@maxim_mazurok/gapi.client.sqladmin-v1beta4 0.0.20240317 → 0.0.20240324
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +10 -3
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://sqladmin.googleapis.com/$discovery/rest?version=v1beta4
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240324
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -538,6 +538,13 @@ declare namespace gapi.client {
|
|
|
538
538
|
importUser?: string;
|
|
539
539
|
/** This is always `sql#importContext`. */
|
|
540
540
|
kind?: string;
|
|
541
|
+
/** Optional. Options for importing data from SQL statements. */
|
|
542
|
+
sqlImportOptions?: {
|
|
543
|
+
/** Optional. Whether or not the import should be parallel. */
|
|
544
|
+
parallel?: boolean;
|
|
545
|
+
/** Optional. The number of threads to use for parallel import. */
|
|
546
|
+
threads?: number;
|
|
547
|
+
};
|
|
541
548
|
/** Path to the import file in Cloud Storage, in the form `gs://bucketName/fileName`. Compressed gzip files (.gz) are supported when `fileType` is `SQL`. The instance must have write permissions to the bucket and read access to the file. */
|
|
542
549
|
uri?: string;
|
|
543
550
|
}
|
|
@@ -635,9 +642,9 @@ declare namespace gapi.client {
|
|
|
635
642
|
privateNetwork?: string;
|
|
636
643
|
/** PSC settings for this instance. */
|
|
637
644
|
pscConfig?: PscConfig;
|
|
638
|
-
/** Use `ssl_mode` instead
|
|
645
|
+
/** Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the legacy `require_ssl` flag. */
|
|
639
646
|
requireSsl?: boolean;
|
|
640
|
-
/** Specify how SSL/TLS is enforced in database connections.
|
|
647
|
+
/** Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` gets priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, the `ssl_mode=ENCRYPTED_ONLY` means only accept SSL connections, while the `require_ssl=false` means accept both non-SSL and SSL connections. MySQL and PostgreSQL databases respect `ssl_mode` in this case and accept only SSL connections. */
|
|
641
648
|
sslMode?: string;
|
|
642
649
|
}
|
|
643
650
|
interface IpMapping {
|