Skip to content

Commit ba212b8

Browse files
feat(sqladmin): update the api
#### sqladmin:v1 The following keys were added: - schemas.ConnectSettings.properties.serverCaMode.type (Total Keys: 1) - schemas.DatabaseInstance.properties.switchTransactionLogsToCloudStorageEnabled.type (Total Keys: 1) - schemas.IpConfiguration.properties.serverCaMode.type (Total Keys: 1) #### sqladmin:v1beta4 The following keys were added: - schemas.ConnectSettings.properties.serverCaMode.type (Total Keys: 1) - schemas.DatabaseInstance.properties.switchTransactionLogsToCloudStorageEnabled.type (Total Keys: 1) - schemas.IpConfiguration.properties.serverCaMode.type (Total Keys: 1)
1 parent 0b47798 commit ba212b8

File tree

6 files changed

+118
-22
lines changed

6 files changed

+118
-22
lines changed

docs/dyn/sqladmin_v1.connect.html

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,7 @@ <h3>Method Details</h3>
170170
&quot;selfLink&quot;: &quot;A String&quot;, # The URI of this resource.
171171
&quot;sha1Fingerprint&quot;: &quot;A String&quot;, # Sha1 Fingerprint.
172172
},
173+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
173174
}</pre>
174175
</div>
175176

docs/dyn/sqladmin_v1.instances.html

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ <h2>Instance Methods</h2>
7979
<p class="firstline">Acquire a lease for the setup of SQL Server Reporting Services (SSRS).</p>
8080
<p class="toc_element">
8181
<code><a href="#addServerCa">addServerCa(project, instance, x__xgafv=None)</a></code></p>
82-
<p class="firstline">Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.</p>
82+
<p class="firstline">Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.</p>
8383
<p class="toc_element">
8484
<code><a href="#clone">clone(project, instance, body=None, x__xgafv=None)</a></code></p>
8585
<p class="firstline">Creates a Cloud SQL instance as a clone of the source instance. Using this operation might cause your instance to restart.</p>
@@ -142,7 +142,7 @@ <h2>Instance Methods</h2>
142142
<p class="firstline">Restores a backup of a Cloud SQL instance. Using this operation might cause your instance to restart.</p>
143143
<p class="toc_element">
144144
<code><a href="#rotateServerCa">rotateServerCa(project, instance, body=None, x__xgafv=None)</a></code></p>
145-
<p class="firstline">Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.</p>
145+
<p class="firstline">Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.</p>
146146
<p class="toc_element">
147147
<code><a href="#startReplica">startReplica(project, instance, x__xgafv=None)</a></code></p>
148148
<p class="firstline">Starts the replication in the read replica instance.</p>
@@ -193,7 +193,7 @@ <h3>Method Details</h3>
193193

194194
<div class="method">
195195
<code class="details" id="addServerCa">addServerCa(project, instance, x__xgafv=None)</code>
196-
<pre>Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.
196+
<pre>Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.
197197

198198
Args:
199199
project: string, Project ID of the project that contains the instance. (required)
@@ -1443,6 +1443,7 @@ <h3>Method Details</h3>
14431443
&quot;pscEnabled&quot;: True or False, # Whether PSC connectivity is enabled for this instance.
14441444
},
14451445
&quot;requireSsl&quot;: True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won&#x27;t be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
1446+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
14461447
&quot;sslMode&quot;: &quot;A String&quot;, # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
14471448
},
14481449
&quot;kind&quot;: &quot;A String&quot;, # This is always `sql#settings`.
@@ -1489,6 +1490,7 @@ <h3>Method Details</h3>
14891490
&quot;suspensionReason&quot;: [ # If the instance state is SUSPENDED, the reason for the suspension.
14901491
&quot;A String&quot;,
14911492
],
1493+
&quot;switchTransactionLogsToCloudStorageEnabled&quot;: True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
14921494
&quot;upgradableDatabaseVersions&quot;: [ # Output only. All database versions that are available for upgrade.
14931495
{ # An available database version. It can be a major or a minor version.
14941496
&quot;displayName&quot;: &quot;A String&quot;, # The database version&#x27;s display name.
@@ -1884,6 +1886,7 @@ <h3>Method Details</h3>
18841886
&quot;pscEnabled&quot;: True or False, # Whether PSC connectivity is enabled for this instance.
18851887
},
18861888
&quot;requireSsl&quot;: True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won&#x27;t be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
1889+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
18871890
&quot;sslMode&quot;: &quot;A String&quot;, # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
18881891
},
18891892
&quot;kind&quot;: &quot;A String&quot;, # This is always `sql#settings`.
@@ -1930,6 +1933,7 @@ <h3>Method Details</h3>
19301933
&quot;suspensionReason&quot;: [ # If the instance state is SUSPENDED, the reason for the suspension.
19311934
&quot;A String&quot;,
19321935
],
1936+
&quot;switchTransactionLogsToCloudStorageEnabled&quot;: True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
19331937
&quot;upgradableDatabaseVersions&quot;: [ # Output only. All database versions that are available for upgrade.
19341938
{ # An available database version. It can be a major or a minor version.
19351939
&quot;displayName&quot;: &quot;A String&quot;, # The database version&#x27;s display name.
@@ -2283,6 +2287,7 @@ <h3>Method Details</h3>
22832287
&quot;pscEnabled&quot;: True or False, # Whether PSC connectivity is enabled for this instance.
22842288
},
22852289
&quot;requireSsl&quot;: True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won&#x27;t be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
2290+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
22862291
&quot;sslMode&quot;: &quot;A String&quot;, # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
22872292
},
22882293
&quot;kind&quot;: &quot;A String&quot;, # This is always `sql#settings`.
@@ -2329,6 +2334,7 @@ <h3>Method Details</h3>
23292334
&quot;suspensionReason&quot;: [ # If the instance state is SUSPENDED, the reason for the suspension.
23302335
&quot;A String&quot;,
23312336
],
2337+
&quot;switchTransactionLogsToCloudStorageEnabled&quot;: True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
23322338
&quot;upgradableDatabaseVersions&quot;: [ # Output only. All database versions that are available for upgrade.
23332339
{ # An available database version. It can be a major or a minor version.
23342340
&quot;displayName&quot;: &quot;A String&quot;, # The database version&#x27;s display name.
@@ -2608,6 +2614,7 @@ <h3>Method Details</h3>
26082614
&quot;pscEnabled&quot;: True or False, # Whether PSC connectivity is enabled for this instance.
26092615
},
26102616
&quot;requireSsl&quot;: True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won&#x27;t be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
2617+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
26112618
&quot;sslMode&quot;: &quot;A String&quot;, # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
26122619
},
26132620
&quot;kind&quot;: &quot;A String&quot;, # This is always `sql#settings`.
@@ -2654,6 +2661,7 @@ <h3>Method Details</h3>
26542661
&quot;suspensionReason&quot;: [ # If the instance state is SUSPENDED, the reason for the suspension.
26552662
&quot;A String&quot;,
26562663
],
2664+
&quot;switchTransactionLogsToCloudStorageEnabled&quot;: True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
26572665
&quot;upgradableDatabaseVersions&quot;: [ # Output only. All database versions that are available for upgrade.
26582666
{ # An available database version. It can be a major or a minor version.
26592667
&quot;displayName&quot;: &quot;A String&quot;, # The database version&#x27;s display name.
@@ -3494,7 +3502,7 @@ <h3>Method Details</h3>
34943502

34953503
<div class="method">
34963504
<code class="details" id="rotateServerCa">rotateServerCa(project, instance, body=None, x__xgafv=None)</code>
3497-
<pre>Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.
3505+
<pre>Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.
34983506

34993507
Args:
35003508
project: string, Project ID of the project that contains the instance. (required)
@@ -4382,6 +4390,7 @@ <h3>Method Details</h3>
43824390
&quot;pscEnabled&quot;: True or False, # Whether PSC connectivity is enabled for this instance.
43834391
},
43844392
&quot;requireSsl&quot;: True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won&#x27;t be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
4393+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
43854394
&quot;sslMode&quot;: &quot;A String&quot;, # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
43864395
},
43874396
&quot;kind&quot;: &quot;A String&quot;, # This is always `sql#settings`.
@@ -4428,6 +4437,7 @@ <h3>Method Details</h3>
44284437
&quot;suspensionReason&quot;: [ # If the instance state is SUSPENDED, the reason for the suspension.
44294438
&quot;A String&quot;,
44304439
],
4440+
&quot;switchTransactionLogsToCloudStorageEnabled&quot;: True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
44314441
&quot;upgradableDatabaseVersions&quot;: [ # Output only. All database versions that are available for upgrade.
44324442
{ # An available database version. It can be a major or a minor version.
44334443
&quot;displayName&quot;: &quot;A String&quot;, # The database version&#x27;s display name.

docs/dyn/sqladmin_v1beta4.connect.html

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,7 @@ <h3>Method Details</h3>
170170
&quot;selfLink&quot;: &quot;A String&quot;, # The URI of this resource.
171171
&quot;sha1Fingerprint&quot;: &quot;A String&quot;, # Sha1 Fingerprint.
172172
},
173+
&quot;serverCaMode&quot;: &quot;A String&quot;, # Specify what type of CA is used for the server certificate.
173174
}</pre>
174175
</div>
175176

0 commit comments

Comments
 (0)