@maxim_mazurok/gapi.client.sqladmin-v1 0.0.20240709 → 0.0.20240724

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/index.d.ts +13 -3
  2. package/package.json +1 -1
  3. package/readme.md +2 -2
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://sqladmin.googleapis.com/$discovery/rest?version=v1
12
- // Revision: 20240709
12
+ // Revision: 20240724
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -127,6 +127,8 @@ declare namespace gapi.client {
127
127
  kind?: string;
128
128
  /** Location of the backups. */
129
129
  location?: string;
130
+ /** Output only. The maximum chargeable bytes for the backup. */
131
+ maxChargeableBytes?: string;
130
132
  /** The URI of this resource. */
131
133
  selfLink?: string;
132
134
  /** The time the backup operation actually started in UTC timezone in [RFC 3339](https://tools.ietf.org/html/rfc3339) format, for example `2012-11-15T16:19:00.094Z`. */
@@ -191,6 +193,8 @@ declare namespace gapi.client {
191
193
  region?: string;
192
194
  /** SSL configuration. */
193
195
  serverCaCert?: SslCert;
196
+ /** Specify what type of CA is used for the server certificate. */
197
+ serverCaMode?: string;
194
198
  }
195
199
  interface Database {
196
200
  /** The Cloud SQL charset value. */
@@ -287,6 +291,8 @@ declare namespace gapi.client {
287
291
  replicationCluster?: ReplicationCluster;
288
292
  /** Initial root password. Use only on creation. You must set root passwords before you can connect to PostgreSQL instances. */
289
293
  rootPassword?: string;
294
+ /** Output only. This status indicates whether the instance satisfies PZI. The status is reserved for future use. */
295
+ satisfiesPzi?: boolean;
290
296
  /** This status indicates whether the instance satisfies PZS. The status is reserved for future use. */
291
297
  satisfiesPzs?: boolean;
292
298
  /** The start time of any upcoming scheduled maintenance for this instance. */
@@ -306,6 +312,8 @@ declare namespace gapi.client {
306
312
  state?: string;
307
313
  /** If the instance state is SUSPENDED, the reason for the suspension. */
308
314
  suspensionReason?: string[];
315
+ /** Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage. */
316
+ switchTransactionLogsToCloudStorageEnabled?: boolean;
309
317
  /** Output only. All database versions that are available for upgrade. */
310
318
  upgradableDatabaseVersions?: AvailableDatabaseVersion[];
311
319
  /** Output only. The dns name of the primary instance in a replication group. */
@@ -663,6 +671,8 @@ declare namespace gapi.client {
663
671
  pscConfig?: PscConfig;
664
672
  /** Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag. */
665
673
  requireSsl?: boolean;
674
+ /** Specify what type of CA is used for the server certificate. */
675
+ serverCaMode?: string;
666
676
  /** Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections. */
667
677
  sslMode?: string;
668
678
  }
@@ -1829,7 +1839,7 @@ declare namespace gapi.client {
1829
1839
  },
1830
1840
  body: InstancesAcquireSsrsLeaseRequest
1831
1841
  ): Request<SqlInstancesAcquireSsrsLeaseResponse>;
1832
- /** Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. */
1842
+ /** Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate. */
1833
1843
  addServerCa(request?: {
1834
1844
  /** V1 error format. */
1835
1845
  '$.xgafv'?: string;
@@ -2712,7 +2722,7 @@ declare namespace gapi.client {
2712
2722
  },
2713
2723
  body: InstancesRestoreBackupRequest
2714
2724
  ): Request<Operation>;
2715
- /** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. */
2725
+ /** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate. */
2716
2726
  rotateServerCa(request: {
2717
2727
  /** V1 error format. */
2718
2728
  '$.xgafv'?: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.sqladmin-v1",
3
- "version": "0.0.20240709",
3
+ "version": "0.0.20240724",
4
4
  "description": "TypeScript typings for Cloud SQL Admin API v1",
5
5
  "repository": {
6
6
  "type": "git",
package/readme.md CHANGED
@@ -185,7 +185,7 @@ await gapi.client.sql.instances.acquireSsrsLease({
185
185
  });
186
186
 
187
187
  /*
188
- Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.
188
+ Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.
189
189
  */
190
190
  await gapi.client.sql.instances.addServerCa({
191
191
  instance: 'instance',
@@ -328,7 +328,7 @@ await gapi.client.sql.instances.restoreBackup({
328
328
  });
329
329
 
330
330
  /*
331
- Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.
331
+ Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.
332
332
  */
333
333
  await gapi.client.sql.instances.rotateServerCa({
334
334
  instance: 'instance',