Socket
Socket
Sign inDemoInstall

oci-database

Package Overview
Dependencies
Maintainers
2
Versions
194
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

oci-database - npm Package Compare versions

Comparing version 1.6.3 to 1.7.0

23

lib/model/autonomous-database-summary.d.ts

@@ -186,8 +186,23 @@ /**

/**
* The client IP access control list (ACL). This feature is available for databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) only.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance. This is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Indicates if the database-level access control is enabled.
* If disabled, database access is defined by the network security rules.
* If enabled, database access is restricted to the IP addresses defined by the rules specified with the `whitelistedIps` property. While specifying `whitelistedIps` rules is optional,
* if database-level access control is enabled and no rules are specified, the database will become inaccessible. The rules can be added later using the `UpdateAutonomousDatabase` API operation or edit option in console.
* When creating a database clone, the desired access control setting should be specified. By default, database-level access control will be disabled for the clone.
* <p>
To add the whitelist VCN specific subnet or IP, use a semicoln ';' as a deliminator to add the VCN specific subnets or IPs.
* For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
This property is applicable only to Autonomous Databases on the Exadata Cloud@Customer platform.
*
*/
"isAccessControlEnabled"?: boolean;
/**
* The client IP access control list (ACL). This feature is available for autonomous databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) and on Exadata Cloud@Customer.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance.
* <p>
For shared Exadata infrastructure, this is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Use a semicolon (;) as a deliminator between the VCN-specific subnets or IPs.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"ocid1.vcn.oc1.sea.<unique_id>\",\"ocid1.vcn.oc1.sea.<unique_id1>;1.1.1.1\",\"ocid1.vcn.oc1.sea.<unique_id2>;1.1.0.0/16\"]`
* For Exadata Cloud@Customer, this is an array of IP addresses or CIDR (Classless Inter-Domain Routing) notations.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"1.1.2.25\"]`
* <p>
For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
*

@@ -194,0 +209,0 @@ */

@@ -184,8 +184,23 @@ /**

/**
* The client IP access control list (ACL). This feature is available for databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) only.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance. This is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Indicates if the database-level access control is enabled.
* If disabled, database access is defined by the network security rules.
* If enabled, database access is restricted to the IP addresses defined by the rules specified with the `whitelistedIps` property. While specifying `whitelistedIps` rules is optional,
* if database-level access control is enabled and no rules are specified, the database will become inaccessible. The rules can be added later using the `UpdateAutonomousDatabase` API operation or edit option in console.
* When creating a database clone, the desired access control setting should be specified. By default, database-level access control will be disabled for the clone.
* <p>
To add the whitelist VCN specific subnet or IP, use a semicoln ';' as a deliminator to add the VCN specific subnets or IPs.
* For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
This property is applicable only to Autonomous Databases on the Exadata Cloud@Customer platform.
*
*/
"isAccessControlEnabled"?: boolean;
/**
* The client IP access control list (ACL). This feature is available for autonomous databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) and on Exadata Cloud@Customer.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance.
* <p>
For shared Exadata infrastructure, this is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Use a semicolon (;) as a deliminator between the VCN-specific subnets or IPs.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"ocid1.vcn.oc1.sea.<unique_id>\",\"ocid1.vcn.oc1.sea.<unique_id1>;1.1.1.1\",\"ocid1.vcn.oc1.sea.<unique_id2>;1.1.0.0/16\"]`
* For Exadata Cloud@Customer, this is an array of IP addresses or CIDR (Classless Inter-Domain Routing) notations.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"1.1.2.25\"]`
* <p>
For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
*

@@ -192,0 +207,0 @@ */

@@ -45,2 +45,14 @@ /**

"isFreeTierEnabled"?: boolean;
/**
* True if this version of the Oracle Database software has payments enabled.
*/
"isPaidEnabled"?: boolean;
/**
* True if this version of the Oracle Database software's default is free.
*/
"isDefaultForFree"?: boolean;
/**
* True if this version of the Oracle Database software's default is paid.
*/
"isDefaultForPaid"?: boolean;
}

@@ -47,0 +59,0 @@ export declare namespace AutonomousDbVersionSummary {

@@ -86,8 +86,23 @@ /**

/**
* The client IP access control list (ACL). This feature is available for databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) only.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance. This is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Indicates if the database-level access control is enabled.
* If disabled, database access is defined by the network security rules.
* If enabled, database access is restricted to the IP addresses defined by the rules specified with the `whitelistedIps` property. While specifying `whitelistedIps` rules is optional,
* if database-level access control is enabled and no rules are specified, the database will become inaccessible. The rules can be added later using the `UpdateAutonomousDatabase` API operation or edit option in console.
* When creating a database clone, the desired access control setting should be specified. By default, database-level access control will be disabled for the clone.
* <p>
To add the whitelist VCN specific subnet or IP, use a semicoln ';' as a deliminator to add the VCN specific subnets or IPs.
* For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
This property is applicable only to Autonomous Databases on the Exadata Cloud@Customer platform.
*
*/
"isAccessControlEnabled"?: boolean;
/**
* The client IP access control list (ACL). This feature is available for autonomous databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) and on Exadata Cloud@Customer.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance.
* <p>
For shared Exadata infrastructure, this is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Use a semicolon (;) as a deliminator between the VCN-specific subnets or IPs.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"ocid1.vcn.oc1.sea.<unique_id>\",\"ocid1.vcn.oc1.sea.<unique_id1>;1.1.1.1\",\"ocid1.vcn.oc1.sea.<unique_id2>;1.1.0.0/16\"]`
* For Exadata Cloud@Customer, this is an array of IP addresses or CIDR (Classless Inter-Domain Routing) notations.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"1.1.2.25\"]`
* <p>
For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
*

@@ -94,0 +109,0 @@ */

@@ -22,2 +22,6 @@ /**

/**
* The database software image [OCID](https://docs.cloud.oracle.com/Content/General/Concepts/identifiers.htm)
*/
"databaseSoftwareImageId"?: string;
/**
* A strong password for the `SYS`, `SYSTEM`, and `PDB Admin` users to apply during standby creation.

@@ -24,0 +28,0 @@ * <p>

@@ -43,2 +43,6 @@ /**

/**
* The optional password to open the TDE wallet. The password must be at least nine characters and contain at least two uppercase, two lowercase, two numeric, and two special characters. The special characters must be _, \\#, or -.
*/
"tdeWalletPassword"?: string;
/**
* The character set for the database. The default is AL32UTF8. Allowed values are:

@@ -45,0 +49,0 @@ * <p>

2

lib/model/create-db-home-with-db-system-id-details.d.ts

@@ -27,3 +27,3 @@ /**

*/
"dbVersion": string;
"dbVersion"?: string;
"database"?: model.CreateDatabaseDetails;

@@ -30,0 +30,0 @@ "source": string;

@@ -27,3 +27,3 @@ /**

*/
"dbVersion": string;
"dbVersion"?: string;
"database"?: model.CreateDatabaseDetails;

@@ -30,0 +30,0 @@ "source": string;

@@ -88,8 +88,23 @@ /**

/**
* The client IP access control list (ACL). This feature is available for databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) only.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance. This is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Indicates if the database-level access control is enabled.
* If disabled, database access is defined by the network security rules.
* If enabled, database access is restricted to the IP addresses defined by the rules specified with the `whitelistedIps` property. While specifying `whitelistedIps` rules is optional,
* if database-level access control is enabled and no rules are specified, the database will become inaccessible. The rules can be added later using the `UpdateAutonomousDatabase` API operation or edit option in console.
* When creating a database clone, the desired access control setting should be specified. By default, database-level access control will be disabled for the clone.
* <p>
To add the whitelist VCN specific subnet or IP, use a semicoln ';' as a deliminator to add the VCN specific subnets or IPs.
* For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
This property is applicable only to Autonomous Databases on the Exadata Cloud@Customer platform.
*
*/
"isAccessControlEnabled"?: boolean;
/**
* The client IP access control list (ACL). This feature is available for autonomous databases on [shared Exadata infrastructure](https://docs.cloud.oracle.com/Content/Database/Concepts/adboverview.htm#AEI) and on Exadata Cloud@Customer.
* Only clients connecting from an IP address included in the ACL may access the Autonomous Database instance.
* <p>
For shared Exadata infrastructure, this is an array of CIDR (Classless Inter-Domain Routing) notations for a subnet or VCN OCID.
* Use a semicolon (;) as a deliminator between the VCN-specific subnets or IPs.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"ocid1.vcn.oc1.sea.<unique_id>\",\"ocid1.vcn.oc1.sea.<unique_id1>;1.1.1.1\",\"ocid1.vcn.oc1.sea.<unique_id2>;1.1.0.0/16\"]`
* For Exadata Cloud@Customer, this is an array of IP addresses or CIDR (Classless Inter-Domain Routing) notations.
* Example: `[\"1.1.1.1\",\"1.1.1.0/24\",\"1.1.2.25\"]`
* <p>
For an update operation, if you want to delete all the IPs in the ACL, use an array with a single empty string entry.
*

@@ -96,0 +111,0 @@ */

@@ -28,2 +28,14 @@ /**

/**
* A new strong password for SYS, SYSTEM, and the plugbable database ADMIN user. The password must be at least nine characters and contain at least two uppercase, two lowercase, two numeric, and two special characters. The special characters must be _, \\#, or -.
*/
"newAdminPassword"?: string;
/**
* The existing password to open the TDE wallet. It is required to set a new tde password.
*/
"oldTdeWalletPassword"?: string;
/**
* The new password to open the TDE wallet. The password must be at least nine characters and contain at least two uppercase, two lowercase, two numeric, and two special characters. The special characters must be _, \\#, or -.
*/
"newTdeWalletPassword"?: string;
/**
* Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.

@@ -30,0 +42,0 @@ * For more information, see [Resource Tags](https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).

{
"name": "oci-database",
"version": "1.6.3",
"version": "1.7.0",
"description": "OCI NodeJS client for Database",

@@ -18,4 +18,4 @@ "repository": {

"dependencies": {
"oci-common": "1.6.3",
"oci-workrequests": "1.6.3"
"oci-common": "1.7.0",
"oci-workrequests": "1.7.0"
},

@@ -22,0 +22,0 @@ "publishConfig": {

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc