You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="firstline">Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.</p>
82
+
<pclass="firstline">Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.</p>
<pclass="firstline">Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.</p>
145
+
<pclass="firstline">Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.</p>
<pre>Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in.
196
+
<pre>Adds a new trusted Certificate Authority (CA) version for the specified instance. Required to prepare for a certificate rotation. If a CA version was previously added but never used in a certificate rotation, this operation replaces that version. There cannot be more than one CA version waiting to be rotated in. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use AddServerCertificate to add a new server certificate.
197
197
198
198
Args:
199
199
project: string, Project ID of the project that contains the instance. (required)
@@ -1443,6 +1443,7 @@ <h3>Method Details</h3>
1443
1443
"pscEnabled": True or False, # Whether PSC connectivity is enabled for this instance.
1444
1444
},
1445
1445
"requireSsl": True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
1446
+
"serverCaMode": "A String", # Specify what type of CA is used for the server certificate.
1446
1447
"sslMode": "A String", # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
1447
1448
},
1448
1449
"kind": "A String", # This is always `sql#settings`.
@@ -1489,6 +1490,7 @@ <h3>Method Details</h3>
1489
1490
"suspensionReason": [ # If the instance state is SUSPENDED, the reason for the suspension.
1490
1491
"A String",
1491
1492
],
1493
+
"switchTransactionLogsToCloudStorageEnabled": True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
1492
1494
"upgradableDatabaseVersions": [ # Output only. All database versions that are available for upgrade.
1493
1495
{ # An available database version. It can be a major or a minor version.
1494
1496
"displayName": "A String", # The database version's display name.
@@ -1884,6 +1886,7 @@ <h3>Method Details</h3>
1884
1886
"pscEnabled": True or False, # Whether PSC connectivity is enabled for this instance.
1885
1887
},
1886
1888
"requireSsl": True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
1889
+
"serverCaMode": "A String", # Specify what type of CA is used for the server certificate.
1887
1890
"sslMode": "A String", # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
1888
1891
},
1889
1892
"kind": "A String", # This is always `sql#settings`.
@@ -1930,6 +1933,7 @@ <h3>Method Details</h3>
1930
1933
"suspensionReason": [ # If the instance state is SUSPENDED, the reason for the suspension.
1931
1934
"A String",
1932
1935
],
1936
+
"switchTransactionLogsToCloudStorageEnabled": True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
1933
1937
"upgradableDatabaseVersions": [ # Output only. All database versions that are available for upgrade.
1934
1938
{ # An available database version. It can be a major or a minor version.
1935
1939
"displayName": "A String", # The database version's display name.
@@ -2283,6 +2287,7 @@ <h3>Method Details</h3>
2283
2287
"pscEnabled": True or False, # Whether PSC connectivity is enabled for this instance.
2284
2288
},
2285
2289
"requireSsl": True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
2290
+
"serverCaMode": "A String", # Specify what type of CA is used for the server certificate.
2286
2291
"sslMode": "A String", # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
2287
2292
},
2288
2293
"kind": "A String", # This is always `sql#settings`.
@@ -2329,6 +2334,7 @@ <h3>Method Details</h3>
2329
2334
"suspensionReason": [ # If the instance state is SUSPENDED, the reason for the suspension.
2330
2335
"A String",
2331
2336
],
2337
+
"switchTransactionLogsToCloudStorageEnabled": True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
2332
2338
"upgradableDatabaseVersions": [ # Output only. All database versions that are available for upgrade.
2333
2339
{ # An available database version. It can be a major or a minor version.
2334
2340
"displayName": "A String", # The database version's display name.
@@ -2608,6 +2614,7 @@ <h3>Method Details</h3>
2608
2614
"pscEnabled": True or False, # Whether PSC connectivity is enabled for this instance.
2609
2615
},
2610
2616
"requireSsl": True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
2617
+
"serverCaMode": "A String", # Specify what type of CA is used for the server certificate.
2611
2618
"sslMode": "A String", # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
2612
2619
},
2613
2620
"kind": "A String", # This is always `sql#settings`.
@@ -2654,6 +2661,7 @@ <h3>Method Details</h3>
2654
2661
"suspensionReason": [ # If the instance state is SUSPENDED, the reason for the suspension.
2655
2662
"A String",
2656
2663
],
2664
+
"switchTransactionLogsToCloudStorageEnabled": True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
2657
2665
"upgradableDatabaseVersions": [ # Output only. All database versions that are available for upgrade.
2658
2666
{ # An available database version. It can be a major or a minor version.
2659
2667
"displayName": "A String", # The database version's display name.
<pre>Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method.
3505
+
<pre>Rotates the server certificate to one signed by the Certificate Authority (CA) version previously added with the addServerCA method. For instances that have enabled Certificate Authority Service (CAS) based server CA, please use RotateServerCertificate to rotate the server certificate.
3498
3506
3499
3507
Args:
3500
3508
project: string, Project ID of the project that contains the instance. (required)
@@ -4382,6 +4390,7 @@ <h3>Method Details</h3>
4382
4390
"pscEnabled": True or False, # Whether PSC connectivity is enabled for this instance.
4383
4391
},
4384
4392
"requireSsl": True or False, # Use `ssl_mode` instead. Whether SSL/TLS connections over IP are enforced. If set to false, then allow both non-SSL/non-TLS and SSL/TLS connections. For SSL/TLS connections, the client certificate won't be verified. If set to true, then only allow connections encrypted with SSL/TLS and with valid client certificates. If you want to enforce SSL/TLS without enforcing the requirement for valid client certificates, then use the `ssl_mode` flag instead of the `require_ssl` flag.
4393
+
"serverCaMode": "A String", # Specify what type of CA is used for the server certificate.
4385
4394
"sslMode": "A String", # Specify how SSL/TLS is enforced in database connections. If you must use the `require_ssl` flag for backward compatibility, then only the following value pairs are valid: For PostgreSQL and MySQL: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false` * `ssl_mode=TRUSTED_CLIENT_CERTIFICATE_REQUIRED` and `require_ssl=true` For SQL Server: * `ssl_mode=ALLOW_UNENCRYPTED_AND_ENCRYPTED` and `require_ssl=false` * `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=true` The value of `ssl_mode` has priority over the value of `require_ssl`. For example, for the pair `ssl_mode=ENCRYPTED_ONLY` and `require_ssl=false`, `ssl_mode=ENCRYPTED_ONLY` means accept only SSL connections, while `require_ssl=false` means accept both non-SSL and SSL connections. In this case, MySQL and PostgreSQL databases respect `ssl_mode` and accepts only SSL connections.
4386
4395
},
4387
4396
"kind": "A String", # This is always `sql#settings`.
@@ -4428,6 +4437,7 @@ <h3>Method Details</h3>
4428
4437
"suspensionReason": [ # If the instance state is SUSPENDED, the reason for the suspension.
4429
4438
"A String",
4430
4439
],
4440
+
"switchTransactionLogsToCloudStorageEnabled": True or False, # Input only. Whether Cloud SQL is enabled to switch storing point-in-time recovery log files from a data disk to Cloud Storage.
4431
4441
"upgradableDatabaseVersions": [ # Output only. All database versions that are available for upgrade.
4432
4442
{ # An available database version. It can be a major or a minor version.
4433
4443
"displayName": "A String", # The database version's display name.
0 commit comments