@ibm-cloud/secrets-manager 1.0.33 → 1.0.34

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -21,7 +21,7 @@ import { BaseService, UserOptions } from 'ibm-cloud-sdk-core';
21
21
  * services or your custom-built applications. Secrets are stored in a dedicated instance of Secrets Manager, which is
22
22
  * built on open source HashiCorp Vault.
23
23
  *
24
- * API Version: 1.0.33
24
+ * API Version: 1.0.0
25
25
  * See: https://cloud.ibm.com/docs/secrets-manager
26
26
  */
27
27
  declare class SecretsManagerV1 extends BaseService {
@@ -153,12 +153,12 @@ declare class SecretsManagerV1 extends BaseService {
153
153
  * resources.
154
154
  *
155
155
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
156
- * `../secrets/{secret-type}?limit=5`.
156
+ * `../secrets/{secret_type}?limit=5`.
157
157
  * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
158
158
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
159
159
  *
160
160
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
161
- * `../secrets/{secret-type}?offset=25&limit=25`.
161
+ * `..?offset=25&limit=25`.
162
162
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
163
163
  * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
164
164
  */
@@ -174,28 +174,28 @@ declare class SecretsManagerV1 extends BaseService {
174
174
  * resources.
175
175
  *
176
176
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
177
- * `../secrets/{secret-type}?limit=5`.
177
+ * `../secrets/{secret_type}?limit=5`.
178
178
  * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
179
179
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
180
180
  *
181
181
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
182
- * `../secrets/{secret-type}?offset=25&limit=25`.
182
+ * `..?offset=25&limit=25`.
183
183
  * @param {string} [params.search] - Filter secrets that contain the specified string. The fields that are searched
184
184
  * include: id, name, description, labels, secret_type.
185
185
  *
186
186
  * **Usage:** If you want to list only the secrets that contain the string "text", use
187
- * `../secrets/{secret-type}?search=text`.
187
+ * `../secrets/{secret_type}?search=text`.
188
188
  * @param {string} [params.sortBy] - Sort a list of secrets by the specified field.
189
189
  *
190
190
  * **Usage:** To sort a list of secrets by their creation date, use
191
- * `../secrets/{secret-type}?sort_by=creation_date`.
191
+ * `../secrets/{secret_type}?sort_by=creation_date`.
192
192
  * @param {string[]} [params.groups] - Filter secrets by groups.
193
193
  *
194
194
  * You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
195
195
  * that are in the default secret group, use the `default` keyword.
196
196
  *
197
197
  * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
198
- * use `../secrets?groups={secret_group_ID},default`.
198
+ * use `..?groups={secret_group_ID},default`.
199
199
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
200
200
  * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
201
201
  */
@@ -352,6 +352,214 @@ declare class SecretsManagerV1 extends BaseService {
352
352
  * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>}
353
353
  */
354
354
  updateSecretMetadata(params: SecretsManagerV1.UpdateSecretMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>;
355
+ /*************************
356
+ * locks
357
+ ************************/
358
+ /**
359
+ * List secret locks.
360
+ *
361
+ * List the locks that are associated with a specified secret.
362
+ *
363
+ * @param {Object} params - The parameters to send to the service.
364
+ * @param {string} params.secretType - The secret type.
365
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
366
+ * @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
367
+ * the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
368
+ * resources.
369
+ *
370
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
371
+ * `..?limit=5`.
372
+ * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
373
+ * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
374
+ *
375
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
376
+ * `..?offset=25&limit=25`.
377
+ * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
378
+ *
379
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
380
+ * `..?search=text`.
381
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
382
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
383
+ */
384
+ getLocks(params: SecretsManagerV1.GetLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
385
+ /**
386
+ * Lock a secret.
387
+ *
388
+ * Create a lock on the current version of a secret.
389
+ *
390
+ * A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
391
+ * successful request attaches a new lock to your secret, or replaces a lock of the same name if it already exists.
392
+ * Additionally, you can use this method to clear any matching locks on a secret by using one of the following
393
+ * optional lock modes:
394
+ *
395
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
396
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
397
+ * it doesn't have any locks.
398
+ *
399
+ * For more information about locking secrets, check out the
400
+ * [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
401
+ *
402
+ * @param {Object} params - The parameters to send to the service.
403
+ * @param {string} params.secretType - The secret type.
404
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
405
+ * @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
406
+ * @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
407
+ * clear any matching locks on a secret version.
408
+ *
409
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
410
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
411
+ * it doesn't have any locks.
412
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
413
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
414
+ */
415
+ lockSecret(params: SecretsManagerV1.LockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
416
+ /**
417
+ * Unlock a secret.
418
+ *
419
+ * Delete one or more locks that are associated with the current version of a secret.
420
+ *
421
+ * A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
422
+ * the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
423
+ * ["lock1", "lock2"]}`.
424
+ *
425
+ * **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
426
+ * removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
427
+ * the metadata of your secret.
428
+ *
429
+ * @param {Object} params - The parameters to send to the service.
430
+ * @param {string} params.secretType - The secret type.
431
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
432
+ * @param {string[]} [params.locks] - A comma-separated list of locks to delete.
433
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
434
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
435
+ */
436
+ unlockSecret(params: SecretsManagerV1.UnlockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
437
+ /**
438
+ * List secret version locks.
439
+ *
440
+ * List the locks that are associated with a specified secret version.
441
+ *
442
+ * @param {Object} params - The parameters to send to the service.
443
+ * @param {string} params.secretType - The secret type.
444
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
445
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
446
+ * `previous` to retrieve the previous version.
447
+ *
448
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
449
+ * the response details.
450
+ * @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
451
+ * the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
452
+ * resources.
453
+ *
454
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
455
+ * `..?limit=5`.
456
+ * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
457
+ * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
458
+ *
459
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
460
+ * `..?offset=25&limit=25`.
461
+ * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
462
+ *
463
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
464
+ * `..?search=text`.
465
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
466
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
467
+ */
468
+ getSecretVersionLocks(params: SecretsManagerV1.GetSecretVersionLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
469
+ /**
470
+ * Lock a secret version.
471
+ *
472
+ * Create a lock on the specified version of a secret.
473
+ *
474
+ * A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
475
+ * successful request attaches a new lock to the specified version, or replaces a lock of the same name if it already
476
+ * exists. Additionally, you can use this method to clear any matching locks on a secret version by using one of the
477
+ * following optional lock modes:
478
+ *
479
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
480
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
481
+ * it doesn't have any locks.
482
+ *
483
+ * For more information about locking secrets, check out the
484
+ * [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
485
+ *
486
+ * @param {Object} params - The parameters to send to the service.
487
+ * @param {string} params.secretType - The secret type.
488
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
489
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
490
+ * `previous` to retrieve the previous version.
491
+ *
492
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
493
+ * the response details.
494
+ * @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
495
+ * @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
496
+ * clear any matching locks on a secret version.
497
+ *
498
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
499
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
500
+ * it doesn't have any locks.
501
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
502
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
503
+ */
504
+ lockSecretVersion(params: SecretsManagerV1.LockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
505
+ /**
506
+ * Unlock a secret version.
507
+ *
508
+ * Delete one or more locks that are associated with the specified secret version.
509
+ *
510
+ * A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
511
+ * the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
512
+ * ["lock-1", "lock-2"]}`.
513
+ *
514
+ * **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
515
+ * removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
516
+ * the metadata of your secret.
517
+ *
518
+ * @param {Object} params - The parameters to send to the service.
519
+ * @param {string} params.secretType - The secret type.
520
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
521
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
522
+ * `previous` to retrieve the previous version.
523
+ *
524
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
525
+ * the response details.
526
+ * @param {string[]} [params.locks] - A comma-separated list of locks to delete.
527
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
528
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
529
+ */
530
+ unlockSecretVersion(params: SecretsManagerV1.UnlockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
531
+ /**
532
+ * List all secrets and locks.
533
+ *
534
+ * List the lock details that are associated with all secrets in your Secrets Manager instance.
535
+ *
536
+ * @param {Object} [params] - The parameters to send to the service.
537
+ * @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
538
+ * the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
539
+ * resources.
540
+ *
541
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
542
+ * `..?limit=5`.
543
+ * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
544
+ * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
545
+ *
546
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
547
+ * `..?offset=25&limit=25`.
548
+ * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
549
+ *
550
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
551
+ * `..?search=text`.
552
+ * @param {string[]} [params.groups] - Filter secrets by groups.
553
+ *
554
+ * You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
555
+ * that are in the default secret group, use the `default` keyword.
556
+ *
557
+ * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
558
+ * use `..?groups={secret_group_ID},default`.
559
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
560
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>}
561
+ */
562
+ listInstanceSecretsLocks(params?: SecretsManagerV1.ListInstanceSecretsLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>;
355
563
  /*************************
356
564
  * policies
357
565
  ************************/
@@ -667,14 +875,14 @@ declare namespace SecretsManagerV1 {
667
875
  * different set of items, use `limit` with `offset` to page through your available resources.
668
876
  *
669
877
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
670
- * `../secrets/{secret-type}?limit=5`.
878
+ * `../secrets/{secret_type}?limit=5`.
671
879
  */
672
880
  limit?: number;
673
881
  /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
674
882
  * `offset` value. Use `offset` with `limit` to page through your available resources.
675
883
  *
676
884
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
677
- * `../secrets/{secret-type}?offset=25&limit=25`.
885
+ * `..?offset=25&limit=25`.
678
886
  */
679
887
  offset?: number;
680
888
  headers?: OutgoingHttpHeaders;
@@ -698,27 +906,27 @@ declare namespace SecretsManagerV1 {
698
906
  * different set of items, use `limit` with `offset` to page through your available resources.
699
907
  *
700
908
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
701
- * `../secrets/{secret-type}?limit=5`.
909
+ * `../secrets/{secret_type}?limit=5`.
702
910
  */
703
911
  limit?: number;
704
912
  /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
705
913
  * `offset` value. Use `offset` with `limit` to page through your available resources.
706
914
  *
707
915
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
708
- * `../secrets/{secret-type}?offset=25&limit=25`.
916
+ * `..?offset=25&limit=25`.
709
917
  */
710
918
  offset?: number;
711
919
  /** Filter secrets that contain the specified string. The fields that are searched include: id, name,
712
920
  * description, labels, secret_type.
713
921
  *
714
922
  * **Usage:** If you want to list only the secrets that contain the string "text", use
715
- * `../secrets/{secret-type}?search=text`.
923
+ * `../secrets/{secret_type}?search=text`.
716
924
  */
717
925
  search?: string;
718
926
  /** Sort a list of secrets by the specified field.
719
927
  *
720
928
  * **Usage:** To sort a list of secrets by their creation date, use
721
- * `../secrets/{secret-type}?sort_by=creation_date`.
929
+ * `../secrets/{secret_type}?sort_by=creation_date`.
722
930
  */
723
931
  sortBy?: ListAllSecretsConstants.SortBy | string;
724
932
  /** Filter secrets by groups.
@@ -727,14 +935,14 @@ declare namespace SecretsManagerV1 {
727
935
  * secrets that are in the default secret group, use the `default` keyword.
728
936
  *
729
937
  * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
730
- * use `../secrets?groups={secret_group_ID},default`.
938
+ * use `..?groups={secret_group_ID},default`.
731
939
  */
732
940
  groups?: string[];
733
941
  headers?: OutgoingHttpHeaders;
734
942
  }
735
943
  /** Constants for the `listAllSecrets` operation. */
736
944
  namespace ListAllSecretsConstants {
737
- /** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{secret-type}?sort_by=creation_date`. */
945
+ /** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{secret_type}?sort_by=creation_date`. */
738
946
  enum SortBy {
739
947
  ID = "id",
740
948
  CREATION_DATE = "creation_date",
@@ -968,6 +1176,262 @@ declare namespace SecretsManagerV1 {
968
1176
  KV = "kv"
969
1177
  }
970
1178
  }
1179
+ /** Parameters for the `getLocks` operation. */
1180
+ interface GetLocksParams {
1181
+ /** The secret type. */
1182
+ secretType: GetLocksConstants.SecretType | string;
1183
+ /** The v4 UUID that uniquely identifies the secret. */
1184
+ id: string;
1185
+ /** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
1186
+ * retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1187
+ *
1188
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
1189
+ * `..?limit=5`.
1190
+ */
1191
+ limit?: number;
1192
+ /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1193
+ * `offset` value. Use `offset` with `limit` to page through your available resources.
1194
+ *
1195
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
1196
+ * `..?offset=25&limit=25`.
1197
+ */
1198
+ offset?: number;
1199
+ /** Filter locks that contain the specified string in the field "name".
1200
+ *
1201
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
1202
+ * `..?search=text`.
1203
+ */
1204
+ search?: string;
1205
+ headers?: OutgoingHttpHeaders;
1206
+ }
1207
+ /** Constants for the `getLocks` operation. */
1208
+ namespace GetLocksConstants {
1209
+ /** The secret type. */
1210
+ enum SecretType {
1211
+ ARBITRARY = "arbitrary",
1212
+ IAM_CREDENTIALS = "iam_credentials",
1213
+ IMPORTED_CERT = "imported_cert",
1214
+ PUBLIC_CERT = "public_cert",
1215
+ PRIVATE_CERT = "private_cert",
1216
+ USERNAME_PASSWORD = "username_password",
1217
+ KV = "kv"
1218
+ }
1219
+ }
1220
+ /** Parameters for the `lockSecret` operation. */
1221
+ interface LockSecretParams {
1222
+ /** The secret type. */
1223
+ secretType: LockSecretConstants.SecretType | string;
1224
+ /** The v4 UUID that uniquely identifies the secret. */
1225
+ id: string;
1226
+ /** The lock data to be attached to a secret version. */
1227
+ locks?: LockSecretBodyLocksItem[];
1228
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
1229
+ * on a secret version.
1230
+ *
1231
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
1232
+ * secret.
1233
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
1234
+ * if it doesn't have any locks.
1235
+ */
1236
+ mode?: LockSecretConstants.Mode | string;
1237
+ headers?: OutgoingHttpHeaders;
1238
+ }
1239
+ /** Constants for the `lockSecret` operation. */
1240
+ namespace LockSecretConstants {
1241
+ /** The secret type. */
1242
+ enum SecretType {
1243
+ ARBITRARY = "arbitrary",
1244
+ IAM_CREDENTIALS = "iam_credentials",
1245
+ IMPORTED_CERT = "imported_cert",
1246
+ PUBLIC_CERT = "public_cert",
1247
+ PRIVATE_CERT = "private_cert",
1248
+ USERNAME_PASSWORD = "username_password",
1249
+ KV = "kv"
1250
+ }
1251
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1252
+ enum Mode {
1253
+ EXCLUSIVE = "exclusive",
1254
+ EXCLUSIVE_DELETE = "exclusive_delete"
1255
+ }
1256
+ }
1257
+ /** Parameters for the `unlockSecret` operation. */
1258
+ interface UnlockSecretParams {
1259
+ /** The secret type. */
1260
+ secretType: UnlockSecretConstants.SecretType | string;
1261
+ /** The v4 UUID that uniquely identifies the secret. */
1262
+ id: string;
1263
+ /** A comma-separated list of locks to delete. */
1264
+ locks?: string[];
1265
+ headers?: OutgoingHttpHeaders;
1266
+ }
1267
+ /** Constants for the `unlockSecret` operation. */
1268
+ namespace UnlockSecretConstants {
1269
+ /** The secret type. */
1270
+ enum SecretType {
1271
+ ARBITRARY = "arbitrary",
1272
+ IAM_CREDENTIALS = "iam_credentials",
1273
+ IMPORTED_CERT = "imported_cert",
1274
+ PUBLIC_CERT = "public_cert",
1275
+ PRIVATE_CERT = "private_cert",
1276
+ USERNAME_PASSWORD = "username_password",
1277
+ KV = "kv"
1278
+ }
1279
+ }
1280
+ /** Parameters for the `getSecretVersionLocks` operation. */
1281
+ interface GetSecretVersionLocksParams {
1282
+ /** The secret type. */
1283
+ secretType: GetSecretVersionLocksConstants.SecretType | string;
1284
+ /** The v4 UUID that uniquely identifies the secret. */
1285
+ id: string;
1286
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1287
+ * previous version.
1288
+ *
1289
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1290
+ * check the response details.
1291
+ */
1292
+ versionId: string;
1293
+ /** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
1294
+ * retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1295
+ *
1296
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
1297
+ * `..?limit=5`.
1298
+ */
1299
+ limit?: number;
1300
+ /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1301
+ * `offset` value. Use `offset` with `limit` to page through your available resources.
1302
+ *
1303
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
1304
+ * `..?offset=25&limit=25`.
1305
+ */
1306
+ offset?: number;
1307
+ /** Filter locks that contain the specified string in the field "name".
1308
+ *
1309
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
1310
+ * `..?search=text`.
1311
+ */
1312
+ search?: string;
1313
+ headers?: OutgoingHttpHeaders;
1314
+ }
1315
+ /** Constants for the `getSecretVersionLocks` operation. */
1316
+ namespace GetSecretVersionLocksConstants {
1317
+ /** The secret type. */
1318
+ enum SecretType {
1319
+ ARBITRARY = "arbitrary",
1320
+ IAM_CREDENTIALS = "iam_credentials",
1321
+ IMPORTED_CERT = "imported_cert",
1322
+ PUBLIC_CERT = "public_cert",
1323
+ PRIVATE_CERT = "private_cert",
1324
+ USERNAME_PASSWORD = "username_password",
1325
+ KV = "kv"
1326
+ }
1327
+ }
1328
+ /** Parameters for the `lockSecretVersion` operation. */
1329
+ interface LockSecretVersionParams {
1330
+ /** The secret type. */
1331
+ secretType: LockSecretVersionConstants.SecretType | string;
1332
+ /** The v4 UUID that uniquely identifies the secret. */
1333
+ id: string;
1334
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1335
+ * previous version.
1336
+ *
1337
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1338
+ * check the response details.
1339
+ */
1340
+ versionId: string;
1341
+ /** The lock data to be attached to a secret version. */
1342
+ locks?: LockSecretBodyLocksItem[];
1343
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
1344
+ * on a secret version.
1345
+ *
1346
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
1347
+ * secret.
1348
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
1349
+ * if it doesn't have any locks.
1350
+ */
1351
+ mode?: LockSecretVersionConstants.Mode | string;
1352
+ headers?: OutgoingHttpHeaders;
1353
+ }
1354
+ /** Constants for the `lockSecretVersion` operation. */
1355
+ namespace LockSecretVersionConstants {
1356
+ /** The secret type. */
1357
+ enum SecretType {
1358
+ ARBITRARY = "arbitrary",
1359
+ IAM_CREDENTIALS = "iam_credentials",
1360
+ IMPORTED_CERT = "imported_cert",
1361
+ PUBLIC_CERT = "public_cert",
1362
+ PRIVATE_CERT = "private_cert",
1363
+ USERNAME_PASSWORD = "username_password",
1364
+ KV = "kv"
1365
+ }
1366
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1367
+ enum Mode {
1368
+ EXCLUSIVE = "exclusive",
1369
+ EXCLUSIVE_DELETE = "exclusive_delete"
1370
+ }
1371
+ }
1372
+ /** Parameters for the `unlockSecretVersion` operation. */
1373
+ interface UnlockSecretVersionParams {
1374
+ /** The secret type. */
1375
+ secretType: UnlockSecretVersionConstants.SecretType | string;
1376
+ /** The v4 UUID that uniquely identifies the secret. */
1377
+ id: string;
1378
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1379
+ * previous version.
1380
+ *
1381
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1382
+ * check the response details.
1383
+ */
1384
+ versionId: string;
1385
+ /** A comma-separated list of locks to delete. */
1386
+ locks?: string[];
1387
+ headers?: OutgoingHttpHeaders;
1388
+ }
1389
+ /** Constants for the `unlockSecretVersion` operation. */
1390
+ namespace UnlockSecretVersionConstants {
1391
+ /** The secret type. */
1392
+ enum SecretType {
1393
+ ARBITRARY = "arbitrary",
1394
+ IAM_CREDENTIALS = "iam_credentials",
1395
+ IMPORTED_CERT = "imported_cert",
1396
+ PUBLIC_CERT = "public_cert",
1397
+ PRIVATE_CERT = "private_cert",
1398
+ USERNAME_PASSWORD = "username_password",
1399
+ KV = "kv"
1400
+ }
1401
+ }
1402
+ /** Parameters for the `listInstanceSecretsLocks` operation. */
1403
+ interface ListInstanceSecretsLocksParams {
1404
+ /** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
1405
+ * retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1406
+ *
1407
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
1408
+ * `..?limit=5`.
1409
+ */
1410
+ limit?: number;
1411
+ /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1412
+ * `offset` value. Use `offset` with `limit` to page through your available resources.
1413
+ *
1414
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
1415
+ * `..?offset=25&limit=25`.
1416
+ */
1417
+ offset?: number;
1418
+ /** Filter locks that contain the specified string in the field "name".
1419
+ *
1420
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
1421
+ * `..?search=text`.
1422
+ */
1423
+ search?: string;
1424
+ /** Filter secrets by groups.
1425
+ *
1426
+ * You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter
1427
+ * secrets that are in the default secret group, use the `default` keyword.
1428
+ *
1429
+ * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
1430
+ * use `..?groups={secret_group_ID},default`.
1431
+ */
1432
+ groups?: string[];
1433
+ headers?: OutgoingHttpHeaders;
1434
+ }
971
1435
  /** Parameters for the `putPolicy` operation. */
972
1436
  interface PutPolicyParams {
973
1437
  /** The secret type. */
@@ -1368,6 +1832,13 @@ declare namespace SecretsManagerV1 {
1368
1832
  /** GetConfigResourcesItem. */
1369
1833
  interface GetConfigResourcesItem {
1370
1834
  }
1835
+ /** Properties that describe the locks that are associated with an instance. */
1836
+ interface GetInstanceLocks {
1837
+ /** The metadata that describes the resource array. */
1838
+ metadata: CollectionMetadata;
1839
+ /** A collection of resources. */
1840
+ resources: InstanceSecretsLocks[];
1841
+ }
1371
1842
  /** Properties that describe an existing registration with Event Notifications. */
1372
1843
  interface GetNotificationsSettings {
1373
1844
  /** The metadata that describes the resource array. */
@@ -1382,6 +1853,13 @@ declare namespace SecretsManagerV1 {
1382
1853
  /** A collection of resources. */
1383
1854
  resources: SecretResource[];
1384
1855
  }
1856
+ /** Properties that describe the lock of a secret or a secret version. */
1857
+ interface GetSecretLocks {
1858
+ /** The metadata that describes the resource array. */
1859
+ metadata: CollectionMetadata;
1860
+ /** A collection of resources. */
1861
+ resources: SecretsLocks[];
1862
+ }
1385
1863
  /** GetSecretPolicies. */
1386
1864
  interface GetSecretPolicies {
1387
1865
  }
@@ -1406,6 +1884,22 @@ declare namespace SecretsManagerV1 {
1406
1884
  /** A collection of resources. */
1407
1885
  resources: ConfigElementDef[];
1408
1886
  }
1887
+ /** Properties that describe the locks that are associated with an instance. */
1888
+ interface InstanceSecretsLocks {
1889
+ /** The unique ID of the secret. */
1890
+ secret_id?: string;
1891
+ /** The v4 UUID that uniquely identifies the secret group to assign to this secret.
1892
+ *
1893
+ * If you omit this parameter, your secret is assigned to the `default` secret group.
1894
+ */
1895
+ secret_group_id?: string;
1896
+ /** The secret type. */
1897
+ secret_type?: string;
1898
+ /** A collection of locks that are attached to a secret version. */
1899
+ versions?: SecretLockVersion[];
1900
+ /** InstanceSecretsLocks accepts additional properties. */
1901
+ [propName: string]: any;
1902
+ }
1409
1903
  /** Intermediate certificate authorities configuration. */
1410
1904
  interface IntermediateCertificateAuthoritiesConfigItem {
1411
1905
  /** The human-readable name to assign to your configuration. */
@@ -1444,6 +1938,13 @@ declare namespace SecretsManagerV1 {
1444
1938
  /** The name that was assigned to the DNS provider configuration. */
1445
1939
  dns?: string;
1446
1940
  }
1941
+ /** Properties that describe the locks of a secret or a secret version. */
1942
+ interface ListSecretLocks {
1943
+ /** The metadata that describes the resource array. */
1944
+ metadata: CollectionMetadata;
1945
+ /** A collection of resources. */
1946
+ resources: SecretLockData[];
1947
+ }
1447
1948
  /** Properties that describe a list of versions of a secret. */
1448
1949
  interface ListSecretVersions {
1449
1950
  /** The metadata that describes the resource array. */
@@ -1458,6 +1959,23 @@ declare namespace SecretsManagerV1 {
1458
1959
  /** A collection of resources. */
1459
1960
  resources?: SecretResource[];
1460
1961
  }
1962
+ /** LockSecretBodyLocksItem. */
1963
+ interface LockSecretBodyLocksItem {
1964
+ /** A human-readable name to assign to the lock. The lock name must be unique per secret version.
1965
+ *
1966
+ * To protect your privacy, do not use personal data, such as your name or location, as a name for your secret
1967
+ * lock.
1968
+ */
1969
+ name: string;
1970
+ /** An extended description of the lock.
1971
+ *
1972
+ * To protect your privacy, do not use personal data, such as your name or location, as a description for your
1973
+ * secret lock.
1974
+ */
1975
+ description: string;
1976
+ /** Optional information to associate with a lock, such as resources CRNs to be used by automation. */
1977
+ attributes: JsonObject;
1978
+ }
1461
1979
  /** The Event Notifications details. */
1462
1980
  interface NotificationsSettings {
1463
1981
  /** The Cloud Resource Name (CRN) of the connected Event Notifications instance. */
@@ -1555,6 +2073,56 @@ declare namespace SecretsManagerV1 {
1555
2073
  /** SecretGroupResource accepts additional properties. */
1556
2074
  [propName: string]: any;
1557
2075
  }
2076
+ /** Properties that describe a lock. */
2077
+ interface SecretLockData {
2078
+ /** A human-readable name to assign to the secret lock.
2079
+ *
2080
+ * To protect your privacy, do not use personal data, such as your name or location, as a name for the secret lock.
2081
+ */
2082
+ name?: string;
2083
+ /** An extended description of the secret lock.
2084
+ *
2085
+ * To protect your privacy, do not use personal data, such as your name or location, as a description for the
2086
+ * secret lock.
2087
+ */
2088
+ description?: string;
2089
+ /** The date the secret lock was created. The date format follows RFC 3339. */
2090
+ creation_date?: string;
2091
+ /** The unique identifier for the entity that created the secret lock. */
2092
+ created_by?: string;
2093
+ /** The information that is associated with a lock, such as resources CRNs to be used by automation. */
2094
+ attributes?: JsonObject;
2095
+ /** The v4 UUID that uniquely identifies the secret version. */
2096
+ secret_version_id?: string;
2097
+ /** The v4 UUID that uniquely identifies the secret. */
2098
+ secret_id?: string;
2099
+ /** The v4 UUID that uniquely identifies the secret group to assign to this secret.
2100
+ *
2101
+ * If you omit this parameter, your secret is assigned to the `default` secret group.
2102
+ */
2103
+ secret_group_id?: string;
2104
+ /** Updates when the actual secret is modified. The date format follows RFC 3339. */
2105
+ last_update_date?: string;
2106
+ /** A representation for the 2 last secret versions. Could be "current" for version (n) or "previous" for
2107
+ * version (n-1).
2108
+ */
2109
+ secret_version_alias?: string;
2110
+ }
2111
+ /** Properties that describe the secret locks. */
2112
+ interface SecretLockVersion {
2113
+ /** The v4 UUID that uniquely identifies the lock. */
2114
+ id?: string;
2115
+ /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
2116
+ * is used for version `n-1`.
2117
+ */
2118
+ alias?: string;
2119
+ /** The names of all locks that are associated with this secret. */
2120
+ locks?: string[];
2121
+ /** Indicates whether the payload for the secret version is stored and available. */
2122
+ payload_available?: boolean;
2123
+ /** SecretLockVersion accepts additional properties. */
2124
+ [propName: string]: any;
2125
+ }
1558
2126
  /** SecretMetadata. */
1559
2127
  interface SecretMetadata {
1560
2128
  }
@@ -1586,6 +2154,20 @@ declare namespace SecretsManagerV1 {
1586
2154
  /** SecretVersionMetadata. */
1587
2155
  interface SecretVersionMetadata {
1588
2156
  }
2157
+ /** Properties that describe the secret locks. */
2158
+ interface SecretsLocks {
2159
+ /** The unique ID of the secret. */
2160
+ secret_id?: string;
2161
+ /** The v4 UUID that uniquely identifies the secret group to assign to this secret.
2162
+ *
2163
+ * If you omit this parameter, your secret is assigned to the `default` secret group.
2164
+ */
2165
+ secret_group_id?: string;
2166
+ /** A collection of locks that are attached to a secret version. */
2167
+ versions?: SecretLockVersion[];
2168
+ /** SecretsLocks accepts additional properties. */
2169
+ [propName: string]: any;
2170
+ }
1589
2171
  /** Properties that are returned with a successful `sign` action. */
1590
2172
  interface SignActionResultData {
1591
2173
  /** The PEM-encoded certificate. */
@@ -1664,8 +2246,10 @@ declare namespace SecretsManagerV1 {
1664
2246
  created_by?: string;
1665
2247
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
1666
2248
  last_update_date?: string;
1667
- /** The number of versions the secret has. */
2249
+ /** The number of versions that are associated with a secret. */
1668
2250
  versions_total?: number;
2251
+ /** The number of locks that are associated with a secret. */
2252
+ locks_total?: number;
1669
2253
  /** The date the secret material expires. The date format follows RFC 3339.
1670
2254
  *
1671
2255
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -1727,6 +2311,8 @@ declare namespace SecretsManagerV1 {
1727
2311
  * see [Get secret version metadata](#get-secret-version-metadata).
1728
2312
  */
1729
2313
  versions?: JsonObject[];
2314
+ /** The number of locks that are associated with a secret. */
2315
+ locks_total?: number;
1730
2316
  /** The date the secret material expires. The date format follows RFC 3339.
1731
2317
  *
1732
2318
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -1755,6 +2341,8 @@ declare namespace SecretsManagerV1 {
1755
2341
  creation_date?: string;
1756
2342
  /** The unique identifier for the entity that created the secret version. */
1757
2343
  created_by?: string;
2344
+ /** The number of locks that are associated with a secret version. */
2345
+ locks_total?: number;
1758
2346
  /** The data that is associated with the secret version.
1759
2347
  *
1760
2348
  * The data object contains the field `payload`.
@@ -1792,6 +2380,8 @@ declare namespace SecretsManagerV1 {
1792
2380
  * service API.
1793
2381
  */
1794
2382
  downloaded?: boolean;
2383
+ /** The number of locks that are associated with a secret version. */
2384
+ locks_total?: number;
1795
2385
  }
1796
2386
  /** Metadata properties that describe a certificate secret. */
1797
2387
  interface CertificateSecretMetadata extends SecretMetadata {
@@ -1838,8 +2428,10 @@ declare namespace SecretsManagerV1 {
1838
2428
  created_by?: string;
1839
2429
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
1840
2430
  last_update_date?: string;
1841
- /** The number of versions the secret has. */
2431
+ /** The number of versions that are associated with a secret. */
1842
2432
  versions_total?: number;
2433
+ /** The number of locks that are associated with a secret. */
2434
+ locks_total?: number;
1843
2435
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
1844
2436
  serial_number?: string;
1845
2437
  /** The identifier for the cryptographic algorithm that was used by the issuing certificate authority to sign
@@ -1914,6 +2506,8 @@ declare namespace SecretsManagerV1 {
1914
2506
  * see [Get secret version metadata](#get-secret-version-metadata).
1915
2507
  */
1916
2508
  versions?: JsonObject[];
2509
+ /** The number of locks that are associated with a secret. */
2510
+ locks_total?: number;
1917
2511
  /** The contents of your certificate. The data must be formatted on a single line with embedded newline
1918
2512
  * characters.
1919
2513
  */
@@ -1972,6 +2566,8 @@ declare namespace SecretsManagerV1 {
1972
2566
  creation_date?: string;
1973
2567
  /** The unique identifier for the entity that created the secret version. */
1974
2568
  created_by?: string;
2569
+ /** The number of locks that are associated with a secret version. */
2570
+ locks_total?: number;
1975
2571
  validity?: CertificateValidity;
1976
2572
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
1977
2573
  serial_number?: string;
@@ -2021,6 +2617,8 @@ declare namespace SecretsManagerV1 {
2021
2617
  * service API.
2022
2618
  */
2023
2619
  downloaded?: boolean;
2620
+ /** The number of locks that are associated with a secret version. */
2621
+ locks_total?: number;
2024
2622
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2025
2623
  serial_number?: string;
2026
2624
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -2338,8 +2936,10 @@ declare namespace SecretsManagerV1 {
2338
2936
  created_by?: string;
2339
2937
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
2340
2938
  last_update_date?: string;
2341
- /** The number of versions the secret has. */
2939
+ /** The number of versions that are associated with a secret. */
2342
2940
  versions_total?: number;
2941
+ /** The number of locks that are associated with a secret. */
2942
+ locks_total?: number;
2343
2943
  /** The time-to-live (TTL) or lease duration that is assigned to the secret. For `iam_credentials` secrets, the
2344
2944
  * TTL defines for how long each generated API key remains valid.
2345
2945
  */
@@ -2417,6 +3017,8 @@ declare namespace SecretsManagerV1 {
2417
3017
  * see [Get secret version metadata](#get-secret-version-metadata).
2418
3018
  */
2419
3019
  versions?: JsonObject[];
3020
+ /** The number of locks that are associated with a secret. */
3021
+ locks_total?: number;
2420
3022
  /** The time-to-live (TTL) or lease duration to assign to generated credentials.
2421
3023
  *
2422
3024
  * For `iam_credentials` secrets, the TTL defines for how long each generated API key remains valid. The value can
@@ -2478,6 +3080,8 @@ declare namespace SecretsManagerV1 {
2478
3080
  creation_date?: string;
2479
3081
  /** The unique identifier for the entity that created the secret version. */
2480
3082
  created_by?: string;
3083
+ /** The number of locks that are associated with a secret version. */
3084
+ locks_total?: number;
2481
3085
  /** The data that is associated with the secret version. The data object contains the following fields:
2482
3086
  *
2483
3087
  * - `api_key`: The API key that is generated for this secret.
@@ -2517,6 +3121,8 @@ declare namespace SecretsManagerV1 {
2517
3121
  * service API.
2518
3122
  */
2519
3123
  downloaded?: boolean;
3124
+ /** The number of locks that are associated with a secret version. */
3125
+ locks_total?: number;
2520
3126
  }
2521
3127
  /** Intermediate certificate authorities configuration. */
2522
3128
  interface IntermediateCertificateAuthoritiesConfig extends GetConfigElementsResourcesItem {
@@ -2682,8 +3288,10 @@ declare namespace SecretsManagerV1 {
2682
3288
  created_by?: string;
2683
3289
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
2684
3290
  last_update_date?: string;
2685
- /** The number of versions the secret has. */
3291
+ /** The number of versions that are associated with a secret. */
2686
3292
  versions_total?: number;
3293
+ /** The number of locks that are associated with a secret. */
3294
+ locks_total?: number;
2687
3295
  }
2688
3296
  /** Properties that describe a secret. */
2689
3297
  interface KvSecretResource extends SecretResource {
@@ -2735,6 +3343,8 @@ declare namespace SecretsManagerV1 {
2735
3343
  * see [Get secret version metadata](#get-secret-version-metadata).
2736
3344
  */
2737
3345
  versions?: JsonObject[];
3346
+ /** The number of locks that are associated with a secret. */
3347
+ locks_total?: number;
2738
3348
  /** The date the secret material expires. The date format follows RFC 3339.
2739
3349
  *
2740
3350
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -2815,8 +3425,10 @@ declare namespace SecretsManagerV1 {
2815
3425
  created_by?: string;
2816
3426
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
2817
3427
  last_update_date?: string;
2818
- /** The number of versions the secret has. */
3428
+ /** The number of versions that are associated with a secret. */
2819
3429
  versions_total?: number;
3430
+ /** The number of locks that are associated with a secret. */
3431
+ locks_total?: number;
2820
3432
  /** The name of the certificate template. */
2821
3433
  certificate_template?: string;
2822
3434
  /** The intermediate certificate authority that signed this certificate. */
@@ -2894,6 +3506,8 @@ declare namespace SecretsManagerV1 {
2894
3506
  * see [Get secret version metadata](#get-secret-version-metadata).
2895
3507
  */
2896
3508
  versions?: JsonObject[];
3509
+ /** The number of locks that are associated with a secret. */
3510
+ locks_total?: number;
2897
3511
  /** The name of the certificate template. */
2898
3512
  certificate_template: string;
2899
3513
  /** The intermediate certificate authority that signed this certificate. */
@@ -2972,6 +3586,8 @@ declare namespace SecretsManagerV1 {
2972
3586
  creation_date?: string;
2973
3587
  /** The unique identifier for the entity that created the secret version. */
2974
3588
  created_by?: string;
3589
+ /** The number of locks that are associated with a secret version. */
3590
+ locks_total?: number;
2975
3591
  validity?: CertificateValidity;
2976
3592
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2977
3593
  serial_number?: string;
@@ -3045,6 +3661,8 @@ declare namespace SecretsManagerV1 {
3045
3661
  * service API.
3046
3662
  */
3047
3663
  downloaded?: boolean;
3664
+ /** The number of locks that are associated with a secret version. */
3665
+ locks_total?: number;
3048
3666
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
3049
3667
  serial_number?: string;
3050
3668
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -3115,8 +3733,10 @@ declare namespace SecretsManagerV1 {
3115
3733
  created_by?: string;
3116
3734
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
3117
3735
  last_update_date?: string;
3118
- /** The number of versions the secret has. */
3736
+ /** The number of versions that are associated with a secret. */
3119
3737
  versions_total?: number;
3738
+ /** The number of locks that are associated with a secret. */
3739
+ locks_total?: number;
3120
3740
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3121
3741
  issuer?: string;
3122
3742
  /** Determines whether your issued certificate is bundled with intermediate certificates.
@@ -3197,6 +3817,8 @@ declare namespace SecretsManagerV1 {
3197
3817
  * see [Get secret version metadata](#get-secret-version-metadata).
3198
3818
  */
3199
3819
  versions?: JsonObject[];
3820
+ /** The number of locks that are associated with a secret. */
3821
+ locks_total?: number;
3200
3822
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3201
3823
  issuer?: string;
3202
3824
  /** Determines whether your issued certificate is bundled with intermediate certificates.
@@ -3797,8 +4419,10 @@ declare namespace SecretsManagerV1 {
3797
4419
  created_by?: string;
3798
4420
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
3799
4421
  last_update_date?: string;
3800
- /** The number of versions the secret has. */
4422
+ /** The number of versions that are associated with a secret. */
3801
4423
  versions_total?: number;
4424
+ /** The number of locks that are associated with a secret. */
4425
+ locks_total?: number;
3802
4426
  /** The date the secret material expires. The date format follows RFC 3339.
3803
4427
  *
3804
4428
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -3860,6 +4484,8 @@ declare namespace SecretsManagerV1 {
3860
4484
  * see [Get secret version metadata](#get-secret-version-metadata).
3861
4485
  */
3862
4486
  versions?: JsonObject[];
4487
+ /** The number of locks that are associated with a secret. */
4488
+ locks_total?: number;
3863
4489
  /** The username to assign to this secret. */
3864
4490
  username?: string;
3865
4491
  /** The password to assign to this secret. */
@@ -3897,6 +4523,8 @@ declare namespace SecretsManagerV1 {
3897
4523
  creation_date?: string;
3898
4524
  /** The unique identifier for the entity that created the secret version. */
3899
4525
  created_by?: string;
4526
+ /** The number of locks that are associated with a secret version. */
4527
+ locks_total?: number;
3900
4528
  /** Indicates whether the version of the secret was created by automatic rotation. */
3901
4529
  auto_rotated?: boolean;
3902
4530
  /** The data that is associated with the secret version. The data object contains the following fields:
@@ -3939,6 +4567,8 @@ declare namespace SecretsManagerV1 {
3939
4567
  * service API.
3940
4568
  */
3941
4569
  downloaded?: boolean;
4570
+ /** The number of locks that are associated with a secret version. */
4571
+ locks_total?: number;
3942
4572
  /** Indicates whether the version of the secret was created by automatic rotation. */
3943
4573
  auto_rotated?: boolean;
3944
4574
  }