@ibm-cloud/secrets-manager 1.0.33 → 1.0.36

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -21,7 +21,7 @@ import { BaseService, UserOptions } from 'ibm-cloud-sdk-core';
21
21
  * services or your custom-built applications. Secrets are stored in a dedicated instance of Secrets Manager, which is
22
22
  * built on open source HashiCorp Vault.
23
23
  *
24
- * API Version: 1.0.33
24
+ * API Version: 1.0.0
25
25
  * See: https://cloud.ibm.com/docs/secrets-manager
26
26
  */
27
27
  declare class SecretsManagerV1 extends BaseService {
@@ -153,12 +153,12 @@ declare class SecretsManagerV1 extends BaseService {
153
153
  * resources.
154
154
  *
155
155
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
156
- * `../secrets/{secret-type}?limit=5`.
156
+ * `../secrets/{secret_type}?limit=5`.
157
157
  * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
158
158
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
159
159
  *
160
160
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
161
- * `../secrets/{secret-type}?offset=25&limit=25`.
161
+ * `..?offset=25&limit=25`.
162
162
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
163
163
  * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
164
164
  */
@@ -174,28 +174,28 @@ declare class SecretsManagerV1 extends BaseService {
174
174
  * resources.
175
175
  *
176
176
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
177
- * `../secrets/{secret-type}?limit=5`.
177
+ * `../secrets/{secret_type}?limit=5`.
178
178
  * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
179
179
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
180
180
  *
181
181
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
182
- * `../secrets/{secret-type}?offset=25&limit=25`.
182
+ * `..?offset=25&limit=25`.
183
183
  * @param {string} [params.search] - Filter secrets that contain the specified string. The fields that are searched
184
184
  * include: id, name, description, labels, secret_type.
185
185
  *
186
186
  * **Usage:** If you want to list only the secrets that contain the string "text", use
187
- * `../secrets/{secret-type}?search=text`.
187
+ * `../secrets/{secret_type}?search=text`.
188
188
  * @param {string} [params.sortBy] - Sort a list of secrets by the specified field.
189
189
  *
190
190
  * **Usage:** To sort a list of secrets by their creation date, use
191
- * `../secrets/{secret-type}?sort_by=creation_date`.
191
+ * `../secrets/{secret_type}?sort_by=creation_date`.
192
192
  * @param {string[]} [params.groups] - Filter secrets by groups.
193
193
  *
194
194
  * You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
195
195
  * that are in the default secret group, use the `default` keyword.
196
196
  *
197
197
  * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
198
- * use `../secrets?groups={secret_group_ID},default`.
198
+ * use `..?groups={secret_group_ID},default`.
199
199
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
200
200
  * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecrets>>}
201
201
  */
@@ -225,6 +225,7 @@ declare class SecretsManagerV1 extends BaseService {
225
225
  * - `restore`: Restore a previous version of an `iam_credentials` secret.
226
226
  * - `revoke`: Revoke a private certificate.
227
227
  * - `delete_credentials`: Delete the API key that is associated with an `iam_credentials` secret.
228
+ * - `validate_dns_challenge`: Validate challenge for public certificate order with manual dns provider.
228
229
  *
229
230
  * @param {Object} params - The parameters to send to the service.
230
231
  * @param {string} params.secretType - The secret type.
@@ -302,7 +303,7 @@ declare class SecretsManagerV1 extends BaseService {
302
303
  */
303
304
  updateSecretVersion(params: SecretsManagerV1.UpdateSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecret>>;
304
305
  /**
305
- * Get secret version metadata.
306
+ * Get the metadata of a secret version.
306
307
  *
307
308
  * Get the metadata of a secret version by specifying the ID of the version or the alias `previous`.
308
309
  *
@@ -321,7 +322,26 @@ declare class SecretsManagerV1 extends BaseService {
321
322
  */
322
323
  getSecretVersionMetadata(params: SecretsManagerV1.GetSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
323
324
  /**
324
- * Get secret metadata.
325
+ * Update the metadata of a secret version.
326
+ *
327
+ * Update the metadata of a secret version, such as `version_custom_metadata`.
328
+ *
329
+ * @param {Object} params - The parameters to send to the service.
330
+ * @param {string} params.secretType - The secret type.
331
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
332
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
333
+ * `previous` to retrieve the previous version.
334
+ *
335
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
336
+ * the response details.
337
+ * @param {CollectionMetadata} params.metadata - The metadata that describes the resource array.
338
+ * @param {UpdateSecretVersionMetadata[]} params.resources - A collection of resources.
339
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
340
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>}
341
+ */
342
+ updateSecretVersionMetadata(params: SecretsManagerV1.UpdateSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
343
+ /**
344
+ * Get the metadata of a secret.
325
345
  *
326
346
  * Get the details of a secret by specifying its ID.
327
347
  *
@@ -352,6 +372,214 @@ declare class SecretsManagerV1 extends BaseService {
352
372
  * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>}
353
373
  */
354
374
  updateSecretMetadata(params: SecretsManagerV1.UpdateSecretMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.SecretMetadataRequest>>;
375
+ /*************************
376
+ * locks
377
+ ************************/
378
+ /**
379
+ * List secret locks.
380
+ *
381
+ * List the locks that are associated with a specified secret.
382
+ *
383
+ * @param {Object} params - The parameters to send to the service.
384
+ * @param {string} params.secretType - The secret type.
385
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
386
+ * @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
387
+ * items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
388
+ *
389
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
390
+ * `..?limit=5`.
391
+ * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
392
+ * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
393
+ *
394
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
395
+ * `..?offset=25&limit=25`.
396
+ * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
397
+ *
398
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
399
+ * `..?search=text`.
400
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
401
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
402
+ */
403
+ getLocks(params: SecretsManagerV1.GetLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
404
+ /**
405
+ * Lock a secret.
406
+ *
407
+ * Create a lock on the current version of a secret.
408
+ *
409
+ * A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
410
+ * successful request attaches a new lock to your secret, or replaces a lock of the same name if it already exists.
411
+ * Additionally, you can use this method to clear any matching locks on a secret by using one of the following
412
+ * optional lock modes:
413
+ *
414
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
415
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
416
+ * it doesn't have any locks.
417
+ *
418
+ * For more information about locking secrets, check out the
419
+ * [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
420
+ *
421
+ * @param {Object} params - The parameters to send to the service.
422
+ * @param {string} params.secretType - The secret type.
423
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
424
+ * @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
425
+ * @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
426
+ * clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
427
+ * is ignored.
428
+ *
429
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
430
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
431
+ * it doesn't have any locks.
432
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
433
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
434
+ */
435
+ lockSecret(params: SecretsManagerV1.LockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
436
+ /**
437
+ * Unlock a secret.
438
+ *
439
+ * Delete one or more locks that are associated with the current version of a secret.
440
+ *
441
+ * A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
442
+ * the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
443
+ * ["lock1", "lock2"]}`.
444
+ *
445
+ * **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
446
+ * removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
447
+ * the metadata of your secret.
448
+ *
449
+ * @param {Object} params - The parameters to send to the service.
450
+ * @param {string} params.secretType - The secret type.
451
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
452
+ * @param {string[]} [params.locks] - A comma-separated list of locks to delete.
453
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
454
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
455
+ */
456
+ unlockSecret(params: SecretsManagerV1.UnlockSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
457
+ /**
458
+ * List secret version locks.
459
+ *
460
+ * List the locks that are associated with a specified secret version.
461
+ *
462
+ * @param {Object} params - The parameters to send to the service.
463
+ * @param {string} params.secretType - The secret type.
464
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
465
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
466
+ * `previous` to retrieve the previous version.
467
+ *
468
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
469
+ * the response details.
470
+ * @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
471
+ * items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
472
+ *
473
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
474
+ * `..?limit=5`.
475
+ * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
476
+ * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
477
+ *
478
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
479
+ * `..?offset=25&limit=25`.
480
+ * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
481
+ *
482
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
483
+ * `..?search=text`.
484
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
485
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>}
486
+ */
487
+ getSecretVersionLocks(params: SecretsManagerV1.GetSecretVersionLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.ListSecretLocks>>;
488
+ /**
489
+ * Lock a secret version.
490
+ *
491
+ * Create a lock on the specified version of a secret.
492
+ *
493
+ * A lock can be used to prevent a secret from being deleted or modified while it's in use by your applications. A
494
+ * successful request attaches a new lock to the specified version, or replaces a lock of the same name if it already
495
+ * exists. Additionally, you can use this method to clear any matching locks on a secret version by using one of the
496
+ * following optional lock modes:
497
+ *
498
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
499
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
500
+ * it doesn't have any locks.
501
+ *
502
+ * For more information about locking secrets, check out the
503
+ * [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secret-locks).
504
+ *
505
+ * @param {Object} params - The parameters to send to the service.
506
+ * @param {string} params.secretType - The secret type.
507
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
508
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
509
+ * `previous` to retrieve the previous version.
510
+ *
511
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
512
+ * the response details.
513
+ * @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
514
+ * @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
515
+ * clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
516
+ * is ignored.
517
+ *
518
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
519
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
520
+ * it doesn't have any locks.
521
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
522
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
523
+ */
524
+ lockSecretVersion(params: SecretsManagerV1.LockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
525
+ /**
526
+ * Unlock a secret version.
527
+ *
528
+ * Delete one or more locks that are associated with the specified secret version.
529
+ *
530
+ * A successful request deletes the locks that you specify. To remove all locks, you can pass `{"locks": ["*"]}` in in
531
+ * the request body. Otherwise, specify the names of the locks that you want to delete. For example, `{"locks":
532
+ * ["lock-1", "lock-2"]}`.
533
+ *
534
+ * **Note:** A secret is considered unlocked and able to be revoked or deleted only after all of its locks are
535
+ * removed. To understand whether a secret contains locks, check the `locks_total` field that is returned as part of
536
+ * the metadata of your secret.
537
+ *
538
+ * @param {Object} params - The parameters to send to the service.
539
+ * @param {string} params.secretType - The secret type.
540
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
541
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
542
+ * `previous` to retrieve the previous version.
543
+ *
544
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
545
+ * the response details.
546
+ * @param {string[]} [params.locks] - A comma-separated list of locks to delete.
547
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
548
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>}
549
+ */
550
+ unlockSecretVersion(params: SecretsManagerV1.UnlockSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretLocks>>;
551
+ /**
552
+ * List all secrets and locks.
553
+ *
554
+ * List the lock details that are associated with all secrets in your Secrets Manager instance.
555
+ *
556
+ * @param {Object} [params] - The parameters to send to the service.
557
+ * @param {number} [params.limit] - The number of secrets with associated locks to retrieve. By default, list
558
+ * operations return the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page
559
+ * through your available resources.
560
+ *
561
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
562
+ * `..?limit=5`.
563
+ * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
564
+ * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
565
+ *
566
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
567
+ * `..?offset=25&limit=25`.
568
+ * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
569
+ *
570
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
571
+ * `..?search=text`.
572
+ * @param {string[]} [params.groups] - Filter secrets by groups.
573
+ *
574
+ * You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter secrets
575
+ * that are in the default secret group, use the `default` keyword.
576
+ *
577
+ * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
578
+ * use `..?groups={secret_group_ID},default`.
579
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
580
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>}
581
+ */
582
+ listInstanceSecretsLocks(params?: SecretsManagerV1.ListInstanceSecretsLocksParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetInstanceLocks>>;
355
583
  /*************************
356
584
  * policies
357
585
  ************************/
@@ -667,14 +895,14 @@ declare namespace SecretsManagerV1 {
667
895
  * different set of items, use `limit` with `offset` to page through your available resources.
668
896
  *
669
897
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
670
- * `../secrets/{secret-type}?limit=5`.
898
+ * `../secrets/{secret_type}?limit=5`.
671
899
  */
672
900
  limit?: number;
673
901
  /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
674
902
  * `offset` value. Use `offset` with `limit` to page through your available resources.
675
903
  *
676
904
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
677
- * `../secrets/{secret-type}?offset=25&limit=25`.
905
+ * `..?offset=25&limit=25`.
678
906
  */
679
907
  offset?: number;
680
908
  headers?: OutgoingHttpHeaders;
@@ -698,27 +926,27 @@ declare namespace SecretsManagerV1 {
698
926
  * different set of items, use `limit` with `offset` to page through your available resources.
699
927
  *
700
928
  * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 secrets, use
701
- * `../secrets/{secret-type}?limit=5`.
929
+ * `../secrets/{secret_type}?limit=5`.
702
930
  */
703
931
  limit?: number;
704
932
  /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
705
933
  * `offset` value. Use `offset` with `limit` to page through your available resources.
706
934
  *
707
935
  * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
708
- * `../secrets/{secret-type}?offset=25&limit=25`.
936
+ * `..?offset=25&limit=25`.
709
937
  */
710
938
  offset?: number;
711
939
  /** Filter secrets that contain the specified string. The fields that are searched include: id, name,
712
940
  * description, labels, secret_type.
713
941
  *
714
942
  * **Usage:** If you want to list only the secrets that contain the string "text", use
715
- * `../secrets/{secret-type}?search=text`.
943
+ * `../secrets/{secret_type}?search=text`.
716
944
  */
717
945
  search?: string;
718
946
  /** Sort a list of secrets by the specified field.
719
947
  *
720
948
  * **Usage:** To sort a list of secrets by their creation date, use
721
- * `../secrets/{secret-type}?sort_by=creation_date`.
949
+ * `../secrets/{secret_type}?sort_by=creation_date`.
722
950
  */
723
951
  sortBy?: ListAllSecretsConstants.SortBy | string;
724
952
  /** Filter secrets by groups.
@@ -727,14 +955,14 @@ declare namespace SecretsManagerV1 {
727
955
  * secrets that are in the default secret group, use the `default` keyword.
728
956
  *
729
957
  * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
730
- * use `../secrets?groups={secret_group_ID},default`.
958
+ * use `..?groups={secret_group_ID},default`.
731
959
  */
732
960
  groups?: string[];
733
961
  headers?: OutgoingHttpHeaders;
734
962
  }
735
963
  /** Constants for the `listAllSecrets` operation. */
736
964
  namespace ListAllSecretsConstants {
737
- /** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{secret-type}?sort_by=creation_date`. */
965
+ /** Sort a list of secrets by the specified field. **Usage:** To sort a list of secrets by their creation date, use `../secrets/{secret_type}?sort_by=creation_date`. */
738
966
  enum SortBy {
739
967
  ID = "id",
740
968
  CREATION_DATE = "creation_date",
@@ -793,7 +1021,8 @@ declare namespace SecretsManagerV1 {
793
1021
  ROTATE = "rotate",
794
1022
  RESTORE = "restore",
795
1023
  REVOKE = "revoke",
796
- DELETE_CREDENTIALS = "delete_credentials"
1024
+ DELETE_CREDENTIALS = "delete_credentials",
1025
+ VALIDATE_DNS_CHALLENGE = "validate_dns_challenge"
797
1026
  }
798
1027
  }
799
1028
  /** Parameters for the `deleteSecret` operation. */
@@ -922,6 +1151,38 @@ declare namespace SecretsManagerV1 {
922
1151
  KV = "kv"
923
1152
  }
924
1153
  }
1154
+ /** Parameters for the `updateSecretVersionMetadata` operation. */
1155
+ interface UpdateSecretVersionMetadataParams {
1156
+ /** The secret type. */
1157
+ secretType: UpdateSecretVersionMetadataConstants.SecretType | string;
1158
+ /** The v4 UUID that uniquely identifies the secret. */
1159
+ id: string;
1160
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1161
+ * previous version.
1162
+ *
1163
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1164
+ * check the response details.
1165
+ */
1166
+ versionId: string;
1167
+ /** The metadata that describes the resource array. */
1168
+ metadata: CollectionMetadata;
1169
+ /** A collection of resources. */
1170
+ resources: UpdateSecretVersionMetadata[];
1171
+ headers?: OutgoingHttpHeaders;
1172
+ }
1173
+ /** Constants for the `updateSecretVersionMetadata` operation. */
1174
+ namespace UpdateSecretVersionMetadataConstants {
1175
+ /** The secret type. */
1176
+ enum SecretType {
1177
+ ARBITRARY = "arbitrary",
1178
+ IAM_CREDENTIALS = "iam_credentials",
1179
+ IMPORTED_CERT = "imported_cert",
1180
+ PUBLIC_CERT = "public_cert",
1181
+ PRIVATE_CERT = "private_cert",
1182
+ USERNAME_PASSWORD = "username_password",
1183
+ KV = "kv"
1184
+ }
1185
+ }
925
1186
  /** Parameters for the `getSecretMetadata` operation. */
926
1187
  interface GetSecretMetadataParams {
927
1188
  /** The secret type. */
@@ -968,6 +1229,264 @@ declare namespace SecretsManagerV1 {
968
1229
  KV = "kv"
969
1230
  }
970
1231
  }
1232
+ /** Parameters for the `getLocks` operation. */
1233
+ interface GetLocksParams {
1234
+ /** The secret type. */
1235
+ secretType: GetLocksConstants.SecretType | string;
1236
+ /** The v4 UUID that uniquely identifies the secret. */
1237
+ id: string;
1238
+ /** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
1239
+ * different set of items, use `limit` with `offset` to page through your available resources.
1240
+ *
1241
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
1242
+ * use
1243
+ * `..?limit=5`.
1244
+ */
1245
+ limit?: number;
1246
+ /** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1247
+ * `offset` value. Use `offset` with `limit` to page through your available resources.
1248
+ *
1249
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
1250
+ * `..?offset=25&limit=25`.
1251
+ */
1252
+ offset?: number;
1253
+ /** Filter locks that contain the specified string in the field "name".
1254
+ *
1255
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
1256
+ * `..?search=text`.
1257
+ */
1258
+ search?: string;
1259
+ headers?: OutgoingHttpHeaders;
1260
+ }
1261
+ /** Constants for the `getLocks` operation. */
1262
+ namespace GetLocksConstants {
1263
+ /** The secret type. */
1264
+ enum SecretType {
1265
+ ARBITRARY = "arbitrary",
1266
+ IAM_CREDENTIALS = "iam_credentials",
1267
+ IMPORTED_CERT = "imported_cert",
1268
+ PUBLIC_CERT = "public_cert",
1269
+ PRIVATE_CERT = "private_cert",
1270
+ USERNAME_PASSWORD = "username_password",
1271
+ KV = "kv"
1272
+ }
1273
+ }
1274
+ /** Parameters for the `lockSecret` operation. */
1275
+ interface LockSecretParams {
1276
+ /** The secret type. */
1277
+ secretType: LockSecretConstants.SecretType | string;
1278
+ /** The v4 UUID that uniquely identifies the secret. */
1279
+ id: string;
1280
+ /** The lock data to be attached to a secret version. */
1281
+ locks?: LockSecretBodyLocksItem[];
1282
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
1283
+ * on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
1284
+ *
1285
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
1286
+ * secret.
1287
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
1288
+ * if it doesn't have any locks.
1289
+ */
1290
+ mode?: LockSecretConstants.Mode | string;
1291
+ headers?: OutgoingHttpHeaders;
1292
+ }
1293
+ /** Constants for the `lockSecret` operation. */
1294
+ namespace LockSecretConstants {
1295
+ /** The secret type. */
1296
+ enum SecretType {
1297
+ ARBITRARY = "arbitrary",
1298
+ IAM_CREDENTIALS = "iam_credentials",
1299
+ IMPORTED_CERT = "imported_cert",
1300
+ PUBLIC_CERT = "public_cert",
1301
+ PRIVATE_CERT = "private_cert",
1302
+ USERNAME_PASSWORD = "username_password",
1303
+ KV = "kv"
1304
+ }
1305
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1306
+ enum Mode {
1307
+ EXCLUSIVE = "exclusive",
1308
+ EXCLUSIVE_DELETE = "exclusive_delete"
1309
+ }
1310
+ }
1311
+ /** Parameters for the `unlockSecret` operation. */
1312
+ interface UnlockSecretParams {
1313
+ /** The secret type. */
1314
+ secretType: UnlockSecretConstants.SecretType | string;
1315
+ /** The v4 UUID that uniquely identifies the secret. */
1316
+ id: string;
1317
+ /** A comma-separated list of locks to delete. */
1318
+ locks?: string[];
1319
+ headers?: OutgoingHttpHeaders;
1320
+ }
1321
+ /** Constants for the `unlockSecret` operation. */
1322
+ namespace UnlockSecretConstants {
1323
+ /** The secret type. */
1324
+ enum SecretType {
1325
+ ARBITRARY = "arbitrary",
1326
+ IAM_CREDENTIALS = "iam_credentials",
1327
+ IMPORTED_CERT = "imported_cert",
1328
+ PUBLIC_CERT = "public_cert",
1329
+ PRIVATE_CERT = "private_cert",
1330
+ USERNAME_PASSWORD = "username_password",
1331
+ KV = "kv"
1332
+ }
1333
+ }
1334
+ /** Parameters for the `getSecretVersionLocks` operation. */
1335
+ interface GetSecretVersionLocksParams {
1336
+ /** The secret type. */
1337
+ secretType: GetSecretVersionLocksConstants.SecretType | string;
1338
+ /** The v4 UUID that uniquely identifies the secret. */
1339
+ id: string;
1340
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1341
+ * previous version.
1342
+ *
1343
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1344
+ * check the response details.
1345
+ */
1346
+ versionId: string;
1347
+ /** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
1348
+ * different set of items, use `limit` with `offset` to page through your available resources.
1349
+ *
1350
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
1351
+ * use
1352
+ * `..?limit=5`.
1353
+ */
1354
+ limit?: number;
1355
+ /** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1356
+ * `offset` value. Use `offset` with `limit` to page through your available resources.
1357
+ *
1358
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
1359
+ * `..?offset=25&limit=25`.
1360
+ */
1361
+ offset?: number;
1362
+ /** Filter locks that contain the specified string in the field "name".
1363
+ *
1364
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
1365
+ * `..?search=text`.
1366
+ */
1367
+ search?: string;
1368
+ headers?: OutgoingHttpHeaders;
1369
+ }
1370
+ /** Constants for the `getSecretVersionLocks` operation. */
1371
+ namespace GetSecretVersionLocksConstants {
1372
+ /** The secret type. */
1373
+ enum SecretType {
1374
+ ARBITRARY = "arbitrary",
1375
+ IAM_CREDENTIALS = "iam_credentials",
1376
+ IMPORTED_CERT = "imported_cert",
1377
+ PUBLIC_CERT = "public_cert",
1378
+ PRIVATE_CERT = "private_cert",
1379
+ USERNAME_PASSWORD = "username_password",
1380
+ KV = "kv"
1381
+ }
1382
+ }
1383
+ /** Parameters for the `lockSecretVersion` operation. */
1384
+ interface LockSecretVersionParams {
1385
+ /** The secret type. */
1386
+ secretType: LockSecretVersionConstants.SecretType | string;
1387
+ /** The v4 UUID that uniquely identifies the secret. */
1388
+ id: string;
1389
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1390
+ * previous version.
1391
+ *
1392
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1393
+ * check the response details.
1394
+ */
1395
+ versionId: string;
1396
+ /** The lock data to be attached to a secret version. */
1397
+ locks?: LockSecretBodyLocksItem[];
1398
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
1399
+ * on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
1400
+ *
1401
+ * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
1402
+ * secret.
1403
+ * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version
1404
+ * if it doesn't have any locks.
1405
+ */
1406
+ mode?: LockSecretVersionConstants.Mode | string;
1407
+ headers?: OutgoingHttpHeaders;
1408
+ }
1409
+ /** Constants for the `lockSecretVersion` operation. */
1410
+ namespace LockSecretVersionConstants {
1411
+ /** The secret type. */
1412
+ enum SecretType {
1413
+ ARBITRARY = "arbitrary",
1414
+ IAM_CREDENTIALS = "iam_credentials",
1415
+ IMPORTED_CERT = "imported_cert",
1416
+ PUBLIC_CERT = "public_cert",
1417
+ PRIVATE_CERT = "private_cert",
1418
+ USERNAME_PASSWORD = "username_password",
1419
+ KV = "kv"
1420
+ }
1421
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1422
+ enum Mode {
1423
+ EXCLUSIVE = "exclusive",
1424
+ EXCLUSIVE_DELETE = "exclusive_delete"
1425
+ }
1426
+ }
1427
+ /** Parameters for the `unlockSecretVersion` operation. */
1428
+ interface UnlockSecretVersionParams {
1429
+ /** The secret type. */
1430
+ secretType: UnlockSecretVersionConstants.SecretType | string;
1431
+ /** The v4 UUID that uniquely identifies the secret. */
1432
+ id: string;
1433
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1434
+ * previous version.
1435
+ *
1436
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1437
+ * check the response details.
1438
+ */
1439
+ versionId: string;
1440
+ /** A comma-separated list of locks to delete. */
1441
+ locks?: string[];
1442
+ headers?: OutgoingHttpHeaders;
1443
+ }
1444
+ /** Constants for the `unlockSecretVersion` operation. */
1445
+ namespace UnlockSecretVersionConstants {
1446
+ /** The secret type. */
1447
+ enum SecretType {
1448
+ ARBITRARY = "arbitrary",
1449
+ IAM_CREDENTIALS = "iam_credentials",
1450
+ IMPORTED_CERT = "imported_cert",
1451
+ PUBLIC_CERT = "public_cert",
1452
+ PRIVATE_CERT = "private_cert",
1453
+ USERNAME_PASSWORD = "username_password",
1454
+ KV = "kv"
1455
+ }
1456
+ }
1457
+ /** Parameters for the `listInstanceSecretsLocks` operation. */
1458
+ interface ListInstanceSecretsLocksParams {
1459
+ /** The number of secrets with associated locks to retrieve. By default, list operations return the first 25
1460
+ * items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1461
+ *
1462
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
1463
+ * `..?limit=5`.
1464
+ */
1465
+ limit?: number;
1466
+ /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1467
+ * `offset` value. Use `offset` with `limit` to page through your available resources.
1468
+ *
1469
+ * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
1470
+ * `..?offset=25&limit=25`.
1471
+ */
1472
+ offset?: number;
1473
+ /** Filter locks that contain the specified string in the field "name".
1474
+ *
1475
+ * **Usage:** If you want to list only the locks that contain the string "text" in the field "name", use
1476
+ * `..?search=text`.
1477
+ */
1478
+ search?: string;
1479
+ /** Filter secrets by groups.
1480
+ *
1481
+ * You can apply multiple filters by using a comma-separated list of secret group IDs. If you need to filter
1482
+ * secrets that are in the default secret group, use the `default` keyword.
1483
+ *
1484
+ * **Usage:** To retrieve a list of secrets that are associated with an existing secret group or the default group,
1485
+ * use `..?groups={secret_group_ID},default`.
1486
+ */
1487
+ groups?: string[];
1488
+ headers?: OutgoingHttpHeaders;
1489
+ }
971
1490
  /** Parameters for the `putPolicy` operation. */
972
1491
  interface PutPolicyParams {
973
1492
  /** The secret type. */
@@ -987,6 +1506,7 @@ declare namespace SecretsManagerV1 {
987
1506
  /** The secret type. */
988
1507
  enum SecretType {
989
1508
  USERNAME_PASSWORD = "username_password",
1509
+ IAM_CREDENTIALS = "iam_credentials",
990
1510
  PUBLIC_CERT = "public_cert",
991
1511
  PRIVATE_CERT = "private_cert"
992
1512
  }
@@ -1010,6 +1530,7 @@ declare namespace SecretsManagerV1 {
1010
1530
  /** The secret type. */
1011
1531
  enum SecretType {
1012
1532
  USERNAME_PASSWORD = "username_password",
1533
+ IAM_CREDENTIALS = "iam_credentials",
1013
1534
  PUBLIC_CERT = "public_cert",
1014
1535
  PRIVATE_CERT = "private_cert"
1015
1536
  }
@@ -1368,6 +1889,13 @@ declare namespace SecretsManagerV1 {
1368
1889
  /** GetConfigResourcesItem. */
1369
1890
  interface GetConfigResourcesItem {
1370
1891
  }
1892
+ /** Properties that describe the locks that are associated with an instance. */
1893
+ interface GetInstanceLocks {
1894
+ /** The metadata that describes the resource array. */
1895
+ metadata: CollectionMetadata;
1896
+ /** A collection of resources. */
1897
+ resources: InstanceSecretsLocks[];
1898
+ }
1371
1899
  /** Properties that describe an existing registration with Event Notifications. */
1372
1900
  interface GetNotificationsSettings {
1373
1901
  /** The metadata that describes the resource array. */
@@ -1382,6 +1910,13 @@ declare namespace SecretsManagerV1 {
1382
1910
  /** A collection of resources. */
1383
1911
  resources: SecretResource[];
1384
1912
  }
1913
+ /** Properties that describe the lock of a secret or a secret version. */
1914
+ interface GetSecretLocks {
1915
+ /** The metadata that describes the resource array. */
1916
+ metadata: CollectionMetadata;
1917
+ /** A collection of resources. */
1918
+ resources: SecretsLocks[];
1919
+ }
1385
1920
  /** GetSecretPolicies. */
1386
1921
  interface GetSecretPolicies {
1387
1922
  }
@@ -1406,6 +1941,22 @@ declare namespace SecretsManagerV1 {
1406
1941
  /** A collection of resources. */
1407
1942
  resources: ConfigElementDef[];
1408
1943
  }
1944
+ /** Properties that describe the locks that are associated with an instance. */
1945
+ interface InstanceSecretsLocks {
1946
+ /** The unique ID of the secret. */
1947
+ secret_id?: string;
1948
+ /** The v4 UUID that uniquely identifies the secret group to assign to this secret.
1949
+ *
1950
+ * If you omit this parameter, your secret is assigned to the `default` secret group.
1951
+ */
1952
+ secret_group_id?: string;
1953
+ /** The secret type. */
1954
+ secret_type?: string;
1955
+ /** A collection of locks that are attached to a secret version. */
1956
+ versions?: SecretLockVersion[];
1957
+ /** InstanceSecretsLocks accepts additional properties. */
1958
+ [propName: string]: any;
1959
+ }
1409
1960
  /** Intermediate certificate authorities configuration. */
1410
1961
  interface IntermediateCertificateAuthoritiesConfigItem {
1411
1962
  /** The human-readable name to assign to your configuration. */
@@ -1444,6 +1995,13 @@ declare namespace SecretsManagerV1 {
1444
1995
  /** The name that was assigned to the DNS provider configuration. */
1445
1996
  dns?: string;
1446
1997
  }
1998
+ /** Properties that describe the locks of a secret or a secret version. */
1999
+ interface ListSecretLocks {
2000
+ /** The metadata that describes the resource array. */
2001
+ metadata: CollectionMetadata;
2002
+ /** A collection of resources. */
2003
+ resources: SecretLockData[];
2004
+ }
1447
2005
  /** Properties that describe a list of versions of a secret. */
1448
2006
  interface ListSecretVersions {
1449
2007
  /** The metadata that describes the resource array. */
@@ -1458,6 +2016,23 @@ declare namespace SecretsManagerV1 {
1458
2016
  /** A collection of resources. */
1459
2017
  resources?: SecretResource[];
1460
2018
  }
2019
+ /** LockSecretBodyLocksItem. */
2020
+ interface LockSecretBodyLocksItem {
2021
+ /** A human-readable name to assign to the lock. The lock name must be unique per secret version.
2022
+ *
2023
+ * To protect your privacy, do not use personal data, such as your name or location, as a name for your secret
2024
+ * lock.
2025
+ */
2026
+ name: string;
2027
+ /** An extended description of the lock.
2028
+ *
2029
+ * To protect your privacy, do not use personal data, such as your name or location, as a description for your
2030
+ * secret lock.
2031
+ */
2032
+ description: string;
2033
+ /** Optional information to associate with a lock, such as resources CRNs to be used by automation. */
2034
+ attributes: JsonObject;
2035
+ }
1461
2036
  /** The Event Notifications details. */
1462
2037
  interface NotificationsSettings {
1463
2038
  /** The Cloud Resource Name (CRN) of the connected Event Notifications instance. */
@@ -1555,6 +2130,56 @@ declare namespace SecretsManagerV1 {
1555
2130
  /** SecretGroupResource accepts additional properties. */
1556
2131
  [propName: string]: any;
1557
2132
  }
2133
+ /** Properties that describe a lock. */
2134
+ interface SecretLockData {
2135
+ /** A human-readable name to assign to the secret lock.
2136
+ *
2137
+ * To protect your privacy, do not use personal data, such as your name or location, as a name for the secret lock.
2138
+ */
2139
+ name?: string;
2140
+ /** An extended description of the secret lock.
2141
+ *
2142
+ * To protect your privacy, do not use personal data, such as your name or location, as a description for the
2143
+ * secret lock.
2144
+ */
2145
+ description?: string;
2146
+ /** The date the secret lock was created. The date format follows RFC 3339. */
2147
+ creation_date?: string;
2148
+ /** The unique identifier for the entity that created the secret lock. */
2149
+ created_by?: string;
2150
+ /** The information that is associated with a lock, such as resources CRNs to be used by automation. */
2151
+ attributes?: JsonObject;
2152
+ /** The v4 UUID that uniquely identifies the secret version. */
2153
+ secret_version_id?: string;
2154
+ /** The v4 UUID that uniquely identifies the secret. */
2155
+ secret_id?: string;
2156
+ /** The v4 UUID that uniquely identifies the secret group to assign to this secret.
2157
+ *
2158
+ * If you omit this parameter, your secret is assigned to the `default` secret group.
2159
+ */
2160
+ secret_group_id?: string;
2161
+ /** Updates when the actual secret is modified. The date format follows RFC 3339. */
2162
+ last_update_date?: string;
2163
+ /** A representation for the 2 last secret versions. Could be "current" for version (n) or "previous" for
2164
+ * version (n-1).
2165
+ */
2166
+ secret_version_alias?: string;
2167
+ }
2168
+ /** Properties that describe the secret locks. */
2169
+ interface SecretLockVersion {
2170
+ /** The v4 UUID that uniquely identifies the lock. */
2171
+ id?: string;
2172
+ /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
2173
+ * is used for version `n-1`.
2174
+ */
2175
+ alias?: string;
2176
+ /** The names of all locks that are associated with this secret. */
2177
+ locks?: string[];
2178
+ /** Indicates whether the payload for the secret version is stored and available. */
2179
+ payload_available?: boolean;
2180
+ /** SecretLockVersion accepts additional properties. */
2181
+ [propName: string]: any;
2182
+ }
1558
2183
  /** SecretMetadata. */
1559
2184
  interface SecretMetadata {
1560
2185
  }
@@ -1586,6 +2211,20 @@ declare namespace SecretsManagerV1 {
1586
2211
  /** SecretVersionMetadata. */
1587
2212
  interface SecretVersionMetadata {
1588
2213
  }
2214
+ /** Properties that describe the secret locks. */
2215
+ interface SecretsLocks {
2216
+ /** The unique ID of the secret. */
2217
+ secret_id?: string;
2218
+ /** The v4 UUID that uniquely identifies the secret group to assign to this secret.
2219
+ *
2220
+ * If you omit this parameter, your secret is assigned to the `default` secret group.
2221
+ */
2222
+ secret_group_id?: string;
2223
+ /** A collection of locks that are attached to a secret version. */
2224
+ versions?: SecretLockVersion[];
2225
+ /** SecretsLocks accepts additional properties. */
2226
+ [propName: string]: any;
2227
+ }
1589
2228
  /** Properties that are returned with a successful `sign` action. */
1590
2229
  interface SignActionResultData {
1591
2230
  /** The PEM-encoded certificate. */
@@ -1612,6 +2251,11 @@ declare namespace SecretsManagerV1 {
1612
2251
  /** The time until the certificate expires. */
1613
2252
  expiration?: number;
1614
2253
  }
2254
+ /** Properties that update the metadata of a secret version. */
2255
+ interface UpdateSecretVersionMetadata {
2256
+ /** The secret version metadata that a user can customize. */
2257
+ version_custom_metadata?: JsonObject;
2258
+ }
1615
2259
  /** CertificateValidity. */
1616
2260
  interface CertificateValidity {
1617
2261
  /** The date and time that the certificate validity period begins. */
@@ -1664,8 +2308,12 @@ declare namespace SecretsManagerV1 {
1664
2308
  created_by?: string;
1665
2309
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
1666
2310
  last_update_date?: string;
1667
- /** The number of versions the secret has. */
2311
+ /** The number of versions that are associated with a secret. */
1668
2312
  versions_total?: number;
2313
+ /** The number of locks that are associated with a secret. */
2314
+ locks_total?: number;
2315
+ /** The secret metadata that a user can customize. */
2316
+ custom_metadata?: JsonObject;
1669
2317
  /** The date the secret material expires. The date format follows RFC 3339.
1670
2318
  *
1671
2319
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -1727,6 +2375,12 @@ declare namespace SecretsManagerV1 {
1727
2375
  * see [Get secret version metadata](#get-secret-version-metadata).
1728
2376
  */
1729
2377
  versions?: JsonObject[];
2378
+ /** The number of locks that are associated with a secret. */
2379
+ locks_total?: number;
2380
+ /** The secret metadata that a user can customize. */
2381
+ custom_metadata?: JsonObject;
2382
+ /** The secret version metadata that a user can customize. */
2383
+ version_custom_metadata?: JsonObject;
1730
2384
  /** The date the secret material expires. The date format follows RFC 3339.
1731
2385
  *
1732
2386
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -1755,6 +2409,10 @@ declare namespace SecretsManagerV1 {
1755
2409
  creation_date?: string;
1756
2410
  /** The unique identifier for the entity that created the secret version. */
1757
2411
  created_by?: string;
2412
+ /** The number of locks that are associated with a secret version. */
2413
+ locks_total?: number;
2414
+ /** The secret version metadata that a user can customize. */
2415
+ version_custom_metadata?: JsonObject;
1758
2416
  /** The data that is associated with the secret version.
1759
2417
  *
1760
2418
  * The data object contains the field `payload`.
@@ -1775,6 +2433,8 @@ declare namespace SecretsManagerV1 {
1775
2433
  * service API.
1776
2434
  */
1777
2435
  downloaded?: boolean;
2436
+ /** The secret version metadata that a user can customize. */
2437
+ version_custom_metadata?: JsonObject;
1778
2438
  }
1779
2439
  /** Properties that describe a secret version. */
1780
2440
  interface ArbitrarySecretVersionMetadata extends SecretVersionMetadata {
@@ -1792,6 +2452,10 @@ declare namespace SecretsManagerV1 {
1792
2452
  * service API.
1793
2453
  */
1794
2454
  downloaded?: boolean;
2455
+ /** The number of locks that are associated with a secret version. */
2456
+ locks_total?: number;
2457
+ /** The secret version metadata that a user can customize. */
2458
+ version_custom_metadata?: JsonObject;
1795
2459
  }
1796
2460
  /** Metadata properties that describe a certificate secret. */
1797
2461
  interface CertificateSecretMetadata extends SecretMetadata {
@@ -1838,8 +2502,12 @@ declare namespace SecretsManagerV1 {
1838
2502
  created_by?: string;
1839
2503
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
1840
2504
  last_update_date?: string;
1841
- /** The number of versions the secret has. */
2505
+ /** The number of versions that are associated with a secret. */
1842
2506
  versions_total?: number;
2507
+ /** The number of locks that are associated with a secret. */
2508
+ locks_total?: number;
2509
+ /** The secret metadata that a user can customize. */
2510
+ custom_metadata?: JsonObject;
1843
2511
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
1844
2512
  serial_number?: string;
1845
2513
  /** The identifier for the cryptographic algorithm that was used by the issuing certificate authority to sign
@@ -1914,6 +2582,12 @@ declare namespace SecretsManagerV1 {
1914
2582
  * see [Get secret version metadata](#get-secret-version-metadata).
1915
2583
  */
1916
2584
  versions?: JsonObject[];
2585
+ /** The number of locks that are associated with a secret. */
2586
+ locks_total?: number;
2587
+ /** The secret metadata that a user can customize. */
2588
+ custom_metadata?: JsonObject;
2589
+ /** The secret version metadata that a user can customize. */
2590
+ version_custom_metadata?: JsonObject;
1917
2591
  /** The contents of your certificate. The data must be formatted on a single line with embedded newline
1918
2592
  * characters.
1919
2593
  */
@@ -1972,6 +2646,10 @@ declare namespace SecretsManagerV1 {
1972
2646
  creation_date?: string;
1973
2647
  /** The unique identifier for the entity that created the secret version. */
1974
2648
  created_by?: string;
2649
+ /** The number of locks that are associated with a secret version. */
2650
+ locks_total?: number;
2651
+ /** The secret version metadata that a user can customize. */
2652
+ version_custom_metadata?: JsonObject;
1975
2653
  validity?: CertificateValidity;
1976
2654
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
1977
2655
  serial_number?: string;
@@ -1999,6 +2677,8 @@ declare namespace SecretsManagerV1 {
1999
2677
  * service API.
2000
2678
  */
2001
2679
  downloaded?: boolean;
2680
+ /** The secret version metadata that a user can customize. */
2681
+ version_custom_metadata?: JsonObject;
2002
2682
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2003
2683
  serial_number?: string;
2004
2684
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -2021,6 +2701,10 @@ declare namespace SecretsManagerV1 {
2021
2701
  * service API.
2022
2702
  */
2023
2703
  downloaded?: boolean;
2704
+ /** The number of locks that are associated with a secret version. */
2705
+ locks_total?: number;
2706
+ /** The secret version metadata that a user can customize. */
2707
+ version_custom_metadata?: JsonObject;
2024
2708
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2025
2709
  serial_number?: string;
2026
2710
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -2046,9 +2730,10 @@ declare namespace SecretsManagerV1 {
2046
2730
  max_ttl?: any;
2047
2731
  /** The time-to-live (TTL) to assign to a private certificate.
2048
2732
  *
2049
- * The value can be supplied as a string representation of a duration, such as `12h`. Hour (`h`) is the largest
2050
- * time suffix. The value can't exceed the `max_ttl` that is defined in the associated certificate template. In the
2051
- * API response, this value is returned in seconds (integer).
2733
+ * The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
2734
+ * seconds (suffix `s`), minutes (suffix `m`) or hours (suffix `h`). The value can't exceed the `max_ttl` that is
2735
+ * defined in the associated certificate template. In the API response, this value is returned in seconds
2736
+ * (integer).
2052
2737
  */
2053
2738
  ttl?: any;
2054
2739
  /** Determines whether to allow `localhost` to be included as one of the requested common names. */
@@ -2338,8 +3023,12 @@ declare namespace SecretsManagerV1 {
2338
3023
  created_by?: string;
2339
3024
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
2340
3025
  last_update_date?: string;
2341
- /** The number of versions the secret has. */
3026
+ /** The number of versions that are associated with a secret. */
2342
3027
  versions_total?: number;
3028
+ /** The number of locks that are associated with a secret. */
3029
+ locks_total?: number;
3030
+ /** The secret metadata that a user can customize. */
3031
+ custom_metadata?: JsonObject;
2343
3032
  /** The time-to-live (TTL) or lease duration that is assigned to the secret. For `iam_credentials` secrets, the
2344
3033
  * TTL defines for how long each generated API key remains valid.
2345
3034
  */
@@ -2417,6 +3106,12 @@ declare namespace SecretsManagerV1 {
2417
3106
  * see [Get secret version metadata](#get-secret-version-metadata).
2418
3107
  */
2419
3108
  versions?: JsonObject[];
3109
+ /** The number of locks that are associated with a secret. */
3110
+ locks_total?: number;
3111
+ /** The secret metadata that a user can customize. */
3112
+ custom_metadata?: JsonObject;
3113
+ /** The secret version metadata that a user can customize. */
3114
+ version_custom_metadata?: JsonObject;
2420
3115
  /** The time-to-live (TTL) or lease duration to assign to generated credentials.
2421
3116
  *
2422
3117
  * For `iam_credentials` secrets, the TTL defines for how long each generated API key remains valid. The value can
@@ -2467,6 +3162,12 @@ declare namespace SecretsManagerV1 {
2467
3162
  * are generated each time that the secret is read or accessed.
2468
3163
  */
2469
3164
  reuse_api_key?: boolean;
3165
+ /** The date that the secret is scheduled for automatic rotation.
3166
+ *
3167
+ * The service automatically creates a new version of the secret on its next rotation date. This field exists only
3168
+ * for secrets that have an existing rotation policy.
3169
+ */
3170
+ next_rotation_date?: string;
2470
3171
  }
2471
3172
  /** IAMCredentialsSecretVersion. */
2472
3173
  interface IAMCredentialsSecretVersion extends SecretVersion {
@@ -2478,6 +3179,12 @@ declare namespace SecretsManagerV1 {
2478
3179
  creation_date?: string;
2479
3180
  /** The unique identifier for the entity that created the secret version. */
2480
3181
  created_by?: string;
3182
+ /** The number of locks that are associated with a secret version. */
3183
+ locks_total?: number;
3184
+ /** The secret version metadata that a user can customize. */
3185
+ version_custom_metadata?: JsonObject;
3186
+ /** Indicates whether the version of the secret was created by automatic rotation. */
3187
+ auto_rotated?: boolean;
2481
3188
  /** The data that is associated with the secret version. The data object contains the following fields:
2482
3189
  *
2483
3190
  * - `api_key`: The API key that is generated for this secret.
@@ -2500,6 +3207,10 @@ declare namespace SecretsManagerV1 {
2500
3207
  * service API.
2501
3208
  */
2502
3209
  downloaded?: boolean;
3210
+ /** The secret version metadata that a user can customize. */
3211
+ version_custom_metadata?: JsonObject;
3212
+ /** Indicates whether the version of the secret was created by automatic rotation. */
3213
+ auto_rotated?: boolean;
2503
3214
  }
2504
3215
  /** Properties that describe a secret version. */
2505
3216
  interface IAMCredentialsSecretVersionMetadata extends SecretVersionMetadata {
@@ -2517,6 +3228,12 @@ declare namespace SecretsManagerV1 {
2517
3228
  * service API.
2518
3229
  */
2519
3230
  downloaded?: boolean;
3231
+ /** The number of locks that are associated with a secret version. */
3232
+ locks_total?: number;
3233
+ /** The secret version metadata that a user can customize. */
3234
+ version_custom_metadata?: JsonObject;
3235
+ /** Indicates whether the version of the secret was created by automatic rotation. */
3236
+ auto_rotated?: boolean;
2520
3237
  }
2521
3238
  /** Intermediate certificate authorities configuration. */
2522
3239
  interface IntermediateCertificateAuthoritiesConfig extends GetConfigElementsResourcesItem {
@@ -2682,8 +3399,12 @@ declare namespace SecretsManagerV1 {
2682
3399
  created_by?: string;
2683
3400
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
2684
3401
  last_update_date?: string;
2685
- /** The number of versions the secret has. */
3402
+ /** The number of versions that are associated with a secret. */
2686
3403
  versions_total?: number;
3404
+ /** The number of locks that are associated with a secret. */
3405
+ locks_total?: number;
3406
+ /** The secret metadata that a user can customize. */
3407
+ custom_metadata?: JsonObject;
2687
3408
  }
2688
3409
  /** Properties that describe a secret. */
2689
3410
  interface KvSecretResource extends SecretResource {
@@ -2735,6 +3456,12 @@ declare namespace SecretsManagerV1 {
2735
3456
  * see [Get secret version metadata](#get-secret-version-metadata).
2736
3457
  */
2737
3458
  versions?: JsonObject[];
3459
+ /** The number of locks that are associated with a secret. */
3460
+ locks_total?: number;
3461
+ /** The secret metadata that a user can customize. */
3462
+ custom_metadata?: JsonObject;
3463
+ /** The secret version metadata that a user can customize. */
3464
+ version_custom_metadata?: JsonObject;
2738
3465
  /** The date the secret material expires. The date format follows RFC 3339.
2739
3466
  *
2740
3467
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -2815,8 +3542,12 @@ declare namespace SecretsManagerV1 {
2815
3542
  created_by?: string;
2816
3543
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
2817
3544
  last_update_date?: string;
2818
- /** The number of versions the secret has. */
3545
+ /** The number of versions that are associated with a secret. */
2819
3546
  versions_total?: number;
3547
+ /** The number of locks that are associated with a secret. */
3548
+ locks_total?: number;
3549
+ /** The secret metadata that a user can customize. */
3550
+ custom_metadata?: JsonObject;
2820
3551
  /** The name of the certificate template. */
2821
3552
  certificate_template?: string;
2822
3553
  /** The intermediate certificate authority that signed this certificate. */
@@ -2894,6 +3625,12 @@ declare namespace SecretsManagerV1 {
2894
3625
  * see [Get secret version metadata](#get-secret-version-metadata).
2895
3626
  */
2896
3627
  versions?: JsonObject[];
3628
+ /** The number of locks that are associated with a secret. */
3629
+ locks_total?: number;
3630
+ /** The secret metadata that a user can customize. */
3631
+ custom_metadata?: JsonObject;
3632
+ /** The secret version metadata that a user can customize. */
3633
+ version_custom_metadata?: JsonObject;
2897
3634
  /** The name of the certificate template. */
2898
3635
  certificate_template: string;
2899
3636
  /** The intermediate certificate authority that signed this certificate. */
@@ -2972,6 +3709,10 @@ declare namespace SecretsManagerV1 {
2972
3709
  creation_date?: string;
2973
3710
  /** The unique identifier for the entity that created the secret version. */
2974
3711
  created_by?: string;
3712
+ /** The number of locks that are associated with a secret version. */
3713
+ locks_total?: number;
3714
+ /** The secret version metadata that a user can customize. */
3715
+ version_custom_metadata?: JsonObject;
2975
3716
  validity?: CertificateValidity;
2976
3717
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2977
3718
  serial_number?: string;
@@ -3011,6 +3752,8 @@ declare namespace SecretsManagerV1 {
3011
3752
  * service API.
3012
3753
  */
3013
3754
  downloaded?: boolean;
3755
+ /** The secret version metadata that a user can customize. */
3756
+ version_custom_metadata?: JsonObject;
3014
3757
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
3015
3758
  serial_number?: string;
3016
3759
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -3045,6 +3788,10 @@ declare namespace SecretsManagerV1 {
3045
3788
  * service API.
3046
3789
  */
3047
3790
  downloaded?: boolean;
3791
+ /** The number of locks that are associated with a secret version. */
3792
+ locks_total?: number;
3793
+ /** The secret version metadata that a user can customize. */
3794
+ version_custom_metadata?: JsonObject;
3048
3795
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
3049
3796
  serial_number?: string;
3050
3797
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -3115,8 +3862,12 @@ declare namespace SecretsManagerV1 {
3115
3862
  created_by?: string;
3116
3863
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
3117
3864
  last_update_date?: string;
3118
- /** The number of versions the secret has. */
3865
+ /** The number of versions that are associated with a secret. */
3119
3866
  versions_total?: number;
3867
+ /** The number of locks that are associated with a secret. */
3868
+ locks_total?: number;
3869
+ /** The secret metadata that a user can customize. */
3870
+ custom_metadata?: JsonObject;
3120
3871
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3121
3872
  issuer?: string;
3122
3873
  /** Determines whether your issued certificate is bundled with intermediate certificates.
@@ -3197,6 +3948,12 @@ declare namespace SecretsManagerV1 {
3197
3948
  * see [Get secret version metadata](#get-secret-version-metadata).
3198
3949
  */
3199
3950
  versions?: JsonObject[];
3951
+ /** The number of locks that are associated with a secret. */
3952
+ locks_total?: number;
3953
+ /** The secret metadata that a user can customize. */
3954
+ custom_metadata?: JsonObject;
3955
+ /** The secret version metadata that a user can customize. */
3956
+ version_custom_metadata?: JsonObject;
3200
3957
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3201
3958
  issuer?: string;
3202
3959
  /** Determines whether your issued certificate is bundled with intermediate certificates.
@@ -3257,6 +4014,10 @@ declare namespace SecretsManagerV1 {
3257
4014
  interface RestoreIAMCredentialsSecretBody extends SecretAction {
3258
4015
  /** The ID of the target version or the alias `previous`. */
3259
4016
  version_id: string;
4017
+ /** The secret metadata that a user can customize. */
4018
+ custom_metadata?: JsonObject;
4019
+ /** The secret version metadata that a user can customize. */
4020
+ version_custom_metadata?: JsonObject;
3260
4021
  }
3261
4022
  /** A request to revoke the certificate of an internally signed intermediate certificate authority. */
3262
4023
  interface RevokeAction extends ConfigAction {
@@ -3332,7 +4093,8 @@ declare namespace SecretsManagerV1 {
3332
4093
  other_sans?: string[];
3333
4094
  /** The time-to-live (TTL) to assign to this CA certificate.
3334
4095
  *
3335
- * The value can be supplied as a string representation of a duration, such as `12h`. The value can't exceed the
4096
+ * The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
4097
+ * seconds (suffix `s`), minutes (suffix `m`), hours (suffix `h`) or days (suffix `d`). The value can't exceed the
3336
4098
  * `max_ttl` that is defined in the associated certificate template. In the API response, this value is returned in
3337
4099
  * seconds (integer).
3338
4100
  */
@@ -3394,6 +4156,10 @@ declare namespace SecretsManagerV1 {
3394
4156
  interface RotateArbitrarySecretBody extends SecretAction {
3395
4157
  /** The new secret data to assign to an `arbitrary` secret. */
3396
4158
  payload: string;
4159
+ /** The secret metadata that a user can customize. */
4160
+ custom_metadata?: JsonObject;
4161
+ /** The secret version metadata that a user can customize. */
4162
+ version_custom_metadata?: JsonObject;
3397
4163
  }
3398
4164
  /** The request body of a rotate certificate action. */
3399
4165
  interface RotateCertificateBody extends SecretAction {
@@ -3403,6 +4169,10 @@ declare namespace SecretsManagerV1 {
3403
4169
  private_key?: string;
3404
4170
  /** The new intermediate certificate to associate with the certificate. */
3405
4171
  intermediate?: string;
4172
+ /** The secret metadata that a user can customize. */
4173
+ custom_metadata?: JsonObject;
4174
+ /** The secret version metadata that a user can customize. */
4175
+ version_custom_metadata?: JsonObject;
3406
4176
  }
3407
4177
  /** Properties that are returned with a successful `rotate_crl` action. */
3408
4178
  interface RotateCrlActionResult extends ConfigElementActionResultConfig {
@@ -3411,16 +4181,40 @@ declare namespace SecretsManagerV1 {
3411
4181
  interface RotateKvSecretBody extends SecretAction {
3412
4182
  /** The new secret data to assign to a key-value secret. */
3413
4183
  payload: JsonObject;
4184
+ /** The secret metadata that a user can customize. */
4185
+ custom_metadata?: JsonObject;
4186
+ /** The secret version metadata that a user can customize. */
4187
+ version_custom_metadata?: JsonObject;
4188
+ }
4189
+ /** The request body of a rotate private certificate action. */
4190
+ interface RotatePrivateCertBody extends SecretAction {
4191
+ /** The secret metadata that a user can customize. */
4192
+ custom_metadata: JsonObject;
4193
+ /** The secret version metadata that a user can customize. */
4194
+ version_custom_metadata?: JsonObject;
4195
+ }
4196
+ /** The request body of a rotate private certificate action. */
4197
+ interface RotatePrivateCertBodyWithVersionCustomMetadata extends SecretAction {
4198
+ /** The secret version metadata that a user can customize. */
4199
+ version_custom_metadata: JsonObject;
3414
4200
  }
3415
4201
  /** The request body of a `rotate` action. */
3416
4202
  interface RotatePublicCertBody extends SecretAction {
3417
4203
  /** Determine whether keys must be rotated. */
3418
4204
  rotate_keys: boolean;
4205
+ /** The secret metadata that a user can customize. */
4206
+ custom_metadata?: JsonObject;
4207
+ /** The secret version metadata that a user can customize. */
4208
+ version_custom_metadata?: JsonObject;
3419
4209
  }
3420
4210
  /** The request body of a `rotate` action. */
3421
4211
  interface RotateUsernamePasswordSecretBody extends SecretAction {
3422
4212
  /** The new password to assign to a `username_password` secret. */
3423
4213
  password: string;
4214
+ /** The secret metadata that a user can customize. */
4215
+ custom_metadata?: JsonObject;
4216
+ /** The secret version metadata that a user can customize. */
4217
+ version_custom_metadata?: JsonObject;
3424
4218
  }
3425
4219
  /** The secret rotation time interval. */
3426
4220
  interface SecretPolicyRotationRotationPolicyRotation extends SecretPolicyRotationRotation {
@@ -3797,8 +4591,12 @@ declare namespace SecretsManagerV1 {
3797
4591
  created_by?: string;
3798
4592
  /** Updates when any part of the secret metadata is modified. The date format follows RFC 3339. */
3799
4593
  last_update_date?: string;
3800
- /** The number of versions the secret has. */
4594
+ /** The number of versions that are associated with a secret. */
3801
4595
  versions_total?: number;
4596
+ /** The number of locks that are associated with a secret. */
4597
+ locks_total?: number;
4598
+ /** The secret metadata that a user can customize. */
4599
+ custom_metadata?: JsonObject;
3802
4600
  /** The date the secret material expires. The date format follows RFC 3339.
3803
4601
  *
3804
4602
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -3860,6 +4658,12 @@ declare namespace SecretsManagerV1 {
3860
4658
  * see [Get secret version metadata](#get-secret-version-metadata).
3861
4659
  */
3862
4660
  versions?: JsonObject[];
4661
+ /** The number of locks that are associated with a secret. */
4662
+ locks_total?: number;
4663
+ /** The secret metadata that a user can customize. */
4664
+ custom_metadata?: JsonObject;
4665
+ /** The secret version metadata that a user can customize. */
4666
+ version_custom_metadata?: JsonObject;
3863
4667
  /** The username to assign to this secret. */
3864
4668
  username?: string;
3865
4669
  /** The password to assign to this secret. */
@@ -3897,6 +4701,10 @@ declare namespace SecretsManagerV1 {
3897
4701
  creation_date?: string;
3898
4702
  /** The unique identifier for the entity that created the secret version. */
3899
4703
  created_by?: string;
4704
+ /** The number of locks that are associated with a secret version. */
4705
+ locks_total?: number;
4706
+ /** The secret version metadata that a user can customize. */
4707
+ version_custom_metadata?: JsonObject;
3900
4708
  /** Indicates whether the version of the secret was created by automatic rotation. */
3901
4709
  auto_rotated?: boolean;
3902
4710
  /** The data that is associated with the secret version. The data object contains the following fields:
@@ -3920,6 +4728,8 @@ declare namespace SecretsManagerV1 {
3920
4728
  * service API.
3921
4729
  */
3922
4730
  downloaded?: boolean;
4731
+ /** The secret version metadata that a user can customize. */
4732
+ version_custom_metadata?: JsonObject;
3923
4733
  /** Indicates whether the version of the secret was created by automatic rotation. */
3924
4734
  auto_rotated?: boolean;
3925
4735
  }
@@ -3939,6 +4749,10 @@ declare namespace SecretsManagerV1 {
3939
4749
  * service API.
3940
4750
  */
3941
4751
  downloaded?: boolean;
4752
+ /** The number of locks that are associated with a secret version. */
4753
+ locks_total?: number;
4754
+ /** The secret version metadata that a user can customize. */
4755
+ version_custom_metadata?: JsonObject;
3942
4756
  /** Indicates whether the version of the secret was created by automatic rotation. */
3943
4757
  auto_rotated?: boolean;
3944
4758
  }