Skip to content

Commit b252f43

Browse files
feat(datastream): update the api
#### datastream:v1 The following keys were added: - schemas.PostgresqlProfile.properties.sslConfig.$ref (Total Keys: 1) - schemas.PostgresqlSslConfig (Total Keys: 4) - schemas.ServerAndClientVerification (Total Keys: 5) - schemas.ServerVerification (Total Keys: 3)
1 parent 7bb3465 commit b252f43

File tree

2 files changed

+100
-1
lines changed

2 files changed

+100
-1
lines changed

docs/dyn/datastream_v1.projects.locations.connectionProfiles.html

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,16 @@ <h3>Method Details</h3>
181181
&quot;hostname&quot;: &quot;A String&quot;, # Required. Hostname for the PostgreSQL connection.
182182
&quot;password&quot;: &quot;A String&quot;, # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
183183
&quot;port&quot;: 42, # Port for the PostgreSQL connection, default value is 5432.
184+
&quot;sslConfig&quot;: { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
185+
&quot;serverAndClientVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
186+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
187+
&quot;clientCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream&#x27;s identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
188+
&quot;clientKey&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client&#x27;s identity, i.e. identity of the Datastream.
189+
},
190+
&quot;serverVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
191+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
192+
},
193+
},
184194
&quot;username&quot;: &quot;A String&quot;, # Required. Username for the PostgreSQL connection.
185195
},
186196
&quot;privateConnectivity&quot;: { # Private Connectivity # Private connectivity.
@@ -345,6 +355,16 @@ <h3>Method Details</h3>
345355
&quot;hostname&quot;: &quot;A String&quot;, # Required. Hostname for the PostgreSQL connection.
346356
&quot;password&quot;: &quot;A String&quot;, # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
347357
&quot;port&quot;: 42, # Port for the PostgreSQL connection, default value is 5432.
358+
&quot;sslConfig&quot;: { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
359+
&quot;serverAndClientVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
360+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
361+
&quot;clientCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream&#x27;s identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
362+
&quot;clientKey&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client&#x27;s identity, i.e. identity of the Datastream.
363+
},
364+
&quot;serverVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
365+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
366+
},
367+
},
348368
&quot;username&quot;: &quot;A String&quot;, # Required. Username for the PostgreSQL connection.
349369
},
350370
&quot;privateConnectivity&quot;: { # Private Connectivity # Private connectivity.
@@ -656,6 +676,16 @@ <h3>Method Details</h3>
656676
&quot;hostname&quot;: &quot;A String&quot;, # Required. Hostname for the PostgreSQL connection.
657677
&quot;password&quot;: &quot;A String&quot;, # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
658678
&quot;port&quot;: 42, # Port for the PostgreSQL connection, default value is 5432.
679+
&quot;sslConfig&quot;: { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
680+
&quot;serverAndClientVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
681+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
682+
&quot;clientCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream&#x27;s identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
683+
&quot;clientKey&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client&#x27;s identity, i.e. identity of the Datastream.
684+
},
685+
&quot;serverVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
686+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
687+
},
688+
},
659689
&quot;username&quot;: &quot;A String&quot;, # Required. Username for the PostgreSQL connection.
660690
},
661691
&quot;privateConnectivity&quot;: { # Private Connectivity # Private connectivity.
@@ -762,6 +792,16 @@ <h3>Method Details</h3>
762792
&quot;hostname&quot;: &quot;A String&quot;, # Required. Hostname for the PostgreSQL connection.
763793
&quot;password&quot;: &quot;A String&quot;, # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
764794
&quot;port&quot;: 42, # Port for the PostgreSQL connection, default value is 5432.
795+
&quot;sslConfig&quot;: { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
796+
&quot;serverAndClientVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
797+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
798+
&quot;clientCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream&#x27;s identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
799+
&quot;clientKey&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client&#x27;s identity, i.e. identity of the Datastream.
800+
},
801+
&quot;serverVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
802+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
803+
},
804+
},
765805
&quot;username&quot;: &quot;A String&quot;, # Required. Username for the PostgreSQL connection.
766806
},
767807
&quot;privateConnectivity&quot;: { # Private Connectivity # Private connectivity.
@@ -877,6 +917,16 @@ <h3>Method Details</h3>
877917
&quot;hostname&quot;: &quot;A String&quot;, # Required. Hostname for the PostgreSQL connection.
878918
&quot;password&quot;: &quot;A String&quot;, # Optional. Password for the PostgreSQL connection. Mutually exclusive with the `secret_manager_stored_password` field.
879919
&quot;port&quot;: 42, # Port for the PostgreSQL connection, default value is 5432.
920+
&quot;sslConfig&quot;: { # PostgreSQL SSL configuration information. # Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)
921+
&quot;serverAndClientVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated.
922+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
923+
&quot;clientCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream&#x27;s identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.
924+
&quot;clientKey&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client&#x27;s identity, i.e. identity of the Datastream.
925+
},
926+
&quot;serverVerification&quot;: { # Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option. # If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated.
927+
&quot;caCertificate&quot;: &quot;A String&quot;, # Required. Input only. PEM-encoded server root CA certificate.
928+
},
929+
},
880930
&quot;username&quot;: &quot;A String&quot;, # Required. Username for the PostgreSQL connection.
881931
},
882932
&quot;privateConnectivity&quot;: { # Private Connectivity # Private connectivity.

googleapiclient/discovery_cache/documents/datastream.v1.json

Lines changed: 50 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1250,7 +1250,7 @@
12501250
}
12511251
}
12521252
},
1253-
"revision": "20241204",
1253+
"revision": "20250101",
12541254
"rootUrl": "https://datastream.googleapis.com/",
12551255
"schemas": {
12561256
"AppendOnly": {
@@ -2683,6 +2683,10 @@
26832683
"format": "int32",
26842684
"type": "integer"
26852685
},
2686+
"sslConfig": {
2687+
"$ref": "PostgresqlSslConfig",
2688+
"description": "Optional. SSL configuration for the PostgreSQL connection. In case PostgresqlSslConfig is not set, the connection will use the default SSL mode, which is `prefer` (i.e. this mode will only use encryption if enabled from database side, otherwise will use unencrypted communication)"
2689+
},
26862690
"username": {
26872691
"description": "Required. Username for the PostgreSQL connection.",
26882692
"type": "string"
@@ -2750,6 +2754,21 @@
27502754
},
27512755
"type": "object"
27522756
},
2757+
"PostgresqlSslConfig": {
2758+
"description": "PostgreSQL SSL configuration information.",
2759+
"id": "PostgresqlSslConfig",
2760+
"properties": {
2761+
"serverAndClientVerification": {
2762+
"$ref": "ServerAndClientVerification",
2763+
"description": "If this field is set, the communication will be encrypted with TLS encryption and both the server identity and the client identity will be authenticated."
2764+
},
2765+
"serverVerification": {
2766+
"$ref": "ServerVerification",
2767+
"description": " If this field is set, the communication will be encrypted with TLS encryption and the server identity will be authenticated."
2768+
}
2769+
},
2770+
"type": "object"
2771+
},
27532772
"PostgresqlTable": {
27542773
"description": "PostgreSQL table.",
27552774
"id": "PostgresqlTable",
@@ -2903,6 +2922,36 @@
29032922
},
29042923
"type": "object"
29052924
},
2925+
"ServerAndClientVerification": {
2926+
"description": "Message represents the option where Datastream will enforce the encryption and authenticate the server identity as well as the client identity. ca_certificate, client_certificate and client_key must be set if user selects this option.",
2927+
"id": "ServerAndClientVerification",
2928+
"properties": {
2929+
"caCertificate": {
2930+
"description": "Required. Input only. PEM-encoded server root CA certificate.",
2931+
"type": "string"
2932+
},
2933+
"clientCertificate": {
2934+
"description": "Required. Input only. PEM-encoded certificate used by the source database to authenticate the client identity (i.e., the Datastream's identity). This certificate is signed by either a root certificate trusted by the server or one or more intermediate certificates (which is stored with the leaf certificate) to link the this certificate to the trusted root certificate.",
2935+
"type": "string"
2936+
},
2937+
"clientKey": {
2938+
"description": "Required. Input only. PEM-encoded private key associated with the client certificate. This value will be used during the SSL/TLS handshake, allowing the PostgreSQL server to authenticate the client's identity, i.e. identity of the Datastream.",
2939+
"type": "string"
2940+
}
2941+
},
2942+
"type": "object"
2943+
},
2944+
"ServerVerification": {
2945+
"description": "Message represents the option where Datastream will enforce the encryption and authenticate the server identity. ca_certificate must be set if user selects this option.",
2946+
"id": "ServerVerification",
2947+
"properties": {
2948+
"caCertificate": {
2949+
"description": "Required. Input only. PEM-encoded server root CA certificate.",
2950+
"type": "string"
2951+
}
2952+
},
2953+
"type": "object"
2954+
},
29062955
"SingleTargetDataset": {
29072956
"description": "A single target dataset to which all data will be streamed.",
29082957
"id": "SingleTargetDataset",

0 commit comments

Comments
 (0)