From 7b6cc062967ddff9971dc61eac0cfb3dbe116f42 Mon Sep 17 00:00:00 2001 From: Amanda Tarafa Mas Date: Wed, 18 Dec 2024 01:07:02 -0800 Subject: [PATCH] feat: Generate Google.Apis.CloudRedis.v1 version 1.68.0.3633 --- DiscoveryJson/redis.v1.json | 22 ++++++++++++++----- .../Google.Apis.CloudRedis.v1.csproj | 2 +- 2 files changed, 18 insertions(+), 6 deletions(-) diff --git a/DiscoveryJson/redis.v1.json b/DiscoveryJson/redis.v1.json index 208b40e962..b8e8086d23 100644 --- a/DiscoveryJson/redis.v1.json +++ b/DiscoveryJson/redis.v1.json @@ -1067,7 +1067,7 @@ } } }, - "revision": "20241203", + "revision": "20241212", "rootUrl": "https://redis.googleapis.com/", "schemas": { "AOFConfig": { @@ -2082,7 +2082,9 @@ "SIGNAL_TYPE_SUPERUSER_WRITING_TO_USER_TABLES", "SIGNAL_TYPE_USER_GRANTED_ALL_PERMISSIONS", "SIGNAL_TYPE_DATA_EXPORT_TO_EXTERNAL_CLOUD_STORAGE_BUCKET", - "SIGNAL_TYPE_DATA_EXPORT_TO_PUBLIC_CLOUD_STORAGE_BUCKET" + "SIGNAL_TYPE_DATA_EXPORT_TO_PUBLIC_CLOUD_STORAGE_BUCKET", + "SIGNAL_TYPE_WEAK_PASSWORD_HASH_ALGORITHM", + "SIGNAL_TYPE_NO_USER_PASSWORD_POLICY" ], "enumDeprecated": [ false, @@ -2163,6 +2165,8 @@ false, false, false, + false, + false, false ], "enumDescriptions": [ @@ -2244,7 +2248,9 @@ "Detects events where a Cloud SQL superuser (postgres for PostgreSQL servers or root for MySQL users) writes to non-system tables.", "Detects events where a database user or role has been granted all privileges to a database, or to all tables, procedures, or functions in a schema.", "Detects if database instance data exported to a Cloud Storage bucket outside of the organization.", - "Detects if database instance data exported to a Cloud Storage bucket that is owned by the organization and is publicly accessible." + "Detects if database instance data exported to a Cloud Storage bucket that is owned by the organization and is publicly accessible.", + "Detects if a database instance is using a weak password hash algorithm.", + "Detects if a database instance has no user password policy set." ], "type": "string" }, @@ -2615,7 +2621,9 @@ "SIGNAL_TYPE_SUPERUSER_WRITING_TO_USER_TABLES", "SIGNAL_TYPE_USER_GRANTED_ALL_PERMISSIONS", "SIGNAL_TYPE_DATA_EXPORT_TO_EXTERNAL_CLOUD_STORAGE_BUCKET", - "SIGNAL_TYPE_DATA_EXPORT_TO_PUBLIC_CLOUD_STORAGE_BUCKET" + "SIGNAL_TYPE_DATA_EXPORT_TO_PUBLIC_CLOUD_STORAGE_BUCKET", + "SIGNAL_TYPE_WEAK_PASSWORD_HASH_ALGORITHM", + "SIGNAL_TYPE_NO_USER_PASSWORD_POLICY" ], "enumDeprecated": [ false, @@ -2696,6 +2704,8 @@ false, false, false, + false, + false, false ], "enumDescriptions": [ @@ -2777,7 +2787,9 @@ "Detects events where a Cloud SQL superuser (postgres for PostgreSQL servers or root for MySQL users) writes to non-system tables.", "Detects events where a database user or role has been granted all privileges to a database, or to all tables, procedures, or functions in a schema.", "Detects if database instance data exported to a Cloud Storage bucket outside of the organization.", - "Detects if database instance data exported to a Cloud Storage bucket that is owned by the organization and is publicly accessible." + "Detects if database instance data exported to a Cloud Storage bucket that is owned by the organization and is publicly accessible.", + "Detects if a database instance is using a weak password hash algorithm.", + "Detects if a database instance has no user password policy set." ], "type": "string" } diff --git a/Src/Generated/Google.Apis.CloudRedis.v1/Google.Apis.CloudRedis.v1.csproj b/Src/Generated/Google.Apis.CloudRedis.v1/Google.Apis.CloudRedis.v1.csproj index 3979f6c45b..d0e07f42b3 100644 --- a/Src/Generated/Google.Apis.CloudRedis.v1/Google.Apis.CloudRedis.v1.csproj +++ b/Src/Generated/Google.Apis.CloudRedis.v1/Google.Apis.CloudRedis.v1.csproj @@ -3,7 +3,7 @@ Google.Apis.CloudRedis.v1 Client Library - 1.68.0.3624 + 1.68.0.3633 Google LLC Copyright 2024 Google LLC Google