You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/datastream_v1.projects.locations.connectionProfiles.html
+50Lines changed: 50 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -181,6 +181,16 @@ <h3>Method Details</h3>
181
181
"hostname": "A String", # Required. Hostname for the PostgreSQL connection.
182
182
"password": "A String", # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
183
183
"port": 42, # Port for the PostgreSQL connection, default value is 5432.
184
+
"sslConfig": { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
185
+
"serverAndClientVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
186
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
187
+
"clientCertificate": "A String", # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
188
+
"clientKey": "A String", # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.
189
+
},
190
+
"serverVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
191
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
192
+
},
193
+
},
184
194
"username": "A String", # Required. Username for the PostgreSQL connection.
"hostname": "A String", # Required. Hostname for the PostgreSQL connection.
346
356
"password": "A String", # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
347
357
"port": 42, # Port for the PostgreSQL connection, default value is 5432.
358
+
"sslConfig": { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
359
+
"serverAndClientVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
360
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
361
+
"clientCertificate": "A String", # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
362
+
"clientKey": "A String", # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.
363
+
},
364
+
"serverVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
365
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
366
+
},
367
+
},
348
368
"username": "A String", # Required. Username for the PostgreSQL connection.
"hostname": "A String", # Required. Hostname for the PostgreSQL connection.
657
677
"password": "A String", # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
658
678
"port": 42, # Port for the PostgreSQL connection, default value is 5432.
679
+
"sslConfig": { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
680
+
"serverAndClientVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
681
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
682
+
"clientCertificate": "A String", # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
683
+
"clientKey": "A String", # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.
684
+
},
685
+
"serverVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
686
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
687
+
},
688
+
},
659
689
"username": "A String", # Required. Username for the PostgreSQL connection.
"hostname": "A String", # Required. Hostname for the PostgreSQL connection.
763
793
"password": "A String", # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
764
794
"port": 42, # Port for the PostgreSQL connection, default value is 5432.
795
+
"sslConfig": { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
796
+
"serverAndClientVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
797
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
798
+
"clientCertificate": "A String", # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
799
+
"clientKey": "A String", # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.
800
+
},
801
+
"serverVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
802
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
803
+
},
804
+
},
765
805
"username": "A String", # Required. Username for the PostgreSQL connection.
"hostname": "A String", # Required. Hostname for the PostgreSQL connection.
878
918
"password": "A String", # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
879
919
"port": 42, # Port for the PostgreSQL connection, default value is 5432.
920
+
"sslConfig": { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
921
+
"serverAndClientVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
922
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
923
+
"clientCertificate": "A String", # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
924
+
"clientKey": "A String", # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.
925
+
},
926
+
"serverVerification": { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
927
+
"caCertificate": "A String", # Required. Input only. PEM-encoded server root CA certificate.
928
+
},
929
+
},
880
930
"username": "A String", # Required. Username for the PostgreSQL connection.
Copy file name to clipboardExpand all lines: googleapiclient/discovery_cache/documents/datastream.v1.json
+50-1Lines changed: 50 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1250,7 +1250,7 @@
1250
1250
}
1251
1251
}
1252
1252
},
1253
-
"revision": "20241204",
1253
+
"revision": "20250101",
1254
1254
"rootUrl": "https://datastream.googleapis.com/",
1255
1255
"schemas": {
1256
1256
"AppendOnly": {
@@ -2683,6 +2683,10 @@
2683
2683
"format": "int32",
2684
2684
"type": "integer"
2685
2685
},
2686
+
"sslConfig": {
2687
+
"$ref": "PostgresqlSslConfig",
2688
+
"description": "Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)"
2689
+
},
2686
2690
"username": {
2687
2691
"description": "Required. Username for the PostgreSQL connection.",
"description": "If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated."
2764
+
},
2765
+
"serverVerification": {
2766
+
"$ref": "ServerVerification",
2767
+
"description": " If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated."
2768
+
}
2769
+
},
2770
+
"type": "object"
2771
+
},
2753
2772
"PostgresqlTable": {
2754
2773
"description": "PostgreSQL table.",
2755
2774
"id": "PostgresqlTable",
@@ -2903,6 +2922,36 @@
2903
2922
},
2904
2923
"type": "object"
2905
2924
},
2925
+
"ServerAndClientVerification": {
2926
+
"description": "Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option.",
2927
+
"id": "ServerAndClientVerification",
2928
+
"properties": {
2929
+
"caCertificate": {
2930
+
"description": "Required. Input only. PEM-encoded server root CA certificate.",
2931
+
"type": "string"
2932
+
},
2933
+
"clientCertificate": {
2934
+
"description": "Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.",
2935
+
"type": "string"
2936
+
},
2937
+
"clientKey": {
2938
+
"description": "Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.",
2939
+
"type": "string"
2940
+
}
2941
+
},
2942
+
"type": "object"
2943
+
},
2944
+
"ServerVerification": {
2945
+
"description": "Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option.",
2946
+
"id": "ServerVerification",
2947
+
"properties": {
2948
+
"caCertificate": {
2949
+
"description": "Required. Input only. PEM-encoded server root CA certificate.",
2950
+
"type": "string"
2951
+
}
2952
+
},
2953
+
"type": "object"
2954
+
},
2906
2955
"SingleTargetDataset": {
2907
2956
"description": "A single target dataset to which all data will be streamed.",
0 commit comments