@ibm-cloud/secrets-manager 1.0.35 → 1.0.37

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -114,9 +114,9 @@ declare class SecretsManagerV1 extends BaseService {
114
114
  * @param {Object} params - The parameters to send to the service.
115
115
  * @param {string} params.id - The v4 UUID that uniquely identifies the secret group.
116
116
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
117
- * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>}
117
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
118
118
  */
119
- deleteSecretGroup(params: SecretsManagerV1.DeleteSecretGroupParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>;
119
+ deleteSecretGroup(params: SecretsManagerV1.DeleteSecretGroupParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
120
120
  /*************************
121
121
  * secrets
122
122
  ************************/
@@ -225,6 +225,8 @@ declare class SecretsManagerV1 extends BaseService {
225
225
  * - `restore`: Restore a previous version of an `iam_credentials` secret.
226
226
  * - `revoke`: Revoke a private certificate.
227
227
  * - `delete_credentials`: Delete the API key that is associated with an `iam_credentials` secret.
228
+ * - `validate_dns_challenge`: Validate challenges for a public certificate that is ordered with a manual DNS
229
+ * provider.
228
230
  *
229
231
  * @param {Object} params - The parameters to send to the service.
230
232
  * @param {string} params.secretType - The secret type.
@@ -244,9 +246,9 @@ declare class SecretsManagerV1 extends BaseService {
244
246
  * @param {string} params.secretType - The secret type.
245
247
  * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
246
248
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
247
- * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>}
249
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
248
250
  */
249
- deleteSecret(params: SecretsManagerV1.DeleteSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>;
251
+ deleteSecret(params: SecretsManagerV1.DeleteSecretParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
250
252
  /**
251
253
  * List versions of a secret.
252
254
  *
@@ -302,7 +304,7 @@ declare class SecretsManagerV1 extends BaseService {
302
304
  */
303
305
  updateSecretVersion(params: SecretsManagerV1.UpdateSecretVersionParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecret>>;
304
306
  /**
305
- * Get secret version metadata.
307
+ * Get the metadata of a secret version.
306
308
  *
307
309
  * Get the metadata of a secret version by specifying the ID of the version or the alias `previous`.
308
310
  *
@@ -321,7 +323,26 @@ declare class SecretsManagerV1 extends BaseService {
321
323
  */
322
324
  getSecretVersionMetadata(params: SecretsManagerV1.GetSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
323
325
  /**
324
- * Get secret metadata.
326
+ * Update the metadata of a secret version.
327
+ *
328
+ * Update the metadata of a secret version, such as `version_custom_metadata`.
329
+ *
330
+ * @param {Object} params - The parameters to send to the service.
331
+ * @param {string} params.secretType - The secret type.
332
+ * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
333
+ * @param {string} params.versionId - The v4 UUID that uniquely identifies the secret version. You can also use
334
+ * `previous` to retrieve the previous version.
335
+ *
336
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
337
+ * the response details.
338
+ * @param {CollectionMetadata} params.metadata - The metadata that describes the resource array.
339
+ * @param {UpdateSecretVersionMetadata[]} params.resources - A collection of resources.
340
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
341
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>}
342
+ */
343
+ updateSecretVersionMetadata(params: SecretsManagerV1.UpdateSecretVersionMetadataParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.GetSecretVersionMetadata>>;
344
+ /**
345
+ * Get the metadata of a secret.
325
346
  *
326
347
  * Get the details of a secret by specifying its ID.
327
348
  *
@@ -363,16 +384,15 @@ declare class SecretsManagerV1 extends BaseService {
363
384
  * @param {Object} params - The parameters to send to the service.
364
385
  * @param {string} params.secretType - The secret type.
365
386
  * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
366
- * @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
367
- * the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
368
- * resources.
387
+ * @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
388
+ * items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
369
389
  *
370
- * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
390
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
371
391
  * `..?limit=5`.
372
- * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
392
+ * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
373
393
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
374
394
  *
375
- * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
395
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
376
396
  * `..?offset=25&limit=25`.
377
397
  * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
378
398
  *
@@ -404,7 +424,8 @@ declare class SecretsManagerV1 extends BaseService {
404
424
  * @param {string} params.id - The v4 UUID that uniquely identifies the secret.
405
425
  * @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
406
426
  * @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
407
- * clear any matching locks on a secret version.
427
+ * clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
428
+ * is ignored.
408
429
  *
409
430
  * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
410
431
  * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
@@ -447,16 +468,15 @@ declare class SecretsManagerV1 extends BaseService {
447
468
  *
448
469
  * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and check
449
470
  * the response details.
450
- * @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
451
- * the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
452
- * resources.
471
+ * @param {number} [params.limit] - The number of locks to retrieve. By default, list operations return the first 25
472
+ * items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
453
473
  *
454
- * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
474
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks, use
455
475
  * `..?limit=5`.
456
- * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
476
+ * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
457
477
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
458
478
  *
459
- * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
479
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
460
480
  * `..?offset=25&limit=25`.
461
481
  * @param {string} [params.search] - Filter locks that contain the specified string in the field "name".
462
482
  *
@@ -493,7 +513,8 @@ declare class SecretsManagerV1 extends BaseService {
493
513
  * the response details.
494
514
  * @param {LockSecretBodyLocksItem[]} [params.locks] - The lock data to be attached to a secret version.
495
515
  * @param {string} [params.mode] - An optional lock mode. At lock creation, you can set one of the following modes to
496
- * clear any matching locks on a secret version.
516
+ * clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter
517
+ * is ignored.
497
518
  *
498
519
  * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret.
499
520
  * - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if
@@ -534,11 +555,11 @@ declare class SecretsManagerV1 extends BaseService {
534
555
  * List the lock details that are associated with all secrets in your Secrets Manager instance.
535
556
  *
536
557
  * @param {Object} [params] - The parameters to send to the service.
537
- * @param {number} [params.limit] - The number of secrets with locks to retrieve. By default, list operations return
538
- * the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page through your available
539
- * resources.
558
+ * @param {number} [params.limit] - The number of secrets with associated locks to retrieve. By default, list
559
+ * operations return the first 25 items. To retrieve a different set of items, use `limit` with `offset` to page
560
+ * through your available resources.
540
561
  *
541
- * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
562
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
542
563
  * `..?limit=5`.
543
564
  * @param {number} [params.offset] - The number of secrets to skip. By specifying `offset`, you retrieve a subset of
544
565
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
@@ -568,7 +589,7 @@ declare class SecretsManagerV1 extends BaseService {
568
589
  *
569
590
  * Create or update one or more policies, such as an [automatic rotation
570
591
  * policy](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-automatic-rotation), for the specified
571
- * secret.
592
+ * secret. To remove a policy, keep the resources block empty.
572
593
  *
573
594
  * @param {Object} params - The parameters to send to the service.
574
595
  * @param {string} params.secretType - The secret type.
@@ -609,9 +630,9 @@ declare class SecretsManagerV1 extends BaseService {
609
630
  * @param {string} params.secretType - The secret type.
610
631
  * @param {EngineConfig} params.engineConfig - Properties to update for a secrets engine.
611
632
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
612
- * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>}
633
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
613
634
  */
614
- putConfig(params: SecretsManagerV1.PutConfigParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>;
635
+ putConfig(params: SecretsManagerV1.PutConfigParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
615
636
  /**
616
637
  * Get the configuration of a secret type.
617
638
  *
@@ -722,9 +743,9 @@ declare class SecretsManagerV1 extends BaseService {
722
743
  * @param {string} params.configElement - The configuration element to define or manage.
723
744
  * @param {string} params.configName - The name of your configuration.
724
745
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
725
- * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>}
746
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
726
747
  */
727
- deleteConfigElement(params: SecretsManagerV1.DeleteConfigElementParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>;
748
+ deleteConfigElement(params: SecretsManagerV1.DeleteConfigElementParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
728
749
  /*************************
729
750
  * notifications
730
751
  ************************/
@@ -768,9 +789,9 @@ declare class SecretsManagerV1 extends BaseService {
768
789
  *
769
790
  * @param {Object} [params] - The parameters to send to the service.
770
791
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
771
- * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>}
792
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
772
793
  */
773
- deleteNotificationsRegistration(params?: SecretsManagerV1.DeleteNotificationsRegistrationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>;
794
+ deleteNotificationsRegistration(params?: SecretsManagerV1.DeleteNotificationsRegistrationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
774
795
  /**
775
796
  * Send a test event.
776
797
  *
@@ -783,9 +804,9 @@ declare class SecretsManagerV1 extends BaseService {
783
804
  *
784
805
  * @param {Object} [params] - The parameters to send to the service.
785
806
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
786
- * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>}
807
+ * @returns {Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>}
787
808
  */
788
- sendTestNotification(params?: SecretsManagerV1.SendTestNotificationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.Empty>>;
809
+ sendTestNotification(params?: SecretsManagerV1.SendTestNotificationParams): Promise<SecretsManagerV1.Response<SecretsManagerV1.EmptyObject>>;
789
810
  }
790
811
  /*************************
791
812
  * interfaces
@@ -801,7 +822,7 @@ declare namespace SecretsManagerV1 {
801
822
  /** The callback for a service request. */
802
823
  type Callback<T> = (error: any, response?: Response<T>) => void;
803
824
  /** The body of a service request that returns no response data. */
804
- interface Empty {
825
+ interface EmptyObject {
805
826
  }
806
827
  /** A standard JS object, defined to avoid the limitations of `Object` and `object` */
807
828
  interface JsonObject {
@@ -1001,7 +1022,8 @@ declare namespace SecretsManagerV1 {
1001
1022
  ROTATE = "rotate",
1002
1023
  RESTORE = "restore",
1003
1024
  REVOKE = "revoke",
1004
- DELETE_CREDENTIALS = "delete_credentials"
1025
+ DELETE_CREDENTIALS = "delete_credentials",
1026
+ VALIDATE_DNS_CHALLENGE = "validate_dns_challenge"
1005
1027
  }
1006
1028
  }
1007
1029
  /** Parameters for the `deleteSecret` operation. */
@@ -1130,6 +1152,38 @@ declare namespace SecretsManagerV1 {
1130
1152
  KV = "kv"
1131
1153
  }
1132
1154
  }
1155
+ /** Parameters for the `updateSecretVersionMetadata` operation. */
1156
+ interface UpdateSecretVersionMetadataParams {
1157
+ /** The secret type. */
1158
+ secretType: UpdateSecretVersionMetadataConstants.SecretType | string;
1159
+ /** The v4 UUID that uniquely identifies the secret. */
1160
+ id: string;
1161
+ /** The v4 UUID that uniquely identifies the secret version. You can also use `previous` to retrieve the
1162
+ * previous version.
1163
+ *
1164
+ * **Note:** To find the version ID of a secret, use the [Get secret metadata](#get-secret-metadata) method and
1165
+ * check the response details.
1166
+ */
1167
+ versionId: string;
1168
+ /** The metadata that describes the resource array. */
1169
+ metadata: CollectionMetadata;
1170
+ /** A collection of resources. */
1171
+ resources: UpdateSecretVersionMetadata[];
1172
+ headers?: OutgoingHttpHeaders;
1173
+ }
1174
+ /** Constants for the `updateSecretVersionMetadata` operation. */
1175
+ namespace UpdateSecretVersionMetadataConstants {
1176
+ /** The secret type. */
1177
+ enum SecretType {
1178
+ ARBITRARY = "arbitrary",
1179
+ IAM_CREDENTIALS = "iam_credentials",
1180
+ IMPORTED_CERT = "imported_cert",
1181
+ PUBLIC_CERT = "public_cert",
1182
+ PRIVATE_CERT = "private_cert",
1183
+ USERNAME_PASSWORD = "username_password",
1184
+ KV = "kv"
1185
+ }
1186
+ }
1133
1187
  /** Parameters for the `getSecretMetadata` operation. */
1134
1188
  interface GetSecretMetadataParams {
1135
1189
  /** The secret type. */
@@ -1182,17 +1236,18 @@ declare namespace SecretsManagerV1 {
1182
1236
  secretType: GetLocksConstants.SecretType | string;
1183
1237
  /** The v4 UUID that uniquely identifies the secret. */
1184
1238
  id: string;
1185
- /** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
1186
- * retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1239
+ /** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
1240
+ * different set of items, use `limit` with `offset` to page through your available resources.
1187
1241
  *
1188
- * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
1242
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
1243
+ * use
1189
1244
  * `..?limit=5`.
1190
1245
  */
1191
1246
  limit?: number;
1192
- /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1247
+ /** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1193
1248
  * `offset` value. Use `offset` with `limit` to page through your available resources.
1194
1249
  *
1195
- * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
1250
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
1196
1251
  * `..?offset=25&limit=25`.
1197
1252
  */
1198
1253
  offset?: number;
@@ -1226,7 +1281,7 @@ declare namespace SecretsManagerV1 {
1226
1281
  /** The lock data to be attached to a secret version. */
1227
1282
  locks?: LockSecretBodyLocksItem[];
1228
1283
  /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
1229
- * on a secret version.
1284
+ * on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
1230
1285
  *
1231
1286
  * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
1232
1287
  * secret.
@@ -1248,7 +1303,7 @@ declare namespace SecretsManagerV1 {
1248
1303
  USERNAME_PASSWORD = "username_password",
1249
1304
  KV = "kv"
1250
1305
  }
1251
- /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1306
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1252
1307
  enum Mode {
1253
1308
  EXCLUSIVE = "exclusive",
1254
1309
  EXCLUSIVE_DELETE = "exclusive_delete"
@@ -1290,17 +1345,18 @@ declare namespace SecretsManagerV1 {
1290
1345
  * check the response details.
1291
1346
  */
1292
1347
  versionId: string;
1293
- /** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
1294
- * retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1348
+ /** The number of locks to retrieve. By default, list operations return the first 25 items. To retrieve a
1349
+ * different set of items, use `limit` with `offset` to page through your available resources.
1295
1350
  *
1296
- * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
1351
+ * **Usage:** If you have 20 locks associated with your secret, and you want to retrieve only the first 5 locks,
1352
+ * use
1297
1353
  * `..?limit=5`.
1298
1354
  */
1299
1355
  limit?: number;
1300
- /** The number of secrets to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1356
+ /** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1301
1357
  * `offset` value. Use `offset` with `limit` to page through your available resources.
1302
1358
  *
1303
- * **Usage:** If you have 100 secrets in your instance, and you want to retrieve secrets 26 through 50, use
1359
+ * **Usage:** If you have 100 locks on your secret, and you want to retrieve locks 26 through 50, use
1304
1360
  * `..?offset=25&limit=25`.
1305
1361
  */
1306
1362
  offset?: number;
@@ -1341,7 +1397,7 @@ declare namespace SecretsManagerV1 {
1341
1397
  /** The lock data to be attached to a secret version. */
1342
1398
  locks?: LockSecretBodyLocksItem[];
1343
1399
  /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks
1344
- * on a secret version.
1400
+ * on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored.
1345
1401
  *
1346
1402
  * - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the
1347
1403
  * secret.
@@ -1363,7 +1419,7 @@ declare namespace SecretsManagerV1 {
1363
1419
  USERNAME_PASSWORD = "username_password",
1364
1420
  KV = "kv"
1365
1421
  }
1366
- /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1422
+ /** An optional lock mode. At lock creation, you can set one of the following modes to clear any matching locks on a secret version. Note: When you are locking the `previous` version, the mode parameter is ignored. - `exclusive`: Removes any other locks with matching names if they are found in the previous version of the secret. - `exclusive_delete`: Same as `exclusive`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
1367
1423
  enum Mode {
1368
1424
  EXCLUSIVE = "exclusive",
1369
1425
  EXCLUSIVE_DELETE = "exclusive_delete"
@@ -1401,10 +1457,10 @@ declare namespace SecretsManagerV1 {
1401
1457
  }
1402
1458
  /** Parameters for the `listInstanceSecretsLocks` operation. */
1403
1459
  interface ListInstanceSecretsLocksParams {
1404
- /** The number of secrets with locks to retrieve. By default, list operations return the first 25 items. To
1405
- * retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1460
+ /** The number of secrets with associated locks to retrieve. By default, list operations return the first 25
1461
+ * items. To retrieve a different set of items, use `limit` with `offset` to page through your available resources.
1406
1462
  *
1407
- * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5 with locks, use
1463
+ * **Usage:** If you have 20 secrets in your instance, and you want to retrieve only the first 5, use
1408
1464
  * `..?limit=5`.
1409
1465
  */
1410
1466
  limit?: number;
@@ -1451,6 +1507,7 @@ declare namespace SecretsManagerV1 {
1451
1507
  /** The secret type. */
1452
1508
  enum SecretType {
1453
1509
  USERNAME_PASSWORD = "username_password",
1510
+ IAM_CREDENTIALS = "iam_credentials",
1454
1511
  PUBLIC_CERT = "public_cert",
1455
1512
  PRIVATE_CERT = "private_cert"
1456
1513
  }
@@ -1474,6 +1531,7 @@ declare namespace SecretsManagerV1 {
1474
1531
  /** The secret type. */
1475
1532
  enum SecretType {
1476
1533
  USERNAME_PASSWORD = "username_password",
1534
+ IAM_CREDENTIALS = "iam_credentials",
1477
1535
  PUBLIC_CERT = "public_cert",
1478
1536
  PRIVATE_CERT = "private_cert"
1479
1537
  }
@@ -1733,6 +1791,8 @@ declare namespace SecretsManagerV1 {
1733
1791
  ************************/
1734
1792
  /** The data that is associated with the secret version. The data object contains the following fields: - `certificate`: The contents of the certificate. - `private_key`: The private key that is associated with the certificate. - `intermediate`: The intermediate certificate that is associated with the certificate. */
1735
1793
  interface CertificateSecretData {
1794
+ /** CertificateSecretData accepts additional properties. */
1795
+ [propName: string]: any;
1736
1796
  }
1737
1797
  /** Certificate templates configuration. */
1738
1798
  interface CertificateTemplatesConfigItem {
@@ -1749,6 +1809,19 @@ declare namespace SecretsManagerV1 {
1749
1809
  */
1750
1810
  config?: CertificateTemplateConfig;
1751
1811
  }
1812
+ /** Properties that describe a challenge. */
1813
+ interface ChallengeResource {
1814
+ /** The challenge domain. */
1815
+ domain?: string;
1816
+ /** The challenge expiration date. The date format follows RFC 3339. */
1817
+ expiration?: string;
1818
+ /** The challenge status. */
1819
+ status?: string;
1820
+ /** The txt_record_name. */
1821
+ txt_record_name?: string;
1822
+ /** The txt_record_value. */
1823
+ txt_record_value?: string;
1824
+ }
1752
1825
  /** The metadata that describes the resource array. */
1753
1826
  interface CollectionMetadata {
1754
1827
  /** The type of resources in the resource array. */
@@ -1937,6 +2010,14 @@ declare namespace SecretsManagerV1 {
1937
2010
  ca?: string;
1938
2011
  /** The name that was assigned to the DNS provider configuration. */
1939
2012
  dns?: string;
2013
+ /** The set of challenges, will be returned only when ordering public certificate using manual DNS
2014
+ * configuration.
2015
+ */
2016
+ challenges?: ChallengeResource[];
2017
+ /** The date a user called "validate dns challenges" for "manual" DNS provider. The date format follows RFC
2018
+ * 3339.
2019
+ */
2020
+ dns_challenge_validation_time?: string;
1940
2021
  }
1941
2022
  /** Properties that describe the locks of a secret or a secret version. */
1942
2023
  interface ListSecretLocks {
@@ -1972,9 +2053,9 @@ declare namespace SecretsManagerV1 {
1972
2053
  * To protect your privacy, do not use personal data, such as your name or location, as a description for your
1973
2054
  * secret lock.
1974
2055
  */
1975
- description: string;
2056
+ description?: string;
1976
2057
  /** Optional information to associate with a lock, such as resources CRNs to be used by automation. */
1977
- attributes: JsonObject;
2058
+ attributes?: JsonObject;
1978
2059
  }
1979
2060
  /** The Event Notifications details. */
1980
2061
  interface NotificationsSettings {
@@ -2194,6 +2275,11 @@ declare namespace SecretsManagerV1 {
2194
2275
  /** The time until the certificate expires. */
2195
2276
  expiration?: number;
2196
2277
  }
2278
+ /** Properties that update the metadata of a secret version. */
2279
+ interface UpdateSecretVersionMetadata {
2280
+ /** The secret version metadata that a user can customize. */
2281
+ version_custom_metadata?: JsonObject;
2282
+ }
2197
2283
  /** CertificateValidity. */
2198
2284
  interface CertificateValidity {
2199
2285
  /** The date and time that the certificate validity period begins. */
@@ -2250,6 +2336,8 @@ declare namespace SecretsManagerV1 {
2250
2336
  versions_total?: number;
2251
2337
  /** The number of locks that are associated with a secret. */
2252
2338
  locks_total?: number;
2339
+ /** The secret metadata that a user can customize. */
2340
+ custom_metadata?: JsonObject;
2253
2341
  /** The date the secret material expires. The date format follows RFC 3339.
2254
2342
  *
2255
2343
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -2313,6 +2401,10 @@ declare namespace SecretsManagerV1 {
2313
2401
  versions?: JsonObject[];
2314
2402
  /** The number of locks that are associated with a secret. */
2315
2403
  locks_total?: number;
2404
+ /** The secret metadata that a user can customize. */
2405
+ custom_metadata?: JsonObject;
2406
+ /** The secret version metadata that a user can customize. */
2407
+ version_custom_metadata?: JsonObject;
2316
2408
  /** The date the secret material expires. The date format follows RFC 3339.
2317
2409
  *
2318
2410
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -2343,6 +2435,8 @@ declare namespace SecretsManagerV1 {
2343
2435
  created_by?: string;
2344
2436
  /** The number of locks that are associated with a secret version. */
2345
2437
  locks_total?: number;
2438
+ /** The secret version metadata that a user can customize. */
2439
+ version_custom_metadata?: JsonObject;
2346
2440
  /** The data that is associated with the secret version.
2347
2441
  *
2348
2442
  * The data object contains the field `payload`.
@@ -2363,6 +2457,8 @@ declare namespace SecretsManagerV1 {
2363
2457
  * service API.
2364
2458
  */
2365
2459
  downloaded?: boolean;
2460
+ /** The secret version metadata that a user can customize. */
2461
+ version_custom_metadata?: JsonObject;
2366
2462
  }
2367
2463
  /** Properties that describe a secret version. */
2368
2464
  interface ArbitrarySecretVersionMetadata extends SecretVersionMetadata {
@@ -2382,6 +2478,8 @@ declare namespace SecretsManagerV1 {
2382
2478
  downloaded?: boolean;
2383
2479
  /** The number of locks that are associated with a secret version. */
2384
2480
  locks_total?: number;
2481
+ /** The secret version metadata that a user can customize. */
2482
+ version_custom_metadata?: JsonObject;
2385
2483
  }
2386
2484
  /** Metadata properties that describe a certificate secret. */
2387
2485
  interface CertificateSecretMetadata extends SecretMetadata {
@@ -2432,6 +2530,8 @@ declare namespace SecretsManagerV1 {
2432
2530
  versions_total?: number;
2433
2531
  /** The number of locks that are associated with a secret. */
2434
2532
  locks_total?: number;
2533
+ /** The secret metadata that a user can customize. */
2534
+ custom_metadata?: JsonObject;
2435
2535
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2436
2536
  serial_number?: string;
2437
2537
  /** The identifier for the cryptographic algorithm that was used by the issuing certificate authority to sign
@@ -2508,6 +2608,10 @@ declare namespace SecretsManagerV1 {
2508
2608
  versions?: JsonObject[];
2509
2609
  /** The number of locks that are associated with a secret. */
2510
2610
  locks_total?: number;
2611
+ /** The secret metadata that a user can customize. */
2612
+ custom_metadata?: JsonObject;
2613
+ /** The secret version metadata that a user can customize. */
2614
+ version_custom_metadata?: JsonObject;
2511
2615
  /** The contents of your certificate. The data must be formatted on a single line with embedded newline
2512
2616
  * characters.
2513
2617
  */
@@ -2568,6 +2672,8 @@ declare namespace SecretsManagerV1 {
2568
2672
  created_by?: string;
2569
2673
  /** The number of locks that are associated with a secret version. */
2570
2674
  locks_total?: number;
2675
+ /** The secret version metadata that a user can customize. */
2676
+ version_custom_metadata?: JsonObject;
2571
2677
  validity?: CertificateValidity;
2572
2678
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2573
2679
  serial_number?: string;
@@ -2595,6 +2701,8 @@ declare namespace SecretsManagerV1 {
2595
2701
  * service API.
2596
2702
  */
2597
2703
  downloaded?: boolean;
2704
+ /** The secret version metadata that a user can customize. */
2705
+ version_custom_metadata?: JsonObject;
2598
2706
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2599
2707
  serial_number?: string;
2600
2708
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -2619,6 +2727,8 @@ declare namespace SecretsManagerV1 {
2619
2727
  downloaded?: boolean;
2620
2728
  /** The number of locks that are associated with a secret version. */
2621
2729
  locks_total?: number;
2730
+ /** The secret version metadata that a user can customize. */
2731
+ version_custom_metadata?: JsonObject;
2622
2732
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
2623
2733
  serial_number?: string;
2624
2734
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -2644,9 +2754,10 @@ declare namespace SecretsManagerV1 {
2644
2754
  max_ttl?: any;
2645
2755
  /** The time-to-live (TTL) to assign to a private certificate.
2646
2756
  *
2647
- * The value can be supplied as a string representation of a duration, such as `12h`. Hour (`h`) is the largest
2648
- * time suffix. The value can't exceed the `max_ttl` that is defined in the associated certificate template. In the
2649
- * API response, this value is returned in seconds (integer).
2757
+ * The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
2758
+ * seconds (suffix `s`), minutes (suffix `m`) or hours (suffix `h`). The value can't exceed the `max_ttl` that is
2759
+ * defined in the associated certificate template. In the API response, this value is returned in seconds
2760
+ * (integer).
2650
2761
  */
2651
2762
  ttl?: any;
2652
2763
  /** Determines whether to allow `localhost` to be included as one of the requested common names. */
@@ -2857,8 +2968,8 @@ declare namespace SecretsManagerV1 {
2857
2968
  * API key is deleted. Otherwise, the service ID is deleted together with its API key.
2858
2969
  */
2859
2970
  api_key_id?: string;
2860
- /** The service ID that you want to delete. This property can be used instead of the `api_key_id` field, but
2861
- * only for secrets that were created with a service ID that was generated by Secrets Manager.
2971
+ /** Deprecated: The service ID that you want to delete. This property can be used instead of the `api_key_id`
2972
+ * field, but only for secrets that were created with a service ID that was generated by Secrets Manager.
2862
2973
  *
2863
2974
  * **Deprecated.** Use the `api_key_id` field instead.
2864
2975
  */
@@ -2940,6 +3051,8 @@ declare namespace SecretsManagerV1 {
2940
3051
  versions_total?: number;
2941
3052
  /** The number of locks that are associated with a secret. */
2942
3053
  locks_total?: number;
3054
+ /** The secret metadata that a user can customize. */
3055
+ custom_metadata?: JsonObject;
2943
3056
  /** The time-to-live (TTL) or lease duration that is assigned to the secret. For `iam_credentials` secrets, the
2944
3057
  * TTL defines for how long each generated API key remains valid.
2945
3058
  */
@@ -3019,6 +3132,10 @@ declare namespace SecretsManagerV1 {
3019
3132
  versions?: JsonObject[];
3020
3133
  /** The number of locks that are associated with a secret. */
3021
3134
  locks_total?: number;
3135
+ /** The secret metadata that a user can customize. */
3136
+ custom_metadata?: JsonObject;
3137
+ /** The secret version metadata that a user can customize. */
3138
+ version_custom_metadata?: JsonObject;
3022
3139
  /** The time-to-live (TTL) or lease duration to assign to generated credentials.
3023
3140
  *
3024
3141
  * For `iam_credentials` secrets, the TTL defines for how long each generated API key remains valid. The value can
@@ -3069,6 +3186,12 @@ declare namespace SecretsManagerV1 {
3069
3186
  * are generated each time that the secret is read or accessed.
3070
3187
  */
3071
3188
  reuse_api_key?: boolean;
3189
+ /** The date that the secret is scheduled for automatic rotation.
3190
+ *
3191
+ * The service automatically creates a new version of the secret on its next rotation date. This field exists only
3192
+ * for secrets that have an existing rotation policy.
3193
+ */
3194
+ next_rotation_date?: string;
3072
3195
  }
3073
3196
  /** IAMCredentialsSecretVersion. */
3074
3197
  interface IAMCredentialsSecretVersion extends SecretVersion {
@@ -3082,6 +3205,10 @@ declare namespace SecretsManagerV1 {
3082
3205
  created_by?: string;
3083
3206
  /** The number of locks that are associated with a secret version. */
3084
3207
  locks_total?: number;
3208
+ /** The secret version metadata that a user can customize. */
3209
+ version_custom_metadata?: JsonObject;
3210
+ /** Indicates whether the version of the secret was created by automatic rotation. */
3211
+ auto_rotated?: boolean;
3085
3212
  /** The data that is associated with the secret version. The data object contains the following fields:
3086
3213
  *
3087
3214
  * - `api_key`: The API key that is generated for this secret.
@@ -3104,6 +3231,10 @@ declare namespace SecretsManagerV1 {
3104
3231
  * service API.
3105
3232
  */
3106
3233
  downloaded?: boolean;
3234
+ /** The secret version metadata that a user can customize. */
3235
+ version_custom_metadata?: JsonObject;
3236
+ /** Indicates whether the version of the secret was created by automatic rotation. */
3237
+ auto_rotated?: boolean;
3107
3238
  }
3108
3239
  /** Properties that describe a secret version. */
3109
3240
  interface IAMCredentialsSecretVersionMetadata extends SecretVersionMetadata {
@@ -3123,6 +3254,10 @@ declare namespace SecretsManagerV1 {
3123
3254
  downloaded?: boolean;
3124
3255
  /** The number of locks that are associated with a secret version. */
3125
3256
  locks_total?: number;
3257
+ /** The secret version metadata that a user can customize. */
3258
+ version_custom_metadata?: JsonObject;
3259
+ /** Indicates whether the version of the secret was created by automatic rotation. */
3260
+ auto_rotated?: boolean;
3126
3261
  }
3127
3262
  /** Intermediate certificate authorities configuration. */
3128
3263
  interface IntermediateCertificateAuthoritiesConfig extends GetConfigElementsResourcesItem {
@@ -3292,6 +3427,8 @@ declare namespace SecretsManagerV1 {
3292
3427
  versions_total?: number;
3293
3428
  /** The number of locks that are associated with a secret. */
3294
3429
  locks_total?: number;
3430
+ /** The secret metadata that a user can customize. */
3431
+ custom_metadata?: JsonObject;
3295
3432
  }
3296
3433
  /** Properties that describe a secret. */
3297
3434
  interface KvSecretResource extends SecretResource {
@@ -3345,6 +3482,10 @@ declare namespace SecretsManagerV1 {
3345
3482
  versions?: JsonObject[];
3346
3483
  /** The number of locks that are associated with a secret. */
3347
3484
  locks_total?: number;
3485
+ /** The secret metadata that a user can customize. */
3486
+ custom_metadata?: JsonObject;
3487
+ /** The secret version metadata that a user can customize. */
3488
+ version_custom_metadata?: JsonObject;
3348
3489
  /** The date the secret material expires. The date format follows RFC 3339.
3349
3490
  *
3350
3491
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -3429,6 +3570,8 @@ declare namespace SecretsManagerV1 {
3429
3570
  versions_total?: number;
3430
3571
  /** The number of locks that are associated with a secret. */
3431
3572
  locks_total?: number;
3573
+ /** The secret metadata that a user can customize. */
3574
+ custom_metadata?: JsonObject;
3432
3575
  /** The name of the certificate template. */
3433
3576
  certificate_template?: string;
3434
3577
  /** The intermediate certificate authority that signed this certificate. */
@@ -3508,6 +3651,10 @@ declare namespace SecretsManagerV1 {
3508
3651
  versions?: JsonObject[];
3509
3652
  /** The number of locks that are associated with a secret. */
3510
3653
  locks_total?: number;
3654
+ /** The secret metadata that a user can customize. */
3655
+ custom_metadata?: JsonObject;
3656
+ /** The secret version metadata that a user can customize. */
3657
+ version_custom_metadata?: JsonObject;
3511
3658
  /** The name of the certificate template. */
3512
3659
  certificate_template: string;
3513
3660
  /** The intermediate certificate authority that signed this certificate. */
@@ -3588,6 +3735,8 @@ declare namespace SecretsManagerV1 {
3588
3735
  created_by?: string;
3589
3736
  /** The number of locks that are associated with a secret version. */
3590
3737
  locks_total?: number;
3738
+ /** The secret version metadata that a user can customize. */
3739
+ version_custom_metadata?: JsonObject;
3591
3740
  validity?: CertificateValidity;
3592
3741
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
3593
3742
  serial_number?: string;
@@ -3627,6 +3776,8 @@ declare namespace SecretsManagerV1 {
3627
3776
  * service API.
3628
3777
  */
3629
3778
  downloaded?: boolean;
3779
+ /** The secret version metadata that a user can customize. */
3780
+ version_custom_metadata?: JsonObject;
3630
3781
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
3631
3782
  serial_number?: string;
3632
3783
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -3663,6 +3814,8 @@ declare namespace SecretsManagerV1 {
3663
3814
  downloaded?: boolean;
3664
3815
  /** The number of locks that are associated with a secret version. */
3665
3816
  locks_total?: number;
3817
+ /** The secret version metadata that a user can customize. */
3818
+ version_custom_metadata?: JsonObject;
3666
3819
  /** The unique serial number that was assigned to the certificate by the issuing certificate authority. */
3667
3820
  serial_number?: string;
3668
3821
  /** The date that the certificate expires. The date format follows RFC 3339. */
@@ -3737,6 +3890,8 @@ declare namespace SecretsManagerV1 {
3737
3890
  versions_total?: number;
3738
3891
  /** The number of locks that are associated with a secret. */
3739
3892
  locks_total?: number;
3893
+ /** The secret metadata that a user can customize. */
3894
+ custom_metadata?: JsonObject;
3740
3895
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3741
3896
  issuer?: string;
3742
3897
  /** Determines whether your issued certificate is bundled with intermediate certificates.
@@ -3819,6 +3974,10 @@ declare namespace SecretsManagerV1 {
3819
3974
  versions?: JsonObject[];
3820
3975
  /** The number of locks that are associated with a secret. */
3821
3976
  locks_total?: number;
3977
+ /** The secret metadata that a user can customize. */
3978
+ custom_metadata?: JsonObject;
3979
+ /** The secret version metadata that a user can customize. */
3980
+ version_custom_metadata?: JsonObject;
3822
3981
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3823
3982
  issuer?: string;
3824
3983
  /** Determines whether your issued certificate is bundled with intermediate certificates.
@@ -3879,6 +4038,10 @@ declare namespace SecretsManagerV1 {
3879
4038
  interface RestoreIAMCredentialsSecretBody extends SecretAction {
3880
4039
  /** The ID of the target version or the alias `previous`. */
3881
4040
  version_id: string;
4041
+ /** The secret metadata that a user can customize. */
4042
+ custom_metadata?: JsonObject;
4043
+ /** The secret version metadata that a user can customize. */
4044
+ version_custom_metadata?: JsonObject;
3882
4045
  }
3883
4046
  /** A request to revoke the certificate of an internally signed intermediate certificate authority. */
3884
4047
  interface RevokeAction extends ConfigAction {
@@ -3954,7 +4117,8 @@ declare namespace SecretsManagerV1 {
3954
4117
  other_sans?: string[];
3955
4118
  /** The time-to-live (TTL) to assign to this CA certificate.
3956
4119
  *
3957
- * The value can be supplied as a string representation of a duration, such as `12h`. The value can't exceed the
4120
+ * The value can be supplied as a string representation of a duration, such as `12h`. The value can be supplied in
4121
+ * seconds (suffix `s`), minutes (suffix `m`), hours (suffix `h`) or days (suffix `d`). The value can't exceed the
3958
4122
  * `max_ttl` that is defined in the associated certificate template. In the API response, this value is returned in
3959
4123
  * seconds (integer).
3960
4124
  */
@@ -4016,6 +4180,10 @@ declare namespace SecretsManagerV1 {
4016
4180
  interface RotateArbitrarySecretBody extends SecretAction {
4017
4181
  /** The new secret data to assign to an `arbitrary` secret. */
4018
4182
  payload: string;
4183
+ /** The secret metadata that a user can customize. */
4184
+ custom_metadata?: JsonObject;
4185
+ /** The secret version metadata that a user can customize. */
4186
+ version_custom_metadata?: JsonObject;
4019
4187
  }
4020
4188
  /** The request body of a rotate certificate action. */
4021
4189
  interface RotateCertificateBody extends SecretAction {
@@ -4025,6 +4193,10 @@ declare namespace SecretsManagerV1 {
4025
4193
  private_key?: string;
4026
4194
  /** The new intermediate certificate to associate with the certificate. */
4027
4195
  intermediate?: string;
4196
+ /** The secret metadata that a user can customize. */
4197
+ custom_metadata?: JsonObject;
4198
+ /** The secret version metadata that a user can customize. */
4199
+ version_custom_metadata?: JsonObject;
4028
4200
  }
4029
4201
  /** Properties that are returned with a successful `rotate_crl` action. */
4030
4202
  interface RotateCrlActionResult extends ConfigElementActionResultConfig {
@@ -4033,16 +4205,40 @@ declare namespace SecretsManagerV1 {
4033
4205
  interface RotateKvSecretBody extends SecretAction {
4034
4206
  /** The new secret data to assign to a key-value secret. */
4035
4207
  payload: JsonObject;
4208
+ /** The secret metadata that a user can customize. */
4209
+ custom_metadata?: JsonObject;
4210
+ /** The secret version metadata that a user can customize. */
4211
+ version_custom_metadata?: JsonObject;
4212
+ }
4213
+ /** The request body of a rotate private certificate action. */
4214
+ interface RotatePrivateCertBody extends SecretAction {
4215
+ /** The secret metadata that a user can customize. */
4216
+ custom_metadata: JsonObject;
4217
+ /** The secret version metadata that a user can customize. */
4218
+ version_custom_metadata?: JsonObject;
4219
+ }
4220
+ /** The request body of a rotate private certificate action. */
4221
+ interface RotatePrivateCertBodyWithVersionCustomMetadata extends SecretAction {
4222
+ /** The secret version metadata that a user can customize. */
4223
+ version_custom_metadata: JsonObject;
4036
4224
  }
4037
4225
  /** The request body of a `rotate` action. */
4038
4226
  interface RotatePublicCertBody extends SecretAction {
4039
4227
  /** Determine whether keys must be rotated. */
4040
4228
  rotate_keys: boolean;
4229
+ /** The secret metadata that a user can customize. */
4230
+ custom_metadata?: JsonObject;
4231
+ /** The secret version metadata that a user can customize. */
4232
+ version_custom_metadata?: JsonObject;
4041
4233
  }
4042
4234
  /** The request body of a `rotate` action. */
4043
4235
  interface RotateUsernamePasswordSecretBody extends SecretAction {
4044
4236
  /** The new password to assign to a `username_password` secret. */
4045
4237
  password: string;
4238
+ /** The secret metadata that a user can customize. */
4239
+ custom_metadata?: JsonObject;
4240
+ /** The secret version metadata that a user can customize. */
4241
+ version_custom_metadata?: JsonObject;
4046
4242
  }
4047
4243
  /** The secret rotation time interval. */
4048
4244
  interface SecretPolicyRotationRotationPolicyRotation extends SecretPolicyRotationRotation {
@@ -4214,7 +4410,7 @@ declare namespace SecretsManagerV1 {
4214
4410
  */
4215
4411
  serial_number?: string;
4216
4412
  /** Properties that are returned with a successful `sign` action. */
4217
- data: SignActionResultData;
4413
+ data?: SignActionResultData;
4218
4414
  /** The PEM-encoded certificate signing request (CSR). */
4219
4415
  csr: string;
4220
4416
  }
@@ -4370,7 +4566,7 @@ declare namespace SecretsManagerV1 {
4370
4566
  */
4371
4567
  serial_number?: string;
4372
4568
  /** Properties that are returned with a successful `sign` action. */
4373
- data: SignIntermediateActionResultData;
4569
+ data?: SignIntermediateActionResultData;
4374
4570
  /** The signed intermediate certificate authority. */
4375
4571
  intermediate_certificate_authority: string;
4376
4572
  }
@@ -4423,6 +4619,8 @@ declare namespace SecretsManagerV1 {
4423
4619
  versions_total?: number;
4424
4620
  /** The number of locks that are associated with a secret. */
4425
4621
  locks_total?: number;
4622
+ /** The secret metadata that a user can customize. */
4623
+ custom_metadata?: JsonObject;
4426
4624
  /** The date the secret material expires. The date format follows RFC 3339.
4427
4625
  *
4428
4626
  * You can set an expiration date on supported secret types at their creation. If you create a secret without
@@ -4486,6 +4684,10 @@ declare namespace SecretsManagerV1 {
4486
4684
  versions?: JsonObject[];
4487
4685
  /** The number of locks that are associated with a secret. */
4488
4686
  locks_total?: number;
4687
+ /** The secret metadata that a user can customize. */
4688
+ custom_metadata?: JsonObject;
4689
+ /** The secret version metadata that a user can customize. */
4690
+ version_custom_metadata?: JsonObject;
4489
4691
  /** The username to assign to this secret. */
4490
4692
  username?: string;
4491
4693
  /** The password to assign to this secret. */
@@ -4525,6 +4727,8 @@ declare namespace SecretsManagerV1 {
4525
4727
  created_by?: string;
4526
4728
  /** The number of locks that are associated with a secret version. */
4527
4729
  locks_total?: number;
4730
+ /** The secret version metadata that a user can customize. */
4731
+ version_custom_metadata?: JsonObject;
4528
4732
  /** Indicates whether the version of the secret was created by automatic rotation. */
4529
4733
  auto_rotated?: boolean;
4530
4734
  /** The data that is associated with the secret version. The data object contains the following fields:
@@ -4548,6 +4752,8 @@ declare namespace SecretsManagerV1 {
4548
4752
  * service API.
4549
4753
  */
4550
4754
  downloaded?: boolean;
4755
+ /** The secret version metadata that a user can customize. */
4756
+ version_custom_metadata?: JsonObject;
4551
4757
  /** Indicates whether the version of the secret was created by automatic rotation. */
4552
4758
  auto_rotated?: boolean;
4553
4759
  }
@@ -4569,6 +4775,8 @@ declare namespace SecretsManagerV1 {
4569
4775
  downloaded?: boolean;
4570
4776
  /** The number of locks that are associated with a secret version. */
4571
4777
  locks_total?: number;
4778
+ /** The secret version metadata that a user can customize. */
4779
+ version_custom_metadata?: JsonObject;
4572
4780
  /** Indicates whether the version of the secret was created by automatic rotation. */
4573
4781
  auto_rotated?: boolean;
4574
4782
  }