@ibm-cloud/secrets-manager 1.0.35 → 1.0.37
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +4 -4
- package/secrets-manager/v1.d.ts +270 -62
- package/secrets-manager/v1.js +102 -30
- package/secrets-manager/v1.js.map +1 -1
package/secrets-manager/v1.d.ts
CHANGED
|
@@ -114,9 +114,9 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
114
114
|
* @param {Object} params - The parameters to send to the service.
|
|
115
115
|
* @param {string} params.id - The v4 UUID that uniquely identifies the secret group.
|
|
116
116
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
117
|
-
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
117
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
|
|
118
118
|
*/
|
|
119
|
-
deleteSecretGroup(params: SecretsManagerV1.DeleteSecretGroupParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
119
|
+
deleteSecretGroup(params: SecretsManagerV1.DeleteSecretGroupParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
|
|
120
120
|
/*************************
|
|
121
121
|
* secrets
|
|
122
122
|
************************/
|
|
@@ -225,6 +225,8 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
225
225
|
* - `restore`: Restore a previous version of an `iam_credentials` secret.
|
|
226
226
|
* - `revoke`: Revoke a private certificate.
|
|
227
227
|
* - `delete_credentials`: Delete the API key that is associated with an `iam_credentials` secret.
|
|
228
|
+
* - `validate_dns_challenge`: Validate challenges for a public certificate that is ordered with a manual DNS
|
|
229
|
+
* provider.
|
|
228
230
|
*
|
|
229
231
|
* @param {Object} params - The parameters to send to the service.
|
|
230
232
|
* @param {string} params.secretType - The secret type.
|
|
@@ -244,9 +246,9 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
244
246
|
* @param {string} params.secretType - The secret type.
|
|
245
247
|
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
246
248
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
247
|
-
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
249
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
|
|
248
250
|
*/
|
|
249
|
-
deleteSecret(params: SecretsManagerV1.DeleteSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
251
|
+
deleteSecret(params: SecretsManagerV1.DeleteSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
|
|
250
252
|
/**
|
|
251
253
|
* List versions of a secret.
|
|
252
254
|
*
|
|
@@ -302,7 +304,7 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
302
304
|
*/
|
|
303
305
|
updateSecretVersion(params: SecretsManagerV1.UpdateSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecret>>;
|
|
304
306
|
/**
|
|
305
|
-
* Get secret version
|
|
307
|
+
* Get the metadata of a secret version.
|
|
306
308
|
*
|
|
307
309
|
* Get the metadata of a secret version by specifying the ID of the version or the alias `previous`.
|
|
308
310
|
*
|
|
@@ -321,7 +323,26 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
321
323
|
*/
|
|
322
324
|
getSecretVersionMetadata(params: SecretsManagerV1.GetSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
|
|
323
325
|
/**
|
|
324
|
-
*
|
|
326
|
+
* Update the metadata of a secret version.
|
|
327
|
+
*
|
|
328
|
+
* Update the metadata of a secret version, such as `version_custom_metadata`.
|
|
329
|
+
*
|
|
330
|
+
* @param {Object} params - The parameters to send to the service.
|
|
331
|
+
* @param {string} params.secretType - The secret type.
|
|
332
|
+
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
333
|
+
* @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
|
|
334
|
+
* `previous` to retrieve the previous version.
|
|
335
|
+
*
|
|
336
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
337
|
+
* the response details.
|
|
338
|
+
* @param {CollectionMetadata} params.metadata - The metadata that describes the resource array.
|
|
339
|
+
* @param {UpdateSecretVersionMetadata[]} params.resources - A collection of resources.
|
|
340
|
+
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
341
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>}
|
|
342
|
+
*/
|
|
343
|
+
updateSecretVersionMetadata(params: SecretsManagerV1.UpdateSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
|
|
344
|
+
/**
|
|
345
|
+
* Get the metadata of a secret.
|
|
325
346
|
*
|
|
326
347
|
* Get the details of a secret by specifying its ID.
|
|
327
348
|
*
|
|
@@ -363,16 +384,15 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
363
384
|
* @param {Object} params - The parameters to send to the service.
|
|
364
385
|
* @param {string} params.secretType - The secret type.
|
|
365
386
|
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
366
|
-
* @param {number} [params.limit] - The number of
|
|
367
|
-
*
|
|
368
|
-
* resources.
|
|
387
|
+
* @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
|
|
388
|
+
* items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
369
389
|
*
|
|
370
|
-
* **Usage:** If you have 20
|
|
390
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
|
|
371
391
|
* `..?limit=5`.
|
|
372
|
-
* @param {number} [params.offset] - The number of
|
|
392
|
+
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
373
393
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
374
394
|
*
|
|
375
|
-
* **Usage:** If you have 100
|
|
395
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
376
396
|
* `..?offset=25&limit=25`.
|
|
377
397
|
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
378
398
|
*
|
|
@@ -404,7 +424,8 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
404
424
|
* @param {string} params.id - The v4 UUID that uniquely identifies the secret.
|
|
405
425
|
* @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
|
|
406
426
|
* @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
|
|
407
|
-
* clear any matching locks on a secret version.
|
|
427
|
+
* clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
|
|
428
|
+
* is ignored.
|
|
408
429
|
*
|
|
409
430
|
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
410
431
|
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
@@ -447,16 +468,15 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
447
468
|
*
|
|
448
469
|
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
|
|
449
470
|
* the response details.
|
|
450
|
-
* @param {number} [params.limit] - The number of
|
|
451
|
-
*
|
|
452
|
-
* resources.
|
|
471
|
+
* @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
|
|
472
|
+
* items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
453
473
|
*
|
|
454
|
-
* **Usage:** If you have 20
|
|
474
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
|
|
455
475
|
* `..?limit=5`.
|
|
456
|
-
* @param {number} [params.offset] - The number of
|
|
476
|
+
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
457
477
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
458
478
|
*
|
|
459
|
-
* **Usage:** If you have 100
|
|
479
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
460
480
|
* `..?offset=25&limit=25`.
|
|
461
481
|
* @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
|
|
462
482
|
*
|
|
@@ -493,7 +513,8 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
493
513
|
* the response details.
|
|
494
514
|
* @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
|
|
495
515
|
* @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
|
|
496
|
-
* clear any matching locks on a secret version.
|
|
516
|
+
* clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
|
|
517
|
+
* is ignored.
|
|
497
518
|
*
|
|
498
519
|
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
|
|
499
520
|
* - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
|
|
@@ -534,11 +555,11 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
534
555
|
* List the lock details that are associated with all secrets in your Secrets Manager instance.
|
|
535
556
|
*
|
|
536
557
|
* @param {Object} [params] - The parameters to send to the service.
|
|
537
|
-
* @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list
|
|
538
|
-
* the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page
|
|
539
|
-
* resources.
|
|
558
|
+
* @param {number} [params.limit] - The number of secrets with associated locks to retrieve. By default, list
|
|
559
|
+
* operations return the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page
|
|
560
|
+
* through your available resources.
|
|
540
561
|
*
|
|
541
|
-
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5
|
|
562
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
|
|
542
563
|
* `..?limit=5`.
|
|
543
564
|
* @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
|
|
544
565
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
@@ -568,7 +589,7 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
568
589
|
*
|
|
569
590
|
* Create or update one or more policies, such as an [automatic rotation
|
|
570
591
|
* policy](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-automatic-rotation), for the specified
|
|
571
|
-
* secret.
|
|
592
|
+
* secret. To remove a policy, keep the resources block empty.
|
|
572
593
|
*
|
|
573
594
|
* @param {Object} params - The parameters to send to the service.
|
|
574
595
|
* @param {string} params.secretType - The secret type.
|
|
@@ -609,9 +630,9 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
609
630
|
* @param {string} params.secretType - The secret type.
|
|
610
631
|
* @param {EngineConfig} params.engineConfig - Properties to update for a secrets engine.
|
|
611
632
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
612
|
-
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
633
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
|
|
613
634
|
*/
|
|
614
|
-
putConfig(params: SecretsManagerV1.PutConfigParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
635
|
+
putConfig(params: SecretsManagerV1.PutConfigParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
|
|
615
636
|
/**
|
|
616
637
|
* Get the configuration of a secret type.
|
|
617
638
|
*
|
|
@@ -722,9 +743,9 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
722
743
|
* @param {string} params.configElement - The configuration element to define or manage.
|
|
723
744
|
* @param {string} params.configName - The name of your configuration.
|
|
724
745
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
725
|
-
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
746
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
|
|
726
747
|
*/
|
|
727
|
-
deleteConfigElement(params: SecretsManagerV1.DeleteConfigElementParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
748
|
+
deleteConfigElement(params: SecretsManagerV1.DeleteConfigElementParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
|
|
728
749
|
/*************************
|
|
729
750
|
* notifications
|
|
730
751
|
************************/
|
|
@@ -768,9 +789,9 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
768
789
|
*
|
|
769
790
|
* @param {Object} [params] - The parameters to send to the service.
|
|
770
791
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
771
|
-
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
792
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
|
|
772
793
|
*/
|
|
773
|
-
deleteNotificationsRegistration(params?: SecretsManagerV1.DeleteNotificationsRegistrationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
794
|
+
deleteNotificationsRegistration(params?: SecretsManagerV1.DeleteNotificationsRegistrationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
|
|
774
795
|
/**
|
|
775
796
|
* Send a test event.
|
|
776
797
|
*
|
|
@@ -783,9 +804,9 @@ declare class SecretsManagerV1 extends BaseService {
|
|
|
783
804
|
*
|
|
784
805
|
* @param {Object} [params] - The parameters to send to the service.
|
|
785
806
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
786
|
-
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
807
|
+
* @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
|
|
787
808
|
*/
|
|
788
|
-
sendTestNotification(params?: SecretsManagerV1.SendTestNotificationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.
|
|
809
|
+
sendTestNotification(params?: SecretsManagerV1.SendTestNotificationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
|
|
789
810
|
}
|
|
790
811
|
/*************************
|
|
791
812
|
* interfaces
|
|
@@ -801,7 +822,7 @@ declare namespace SecretsManagerV1 {
|
|
|
801
822
|
/** The callback for a service request. */
|
|
802
823
|
type Callback<T> = (error: any, response?: Response<T>) => void;
|
|
803
824
|
/** The body of a service request that returns no response data. */
|
|
804
|
-
interface
|
|
825
|
+
interface EmptyObject {
|
|
805
826
|
}
|
|
806
827
|
/** A standard JS object, defined to avoid the limitations of `Object` and `object` */
|
|
807
828
|
interface JsonObject {
|
|
@@ -1001,7 +1022,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1001
1022
|
ROTATE = "rotate",
|
|
1002
1023
|
RESTORE = "restore",
|
|
1003
1024
|
REVOKE = "revoke",
|
|
1004
|
-
DELETE_CREDENTIALS = "delete_credentials"
|
|
1025
|
+
DELETE_CREDENTIALS = "delete_credentials",
|
|
1026
|
+
VALIDATE_DNS_CHALLENGE = "validate_dns_challenge"
|
|
1005
1027
|
}
|
|
1006
1028
|
}
|
|
1007
1029
|
/** Parameters for the `deleteSecret` operation. */
|
|
@@ -1130,6 +1152,38 @@ declare namespace SecretsManagerV1 {
|
|
|
1130
1152
|
KV = "kv"
|
|
1131
1153
|
}
|
|
1132
1154
|
}
|
|
1155
|
+
/** Parameters for the `updateSecretVersionMetadata` operation. */
|
|
1156
|
+
interface UpdateSecretVersionMetadataParams {
|
|
1157
|
+
/** The secret type. */
|
|
1158
|
+
secretType: UpdateSecretVersionMetadataConstants.SecretType | string;
|
|
1159
|
+
/** The v4 UUID that uniquely identifies the secret. */
|
|
1160
|
+
id: string;
|
|
1161
|
+
/** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
|
|
1162
|
+
* previous version.
|
|
1163
|
+
*
|
|
1164
|
+
* **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
|
|
1165
|
+
* check the response details.
|
|
1166
|
+
*/
|
|
1167
|
+
versionId: string;
|
|
1168
|
+
/** The metadata that describes the resource array. */
|
|
1169
|
+
metadata: CollectionMetadata;
|
|
1170
|
+
/** A collection of resources. */
|
|
1171
|
+
resources: UpdateSecretVersionMetadata[];
|
|
1172
|
+
headers?: OutgoingHttpHeaders;
|
|
1173
|
+
}
|
|
1174
|
+
/** Constants for the `updateSecretVersionMetadata` operation. */
|
|
1175
|
+
namespace UpdateSecretVersionMetadataConstants {
|
|
1176
|
+
/** The secret type. */
|
|
1177
|
+
enum SecretType {
|
|
1178
|
+
ARBITRARY = "arbitrary",
|
|
1179
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1180
|
+
IMPORTED_CERT = "imported_cert",
|
|
1181
|
+
PUBLIC_CERT = "public_cert",
|
|
1182
|
+
PRIVATE_CERT = "private_cert",
|
|
1183
|
+
USERNAME_PASSWORD = "username_password",
|
|
1184
|
+
KV = "kv"
|
|
1185
|
+
}
|
|
1186
|
+
}
|
|
1133
1187
|
/** Parameters for the `getSecretMetadata` operation. */
|
|
1134
1188
|
interface GetSecretMetadataParams {
|
|
1135
1189
|
/** The secret type. */
|
|
@@ -1182,17 +1236,18 @@ declare namespace SecretsManagerV1 {
|
|
|
1182
1236
|
secretType: GetLocksConstants.SecretType | string;
|
|
1183
1237
|
/** The v4 UUID that uniquely identifies the secret. */
|
|
1184
1238
|
id: string;
|
|
1185
|
-
/** The number of
|
|
1186
|
-
*
|
|
1239
|
+
/** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
|
|
1240
|
+
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
1187
1241
|
*
|
|
1188
|
-
* **Usage:** If you have 20
|
|
1242
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
|
|
1243
|
+
* use
|
|
1189
1244
|
* `..?limit=5`.
|
|
1190
1245
|
*/
|
|
1191
1246
|
limit?: number;
|
|
1192
|
-
/** The number of
|
|
1247
|
+
/** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1193
1248
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1194
1249
|
*
|
|
1195
|
-
* **Usage:** If you have 100
|
|
1250
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
1196
1251
|
* `..?offset=25&limit=25`.
|
|
1197
1252
|
*/
|
|
1198
1253
|
offset?: number;
|
|
@@ -1226,7 +1281,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1226
1281
|
/** The lock data to be attached to a secret version. */
|
|
1227
1282
|
locks?: LockSecretBodyLocksItem[];
|
|
1228
1283
|
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
|
|
1229
|
-
* on a secret version.
|
|
1284
|
+
* on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
|
|
1230
1285
|
*
|
|
1231
1286
|
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
|
|
1232
1287
|
* secret.
|
|
@@ -1248,7 +1303,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1248
1303
|
USERNAME_PASSWORD = "username_password",
|
|
1249
1304
|
KV = "kv"
|
|
1250
1305
|
}
|
|
1251
|
-
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1306
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1252
1307
|
enum Mode {
|
|
1253
1308
|
EXCLUSIVE = "exclusive",
|
|
1254
1309
|
EXCLUSIVE_DELETE = "exclusive_delete"
|
|
@@ -1290,17 +1345,18 @@ declare namespace SecretsManagerV1 {
|
|
|
1290
1345
|
* check the response details.
|
|
1291
1346
|
*/
|
|
1292
1347
|
versionId: string;
|
|
1293
|
-
/** The number of
|
|
1294
|
-
*
|
|
1348
|
+
/** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
|
|
1349
|
+
* different set of items, use `limit` with `offset` to page through your available resources.
|
|
1295
1350
|
*
|
|
1296
|
-
* **Usage:** If you have 20
|
|
1351
|
+
* **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
|
|
1352
|
+
* use
|
|
1297
1353
|
* `..?limit=5`.
|
|
1298
1354
|
*/
|
|
1299
1355
|
limit?: number;
|
|
1300
|
-
/** The number of
|
|
1356
|
+
/** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1301
1357
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
1302
1358
|
*
|
|
1303
|
-
* **Usage:** If you have 100
|
|
1359
|
+
* **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
|
|
1304
1360
|
* `..?offset=25&limit=25`.
|
|
1305
1361
|
*/
|
|
1306
1362
|
offset?: number;
|
|
@@ -1341,7 +1397,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1341
1397
|
/** The lock data to be attached to a secret version. */
|
|
1342
1398
|
locks?: LockSecretBodyLocksItem[];
|
|
1343
1399
|
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
|
|
1344
|
-
* on a secret version.
|
|
1400
|
+
* on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
|
|
1345
1401
|
*
|
|
1346
1402
|
* - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
|
|
1347
1403
|
* secret.
|
|
@@ -1363,7 +1419,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1363
1419
|
USERNAME_PASSWORD = "username_password",
|
|
1364
1420
|
KV = "kv"
|
|
1365
1421
|
}
|
|
1366
|
-
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1422
|
+
/** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
|
|
1367
1423
|
enum Mode {
|
|
1368
1424
|
EXCLUSIVE = "exclusive",
|
|
1369
1425
|
EXCLUSIVE_DELETE = "exclusive_delete"
|
|
@@ -1401,10 +1457,10 @@ declare namespace SecretsManagerV1 {
|
|
|
1401
1457
|
}
|
|
1402
1458
|
/** Parameters for the `listInstanceSecretsLocks` operation. */
|
|
1403
1459
|
interface ListInstanceSecretsLocksParams {
|
|
1404
|
-
/** The number of secrets with locks to retrieve. By default, list operations return the first 25
|
|
1405
|
-
* retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
1460
|
+
/** The number of secrets with associated locks to retrieve. By default, list operations return the first 25
|
|
1461
|
+
* items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
|
|
1406
1462
|
*
|
|
1407
|
-
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5
|
|
1463
|
+
* **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
|
|
1408
1464
|
* `..?limit=5`.
|
|
1409
1465
|
*/
|
|
1410
1466
|
limit?: number;
|
|
@@ -1451,6 +1507,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1451
1507
|
/** The secret type. */
|
|
1452
1508
|
enum SecretType {
|
|
1453
1509
|
USERNAME_PASSWORD = "username_password",
|
|
1510
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1454
1511
|
PUBLIC_CERT = "public_cert",
|
|
1455
1512
|
PRIVATE_CERT = "private_cert"
|
|
1456
1513
|
}
|
|
@@ -1474,6 +1531,7 @@ declare namespace SecretsManagerV1 {
|
|
|
1474
1531
|
/** The secret type. */
|
|
1475
1532
|
enum SecretType {
|
|
1476
1533
|
USERNAME_PASSWORD = "username_password",
|
|
1534
|
+
IAM_CREDENTIALS = "iam_credentials",
|
|
1477
1535
|
PUBLIC_CERT = "public_cert",
|
|
1478
1536
|
PRIVATE_CERT = "private_cert"
|
|
1479
1537
|
}
|
|
@@ -1733,6 +1791,8 @@ declare namespace SecretsManagerV1 {
|
|
|
1733
1791
|
************************/
|
|
1734
1792
|
/** The data that is associated with the secret version. The data object contains the following fields: - `certificate`: The contents of the certificate. - `private_key`: The private key that is associated with the certificate. - `intermediate`: The intermediate certificate that is associated with the certificate. */
|
|
1735
1793
|
interface CertificateSecretData {
|
|
1794
|
+
/** CertificateSecretData accepts additional properties. */
|
|
1795
|
+
[propName: string]: any;
|
|
1736
1796
|
}
|
|
1737
1797
|
/** Certificate templates configuration. */
|
|
1738
1798
|
interface CertificateTemplatesConfigItem {
|
|
@@ -1749,6 +1809,19 @@ declare namespace SecretsManagerV1 {
|
|
|
1749
1809
|
*/
|
|
1750
1810
|
config?: CertificateTemplateConfig;
|
|
1751
1811
|
}
|
|
1812
|
+
/** Properties that describe a challenge. */
|
|
1813
|
+
interface ChallengeResource {
|
|
1814
|
+
/** The challenge domain. */
|
|
1815
|
+
domain?: string;
|
|
1816
|
+
/** The challenge expiration date. The date format follows RFC 3339. */
|
|
1817
|
+
expiration?: string;
|
|
1818
|
+
/** The challenge status. */
|
|
1819
|
+
status?: string;
|
|
1820
|
+
/** The txt_record_name. */
|
|
1821
|
+
txt_record_name?: string;
|
|
1822
|
+
/** The txt_record_value. */
|
|
1823
|
+
txt_record_value?: string;
|
|
1824
|
+
}
|
|
1752
1825
|
/** The metadata that describes the resource array. */
|
|
1753
1826
|
interface CollectionMetadata {
|
|
1754
1827
|
/** The type of resources in the resource array. */
|
|
@@ -1937,6 +2010,14 @@ declare namespace SecretsManagerV1 {
|
|
|
1937
2010
|
ca?: string;
|
|
1938
2011
|
/** The name that was assigned to the DNS provider configuration. */
|
|
1939
2012
|
dns?: string;
|
|
2013
|
+
/** The set of challenges, will be returned only when ordering public certificate using manual DNS
|
|
2014
|
+
* configuration.
|
|
2015
|
+
*/
|
|
2016
|
+
challenges?: ChallengeResource[];
|
|
2017
|
+
/** The date a user called "validate dns challenges" for "manual" DNS provider. The date format follows RFC
|
|
2018
|
+
* 3339.
|
|
2019
|
+
*/
|
|
2020
|
+
dns_challenge_validation_time?: string;
|
|
1940
2021
|
}
|
|
1941
2022
|
/** Properties that describe the locks of a secret or a secret version. */
|
|
1942
2023
|
interface ListSecretLocks {
|
|
@@ -1972,9 +2053,9 @@ declare namespace SecretsManagerV1 {
|
|
|
1972
2053
|
* To protect your privacy, do not use personal data, such as your name or location, as a description for your
|
|
1973
2054
|
* secret lock.
|
|
1974
2055
|
*/
|
|
1975
|
-
description
|
|
2056
|
+
description?: string;
|
|
1976
2057
|
/** Optional information to associate with a lock, such as resources CRNs to be used by automation. */
|
|
1977
|
-
attributes
|
|
2058
|
+
attributes?: JsonObject;
|
|
1978
2059
|
}
|
|
1979
2060
|
/** The Event Notifications details. */
|
|
1980
2061
|
interface NotificationsSettings {
|
|
@@ -2194,6 +2275,11 @@ declare namespace SecretsManagerV1 {
|
|
|
2194
2275
|
/** The time until the certificate expires. */
|
|
2195
2276
|
expiration?: number;
|
|
2196
2277
|
}
|
|
2278
|
+
/** Properties that update the metadata of a secret version. */
|
|
2279
|
+
interface UpdateSecretVersionMetadata {
|
|
2280
|
+
/** The secret version metadata that a user can customize. */
|
|
2281
|
+
version_custom_metadata?: JsonObject;
|
|
2282
|
+
}
|
|
2197
2283
|
/** CertificateValidity. */
|
|
2198
2284
|
interface CertificateValidity {
|
|
2199
2285
|
/** The date and time that the certificate validity period begins. */
|
|
@@ -2250,6 +2336,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2250
2336
|
versions_total?: number;
|
|
2251
2337
|
/** The number of locks that are associated with a secret. */
|
|
2252
2338
|
locks_total?: number;
|
|
2339
|
+
/** The secret metadata that a user can customize. */
|
|
2340
|
+
custom_metadata?: JsonObject;
|
|
2253
2341
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
2254
2342
|
*
|
|
2255
2343
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -2313,6 +2401,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2313
2401
|
versions?: JsonObject[];
|
|
2314
2402
|
/** The number of locks that are associated with a secret. */
|
|
2315
2403
|
locks_total?: number;
|
|
2404
|
+
/** The secret metadata that a user can customize. */
|
|
2405
|
+
custom_metadata?: JsonObject;
|
|
2406
|
+
/** The secret version metadata that a user can customize. */
|
|
2407
|
+
version_custom_metadata?: JsonObject;
|
|
2316
2408
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
2317
2409
|
*
|
|
2318
2410
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -2343,6 +2435,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2343
2435
|
created_by?: string;
|
|
2344
2436
|
/** The number of locks that are associated with a secret version. */
|
|
2345
2437
|
locks_total?: number;
|
|
2438
|
+
/** The secret version metadata that a user can customize. */
|
|
2439
|
+
version_custom_metadata?: JsonObject;
|
|
2346
2440
|
/** The data that is associated with the secret version.
|
|
2347
2441
|
*
|
|
2348
2442
|
* The data object contains the field `payload`.
|
|
@@ -2363,6 +2457,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2363
2457
|
* service API.
|
|
2364
2458
|
*/
|
|
2365
2459
|
downloaded?: boolean;
|
|
2460
|
+
/** The secret version metadata that a user can customize. */
|
|
2461
|
+
version_custom_metadata?: JsonObject;
|
|
2366
2462
|
}
|
|
2367
2463
|
/** Properties that describe a secret version. */
|
|
2368
2464
|
interface ArbitrarySecretVersionMetadata extends SecretVersionMetadata {
|
|
@@ -2382,6 +2478,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2382
2478
|
downloaded?: boolean;
|
|
2383
2479
|
/** The number of locks that are associated with a secret version. */
|
|
2384
2480
|
locks_total?: number;
|
|
2481
|
+
/** The secret version metadata that a user can customize. */
|
|
2482
|
+
version_custom_metadata?: JsonObject;
|
|
2385
2483
|
}
|
|
2386
2484
|
/** Metadata properties that describe a certificate secret. */
|
|
2387
2485
|
interface CertificateSecretMetadata extends SecretMetadata {
|
|
@@ -2432,6 +2530,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2432
2530
|
versions_total?: number;
|
|
2433
2531
|
/** The number of locks that are associated with a secret. */
|
|
2434
2532
|
locks_total?: number;
|
|
2533
|
+
/** The secret metadata that a user can customize. */
|
|
2534
|
+
custom_metadata?: JsonObject;
|
|
2435
2535
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2436
2536
|
serial_number?: string;
|
|
2437
2537
|
/** The identifier for the cryptographic algorithm that was used by the issuing certificate authority to sign
|
|
@@ -2508,6 +2608,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2508
2608
|
versions?: JsonObject[];
|
|
2509
2609
|
/** The number of locks that are associated with a secret. */
|
|
2510
2610
|
locks_total?: number;
|
|
2611
|
+
/** The secret metadata that a user can customize. */
|
|
2612
|
+
custom_metadata?: JsonObject;
|
|
2613
|
+
/** The secret version metadata that a user can customize. */
|
|
2614
|
+
version_custom_metadata?: JsonObject;
|
|
2511
2615
|
/** The contents of your certificate. The data must be formatted on a single line with embedded newline
|
|
2512
2616
|
* characters.
|
|
2513
2617
|
*/
|
|
@@ -2568,6 +2672,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2568
2672
|
created_by?: string;
|
|
2569
2673
|
/** The number of locks that are associated with a secret version. */
|
|
2570
2674
|
locks_total?: number;
|
|
2675
|
+
/** The secret version metadata that a user can customize. */
|
|
2676
|
+
version_custom_metadata?: JsonObject;
|
|
2571
2677
|
validity?: CertificateValidity;
|
|
2572
2678
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2573
2679
|
serial_number?: string;
|
|
@@ -2595,6 +2701,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2595
2701
|
* service API.
|
|
2596
2702
|
*/
|
|
2597
2703
|
downloaded?: boolean;
|
|
2704
|
+
/** The secret version metadata that a user can customize. */
|
|
2705
|
+
version_custom_metadata?: JsonObject;
|
|
2598
2706
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2599
2707
|
serial_number?: string;
|
|
2600
2708
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -2619,6 +2727,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2619
2727
|
downloaded?: boolean;
|
|
2620
2728
|
/** The number of locks that are associated with a secret version. */
|
|
2621
2729
|
locks_total?: number;
|
|
2730
|
+
/** The secret version metadata that a user can customize. */
|
|
2731
|
+
version_custom_metadata?: JsonObject;
|
|
2622
2732
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
2623
2733
|
serial_number?: string;
|
|
2624
2734
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -2644,9 +2754,10 @@ declare namespace SecretsManagerV1 {
|
|
|
2644
2754
|
max_ttl?: any;
|
|
2645
2755
|
/** The time-to-live (TTL) to assign to a private certificate.
|
|
2646
2756
|
*
|
|
2647
|
-
* The value can be supplied as a string representation of a duration, such as `12h`.
|
|
2648
|
-
*
|
|
2649
|
-
* API response, this value is returned in seconds
|
|
2757
|
+
* The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
|
|
2758
|
+
* seconds (suffix `s`), minutes (suffix `m`) or hours (suffix `h`). The value can't exceed the `max_ttl` that is
|
|
2759
|
+
* defined in the associated certificate template. In the API response, this value is returned in seconds
|
|
2760
|
+
* (integer).
|
|
2650
2761
|
*/
|
|
2651
2762
|
ttl?: any;
|
|
2652
2763
|
/** Determines whether to allow `localhost` to be included as one of the requested common names. */
|
|
@@ -2857,8 +2968,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2857
2968
|
* API key is deleted. Otherwise, the service ID is deleted together with its API key.
|
|
2858
2969
|
*/
|
|
2859
2970
|
api_key_id?: string;
|
|
2860
|
-
/** The service ID that you want to delete. This property can be used instead of the `api_key_id`
|
|
2861
|
-
* only for secrets that were created with a service ID that was generated by Secrets Manager.
|
|
2971
|
+
/** Deprecated: The service ID that you want to delete. This property can be used instead of the `api_key_id`
|
|
2972
|
+
* field, but only for secrets that were created with a service ID that was generated by Secrets Manager.
|
|
2862
2973
|
*
|
|
2863
2974
|
* **Deprecated.** Use the `api_key_id` field instead.
|
|
2864
2975
|
*/
|
|
@@ -2940,6 +3051,8 @@ declare namespace SecretsManagerV1 {
|
|
|
2940
3051
|
versions_total?: number;
|
|
2941
3052
|
/** The number of locks that are associated with a secret. */
|
|
2942
3053
|
locks_total?: number;
|
|
3054
|
+
/** The secret metadata that a user can customize. */
|
|
3055
|
+
custom_metadata?: JsonObject;
|
|
2943
3056
|
/** The time-to-live (TTL) or lease duration that is assigned to the secret. For `iam_credentials` secrets, the
|
|
2944
3057
|
* TTL defines for how long each generated API key remains valid.
|
|
2945
3058
|
*/
|
|
@@ -3019,6 +3132,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3019
3132
|
versions?: JsonObject[];
|
|
3020
3133
|
/** The number of locks that are associated with a secret. */
|
|
3021
3134
|
locks_total?: number;
|
|
3135
|
+
/** The secret metadata that a user can customize. */
|
|
3136
|
+
custom_metadata?: JsonObject;
|
|
3137
|
+
/** The secret version metadata that a user can customize. */
|
|
3138
|
+
version_custom_metadata?: JsonObject;
|
|
3022
3139
|
/** The time-to-live (TTL) or lease duration to assign to generated credentials.
|
|
3023
3140
|
*
|
|
3024
3141
|
* For `iam_credentials` secrets, the TTL defines for how long each generated API key remains valid. The value can
|
|
@@ -3069,6 +3186,12 @@ declare namespace SecretsManagerV1 {
|
|
|
3069
3186
|
* are generated each time that the secret is read or accessed.
|
|
3070
3187
|
*/
|
|
3071
3188
|
reuse_api_key?: boolean;
|
|
3189
|
+
/** The date that the secret is scheduled for automatic rotation.
|
|
3190
|
+
*
|
|
3191
|
+
* The service automatically creates a new version of the secret on its next rotation date. This field exists only
|
|
3192
|
+
* for secrets that have an existing rotation policy.
|
|
3193
|
+
*/
|
|
3194
|
+
next_rotation_date?: string;
|
|
3072
3195
|
}
|
|
3073
3196
|
/** IAMCredentialsSecretVersion. */
|
|
3074
3197
|
interface IAMCredentialsSecretVersion extends SecretVersion {
|
|
@@ -3082,6 +3205,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3082
3205
|
created_by?: string;
|
|
3083
3206
|
/** The number of locks that are associated with a secret version. */
|
|
3084
3207
|
locks_total?: number;
|
|
3208
|
+
/** The secret version metadata that a user can customize. */
|
|
3209
|
+
version_custom_metadata?: JsonObject;
|
|
3210
|
+
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3211
|
+
auto_rotated?: boolean;
|
|
3085
3212
|
/** The data that is associated with the secret version. The data object contains the following fields:
|
|
3086
3213
|
*
|
|
3087
3214
|
* - `api_key`: The API key that is generated for this secret.
|
|
@@ -3104,6 +3231,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3104
3231
|
* service API.
|
|
3105
3232
|
*/
|
|
3106
3233
|
downloaded?: boolean;
|
|
3234
|
+
/** The secret version metadata that a user can customize. */
|
|
3235
|
+
version_custom_metadata?: JsonObject;
|
|
3236
|
+
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3237
|
+
auto_rotated?: boolean;
|
|
3107
3238
|
}
|
|
3108
3239
|
/** Properties that describe a secret version. */
|
|
3109
3240
|
interface IAMCredentialsSecretVersionMetadata extends SecretVersionMetadata {
|
|
@@ -3123,6 +3254,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3123
3254
|
downloaded?: boolean;
|
|
3124
3255
|
/** The number of locks that are associated with a secret version. */
|
|
3125
3256
|
locks_total?: number;
|
|
3257
|
+
/** The secret version metadata that a user can customize. */
|
|
3258
|
+
version_custom_metadata?: JsonObject;
|
|
3259
|
+
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
3260
|
+
auto_rotated?: boolean;
|
|
3126
3261
|
}
|
|
3127
3262
|
/** Intermediate certificate authorities configuration. */
|
|
3128
3263
|
interface IntermediateCertificateAuthoritiesConfig extends GetConfigElementsResourcesItem {
|
|
@@ -3292,6 +3427,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3292
3427
|
versions_total?: number;
|
|
3293
3428
|
/** The number of locks that are associated with a secret. */
|
|
3294
3429
|
locks_total?: number;
|
|
3430
|
+
/** The secret metadata that a user can customize. */
|
|
3431
|
+
custom_metadata?: JsonObject;
|
|
3295
3432
|
}
|
|
3296
3433
|
/** Properties that describe a secret. */
|
|
3297
3434
|
interface KvSecretResource extends SecretResource {
|
|
@@ -3345,6 +3482,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3345
3482
|
versions?: JsonObject[];
|
|
3346
3483
|
/** The number of locks that are associated with a secret. */
|
|
3347
3484
|
locks_total?: number;
|
|
3485
|
+
/** The secret metadata that a user can customize. */
|
|
3486
|
+
custom_metadata?: JsonObject;
|
|
3487
|
+
/** The secret version metadata that a user can customize. */
|
|
3488
|
+
version_custom_metadata?: JsonObject;
|
|
3348
3489
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
3349
3490
|
*
|
|
3350
3491
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -3429,6 +3570,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3429
3570
|
versions_total?: number;
|
|
3430
3571
|
/** The number of locks that are associated with a secret. */
|
|
3431
3572
|
locks_total?: number;
|
|
3573
|
+
/** The secret metadata that a user can customize. */
|
|
3574
|
+
custom_metadata?: JsonObject;
|
|
3432
3575
|
/** The name of the certificate template. */
|
|
3433
3576
|
certificate_template?: string;
|
|
3434
3577
|
/** The intermediate certificate authority that signed this certificate. */
|
|
@@ -3508,6 +3651,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3508
3651
|
versions?: JsonObject[];
|
|
3509
3652
|
/** The number of locks that are associated with a secret. */
|
|
3510
3653
|
locks_total?: number;
|
|
3654
|
+
/** The secret metadata that a user can customize. */
|
|
3655
|
+
custom_metadata?: JsonObject;
|
|
3656
|
+
/** The secret version metadata that a user can customize. */
|
|
3657
|
+
version_custom_metadata?: JsonObject;
|
|
3511
3658
|
/** The name of the certificate template. */
|
|
3512
3659
|
certificate_template: string;
|
|
3513
3660
|
/** The intermediate certificate authority that signed this certificate. */
|
|
@@ -3588,6 +3735,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3588
3735
|
created_by?: string;
|
|
3589
3736
|
/** The number of locks that are associated with a secret version. */
|
|
3590
3737
|
locks_total?: number;
|
|
3738
|
+
/** The secret version metadata that a user can customize. */
|
|
3739
|
+
version_custom_metadata?: JsonObject;
|
|
3591
3740
|
validity?: CertificateValidity;
|
|
3592
3741
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
3593
3742
|
serial_number?: string;
|
|
@@ -3627,6 +3776,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3627
3776
|
* service API.
|
|
3628
3777
|
*/
|
|
3629
3778
|
downloaded?: boolean;
|
|
3779
|
+
/** The secret version metadata that a user can customize. */
|
|
3780
|
+
version_custom_metadata?: JsonObject;
|
|
3630
3781
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
3631
3782
|
serial_number?: string;
|
|
3632
3783
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -3663,6 +3814,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3663
3814
|
downloaded?: boolean;
|
|
3664
3815
|
/** The number of locks that are associated with a secret version. */
|
|
3665
3816
|
locks_total?: number;
|
|
3817
|
+
/** The secret version metadata that a user can customize. */
|
|
3818
|
+
version_custom_metadata?: JsonObject;
|
|
3666
3819
|
/** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
|
|
3667
3820
|
serial_number?: string;
|
|
3668
3821
|
/** The date that the certificate expires. The date format follows RFC 3339. */
|
|
@@ -3737,6 +3890,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3737
3890
|
versions_total?: number;
|
|
3738
3891
|
/** The number of locks that are associated with a secret. */
|
|
3739
3892
|
locks_total?: number;
|
|
3893
|
+
/** The secret metadata that a user can customize. */
|
|
3894
|
+
custom_metadata?: JsonObject;
|
|
3740
3895
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3741
3896
|
issuer?: string;
|
|
3742
3897
|
/** Determines whether your issued certificate is bundled with intermediate certificates.
|
|
@@ -3819,6 +3974,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3819
3974
|
versions?: JsonObject[];
|
|
3820
3975
|
/** The number of locks that are associated with a secret. */
|
|
3821
3976
|
locks_total?: number;
|
|
3977
|
+
/** The secret metadata that a user can customize. */
|
|
3978
|
+
custom_metadata?: JsonObject;
|
|
3979
|
+
/** The secret version metadata that a user can customize. */
|
|
3980
|
+
version_custom_metadata?: JsonObject;
|
|
3822
3981
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3823
3982
|
issuer?: string;
|
|
3824
3983
|
/** Determines whether your issued certificate is bundled with intermediate certificates.
|
|
@@ -3879,6 +4038,10 @@ declare namespace SecretsManagerV1 {
|
|
|
3879
4038
|
interface RestoreIAMCredentialsSecretBody extends SecretAction {
|
|
3880
4039
|
/** The ID of the target version or the alias `previous`. */
|
|
3881
4040
|
version_id: string;
|
|
4041
|
+
/** The secret metadata that a user can customize. */
|
|
4042
|
+
custom_metadata?: JsonObject;
|
|
4043
|
+
/** The secret version metadata that a user can customize. */
|
|
4044
|
+
version_custom_metadata?: JsonObject;
|
|
3882
4045
|
}
|
|
3883
4046
|
/** A request to revoke the certificate of an internally signed intermediate certificate authority. */
|
|
3884
4047
|
interface RevokeAction extends ConfigAction {
|
|
@@ -3954,7 +4117,8 @@ declare namespace SecretsManagerV1 {
|
|
|
3954
4117
|
other_sans?: string[];
|
|
3955
4118
|
/** The time-to-live (TTL) to assign to this CA certificate.
|
|
3956
4119
|
*
|
|
3957
|
-
* The value can be supplied as a string representation of a duration, such as `12h`. The value can
|
|
4120
|
+
* The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
|
|
4121
|
+
* seconds (suffix `s`), minutes (suffix `m`), hours (suffix `h`) or days (suffix `d`). The value can't exceed the
|
|
3958
4122
|
* `max_ttl` that is defined in the associated certificate template. In the API response, this value is returned in
|
|
3959
4123
|
* seconds (integer).
|
|
3960
4124
|
*/
|
|
@@ -4016,6 +4180,10 @@ declare namespace SecretsManagerV1 {
|
|
|
4016
4180
|
interface RotateArbitrarySecretBody extends SecretAction {
|
|
4017
4181
|
/** The new secret data to assign to an `arbitrary` secret. */
|
|
4018
4182
|
payload: string;
|
|
4183
|
+
/** The secret metadata that a user can customize. */
|
|
4184
|
+
custom_metadata?: JsonObject;
|
|
4185
|
+
/** The secret version metadata that a user can customize. */
|
|
4186
|
+
version_custom_metadata?: JsonObject;
|
|
4019
4187
|
}
|
|
4020
4188
|
/** The request body of a rotate certificate action. */
|
|
4021
4189
|
interface RotateCertificateBody extends SecretAction {
|
|
@@ -4025,6 +4193,10 @@ declare namespace SecretsManagerV1 {
|
|
|
4025
4193
|
private_key?: string;
|
|
4026
4194
|
/** The new intermediate certificate to associate with the certificate. */
|
|
4027
4195
|
intermediate?: string;
|
|
4196
|
+
/** The secret metadata that a user can customize. */
|
|
4197
|
+
custom_metadata?: JsonObject;
|
|
4198
|
+
/** The secret version metadata that a user can customize. */
|
|
4199
|
+
version_custom_metadata?: JsonObject;
|
|
4028
4200
|
}
|
|
4029
4201
|
/** Properties that are returned with a successful `rotate_crl` action. */
|
|
4030
4202
|
interface RotateCrlActionResult extends ConfigElementActionResultConfig {
|
|
@@ -4033,16 +4205,40 @@ declare namespace SecretsManagerV1 {
|
|
|
4033
4205
|
interface RotateKvSecretBody extends SecretAction {
|
|
4034
4206
|
/** The new secret data to assign to a key-value secret. */
|
|
4035
4207
|
payload: JsonObject;
|
|
4208
|
+
/** The secret metadata that a user can customize. */
|
|
4209
|
+
custom_metadata?: JsonObject;
|
|
4210
|
+
/** The secret version metadata that a user can customize. */
|
|
4211
|
+
version_custom_metadata?: JsonObject;
|
|
4212
|
+
}
|
|
4213
|
+
/** The request body of a rotate private certificate action. */
|
|
4214
|
+
interface RotatePrivateCertBody extends SecretAction {
|
|
4215
|
+
/** The secret metadata that a user can customize. */
|
|
4216
|
+
custom_metadata: JsonObject;
|
|
4217
|
+
/** The secret version metadata that a user can customize. */
|
|
4218
|
+
version_custom_metadata?: JsonObject;
|
|
4219
|
+
}
|
|
4220
|
+
/** The request body of a rotate private certificate action. */
|
|
4221
|
+
interface RotatePrivateCertBodyWithVersionCustomMetadata extends SecretAction {
|
|
4222
|
+
/** The secret version metadata that a user can customize. */
|
|
4223
|
+
version_custom_metadata: JsonObject;
|
|
4036
4224
|
}
|
|
4037
4225
|
/** The request body of a `rotate` action. */
|
|
4038
4226
|
interface RotatePublicCertBody extends SecretAction {
|
|
4039
4227
|
/** Determine whether keys must be rotated. */
|
|
4040
4228
|
rotate_keys: boolean;
|
|
4229
|
+
/** The secret metadata that a user can customize. */
|
|
4230
|
+
custom_metadata?: JsonObject;
|
|
4231
|
+
/** The secret version metadata that a user can customize. */
|
|
4232
|
+
version_custom_metadata?: JsonObject;
|
|
4041
4233
|
}
|
|
4042
4234
|
/** The request body of a `rotate` action. */
|
|
4043
4235
|
interface RotateUsernamePasswordSecretBody extends SecretAction {
|
|
4044
4236
|
/** The new password to assign to a `username_password` secret. */
|
|
4045
4237
|
password: string;
|
|
4238
|
+
/** The secret metadata that a user can customize. */
|
|
4239
|
+
custom_metadata?: JsonObject;
|
|
4240
|
+
/** The secret version metadata that a user can customize. */
|
|
4241
|
+
version_custom_metadata?: JsonObject;
|
|
4046
4242
|
}
|
|
4047
4243
|
/** The secret rotation time interval. */
|
|
4048
4244
|
interface SecretPolicyRotationRotationPolicyRotation extends SecretPolicyRotationRotation {
|
|
@@ -4214,7 +4410,7 @@ declare namespace SecretsManagerV1 {
|
|
|
4214
4410
|
*/
|
|
4215
4411
|
serial_number?: string;
|
|
4216
4412
|
/** Properties that are returned with a successful `sign` action. */
|
|
4217
|
-
data
|
|
4413
|
+
data?: SignActionResultData;
|
|
4218
4414
|
/** The PEM-encoded certificate signing request (CSR). */
|
|
4219
4415
|
csr: string;
|
|
4220
4416
|
}
|
|
@@ -4370,7 +4566,7 @@ declare namespace SecretsManagerV1 {
|
|
|
4370
4566
|
*/
|
|
4371
4567
|
serial_number?: string;
|
|
4372
4568
|
/** Properties that are returned with a successful `sign` action. */
|
|
4373
|
-
data
|
|
4569
|
+
data?: SignIntermediateActionResultData;
|
|
4374
4570
|
/** The signed intermediate certificate authority. */
|
|
4375
4571
|
intermediate_certificate_authority: string;
|
|
4376
4572
|
}
|
|
@@ -4423,6 +4619,8 @@ declare namespace SecretsManagerV1 {
|
|
|
4423
4619
|
versions_total?: number;
|
|
4424
4620
|
/** The number of locks that are associated with a secret. */
|
|
4425
4621
|
locks_total?: number;
|
|
4622
|
+
/** The secret metadata that a user can customize. */
|
|
4623
|
+
custom_metadata?: JsonObject;
|
|
4426
4624
|
/** The date the secret material expires. The date format follows RFC 3339.
|
|
4427
4625
|
*
|
|
4428
4626
|
* You can set an expiration date on supported secret types at their creation. If you create a secret without
|
|
@@ -4486,6 +4684,10 @@ declare namespace SecretsManagerV1 {
|
|
|
4486
4684
|
versions?: JsonObject[];
|
|
4487
4685
|
/** The number of locks that are associated with a secret. */
|
|
4488
4686
|
locks_total?: number;
|
|
4687
|
+
/** The secret metadata that a user can customize. */
|
|
4688
|
+
custom_metadata?: JsonObject;
|
|
4689
|
+
/** The secret version metadata that a user can customize. */
|
|
4690
|
+
version_custom_metadata?: JsonObject;
|
|
4489
4691
|
/** The username to assign to this secret. */
|
|
4490
4692
|
username?: string;
|
|
4491
4693
|
/** The password to assign to this secret. */
|
|
@@ -4525,6 +4727,8 @@ declare namespace SecretsManagerV1 {
|
|
|
4525
4727
|
created_by?: string;
|
|
4526
4728
|
/** The number of locks that are associated with a secret version. */
|
|
4527
4729
|
locks_total?: number;
|
|
4730
|
+
/** The secret version metadata that a user can customize. */
|
|
4731
|
+
version_custom_metadata?: JsonObject;
|
|
4528
4732
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
4529
4733
|
auto_rotated?: boolean;
|
|
4530
4734
|
/** The data that is associated with the secret version. The data object contains the following fields:
|
|
@@ -4548,6 +4752,8 @@ declare namespace SecretsManagerV1 {
|
|
|
4548
4752
|
* service API.
|
|
4549
4753
|
*/
|
|
4550
4754
|
downloaded?: boolean;
|
|
4755
|
+
/** The secret version metadata that a user can customize. */
|
|
4756
|
+
version_custom_metadata?: JsonObject;
|
|
4551
4757
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
4552
4758
|
auto_rotated?: boolean;
|
|
4553
4759
|
}
|
|
@@ -4569,6 +4775,8 @@ declare namespace SecretsManagerV1 {
|
|
|
4569
4775
|
downloaded?: boolean;
|
|
4570
4776
|
/** The number of locks that are associated with a secret version. */
|
|
4571
4777
|
locks_total?: number;
|
|
4778
|
+
/** The secret version metadata that a user can customize. */
|
|
4779
|
+
version_custom_metadata?: JsonObject;
|
|
4572
4780
|
/** Indicates whether the version of the secret was created by automatic rotation. */
|
|
4573
4781
|
auto_rotated?: boolean;
|
|
4574
4782
|
}
|