@ibm-cloud/secrets-manager 1.0.33 → 1.0.34
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +3 -2
- package/secrets-manager/v1.d.ts +653 -23
- package/secrets-manager/v1.js +547 -10
- package/secrets-manager/v1.js.map +1 -1
package/secrets-manager/v1.d.ts
CHANGED
|
@@ -21,7 +21,7 @@ import { BaseService, UserOptions } from 'ibm-cloud-sdk-core';
|
|
|
21
21
|
* services or your custom-built applications. Secrets are stored in a dedicated instance of Secrets Manager, which is
|
|
22
22
|
* built on open source HashiCorp Vault.
|
|
23
23
|
*
|
|
24
|
-
* API Version: 1.0.
|
|
24
|
+
* API Version: 1.0.0
|
|
25
25
|
* See: https://cloud.ibm.com/docs/secrets-manager
|
|
26
26
|
*/
|
|
27
27
|
declare class SecretsManagerV1 extends BaseService {
|
|
@@ -153,12 +153,12 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
153
153
|
* resources.
|
|
154
154
|
*
|
|
155
155
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
156
|
-
* `../secrets/{
|
|
156
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
157
157
|
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
158
158
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
159
159
|
*
|
|
160
160
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
161
|
-
*
|
|
161
|
+
* `..?offset=25&limit=25`.
|
|
162
162
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
163
163
|
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
|
|
164
164
|
*/
|
|
@@ -174,28 +174,28 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
174
174
|
* resources.
|
|
175
175
|
*
|
|
176
176
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
177
|
-
* `../secrets/{
|
|
177
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
178
178
|
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
179
179
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
180
180
|
*
|
|
181
181
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
182
|
-
*
|
|
182
|
+
* `..?offset=25&limit=25`.
|
|
183
183
|
* @param {string} [params.search] - Filter secrets that contain the specified string. The fields that are searched
|
|
184
184
|
* include: id, name, description, labels, secret_type.
|
|
185
185
|
*
|
|
186
186
|
* **Usage:** If you want to list only the secrets that contain the string "text", use
|
|
187
|
-
* `../secrets/{
|
|
187
|
+
* `../secrets/{secret_type}?search=text`.
|
|
188
188
|
* @param {string} [params.sortBy] - Sort a list of secrets by the specified field.
|
|
189
189
|
*
|
|
190
190
|
* **Usage:** To sort a list of secrets by their creation date, use
|
|
191
|
-
* `../secrets/{
|
|
191
|
+
* `../secrets/{secret_type}?sort_by=creation_date`.
|
|
192
192
|
* @param {string[]} [params.groups] - Filter secrets by groups.
|
|
193
193
|
*
|
|
194
194
|
* You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
|
|
195
195
|
* that are in the default secret group, use the `default` keyword.
|
|
196
196
|
*
|
|
197
197
|
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
198
|
-
* use
|
|
198
|
+
* use `..?groups={secret_group_ID},default`.
|
|
199
199
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
200
200
|
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
|
|
201
201
|
*/
|
|
@@ -352,6 +352,214 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
352
352
|
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>}
|
|
353
353
|
*/
|
|
354
354
|
updateSecretMetadata(params: SecretsManagerV1.UpdateSecretMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>;
|
|
355
|
+
/*************************
|
|
356
|
+
* locks
|
|
357
|
+
************************/
|
|
358
|
+
/**
|
|
359
|
+
* List secret locks.
|
|
360
|
+
*
|
|
361
|
+
* List the locks that are associated with a specified secret.
|
|
362
|
+
*
|
|
363
|
+
* @param {Object} params - The parameters to send to the service.
|
|
364
|
+
* @param {string} params.secretType - The secret type.
|
|
365
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
366
|
+
* @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
|
|
367
|
+
* the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
|
|
368
|
+
* resources.
|
|
369
|
+
*
|
|
370
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
|
|
371
|
+
* `..?limit=5`.
|
|
372
|
+
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
373
|
+
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
374
|
+
*
|
|
375
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
376
|
+
* `..?offset=25&limit=25`.
|
|
377
|
+
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
378
|
+
*
|
|
379
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
380
|
+
* `..?search=text`.
|
|
381
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
382
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
|
|
383
|
+
*/
|
|
384
|
+
getLocks(params: SecretsManagerV1.GetLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
|
|
385
|
+
/**
|
|
386
|
+
* Lock a secret.
|
|
387
|
+
*
|
|
388
|
+
* Create a lock on the current version of a secret.
|
|
389
|
+
*
|
|
390
|
+
* A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
|
|
391
|
+
* successful request attaches a new lock to your secret, or replaces a lock of the same name if it already exists.
|
|
392
|
+
* Additionally, you can use this method to clear any matching locks on a secret by using one of the following
|
|
393
|
+
* optional lock modes:
|
|
394
|
+
*
|
|
395
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
396
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
397
|
+
* it doesn't have any locks.
|
|
398
|
+
*
|
|
399
|
+
* For more information about locking secrets, check out the
|
|
400
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
|
|
401
|
+
*
|
|
402
|
+
* @param {Object} params - The parameters to send to the service.
|
|
403
|
+
* @param {string} params.secretType - The secret type.
|
|
404
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
405
|
+
* @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
|
|
406
|
+
* @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
|
|
407
|
+
* clear any matching locks on a secret version.
|
|
408
|
+
*
|
|
409
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
410
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
411
|
+
* it doesn't have any locks.
|
|
412
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
413
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
414
|
+
*/
|
|
415
|
+
lockSecret(params: SecretsManagerV1.LockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
416
|
+
/**
|
|
417
|
+
* Unlock a secret.
|
|
418
|
+
*
|
|
419
|
+
* Delete one or more locks that are associated with the current version of a secret.
|
|
420
|
+
*
|
|
421
|
+
* A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
|
|
422
|
+
* the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
|
|
423
|
+
* ["lock1", "lock2"]}`.
|
|
424
|
+
*
|
|
425
|
+
* **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
|
|
426
|
+
* removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
|
|
427
|
+
* the metadata of your secret.
|
|
428
|
+
*
|
|
429
|
+
* @param {Object} params - The parameters to send to the service.
|
|
430
|
+
* @param {string} params.secretType - The secret type.
|
|
431
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
432
|
+
* @param {string[]} [params.locks] - A comma-separated list of locks to delete.
|
|
433
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
434
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
435
|
+
*/
|
|
436
|
+
unlockSecret(params: SecretsManagerV1.UnlockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
437
|
+
/**
|
|
438
|
+
* List secret version locks.
|
|
439
|
+
*
|
|
440
|
+
* List the locks that are associated with a specified secret version.
|
|
441
|
+
*
|
|
442
|
+
* @param {Object} params - The parameters to send to the service.
|
|
443
|
+
* @param {string} params.secretType - The secret type.
|
|
444
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
445
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
446
|
+
* `previous` to retrieve the previous version.
|
|
447
|
+
*
|
|
448
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
449
|
+
* the response details.
|
|
450
|
+
* @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
|
|
451
|
+
* the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
|
|
452
|
+
* resources.
|
|
453
|
+
*
|
|
454
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
|
|
455
|
+
* `..?limit=5`.
|
|
456
|
+
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
457
|
+
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
458
|
+
*
|
|
459
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
460
|
+
* `..?offset=25&limit=25`.
|
|
461
|
+
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
462
|
+
*
|
|
463
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
464
|
+
* `..?search=text`.
|
|
465
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
466
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
|
|
467
|
+
*/
|
|
468
|
+
getSecretVersionLocks(params: SecretsManagerV1.GetSecretVersionLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
|
|
469
|
+
/**
|
|
470
|
+
* Lock a secret version.
|
|
471
|
+
*
|
|
472
|
+
* Create a lock on the specified version of a secret.
|
|
473
|
+
*
|
|
474
|
+
* A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
|
|
475
|
+
* successful request attaches a new lock to the specified version, or replaces a lock of the same name if it already
|
|
476
|
+
* exists. Additionally, you can use this method to clear any matching locks on a secret version by using one of the
|
|
477
|
+
* following optional lock modes:
|
|
478
|
+
*
|
|
479
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
480
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
481
|
+
* it doesn't have any locks.
|
|
482
|
+
*
|
|
483
|
+
* For more information about locking secrets, check out the
|
|
484
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
|
|
485
|
+
*
|
|
486
|
+
* @param {Object} params - The parameters to send to the service.
|
|
487
|
+
* @param {string} params.secretType - The secret type.
|
|
488
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
489
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
490
|
+
* `previous` to retrieve the previous version.
|
|
491
|
+
*
|
|
492
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
493
|
+
* the response details.
|
|
494
|
+
* @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
|
|
495
|
+
* @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
|
|
496
|
+
* clear any matching locks on a secret version.
|
|
497
|
+
*
|
|
498
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
499
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
500
|
+
* it doesn't have any locks.
|
|
501
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
502
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
503
|
+
*/
|
|
504
|
+
lockSecretVersion(params: SecretsManagerV1.LockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
505
|
+
/**
|
|
506
|
+
* Unlock a secret version.
|
|
507
|
+
*
|
|
508
|
+
* Delete one or more locks that are associated with the specified secret version.
|
|
509
|
+
*
|
|
510
|
+
* A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
|
|
511
|
+
* the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
|
|
512
|
+
* ["lock-1", "lock-2"]}`.
|
|
513
|
+
*
|
|
514
|
+
* **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
|
|
515
|
+
* removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
|
|
516
|
+
* the metadata of your secret.
|
|
517
|
+
*
|
|
518
|
+
* @param {Object} params - The parameters to send to the service.
|
|
519
|
+
* @param {string} params.secretType - The secret type.
|
|
520
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
521
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
522
|
+
* `previous` to retrieve the previous version.
|
|
523
|
+
*
|
|
524
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
525
|
+
* the response details.
|
|
526
|
+
* @param {string[]} [params.locks] - A comma-separated list of locks to delete.
|
|
527
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
528
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
529
|
+
*/
|
|
530
|
+
unlockSecretVersion(params: SecretsManagerV1.UnlockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
531
|
+
/**
|
|
532
|
+
* List all secrets and locks.
|
|
533
|
+
*
|
|
534
|
+
* List the lock details that are associated with all secrets in your Secrets Manager instance.
|
|
535
|
+
*
|
|
536
|
+
* @param {Object} [params] - The parameters to send to the service.
|
|
537
|
+
* @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
|
|
538
|
+
* the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
|
|
539
|
+
* resources.
|
|
540
|
+
*
|
|
541
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
|
|
542
|
+
* `..?limit=5`.
|
|
543
|
+
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
544
|
+
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
545
|
+
*
|
|
546
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
547
|
+
* `..?offset=25&limit=25`.
|
|
548
|
+
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
549
|
+
*
|
|
550
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
551
|
+
* `..?search=text`.
|
|
552
|
+
* @param {string[]} [params.groups] - Filter secrets by groups.
|
|
553
|
+
*
|
|
554
|
+
* You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
|
|
555
|
+
* that are in the default secret group, use the `default` keyword.
|
|
556
|
+
*
|
|
557
|
+
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
558
|
+
* use `..?groups={secret_group_ID},default`.
|
|
559
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
560
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>}
|
|
561
|
+
*/
|
|
562
|
+
listInstanceSecretsLocks(params?: SecretsManagerV1.ListInstanceSecretsLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>;
|
|
355
563
|
/*************************
|
|
356
564
|
* policies
|
|
357
565
|
************************/
|
|
@@ -667,14 +875,14 @@ declare namespace SecretsManagerV1 {
|
|
|
667
875
|
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
668
876
|
*
|
|
669
877
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
670
|
-
* `../secrets/{
|
|
878
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
671
879
|
*/
|
|
672
880
|
limit?: number;
|
|
673
881
|
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
674
882
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
675
883
|
*
|
|
676
884
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
677
|
-
*
|
|
885
|
+
* `..?offset=25&limit=25`.
|
|
678
886
|
*/
|
|
679
887
|
offset?: number;
|
|
680
888
|
headers?: OutgoingHttpHeaders;
|
|
@@ -698,27 +906,27 @@ declare namespace SecretsManagerV1 {
|
|
|
698
906
|
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
699
907
|
*
|
|
700
908
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
701
|
-
* `../secrets/{
|
|
909
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
702
910
|
*/
|
|
703
911
|
limit?: number;
|
|
704
912
|
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
705
913
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
706
914
|
*
|
|
707
915
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
708
|
-
*
|
|
916
|
+
* `..?offset=25&limit=25`.
|
|
709
917
|
*/
|
|
710
918
|
offset?: number;
|
|
711
919
|
/** Filter secrets that contain the specified string. The fields that are searched include: id, name,
|
|
712
920
|
* description, labels, secret_type.
|
|
713
921
|
*
|
|
714
922
|
* **Usage:** If you want to list only the secrets that contain the string "text", use
|
|
715
|
-
* `../secrets/{
|
|
923
|
+
* `../secrets/{secret_type}?search=text`.
|
|
716
924
|
*/
|
|
717
925
|
search?: string;
|
|
718
926
|
/** Sort a list of secrets by the specified field.
|
|
719
927
|
*
|
|
720
928
|
* **Usage:** To sort a list of secrets by their creation date, use
|
|
721
|
-
* `../secrets/{
|
|
929
|
+
* `../secrets/{secret_type}?sort_by=creation_date`.
|
|
722
930
|
*/
|
|
723
931
|
sortBy?: ListAllSecretsConstants.SortBy | string;
|
|
724
932
|
/** Filter secrets by groups.
|
|
@@ -727,14 +935,14 @@ declare namespace SecretsManagerV1 {
|
|
|
727
935
|
* secrets that are in the default secret group, use the `default` keyword.
|
|
728
936
|
*
|
|
729
937
|
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
730
|
-
* use
|
|
938
|
+
* use `..?groups={secret_group_ID},default`.
|
|
731
939
|
*/
|
|
732
940
|
groups?: string[];
|
|
733
941
|
headers?: OutgoingHttpHeaders;
|
|
734
942
|
}
|
|
735
943
|
/** Constants for the `listAllSecrets` operation. */
|
|
736
944
|
namespace ListAllSecretsConstants {
|
|
737
|
-
/** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{
|
|
945
|
+
/** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{secret_type}?sort_by=creation_date`. */
|
|
738
946
|
enum SortBy {
|
|
739
947
|
ID = "id",
|
|
740
948
|
CREATION_DATE = "creation_date",
|
|
@@ -968,6 +1176,262 @@ declare namespace SecretsManagerV1 {
|
|
|
968
1176
|
KV = "kv"
|
|
969
1177
|
}
|
|
970
1178
|
}
|
|
1179
|
+
/** Parameters for the `getLocks` operation. */
|
|
1180
|
+
interface GetLocksParams {
|
|
1181
|
+
/** The secret type. */
|
|
1182
|
+
secretType: GetLocksConstants.SecretType | string;
|
|
1183
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1184
|
+
id: string;
|
|
1185
|
+
/** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
|
|
1186
|
+
* retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
1187
|
+
*
|
|
1188
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
|
|
1189
|
+
* `..?limit=5`.
|
|
1190
|
+
*/
|
|
1191
|
+
limit?: number;
|
|
1192
|
+
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1193
|
+
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1194
|
+
*
|
|
1195
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
1196
|
+
* `..?offset=25&limit=25`.
|
|
1197
|
+
*/
|
|
1198
|
+
offset?: number;
|
|
1199
|
+
/** Filter locks that contain the specified string in the field "name".
|
|
1200
|
+
*
|
|
1201
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
1202
|
+
* `..?search=text`.
|
|
1203
|
+
*/
|
|
1204
|
+
search?: string;
|
|
1205
|
+
headers?: OutgoingHttpHeaders;
|
|
1206
|
+
}
|
|
1207
|
+
/** Constants for the `getLocks` operation. */
|
|
1208
|
+
namespace GetLocksConstants {
|
|
1209
|
+
/** The secret type. */
|
|
1210
|
+
enum SecretType {
|
|
1211
|
+
ARBITRARY = "arbitrary",
|
|
1212
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1213
|
+
IMPORTED_CERT = "imported_cert",
|
|
1214
|
+
PUBLIC_CERT = "public_cert",
|
|
1215
|
+
PRIVATE_CERT = "private_cert",
|
|
1216
|
+
USERNAME_PASSWORD = "username_password",
|
|
1217
|
+
KV = "kv"
|
|
1218
|
+
}
|
|
1219
|
+
}
|
|
1220
|
+
/** Parameters for the `lockSecret` operation. */
|
|
1221
|
+
interface LockSecretParams {
|
|
1222
|
+
/** The secret type. */
|
|
1223
|
+
secretType: LockSecretConstants.SecretType | string;
|
|
1224
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1225
|
+
id: string;
|
|
1226
|
+
/** The lock data to be attached to a secret version. */
|
|
1227
|
+
locks?: LockSecretBodyLocksItem[];
|
|
1228
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
|
|
1229
|
+
* on a secret version.
|
|
1230
|
+
*
|
|
1231
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
|
|
1232
|
+
* secret.
|
|
1233
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
|
|
1234
|
+
* if it doesn't have any locks.
|
|
1235
|
+
*/
|
|
1236
|
+
mode?: LockSecretConstants.Mode | string;
|
|
1237
|
+
headers?: OutgoingHttpHeaders;
|
|
1238
|
+
}
|
|
1239
|
+
/** Constants for the `lockSecret` operation. */
|
|
1240
|
+
namespace LockSecretConstants {
|
|
1241
|
+
/** The secret type. */
|
|
1242
|
+
enum SecretType {
|
|
1243
|
+
ARBITRARY = "arbitrary",
|
|
1244
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1245
|
+
IMPORTED_CERT = "imported_cert",
|
|
1246
|
+
PUBLIC_CERT = "public_cert",
|
|
1247
|
+
PRIVATE_CERT = "private_cert",
|
|
1248
|
+
USERNAME_PASSWORD = "username_password",
|
|
1249
|
+
KV = "kv"
|
|
1250
|
+
}
|
|
1251
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1252
|
+
enum Mode {
|
|
1253
|
+
EXCLUSIVE = "exclusive",
|
|
1254
|
+
EXCLUSIVE_DELETE = "exclusive_delete"
|
|
1255
|
+
}
|
|
1256
|
+
}
|
|
1257
|
+
/** Parameters for the `unlockSecret` operation. */
|
|
1258
|
+
interface UnlockSecretParams {
|
|
1259
|
+
/** The secret type. */
|
|
1260
|
+
secretType: UnlockSecretConstants.SecretType | string;
|
|
1261
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1262
|
+
id: string;
|
|
1263
|
+
/** A comma-separated list of locks to delete. */
|
|
1264
|
+
locks?: string[];
|
|
1265
|
+
headers?: OutgoingHttpHeaders;
|
|
1266
|
+
}
|
|
1267
|
+
/** Constants for the `unlockSecret` operation. */
|
|
1268
|
+
namespace UnlockSecretConstants {
|
|
1269
|
+
/** The secret type. */
|
|
1270
|
+
enum SecretType {
|
|
1271
|
+
ARBITRARY = "arbitrary",
|
|
1272
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1273
|
+
IMPORTED_CERT = "imported_cert",
|
|
1274
|
+
PUBLIC_CERT = "public_cert",
|
|
1275
|
+
PRIVATE_CERT = "private_cert",
|
|
1276
|
+
USERNAME_PASSWORD = "username_password",
|
|
1277
|
+
KV = "kv"
|
|
1278
|
+
}
|
|
1279
|
+
}
|
|
1280
|
+
/** Parameters for the `getSecretVersionLocks` operation. */
|
|
1281
|
+
interface GetSecretVersionLocksParams {
|
|
1282
|
+
/** The secret type. */
|
|
1283
|
+
secretType: GetSecretVersionLocksConstants.SecretType | string;
|
|
1284
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1285
|
+
id: string;
|
|
1286
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1287
|
+
* previous version.
|
|
1288
|
+
*
|
|
1289
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1290
|
+
* check the response details.
|
|
1291
|
+
*/
|
|
1292
|
+
versionId: string;
|
|
1293
|
+
/** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
|
|
1294
|
+
* retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
1295
|
+
*
|
|
1296
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
|
|
1297
|
+
* `..?limit=5`.
|
|
1298
|
+
*/
|
|
1299
|
+
limit?: number;
|
|
1300
|
+
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1301
|
+
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1302
|
+
*
|
|
1303
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
1304
|
+
* `..?offset=25&limit=25`.
|
|
1305
|
+
*/
|
|
1306
|
+
offset?: number;
|
|
1307
|
+
/** Filter locks that contain the specified string in the field "name".
|
|
1308
|
+
*
|
|
1309
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
1310
|
+
* `..?search=text`.
|
|
1311
|
+
*/
|
|
1312
|
+
search?: string;
|
|
1313
|
+
headers?: OutgoingHttpHeaders;
|
|
1314
|
+
}
|
|
1315
|
+
/** Constants for the `getSecretVersionLocks` operation. */
|
|
1316
|
+
namespace GetSecretVersionLocksConstants {
|
|
1317
|
+
/** The secret type. */
|
|
1318
|
+
enum SecretType {
|
|
1319
|
+
ARBITRARY = "arbitrary",
|
|
1320
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1321
|
+
IMPORTED_CERT = "imported_cert",
|
|
1322
|
+
PUBLIC_CERT = "public_cert",
|
|
1323
|
+
PRIVATE_CERT = "private_cert",
|
|
1324
|
+
USERNAME_PASSWORD = "username_password",
|
|
1325
|
+
KV = "kv"
|
|
1326
|
+
}
|
|
1327
|
+
}
|
|
1328
|
+
/** Parameters for the `lockSecretVersion` operation. */
|
|
1329
|
+
interface LockSecretVersionParams {
|
|
1330
|
+
/** The secret type. */
|
|
1331
|
+
secretType: LockSecretVersionConstants.SecretType | string;
|
|
1332
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1333
|
+
id: string;
|
|
1334
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1335
|
+
* previous version.
|
|
1336
|
+
*
|
|
1337
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1338
|
+
* check the response details.
|
|
1339
|
+
*/
|
|
1340
|
+
versionId: string;
|
|
1341
|
+
/** The lock data to be attached to a secret version. */
|
|
1342
|
+
locks?: LockSecretBodyLocksItem[];
|
|
1343
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
|
|
1344
|
+
* on a secret version.
|
|
1345
|
+
*
|
|
1346
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
|
|
1347
|
+
* secret.
|
|
1348
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
|
|
1349
|
+
* if it doesn't have any locks.
|
|
1350
|
+
*/
|
|
1351
|
+
mode?: LockSecretVersionConstants.Mode | string;
|
|
1352
|
+
headers?: OutgoingHttpHeaders;
|
|
1353
|
+
}
|
|
1354
|
+
/** Constants for the `lockSecretVersion` operation. */
|
|
1355
|
+
namespace LockSecretVersionConstants {
|
|
1356
|
+
/** The secret type. */
|
|
1357
|
+
enum SecretType {
|
|
1358
|
+
ARBITRARY = "arbitrary",
|
|
1359
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1360
|
+
IMPORTED_CERT = "imported_cert",
|
|
1361
|
+
PUBLIC_CERT = "public_cert",
|
|
1362
|
+
PRIVATE_CERT = "private_cert",
|
|
1363
|
+
USERNAME_PASSWORD = "username_password",
|
|
1364
|
+
KV = "kv"
|
|
1365
|
+
}
|
|
1366
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1367
|
+
enum Mode {
|
|
1368
|
+
EXCLUSIVE = "exclusive",
|
|
1369
|
+
EXCLUSIVE_DELETE = "exclusive_delete"
|
|
1370
|
+
}
|
|
1371
|
+
}
|
|
1372
|
+
/** Parameters for the `unlockSecretVersion` operation. */
|
|
1373
|
+
interface UnlockSecretVersionParams {
|
|
1374
|
+
/** The secret type. */
|
|
1375
|
+
secretType: UnlockSecretVersionConstants.SecretType | string;
|
|
1376
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1377
|
+
id: string;
|
|
1378
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1379
|
+
* previous version.
|
|
1380
|
+
*
|
|
1381
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1382
|
+
* check the response details.
|
|
1383
|
+
*/
|
|
1384
|
+
versionId: string;
|
|
1385
|
+
/** A comma-separated list of locks to delete. */
|
|
1386
|
+
locks?: string[];
|
|
1387
|
+
headers?: OutgoingHttpHeaders;
|
|
1388
|
+
}
|
|
1389
|
+
/** Constants for the `unlockSecretVersion` operation. */
|
|
1390
|
+
namespace UnlockSecretVersionConstants {
|
|
1391
|
+
/** The secret type. */
|
|
1392
|
+
enum SecretType {
|
|
1393
|
+
ARBITRARY = "arbitrary",
|
|
1394
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1395
|
+
IMPORTED_CERT = "imported_cert",
|
|
1396
|
+
PUBLIC_CERT = "public_cert",
|
|
1397
|
+
PRIVATE_CERT = "private_cert",
|
|
1398
|
+
USERNAME_PASSWORD = "username_password",
|
|
1399
|
+
KV = "kv"
|
|
1400
|
+
}
|
|
1401
|
+
}
|
|
1402
|
+
/** Parameters for the `listInstanceSecretsLocks` operation. */
|
|
1403
|
+
interface ListInstanceSecretsLocksParams {
|
|
1404
|
+
/** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
|
|
1405
|
+
* retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
1406
|
+
*
|
|
1407
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
|
|
1408
|
+
* `..?limit=5`.
|
|
1409
|
+
*/
|
|
1410
|
+
limit?: number;
|
|
1411
|
+
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1412
|
+
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1413
|
+
*
|
|
1414
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
1415
|
+
* `..?offset=25&limit=25`.
|
|
1416
|
+
*/
|
|
1417
|
+
offset?: number;
|
|
1418
|
+
/** Filter locks that contain the specified string in the field "name".
|
|
1419
|
+
*
|
|
1420
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
1421
|
+
* `..?search=text`.
|
|
1422
|
+
*/
|
|
1423
|
+
search?: string;
|
|
1424
|
+
/** Filter secrets by groups.
|
|
1425
|
+
*
|
|
1426
|
+
* You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter
|
|
1427
|
+
* secrets that are in the default secret group, use the `default` keyword.
|
|
1428
|
+
*
|
|
1429
|
+
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
1430
|
+
* use `..?groups={secret_group_ID},default`.
|
|
1431
|
+
*/
|
|
1432
|
+
groups?: string[];
|
|
1433
|
+
headers?: OutgoingHttpHeaders;
|
|
1434
|
+
}
|
|
971
1435
|
/** Parameters for the `putPolicy` operation. */
|
|
972
1436
|
interface PutPolicyParams {
|
|
973
1437
|
/** The secret type. */
|
|
@@ -1368,6 +1832,13 @@ declare namespace SecretsManagerV1 {
|
|
|
1368
1832
|
/** GetConfigResourcesItem. */
|
|
1369
1833
|
interface GetConfigResourcesItem {
|
|
1370
1834
|
}
|
|
1835
|
+
/** Properties that describe the locks that are associated with an instance. */
|
|
1836
|
+
interface GetInstanceLocks {
|
|
1837
|
+
/** The metadata that describes the resource array. */
|
|
1838
|
+
metadata: CollectionMetadata;
|
|
1839
|
+
/** A collection of resources. */
|
|
1840
|
+
resources: InstanceSecretsLocks[];
|
|
1841
|
+
}
|
|
1371
1842
|
/** Properties that describe an existing registration with Event Notifications. */
|
|
1372
1843
|
interface GetNotificationsSettings {
|
|
1373
1844
|
/** The metadata that describes the resource array. */
|
|
@@ -1382,6 +1853,13 @@ declare namespace SecretsManagerV1 {
|
|
|
1382
1853
|
/** A collection of resources. */
|
|
1383
1854
|
resources: SecretResource[];
|
|
1384
1855
|
}
|
|
1856
|
+
/** Properties that describe the lock of a secret or a secret version. */
|
|
1857
|
+
interface GetSecretLocks {
|
|
1858
|
+
/** The metadata that describes the resource array. */
|
|
1859
|
+
metadata: CollectionMetadata;
|
|
1860
|
+
/** A collection of resources. */
|
|
1861
|
+
resources: SecretsLocks[];
|
|
1862
|
+
}
|
|
1385
1863
|
/** GetSecretPolicies. */
|
|
1386
1864
|
interface GetSecretPolicies {
|
|
1387
1865
|
}
|
|
@@ -1406,6 +1884,22 @@ declare namespace SecretsManagerV1 {
|
|
|
1406
1884
|
/** A collection of resources. */
|
|
1407
1885
|
resources: ConfigElementDef[];
|
|
1408
1886
|
}
|
|
1887
|
+
/** Properties that describe the locks that are associated with an instance. */
|
|
1888
|
+
interface InstanceSecretsLocks {
|
|
1889
|
+
/** The unique ID of the secret. */
|
|
1890
|
+
secret_id?: string;
|
|
1891
|
+
/** The v4 UUID that uniquely identifies the secret group to assign to this secret.
|
|
1892
|
+
*
|
|
1893
|
+
* If you omit this parameter, your secret is assigned to the `default` secret group.
|
|
1894
|
+
*/
|
|
1895
|
+
secret_group_id?: string;
|
|
1896
|
+
/** The secret type. */
|
|
1897
|
+
secret_type?: string;
|
|
1898
|
+
/** A collection of locks that are attached to a secret version. */
|
|
1899
|
+
versions?: SecretLockVersion[];
|
|
1900
|
+
/** InstanceSecretsLocks accepts additional properties. */
|
|
1901
|
+
[propName: string]: any;
|
|
1902
|
+
}
|
|
1409
1903
|
/** Intermediate certificate authorities configuration. */
|
|
1410
1904
|
interface IntermediateCertificateAuthoritiesConfigItem {
|
|
1411
1905
|
/** The human-readable name to assign to your configuration. */
|
|
@@ -1444,6 +1938,13 @@ declare namespace SecretsManagerV1 {
|
|
|
1444
1938
|
/** The name that was assigned to the DNS provider configuration. */
|
|
1445
1939
|
dns?: string;
|
|
1446
1940
|
}
|
|
1941
|
+
/** Properties that describe the locks of a secret or a secret version. */
|
|
1942
|
+
interface ListSecretLocks {
|
|
1943
|
+
/** The metadata that describes the resource array. */
|
|
1944
|
+
metadata: CollectionMetadata;
|
|
1945
|
+
/** A collection of resources. */
|
|
1946
|
+
resources: SecretLockData[];
|
|
1947
|
+
}
|
|
1447
1948
|
/** Properties that describe a list of versions of a secret. */
|
|
1448
1949
|
interface ListSecretVersions {
|
|
1449
1950
|
/** The metadata that describes the resource array. */
|
|
@@ -1458,6 +1959,23 @@ declare namespace SecretsManagerV1 {
|
|
|
1458
1959
|
/** A collection of resources. */
|
|
1459
1960
|
resources?: SecretResource[];
|
|
1460
1961
|
}
|
|
1962
|
+
/** LockSecretBodyLocksItem. */
|
|
1963
|
+
interface LockSecretBodyLocksItem {
|
|
1964
|
+
/** A human-readable name to assign to the lock. The lock name must be unique per secret version.
|
|
1965
|
+
*
|
|
1966
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a name for your secret
|
|
1967
|
+
* lock.
|
|
1968
|
+
*/
|
|
1969
|
+
name: string;
|
|
1970
|
+
/** An extended description of the lock.
|
|
1971
|
+
*
|
|
1972
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a description for your
|
|
1973
|
+
* secret lock.
|
|
1974
|
+
*/
|
|
1975
|
+
description: string;
|
|
1976
|
+
/** Optional information to associate with a lock, such as resources CRNs to be used by automation. */
|
|
1977
|
+
attributes: JsonObject;
|
|
1978
|
+
}
|
|
1461
1979
|
/** The Event Notifications details. */
|
|
1462
1980
|
interface NotificationsSettings {
|
|
1463
1981
|
/** The Cloud Resource Name (CRN) of the connected Event Notifications instance. */
|
|
@@ -1555,6 +2073,56 @@ declare namespace SecretsManagerV1 {
|
|
|
1555
2073
|
/** SecretGroupResource accepts additional properties. */
|
|
1556
2074
|
[propName: string]: any;
|
|
1557
2075
|
}
|
|
2076
|
+
/** Properties that describe a lock. */
|
|
2077
|
+
interface SecretLockData {
|
|
2078
|
+
/** A human-readable name to assign to the secret lock.
|
|
2079
|
+
*
|
|
2080
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a name for the secret lock.
|
|
2081
|
+
*/
|
|
2082
|
+
name?: string;
|
|
2083
|
+
/** An extended description of the secret lock.
|
|
2084
|
+
*
|
|
2085
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a description for the
|
|
2086
|
+
* secret lock.
|
|
2087
|
+
*/
|
|
2088
|
+
description?: string;
|
|
2089
|
+
/** The date the secret lock was created. The date format follows RFC 3339. */
|
|
2090
|
+
creation_date?: string;
|
|
2091
|
+
/** The unique identifier for the entity that created the secret lock. */
|
|
2092
|
+
created_by?: string;
|
|
2093
|
+
/** The information that is associated with a lock, such as resources CRNs to be used by automation. */
|
|
2094
|
+
attributes?: JsonObject;
|
|
2095
|
+
/** The v4 UUID that uniquely identifies the secret version. */
|
|
2096
|
+
secret_version_id?: string;
|
|
2097
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
2098
|
+
secret_id?: string;
|
|
2099
|
+
/** The v4 UUID that uniquely identifies the secret group to assign to this secret.
|
|
2100
|
+
*
|
|
2101
|
+
* If you omit this parameter, your secret is assigned to the `default` secret group.
|
|
2102
|
+
*/
|
|
2103
|
+
secret_group_id?: string;
|
|
2104
|
+
/** Updates when the actual secret is modified. The date format follows RFC 3339. */
|
|
2105
|
+
last_update_date?: string;
|
|
2106
|
+
/** A representation for the 2 last secret versions. Could be "current" for version (n) or "previous" for
|
|
2107
|
+
* version (n-1).
|
|
2108
|
+
*/
|
|
2109
|
+
secret_version_alias?: string;
|
|
2110
|
+
}
|
|
2111
|
+
/** Properties that describe the secret locks. */
|
|
2112
|
+
interface SecretLockVersion {
|
|
2113
|
+
/** The v4 UUID that uniquely identifies the lock. */
|
|
2114
|
+
id?: string;
|
|
2115
|
+
/** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
|
|
2116
|
+
* is used for version `n-1`.
|
|
2117
|
+
*/
|
|
2118
|
+
alias?: string;
|
|
2119
|
+
/** The names of all locks that are associated with this secret. */
|
|
2120
|
+
locks?: string[];
|
|
2121
|
+
/** Indicates whether the payload for the secret version is stored and available. */
|
|
2122
|
+
payload_available?: boolean;
|
|
2123
|
+
/** SecretLockVersion accepts additional properties. */
|
|
2124
|
+
[propName: string]: any;
|
|
2125
|
+
}
|
|
1558
2126
|
/** SecretMetadata. */
|
|
1559
2127
|
interface SecretMetadata {
|
|
1560
2128
|
}
|
|
@@ -1586,6 +2154,20 @@ declare namespace SecretsManagerV1 {
|
|
|
1586
2154
|
/** SecretVersionMetadata. */
|
|
1587
2155
|
interface SecretVersionMetadata {
|
|
1588
2156
|
}
|
|
2157
|
+
/** Properties that describe the secret locks. */
|
|
2158
|
+
interface SecretsLocks {
|
|
2159
|
+
/** The unique ID of the secret. */
|
|
2160
|
+
secret_id?: string;
|
|
2161
|
+
/** The v4 UUID that uniquely identifies the secret group to assign to this secret.
|
|
2162
|
+
*
|
|
2163
|
+
* If you omit this parameter, your secret is assigned to the `default` secret group.
|
|
2164
|
+
*/
|
|
2165
|
+
secret_group_id?: string;
|
|
2166
|
+
/** A collection of locks that are attached to a secret version. */
|
|
2167
|
+
versions?: SecretLockVersion[];
|
|
2168
|
+
/** SecretsLocks accepts additional properties. */
|
|
2169
|
+
[propName: string]: any;
|
|
2170
|
+
}
|
|
1589
2171
|
/** Properties that are returned with a successful `sign` action. */
|
|
1590
2172
|
interface SignActionResultData {
|
|
1591
2173
|
/** The PEM-encoded certificate. */
|
|
@@ -1664,8 +2246,10 @@ declare namespace SecretsManagerV1 {
|
|
|
1664
2246
|
created_by?: string;
|
|
1665
2247
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
1666
2248
|
last_update_date?: string;
|
|
1667
|
-
/** The number of versions
|
|
2249
|
+
/** The number of versions that are associated with a secret. */
|
|
1668
2250
|
versions_total?: number;
|
|
2251
|
+
/** The number of locks that are associated with a secret. */
|
|
2252
|
+
locks_total?: number;
|
|
1669
2253
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
1670
2254
|
*
|
|
1671
2255
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -1727,6 +2311,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1727
2311
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
1728
2312
|
*/
|
|
1729
2313
|
versions?: JsonObject[];
|
|
2314
|
+
/** The number of locks that are associated with a secret. */
|
|
2315
|
+
locks_total?: number;
|
|
1730
2316
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
1731
2317
|
*
|
|
1732
2318
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -1755,6 +2341,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1755
2341
|
creation_date?: string;
|
|
1756
2342
|
/** The unique identifier for the entity that created the secret version. */
|
|
1757
2343
|
created_by?: string;
|
|
2344
|
+
/** The number of locks that are associated with a secret version. */
|
|
2345
|
+
locks_total?: number;
|
|
1758
2346
|
/** The data that is associated with the secret version.
|
|
1759
2347
|
*
|
|
1760
2348
|
* The data object contains the field `payload`.
|
|
@@ -1792,6 +2380,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1792
2380
|
* service API.
|
|
1793
2381
|
*/
|
|
1794
2382
|
downloaded?: boolean;
|
|
2383
|
+
/** The number of locks that are associated with a secret version. */
|
|
2384
|
+
locks_total?: number;
|
|
1795
2385
|
}
|
|
1796
2386
|
/** Metadata properties that describe a certificate secret. */
|
|
1797
2387
|
interface CertificateSecretMetadata extends SecretMetadata {
|
|
@@ -1838,8 +2428,10 @@ declare namespace SecretsManagerV1 {
|
|
|
1838
2428
|
created_by?: string;
|
|
1839
2429
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
1840
2430
|
last_update_date?: string;
|
|
1841
|
-
/** The number of versions
|
|
2431
|
+
/** The number of versions that are associated with a secret. */
|
|
1842
2432
|
versions_total?: number;
|
|
2433
|
+
/** The number of locks that are associated with a secret. */
|
|
2434
|
+
locks_total?: number;
|
|
1843
2435
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
1844
2436
|
serial_number?: string;
|
|
1845
2437
|
/** The identifier for the cryptographic algorithm that was used by the issuing certificate authority to sign
|
|
@@ -1914,6 +2506,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1914
2506
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
1915
2507
|
*/
|
|
1916
2508
|
versions?: JsonObject[];
|
|
2509
|
+
/** The number of locks that are associated with a secret. */
|
|
2510
|
+
locks_total?: number;
|
|
1917
2511
|
/** The contents of your certificate. The data must be formatted on a single line with embedded newline
|
|
1918
2512
|
* characters.
|
|
1919
2513
|
*/
|
|
@@ -1972,6 +2566,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1972
2566
|
creation_date?: string;
|
|
1973
2567
|
/** The unique identifier for the entity that created the secret version. */
|
|
1974
2568
|
created_by?: string;
|
|
2569
|
+
/** The number of locks that are associated with a secret version. */
|
|
2570
|
+
locks_total?: number;
|
|
1975
2571
|
validity?: CertificateValidity;
|
|
1976
2572
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
1977
2573
|
serial_number?: string;
|
|
@@ -2021,6 +2617,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2021
2617
|
* service API.
|
|
2022
2618
|
*/
|
|
2023
2619
|
downloaded?: boolean;
|
|
2620
|
+
/** The number of locks that are associated with a secret version. */
|
|
2621
|
+
locks_total?: number;
|
|
2024
2622
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2025
2623
|
serial_number?: string;
|
|
2026
2624
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -2338,8 +2936,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2338
2936
|
created_by?: string;
|
|
2339
2937
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
2340
2938
|
last_update_date?: string;
|
|
2341
|
-
/** The number of versions
|
|
2939
|
+
/** The number of versions that are associated with a secret. */
|
|
2342
2940
|
versions_total?: number;
|
|
2941
|
+
/** The number of locks that are associated with a secret. */
|
|
2942
|
+
locks_total?: number;
|
|
2343
2943
|
/** The time-to-live (TTL) or lease duration that is assigned to the secret. For `iam_credentials` secrets, the
|
|
2344
2944
|
* TTL defines for how long each generated API key remains valid.
|
|
2345
2945
|
*/
|
|
@@ -2417,6 +3017,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2417
3017
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
2418
3018
|
*/
|
|
2419
3019
|
versions?: JsonObject[];
|
|
3020
|
+
/** The number of locks that are associated with a secret. */
|
|
3021
|
+
locks_total?: number;
|
|
2420
3022
|
/** The time-to-live (TTL) or lease duration to assign to generated credentials.
|
|
2421
3023
|
*
|
|
2422
3024
|
* For `iam_credentials` secrets, the TTL defines for how long each generated API key remains valid. The value can
|
|
@@ -2478,6 +3080,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2478
3080
|
creation_date?: string;
|
|
2479
3081
|
/** The unique identifier for the entity that created the secret version. */
|
|
2480
3082
|
created_by?: string;
|
|
3083
|
+
/** The number of locks that are associated with a secret version. */
|
|
3084
|
+
locks_total?: number;
|
|
2481
3085
|
/** The data that is associated with the secret version. The data object contains the following fields:
|
|
2482
3086
|
*
|
|
2483
3087
|
* - `api_key`: The API key that is generated for this secret.
|
|
@@ -2517,6 +3121,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2517
3121
|
* service API.
|
|
2518
3122
|
*/
|
|
2519
3123
|
downloaded?: boolean;
|
|
3124
|
+
/** The number of locks that are associated with a secret version. */
|
|
3125
|
+
locks_total?: number;
|
|
2520
3126
|
}
|
|
2521
3127
|
/** Intermediate certificate authorities configuration. */
|
|
2522
3128
|
interface IntermediateCertificateAuthoritiesConfig extends GetConfigElementsResourcesItem {
|
|
@@ -2682,8 +3288,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2682
3288
|
created_by?: string;
|
|
2683
3289
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
2684
3290
|
last_update_date?: string;
|
|
2685
|
-
/** The number of versions
|
|
3291
|
+
/** The number of versions that are associated with a secret. */
|
|
2686
3292
|
versions_total?: number;
|
|
3293
|
+
/** The number of locks that are associated with a secret. */
|
|
3294
|
+
locks_total?: number;
|
|
2687
3295
|
}
|
|
2688
3296
|
/** Properties that describe a secret. */
|
|
2689
3297
|
interface KvSecretResource extends SecretResource {
|
|
@@ -2735,6 +3343,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2735
3343
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
2736
3344
|
*/
|
|
2737
3345
|
versions?: JsonObject[];
|
|
3346
|
+
/** The number of locks that are associated with a secret. */
|
|
3347
|
+
locks_total?: number;
|
|
2738
3348
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
2739
3349
|
*
|
|
2740
3350
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -2815,8 +3425,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2815
3425
|
created_by?: string;
|
|
2816
3426
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
2817
3427
|
last_update_date?: string;
|
|
2818
|
-
/** The number of versions
|
|
3428
|
+
/** The number of versions that are associated with a secret. */
|
|
2819
3429
|
versions_total?: number;
|
|
3430
|
+
/** The number of locks that are associated with a secret. */
|
|
3431
|
+
locks_total?: number;
|
|
2820
3432
|
/** The name of the certificate template. */
|
|
2821
3433
|
certificate_template?: string;
|
|
2822
3434
|
/** The intermediate certificate authority that signed this certificate. */
|
|
@@ -2894,6 +3506,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2894
3506
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
2895
3507
|
*/
|
|
2896
3508
|
versions?: JsonObject[];
|
|
3509
|
+
/** The number of locks that are associated with a secret. */
|
|
3510
|
+
locks_total?: number;
|
|
2897
3511
|
/** The name of the certificate template. */
|
|
2898
3512
|
certificate_template: string;
|
|
2899
3513
|
/** The intermediate certificate authority that signed this certificate. */
|
|
@@ -2972,6 +3586,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2972
3586
|
creation_date?: string;
|
|
2973
3587
|
/** The unique identifier for the entity that created the secret version. */
|
|
2974
3588
|
created_by?: string;
|
|
3589
|
+
/** The number of locks that are associated with a secret version. */
|
|
3590
|
+
locks_total?: number;
|
|
2975
3591
|
validity?: CertificateValidity;
|
|
2976
3592
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2977
3593
|
serial_number?: string;
|
|
@@ -3045,6 +3661,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3045
3661
|
* service API.
|
|
3046
3662
|
*/
|
|
3047
3663
|
downloaded?: boolean;
|
|
3664
|
+
/** The number of locks that are associated with a secret version. */
|
|
3665
|
+
locks_total?: number;
|
|
3048
3666
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
3049
3667
|
serial_number?: string;
|
|
3050
3668
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -3115,8 +3733,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3115
3733
|
created_by?: string;
|
|
3116
3734
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
3117
3735
|
last_update_date?: string;
|
|
3118
|
-
/** The number of versions
|
|
3736
|
+
/** The number of versions that are associated with a secret. */
|
|
3119
3737
|
versions_total?: number;
|
|
3738
|
+
/** The number of locks that are associated with a secret. */
|
|
3739
|
+
locks_total?: number;
|
|
3120
3740
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3121
3741
|
issuer?: string;
|
|
3122
3742
|
/** Determines whether your issued certificate is bundled with intermediate certificates.
|
|
@@ -3197,6 +3817,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3197
3817
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
3198
3818
|
*/
|
|
3199
3819
|
versions?: JsonObject[];
|
|
3820
|
+
/** The number of locks that are associated with a secret. */
|
|
3821
|
+
locks_total?: number;
|
|
3200
3822
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3201
3823
|
issuer?: string;
|
|
3202
3824
|
/** Determines whether your issued certificate is bundled with intermediate certificates.
|
|
@@ -3797,8 +4419,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3797
4419
|
created_by?: string;
|
|
3798
4420
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
3799
4421
|
last_update_date?: string;
|
|
3800
|
-
/** The number of versions
|
|
4422
|
+
/** The number of versions that are associated with a secret. */
|
|
3801
4423
|
versions_total?: number;
|
|
4424
|
+
/** The number of locks that are associated with a secret. */
|
|
4425
|
+
locks_total?: number;
|
|
3802
4426
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
3803
4427
|
*
|
|
3804
4428
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -3860,6 +4484,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3860
4484
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
3861
4485
|
*/
|
|
3862
4486
|
versions?: JsonObject[];
|
|
4487
|
+
/** The number of locks that are associated with a secret. */
|
|
4488
|
+
locks_total?: number;
|
|
3863
4489
|
/** The username to assign to this secret. */
|
|
3864
4490
|
username?: string;
|
|
3865
4491
|
/** The password to assign to this secret. */
|
|
@@ -3897,6 +4523,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3897
4523
|
creation_date?: string;
|
|
3898
4524
|
/** The unique identifier for the entity that created the secret version. */
|
|
3899
4525
|
created_by?: string;
|
|
4526
|
+
/** The number of locks that are associated with a secret version. */
|
|
4527
|
+
locks_total?: number;
|
|
3900
4528
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3901
4529
|
auto_rotated?: boolean;
|
|
3902
4530
|
/** The data that is associated with the secret version. The data object contains the following fields:
|
|
@@ -3939,6 +4567,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3939
4567
|
* service API.
|
|
3940
4568
|
*/
|
|
3941
4569
|
downloaded?: boolean;
|
|
4570
|
+
/** The number of locks that are associated with a secret version. */
|
|
4571
|
+
locks_total?: number;
|
|
3942
4572
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3943
4573
|
auto_rotated?: boolean;
|
|
3944
4574
|
}
|