@ibm-cloud/secrets-manager 2.0.7 → 2.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,5 @@
1
1
  /**
2
- * (C) Copyright IBM Corp. 2024.
2
+ * (C) Copyright IBM Corp. 2025.
3
3
  *
4
4
  * Licensed under the Apache License, Version 2.0 (the "License");
5
5
  * you may not use this file except in compliance with the License.
@@ -106,7 +106,7 @@ declare class SecretsManagerV2 extends BaseService {
106
106
  * Get the properties of an existing secret group by specifying the ID of the group.
107
107
  *
108
108
  * @param {Object} params - The parameters to send to the service.
109
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
109
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
110
110
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
111
111
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretGroup>>}
112
112
  */
@@ -117,7 +117,7 @@ declare class SecretsManagerV2 extends BaseService {
117
117
  * Update the properties of an existing secret group, such as its name or description.
118
118
  *
119
119
  * @param {Object} params - The parameters to send to the service.
120
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
120
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
121
121
  * @param {string} [params.name] - The name of your secret group.
122
122
  * @param {string} [params.description] - An extended description of your secret group.
123
123
  *
@@ -136,7 +136,7 @@ declare class SecretsManagerV2 extends BaseService {
136
136
  * you must first delete the secrets that are associated with the group.
137
137
  *
138
138
  * @param {Object} params - The parameters to send to the service.
139
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
139
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
140
140
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
141
141
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
142
142
  */
@@ -226,7 +226,7 @@ declare class SecretsManagerV2 extends BaseService {
226
226
  * view only the details of a specified secret without retrieving its value, use the Get secret metadata operation.
227
227
  *
228
228
  * @param {Object} params - The parameters to send to the service.
229
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
229
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
230
230
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
231
231
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.Secret>>}
232
232
  */
@@ -237,7 +237,7 @@ declare class SecretsManagerV2 extends BaseService {
237
237
  * Delete a secret by specifying the ID of the secret.
238
238
  *
239
239
  * @param {Object} params - The parameters to send to the service.
240
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
240
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
241
241
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
242
242
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
243
243
  */
@@ -248,7 +248,7 @@ declare class SecretsManagerV2 extends BaseService {
248
248
  * Get the metadata of a secret by specifying the ID of the secret.
249
249
  *
250
250
  * @param {Object} params - The parameters to send to the service.
251
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
251
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
252
252
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
253
253
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
254
254
  */
@@ -259,7 +259,7 @@ declare class SecretsManagerV2 extends BaseService {
259
259
  * Update the metadata of a secret, such as its name or description.
260
260
  *
261
261
  * @param {Object} params - The parameters to send to the service.
262
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
262
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
263
263
  * @param {SecretMetadataPatch} params.secretMetadataPatch -
264
264
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
265
265
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
@@ -271,7 +271,7 @@ declare class SecretsManagerV2 extends BaseService {
271
271
  * Create a secret action. This operation supports the following actions:.
272
272
  *
273
273
  * @param {Object} params - The parameters to send to the service.
274
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
274
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
275
275
  * @param {SecretActionPrototype} params.secretActionPrototype -
276
276
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
277
277
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretAction>>}
@@ -304,7 +304,7 @@ declare class SecretsManagerV2 extends BaseService {
304
304
  * Create a new secret version.
305
305
  *
306
306
  * @param {Object} params - The parameters to send to the service.
307
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
307
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
308
308
  * @param {SecretVersionPrototype} params.secretVersionPrototype -
309
309
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
310
310
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
@@ -318,7 +318,7 @@ declare class SecretsManagerV2 extends BaseService {
318
318
  * A successful request returns the list of versions of a secret, along with the metadata of each version.
319
319
  *
320
320
  * @param {Object} params - The parameters to send to the service.
321
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
321
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
322
322
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
323
323
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadataCollection>>}
324
324
  */
@@ -333,8 +333,8 @@ declare class SecretsManagerV2 extends BaseService {
333
333
  * with other metadata.
334
334
  *
335
335
  * @param {Object} params - The parameters to send to the service.
336
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
337
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
336
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
337
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
338
338
  * `previous` aliases to refer to the current or previous secret version.
339
339
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
340
340
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
@@ -348,8 +348,8 @@ declare class SecretsManagerV2 extends BaseService {
348
348
  * This operation is available for secret type: iam_credentials current version.
349
349
  *
350
350
  * @param {Object} params - The parameters to send to the service.
351
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
352
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
351
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
352
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
353
353
  * `previous` aliases to refer to the current or previous secret version.
354
354
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
355
355
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
@@ -364,8 +364,8 @@ declare class SecretsManagerV2 extends BaseService {
364
364
  * A successful request returns the metadata that is associated with the specified version of your secret.
365
365
  *
366
366
  * @param {Object} params - The parameters to send to the service.
367
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
368
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
367
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
368
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
369
369
  * `previous` aliases to refer to the current or previous secret version.
370
370
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
371
371
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadata>>}
@@ -377,8 +377,8 @@ declare class SecretsManagerV2 extends BaseService {
377
377
  * Update the custom metadata of a secret version.
378
378
  *
379
379
  * @param {Object} params - The parameters to send to the service.
380
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
381
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
380
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
381
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
382
382
  * `previous` aliases to refer to the current or previous secret version.
383
383
  * @param {JsonObject} [params.versionCustomMetadata] - The secret version metadata that a user can customize.
384
384
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -393,8 +393,8 @@ declare class SecretsManagerV2 extends BaseService {
393
393
  * - `private_cert_action_revoke_certificate`: Revoke a version of a private certificate.
394
394
  *
395
395
  * @param {Object} params - The parameters to send to the service.
396
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
397
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
396
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
397
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
398
398
  * `previous` aliases to refer to the current or previous secret version.
399
399
  * @param {SecretVersionActionPrototype} params.secretVersionActionPrototype -
400
400
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -442,7 +442,7 @@ declare class SecretsManagerV2 extends BaseService {
442
442
  * List the locks that are associated with a specified secret.
443
443
  *
444
444
  * @param {Object} params - The parameters to send to the service.
445
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
445
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
446
446
  * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
447
447
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
448
448
  *
@@ -485,7 +485,7 @@ declare class SecretsManagerV2 extends BaseService {
485
485
  * the data of the previous secret version if it doesn't have any locks.
486
486
  *
487
487
  * @param {Object} params - The parameters to send to the service.
488
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
488
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
489
489
  * @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
490
490
  * @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
491
491
  * modes to clear any matching locks on a secret version.
@@ -510,7 +510,7 @@ declare class SecretsManagerV2 extends BaseService {
510
510
  * of your secret.
511
511
  *
512
512
  * @param {Object} params - The parameters to send to the service.
513
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
513
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
514
514
  * @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
515
515
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
516
516
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
@@ -522,8 +522,8 @@ declare class SecretsManagerV2 extends BaseService {
522
522
  * List the locks that are associated with a specified secret version.
523
523
  *
524
524
  * @param {Object} params - The parameters to send to the service.
525
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
526
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
525
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
526
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
527
527
  * `previous` aliases to refer to the current or previous secret version.
528
528
  * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
529
529
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
@@ -567,8 +567,8 @@ declare class SecretsManagerV2 extends BaseService {
567
567
  * the data of the previous secret version if it doesn't have any locks.
568
568
  *
569
569
  * @param {Object} params - The parameters to send to the service.
570
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
571
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
570
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
571
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
572
572
  * `previous` aliases to refer to the current or previous secret version.
573
573
  * @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
574
574
  * @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
@@ -594,8 +594,8 @@ declare class SecretsManagerV2 extends BaseService {
594
594
  * of your secret.
595
595
  *
596
596
  * @param {Object} params - The parameters to send to the service.
597
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
598
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
597
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
598
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
599
599
  * `previous` aliases to refer to the current or previous secret version.
600
600
  * @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
601
601
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -725,6 +725,8 @@ declare class SecretsManagerV2 extends BaseService {
725
725
  * authority certificate.
726
726
  * - `private_cert_configuration_action_rotate_crl`: Rotate the certificate revocation list (CRL) of an intermediate
727
727
  * certificate authority.
728
+ * - `private_cert_configuration_action_rotate_intermediate`: Rotate an internally signed intermediate certificate
729
+ * authority certificate.
728
730
  *
729
731
  * @param {Object} params - The parameters to send to the service.
730
732
  * @param {string} params.name - The name that uniquely identifies a configuration.
@@ -837,13 +839,13 @@ declare namespace SecretsManagerV2 {
837
839
  }
838
840
  /** Parameters for the `getSecretGroup` operation. */
839
841
  interface GetSecretGroupParams {
840
- /** The v4 UUID that uniquely identifies your secret group. */
842
+ /** The UUID that uniquely identifies your secret group. */
841
843
  id: string;
842
844
  headers?: OutgoingHttpHeaders;
843
845
  }
844
846
  /** Parameters for the `updateSecretGroup` operation. */
845
847
  interface UpdateSecretGroupParams {
846
- /** The v4 UUID that uniquely identifies your secret group. */
848
+ /** The UUID that uniquely identifies your secret group. */
847
849
  id: string;
848
850
  /** The name of your secret group. */
849
851
  name?: string;
@@ -857,7 +859,7 @@ declare namespace SecretsManagerV2 {
857
859
  }
858
860
  /** Parameters for the `deleteSecretGroup` operation. */
859
861
  interface DeleteSecretGroupParams {
860
- /** The v4 UUID that uniquely identifies your secret group. */
862
+ /** The UUID that uniquely identifies your secret group. */
861
863
  id: string;
862
864
  headers?: OutgoingHttpHeaders;
863
865
  }
@@ -944,32 +946,32 @@ declare namespace SecretsManagerV2 {
944
946
  }
945
947
  /** Parameters for the `getSecret` operation. */
946
948
  interface GetSecretParams {
947
- /** The v4 UUID that uniquely identifies your secret. */
949
+ /** The UUID that uniquely identifies your secret. */
948
950
  id: string;
949
951
  headers?: OutgoingHttpHeaders;
950
952
  }
951
953
  /** Parameters for the `deleteSecret` operation. */
952
954
  interface DeleteSecretParams {
953
- /** The v4 UUID that uniquely identifies your secret. */
955
+ /** The UUID that uniquely identifies your secret. */
954
956
  id: string;
955
957
  headers?: OutgoingHttpHeaders;
956
958
  }
957
959
  /** Parameters for the `getSecretMetadata` operation. */
958
960
  interface GetSecretMetadataParams {
959
- /** The v4 UUID that uniquely identifies your secret. */
961
+ /** The UUID that uniquely identifies your secret. */
960
962
  id: string;
961
963
  headers?: OutgoingHttpHeaders;
962
964
  }
963
965
  /** Parameters for the `updateSecretMetadata` operation. */
964
966
  interface UpdateSecretMetadataParams {
965
- /** The v4 UUID that uniquely identifies your secret. */
967
+ /** The UUID that uniquely identifies your secret. */
966
968
  id: string;
967
969
  secretMetadataPatch: SecretMetadataPatch;
968
970
  headers?: OutgoingHttpHeaders;
969
971
  }
970
972
  /** Parameters for the `createSecretAction` operation. */
971
973
  interface CreateSecretActionParams {
972
- /** The v4 UUID that uniquely identifies your secret. */
974
+ /** The UUID that uniquely identifies your secret. */
973
975
  id: string;
974
976
  secretActionPrototype: SecretActionPrototype;
975
977
  headers?: OutgoingHttpHeaders;
@@ -1004,22 +1006,22 @@ declare namespace SecretsManagerV2 {
1004
1006
  }
1005
1007
  /** Parameters for the `createSecretVersion` operation. */
1006
1008
  interface CreateSecretVersionParams {
1007
- /** The v4 UUID that uniquely identifies your secret. */
1009
+ /** The UUID that uniquely identifies your secret. */
1008
1010
  secretId: string;
1009
1011
  secretVersionPrototype: SecretVersionPrototype;
1010
1012
  headers?: OutgoingHttpHeaders;
1011
1013
  }
1012
1014
  /** Parameters for the `listSecretVersions` operation. */
1013
1015
  interface ListSecretVersionsParams {
1014
- /** The v4 UUID that uniquely identifies your secret. */
1016
+ /** The UUID that uniquely identifies your secret. */
1015
1017
  secretId: string;
1016
1018
  headers?: OutgoingHttpHeaders;
1017
1019
  }
1018
1020
  /** Parameters for the `getSecretVersion` operation. */
1019
1021
  interface GetSecretVersionParams {
1020
- /** The v4 UUID that uniquely identifies your secret. */
1022
+ /** The UUID that uniquely identifies your secret. */
1021
1023
  secretId: string;
1022
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1024
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1023
1025
  * refer to the current or previous secret version.
1024
1026
  */
1025
1027
  id: string;
@@ -1027,9 +1029,9 @@ declare namespace SecretsManagerV2 {
1027
1029
  }
1028
1030
  /** Parameters for the `deleteSecretVersionData` operation. */
1029
1031
  interface DeleteSecretVersionDataParams {
1030
- /** The v4 UUID that uniquely identifies your secret. */
1032
+ /** The UUID that uniquely identifies your secret. */
1031
1033
  secretId: string;
1032
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1034
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1033
1035
  * refer to the current or previous secret version.
1034
1036
  */
1035
1037
  id: string;
@@ -1037,9 +1039,9 @@ declare namespace SecretsManagerV2 {
1037
1039
  }
1038
1040
  /** Parameters for the `getSecretVersionMetadata` operation. */
1039
1041
  interface GetSecretVersionMetadataParams {
1040
- /** The v4 UUID that uniquely identifies your secret. */
1042
+ /** The UUID that uniquely identifies your secret. */
1041
1043
  secretId: string;
1042
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1044
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1043
1045
  * refer to the current or previous secret version.
1044
1046
  */
1045
1047
  id: string;
@@ -1047,9 +1049,9 @@ declare namespace SecretsManagerV2 {
1047
1049
  }
1048
1050
  /** Parameters for the `updateSecretVersionMetadata` operation. */
1049
1051
  interface UpdateSecretVersionMetadataParams {
1050
- /** The v4 UUID that uniquely identifies your secret. */
1052
+ /** The UUID that uniquely identifies your secret. */
1051
1053
  secretId: string;
1052
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1054
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1053
1055
  * refer to the current or previous secret version.
1054
1056
  */
1055
1057
  id: string;
@@ -1059,9 +1061,9 @@ declare namespace SecretsManagerV2 {
1059
1061
  }
1060
1062
  /** Parameters for the `createSecretVersionAction` operation. */
1061
1063
  interface CreateSecretVersionActionParams {
1062
- /** The v4 UUID that uniquely identifies your secret. */
1064
+ /** The UUID that uniquely identifies your secret. */
1063
1065
  secretId: string;
1064
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1066
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1065
1067
  * refer to the current or previous secret version.
1066
1068
  */
1067
1069
  id: string;
@@ -1104,7 +1106,7 @@ declare namespace SecretsManagerV2 {
1104
1106
  }
1105
1107
  /** Parameters for the `listSecretLocks` operation. */
1106
1108
  interface ListSecretLocksParams {
1107
- /** The v4 UUID that uniquely identifies your secret. */
1109
+ /** The UUID that uniquely identifies your secret. */
1108
1110
  id: string;
1109
1111
  /** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1110
1112
  * `offset` value. Use `offset` with `limit` to page through your available resources.
@@ -1139,7 +1141,7 @@ declare namespace SecretsManagerV2 {
1139
1141
  }
1140
1142
  /** Parameters for the `createSecretLocksBulk` operation. */
1141
1143
  interface CreateSecretLocksBulkParams {
1142
- /** The v4 UUID that uniquely identifies your secret. */
1144
+ /** The UUID that uniquely identifies your secret. */
1143
1145
  id: string;
1144
1146
  /** The locks data to be attached to a secret version. */
1145
1147
  locks: SecretLockPrototype[];
@@ -1162,7 +1164,7 @@ declare namespace SecretsManagerV2 {
1162
1164
  }
1163
1165
  /** Parameters for the `deleteSecretLocksBulk` operation. */
1164
1166
  interface DeleteSecretLocksBulkParams {
1165
- /** The v4 UUID that uniquely identifies your secret. */
1167
+ /** The UUID that uniquely identifies your secret. */
1166
1168
  id: string;
1167
1169
  /** Specify the names of the secret locks to be deleted. */
1168
1170
  name?: string[];
@@ -1170,9 +1172,9 @@ declare namespace SecretsManagerV2 {
1170
1172
  }
1171
1173
  /** Parameters for the `listSecretVersionLocks` operation. */
1172
1174
  interface ListSecretVersionLocksParams {
1173
- /** The v4 UUID that uniquely identifies your secret. */
1175
+ /** The UUID that uniquely identifies your secret. */
1174
1176
  secretId: string;
1175
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1177
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1176
1178
  * refer to the current or previous secret version.
1177
1179
  */
1178
1180
  id: string;
@@ -1209,9 +1211,9 @@ declare namespace SecretsManagerV2 {
1209
1211
  }
1210
1212
  /** Parameters for the `createSecretVersionLocksBulk` operation. */
1211
1213
  interface CreateSecretVersionLocksBulkParams {
1212
- /** The v4 UUID that uniquely identifies your secret. */
1214
+ /** The UUID that uniquely identifies your secret. */
1213
1215
  secretId: string;
1214
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1216
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1215
1217
  * refer to the current or previous secret version.
1216
1218
  */
1217
1219
  id: string;
@@ -1236,9 +1238,9 @@ declare namespace SecretsManagerV2 {
1236
1238
  }
1237
1239
  /** Parameters for the `deleteSecretVersionLocksBulk` operation. */
1238
1240
  interface DeleteSecretVersionLocksBulkParams {
1239
- /** The v4 UUID that uniquely identifies your secret. */
1241
+ /** The UUID that uniquely identifies your secret. */
1240
1242
  secretId: string;
1241
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1243
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1242
1244
  * refer to the current or previous secret version.
1243
1245
  */
1244
1246
  id: string;
@@ -1534,6 +1536,200 @@ declare namespace SecretsManagerV2 {
1534
1536
  */
1535
1537
  interface ConfigurationPrototype {
1536
1538
  }
1539
+ /**
1540
+ * The data specified to create the CSR and the private key.
1541
+ */
1542
+ interface ImportedCertificateManagedCsr {
1543
+ /** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
1544
+ ou?: string[];
1545
+ /** The Organization (O) values to define in the subject field of the resulting certificate. */
1546
+ organization?: string[];
1547
+ /** The Country (C) values to define in the subject field of the resulting certificate. */
1548
+ country?: string[];
1549
+ /** The Locality (L) values to define in the subject field of the resulting certificate. */
1550
+ locality?: string[];
1551
+ /** The Province (ST) values to define in the subject field of the resulting certificate. */
1552
+ province?: string[];
1553
+ /** The street address values to define in the subject field of the resulting certificate. */
1554
+ street_address?: string[];
1555
+ /** The postal code values to define in the subject field of the resulting certificate. */
1556
+ postal_code?: string[];
1557
+ /** If set to false, makes the common_name field optional while generating a certificate. */
1558
+ require_cn?: boolean;
1559
+ /** The Common Name (CN) represents the server name protected by the SSL certificate. */
1560
+ common_name?: string;
1561
+ /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
1562
+ * SSL certificate.
1563
+ */
1564
+ alt_names?: string;
1565
+ /** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1566
+ ip_sans?: string;
1567
+ /** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1568
+ uri_sans?: string;
1569
+ /** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
1570
+ * in a comma-delimited list.
1571
+ *
1572
+ * The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
1573
+ */
1574
+ other_sans?: string;
1575
+ /** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
1576
+ *
1577
+ * If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
1578
+ * useful if the common name is a human-readable identifier, instead of a hostname or an email address.
1579
+ */
1580
+ exclude_cn_from_sans?: boolean;
1581
+ /** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
1582
+ * signed certificate.
1583
+ */
1584
+ user_ids?: string;
1585
+ /** This field indicates whether certificate is flagged for server use. */
1586
+ server_flag?: boolean;
1587
+ /** This field indicates whether certificate is flagged for client use. */
1588
+ client_flag?: boolean;
1589
+ /** This field indicates whether certificate is flagged for code signing use. */
1590
+ code_signing_flag?: boolean;
1591
+ /** This field indicates whether certificate is flagged for email protection use. */
1592
+ email_protection_flag?: boolean;
1593
+ /** The type of private key to generate. */
1594
+ key_type?: ImportedCertificateManagedCsr.Constants.KeyType | string;
1595
+ /** The number of bits to use to generate the private key.
1596
+ *
1597
+ * Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
1598
+ * `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
1599
+ * ed25519 keys.
1600
+ */
1601
+ key_bits?: number;
1602
+ /** The allowed key usage constraint to define for certificate, in a comma-delimited list.
1603
+ *
1604
+ * You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
1605
+ * the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
1606
+ * field to an empty string.
1607
+ */
1608
+ key_usage?: string;
1609
+ /** The allowed extended key usage constraint on certificate, in a comma-delimited list.
1610
+ *
1611
+ * You can find valid values in the [Go x509 package
1612
+ * documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
1613
+ * Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
1614
+ */
1615
+ ext_key_usage?: string;
1616
+ /** A comma-delimited list of policy Object Identifiers (OIDs). */
1617
+ policy_identifiers?: string;
1618
+ /** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
1619
+ ext_key_usage_oids?: string;
1620
+ /** This field indicates whether the private key will be rotated. */
1621
+ rotate_keys?: boolean;
1622
+ }
1623
+ namespace ImportedCertificateManagedCsr {
1624
+ namespace Constants {
1625
+ /** The type of private key to generate. */
1626
+ enum KeyType {
1627
+ RSA = "rsa",
1628
+ EC = "ec",
1629
+ ED25519 = "ed25519"
1630
+ }
1631
+ }
1632
+ }
1633
+ /**
1634
+ * The data specified to create the CSR and the private key.
1635
+ */
1636
+ interface ImportedCertificateManagedCsrResponse {
1637
+ /** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
1638
+ ou: string[];
1639
+ /** The Organization (O) values to define in the subject field of the resulting certificate. */
1640
+ organization: string[];
1641
+ /** The Country (C) values to define in the subject field of the resulting certificate. */
1642
+ country: string[];
1643
+ /** The Locality (L) values to define in the subject field of the resulting certificate. */
1644
+ locality: string[];
1645
+ /** The Province (ST) values to define in the subject field of the resulting certificate. */
1646
+ province: string[];
1647
+ /** The street address values to define in the subject field of the resulting certificate. */
1648
+ street_address: string[];
1649
+ /** The postal code values to define in the subject field of the resulting certificate. */
1650
+ postal_code: string[];
1651
+ /** If set to false, makes the common_name field optional while generating a certificate. */
1652
+ require_cn: boolean;
1653
+ /** The Common Name (CN) represents the server name protected by the SSL certificate. */
1654
+ common_name?: string;
1655
+ /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
1656
+ * SSL certificate.
1657
+ */
1658
+ alt_names?: string;
1659
+ /** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1660
+ ip_sans?: string;
1661
+ /** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1662
+ uri_sans?: string;
1663
+ /** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
1664
+ * in a comma-delimited list.
1665
+ *
1666
+ * The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
1667
+ */
1668
+ other_sans?: string;
1669
+ /** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
1670
+ *
1671
+ * If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
1672
+ * useful if the common name is a human-readable identifier, instead of a hostname or an email address.
1673
+ */
1674
+ exclude_cn_from_sans: boolean;
1675
+ /** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
1676
+ * signed certificate.
1677
+ */
1678
+ user_ids?: string;
1679
+ /** This field indicates whether certificate is flagged for server use. */
1680
+ server_flag: boolean;
1681
+ /** This field indicates whether certificate is flagged for client use. */
1682
+ client_flag: boolean;
1683
+ /** This field indicates whether certificate is flagged for code signing use. */
1684
+ code_signing_flag: boolean;
1685
+ /** This field indicates whether certificate is flagged for email protection use. */
1686
+ email_protection_flag: boolean;
1687
+ /** The type of private key to generate. */
1688
+ key_type: ImportedCertificateManagedCsrResponse.Constants.KeyType | string;
1689
+ /** The number of bits to use to generate the private key.
1690
+ *
1691
+ * Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
1692
+ * `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
1693
+ * ed25519 keys.
1694
+ */
1695
+ key_bits: number;
1696
+ /** The allowed key usage constraint to define for certificate, in a comma-delimited list.
1697
+ *
1698
+ * You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
1699
+ * the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
1700
+ * field to an empty string.
1701
+ */
1702
+ key_usage?: string;
1703
+ /** The allowed extended key usage constraint on certificate, in a comma-delimited list.
1704
+ *
1705
+ * You can find valid values in the [Go x509 package
1706
+ * documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
1707
+ * Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
1708
+ */
1709
+ ext_key_usage?: string;
1710
+ /** A comma-delimited list of policy Object Identifiers (OIDs). */
1711
+ policy_identifiers?: string;
1712
+ /** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
1713
+ ext_key_usage_oids?: string;
1714
+ /** This field indicates whether the private key will be rotated. */
1715
+ rotate_keys?: boolean;
1716
+ /** The certificate signing request. */
1717
+ csr: string;
1718
+ /** The PEM-encoded private key that is associated with the certificate. The data must be formatted on a single
1719
+ * line with embedded newline characters.
1720
+ */
1721
+ private_key: string;
1722
+ }
1723
+ namespace ImportedCertificateManagedCsrResponse {
1724
+ namespace Constants {
1725
+ /** The type of private key to generate. */
1726
+ enum KeyType {
1727
+ RSA = "rsa",
1728
+ EC = "ec",
1729
+ ED25519 = "ed25519"
1730
+ }
1731
+ }
1732
+ }
1537
1733
  /**
1538
1734
  * The details of the Event Notifications registration.
1539
1735
  */
@@ -1614,6 +1810,96 @@ declare namespace SecretsManagerV2 {
1614
1810
  */
1615
1811
  interface PrivateCertificateCAData {
1616
1812
  }
1813
+ /**
1814
+ * The response body of the action to rotate an intermediate certificate authority for the private certificate
1815
+ * configuration.
1816
+ */
1817
+ interface PrivateCertificateConfigurationRotateAction {
1818
+ /** The Common Name (CN) represents the server name that is protected by the SSL certificate. */
1819
+ common_name?: string;
1820
+ /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
1821
+ * SSL certificate.
1822
+ */
1823
+ alt_names?: string[];
1824
+ /** The IP Subject Alternative Names to define for the CA certificate, in a comma-delimited list. */
1825
+ ip_sans?: string;
1826
+ /** The URI Subject Alternative Names to define for the CA certificate, in a comma-delimited list. */
1827
+ uri_sans?: string;
1828
+ /** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the CA
1829
+ * certificate.
1830
+ *
1831
+ * The alternative names must match the values that are specified in the `allowed_other_sans` field in the
1832
+ * associated certificate template. The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current
1833
+ * valid type is `UTF8`.
1834
+ */
1835
+ other_sans?: string[];
1836
+ /** he requested TTL, after which the certificate expires. */
1837
+ ttl?: number;
1838
+ /** The format of the returned data. */
1839
+ format?: PrivateCertificateConfigurationRotateAction.Constants.Format | string;
1840
+ /** The maximum path length to encode in the generated certificate. `-1` means no limit.
1841
+ *
1842
+ * If the signing certificate has a maximum path length set, the path length is set to one less than that of the
1843
+ * signing certificate. A limit of `0` means a literal path length of zero.
1844
+ */
1845
+ max_path_length?: number;
1846
+ /** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
1847
+ *
1848
+ * If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
1849
+ * useful if the common name is a human-readable identifier, instead of a hostname or an email address.
1850
+ */
1851
+ exclude_cn_from_sans?: boolean;
1852
+ /** The allowed DNS domains or subdomains for the certificates that are to be signed and issued by this CA
1853
+ * certificate.
1854
+ */
1855
+ permitted_dns_domains?: string[];
1856
+ /** This field indicates whether to use values from a certificate signing request (CSR) to complete a
1857
+ * `private_cert_configuration_action_sign_csr` action. If it is set to `true`, then:
1858
+ *
1859
+ * 1) Subject information, including names and alternate names, are preserved from the CSR rather than by using the
1860
+ * values that are provided in the other parameters to this operation.
1861
+ *
1862
+ * 2) Any key usage, for example, non-repudiation, that is requested in the CSR are added to the basic set of key
1863
+ * usages used for CA certificates that are signed by the intermediate authority.
1864
+ *
1865
+ * 3) Extensions that are requested in the CSR are copied into the issued private certificate.
1866
+ */
1867
+ use_csr_values?: boolean;
1868
+ /** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
1869
+ ou?: string[];
1870
+ /** The Organization (O) values to define in the subject field of the resulting certificate. */
1871
+ organization?: string[];
1872
+ /** The Country (C) values to define in the subject field of the resulting certificate. */
1873
+ country?: string[];
1874
+ /** The Locality (L) values to define in the subject field of the resulting certificate. */
1875
+ locality?: string[];
1876
+ /** The Province (ST) values to define in the subject field of the resulting certificate. */
1877
+ province?: string[];
1878
+ /** The street address values to define in the subject field of the resulting certificate. */
1879
+ street_address?: string[];
1880
+ /** The postal code values to define in the subject field of the resulting certificate. */
1881
+ postal_code?: string[];
1882
+ /** The requested value for the [`serialNumber`](https://datatracker.ietf.org/doc/html/rfc4519#section-2.31)
1883
+ * attribute that is in the certificate's distinguished name (DN).
1884
+ *
1885
+ * **Note:** This field is not related to the `serial_number` field that is returned in the API response. The
1886
+ * `serial_number` field represents the certificate's randomly assigned serial number.
1887
+ */
1888
+ serial_number?: string;
1889
+ /** The certificate signing request. */
1890
+ csr?: string;
1891
+ /** The data that is associated with the root certificate authority. */
1892
+ data?: PrivateCertificateConfigurationCACertificate;
1893
+ }
1894
+ namespace PrivateCertificateConfigurationRotateAction {
1895
+ namespace Constants {
1896
+ /** The format of the returned data. */
1897
+ enum Format {
1898
+ PEM = "pem",
1899
+ PEM_BUNDLE = "pem_bundle"
1900
+ }
1901
+ }
1902
+ }
1617
1903
  /**
1618
1904
  * The data that is associated with a cryptographic key.
1619
1905
  */
@@ -1677,7 +1963,7 @@ declare namespace SecretsManagerV2 {
1677
1963
  * Properties that describe a secret group.
1678
1964
  */
1679
1965
  interface SecretGroup {
1680
- /** A v4 UUID identifier, or `default` secret group. */
1966
+ /** A UUID identifier, or `default` secret group. */
1681
1967
  id: string;
1682
1968
  /** The name of your existing secret group. */
1683
1969
  name?: string;
@@ -1727,11 +2013,11 @@ declare namespace SecretsManagerV2 {
1727
2013
  updated_at: string;
1728
2014
  /** The unique identifier that is associated with the entity that created the secret. */
1729
2015
  created_by: string;
1730
- /** A v4 UUID identifier, or `default` secret group. */
2016
+ /** A UUID identifier, or `default` secret group. */
1731
2017
  secret_group_id: string;
1732
- /** A v4 UUID identifier. */
2018
+ /** A UUID identifier. */
1733
2019
  secret_id: string;
1734
- /** A v4 UUID identifier. */
2020
+ /** A UUID identifier. */
1735
2021
  secret_version_id: string;
1736
2022
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
1737
2023
  * is used for version `n-1`.
@@ -1770,14 +2056,14 @@ declare namespace SecretsManagerV2 {
1770
2056
  * Create locks response body containing a collection of locks that are attached to a secret.
1771
2057
  */
1772
2058
  interface SecretLocks {
1773
- /** A v4 UUID identifier. */
2059
+ /** A UUID identifier. */
1774
2060
  secret_id: string;
1775
- /** A v4 UUID identifier, or `default` secret group. */
2061
+ /** A UUID identifier, or `default` secret group. */
1776
2062
  secret_group_id: string;
1777
2063
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
1778
2064
  * service_credentials, kv, and username_password.
1779
2065
  */
1780
- secret_type?: SecretLocks.Constants.SecretType | string;
2066
+ secret_type: SecretLocks.Constants.SecretType | string;
1781
2067
  /** The human-readable name of your secret. */
1782
2068
  secret_name?: string;
1783
2069
  /** A collection of locks that are attached to a secret. */
@@ -1869,7 +2155,7 @@ declare namespace SecretsManagerV2 {
1869
2155
  * SecretVersionLocks.
1870
2156
  */
1871
2157
  interface SecretVersionLocks {
1872
- /** A v4 UUID identifier. */
2158
+ /** A UUID identifier. */
1873
2159
  version_id: string;
1874
2160
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
1875
2161
  * is used for version `n-1`.
@@ -2123,7 +2409,7 @@ declare namespace SecretsManagerV2 {
2123
2409
  * call to the service API.
2124
2410
  */
2125
2411
  downloaded?: boolean;
2126
- /** A v4 UUID identifier. */
2412
+ /** A UUID identifier. */
2127
2413
  id: string;
2128
2414
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2129
2415
  *
@@ -2136,7 +2422,7 @@ declare namespace SecretsManagerV2 {
2136
2422
  locks_total?: number;
2137
2423
  /** The human-readable name of your secret. */
2138
2424
  name?: string;
2139
- /** A v4 UUID identifier, or `default` secret group. */
2425
+ /** A UUID identifier, or `default` secret group. */
2140
2426
  secret_group_id: string;
2141
2427
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2142
2428
  * service_credentials, kv, and username_password.
@@ -2206,7 +2492,7 @@ declare namespace SecretsManagerV2 {
2206
2492
  * call to the service API.
2207
2493
  */
2208
2494
  downloaded?: boolean;
2209
- /** A v4 UUID identifier. */
2495
+ /** A UUID identifier. */
2210
2496
  id: string;
2211
2497
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2212
2498
  *
@@ -2219,7 +2505,7 @@ declare namespace SecretsManagerV2 {
2219
2505
  locks_total?: number;
2220
2506
  /** The human-readable name of your secret. */
2221
2507
  name?: string;
2222
- /** A v4 UUID identifier, or `default` secret group. */
2508
+ /** A UUID identifier, or `default` secret group. */
2223
2509
  secret_group_id: string;
2224
2510
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2225
2511
  * service_credentials, kv, and username_password.
@@ -2322,7 +2608,7 @@ declare namespace SecretsManagerV2 {
2322
2608
  * To protect your privacy, do not use personal data, such as your name or location, as a name for your secret.
2323
2609
  */
2324
2610
  name: string;
2325
- /** A v4 UUID identifier, or `default` secret group. */
2611
+ /** A UUID identifier, or `default` secret group. */
2326
2612
  secret_group_id?: string;
2327
2613
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2328
2614
  * service_credentials, kv, and username_password.
@@ -2362,7 +2648,7 @@ declare namespace SecretsManagerV2 {
2362
2648
  * call to the service API.
2363
2649
  */
2364
2650
  downloaded?: boolean;
2365
- /** A v4 UUID identifier. */
2651
+ /** A UUID identifier. */
2366
2652
  id: string;
2367
2653
  /** The human-readable name of your secret. */
2368
2654
  secret_name?: string;
@@ -2370,7 +2656,7 @@ declare namespace SecretsManagerV2 {
2370
2656
  * service_credentials, kv, and username_password.
2371
2657
  */
2372
2658
  secret_type: ArbitrarySecretVersion.Constants.SecretType | string;
2373
- /** A v4 UUID identifier, or `default` secret group. */
2659
+ /** A UUID identifier, or `default` secret group. */
2374
2660
  secret_group_id: string;
2375
2661
  /** Indicates whether the secret payload is available in this secret version. */
2376
2662
  payload_available: boolean;
@@ -2380,7 +2666,7 @@ declare namespace SecretsManagerV2 {
2380
2666
  alias?: ArbitrarySecretVersion.Constants.Alias | string;
2381
2667
  /** The secret version metadata that a user can customize. */
2382
2668
  version_custom_metadata?: JsonObject;
2383
- /** A v4 UUID identifier. */
2669
+ /** A UUID identifier. */
2384
2670
  secret_id: string;
2385
2671
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
2386
2672
  * types: Arbitrary, username_password.
@@ -2423,7 +2709,7 @@ declare namespace SecretsManagerV2 {
2423
2709
  * call to the service API.
2424
2710
  */
2425
2711
  downloaded?: boolean;
2426
- /** A v4 UUID identifier. */
2712
+ /** A UUID identifier. */
2427
2713
  id: string;
2428
2714
  /** The human-readable name of your secret. */
2429
2715
  secret_name?: string;
@@ -2431,7 +2717,7 @@ declare namespace SecretsManagerV2 {
2431
2717
  * service_credentials, kv, and username_password.
2432
2718
  */
2433
2719
  secret_type: ArbitrarySecretVersionMetadata.Constants.SecretType | string;
2434
- /** A v4 UUID identifier, or `default` secret group. */
2720
+ /** A UUID identifier, or `default` secret group. */
2435
2721
  secret_group_id: string;
2436
2722
  /** Indicates whether the secret payload is available in this secret version. */
2437
2723
  payload_available: boolean;
@@ -2441,7 +2727,7 @@ declare namespace SecretsManagerV2 {
2441
2727
  alias?: ArbitrarySecretVersionMetadata.Constants.Alias | string;
2442
2728
  /** The secret version metadata that a user can customize. */
2443
2729
  version_custom_metadata?: JsonObject;
2444
- /** A v4 UUID identifier. */
2730
+ /** A UUID identifier. */
2445
2731
  secret_id: string;
2446
2732
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
2447
2733
  * types: Arbitrary, username_password.
@@ -2686,7 +2972,7 @@ declare namespace SecretsManagerV2 {
2686
2972
  * call to the service API.
2687
2973
  */
2688
2974
  downloaded?: boolean;
2689
- /** A v4 UUID identifier. */
2975
+ /** A UUID identifier. */
2690
2976
  id: string;
2691
2977
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2692
2978
  *
@@ -2699,7 +2985,7 @@ declare namespace SecretsManagerV2 {
2699
2985
  locks_total?: number;
2700
2986
  /** The human-readable name of your secret. */
2701
2987
  name?: string;
2702
- /** A v4 UUID identifier, or `default` secret group. */
2988
+ /** A UUID identifier, or `default` secret group. */
2703
2989
  secret_group_id: string;
2704
2990
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2705
2991
  * service_credentials, kv, and username_password.
@@ -2827,7 +3113,7 @@ declare namespace SecretsManagerV2 {
2827
3113
  * call to the service API.
2828
3114
  */
2829
3115
  downloaded?: boolean;
2830
- /** A v4 UUID identifier. */
3116
+ /** A UUID identifier. */
2831
3117
  id: string;
2832
3118
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2833
3119
  *
@@ -2840,7 +3126,7 @@ declare namespace SecretsManagerV2 {
2840
3126
  locks_total?: number;
2841
3127
  /** The human-readable name of your secret. */
2842
3128
  name?: string;
2843
- /** A v4 UUID identifier, or `default` secret group. */
3129
+ /** A UUID identifier, or `default` secret group. */
2844
3130
  secret_group_id: string;
2845
3131
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2846
3132
  * service_credentials, kv, and username_password.
@@ -2996,7 +3282,7 @@ declare namespace SecretsManagerV2 {
2996
3282
  * secret group.
2997
3283
  */
2998
3284
  description?: string;
2999
- /** A v4 UUID identifier, or `default` secret group. */
3285
+ /** A UUID identifier, or `default` secret group. */
3000
3286
  secret_group_id?: string;
3001
3287
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3002
3288
  *
@@ -3068,7 +3354,7 @@ declare namespace SecretsManagerV2 {
3068
3354
  * IAMCredentialsSecretRestoreFromVersionPrototype.
3069
3355
  */
3070
3356
  interface IAMCredentialsSecretRestoreFromVersionPrototype extends SecretVersionPrototype {
3071
- /** A v4 UUID identifier, or `current` or `previous` secret version aliases. */
3357
+ /** A UUID identifier, or `current` or `previous` secret version aliases. */
3072
3358
  restore_from_version: string;
3073
3359
  /** The secret metadata that a user can customize. */
3074
3360
  custom_metadata?: JsonObject;
@@ -3089,7 +3375,7 @@ declare namespace SecretsManagerV2 {
3089
3375
  * call to the service API.
3090
3376
  */
3091
3377
  downloaded?: boolean;
3092
- /** A v4 UUID identifier. */
3378
+ /** A UUID identifier. */
3093
3379
  id: string;
3094
3380
  /** The human-readable name of your secret. */
3095
3381
  secret_name?: string;
@@ -3097,7 +3383,7 @@ declare namespace SecretsManagerV2 {
3097
3383
  * service_credentials, kv, and username_password.
3098
3384
  */
3099
3385
  secret_type: IAMCredentialsSecretVersion.Constants.SecretType | string;
3100
- /** A v4 UUID identifier, or `default` secret group. */
3386
+ /** A UUID identifier, or `default` secret group. */
3101
3387
  secret_group_id: string;
3102
3388
  /** Indicates whether the secret payload is available in this secret version. */
3103
3389
  payload_available: boolean;
@@ -3107,7 +3393,7 @@ declare namespace SecretsManagerV2 {
3107
3393
  alias?: IAMCredentialsSecretVersion.Constants.Alias | string;
3108
3394
  /** The secret version metadata that a user can customize. */
3109
3395
  version_custom_metadata?: JsonObject;
3110
- /** A v4 UUID identifier. */
3396
+ /** A UUID identifier. */
3111
3397
  secret_id: string;
3112
3398
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3113
3399
  * types: Arbitrary, username_password.
@@ -3167,7 +3453,7 @@ declare namespace SecretsManagerV2 {
3167
3453
  * call to the service API.
3168
3454
  */
3169
3455
  downloaded?: boolean;
3170
- /** A v4 UUID identifier. */
3456
+ /** A UUID identifier. */
3171
3457
  id: string;
3172
3458
  /** The human-readable name of your secret. */
3173
3459
  secret_name?: string;
@@ -3175,7 +3461,7 @@ declare namespace SecretsManagerV2 {
3175
3461
  * service_credentials, kv, and username_password.
3176
3462
  */
3177
3463
  secret_type: IAMCredentialsSecretVersionMetadata.Constants.SecretType | string;
3178
- /** A v4 UUID identifier, or `default` secret group. */
3464
+ /** A UUID identifier, or `default` secret group. */
3179
3465
  secret_group_id: string;
3180
3466
  /** Indicates whether the secret payload is available in this secret version. */
3181
3467
  payload_available: boolean;
@@ -3185,7 +3471,7 @@ declare namespace SecretsManagerV2 {
3185
3471
  alias?: IAMCredentialsSecretVersionMetadata.Constants.Alias | string;
3186
3472
  /** The secret version metadata that a user can customize. */
3187
3473
  version_custom_metadata?: JsonObject;
3188
- /** A v4 UUID identifier. */
3474
+ /** A UUID identifier. */
3189
3475
  secret_id: string;
3190
3476
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3191
3477
  * types: Arbitrary, username_password.
@@ -3255,7 +3541,7 @@ declare namespace SecretsManagerV2 {
3255
3541
  * call to the service API.
3256
3542
  */
3257
3543
  downloaded?: boolean;
3258
- /** A v4 UUID identifier. */
3544
+ /** A UUID identifier. */
3259
3545
  id: string;
3260
3546
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3261
3547
  *
@@ -3268,7 +3554,7 @@ declare namespace SecretsManagerV2 {
3268
3554
  locks_total?: number;
3269
3555
  /** The human-readable name of your secret. */
3270
3556
  name?: string;
3271
- /** A v4 UUID identifier, or `default` secret group. */
3557
+ /** A UUID identifier, or `default` secret group. */
3272
3558
  secret_group_id: string;
3273
3559
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3274
3560
  * service_credentials, kv, and username_password.
@@ -3289,7 +3575,7 @@ declare namespace SecretsManagerV2 {
3289
3575
  /** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
3290
3576
  * certificate.
3291
3577
  */
3292
- signing_algorithm: string;
3578
+ signing_algorithm?: string;
3293
3579
  /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
3294
3580
  * SSL certificate.
3295
3581
  */
@@ -3299,23 +3585,25 @@ declare namespace SecretsManagerV2 {
3299
3585
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3300
3586
  * types: Arbitrary, username_password.
3301
3587
  */
3302
- expiration_date: string;
3588
+ expiration_date?: string;
3303
3589
  /** Indicates whether the certificate was imported with an associated intermediate certificate. */
3304
- intermediate_included: boolean;
3590
+ intermediate_included?: boolean;
3305
3591
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3306
- issuer: string;
3592
+ issuer?: string;
3307
3593
  /** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
3308
3594
  * certificate.
3309
3595
  */
3310
3596
  key_algorithm?: string;
3311
3597
  /** Indicates whether the certificate was imported with an associated private key. */
3312
- private_key_included: boolean;
3598
+ private_key_included?: boolean;
3313
3599
  /** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
3314
- serial_number: string;
3600
+ serial_number?: string;
3315
3601
  /** The date and time that the certificate validity period begins and ends. */
3316
- validity: CertificateValidity;
3602
+ validity?: CertificateValidity;
3603
+ /** The data specified to create the CSR and the private key. */
3604
+ managed_csr?: ImportedCertificateManagedCsrResponse;
3317
3605
  /** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
3318
- certificate: string;
3606
+ certificate?: string;
3319
3607
  /** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
3320
3608
  * formatted on a single line with embedded newline characters.
3321
3609
  */
@@ -3324,6 +3612,8 @@ declare namespace SecretsManagerV2 {
3324
3612
  * line with embedded newline characters.
3325
3613
  */
3326
3614
  private_key?: string;
3615
+ /** The certificate signing request. */
3616
+ csr?: string;
3327
3617
  }
3328
3618
  namespace ImportedCertificate {
3329
3619
  namespace Constants {
@@ -3370,7 +3660,7 @@ declare namespace SecretsManagerV2 {
3370
3660
  * call to the service API.
3371
3661
  */
3372
3662
  downloaded?: boolean;
3373
- /** A v4 UUID identifier. */
3663
+ /** A UUID identifier. */
3374
3664
  id: string;
3375
3665
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3376
3666
  *
@@ -3383,7 +3673,7 @@ declare namespace SecretsManagerV2 {
3383
3673
  locks_total?: number;
3384
3674
  /** The human-readable name of your secret. */
3385
3675
  name?: string;
3386
- /** A v4 UUID identifier, or `default` secret group. */
3676
+ /** A UUID identifier, or `default` secret group. */
3387
3677
  secret_group_id: string;
3388
3678
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3389
3679
  * service_credentials, kv, and username_password.
@@ -3404,7 +3694,7 @@ declare namespace SecretsManagerV2 {
3404
3694
  /** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
3405
3695
  * certificate.
3406
3696
  */
3407
- signing_algorithm: string;
3697
+ signing_algorithm?: string;
3408
3698
  /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
3409
3699
  * SSL certificate.
3410
3700
  */
@@ -3414,21 +3704,23 @@ declare namespace SecretsManagerV2 {
3414
3704
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3415
3705
  * types: Arbitrary, username_password.
3416
3706
  */
3417
- expiration_date: string;
3707
+ expiration_date?: string;
3418
3708
  /** Indicates whether the certificate was imported with an associated intermediate certificate. */
3419
- intermediate_included: boolean;
3709
+ intermediate_included?: boolean;
3420
3710
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3421
- issuer: string;
3711
+ issuer?: string;
3422
3712
  /** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
3423
3713
  * certificate.
3424
3714
  */
3425
3715
  key_algorithm?: string;
3426
3716
  /** Indicates whether the certificate was imported with an associated private key. */
3427
- private_key_included: boolean;
3717
+ private_key_included?: boolean;
3428
3718
  /** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
3429
- serial_number: string;
3719
+ serial_number?: string;
3430
3720
  /** The date and time that the certificate validity period begins and ends. */
3431
- validity: CertificateValidity;
3721
+ validity?: CertificateValidity;
3722
+ /** The data specified to create the CSR and the private key. */
3723
+ managed_csr?: ImportedCertificateManagedCsrResponse;
3432
3724
  }
3433
3725
  namespace ImportedCertificateMetadata {
3434
3726
  namespace Constants {
@@ -3477,6 +3769,8 @@ declare namespace SecretsManagerV2 {
3477
3769
  labels?: string[];
3478
3770
  /** The secret metadata that a user can customize. */
3479
3771
  custom_metadata?: JsonObject;
3772
+ /** The data specified to create the CSR and the private key. */
3773
+ managed_csr?: ImportedCertificateManagedCsr;
3480
3774
  }
3481
3775
  /**
3482
3776
  * ImportedCertificatePrototype.
@@ -3497,7 +3791,7 @@ declare namespace SecretsManagerV2 {
3497
3791
  * secret group.
3498
3792
  */
3499
3793
  description?: string;
3500
- /** A v4 UUID identifier, or `default` secret group. */
3794
+ /** A UUID identifier, or `default` secret group. */
3501
3795
  secret_group_id?: string;
3502
3796
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3503
3797
  *
@@ -3507,7 +3801,7 @@ declare namespace SecretsManagerV2 {
3507
3801
  */
3508
3802
  labels?: string[];
3509
3803
  /** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
3510
- certificate: string;
3804
+ certificate?: string;
3511
3805
  /** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
3512
3806
  * formatted on a single line with embedded newline characters.
3513
3807
  */
@@ -3516,6 +3810,8 @@ declare namespace SecretsManagerV2 {
3516
3810
  * line with embedded newline characters.
3517
3811
  */
3518
3812
  private_key?: string;
3813
+ /** The data specified to create the CSR and the private key. */
3814
+ managed_csr?: ImportedCertificateManagedCsr;
3519
3815
  /** The secret metadata that a user can customize. */
3520
3816
  custom_metadata?: JsonObject;
3521
3817
  /** The secret version metadata that a user can customize. */
@@ -3550,7 +3846,7 @@ declare namespace SecretsManagerV2 {
3550
3846
  * call to the service API.
3551
3847
  */
3552
3848
  downloaded?: boolean;
3553
- /** A v4 UUID identifier. */
3849
+ /** A UUID identifier. */
3554
3850
  id: string;
3555
3851
  /** The human-readable name of your secret. */
3556
3852
  secret_name?: string;
@@ -3558,7 +3854,7 @@ declare namespace SecretsManagerV2 {
3558
3854
  * service_credentials, kv, and username_password.
3559
3855
  */
3560
3856
  secret_type: ImportedCertificateVersion.Constants.SecretType | string;
3561
- /** A v4 UUID identifier, or `default` secret group. */
3857
+ /** A UUID identifier, or `default` secret group. */
3562
3858
  secret_group_id: string;
3563
3859
  /** Indicates whether the secret payload is available in this secret version. */
3564
3860
  payload_available: boolean;
@@ -3568,7 +3864,7 @@ declare namespace SecretsManagerV2 {
3568
3864
  alias?: ImportedCertificateVersion.Constants.Alias | string;
3569
3865
  /** The secret version metadata that a user can customize. */
3570
3866
  version_custom_metadata?: JsonObject;
3571
- /** A v4 UUID identifier. */
3867
+ /** A UUID identifier. */
3572
3868
  secret_id: string;
3573
3869
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3574
3870
  * types: Arbitrary, username_password.
@@ -3579,7 +3875,7 @@ declare namespace SecretsManagerV2 {
3579
3875
  /** The date and time that the certificate validity period begins and ends. */
3580
3876
  validity: CertificateValidity;
3581
3877
  /** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
3582
- certificate: string;
3878
+ certificate?: string;
3583
3879
  /** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
3584
3880
  * formatted on a single line with embedded newline characters.
3585
3881
  */
@@ -3588,6 +3884,8 @@ declare namespace SecretsManagerV2 {
3588
3884
  * line with embedded newline characters.
3589
3885
  */
3590
3886
  private_key?: string;
3887
+ /** The certificate signing request. */
3888
+ csr?: string;
3591
3889
  }
3592
3890
  namespace ImportedCertificateVersion {
3593
3891
  namespace Constants {
@@ -3623,7 +3921,7 @@ declare namespace SecretsManagerV2 {
3623
3921
  * call to the service API.
3624
3922
  */
3625
3923
  downloaded?: boolean;
3626
- /** A v4 UUID identifier. */
3924
+ /** A UUID identifier. */
3627
3925
  id: string;
3628
3926
  /** The human-readable name of your secret. */
3629
3927
  secret_name?: string;
@@ -3631,7 +3929,7 @@ declare namespace SecretsManagerV2 {
3631
3929
  * service_credentials, kv, and username_password.
3632
3930
  */
3633
3931
  secret_type: ImportedCertificateVersionMetadata.Constants.SecretType | string;
3634
- /** A v4 UUID identifier, or `default` secret group. */
3932
+ /** A UUID identifier, or `default` secret group. */
3635
3933
  secret_group_id: string;
3636
3934
  /** Indicates whether the secret payload is available in this secret version. */
3637
3935
  payload_available: boolean;
@@ -3641,7 +3939,7 @@ declare namespace SecretsManagerV2 {
3641
3939
  alias?: ImportedCertificateVersionMetadata.Constants.Alias | string;
3642
3940
  /** The secret version metadata that a user can customize. */
3643
3941
  version_custom_metadata?: JsonObject;
3644
- /** A v4 UUID identifier. */
3942
+ /** A UUID identifier. */
3645
3943
  secret_id: string;
3646
3944
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3647
3945
  * types: Arbitrary, username_password.
@@ -3713,7 +4011,7 @@ declare namespace SecretsManagerV2 {
3713
4011
  * call to the service API.
3714
4012
  */
3715
4013
  downloaded?: boolean;
3716
- /** A v4 UUID identifier. */
4014
+ /** A UUID identifier. */
3717
4015
  id: string;
3718
4016
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3719
4017
  *
@@ -3726,7 +4024,7 @@ declare namespace SecretsManagerV2 {
3726
4024
  locks_total?: number;
3727
4025
  /** The human-readable name of your secret. */
3728
4026
  name?: string;
3729
- /** A v4 UUID identifier, or `default` secret group. */
4027
+ /** A UUID identifier, or `default` secret group. */
3730
4028
  secret_group_id: string;
3731
4029
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3732
4030
  * service_credentials, kv, and username_password.
@@ -3792,7 +4090,7 @@ declare namespace SecretsManagerV2 {
3792
4090
  * call to the service API.
3793
4091
  */
3794
4092
  downloaded?: boolean;
3795
- /** A v4 UUID identifier. */
4093
+ /** A UUID identifier. */
3796
4094
  id: string;
3797
4095
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3798
4096
  *
@@ -3805,7 +4103,7 @@ declare namespace SecretsManagerV2 {
3805
4103
  locks_total?: number;
3806
4104
  /** The human-readable name of your secret. */
3807
4105
  name?: string;
3808
- /** A v4 UUID identifier, or `default` secret group. */
4106
+ /** A UUID identifier, or `default` secret group. */
3809
4107
  secret_group_id: string;
3810
4108
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3811
4109
  * service_credentials, kv, and username_password.
@@ -3891,7 +4189,7 @@ declare namespace SecretsManagerV2 {
3891
4189
  * secret group.
3892
4190
  */
3893
4191
  description?: string;
3894
- /** A v4 UUID identifier, or `default` secret group. */
4192
+ /** A UUID identifier, or `default` secret group. */
3895
4193
  secret_group_id?: string;
3896
4194
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3897
4195
  *
@@ -3936,7 +4234,7 @@ declare namespace SecretsManagerV2 {
3936
4234
  * call to the service API.
3937
4235
  */
3938
4236
  downloaded?: boolean;
3939
- /** A v4 UUID identifier. */
4237
+ /** A UUID identifier. */
3940
4238
  id: string;
3941
4239
  /** The human-readable name of your secret. */
3942
4240
  secret_name?: string;
@@ -3944,7 +4242,7 @@ declare namespace SecretsManagerV2 {
3944
4242
  * service_credentials, kv, and username_password.
3945
4243
  */
3946
4244
  secret_type: KVSecretVersion.Constants.SecretType | string;
3947
- /** A v4 UUID identifier, or `default` secret group. */
4245
+ /** A UUID identifier, or `default` secret group. */
3948
4246
  secret_group_id: string;
3949
4247
  /** Indicates whether the secret payload is available in this secret version. */
3950
4248
  payload_available: boolean;
@@ -3954,7 +4252,7 @@ declare namespace SecretsManagerV2 {
3954
4252
  alias?: KVSecretVersion.Constants.Alias | string;
3955
4253
  /** The secret version metadata that a user can customize. */
3956
4254
  version_custom_metadata?: JsonObject;
3957
- /** A v4 UUID identifier. */
4255
+ /** A UUID identifier. */
3958
4256
  secret_id: string;
3959
4257
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3960
4258
  * types: Arbitrary, username_password.
@@ -3997,7 +4295,7 @@ declare namespace SecretsManagerV2 {
3997
4295
  * call to the service API.
3998
4296
  */
3999
4297
  downloaded?: boolean;
4000
- /** A v4 UUID identifier. */
4298
+ /** A UUID identifier. */
4001
4299
  id: string;
4002
4300
  /** The human-readable name of your secret. */
4003
4301
  secret_name?: string;
@@ -4005,7 +4303,7 @@ declare namespace SecretsManagerV2 {
4005
4303
  * service_credentials, kv, and username_password.
4006
4304
  */
4007
4305
  secret_type: KVSecretVersionMetadata.Constants.SecretType | string;
4008
- /** A v4 UUID identifier, or `default` secret group. */
4306
+ /** A UUID identifier, or `default` secret group. */
4009
4307
  secret_group_id: string;
4010
4308
  /** Indicates whether the secret payload is available in this secret version. */
4011
4309
  payload_available: boolean;
@@ -4015,7 +4313,7 @@ declare namespace SecretsManagerV2 {
4015
4313
  alias?: KVSecretVersionMetadata.Constants.Alias | string;
4016
4314
  /** The secret version metadata that a user can customize. */
4017
4315
  version_custom_metadata?: JsonObject;
4018
- /** A v4 UUID identifier. */
4316
+ /** A UUID identifier. */
4019
4317
  secret_id: string;
4020
4318
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
4021
4319
  * types: Arbitrary, username_password.
@@ -4075,7 +4373,7 @@ declare namespace SecretsManagerV2 {
4075
4373
  * call to the service API.
4076
4374
  */
4077
4375
  downloaded?: boolean;
4078
- /** A v4 UUID identifier. */
4376
+ /** A UUID identifier. */
4079
4377
  id: string;
4080
4378
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
4081
4379
  *
@@ -4088,7 +4386,7 @@ declare namespace SecretsManagerV2 {
4088
4386
  locks_total?: number;
4089
4387
  /** The human-readable name of your secret. */
4090
4388
  name?: string;
4091
- /** A v4 UUID identifier, or `default` secret group. */
4389
+ /** A UUID identifier, or `default` secret group. */
4092
4390
  secret_group_id: string;
4093
4391
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
4094
4392
  * service_credentials, kv, and username_password.
@@ -4233,7 +4531,8 @@ declare namespace SecretsManagerV2 {
4233
4531
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4234
4532
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4235
4533
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4236
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4534
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4535
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4237
4536
  }
4238
4537
  }
4239
4538
  }
@@ -4252,7 +4551,34 @@ declare namespace SecretsManagerV2 {
4252
4551
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4253
4552
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4254
4553
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4255
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4554
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4555
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4556
+ }
4557
+ }
4558
+ }
4559
+ /**
4560
+ * The response body to specify the properties of the action to rotate the private certificate.
4561
+ */
4562
+ interface PrivateCertificateConfigurationActionRotate extends ConfigurationAction {
4563
+ /** The type of configuration action. */
4564
+ action_type: PrivateCertificateConfigurationActionRotate.Constants.ActionType | string;
4565
+ /** The name of the intermediate certificate authority configuration. */
4566
+ name: string;
4567
+ /** The response body of the action to rotate an intermediate certificate authority for the private certificate
4568
+ * configuration.
4569
+ */
4570
+ config: PrivateCertificateConfigurationRotateAction;
4571
+ }
4572
+ namespace PrivateCertificateConfigurationActionRotate {
4573
+ namespace Constants {
4574
+ /** The type of configuration action. */
4575
+ enum ActionType {
4576
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_CRL = "private_cert_configuration_action_rotate_crl",
4577
+ PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4578
+ PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4579
+ PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4580
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4581
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4256
4582
  }
4257
4583
  }
4258
4584
  }
@@ -4276,7 +4602,8 @@ declare namespace SecretsManagerV2 {
4276
4602
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4277
4603
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4278
4604
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4279
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4605
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4606
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4280
4607
  }
4281
4608
  }
4282
4609
  }
@@ -4296,7 +4623,28 @@ declare namespace SecretsManagerV2 {
4296
4623
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4297
4624
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4298
4625
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4299
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4626
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4627
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4628
+ }
4629
+ }
4630
+ }
4631
+ /**
4632
+ * The request body to specify the properties of the action to rotate an intermediate CA certificate.
4633
+ */
4634
+ interface PrivateCertificateConfigurationActionRotatePrototype extends ConfigurationActionPrototype {
4635
+ /** The type of configuration action. */
4636
+ action_type: PrivateCertificateConfigurationActionRotatePrototype.Constants.ActionType | string;
4637
+ }
4638
+ namespace PrivateCertificateConfigurationActionRotatePrototype {
4639
+ namespace Constants {
4640
+ /** The type of configuration action. */
4641
+ enum ActionType {
4642
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_CRL = "private_cert_configuration_action_rotate_crl",
4643
+ PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4644
+ PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4645
+ PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4646
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4647
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4300
4648
  }
4301
4649
  }
4302
4650
  }
@@ -4318,7 +4666,8 @@ declare namespace SecretsManagerV2 {
4318
4666
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4319
4667
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4320
4668
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4321
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4669
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4670
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4322
4671
  }
4323
4672
  }
4324
4673
  }
@@ -4340,7 +4689,8 @@ declare namespace SecretsManagerV2 {
4340
4689
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4341
4690
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4342
4691
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4343
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4692
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4693
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4344
4694
  }
4345
4695
  }
4346
4696
  }
@@ -4443,7 +4793,8 @@ declare namespace SecretsManagerV2 {
4443
4793
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4444
4794
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4445
4795
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4446
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4796
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4797
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4447
4798
  }
4448
4799
  }
4449
4800
  }
@@ -4544,7 +4895,8 @@ declare namespace SecretsManagerV2 {
4544
4895
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4545
4896
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4546
4897
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4547
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
4898
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
4899
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4548
4900
  }
4549
4901
  }
4550
4902
  }
@@ -4646,7 +4998,8 @@ declare namespace SecretsManagerV2 {
4646
4998
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4647
4999
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4648
5000
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4649
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
5001
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
5002
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4650
5003
  }
4651
5004
  }
4652
5005
  }
@@ -4748,7 +5101,8 @@ declare namespace SecretsManagerV2 {
4748
5101
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
4749
5102
  PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
4750
5103
  PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
4751
- PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
5104
+ PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
5105
+ PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
4752
5106
  }
4753
5107
  }
4754
5108
  }
@@ -6356,7 +6710,7 @@ declare namespace SecretsManagerV2 {
6356
6710
  * call to the service API.
6357
6711
  */
6358
6712
  downloaded?: boolean;
6359
- /** A v4 UUID identifier. */
6713
+ /** A UUID identifier. */
6360
6714
  id: string;
6361
6715
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
6362
6716
  *
@@ -6369,7 +6723,7 @@ declare namespace SecretsManagerV2 {
6369
6723
  locks_total?: number;
6370
6724
  /** The human-readable name of your secret. */
6371
6725
  name?: string;
6372
- /** A v4 UUID identifier, or `default` secret group. */
6726
+ /** A UUID identifier, or `default` secret group. */
6373
6727
  secret_group_id: string;
6374
6728
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
6375
6729
  * service_credentials, kv, and username_password.
@@ -6501,7 +6855,7 @@ declare namespace SecretsManagerV2 {
6501
6855
  * secret group.
6502
6856
  */
6503
6857
  description?: string;
6504
- /** A v4 UUID identifier, or `default` secret group. */
6858
+ /** A UUID identifier, or `default` secret group. */
6505
6859
  secret_group_id?: string;
6506
6860
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
6507
6861
  *
@@ -6596,7 +6950,7 @@ declare namespace SecretsManagerV2 {
6596
6950
  * call to the service API.
6597
6951
  */
6598
6952
  downloaded?: boolean;
6599
- /** A v4 UUID identifier. */
6953
+ /** A UUID identifier. */
6600
6954
  id: string;
6601
6955
  /** The human-readable name of your secret. */
6602
6956
  secret_name?: string;
@@ -6604,7 +6958,7 @@ declare namespace SecretsManagerV2 {
6604
6958
  * service_credentials, kv, and username_password.
6605
6959
  */
6606
6960
  secret_type: PrivateCertificateVersion.Constants.SecretType | string;
6607
- /** A v4 UUID identifier, or `default` secret group. */
6961
+ /** A UUID identifier, or `default` secret group. */
6608
6962
  secret_group_id: string;
6609
6963
  /** Indicates whether the secret payload is available in this secret version. */
6610
6964
  payload_available: boolean;
@@ -6614,7 +6968,7 @@ declare namespace SecretsManagerV2 {
6614
6968
  alias?: PrivateCertificateVersion.Constants.Alias | string;
6615
6969
  /** The secret version metadata that a user can customize. */
6616
6970
  version_custom_metadata?: JsonObject;
6617
- /** A v4 UUID identifier. */
6971
+ /** A UUID identifier. */
6618
6972
  secret_id: string;
6619
6973
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
6620
6974
  * types: Arbitrary, username_password.
@@ -6701,7 +7055,7 @@ declare namespace SecretsManagerV2 {
6701
7055
  * call to the service API.
6702
7056
  */
6703
7057
  downloaded?: boolean;
6704
- /** A v4 UUID identifier. */
7058
+ /** A UUID identifier. */
6705
7059
  id: string;
6706
7060
  /** The human-readable name of your secret. */
6707
7061
  secret_name?: string;
@@ -6709,7 +7063,7 @@ declare namespace SecretsManagerV2 {
6709
7063
  * service_credentials, kv, and username_password.
6710
7064
  */
6711
7065
  secret_type: PrivateCertificateVersionMetadata.Constants.SecretType | string;
6712
- /** A v4 UUID identifier, or `default` secret group. */
7066
+ /** A UUID identifier, or `default` secret group. */
6713
7067
  secret_group_id: string;
6714
7068
  /** Indicates whether the secret payload is available in this secret version. */
6715
7069
  payload_available: boolean;
@@ -6719,7 +7073,7 @@ declare namespace SecretsManagerV2 {
6719
7073
  alias?: PrivateCertificateVersionMetadata.Constants.Alias | string;
6720
7074
  /** The secret version metadata that a user can customize. */
6721
7075
  version_custom_metadata?: JsonObject;
6722
- /** A v4 UUID identifier. */
7076
+ /** A UUID identifier. */
6723
7077
  secret_id: string;
6724
7078
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
6725
7079
  * types: Arbitrary, username_password.
@@ -6783,7 +7137,7 @@ declare namespace SecretsManagerV2 {
6783
7137
  * call to the service API.
6784
7138
  */
6785
7139
  downloaded?: boolean;
6786
- /** A v4 UUID identifier. */
7140
+ /** A UUID identifier. */
6787
7141
  id: string;
6788
7142
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
6789
7143
  *
@@ -6796,7 +7150,7 @@ declare namespace SecretsManagerV2 {
6796
7150
  locks_total?: number;
6797
7151
  /** The human-readable name of your secret. */
6798
7152
  name?: string;
6799
- /** A v4 UUID identifier, or `default` secret group. */
7153
+ /** A UUID identifier, or `default` secret group. */
6800
7154
  secret_group_id: string;
6801
7155
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
6802
7156
  * service_credentials, kv, and username_password.
@@ -6823,7 +7177,7 @@ declare namespace SecretsManagerV2 {
6823
7177
  */
6824
7178
  alt_names?: string[];
6825
7179
  /** The Common Name (CN) represents the server name protected by the SSL certificate. */
6826
- common_name: string;
7180
+ common_name?: string;
6827
7181
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
6828
7182
  * types: Arbitrary, username_password.
6829
7183
  */
@@ -7492,7 +7846,7 @@ declare namespace SecretsManagerV2 {
7492
7846
  * call to the service API.
7493
7847
  */
7494
7848
  downloaded?: boolean;
7495
- /** A v4 UUID identifier. */
7849
+ /** A UUID identifier. */
7496
7850
  id: string;
7497
7851
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
7498
7852
  *
@@ -7505,7 +7859,7 @@ declare namespace SecretsManagerV2 {
7505
7859
  locks_total?: number;
7506
7860
  /** The human-readable name of your secret. */
7507
7861
  name?: string;
7508
- /** A v4 UUID identifier, or `default` secret group. */
7862
+ /** A UUID identifier, or `default` secret group. */
7509
7863
  secret_group_id: string;
7510
7864
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
7511
7865
  * service_credentials, kv, and username_password.
@@ -7532,7 +7886,7 @@ declare namespace SecretsManagerV2 {
7532
7886
  */
7533
7887
  alt_names?: string[];
7534
7888
  /** The Common Name (CN) represents the server name protected by the SSL certificate. */
7535
- common_name: string;
7889
+ common_name?: string;
7536
7890
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
7537
7891
  * types: Arbitrary, username_password.
7538
7892
  */
@@ -7635,7 +7989,7 @@ declare namespace SecretsManagerV2 {
7635
7989
  * secret group.
7636
7990
  */
7637
7991
  description?: string;
7638
- /** A v4 UUID identifier, or `default` secret group. */
7992
+ /** A UUID identifier, or `default` secret group. */
7639
7993
  secret_group_id?: string;
7640
7994
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
7641
7995
  *
@@ -7645,7 +7999,7 @@ declare namespace SecretsManagerV2 {
7645
7999
  */
7646
8000
  labels?: string[];
7647
8001
  /** The Common Name (CN) represents the server name protected by the SSL certificate. */
7648
- common_name: string;
8002
+ common_name?: string;
7649
8003
  /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
7650
8004
  * SSL certificate.
7651
8005
  */
@@ -7725,7 +8079,7 @@ declare namespace SecretsManagerV2 {
7725
8079
  * call to the service API.
7726
8080
  */
7727
8081
  downloaded?: boolean;
7728
- /** A v4 UUID identifier. */
8082
+ /** A UUID identifier. */
7729
8083
  id: string;
7730
8084
  /** The human-readable name of your secret. */
7731
8085
  secret_name?: string;
@@ -7733,7 +8087,7 @@ declare namespace SecretsManagerV2 {
7733
8087
  * service_credentials, kv, and username_password.
7734
8088
  */
7735
8089
  secret_type: PublicCertificateVersion.Constants.SecretType | string;
7736
- /** A v4 UUID identifier, or `default` secret group. */
8090
+ /** A UUID identifier, or `default` secret group. */
7737
8091
  secret_group_id: string;
7738
8092
  /** Indicates whether the secret payload is available in this secret version. */
7739
8093
  payload_available: boolean;
@@ -7743,7 +8097,7 @@ declare namespace SecretsManagerV2 {
7743
8097
  alias?: PublicCertificateVersion.Constants.Alias | string;
7744
8098
  /** The secret version metadata that a user can customize. */
7745
8099
  version_custom_metadata?: JsonObject;
7746
- /** A v4 UUID identifier. */
8100
+ /** A UUID identifier. */
7747
8101
  secret_id: string;
7748
8102
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
7749
8103
  * types: Arbitrary, username_password.
@@ -7798,7 +8152,7 @@ declare namespace SecretsManagerV2 {
7798
8152
  * call to the service API.
7799
8153
  */
7800
8154
  downloaded?: boolean;
7801
- /** A v4 UUID identifier. */
8155
+ /** A UUID identifier. */
7802
8156
  id: string;
7803
8157
  /** The human-readable name of your secret. */
7804
8158
  secret_name?: string;
@@ -7806,7 +8160,7 @@ declare namespace SecretsManagerV2 {
7806
8160
  * service_credentials, kv, and username_password.
7807
8161
  */
7808
8162
  secret_type: PublicCertificateVersionMetadata.Constants.SecretType | string;
7809
- /** A v4 UUID identifier, or `default` secret group. */
8163
+ /** A UUID identifier, or `default` secret group. */
7810
8164
  secret_group_id: string;
7811
8165
  /** Indicates whether the secret payload is available in this secret version. */
7812
8166
  payload_available: boolean;
@@ -7816,7 +8170,7 @@ declare namespace SecretsManagerV2 {
7816
8170
  alias?: PublicCertificateVersionMetadata.Constants.Alias | string;
7817
8171
  /** The secret version metadata that a user can customize. */
7818
8172
  version_custom_metadata?: JsonObject;
7819
- /** A v4 UUID identifier. */
8173
+ /** A UUID identifier. */
7820
8174
  secret_id: string;
7821
8175
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
7822
8176
  * types: Arbitrary, username_password.
@@ -7880,7 +8234,7 @@ declare namespace SecretsManagerV2 {
7880
8234
  * call to the service API.
7881
8235
  */
7882
8236
  downloaded?: boolean;
7883
- /** A v4 UUID identifier. */
8237
+ /** A UUID identifier. */
7884
8238
  id: string;
7885
8239
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
7886
8240
  *
@@ -7893,7 +8247,7 @@ declare namespace SecretsManagerV2 {
7893
8247
  locks_total?: number;
7894
8248
  /** The human-readable name of your secret. */
7895
8249
  name?: string;
7896
- /** A v4 UUID identifier, or `default` secret group. */
8250
+ /** A UUID identifier, or `default` secret group. */
7897
8251
  secret_group_id: string;
7898
8252
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
7899
8253
  * service_credentials, kv, and username_password.
@@ -7984,7 +8338,7 @@ declare namespace SecretsManagerV2 {
7984
8338
  * call to the service API.
7985
8339
  */
7986
8340
  downloaded?: boolean;
7987
- /** A v4 UUID identifier. */
8341
+ /** A UUID identifier. */
7988
8342
  id: string;
7989
8343
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
7990
8344
  *
@@ -7997,7 +8351,7 @@ declare namespace SecretsManagerV2 {
7997
8351
  locks_total?: number;
7998
8352
  /** The human-readable name of your secret. */
7999
8353
  name?: string;
8000
- /** A v4 UUID identifier, or `default` secret group. */
8354
+ /** A UUID identifier, or `default` secret group. */
8001
8355
  secret_group_id: string;
8002
8356
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8003
8357
  * service_credentials, kv, and username_password.
@@ -8130,7 +8484,7 @@ declare namespace SecretsManagerV2 {
8130
8484
  * username_password, private_cert, public_cert, iam_credentials.
8131
8485
  */
8132
8486
  rotation?: RotationPolicy;
8133
- /** A v4 UUID identifier, or `default` secret group. */
8487
+ /** A UUID identifier, or `default` secret group. */
8134
8488
  secret_group_id?: string;
8135
8489
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8136
8490
  * service_credentials, kv, and username_password.
@@ -8181,7 +8535,7 @@ declare namespace SecretsManagerV2 {
8181
8535
  * call to the service API.
8182
8536
  */
8183
8537
  downloaded?: boolean;
8184
- /** A v4 UUID identifier. */
8538
+ /** A UUID identifier. */
8185
8539
  id: string;
8186
8540
  /** The human-readable name of your secret. */
8187
8541
  secret_name?: string;
@@ -8189,7 +8543,7 @@ declare namespace SecretsManagerV2 {
8189
8543
  * service_credentials, kv, and username_password.
8190
8544
  */
8191
8545
  secret_type: ServiceCredentialsSecretVersion.Constants.SecretType | string;
8192
- /** A v4 UUID identifier, or `default` secret group. */
8546
+ /** A UUID identifier, or `default` secret group. */
8193
8547
  secret_group_id: string;
8194
8548
  /** Indicates whether the secret payload is available in this secret version. */
8195
8549
  payload_available: boolean;
@@ -8199,7 +8553,7 @@ declare namespace SecretsManagerV2 {
8199
8553
  alias?: ServiceCredentialsSecretVersion.Constants.Alias | string;
8200
8554
  /** The secret version metadata that a user can customize. */
8201
8555
  version_custom_metadata?: JsonObject;
8202
- /** A v4 UUID identifier. */
8556
+ /** A UUID identifier. */
8203
8557
  secret_id: string;
8204
8558
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8205
8559
  * types: Arbitrary, username_password.
@@ -8244,7 +8598,7 @@ declare namespace SecretsManagerV2 {
8244
8598
  * call to the service API.
8245
8599
  */
8246
8600
  downloaded?: boolean;
8247
- /** A v4 UUID identifier. */
8601
+ /** A UUID identifier. */
8248
8602
  id: string;
8249
8603
  /** The human-readable name of your secret. */
8250
8604
  secret_name?: string;
@@ -8252,7 +8606,7 @@ declare namespace SecretsManagerV2 {
8252
8606
  * service_credentials, kv, and username_password.
8253
8607
  */
8254
8608
  secret_type: ServiceCredentialsSecretVersionMetadata.Constants.SecretType | string;
8255
- /** A v4 UUID identifier, or `default` secret group. */
8609
+ /** A UUID identifier, or `default` secret group. */
8256
8610
  secret_group_id: string;
8257
8611
  /** Indicates whether the secret payload is available in this secret version. */
8258
8612
  payload_available: boolean;
@@ -8262,7 +8616,7 @@ declare namespace SecretsManagerV2 {
8262
8616
  alias?: ServiceCredentialsSecretVersionMetadata.Constants.Alias | string;
8263
8617
  /** The secret version metadata that a user can customize. */
8264
8618
  version_custom_metadata?: JsonObject;
8265
- /** A v4 UUID identifier. */
8619
+ /** A UUID identifier. */
8266
8620
  secret_id: string;
8267
8621
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8268
8622
  * types: Arbitrary, username_password.
@@ -8322,7 +8676,7 @@ declare namespace SecretsManagerV2 {
8322
8676
  * call to the service API.
8323
8677
  */
8324
8678
  downloaded?: boolean;
8325
- /** A v4 UUID identifier. */
8679
+ /** A UUID identifier. */
8326
8680
  id: string;
8327
8681
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8328
8682
  *
@@ -8335,7 +8689,7 @@ declare namespace SecretsManagerV2 {
8335
8689
  locks_total?: number;
8336
8690
  /** The human-readable name of your secret. */
8337
8691
  name?: string;
8338
- /** A v4 UUID identifier, or `default` secret group. */
8692
+ /** A UUID identifier, or `default` secret group. */
8339
8693
  secret_group_id: string;
8340
8694
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8341
8695
  * service_credentials, kv, and username_password.
@@ -8419,7 +8773,7 @@ declare namespace SecretsManagerV2 {
8419
8773
  * call to the service API.
8420
8774
  */
8421
8775
  downloaded?: boolean;
8422
- /** A v4 UUID identifier. */
8776
+ /** A UUID identifier. */
8423
8777
  id: string;
8424
8778
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8425
8779
  *
@@ -8432,7 +8786,7 @@ declare namespace SecretsManagerV2 {
8432
8786
  locks_total?: number;
8433
8787
  /** The human-readable name of your secret. */
8434
8788
  name?: string;
8435
- /** A v4 UUID identifier, or `default` secret group. */
8789
+ /** A UUID identifier, or `default` secret group. */
8436
8790
  secret_group_id: string;
8437
8791
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8438
8792
  * service_credentials, kv, and username_password.
@@ -8546,7 +8900,7 @@ declare namespace SecretsManagerV2 {
8546
8900
  * secret group.
8547
8901
  */
8548
8902
  description?: string;
8549
- /** A v4 UUID identifier, or `default` secret group. */
8903
+ /** A UUID identifier, or `default` secret group. */
8550
8904
  secret_group_id?: string;
8551
8905
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8552
8906
  *
@@ -8605,7 +8959,7 @@ declare namespace SecretsManagerV2 {
8605
8959
  * call to the service API.
8606
8960
  */
8607
8961
  downloaded?: boolean;
8608
- /** A v4 UUID identifier. */
8962
+ /** A UUID identifier. */
8609
8963
  id: string;
8610
8964
  /** The human-readable name of your secret. */
8611
8965
  secret_name?: string;
@@ -8613,7 +8967,7 @@ declare namespace SecretsManagerV2 {
8613
8967
  * service_credentials, kv, and username_password.
8614
8968
  */
8615
8969
  secret_type: UsernamePasswordSecretVersion.Constants.SecretType | string;
8616
- /** A v4 UUID identifier, or `default` secret group. */
8970
+ /** A UUID identifier, or `default` secret group. */
8617
8971
  secret_group_id: string;
8618
8972
  /** Indicates whether the secret payload is available in this secret version. */
8619
8973
  payload_available: boolean;
@@ -8623,7 +8977,7 @@ declare namespace SecretsManagerV2 {
8623
8977
  alias?: UsernamePasswordSecretVersion.Constants.Alias | string;
8624
8978
  /** The secret version metadata that a user can customize. */
8625
8979
  version_custom_metadata?: JsonObject;
8626
- /** A v4 UUID identifier. */
8980
+ /** A UUID identifier. */
8627
8981
  secret_id: string;
8628
8982
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8629
8983
  * types: Arbitrary, username_password.
@@ -8668,7 +9022,7 @@ declare namespace SecretsManagerV2 {
8668
9022
  * call to the service API.
8669
9023
  */
8670
9024
  downloaded?: boolean;
8671
- /** A v4 UUID identifier. */
9025
+ /** A UUID identifier. */
8672
9026
  id: string;
8673
9027
  /** The human-readable name of your secret. */
8674
9028
  secret_name?: string;
@@ -8676,7 +9030,7 @@ declare namespace SecretsManagerV2 {
8676
9030
  * service_credentials, kv, and username_password.
8677
9031
  */
8678
9032
  secret_type: UsernamePasswordSecretVersionMetadata.Constants.SecretType | string;
8679
- /** A v4 UUID identifier, or `default` secret group. */
9033
+ /** A UUID identifier, or `default` secret group. */
8680
9034
  secret_group_id: string;
8681
9035
  /** Indicates whether the secret payload is available in this secret version. */
8682
9036
  payload_available: boolean;
@@ -8686,7 +9040,7 @@ declare namespace SecretsManagerV2 {
8686
9040
  alias?: UsernamePasswordSecretVersionMetadata.Constants.Alias | string;
8687
9041
  /** The secret version metadata that a user can customize. */
8688
9042
  version_custom_metadata?: JsonObject;
8689
- /** A v4 UUID identifier. */
9043
+ /** A UUID identifier. */
8690
9044
  secret_id: string;
8691
9045
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8692
9046
  * types: Arbitrary, username_password.