Operation>;
|
|
2715
|
-
/** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. */
|
|
2725
|
+
/** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate. */
|
|
2716
2726
|
rotateServerCa(request: {
|
|
2717
2727
|
/** V1 error format. */
|
|
2718
2728
|
'$.xgafv'?: string;
|
package/package.json
CHANGED
package/readme.md
CHANGED
|
@@ -185,7 +185,7 @@ await gapi.client.sql.instances.acquireSsrsLease({
|
|
|
185
185
|
});
|
|
186
186
|
|
|
187
187
|
/*
|
|
188
|
-
Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.
|
|
188
|
+
Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.
|
|
189
189
|
*/
|
|
190
190
|
await gapi.client.sql.instances.addServerCa({
|
|
191
191
|
instance: 'instance',
|
|
@@ -328,7 +328,7 @@ await gapi.client.sql.instances.restoreBackup({
|
|
|
328
328
|
});
|
|
329
329
|
|
|
330
330
|
/*
|
|
331
|
-
Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.
|
|
331
|
+
Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.
|
|
332
332
|
*/
|
|
333
333
|
await gapi.client.sql.instances.rotateServerCa({
|
|
334
334
|
instance: 'instance',
|