@maxim_mazurok/gapi.client.sqladmin-v1beta4 0.0.20240709 → 0.0.20240724
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +13 -3
- package/package.json +1 -1
- package/readme.md +2 -2
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://sqladmin.googleapis.com/$discovery/rest?version=v1beta4
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240724
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -131,6 +131,8 @@ declare namespace gapi.client {
|
|
|
131
131
|
kind?: string;
|
|
132
132
|
/** Location of the backups. */
|
|
133
133
|
location?: string;
|
|
134
|
+
/** Output only. The maximum chargeable bytes for the backup. */
|
|
135
|
+
maxChargeableBytes?: string;
|
|
134
136
|
/** The URI of this resource. */
|
|
135
137
|
selfLink?: string;
|
|
136
138
|
/** The time the backup operation actually started in UTC timezone in [RFC 3339](https://tools.ietf.org/html/rfc3339) format, for example `2012-11-15T16:19:00.094Z`. */
|
|
@@ -195,6 +197,8 @@ declare namespace gapi.client {
|
|
|
195
197
|
region?: string;
|
|
196
198
|
/** SSL configuration. */
|
|
197
199
|
serverCaCert?: SslCert;
|
|
200
|
+
/** Specify what type of CA is used for the server certificate. */
|
|
201
|
+
serverCaMode?: string;
|
|
198
202
|
}
|
|
199
203
|
interface Database {
|
|
200
204
|
/** The Cloud SQL charset value. */
|
|
@@ -291,6 +295,8 @@ declare namespace gapi.client {
|
|
|
291
295
|
replicationCluster?: ReplicationCluster;
|
|
292
296
|
/** Initial root password. Use only on creation. You must set root passwords before you can connect to PostgreSQL instances. */
|
|
293
297
|
rootPassword?: string;
|
|
298
|
+
/** Output only. This status indicates whether the instance satisfies PZI. The status is reserved for future use. */
|
|
299
|
+
satisfiesPzi?: boolean;
|
|
294
300
|
/** This status indicates whether the instance satisfies PZS. The status is reserved for future use. */
|
|
295
301
|
satisfiesPzs?: boolean;
|
|
296
302
|
/** The start time of any upcoming scheduled maintenance for this instance. */
|
|
@@ -311,6 +317,8 @@ declare namespace gapi.client {
|
|
|
311
317
|
state?: string;
|
|
312
318
|
/** If the instance state is SUSPENDED, the reason for the suspension. */
|
|
313
319
|
suspensionReason?: string[];
|
|
320
|
+
/** Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage. */
|
|
321
|
+
switchTransactionLogsToCloudStorageEnabled?: boolean;
|
|
314
322
|
/** Output only. All database versions that are available for upgrade. */
|
|
315
323
|
upgradableDatabaseVersions?: AvailableDatabaseVersion[];
|
|
316
324
|
/** Output only. The dns name of the primary instance in a replication group. */
|
|
@@ -668,6 +676,8 @@ declare namespace gapi.client {
|
|
|
668
676
|
pscConfig?: PscConfig;
|
|
669
677
|
/** Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the legacy `require_ssl` flag. */
|
|
670
678
|
requireSsl?: boolean;
|
|
679
|
+
/** Specify what type of CA is used for the server certificate. */
|
|
680
|
+
serverCaMode?: string;
|
|
671
681
|
/** Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections. */
|
|
672
682
|
sslMode?: string;
|
|
673
683
|
}
|
|
@@ -1834,7 +1844,7 @@ declare namespace gapi.client {
|
|
|
1834
1844
|
},
|
|
1835
1845
|
body: InstancesAcquireSsrsLeaseRequest
|
|
1836
1846
|
): Request<SqlInstancesAcquireSsrsLeaseResponse>;
|
|
1837
|
-
/** Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. */
|
|
1847
|
+
/** Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate. */
|
|
1838
1848
|
addServerCa(request?: {
|
|
1839
1849
|
/** V1 error format. */
|
|
1840
1850
|
'$.xgafv'?: string;
|
|
@@ -2717,7 +2727,7 @@ declare namespace gapi.client {
|
|
|
2717
2727
|
},
|
|
2718
2728
|
body: InstancesRestoreBackupRequest
|
|
2719
2729
|
): Request<Operation>;
|
|
2720
|
-
/** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. */
|
|
2730
|
+
/** Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate. */
|
|
2721
2731
|
rotateServerCa(request: {
|
|
2722
2732
|
/** V1 error format. */
|
|
2723
2733
|
'$.xgafv'?: string;
|
package/package.json
CHANGED
package/readme.md
CHANGED
|
@@ -185,7 +185,7 @@ await gapi.client.sql.instances.acquireSsrsLease({
|
|
|
185
185
|
});
|
|
186
186
|
|
|
187
187
|
/*
|
|
188
|
-
Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.
|
|
188
|
+
Add a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.
|
|
189
189
|
*/
|
|
190
190
|
await gapi.client.sql.instances.addServerCa({
|
|
191
191
|
instance: 'instance',
|
|
@@ -328,7 +328,7 @@ await gapi.client.sql.instances.restoreBackup({
|
|
|
328
328
|
});
|
|
329
329
|
|
|
330
330
|
/*
|
|
331
|
-
Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.
|
|
331
|
+
Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.
|
|
332
332
|
*/
|
|
333
333
|
await gapi.client.sql.instances.rotateServerCa({
|
|
334
334
|
instance: 'instance',
|