@ibm-cloud/secrets-manager 1.0.33 → 1.0.36
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/auth/index.js +1 -0
- package/auth/index.js.map +1 -1
- package/lib/common.js +1 -1
- package/lib/common.js.map +1 -1
- package/package.json +5 -5
- package/secrets-manager/v1.d.ts +844 -30
- package/secrets-manager/v1.js +686 -76
- package/secrets-manager/v1.js.map +1 -1
package/secrets-manager/v1.d.ts
CHANGED
|
@@ -21,7 +21,7 @@ import { BaseService, UserOptions } from 'ibm-cloud-sdk-core';
|
|
|
21
21
|
* services or your custom-built applications. Secrets are stored in a dedicated instance of Secrets Manager, which is
|
|
22
22
|
* built on open source HashiCorp Vault.
|
|
23
23
|
*
|
|
24
|
-
* API Version: 1.0.
|
|
24
|
+
* API Version: 1.0.0
|
|
25
25
|
* See: https://cloud.ibm.com/docs/secrets-manager
|
|
26
26
|
*/
|
|
27
27
|
declare class SecretsManagerV1 extends BaseService {
|
|
@@ -153,12 +153,12 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
153
153
|
* resources.
|
|
154
154
|
*
|
|
155
155
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
156
|
-
* `../secrets/{
|
|
156
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
157
157
|
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
158
158
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
159
159
|
*
|
|
160
160
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
161
|
-
*
|
|
161
|
+
* `..?offset=25&limit=25`.
|
|
162
162
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
163
163
|
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
|
|
164
164
|
*/
|
|
@@ -174,28 +174,28 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
174
174
|
* resources.
|
|
175
175
|
*
|
|
176
176
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
177
|
-
* `../secrets/{
|
|
177
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
178
178
|
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
179
179
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
180
180
|
*
|
|
181
181
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
182
|
-
*
|
|
182
|
+
* `..?offset=25&limit=25`.
|
|
183
183
|
* @param {string} [params.search] - Filter secrets that contain the specified string. The fields that are searched
|
|
184
184
|
* include: id, name, description, labels, secret_type.
|
|
185
185
|
*
|
|
186
186
|
* **Usage:** If you want to list only the secrets that contain the string "text", use
|
|
187
|
-
* `../secrets/{
|
|
187
|
+
* `../secrets/{secret_type}?search=text`.
|
|
188
188
|
* @param {string} [params.sortBy] - Sort a list of secrets by the specified field.
|
|
189
189
|
*
|
|
190
190
|
* **Usage:** To sort a list of secrets by their creation date, use
|
|
191
|
-
* `../secrets/{
|
|
191
|
+
* `../secrets/{secret_type}?sort_by=creation_date`.
|
|
192
192
|
* @param {string[]} [params.groups] - Filter secrets by groups.
|
|
193
193
|
*
|
|
194
194
|
* You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
|
|
195
195
|
* that are in the default secret group, use the `default` keyword.
|
|
196
196
|
*
|
|
197
197
|
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
198
|
-
* use
|
|
198
|
+
* use `..?groups={secret_group_ID},default`.
|
|
199
199
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
200
200
|
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
|
|
201
201
|
*/
|
|
@@ -225,6 +225,7 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
225
225
|
* - `restore`: Restore a previous version of an `iam_credentials` secret.
|
|
226
226
|
* - `revoke`: Revoke a private certificate.
|
|
227
227
|
* - `delete_credentials`: Delete the API key that is associated with an `iam_credentials` secret.
|
|
228
|
+
* - `validate_dns_challenge`: Validate challenge for public certificate order with manual dns provider.
|
|
228
229
|
*
|
|
229
230
|
* @param {Object} params - The parameters to send to the service.
|
|
230
231
|
* @param {string} params.secretType - The secret type.
|
|
@@ -302,7 +303,7 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
302
303
|
*/
|
|
303
304
|
updateSecretVersion(params: SecretsManagerV1.UpdateSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecret>>;
|
|
304
305
|
/**
|
|
305
|
-
* Get secret version
|
|
306
|
+
* Get the metadata of a secret version.
|
|
306
307
|
*
|
|
307
308
|
* Get the metadata of a secret version by specifying the ID of the version or the alias `previous`.
|
|
308
309
|
*
|
|
@@ -321,7 +322,26 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
321
322
|
*/
|
|
322
323
|
getSecretVersionMetadata(params: SecretsManagerV1.GetSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
|
|
323
324
|
/**
|
|
324
|
-
*
|
|
325
|
+
* Update the metadata of a secret version.
|
|
326
|
+
*
|
|
327
|
+
* Update the metadata of a secret version, such as `version_custom_metadata`.
|
|
328
|
+
*
|
|
329
|
+
* @param {Object} params - The parameters to send to the service.
|
|
330
|
+
* @param {string} params.secretType - The secret type.
|
|
331
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
332
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
333
|
+
* `previous` to retrieve the previous version.
|
|
334
|
+
*
|
|
335
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
336
|
+
* the response details.
|
|
337
|
+
* @param {CollectionMetadata} params.metadata - The metadata that describes the resource array.
|
|
338
|
+
* @param {UpdateSecretVersionMetadata[]} params.resources - A collection of resources.
|
|
339
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
340
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>}
|
|
341
|
+
*/
|
|
342
|
+
updateSecretVersionMetadata(params: SecretsManagerV1.UpdateSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
|
|
343
|
+
/**
|
|
344
|
+
* Get the metadata of a secret.
|
|
325
345
|
*
|
|
326
346
|
* Get the details of a secret by specifying its ID.
|
|
327
347
|
*
|
|
@@ -352,6 +372,214 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
352
372
|
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>}
|
|
353
373
|
*/
|
|
354
374
|
updateSecretMetadata(params: SecretsManagerV1.UpdateSecretMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>;
|
|
375
|
+
/*************************
|
|
376
|
+
* locks
|
|
377
|
+
************************/
|
|
378
|
+
/**
|
|
379
|
+
* List secret locks.
|
|
380
|
+
*
|
|
381
|
+
* List the locks that are associated with a specified secret.
|
|
382
|
+
*
|
|
383
|
+
* @param {Object} params - The parameters to send to the service.
|
|
384
|
+
* @param {string} params.secretType - The secret type.
|
|
385
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
386
|
+
* @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
|
|
387
|
+
* items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
388
|
+
*
|
|
389
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
|
|
390
|
+
* `..?limit=5`.
|
|
391
|
+
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
392
|
+
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
393
|
+
*
|
|
394
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
395
|
+
* `..?offset=25&limit=25`.
|
|
396
|
+
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
397
|
+
*
|
|
398
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
399
|
+
* `..?search=text`.
|
|
400
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
401
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
|
|
402
|
+
*/
|
|
403
|
+
getLocks(params: SecretsManagerV1.GetLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
|
|
404
|
+
/**
|
|
405
|
+
* Lock a secret.
|
|
406
|
+
*
|
|
407
|
+
* Create a lock on the current version of a secret.
|
|
408
|
+
*
|
|
409
|
+
* A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
|
|
410
|
+
* successful request attaches a new lock to your secret, or replaces a lock of the same name if it already exists.
|
|
411
|
+
* Additionally, you can use this method to clear any matching locks on a secret by using one of the following
|
|
412
|
+
* optional lock modes:
|
|
413
|
+
*
|
|
414
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
415
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
416
|
+
* it doesn't have any locks.
|
|
417
|
+
*
|
|
418
|
+
* For more information about locking secrets, check out the
|
|
419
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
|
|
420
|
+
*
|
|
421
|
+
* @param {Object} params - The parameters to send to the service.
|
|
422
|
+
* @param {string} params.secretType - The secret type.
|
|
423
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
424
|
+
* @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
|
|
425
|
+
* @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
|
|
426
|
+
* clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
|
|
427
|
+
* is ignored.
|
|
428
|
+
*
|
|
429
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
430
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
431
|
+
* it doesn't have any locks.
|
|
432
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
433
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
434
|
+
*/
|
|
435
|
+
lockSecret(params: SecretsManagerV1.LockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
436
|
+
/**
|
|
437
|
+
* Unlock a secret.
|
|
438
|
+
*
|
|
439
|
+
* Delete one or more locks that are associated with the current version of a secret.
|
|
440
|
+
*
|
|
441
|
+
* A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
|
|
442
|
+
* the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
|
|
443
|
+
* ["lock1", "lock2"]}`.
|
|
444
|
+
*
|
|
445
|
+
* **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
|
|
446
|
+
* removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
|
|
447
|
+
* the metadata of your secret.
|
|
448
|
+
*
|
|
449
|
+
* @param {Object} params - The parameters to send to the service.
|
|
450
|
+
* @param {string} params.secretType - The secret type.
|
|
451
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
452
|
+
* @param {string[]} [params.locks] - A comma-separated list of locks to delete.
|
|
453
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
454
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
455
|
+
*/
|
|
456
|
+
unlockSecret(params: SecretsManagerV1.UnlockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
457
|
+
/**
|
|
458
|
+
* List secret version locks.
|
|
459
|
+
*
|
|
460
|
+
* List the locks that are associated with a specified secret version.
|
|
461
|
+
*
|
|
462
|
+
* @param {Object} params - The parameters to send to the service.
|
|
463
|
+
* @param {string} params.secretType - The secret type.
|
|
464
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
465
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
466
|
+
* `previous` to retrieve the previous version.
|
|
467
|
+
*
|
|
468
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
469
|
+
* the response details.
|
|
470
|
+
* @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
|
|
471
|
+
* items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
472
|
+
*
|
|
473
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
|
|
474
|
+
* `..?limit=5`.
|
|
475
|
+
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
476
|
+
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
477
|
+
*
|
|
478
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
479
|
+
* `..?offset=25&limit=25`.
|
|
480
|
+
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
481
|
+
*
|
|
482
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
483
|
+
* `..?search=text`.
|
|
484
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
485
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
|
|
486
|
+
*/
|
|
487
|
+
getSecretVersionLocks(params: SecretsManagerV1.GetSecretVersionLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
|
|
488
|
+
/**
|
|
489
|
+
* Lock a secret version.
|
|
490
|
+
*
|
|
491
|
+
* Create a lock on the specified version of a secret.
|
|
492
|
+
*
|
|
493
|
+
* A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
|
|
494
|
+
* successful request attaches a new lock to the specified version, or replaces a lock of the same name if it already
|
|
495
|
+
* exists. Additionally, you can use this method to clear any matching locks on a secret version by using one of the
|
|
496
|
+
* following optional lock modes:
|
|
497
|
+
*
|
|
498
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
499
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
500
|
+
* it doesn't have any locks.
|
|
501
|
+
*
|
|
502
|
+
* For more information about locking secrets, check out the
|
|
503
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
|
|
504
|
+
*
|
|
505
|
+
* @param {Object} params - The parameters to send to the service.
|
|
506
|
+
* @param {string} params.secretType - The secret type.
|
|
507
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
508
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
509
|
+
* `previous` to retrieve the previous version.
|
|
510
|
+
*
|
|
511
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
512
|
+
* the response details.
|
|
513
|
+
* @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
|
|
514
|
+
* @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
|
|
515
|
+
* clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
|
|
516
|
+
* is ignored.
|
|
517
|
+
*
|
|
518
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
519
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
520
|
+
* it doesn't have any locks.
|
|
521
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
522
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
523
|
+
*/
|
|
524
|
+
lockSecretVersion(params: SecretsManagerV1.LockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
525
|
+
/**
|
|
526
|
+
* Unlock a secret version.
|
|
527
|
+
*
|
|
528
|
+
* Delete one or more locks that are associated with the specified secret version.
|
|
529
|
+
*
|
|
530
|
+
* A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
|
|
531
|
+
* the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
|
|
532
|
+
* ["lock-1", "lock-2"]}`.
|
|
533
|
+
*
|
|
534
|
+
* **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
|
|
535
|
+
* removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
|
|
536
|
+
* the metadata of your secret.
|
|
537
|
+
*
|
|
538
|
+
* @param {Object} params - The parameters to send to the service.
|
|
539
|
+
* @param {string} params.secretType - The secret type.
|
|
540
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
541
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
542
|
+
* `previous` to retrieve the previous version.
|
|
543
|
+
*
|
|
544
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
545
|
+
* the response details.
|
|
546
|
+
* @param {string[]} [params.locks] - A comma-separated list of locks to delete.
|
|
547
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
548
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
|
|
549
|
+
*/
|
|
550
|
+
unlockSecretVersion(params: SecretsManagerV1.UnlockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
|
|
551
|
+
/**
|
|
552
|
+
* List all secrets and locks.
|
|
553
|
+
*
|
|
554
|
+
* List the lock details that are associated with all secrets in your Secrets Manager instance.
|
|
555
|
+
*
|
|
556
|
+
* @param {Object} [params] - The parameters to send to the service.
|
|
557
|
+
* @param {number} [params.limit] - The number of secrets with associated locks to retrieve. By default, list
|
|
558
|
+
* operations return the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page
|
|
559
|
+
* through your available resources.
|
|
560
|
+
*
|
|
561
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
|
|
562
|
+
* `..?limit=5`.
|
|
563
|
+
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
564
|
+
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
565
|
+
*
|
|
566
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
567
|
+
* `..?offset=25&limit=25`.
|
|
568
|
+
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
569
|
+
*
|
|
570
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
571
|
+
* `..?search=text`.
|
|
572
|
+
* @param {string[]} [params.groups] - Filter secrets by groups.
|
|
573
|
+
*
|
|
574
|
+
* You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
|
|
575
|
+
* that are in the default secret group, use the `default` keyword.
|
|
576
|
+
*
|
|
577
|
+
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
578
|
+
* use `..?groups={secret_group_ID},default`.
|
|
579
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
580
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>}
|
|
581
|
+
*/
|
|
582
|
+
listInstanceSecretsLocks(params?: SecretsManagerV1.ListInstanceSecretsLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>;
|
|
355
583
|
/*************************
|
|
356
584
|
* policies
|
|
357
585
|
************************/
|
|
@@ -667,14 +895,14 @@ declare namespace SecretsManagerV1 {
|
|
|
667
895
|
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
668
896
|
*
|
|
669
897
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
670
|
-
* `../secrets/{
|
|
898
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
671
899
|
*/
|
|
672
900
|
limit?: number;
|
|
673
901
|
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
674
902
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
675
903
|
*
|
|
676
904
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
677
|
-
*
|
|
905
|
+
* `..?offset=25&limit=25`.
|
|
678
906
|
*/
|
|
679
907
|
offset?: number;
|
|
680
908
|
headers?: OutgoingHttpHeaders;
|
|
@@ -698,27 +926,27 @@ declare namespace SecretsManagerV1 {
|
|
|
698
926
|
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
699
927
|
*
|
|
700
928
|
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
|
|
701
|
-
* `../secrets/{
|
|
929
|
+
* `../secrets/{secret_type}?limit=5`.
|
|
702
930
|
*/
|
|
703
931
|
limit?: number;
|
|
704
932
|
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
705
933
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
706
934
|
*
|
|
707
935
|
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
708
|
-
*
|
|
936
|
+
* `..?offset=25&limit=25`.
|
|
709
937
|
*/
|
|
710
938
|
offset?: number;
|
|
711
939
|
/** Filter secrets that contain the specified string. The fields that are searched include: id, name,
|
|
712
940
|
* description, labels, secret_type.
|
|
713
941
|
*
|
|
714
942
|
* **Usage:** If you want to list only the secrets that contain the string "text", use
|
|
715
|
-
* `../secrets/{
|
|
943
|
+
* `../secrets/{secret_type}?search=text`.
|
|
716
944
|
*/
|
|
717
945
|
search?: string;
|
|
718
946
|
/** Sort a list of secrets by the specified field.
|
|
719
947
|
*
|
|
720
948
|
* **Usage:** To sort a list of secrets by their creation date, use
|
|
721
|
-
* `../secrets/{
|
|
949
|
+
* `../secrets/{secret_type}?sort_by=creation_date`.
|
|
722
950
|
*/
|
|
723
951
|
sortBy?: ListAllSecretsConstants.SortBy | string;
|
|
724
952
|
/** Filter secrets by groups.
|
|
@@ -727,14 +955,14 @@ declare namespace SecretsManagerV1 {
|
|
|
727
955
|
* secrets that are in the default secret group, use the `default` keyword.
|
|
728
956
|
*
|
|
729
957
|
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
730
|
-
* use
|
|
958
|
+
* use `..?groups={secret_group_ID},default`.
|
|
731
959
|
*/
|
|
732
960
|
groups?: string[];
|
|
733
961
|
headers?: OutgoingHttpHeaders;
|
|
734
962
|
}
|
|
735
963
|
/** Constants for the `listAllSecrets` operation. */
|
|
736
964
|
namespace ListAllSecretsConstants {
|
|
737
|
-
/** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{
|
|
965
|
+
/** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{secret_type}?sort_by=creation_date`. */
|
|
738
966
|
enum SortBy {
|
|
739
967
|
ID = "id",
|
|
740
968
|
CREATION_DATE = "creation_date",
|
|
@@ -793,7 +1021,8 @@ declare namespace SecretsManagerV1 {
|
|
|
793
1021
|
ROTATE = "rotate",
|
|
794
1022
|
RESTORE = "restore",
|
|
795
1023
|
REVOKE = "revoke",
|
|
796
|
-
DELETE_CREDENTIALS = "delete_credentials"
|
|
1024
|
+
DELETE_CREDENTIALS = "delete_credentials",
|
|
1025
|
+
VALIDATE_DNS_CHALLENGE = "validate_dns_challenge"
|
|
797
1026
|
}
|
|
798
1027
|
}
|
|
799
1028
|
/** Parameters for the `deleteSecret` operation. */
|
|
@@ -922,6 +1151,38 @@ declare namespace SecretsManagerV1 {
|
|
|
922
1151
|
KV = "kv"
|
|
923
1152
|
}
|
|
924
1153
|
}
|
|
1154
|
+
/** Parameters for the `updateSecretVersionMetadata` operation. */
|
|
1155
|
+
interface UpdateSecretVersionMetadataParams {
|
|
1156
|
+
/** The secret type. */
|
|
1157
|
+
secretType: UpdateSecretVersionMetadataConstants.SecretType | string;
|
|
1158
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1159
|
+
id: string;
|
|
1160
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1161
|
+
* previous version.
|
|
1162
|
+
*
|
|
1163
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1164
|
+
* check the response details.
|
|
1165
|
+
*/
|
|
1166
|
+
versionId: string;
|
|
1167
|
+
/** The metadata that describes the resource array. */
|
|
1168
|
+
metadata: CollectionMetadata;
|
|
1169
|
+
/** A collection of resources. */
|
|
1170
|
+
resources: UpdateSecretVersionMetadata[];
|
|
1171
|
+
headers?: OutgoingHttpHeaders;
|
|
1172
|
+
}
|
|
1173
|
+
/** Constants for the `updateSecretVersionMetadata` operation. */
|
|
1174
|
+
namespace UpdateSecretVersionMetadataConstants {
|
|
1175
|
+
/** The secret type. */
|
|
1176
|
+
enum SecretType {
|
|
1177
|
+
ARBITRARY = "arbitrary",
|
|
1178
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1179
|
+
IMPORTED_CERT = "imported_cert",
|
|
1180
|
+
PUBLIC_CERT = "public_cert",
|
|
1181
|
+
PRIVATE_CERT = "private_cert",
|
|
1182
|
+
USERNAME_PASSWORD = "username_password",
|
|
1183
|
+
KV = "kv"
|
|
1184
|
+
}
|
|
1185
|
+
}
|
|
925
1186
|
/** Parameters for the `getSecretMetadata` operation. */
|
|
926
1187
|
interface GetSecretMetadataParams {
|
|
927
1188
|
/** The secret type. */
|
|
@@ -968,6 +1229,264 @@ declare namespace SecretsManagerV1 {
|
|
|
968
1229
|
KV = "kv"
|
|
969
1230
|
}
|
|
970
1231
|
}
|
|
1232
|
+
/** Parameters for the `getLocks` operation. */
|
|
1233
|
+
interface GetLocksParams {
|
|
1234
|
+
/** The secret type. */
|
|
1235
|
+
secretType: GetLocksConstants.SecretType | string;
|
|
1236
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1237
|
+
id: string;
|
|
1238
|
+
/** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
|
|
1239
|
+
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
1240
|
+
*
|
|
1241
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
|
|
1242
|
+
* use
|
|
1243
|
+
* `..?limit=5`.
|
|
1244
|
+
*/
|
|
1245
|
+
limit?: number;
|
|
1246
|
+
/** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1247
|
+
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1248
|
+
*
|
|
1249
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
1250
|
+
* `..?offset=25&limit=25`.
|
|
1251
|
+
*/
|
|
1252
|
+
offset?: number;
|
|
1253
|
+
/** Filter locks that contain the specified string in the field "name".
|
|
1254
|
+
*
|
|
1255
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
1256
|
+
* `..?search=text`.
|
|
1257
|
+
*/
|
|
1258
|
+
search?: string;
|
|
1259
|
+
headers?: OutgoingHttpHeaders;
|
|
1260
|
+
}
|
|
1261
|
+
/** Constants for the `getLocks` operation. */
|
|
1262
|
+
namespace GetLocksConstants {
|
|
1263
|
+
/** The secret type. */
|
|
1264
|
+
enum SecretType {
|
|
1265
|
+
ARBITRARY = "arbitrary",
|
|
1266
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1267
|
+
IMPORTED_CERT = "imported_cert",
|
|
1268
|
+
PUBLIC_CERT = "public_cert",
|
|
1269
|
+
PRIVATE_CERT = "private_cert",
|
|
1270
|
+
USERNAME_PASSWORD = "username_password",
|
|
1271
|
+
KV = "kv"
|
|
1272
|
+
}
|
|
1273
|
+
}
|
|
1274
|
+
/** Parameters for the `lockSecret` operation. */
|
|
1275
|
+
interface LockSecretParams {
|
|
1276
|
+
/** The secret type. */
|
|
1277
|
+
secretType: LockSecretConstants.SecretType | string;
|
|
1278
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1279
|
+
id: string;
|
|
1280
|
+
/** The lock data to be attached to a secret version. */
|
|
1281
|
+
locks?: LockSecretBodyLocksItem[];
|
|
1282
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
|
|
1283
|
+
* on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
|
|
1284
|
+
*
|
|
1285
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
|
|
1286
|
+
* secret.
|
|
1287
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
|
|
1288
|
+
* if it doesn't have any locks.
|
|
1289
|
+
*/
|
|
1290
|
+
mode?: LockSecretConstants.Mode | string;
|
|
1291
|
+
headers?: OutgoingHttpHeaders;
|
|
1292
|
+
}
|
|
1293
|
+
/** Constants for the `lockSecret` operation. */
|
|
1294
|
+
namespace LockSecretConstants {
|
|
1295
|
+
/** The secret type. */
|
|
1296
|
+
enum SecretType {
|
|
1297
|
+
ARBITRARY = "arbitrary",
|
|
1298
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1299
|
+
IMPORTED_CERT = "imported_cert",
|
|
1300
|
+
PUBLIC_CERT = "public_cert",
|
|
1301
|
+
PRIVATE_CERT = "private_cert",
|
|
1302
|
+
USERNAME_PASSWORD = "username_password",
|
|
1303
|
+
KV = "kv"
|
|
1304
|
+
}
|
|
1305
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1306
|
+
enum Mode {
|
|
1307
|
+
EXCLUSIVE = "exclusive",
|
|
1308
|
+
EXCLUSIVE_DELETE = "exclusive_delete"
|
|
1309
|
+
}
|
|
1310
|
+
}
|
|
1311
|
+
/** Parameters for the `unlockSecret` operation. */
|
|
1312
|
+
interface UnlockSecretParams {
|
|
1313
|
+
/** The secret type. */
|
|
1314
|
+
secretType: UnlockSecretConstants.SecretType | string;
|
|
1315
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1316
|
+
id: string;
|
|
1317
|
+
/** A comma-separated list of locks to delete. */
|
|
1318
|
+
locks?: string[];
|
|
1319
|
+
headers?: OutgoingHttpHeaders;
|
|
1320
|
+
}
|
|
1321
|
+
/** Constants for the `unlockSecret` operation. */
|
|
1322
|
+
namespace UnlockSecretConstants {
|
|
1323
|
+
/** The secret type. */
|
|
1324
|
+
enum SecretType {
|
|
1325
|
+
ARBITRARY = "arbitrary",
|
|
1326
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1327
|
+
IMPORTED_CERT = "imported_cert",
|
|
1328
|
+
PUBLIC_CERT = "public_cert",
|
|
1329
|
+
PRIVATE_CERT = "private_cert",
|
|
1330
|
+
USERNAME_PASSWORD = "username_password",
|
|
1331
|
+
KV = "kv"
|
|
1332
|
+
}
|
|
1333
|
+
}
|
|
1334
|
+
/** Parameters for the `getSecretVersionLocks` operation. */
|
|
1335
|
+
interface GetSecretVersionLocksParams {
|
|
1336
|
+
/** The secret type. */
|
|
1337
|
+
secretType: GetSecretVersionLocksConstants.SecretType | string;
|
|
1338
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1339
|
+
id: string;
|
|
1340
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1341
|
+
* previous version.
|
|
1342
|
+
*
|
|
1343
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1344
|
+
* check the response details.
|
|
1345
|
+
*/
|
|
1346
|
+
versionId: string;
|
|
1347
|
+
/** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
|
|
1348
|
+
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
1349
|
+
*
|
|
1350
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
|
|
1351
|
+
* use
|
|
1352
|
+
* `..?limit=5`.
|
|
1353
|
+
*/
|
|
1354
|
+
limit?: number;
|
|
1355
|
+
/** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1356
|
+
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1357
|
+
*
|
|
1358
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
1359
|
+
* `..?offset=25&limit=25`.
|
|
1360
|
+
*/
|
|
1361
|
+
offset?: number;
|
|
1362
|
+
/** Filter locks that contain the specified string in the field "name".
|
|
1363
|
+
*
|
|
1364
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
1365
|
+
* `..?search=text`.
|
|
1366
|
+
*/
|
|
1367
|
+
search?: string;
|
|
1368
|
+
headers?: OutgoingHttpHeaders;
|
|
1369
|
+
}
|
|
1370
|
+
/** Constants for the `getSecretVersionLocks` operation. */
|
|
1371
|
+
namespace GetSecretVersionLocksConstants {
|
|
1372
|
+
/** The secret type. */
|
|
1373
|
+
enum SecretType {
|
|
1374
|
+
ARBITRARY = "arbitrary",
|
|
1375
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1376
|
+
IMPORTED_CERT = "imported_cert",
|
|
1377
|
+
PUBLIC_CERT = "public_cert",
|
|
1378
|
+
PRIVATE_CERT = "private_cert",
|
|
1379
|
+
USERNAME_PASSWORD = "username_password",
|
|
1380
|
+
KV = "kv"
|
|
1381
|
+
}
|
|
1382
|
+
}
|
|
1383
|
+
/** Parameters for the `lockSecretVersion` operation. */
|
|
1384
|
+
interface LockSecretVersionParams {
|
|
1385
|
+
/** The secret type. */
|
|
1386
|
+
secretType: LockSecretVersionConstants.SecretType | string;
|
|
1387
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1388
|
+
id: string;
|
|
1389
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1390
|
+
* previous version.
|
|
1391
|
+
*
|
|
1392
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1393
|
+
* check the response details.
|
|
1394
|
+
*/
|
|
1395
|
+
versionId: string;
|
|
1396
|
+
/** The lock data to be attached to a secret version. */
|
|
1397
|
+
locks?: LockSecretBodyLocksItem[];
|
|
1398
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
|
|
1399
|
+
* on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
|
|
1400
|
+
*
|
|
1401
|
+
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
|
|
1402
|
+
* secret.
|
|
1403
|
+
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
|
|
1404
|
+
* if it doesn't have any locks.
|
|
1405
|
+
*/
|
|
1406
|
+
mode?: LockSecretVersionConstants.Mode | string;
|
|
1407
|
+
headers?: OutgoingHttpHeaders;
|
|
1408
|
+
}
|
|
1409
|
+
/** Constants for the `lockSecretVersion` operation. */
|
|
1410
|
+
namespace LockSecretVersionConstants {
|
|
1411
|
+
/** The secret type. */
|
|
1412
|
+
enum SecretType {
|
|
1413
|
+
ARBITRARY = "arbitrary",
|
|
1414
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1415
|
+
IMPORTED_CERT = "imported_cert",
|
|
1416
|
+
PUBLIC_CERT = "public_cert",
|
|
1417
|
+
PRIVATE_CERT = "private_cert",
|
|
1418
|
+
USERNAME_PASSWORD = "username_password",
|
|
1419
|
+
KV = "kv"
|
|
1420
|
+
}
|
|
1421
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1422
|
+
enum Mode {
|
|
1423
|
+
EXCLUSIVE = "exclusive",
|
|
1424
|
+
EXCLUSIVE_DELETE = "exclusive_delete"
|
|
1425
|
+
}
|
|
1426
|
+
}
|
|
1427
|
+
/** Parameters for the `unlockSecretVersion` operation. */
|
|
1428
|
+
interface UnlockSecretVersionParams {
|
|
1429
|
+
/** The secret type. */
|
|
1430
|
+
secretType: UnlockSecretVersionConstants.SecretType | string;
|
|
1431
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1432
|
+
id: string;
|
|
1433
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1434
|
+
* previous version.
|
|
1435
|
+
*
|
|
1436
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1437
|
+
* check the response details.
|
|
1438
|
+
*/
|
|
1439
|
+
versionId: string;
|
|
1440
|
+
/** A comma-separated list of locks to delete. */
|
|
1441
|
+
locks?: string[];
|
|
1442
|
+
headers?: OutgoingHttpHeaders;
|
|
1443
|
+
}
|
|
1444
|
+
/** Constants for the `unlockSecretVersion` operation. */
|
|
1445
|
+
namespace UnlockSecretVersionConstants {
|
|
1446
|
+
/** The secret type. */
|
|
1447
|
+
enum SecretType {
|
|
1448
|
+
ARBITRARY = "arbitrary",
|
|
1449
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1450
|
+
IMPORTED_CERT = "imported_cert",
|
|
1451
|
+
PUBLIC_CERT = "public_cert",
|
|
1452
|
+
PRIVATE_CERT = "private_cert",
|
|
1453
|
+
USERNAME_PASSWORD = "username_password",
|
|
1454
|
+
KV = "kv"
|
|
1455
|
+
}
|
|
1456
|
+
}
|
|
1457
|
+
/** Parameters for the `listInstanceSecretsLocks` operation. */
|
|
1458
|
+
interface ListInstanceSecretsLocksParams {
|
|
1459
|
+
/** The number of secrets with associated locks to retrieve. By default, list operations return the first 25
|
|
1460
|
+
* items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
1461
|
+
*
|
|
1462
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
|
|
1463
|
+
* `..?limit=5`.
|
|
1464
|
+
*/
|
|
1465
|
+
limit?: number;
|
|
1466
|
+
/** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1467
|
+
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1468
|
+
*
|
|
1469
|
+
* **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
|
|
1470
|
+
* `..?offset=25&limit=25`.
|
|
1471
|
+
*/
|
|
1472
|
+
offset?: number;
|
|
1473
|
+
/** Filter locks that contain the specified string in the field "name".
|
|
1474
|
+
*
|
|
1475
|
+
* **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
|
|
1476
|
+
* `..?search=text`.
|
|
1477
|
+
*/
|
|
1478
|
+
search?: string;
|
|
1479
|
+
/** Filter secrets by groups.
|
|
1480
|
+
*
|
|
1481
|
+
* You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter
|
|
1482
|
+
* secrets that are in the default secret group, use the `default` keyword.
|
|
1483
|
+
*
|
|
1484
|
+
* **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
|
|
1485
|
+
* use `..?groups={secret_group_ID},default`.
|
|
1486
|
+
*/
|
|
1487
|
+
groups?: string[];
|
|
1488
|
+
headers?: OutgoingHttpHeaders;
|
|
1489
|
+
}
|
|
971
1490
|
/** Parameters for the `putPolicy` operation. */
|
|
972
1491
|
interface PutPolicyParams {
|
|
973
1492
|
/** The secret type. */
|
|
@@ -987,6 +1506,7 @@ declare namespace SecretsManagerV1 {
|
|
|
987
1506
|
/** The secret type. */
|
|
988
1507
|
enum SecretType {
|
|
989
1508
|
USERNAME_PASSWORD = "username_password",
|
|
1509
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
990
1510
|
PUBLIC_CERT = "public_cert",
|
|
991
1511
|
PRIVATE_CERT = "private_cert"
|
|
992
1512
|
}
|
|
@@ -1010,6 +1530,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1010
1530
|
/** The secret type. */
|
|
1011
1531
|
enum SecretType {
|
|
1012
1532
|
USERNAME_PASSWORD = "username_password",
|
|
1533
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1013
1534
|
PUBLIC_CERT = "public_cert",
|
|
1014
1535
|
PRIVATE_CERT = "private_cert"
|
|
1015
1536
|
}
|
|
@@ -1368,6 +1889,13 @@ declare namespace SecretsManagerV1 {
|
|
|
1368
1889
|
/** GetConfigResourcesItem. */
|
|
1369
1890
|
interface GetConfigResourcesItem {
|
|
1370
1891
|
}
|
|
1892
|
+
/** Properties that describe the locks that are associated with an instance. */
|
|
1893
|
+
interface GetInstanceLocks {
|
|
1894
|
+
/** The metadata that describes the resource array. */
|
|
1895
|
+
metadata: CollectionMetadata;
|
|
1896
|
+
/** A collection of resources. */
|
|
1897
|
+
resources: InstanceSecretsLocks[];
|
|
1898
|
+
}
|
|
1371
1899
|
/** Properties that describe an existing registration with Event Notifications. */
|
|
1372
1900
|
interface GetNotificationsSettings {
|
|
1373
1901
|
/** The metadata that describes the resource array. */
|
|
@@ -1382,6 +1910,13 @@ declare namespace SecretsManagerV1 {
|
|
|
1382
1910
|
/** A collection of resources. */
|
|
1383
1911
|
resources: SecretResource[];
|
|
1384
1912
|
}
|
|
1913
|
+
/** Properties that describe the lock of a secret or a secret version. */
|
|
1914
|
+
interface GetSecretLocks {
|
|
1915
|
+
/** The metadata that describes the resource array. */
|
|
1916
|
+
metadata: CollectionMetadata;
|
|
1917
|
+
/** A collection of resources. */
|
|
1918
|
+
resources: SecretsLocks[];
|
|
1919
|
+
}
|
|
1385
1920
|
/** GetSecretPolicies. */
|
|
1386
1921
|
interface GetSecretPolicies {
|
|
1387
1922
|
}
|
|
@@ -1406,6 +1941,22 @@ declare namespace SecretsManagerV1 {
|
|
|
1406
1941
|
/** A collection of resources. */
|
|
1407
1942
|
resources: ConfigElementDef[];
|
|
1408
1943
|
}
|
|
1944
|
+
/** Properties that describe the locks that are associated with an instance. */
|
|
1945
|
+
interface InstanceSecretsLocks {
|
|
1946
|
+
/** The unique ID of the secret. */
|
|
1947
|
+
secret_id?: string;
|
|
1948
|
+
/** The v4 UUID that uniquely identifies the secret group to assign to this secret.
|
|
1949
|
+
*
|
|
1950
|
+
* If you omit this parameter, your secret is assigned to the `default` secret group.
|
|
1951
|
+
*/
|
|
1952
|
+
secret_group_id?: string;
|
|
1953
|
+
/** The secret type. */
|
|
1954
|
+
secret_type?: string;
|
|
1955
|
+
/** A collection of locks that are attached to a secret version. */
|
|
1956
|
+
versions?: SecretLockVersion[];
|
|
1957
|
+
/** InstanceSecretsLocks accepts additional properties. */
|
|
1958
|
+
[propName: string]: any;
|
|
1959
|
+
}
|
|
1409
1960
|
/** Intermediate certificate authorities configuration. */
|
|
1410
1961
|
interface IntermediateCertificateAuthoritiesConfigItem {
|
|
1411
1962
|
/** The human-readable name to assign to your configuration. */
|
|
@@ -1444,6 +1995,13 @@ declare namespace SecretsManagerV1 {
|
|
|
1444
1995
|
/** The name that was assigned to the DNS provider configuration. */
|
|
1445
1996
|
dns?: string;
|
|
1446
1997
|
}
|
|
1998
|
+
/** Properties that describe the locks of a secret or a secret version. */
|
|
1999
|
+
interface ListSecretLocks {
|
|
2000
|
+
/** The metadata that describes the resource array. */
|
|
2001
|
+
metadata: CollectionMetadata;
|
|
2002
|
+
/** A collection of resources. */
|
|
2003
|
+
resources: SecretLockData[];
|
|
2004
|
+
}
|
|
1447
2005
|
/** Properties that describe a list of versions of a secret. */
|
|
1448
2006
|
interface ListSecretVersions {
|
|
1449
2007
|
/** The metadata that describes the resource array. */
|
|
@@ -1458,6 +2016,23 @@ declare namespace SecretsManagerV1 {
|
|
|
1458
2016
|
/** A collection of resources. */
|
|
1459
2017
|
resources?: SecretResource[];
|
|
1460
2018
|
}
|
|
2019
|
+
/** LockSecretBodyLocksItem. */
|
|
2020
|
+
interface LockSecretBodyLocksItem {
|
|
2021
|
+
/** A human-readable name to assign to the lock. The lock name must be unique per secret version.
|
|
2022
|
+
*
|
|
2023
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a name for your secret
|
|
2024
|
+
* lock.
|
|
2025
|
+
*/
|
|
2026
|
+
name: string;
|
|
2027
|
+
/** An extended description of the lock.
|
|
2028
|
+
*
|
|
2029
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a description for your
|
|
2030
|
+
* secret lock.
|
|
2031
|
+
*/
|
|
2032
|
+
description: string;
|
|
2033
|
+
/** Optional information to associate with a lock, such as resources CRNs to be used by automation. */
|
|
2034
|
+
attributes: JsonObject;
|
|
2035
|
+
}
|
|
1461
2036
|
/** The Event Notifications details. */
|
|
1462
2037
|
interface NotificationsSettings {
|
|
1463
2038
|
/** The Cloud Resource Name (CRN) of the connected Event Notifications instance. */
|
|
@@ -1555,6 +2130,56 @@ declare namespace SecretsManagerV1 {
|
|
|
1555
2130
|
/** SecretGroupResource accepts additional properties. */
|
|
1556
2131
|
[propName: string]: any;
|
|
1557
2132
|
}
|
|
2133
|
+
/** Properties that describe a lock. */
|
|
2134
|
+
interface SecretLockData {
|
|
2135
|
+
/** A human-readable name to assign to the secret lock.
|
|
2136
|
+
*
|
|
2137
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a name for the secret lock.
|
|
2138
|
+
*/
|
|
2139
|
+
name?: string;
|
|
2140
|
+
/** An extended description of the secret lock.
|
|
2141
|
+
*
|
|
2142
|
+
* To protect your privacy, do not use personal data, such as your name or location, as a description for the
|
|
2143
|
+
* secret lock.
|
|
2144
|
+
*/
|
|
2145
|
+
description?: string;
|
|
2146
|
+
/** The date the secret lock was created. The date format follows RFC 3339. */
|
|
2147
|
+
creation_date?: string;
|
|
2148
|
+
/** The unique identifier for the entity that created the secret lock. */
|
|
2149
|
+
created_by?: string;
|
|
2150
|
+
/** The information that is associated with a lock, such as resources CRNs to be used by automation. */
|
|
2151
|
+
attributes?: JsonObject;
|
|
2152
|
+
/** The v4 UUID that uniquely identifies the secret version. */
|
|
2153
|
+
secret_version_id?: string;
|
|
2154
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
2155
|
+
secret_id?: string;
|
|
2156
|
+
/** The v4 UUID that uniquely identifies the secret group to assign to this secret.
|
|
2157
|
+
*
|
|
2158
|
+
* If you omit this parameter, your secret is assigned to the `default` secret group.
|
|
2159
|
+
*/
|
|
2160
|
+
secret_group_id?: string;
|
|
2161
|
+
/** Updates when the actual secret is modified. The date format follows RFC 3339. */
|
|
2162
|
+
last_update_date?: string;
|
|
2163
|
+
/** A representation for the 2 last secret versions. Could be "current" for version (n) or "previous" for
|
|
2164
|
+
* version (n-1).
|
|
2165
|
+
*/
|
|
2166
|
+
secret_version_alias?: string;
|
|
2167
|
+
}
|
|
2168
|
+
/** Properties that describe the secret locks. */
|
|
2169
|
+
interface SecretLockVersion {
|
|
2170
|
+
/** The v4 UUID that uniquely identifies the lock. */
|
|
2171
|
+
id?: string;
|
|
2172
|
+
/** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
|
|
2173
|
+
* is used for version `n-1`.
|
|
2174
|
+
*/
|
|
2175
|
+
alias?: string;
|
|
2176
|
+
/** The names of all locks that are associated with this secret. */
|
|
2177
|
+
locks?: string[];
|
|
2178
|
+
/** Indicates whether the payload for the secret version is stored and available. */
|
|
2179
|
+
payload_available?: boolean;
|
|
2180
|
+
/** SecretLockVersion accepts additional properties. */
|
|
2181
|
+
[propName: string]: any;
|
|
2182
|
+
}
|
|
1558
2183
|
/** SecretMetadata. */
|
|
1559
2184
|
interface SecretMetadata {
|
|
1560
2185
|
}
|
|
@@ -1586,6 +2211,20 @@ declare namespace SecretsManagerV1 {
|
|
|
1586
2211
|
/** SecretVersionMetadata. */
|
|
1587
2212
|
interface SecretVersionMetadata {
|
|
1588
2213
|
}
|
|
2214
|
+
/** Properties that describe the secret locks. */
|
|
2215
|
+
interface SecretsLocks {
|
|
2216
|
+
/** The unique ID of the secret. */
|
|
2217
|
+
secret_id?: string;
|
|
2218
|
+
/** The v4 UUID that uniquely identifies the secret group to assign to this secret.
|
|
2219
|
+
*
|
|
2220
|
+
* If you omit this parameter, your secret is assigned to the `default` secret group.
|
|
2221
|
+
*/
|
|
2222
|
+
secret_group_id?: string;
|
|
2223
|
+
/** A collection of locks that are attached to a secret version. */
|
|
2224
|
+
versions?: SecretLockVersion[];
|
|
2225
|
+
/** SecretsLocks accepts additional properties. */
|
|
2226
|
+
[propName: string]: any;
|
|
2227
|
+
}
|
|
1589
2228
|
/** Properties that are returned with a successful `sign` action. */
|
|
1590
2229
|
interface SignActionResultData {
|
|
1591
2230
|
/** The PEM-encoded certificate. */
|
|
@@ -1612,6 +2251,11 @@ declare namespace SecretsManagerV1 {
|
|
|
1612
2251
|
/** The time until the certificate expires. */
|
|
1613
2252
|
expiration?: number;
|
|
1614
2253
|
}
|
|
2254
|
+
/** Properties that update the metadata of a secret version. */
|
|
2255
|
+
interface UpdateSecretVersionMetadata {
|
|
2256
|
+
/** The secret version metadata that a user can customize. */
|
|
2257
|
+
version_custom_metadata?: JsonObject;
|
|
2258
|
+
}
|
|
1615
2259
|
/** CertificateValidity. */
|
|
1616
2260
|
interface CertificateValidity {
|
|
1617
2261
|
/** The date and time that the certificate validity period begins. */
|
|
@@ -1664,8 +2308,12 @@ declare namespace SecretsManagerV1 {
|
|
|
1664
2308
|
created_by?: string;
|
|
1665
2309
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
1666
2310
|
last_update_date?: string;
|
|
1667
|
-
/** The number of versions
|
|
2311
|
+
/** The number of versions that are associated with a secret. */
|
|
1668
2312
|
versions_total?: number;
|
|
2313
|
+
/** The number of locks that are associated with a secret. */
|
|
2314
|
+
locks_total?: number;
|
|
2315
|
+
/** The secret metadata that a user can customize. */
|
|
2316
|
+
custom_metadata?: JsonObject;
|
|
1669
2317
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
1670
2318
|
*
|
|
1671
2319
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -1727,6 +2375,12 @@ declare namespace SecretsManagerV1 {
|
|
|
1727
2375
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
1728
2376
|
*/
|
|
1729
2377
|
versions?: JsonObject[];
|
|
2378
|
+
/** The number of locks that are associated with a secret. */
|
|
2379
|
+
locks_total?: number;
|
|
2380
|
+
/** The secret metadata that a user can customize. */
|
|
2381
|
+
custom_metadata?: JsonObject;
|
|
2382
|
+
/** The secret version metadata that a user can customize. */
|
|
2383
|
+
version_custom_metadata?: JsonObject;
|
|
1730
2384
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
1731
2385
|
*
|
|
1732
2386
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -1755,6 +2409,10 @@ declare namespace SecretsManagerV1 {
|
|
|
1755
2409
|
creation_date?: string;
|
|
1756
2410
|
/** The unique identifier for the entity that created the secret version. */
|
|
1757
2411
|
created_by?: string;
|
|
2412
|
+
/** The number of locks that are associated with a secret version. */
|
|
2413
|
+
locks_total?: number;
|
|
2414
|
+
/** The secret version metadata that a user can customize. */
|
|
2415
|
+
version_custom_metadata?: JsonObject;
|
|
1758
2416
|
/** The data that is associated with the secret version.
|
|
1759
2417
|
*
|
|
1760
2418
|
* The data object contains the field `payload`.
|
|
@@ -1775,6 +2433,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1775
2433
|
* service API.
|
|
1776
2434
|
*/
|
|
1777
2435
|
downloaded?: boolean;
|
|
2436
|
+
/** The secret version metadata that a user can customize. */
|
|
2437
|
+
version_custom_metadata?: JsonObject;
|
|
1778
2438
|
}
|
|
1779
2439
|
/** Properties that describe a secret version. */
|
|
1780
2440
|
interface ArbitrarySecretVersionMetadata extends SecretVersionMetadata {
|
|
@@ -1792,6 +2452,10 @@ declare namespace SecretsManagerV1 {
|
|
|
1792
2452
|
* service API.
|
|
1793
2453
|
*/
|
|
1794
2454
|
downloaded?: boolean;
|
|
2455
|
+
/** The number of locks that are associated with a secret version. */
|
|
2456
|
+
locks_total?: number;
|
|
2457
|
+
/** The secret version metadata that a user can customize. */
|
|
2458
|
+
version_custom_metadata?: JsonObject;
|
|
1795
2459
|
}
|
|
1796
2460
|
/** Metadata properties that describe a certificate secret. */
|
|
1797
2461
|
interface CertificateSecretMetadata extends SecretMetadata {
|
|
@@ -1838,8 +2502,12 @@ declare namespace SecretsManagerV1 {
|
|
|
1838
2502
|
created_by?: string;
|
|
1839
2503
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
1840
2504
|
last_update_date?: string;
|
|
1841
|
-
/** The number of versions
|
|
2505
|
+
/** The number of versions that are associated with a secret. */
|
|
1842
2506
|
versions_total?: number;
|
|
2507
|
+
/** The number of locks that are associated with a secret. */
|
|
2508
|
+
locks_total?: number;
|
|
2509
|
+
/** The secret metadata that a user can customize. */
|
|
2510
|
+
custom_metadata?: JsonObject;
|
|
1843
2511
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
1844
2512
|
serial_number?: string;
|
|
1845
2513
|
/** The identifier for the cryptographic algorithm that was used by the issuing certificate authority to sign
|
|
@@ -1914,6 +2582,12 @@ declare namespace SecretsManagerV1 {
|
|
|
1914
2582
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
1915
2583
|
*/
|
|
1916
2584
|
versions?: JsonObject[];
|
|
2585
|
+
/** The number of locks that are associated with a secret. */
|
|
2586
|
+
locks_total?: number;
|
|
2587
|
+
/** The secret metadata that a user can customize. */
|
|
2588
|
+
custom_metadata?: JsonObject;
|
|
2589
|
+
/** The secret version metadata that a user can customize. */
|
|
2590
|
+
version_custom_metadata?: JsonObject;
|
|
1917
2591
|
/** The contents of your certificate. The data must be formatted on a single line with embedded newline
|
|
1918
2592
|
* characters.
|
|
1919
2593
|
*/
|
|
@@ -1972,6 +2646,10 @@ declare namespace SecretsManagerV1 {
|
|
|
1972
2646
|
creation_date?: string;
|
|
1973
2647
|
/** The unique identifier for the entity that created the secret version. */
|
|
1974
2648
|
created_by?: string;
|
|
2649
|
+
/** The number of locks that are associated with a secret version. */
|
|
2650
|
+
locks_total?: number;
|
|
2651
|
+
/** The secret version metadata that a user can customize. */
|
|
2652
|
+
version_custom_metadata?: JsonObject;
|
|
1975
2653
|
validity?: CertificateValidity;
|
|
1976
2654
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
1977
2655
|
serial_number?: string;
|
|
@@ -1999,6 +2677,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1999
2677
|
* service API.
|
|
2000
2678
|
*/
|
|
2001
2679
|
downloaded?: boolean;
|
|
2680
|
+
/** The secret version metadata that a user can customize. */
|
|
2681
|
+
version_custom_metadata?: JsonObject;
|
|
2002
2682
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2003
2683
|
serial_number?: string;
|
|
2004
2684
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -2021,6 +2701,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2021
2701
|
* service API.
|
|
2022
2702
|
*/
|
|
2023
2703
|
downloaded?: boolean;
|
|
2704
|
+
/** The number of locks that are associated with a secret version. */
|
|
2705
|
+
locks_total?: number;
|
|
2706
|
+
/** The secret version metadata that a user can customize. */
|
|
2707
|
+
version_custom_metadata?: JsonObject;
|
|
2024
2708
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2025
2709
|
serial_number?: string;
|
|
2026
2710
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -2046,9 +2730,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2046
2730
|
max_ttl?: any;
|
|
2047
2731
|
/** The time-to-live (TTL) to assign to a private certificate.
|
|
2048
2732
|
*
|
|
2049
|
-
* The value can be supplied as a string representation of a duration, such as `12h`.
|
|
2050
|
-
*
|
|
2051
|
-
* API response, this value is returned in seconds
|
|
2733
|
+
* The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
|
|
2734
|
+
* seconds (suffix `s`), minutes (suffix `m`) or hours (suffix `h`). The value can't exceed the `max_ttl` that is
|
|
2735
|
+
* defined in the associated certificate template. In the API response, this value is returned in seconds
|
|
2736
|
+
* (integer).
|
|
2052
2737
|
*/
|
|
2053
2738
|
ttl?: any;
|
|
2054
2739
|
/** Determines whether to allow `localhost` to be included as one of the requested common names. */
|
|
@@ -2338,8 +3023,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2338
3023
|
created_by?: string;
|
|
2339
3024
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
2340
3025
|
last_update_date?: string;
|
|
2341
|
-
/** The number of versions
|
|
3026
|
+
/** The number of versions that are associated with a secret. */
|
|
2342
3027
|
versions_total?: number;
|
|
3028
|
+
/** The number of locks that are associated with a secret. */
|
|
3029
|
+
locks_total?: number;
|
|
3030
|
+
/** The secret metadata that a user can customize. */
|
|
3031
|
+
custom_metadata?: JsonObject;
|
|
2343
3032
|
/** The time-to-live (TTL) or lease duration that is assigned to the secret. For `iam_credentials` secrets, the
|
|
2344
3033
|
* TTL defines for how long each generated API key remains valid.
|
|
2345
3034
|
*/
|
|
@@ -2417,6 +3106,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2417
3106
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
2418
3107
|
*/
|
|
2419
3108
|
versions?: JsonObject[];
|
|
3109
|
+
/** The number of locks that are associated with a secret. */
|
|
3110
|
+
locks_total?: number;
|
|
3111
|
+
/** The secret metadata that a user can customize. */
|
|
3112
|
+
custom_metadata?: JsonObject;
|
|
3113
|
+
/** The secret version metadata that a user can customize. */
|
|
3114
|
+
version_custom_metadata?: JsonObject;
|
|
2420
3115
|
/** The time-to-live (TTL) or lease duration to assign to generated credentials.
|
|
2421
3116
|
*
|
|
2422
3117
|
* For `iam_credentials` secrets, the TTL defines for how long each generated API key remains valid. The value can
|
|
@@ -2467,6 +3162,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2467
3162
|
* are generated each time that the secret is read or accessed.
|
|
2468
3163
|
*/
|
|
2469
3164
|
reuse_api_key?: boolean;
|
|
3165
|
+
/** The date that the secret is scheduled for automatic rotation.
|
|
3166
|
+
*
|
|
3167
|
+
* The service automatically creates a new version of the secret on its next rotation date. This field exists only
|
|
3168
|
+
* for secrets that have an existing rotation policy.
|
|
3169
|
+
*/
|
|
3170
|
+
next_rotation_date?: string;
|
|
2470
3171
|
}
|
|
2471
3172
|
/** IAMCredentialsSecretVersion. */
|
|
2472
3173
|
interface IAMCredentialsSecretVersion extends SecretVersion {
|
|
@@ -2478,6 +3179,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2478
3179
|
creation_date?: string;
|
|
2479
3180
|
/** The unique identifier for the entity that created the secret version. */
|
|
2480
3181
|
created_by?: string;
|
|
3182
|
+
/** The number of locks that are associated with a secret version. */
|
|
3183
|
+
locks_total?: number;
|
|
3184
|
+
/** The secret version metadata that a user can customize. */
|
|
3185
|
+
version_custom_metadata?: JsonObject;
|
|
3186
|
+
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3187
|
+
auto_rotated?: boolean;
|
|
2481
3188
|
/** The data that is associated with the secret version. The data object contains the following fields:
|
|
2482
3189
|
*
|
|
2483
3190
|
* - `api_key`: The API key that is generated for this secret.
|
|
@@ -2500,6 +3207,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2500
3207
|
* service API.
|
|
2501
3208
|
*/
|
|
2502
3209
|
downloaded?: boolean;
|
|
3210
|
+
/** The secret version metadata that a user can customize. */
|
|
3211
|
+
version_custom_metadata?: JsonObject;
|
|
3212
|
+
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3213
|
+
auto_rotated?: boolean;
|
|
2503
3214
|
}
|
|
2504
3215
|
/** Properties that describe a secret version. */
|
|
2505
3216
|
interface IAMCredentialsSecretVersionMetadata extends SecretVersionMetadata {
|
|
@@ -2517,6 +3228,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2517
3228
|
* service API.
|
|
2518
3229
|
*/
|
|
2519
3230
|
downloaded?: boolean;
|
|
3231
|
+
/** The number of locks that are associated with a secret version. */
|
|
3232
|
+
locks_total?: number;
|
|
3233
|
+
/** The secret version metadata that a user can customize. */
|
|
3234
|
+
version_custom_metadata?: JsonObject;
|
|
3235
|
+
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3236
|
+
auto_rotated?: boolean;
|
|
2520
3237
|
}
|
|
2521
3238
|
/** Intermediate certificate authorities configuration. */
|
|
2522
3239
|
interface IntermediateCertificateAuthoritiesConfig extends GetConfigElementsResourcesItem {
|
|
@@ -2682,8 +3399,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2682
3399
|
created_by?: string;
|
|
2683
3400
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
2684
3401
|
last_update_date?: string;
|
|
2685
|
-
/** The number of versions
|
|
3402
|
+
/** The number of versions that are associated with a secret. */
|
|
2686
3403
|
versions_total?: number;
|
|
3404
|
+
/** The number of locks that are associated with a secret. */
|
|
3405
|
+
locks_total?: number;
|
|
3406
|
+
/** The secret metadata that a user can customize. */
|
|
3407
|
+
custom_metadata?: JsonObject;
|
|
2687
3408
|
}
|
|
2688
3409
|
/** Properties that describe a secret. */
|
|
2689
3410
|
interface KvSecretResource extends SecretResource {
|
|
@@ -2735,6 +3456,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2735
3456
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
2736
3457
|
*/
|
|
2737
3458
|
versions?: JsonObject[];
|
|
3459
|
+
/** The number of locks that are associated with a secret. */
|
|
3460
|
+
locks_total?: number;
|
|
3461
|
+
/** The secret metadata that a user can customize. */
|
|
3462
|
+
custom_metadata?: JsonObject;
|
|
3463
|
+
/** The secret version metadata that a user can customize. */
|
|
3464
|
+
version_custom_metadata?: JsonObject;
|
|
2738
3465
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
2739
3466
|
*
|
|
2740
3467
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -2815,8 +3542,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2815
3542
|
created_by?: string;
|
|
2816
3543
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
2817
3544
|
last_update_date?: string;
|
|
2818
|
-
/** The number of versions
|
|
3545
|
+
/** The number of versions that are associated with a secret. */
|
|
2819
3546
|
versions_total?: number;
|
|
3547
|
+
/** The number of locks that are associated with a secret. */
|
|
3548
|
+
locks_total?: number;
|
|
3549
|
+
/** The secret metadata that a user can customize. */
|
|
3550
|
+
custom_metadata?: JsonObject;
|
|
2820
3551
|
/** The name of the certificate template. */
|
|
2821
3552
|
certificate_template?: string;
|
|
2822
3553
|
/** The intermediate certificate authority that signed this certificate. */
|
|
@@ -2894,6 +3625,12 @@ declare namespace SecretsManagerV1 {
|
|
|
2894
3625
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
2895
3626
|
*/
|
|
2896
3627
|
versions?: JsonObject[];
|
|
3628
|
+
/** The number of locks that are associated with a secret. */
|
|
3629
|
+
locks_total?: number;
|
|
3630
|
+
/** The secret metadata that a user can customize. */
|
|
3631
|
+
custom_metadata?: JsonObject;
|
|
3632
|
+
/** The secret version metadata that a user can customize. */
|
|
3633
|
+
version_custom_metadata?: JsonObject;
|
|
2897
3634
|
/** The name of the certificate template. */
|
|
2898
3635
|
certificate_template: string;
|
|
2899
3636
|
/** The intermediate certificate authority that signed this certificate. */
|
|
@@ -2972,6 +3709,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2972
3709
|
creation_date?: string;
|
|
2973
3710
|
/** The unique identifier for the entity that created the secret version. */
|
|
2974
3711
|
created_by?: string;
|
|
3712
|
+
/** The number of locks that are associated with a secret version. */
|
|
3713
|
+
locks_total?: number;
|
|
3714
|
+
/** The secret version metadata that a user can customize. */
|
|
3715
|
+
version_custom_metadata?: JsonObject;
|
|
2975
3716
|
validity?: CertificateValidity;
|
|
2976
3717
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2977
3718
|
serial_number?: string;
|
|
@@ -3011,6 +3752,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3011
3752
|
* service API.
|
|
3012
3753
|
*/
|
|
3013
3754
|
downloaded?: boolean;
|
|
3755
|
+
/** The secret version metadata that a user can customize. */
|
|
3756
|
+
version_custom_metadata?: JsonObject;
|
|
3014
3757
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
3015
3758
|
serial_number?: string;
|
|
3016
3759
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -3045,6 +3788,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3045
3788
|
* service API.
|
|
3046
3789
|
*/
|
|
3047
3790
|
downloaded?: boolean;
|
|
3791
|
+
/** The number of locks that are associated with a secret version. */
|
|
3792
|
+
locks_total?: number;
|
|
3793
|
+
/** The secret version metadata that a user can customize. */
|
|
3794
|
+
version_custom_metadata?: JsonObject;
|
|
3048
3795
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
3049
3796
|
serial_number?: string;
|
|
3050
3797
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -3115,8 +3862,12 @@ declare namespace SecretsManagerV1 {
|
|
|
3115
3862
|
created_by?: string;
|
|
3116
3863
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
3117
3864
|
last_update_date?: string;
|
|
3118
|
-
/** The number of versions
|
|
3865
|
+
/** The number of versions that are associated with a secret. */
|
|
3119
3866
|
versions_total?: number;
|
|
3867
|
+
/** The number of locks that are associated with a secret. */
|
|
3868
|
+
locks_total?: number;
|
|
3869
|
+
/** The secret metadata that a user can customize. */
|
|
3870
|
+
custom_metadata?: JsonObject;
|
|
3120
3871
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3121
3872
|
issuer?: string;
|
|
3122
3873
|
/** Determines whether your issued certificate is bundled with intermediate certificates.
|
|
@@ -3197,6 +3948,12 @@ declare namespace SecretsManagerV1 {
|
|
|
3197
3948
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
3198
3949
|
*/
|
|
3199
3950
|
versions?: JsonObject[];
|
|
3951
|
+
/** The number of locks that are associated with a secret. */
|
|
3952
|
+
locks_total?: number;
|
|
3953
|
+
/** The secret metadata that a user can customize. */
|
|
3954
|
+
custom_metadata?: JsonObject;
|
|
3955
|
+
/** The secret version metadata that a user can customize. */
|
|
3956
|
+
version_custom_metadata?: JsonObject;
|
|
3200
3957
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3201
3958
|
issuer?: string;
|
|
3202
3959
|
/** Determines whether your issued certificate is bundled with intermediate certificates.
|
|
@@ -3257,6 +4014,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3257
4014
|
interface RestoreIAMCredentialsSecretBody extends SecretAction {
|
|
3258
4015
|
/** The ID of the target version or the alias `previous`. */
|
|
3259
4016
|
version_id: string;
|
|
4017
|
+
/** The secret metadata that a user can customize. */
|
|
4018
|
+
custom_metadata?: JsonObject;
|
|
4019
|
+
/** The secret version metadata that a user can customize. */
|
|
4020
|
+
version_custom_metadata?: JsonObject;
|
|
3260
4021
|
}
|
|
3261
4022
|
/** A request to revoke the certificate of an internally signed intermediate certificate authority. */
|
|
3262
4023
|
interface RevokeAction extends ConfigAction {
|
|
@@ -3332,7 +4093,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3332
4093
|
other_sans?: string[];
|
|
3333
4094
|
/** The time-to-live (TTL) to assign to this CA certificate.
|
|
3334
4095
|
*
|
|
3335
|
-
* The value can be supplied as a string representation of a duration, such as `12h`. The value can
|
|
4096
|
+
* The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
|
|
4097
|
+
* seconds (suffix `s`), minutes (suffix `m`), hours (suffix `h`) or days (suffix `d`). The value can't exceed the
|
|
3336
4098
|
* `max_ttl` that is defined in the associated certificate template. In the API response, this value is returned in
|
|
3337
4099
|
* seconds (integer).
|
|
3338
4100
|
*/
|
|
@@ -3394,6 +4156,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3394
4156
|
interface RotateArbitrarySecretBody extends SecretAction {
|
|
3395
4157
|
/** The new secret data to assign to an `arbitrary` secret. */
|
|
3396
4158
|
payload: string;
|
|
4159
|
+
/** The secret metadata that a user can customize. */
|
|
4160
|
+
custom_metadata?: JsonObject;
|
|
4161
|
+
/** The secret version metadata that a user can customize. */
|
|
4162
|
+
version_custom_metadata?: JsonObject;
|
|
3397
4163
|
}
|
|
3398
4164
|
/** The request body of a rotate certificate action. */
|
|
3399
4165
|
interface RotateCertificateBody extends SecretAction {
|
|
@@ -3403,6 +4169,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3403
4169
|
private_key?: string;
|
|
3404
4170
|
/** The new intermediate certificate to associate with the certificate. */
|
|
3405
4171
|
intermediate?: string;
|
|
4172
|
+
/** The secret metadata that a user can customize. */
|
|
4173
|
+
custom_metadata?: JsonObject;
|
|
4174
|
+
/** The secret version metadata that a user can customize. */
|
|
4175
|
+
version_custom_metadata?: JsonObject;
|
|
3406
4176
|
}
|
|
3407
4177
|
/** Properties that are returned with a successful `rotate_crl` action. */
|
|
3408
4178
|
interface RotateCrlActionResult extends ConfigElementActionResultConfig {
|
|
@@ -3411,16 +4181,40 @@ declare namespace SecretsManagerV1 {
|
|
|
3411
4181
|
interface RotateKvSecretBody extends SecretAction {
|
|
3412
4182
|
/** The new secret data to assign to a key-value secret. */
|
|
3413
4183
|
payload: JsonObject;
|
|
4184
|
+
/** The secret metadata that a user can customize. */
|
|
4185
|
+
custom_metadata?: JsonObject;
|
|
4186
|
+
/** The secret version metadata that a user can customize. */
|
|
4187
|
+
version_custom_metadata?: JsonObject;
|
|
4188
|
+
}
|
|
4189
|
+
/** The request body of a rotate private certificate action. */
|
|
4190
|
+
interface RotatePrivateCertBody extends SecretAction {
|
|
4191
|
+
/** The secret metadata that a user can customize. */
|
|
4192
|
+
custom_metadata: JsonObject;
|
|
4193
|
+
/** The secret version metadata that a user can customize. */
|
|
4194
|
+
version_custom_metadata?: JsonObject;
|
|
4195
|
+
}
|
|
4196
|
+
/** The request body of a rotate private certificate action. */
|
|
4197
|
+
interface RotatePrivateCertBodyWithVersionCustomMetadata extends SecretAction {
|
|
4198
|
+
/** The secret version metadata that a user can customize. */
|
|
4199
|
+
version_custom_metadata: JsonObject;
|
|
3414
4200
|
}
|
|
3415
4201
|
/** The request body of a `rotate` action. */
|
|
3416
4202
|
interface RotatePublicCertBody extends SecretAction {
|
|
3417
4203
|
/** Determine whether keys must be rotated. */
|
|
3418
4204
|
rotate_keys: boolean;
|
|
4205
|
+
/** The secret metadata that a user can customize. */
|
|
4206
|
+
custom_metadata?: JsonObject;
|
|
4207
|
+
/** The secret version metadata that a user can customize. */
|
|
4208
|
+
version_custom_metadata?: JsonObject;
|
|
3419
4209
|
}
|
|
3420
4210
|
/** The request body of a `rotate` action. */
|
|
3421
4211
|
interface RotateUsernamePasswordSecretBody extends SecretAction {
|
|
3422
4212
|
/** The new password to assign to a `username_password` secret. */
|
|
3423
4213
|
password: string;
|
|
4214
|
+
/** The secret metadata that a user can customize. */
|
|
4215
|
+
custom_metadata?: JsonObject;
|
|
4216
|
+
/** The secret version metadata that a user can customize. */
|
|
4217
|
+
version_custom_metadata?: JsonObject;
|
|
3424
4218
|
}
|
|
3425
4219
|
/** The secret rotation time interval. */
|
|
3426
4220
|
interface SecretPolicyRotationRotationPolicyRotation extends SecretPolicyRotationRotation {
|
|
@@ -3797,8 +4591,12 @@ declare namespace SecretsManagerV1 {
|
|
|
3797
4591
|
created_by?: string;
|
|
3798
4592
|
/** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
|
|
3799
4593
|
last_update_date?: string;
|
|
3800
|
-
/** The number of versions
|
|
4594
|
+
/** The number of versions that are associated with a secret. */
|
|
3801
4595
|
versions_total?: number;
|
|
4596
|
+
/** The number of locks that are associated with a secret. */
|
|
4597
|
+
locks_total?: number;
|
|
4598
|
+
/** The secret metadata that a user can customize. */
|
|
4599
|
+
custom_metadata?: JsonObject;
|
|
3802
4600
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
3803
4601
|
*
|
|
3804
4602
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -3860,6 +4658,12 @@ declare namespace SecretsManagerV1 {
|
|
|
3860
4658
|
* see [Get secret version metadata](#get-secret-version-metadata).
|
|
3861
4659
|
*/
|
|
3862
4660
|
versions?: JsonObject[];
|
|
4661
|
+
/** The number of locks that are associated with a secret. */
|
|
4662
|
+
locks_total?: number;
|
|
4663
|
+
/** The secret metadata that a user can customize. */
|
|
4664
|
+
custom_metadata?: JsonObject;
|
|
4665
|
+
/** The secret version metadata that a user can customize. */
|
|
4666
|
+
version_custom_metadata?: JsonObject;
|
|
3863
4667
|
/** The username to assign to this secret. */
|
|
3864
4668
|
username?: string;
|
|
3865
4669
|
/** The password to assign to this secret. */
|
|
@@ -3897,6 +4701,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3897
4701
|
creation_date?: string;
|
|
3898
4702
|
/** The unique identifier for the entity that created the secret version. */
|
|
3899
4703
|
created_by?: string;
|
|
4704
|
+
/** The number of locks that are associated with a secret version. */
|
|
4705
|
+
locks_total?: number;
|
|
4706
|
+
/** The secret version metadata that a user can customize. */
|
|
4707
|
+
version_custom_metadata?: JsonObject;
|
|
3900
4708
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3901
4709
|
auto_rotated?: boolean;
|
|
3902
4710
|
/** The data that is associated with the secret version. The data object contains the following fields:
|
|
@@ -3920,6 +4728,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3920
4728
|
* service API.
|
|
3921
4729
|
*/
|
|
3922
4730
|
downloaded?: boolean;
|
|
4731
|
+
/** The secret version metadata that a user can customize. */
|
|
4732
|
+
version_custom_metadata?: JsonObject;
|
|
3923
4733
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3924
4734
|
auto_rotated?: boolean;
|
|
3925
4735
|
}
|
|
@@ -3939,6 +4749,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3939
4749
|
* service API.
|
|
3940
4750
|
*/
|
|
3941
4751
|
downloaded?: boolean;
|
|
4752
|
+
/** The number of locks that are associated with a secret version. */
|
|
4753
|
+
locks_total?: number;
|
|
4754
|
+
/** The secret version metadata that a user can customize. */
|
|
4755
|
+
version_custom_metadata?: JsonObject;
|
|
3942
4756
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3943
4757
|
auto_rotated?: boolean;
|
|
3944
4758
|
}
|