@ibm-cloud/secrets-manager 2.0.7 → 2.0.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +4 -0
- package/README.md +0 -2
- package/examples/secrets-manager.v2.test.js +1211 -1211
- package/package.json +2 -2
- package/secrets-manager/v2.d.ts +540 -186
- package/secrets-manager/v2.js +150 -68
- package/secrets-manager/v2.js.map +1 -1
package/secrets-manager/v2.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* (C) Copyright IBM Corp.
|
|
2
|
+
* (C) Copyright IBM Corp. 2025.
|
|
3
3
|
*
|
|
4
4
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
5
5
|
* you may not use this file except in compliance with the License.
|
|
@@ -106,7 +106,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
106
106
|
* Get the properties of an existing secret group by specifying the ID of the group.
|
|
107
107
|
*
|
|
108
108
|
* @param {Object} params - The parameters to send to the service.
|
|
109
|
-
* @param {string} params.id - The
|
|
109
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret group.
|
|
110
110
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
111
111
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretGroup>>}
|
|
112
112
|
*/
|
|
@@ -117,7 +117,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
117
117
|
* Update the properties of an existing secret group, such as its name or description.
|
|
118
118
|
*
|
|
119
119
|
* @param {Object} params - The parameters to send to the service.
|
|
120
|
-
* @param {string} params.id - The
|
|
120
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret group.
|
|
121
121
|
* @param {string} [params.name] - The name of your secret group.
|
|
122
122
|
* @param {string} [params.description] - An extended description of your secret group.
|
|
123
123
|
*
|
|
@@ -136,7 +136,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
136
136
|
* you must first delete the secrets that are associated with the group.
|
|
137
137
|
*
|
|
138
138
|
* @param {Object} params - The parameters to send to the service.
|
|
139
|
-
* @param {string} params.id - The
|
|
139
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret group.
|
|
140
140
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
141
141
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
|
|
142
142
|
*/
|
|
@@ -226,7 +226,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
226
226
|
* view only the details of a specified secret without retrieving its value, use the Get secret metadata operation.
|
|
227
227
|
*
|
|
228
228
|
* @param {Object} params - The parameters to send to the service.
|
|
229
|
-
* @param {string} params.id - The
|
|
229
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
230
230
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
231
231
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.Secret>>}
|
|
232
232
|
*/
|
|
@@ -237,7 +237,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
237
237
|
* Delete a secret by specifying the ID of the secret.
|
|
238
238
|
*
|
|
239
239
|
* @param {Object} params - The parameters to send to the service.
|
|
240
|
-
* @param {string} params.id - The
|
|
240
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
241
241
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
242
242
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
|
|
243
243
|
*/
|
|
@@ -248,7 +248,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
248
248
|
* Get the metadata of a secret by specifying the ID of the secret.
|
|
249
249
|
*
|
|
250
250
|
* @param {Object} params - The parameters to send to the service.
|
|
251
|
-
* @param {string} params.id - The
|
|
251
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
252
252
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
253
253
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
|
|
254
254
|
*/
|
|
@@ -259,7 +259,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
259
259
|
* Update the metadata of a secret, such as its name or description.
|
|
260
260
|
*
|
|
261
261
|
* @param {Object} params - The parameters to send to the service.
|
|
262
|
-
* @param {string} params.id - The
|
|
262
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
263
263
|
* @param {SecretMetadataPatch} params.secretMetadataPatch -
|
|
264
264
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
265
265
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
|
|
@@ -271,7 +271,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
271
271
|
* Create a secret action. This operation supports the following actions:.
|
|
272
272
|
*
|
|
273
273
|
* @param {Object} params - The parameters to send to the service.
|
|
274
|
-
* @param {string} params.id - The
|
|
274
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
275
275
|
* @param {SecretActionPrototype} params.secretActionPrototype -
|
|
276
276
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
277
277
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretAction>>}
|
|
@@ -304,7 +304,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
304
304
|
* Create a new secret version.
|
|
305
305
|
*
|
|
306
306
|
* @param {Object} params - The parameters to send to the service.
|
|
307
|
-
* @param {string} params.secretId - The
|
|
307
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
308
308
|
* @param {SecretVersionPrototype} params.secretVersionPrototype -
|
|
309
309
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
310
310
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
|
|
@@ -318,7 +318,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
318
318
|
* A successful request returns the list of versions of a secret, along with the metadata of each version.
|
|
319
319
|
*
|
|
320
320
|
* @param {Object} params - The parameters to send to the service.
|
|
321
|
-
* @param {string} params.secretId - The
|
|
321
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
322
322
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
323
323
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadataCollection>>}
|
|
324
324
|
*/
|
|
@@ -333,8 +333,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
333
333
|
* with other metadata.
|
|
334
334
|
*
|
|
335
335
|
* @param {Object} params - The parameters to send to the service.
|
|
336
|
-
* @param {string} params.secretId - The
|
|
337
|
-
* @param {string} params.id - The
|
|
336
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
337
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
338
338
|
* `previous` aliases to refer to the current or previous secret version.
|
|
339
339
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
340
340
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
|
|
@@ -348,8 +348,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
348
348
|
* This operation is available for secret type: iam_credentials current version.
|
|
349
349
|
*
|
|
350
350
|
* @param {Object} params - The parameters to send to the service.
|
|
351
|
-
* @param {string} params.secretId - The
|
|
352
|
-
* @param {string} params.id - The
|
|
351
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
352
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
353
353
|
* `previous` aliases to refer to the current or previous secret version.
|
|
354
354
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
355
355
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
|
|
@@ -364,8 +364,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
364
364
|
* A successful request returns the metadata that is associated with the specified version of your secret.
|
|
365
365
|
*
|
|
366
366
|
* @param {Object} params - The parameters to send to the service.
|
|
367
|
-
* @param {string} params.secretId - The
|
|
368
|
-
* @param {string} params.id - The
|
|
367
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
368
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
369
369
|
* `previous` aliases to refer to the current or previous secret version.
|
|
370
370
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
371
371
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadata>>}
|
|
@@ -377,8 +377,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
377
377
|
* Update the custom metadata of a secret version.
|
|
378
378
|
*
|
|
379
379
|
* @param {Object} params - The parameters to send to the service.
|
|
380
|
-
* @param {string} params.secretId - The
|
|
381
|
-
* @param {string} params.id - The
|
|
380
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
381
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
382
382
|
* `previous` aliases to refer to the current or previous secret version.
|
|
383
383
|
* @param {JsonObject} [params.versionCustomMetadata] - The secret version metadata that a user can customize.
|
|
384
384
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
@@ -393,8 +393,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
393
393
|
* - `private_cert_action_revoke_certificate`: Revoke a version of a private certificate.
|
|
394
394
|
*
|
|
395
395
|
* @param {Object} params - The parameters to send to the service.
|
|
396
|
-
* @param {string} params.secretId - The
|
|
397
|
-
* @param {string} params.id - The
|
|
396
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
397
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
398
398
|
* `previous` aliases to refer to the current or previous secret version.
|
|
399
399
|
* @param {SecretVersionActionPrototype} params.secretVersionActionPrototype -
|
|
400
400
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
@@ -442,7 +442,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
442
442
|
* List the locks that are associated with a specified secret.
|
|
443
443
|
*
|
|
444
444
|
* @param {Object} params - The parameters to send to the service.
|
|
445
|
-
* @param {string} params.id - The
|
|
445
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
446
446
|
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
447
447
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
448
448
|
*
|
|
@@ -485,7 +485,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
485
485
|
* the data of the previous secret version if it doesn't have any locks.
|
|
486
486
|
*
|
|
487
487
|
* @param {Object} params - The parameters to send to the service.
|
|
488
|
-
* @param {string} params.id - The
|
|
488
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
489
489
|
* @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
|
|
490
490
|
* @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
|
|
491
491
|
* modes to clear any matching locks on a secret version.
|
|
@@ -510,7 +510,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
510
510
|
* of your secret.
|
|
511
511
|
*
|
|
512
512
|
* @param {Object} params - The parameters to send to the service.
|
|
513
|
-
* @param {string} params.id - The
|
|
513
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
514
514
|
* @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
|
|
515
515
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
516
516
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
|
|
@@ -522,8 +522,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
522
522
|
* List the locks that are associated with a specified secret version.
|
|
523
523
|
*
|
|
524
524
|
* @param {Object} params - The parameters to send to the service.
|
|
525
|
-
* @param {string} params.secretId - The
|
|
526
|
-
* @param {string} params.id - The
|
|
525
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
526
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
527
527
|
* `previous` aliases to refer to the current or previous secret version.
|
|
528
528
|
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
529
529
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
@@ -567,8 +567,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
567
567
|
* the data of the previous secret version if it doesn't have any locks.
|
|
568
568
|
*
|
|
569
569
|
* @param {Object} params - The parameters to send to the service.
|
|
570
|
-
* @param {string} params.secretId - The
|
|
571
|
-
* @param {string} params.id - The
|
|
570
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
571
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
572
572
|
* `previous` aliases to refer to the current or previous secret version.
|
|
573
573
|
* @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
|
|
574
574
|
* @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
|
|
@@ -594,8 +594,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
594
594
|
* of your secret.
|
|
595
595
|
*
|
|
596
596
|
* @param {Object} params - The parameters to send to the service.
|
|
597
|
-
* @param {string} params.secretId - The
|
|
598
|
-
* @param {string} params.id - The
|
|
597
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
598
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
599
599
|
* `previous` aliases to refer to the current or previous secret version.
|
|
600
600
|
* @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
|
|
601
601
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
@@ -725,6 +725,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
725
725
|
* authority certificate.
|
|
726
726
|
* - `private_cert_configuration_action_rotate_crl`: Rotate the certificate revocation list (CRL) of an intermediate
|
|
727
727
|
* certificate authority.
|
|
728
|
+
* - `private_cert_configuration_action_rotate_intermediate`: Rotate an internally signed intermediate certificate
|
|
729
|
+
* authority certificate.
|
|
728
730
|
*
|
|
729
731
|
* @param {Object} params - The parameters to send to the service.
|
|
730
732
|
* @param {string} params.name - The name that uniquely identifies a configuration.
|
|
@@ -837,13 +839,13 @@ declare namespace SecretsManagerV2 {
|
|
|
837
839
|
}
|
|
838
840
|
/** Parameters for the `getSecretGroup` operation. */
|
|
839
841
|
interface GetSecretGroupParams {
|
|
840
|
-
/** The
|
|
842
|
+
/** The UUID that uniquely identifies your secret group. */
|
|
841
843
|
id: string;
|
|
842
844
|
headers?: OutgoingHttpHeaders;
|
|
843
845
|
}
|
|
844
846
|
/** Parameters for the `updateSecretGroup` operation. */
|
|
845
847
|
interface UpdateSecretGroupParams {
|
|
846
|
-
/** The
|
|
848
|
+
/** The UUID that uniquely identifies your secret group. */
|
|
847
849
|
id: string;
|
|
848
850
|
/** The name of your secret group. */
|
|
849
851
|
name?: string;
|
|
@@ -857,7 +859,7 @@ declare namespace SecretsManagerV2 {
|
|
|
857
859
|
}
|
|
858
860
|
/** Parameters for the `deleteSecretGroup` operation. */
|
|
859
861
|
interface DeleteSecretGroupParams {
|
|
860
|
-
/** The
|
|
862
|
+
/** The UUID that uniquely identifies your secret group. */
|
|
861
863
|
id: string;
|
|
862
864
|
headers?: OutgoingHttpHeaders;
|
|
863
865
|
}
|
|
@@ -944,32 +946,32 @@ declare namespace SecretsManagerV2 {
|
|
|
944
946
|
}
|
|
945
947
|
/** Parameters for the `getSecret` operation. */
|
|
946
948
|
interface GetSecretParams {
|
|
947
|
-
/** The
|
|
949
|
+
/** The UUID that uniquely identifies your secret. */
|
|
948
950
|
id: string;
|
|
949
951
|
headers?: OutgoingHttpHeaders;
|
|
950
952
|
}
|
|
951
953
|
/** Parameters for the `deleteSecret` operation. */
|
|
952
954
|
interface DeleteSecretParams {
|
|
953
|
-
/** The
|
|
955
|
+
/** The UUID that uniquely identifies your secret. */
|
|
954
956
|
id: string;
|
|
955
957
|
headers?: OutgoingHttpHeaders;
|
|
956
958
|
}
|
|
957
959
|
/** Parameters for the `getSecretMetadata` operation. */
|
|
958
960
|
interface GetSecretMetadataParams {
|
|
959
|
-
/** The
|
|
961
|
+
/** The UUID that uniquely identifies your secret. */
|
|
960
962
|
id: string;
|
|
961
963
|
headers?: OutgoingHttpHeaders;
|
|
962
964
|
}
|
|
963
965
|
/** Parameters for the `updateSecretMetadata` operation. */
|
|
964
966
|
interface UpdateSecretMetadataParams {
|
|
965
|
-
/** The
|
|
967
|
+
/** The UUID that uniquely identifies your secret. */
|
|
966
968
|
id: string;
|
|
967
969
|
secretMetadataPatch: SecretMetadataPatch;
|
|
968
970
|
headers?: OutgoingHttpHeaders;
|
|
969
971
|
}
|
|
970
972
|
/** Parameters for the `createSecretAction` operation. */
|
|
971
973
|
interface CreateSecretActionParams {
|
|
972
|
-
/** The
|
|
974
|
+
/** The UUID that uniquely identifies your secret. */
|
|
973
975
|
id: string;
|
|
974
976
|
secretActionPrototype: SecretActionPrototype;
|
|
975
977
|
headers?: OutgoingHttpHeaders;
|
|
@@ -1004,22 +1006,22 @@ declare namespace SecretsManagerV2 {
|
|
|
1004
1006
|
}
|
|
1005
1007
|
/** Parameters for the `createSecretVersion` operation. */
|
|
1006
1008
|
interface CreateSecretVersionParams {
|
|
1007
|
-
/** The
|
|
1009
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1008
1010
|
secretId: string;
|
|
1009
1011
|
secretVersionPrototype: SecretVersionPrototype;
|
|
1010
1012
|
headers?: OutgoingHttpHeaders;
|
|
1011
1013
|
}
|
|
1012
1014
|
/** Parameters for the `listSecretVersions` operation. */
|
|
1013
1015
|
interface ListSecretVersionsParams {
|
|
1014
|
-
/** The
|
|
1016
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1015
1017
|
secretId: string;
|
|
1016
1018
|
headers?: OutgoingHttpHeaders;
|
|
1017
1019
|
}
|
|
1018
1020
|
/** Parameters for the `getSecretVersion` operation. */
|
|
1019
1021
|
interface GetSecretVersionParams {
|
|
1020
|
-
/** The
|
|
1022
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1021
1023
|
secretId: string;
|
|
1022
|
-
/** The
|
|
1024
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1023
1025
|
* refer to the current or previous secret version.
|
|
1024
1026
|
*/
|
|
1025
1027
|
id: string;
|
|
@@ -1027,9 +1029,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1027
1029
|
}
|
|
1028
1030
|
/** Parameters for the `deleteSecretVersionData` operation. */
|
|
1029
1031
|
interface DeleteSecretVersionDataParams {
|
|
1030
|
-
/** The
|
|
1032
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1031
1033
|
secretId: string;
|
|
1032
|
-
/** The
|
|
1034
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1033
1035
|
* refer to the current or previous secret version.
|
|
1034
1036
|
*/
|
|
1035
1037
|
id: string;
|
|
@@ -1037,9 +1039,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1037
1039
|
}
|
|
1038
1040
|
/** Parameters for the `getSecretVersionMetadata` operation. */
|
|
1039
1041
|
interface GetSecretVersionMetadataParams {
|
|
1040
|
-
/** The
|
|
1042
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1041
1043
|
secretId: string;
|
|
1042
|
-
/** The
|
|
1044
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1043
1045
|
* refer to the current or previous secret version.
|
|
1044
1046
|
*/
|
|
1045
1047
|
id: string;
|
|
@@ -1047,9 +1049,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1047
1049
|
}
|
|
1048
1050
|
/** Parameters for the `updateSecretVersionMetadata` operation. */
|
|
1049
1051
|
interface UpdateSecretVersionMetadataParams {
|
|
1050
|
-
/** The
|
|
1052
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1051
1053
|
secretId: string;
|
|
1052
|
-
/** The
|
|
1054
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1053
1055
|
* refer to the current or previous secret version.
|
|
1054
1056
|
*/
|
|
1055
1057
|
id: string;
|
|
@@ -1059,9 +1061,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1059
1061
|
}
|
|
1060
1062
|
/** Parameters for the `createSecretVersionAction` operation. */
|
|
1061
1063
|
interface CreateSecretVersionActionParams {
|
|
1062
|
-
/** The
|
|
1064
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1063
1065
|
secretId: string;
|
|
1064
|
-
/** The
|
|
1066
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1065
1067
|
* refer to the current or previous secret version.
|
|
1066
1068
|
*/
|
|
1067
1069
|
id: string;
|
|
@@ -1104,7 +1106,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1104
1106
|
}
|
|
1105
1107
|
/** Parameters for the `listSecretLocks` operation. */
|
|
1106
1108
|
interface ListSecretLocksParams {
|
|
1107
|
-
/** The
|
|
1109
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1108
1110
|
id: string;
|
|
1109
1111
|
/** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1110
1112
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
@@ -1139,7 +1141,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1139
1141
|
}
|
|
1140
1142
|
/** Parameters for the `createSecretLocksBulk` operation. */
|
|
1141
1143
|
interface CreateSecretLocksBulkParams {
|
|
1142
|
-
/** The
|
|
1144
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1143
1145
|
id: string;
|
|
1144
1146
|
/** The locks data to be attached to a secret version. */
|
|
1145
1147
|
locks: SecretLockPrototype[];
|
|
@@ -1162,7 +1164,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1162
1164
|
}
|
|
1163
1165
|
/** Parameters for the `deleteSecretLocksBulk` operation. */
|
|
1164
1166
|
interface DeleteSecretLocksBulkParams {
|
|
1165
|
-
/** The
|
|
1167
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1166
1168
|
id: string;
|
|
1167
1169
|
/** Specify the names of the secret locks to be deleted. */
|
|
1168
1170
|
name?: string[];
|
|
@@ -1170,9 +1172,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1170
1172
|
}
|
|
1171
1173
|
/** Parameters for the `listSecretVersionLocks` operation. */
|
|
1172
1174
|
interface ListSecretVersionLocksParams {
|
|
1173
|
-
/** The
|
|
1175
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1174
1176
|
secretId: string;
|
|
1175
|
-
/** The
|
|
1177
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1176
1178
|
* refer to the current or previous secret version.
|
|
1177
1179
|
*/
|
|
1178
1180
|
id: string;
|
|
@@ -1209,9 +1211,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1209
1211
|
}
|
|
1210
1212
|
/** Parameters for the `createSecretVersionLocksBulk` operation. */
|
|
1211
1213
|
interface CreateSecretVersionLocksBulkParams {
|
|
1212
|
-
/** The
|
|
1214
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1213
1215
|
secretId: string;
|
|
1214
|
-
/** The
|
|
1216
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1215
1217
|
* refer to the current or previous secret version.
|
|
1216
1218
|
*/
|
|
1217
1219
|
id: string;
|
|
@@ -1236,9 +1238,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1236
1238
|
}
|
|
1237
1239
|
/** Parameters for the `deleteSecretVersionLocksBulk` operation. */
|
|
1238
1240
|
interface DeleteSecretVersionLocksBulkParams {
|
|
1239
|
-
/** The
|
|
1241
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1240
1242
|
secretId: string;
|
|
1241
|
-
/** The
|
|
1243
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1242
1244
|
* refer to the current or previous secret version.
|
|
1243
1245
|
*/
|
|
1244
1246
|
id: string;
|
|
@@ -1534,6 +1536,200 @@ declare namespace SecretsManagerV2 {
|
|
|
1534
1536
|
*/
|
|
1535
1537
|
interface ConfigurationPrototype {
|
|
1536
1538
|
}
|
|
1539
|
+
/**
|
|
1540
|
+
* The data specified to create the CSR and the private key.
|
|
1541
|
+
*/
|
|
1542
|
+
interface ImportedCertificateManagedCsr {
|
|
1543
|
+
/** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
|
|
1544
|
+
ou?: string[];
|
|
1545
|
+
/** The Organization (O) values to define in the subject field of the resulting certificate. */
|
|
1546
|
+
organization?: string[];
|
|
1547
|
+
/** The Country (C) values to define in the subject field of the resulting certificate. */
|
|
1548
|
+
country?: string[];
|
|
1549
|
+
/** The Locality (L) values to define in the subject field of the resulting certificate. */
|
|
1550
|
+
locality?: string[];
|
|
1551
|
+
/** The Province (ST) values to define in the subject field of the resulting certificate. */
|
|
1552
|
+
province?: string[];
|
|
1553
|
+
/** The street address values to define in the subject field of the resulting certificate. */
|
|
1554
|
+
street_address?: string[];
|
|
1555
|
+
/** The postal code values to define in the subject field of the resulting certificate. */
|
|
1556
|
+
postal_code?: string[];
|
|
1557
|
+
/** If set to false, makes the common_name field optional while generating a certificate. */
|
|
1558
|
+
require_cn?: boolean;
|
|
1559
|
+
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
1560
|
+
common_name?: string;
|
|
1561
|
+
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
1562
|
+
* SSL certificate.
|
|
1563
|
+
*/
|
|
1564
|
+
alt_names?: string;
|
|
1565
|
+
/** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1566
|
+
ip_sans?: string;
|
|
1567
|
+
/** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1568
|
+
uri_sans?: string;
|
|
1569
|
+
/** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
|
|
1570
|
+
* in a comma-delimited list.
|
|
1571
|
+
*
|
|
1572
|
+
* The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
|
|
1573
|
+
*/
|
|
1574
|
+
other_sans?: string;
|
|
1575
|
+
/** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
|
|
1576
|
+
*
|
|
1577
|
+
* If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
|
|
1578
|
+
* useful if the common name is a human-readable identifier, instead of a hostname or an email address.
|
|
1579
|
+
*/
|
|
1580
|
+
exclude_cn_from_sans?: boolean;
|
|
1581
|
+
/** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
|
|
1582
|
+
* signed certificate.
|
|
1583
|
+
*/
|
|
1584
|
+
user_ids?: string;
|
|
1585
|
+
/** This field indicates whether certificate is flagged for server use. */
|
|
1586
|
+
server_flag?: boolean;
|
|
1587
|
+
/** This field indicates whether certificate is flagged for client use. */
|
|
1588
|
+
client_flag?: boolean;
|
|
1589
|
+
/** This field indicates whether certificate is flagged for code signing use. */
|
|
1590
|
+
code_signing_flag?: boolean;
|
|
1591
|
+
/** This field indicates whether certificate is flagged for email protection use. */
|
|
1592
|
+
email_protection_flag?: boolean;
|
|
1593
|
+
/** The type of private key to generate. */
|
|
1594
|
+
key_type?: ImportedCertificateManagedCsr.Constants.KeyType | string;
|
|
1595
|
+
/** The number of bits to use to generate the private key.
|
|
1596
|
+
*
|
|
1597
|
+
* Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
|
|
1598
|
+
* `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
|
|
1599
|
+
* ed25519 keys.
|
|
1600
|
+
*/
|
|
1601
|
+
key_bits?: number;
|
|
1602
|
+
/** The allowed key usage constraint to define for certificate, in a comma-delimited list.
|
|
1603
|
+
*
|
|
1604
|
+
* You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
|
|
1605
|
+
* the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
|
|
1606
|
+
* field to an empty string.
|
|
1607
|
+
*/
|
|
1608
|
+
key_usage?: string;
|
|
1609
|
+
/** The allowed extended key usage constraint on certificate, in a comma-delimited list.
|
|
1610
|
+
*
|
|
1611
|
+
* You can find valid values in the [Go x509 package
|
|
1612
|
+
* documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
|
|
1613
|
+
* Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
|
|
1614
|
+
*/
|
|
1615
|
+
ext_key_usage?: string;
|
|
1616
|
+
/** A comma-delimited list of policy Object Identifiers (OIDs). */
|
|
1617
|
+
policy_identifiers?: string;
|
|
1618
|
+
/** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
|
|
1619
|
+
ext_key_usage_oids?: string;
|
|
1620
|
+
/** This field indicates whether the private key will be rotated. */
|
|
1621
|
+
rotate_keys?: boolean;
|
|
1622
|
+
}
|
|
1623
|
+
namespace ImportedCertificateManagedCsr {
|
|
1624
|
+
namespace Constants {
|
|
1625
|
+
/** The type of private key to generate. */
|
|
1626
|
+
enum KeyType {
|
|
1627
|
+
RSA = "rsa",
|
|
1628
|
+
EC = "ec",
|
|
1629
|
+
ED25519 = "ed25519"
|
|
1630
|
+
}
|
|
1631
|
+
}
|
|
1632
|
+
}
|
|
1633
|
+
/**
|
|
1634
|
+
* The data specified to create the CSR and the private key.
|
|
1635
|
+
*/
|
|
1636
|
+
interface ImportedCertificateManagedCsrResponse {
|
|
1637
|
+
/** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
|
|
1638
|
+
ou: string[];
|
|
1639
|
+
/** The Organization (O) values to define in the subject field of the resulting certificate. */
|
|
1640
|
+
organization: string[];
|
|
1641
|
+
/** The Country (C) values to define in the subject field of the resulting certificate. */
|
|
1642
|
+
country: string[];
|
|
1643
|
+
/** The Locality (L) values to define in the subject field of the resulting certificate. */
|
|
1644
|
+
locality: string[];
|
|
1645
|
+
/** The Province (ST) values to define in the subject field of the resulting certificate. */
|
|
1646
|
+
province: string[];
|
|
1647
|
+
/** The street address values to define in the subject field of the resulting certificate. */
|
|
1648
|
+
street_address: string[];
|
|
1649
|
+
/** The postal code values to define in the subject field of the resulting certificate. */
|
|
1650
|
+
postal_code: string[];
|
|
1651
|
+
/** If set to false, makes the common_name field optional while generating a certificate. */
|
|
1652
|
+
require_cn: boolean;
|
|
1653
|
+
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
1654
|
+
common_name?: string;
|
|
1655
|
+
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
1656
|
+
* SSL certificate.
|
|
1657
|
+
*/
|
|
1658
|
+
alt_names?: string;
|
|
1659
|
+
/** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1660
|
+
ip_sans?: string;
|
|
1661
|
+
/** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1662
|
+
uri_sans?: string;
|
|
1663
|
+
/** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
|
|
1664
|
+
* in a comma-delimited list.
|
|
1665
|
+
*
|
|
1666
|
+
* The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
|
|
1667
|
+
*/
|
|
1668
|
+
other_sans?: string;
|
|
1669
|
+
/** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
|
|
1670
|
+
*
|
|
1671
|
+
* If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
|
|
1672
|
+
* useful if the common name is a human-readable identifier, instead of a hostname or an email address.
|
|
1673
|
+
*/
|
|
1674
|
+
exclude_cn_from_sans: boolean;
|
|
1675
|
+
/** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
|
|
1676
|
+
* signed certificate.
|
|
1677
|
+
*/
|
|
1678
|
+
user_ids?: string;
|
|
1679
|
+
/** This field indicates whether certificate is flagged for server use. */
|
|
1680
|
+
server_flag: boolean;
|
|
1681
|
+
/** This field indicates whether certificate is flagged for client use. */
|
|
1682
|
+
client_flag: boolean;
|
|
1683
|
+
/** This field indicates whether certificate is flagged for code signing use. */
|
|
1684
|
+
code_signing_flag: boolean;
|
|
1685
|
+
/** This field indicates whether certificate is flagged for email protection use. */
|
|
1686
|
+
email_protection_flag: boolean;
|
|
1687
|
+
/** The type of private key to generate. */
|
|
1688
|
+
key_type: ImportedCertificateManagedCsrResponse.Constants.KeyType | string;
|
|
1689
|
+
/** The number of bits to use to generate the private key.
|
|
1690
|
+
*
|
|
1691
|
+
* Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
|
|
1692
|
+
* `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
|
|
1693
|
+
* ed25519 keys.
|
|
1694
|
+
*/
|
|
1695
|
+
key_bits: number;
|
|
1696
|
+
/** The allowed key usage constraint to define for certificate, in a comma-delimited list.
|
|
1697
|
+
*
|
|
1698
|
+
* You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
|
|
1699
|
+
* the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
|
|
1700
|
+
* field to an empty string.
|
|
1701
|
+
*/
|
|
1702
|
+
key_usage?: string;
|
|
1703
|
+
/** The allowed extended key usage constraint on certificate, in a comma-delimited list.
|
|
1704
|
+
*
|
|
1705
|
+
* You can find valid values in the [Go x509 package
|
|
1706
|
+
* documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
|
|
1707
|
+
* Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
|
|
1708
|
+
*/
|
|
1709
|
+
ext_key_usage?: string;
|
|
1710
|
+
/** A comma-delimited list of policy Object Identifiers (OIDs). */
|
|
1711
|
+
policy_identifiers?: string;
|
|
1712
|
+
/** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
|
|
1713
|
+
ext_key_usage_oids?: string;
|
|
1714
|
+
/** This field indicates whether the private key will be rotated. */
|
|
1715
|
+
rotate_keys?: boolean;
|
|
1716
|
+
/** The certificate signing request. */
|
|
1717
|
+
csr: string;
|
|
1718
|
+
/** The PEM-encoded private key that is associated with the certificate. The data must be formatted on a single
|
|
1719
|
+
* line with embedded newline characters.
|
|
1720
|
+
*/
|
|
1721
|
+
private_key: string;
|
|
1722
|
+
}
|
|
1723
|
+
namespace ImportedCertificateManagedCsrResponse {
|
|
1724
|
+
namespace Constants {
|
|
1725
|
+
/** The type of private key to generate. */
|
|
1726
|
+
enum KeyType {
|
|
1727
|
+
RSA = "rsa",
|
|
1728
|
+
EC = "ec",
|
|
1729
|
+
ED25519 = "ed25519"
|
|
1730
|
+
}
|
|
1731
|
+
}
|
|
1732
|
+
}
|
|
1537
1733
|
/**
|
|
1538
1734
|
* The details of the Event Notifications registration.
|
|
1539
1735
|
*/
|
|
@@ -1614,6 +1810,96 @@ declare namespace SecretsManagerV2 {
|
|
|
1614
1810
|
*/
|
|
1615
1811
|
interface PrivateCertificateCAData {
|
|
1616
1812
|
}
|
|
1813
|
+
/**
|
|
1814
|
+
* The response body of the action to rotate an intermediate certificate authority for the private certificate
|
|
1815
|
+
* configuration.
|
|
1816
|
+
*/
|
|
1817
|
+
interface PrivateCertificateConfigurationRotateAction {
|
|
1818
|
+
/** The Common Name (CN) represents the server name that is protected by the SSL certificate. */
|
|
1819
|
+
common_name?: string;
|
|
1820
|
+
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
1821
|
+
* SSL certificate.
|
|
1822
|
+
*/
|
|
1823
|
+
alt_names?: string[];
|
|
1824
|
+
/** The IP Subject Alternative Names to define for the CA certificate, in a comma-delimited list. */
|
|
1825
|
+
ip_sans?: string;
|
|
1826
|
+
/** The URI Subject Alternative Names to define for the CA certificate, in a comma-delimited list. */
|
|
1827
|
+
uri_sans?: string;
|
|
1828
|
+
/** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the CA
|
|
1829
|
+
* certificate.
|
|
1830
|
+
*
|
|
1831
|
+
* The alternative names must match the values that are specified in the `allowed_other_sans` field in the
|
|
1832
|
+
* associated certificate template. The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current
|
|
1833
|
+
* valid type is `UTF8`.
|
|
1834
|
+
*/
|
|
1835
|
+
other_sans?: string[];
|
|
1836
|
+
/** he requested TTL, after which the certificate expires. */
|
|
1837
|
+
ttl?: number;
|
|
1838
|
+
/** The format of the returned data. */
|
|
1839
|
+
format?: PrivateCertificateConfigurationRotateAction.Constants.Format | string;
|
|
1840
|
+
/** The maximum path length to encode in the generated certificate. `-1` means no limit.
|
|
1841
|
+
*
|
|
1842
|
+
* If the signing certificate has a maximum path length set, the path length is set to one less than that of the
|
|
1843
|
+
* signing certificate. A limit of `0` means a literal path length of zero.
|
|
1844
|
+
*/
|
|
1845
|
+
max_path_length?: number;
|
|
1846
|
+
/** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
|
|
1847
|
+
*
|
|
1848
|
+
* If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
|
|
1849
|
+
* useful if the common name is a human-readable identifier, instead of a hostname or an email address.
|
|
1850
|
+
*/
|
|
1851
|
+
exclude_cn_from_sans?: boolean;
|
|
1852
|
+
/** The allowed DNS domains or subdomains for the certificates that are to be signed and issued by this CA
|
|
1853
|
+
* certificate.
|
|
1854
|
+
*/
|
|
1855
|
+
permitted_dns_domains?: string[];
|
|
1856
|
+
/** This field indicates whether to use values from a certificate signing request (CSR) to complete a
|
|
1857
|
+
* `private_cert_configuration_action_sign_csr` action. If it is set to `true`, then:
|
|
1858
|
+
*
|
|
1859
|
+
* 1) Subject information, including names and alternate names, are preserved from the CSR rather than by using the
|
|
1860
|
+
* values that are provided in the other parameters to this operation.
|
|
1861
|
+
*
|
|
1862
|
+
* 2) Any key usage, for example, non-repudiation, that is requested in the CSR are added to the basic set of key
|
|
1863
|
+
* usages used for CA certificates that are signed by the intermediate authority.
|
|
1864
|
+
*
|
|
1865
|
+
* 3) Extensions that are requested in the CSR are copied into the issued private certificate.
|
|
1866
|
+
*/
|
|
1867
|
+
use_csr_values?: boolean;
|
|
1868
|
+
/** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
|
|
1869
|
+
ou?: string[];
|
|
1870
|
+
/** The Organization (O) values to define in the subject field of the resulting certificate. */
|
|
1871
|
+
organization?: string[];
|
|
1872
|
+
/** The Country (C) values to define in the subject field of the resulting certificate. */
|
|
1873
|
+
country?: string[];
|
|
1874
|
+
/** The Locality (L) values to define in the subject field of the resulting certificate. */
|
|
1875
|
+
locality?: string[];
|
|
1876
|
+
/** The Province (ST) values to define in the subject field of the resulting certificate. */
|
|
1877
|
+
province?: string[];
|
|
1878
|
+
/** The street address values to define in the subject field of the resulting certificate. */
|
|
1879
|
+
street_address?: string[];
|
|
1880
|
+
/** The postal code values to define in the subject field of the resulting certificate. */
|
|
1881
|
+
postal_code?: string[];
|
|
1882
|
+
/** The requested value for the [`serialNumber`](https://datatracker.ietf.org/doc/html/rfc4519#section-2.31)
|
|
1883
|
+
* attribute that is in the certificate's distinguished name (DN).
|
|
1884
|
+
*
|
|
1885
|
+
* **Note:** This field is not related to the `serial_number` field that is returned in the API response. The
|
|
1886
|
+
* `serial_number` field represents the certificate's randomly assigned serial number.
|
|
1887
|
+
*/
|
|
1888
|
+
serial_number?: string;
|
|
1889
|
+
/** The certificate signing request. */
|
|
1890
|
+
csr?: string;
|
|
1891
|
+
/** The data that is associated with the root certificate authority. */
|
|
1892
|
+
data?: PrivateCertificateConfigurationCACertificate;
|
|
1893
|
+
}
|
|
1894
|
+
namespace PrivateCertificateConfigurationRotateAction {
|
|
1895
|
+
namespace Constants {
|
|
1896
|
+
/** The format of the returned data. */
|
|
1897
|
+
enum Format {
|
|
1898
|
+
PEM = "pem",
|
|
1899
|
+
PEM_BUNDLE = "pem_bundle"
|
|
1900
|
+
}
|
|
1901
|
+
}
|
|
1902
|
+
}
|
|
1617
1903
|
/**
|
|
1618
1904
|
* The data that is associated with a cryptographic key.
|
|
1619
1905
|
*/
|
|
@@ -1677,7 +1963,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1677
1963
|
* Properties that describe a secret group.
|
|
1678
1964
|
*/
|
|
1679
1965
|
interface SecretGroup {
|
|
1680
|
-
/** A
|
|
1966
|
+
/** A UUID identifier, or `default` secret group. */
|
|
1681
1967
|
id: string;
|
|
1682
1968
|
/** The name of your existing secret group. */
|
|
1683
1969
|
name?: string;
|
|
@@ -1727,11 +2013,11 @@ declare namespace SecretsManagerV2 {
|
|
|
1727
2013
|
updated_at: string;
|
|
1728
2014
|
/** The unique identifier that is associated with the entity that created the secret. */
|
|
1729
2015
|
created_by: string;
|
|
1730
|
-
/** A
|
|
2016
|
+
/** A UUID identifier, or `default` secret group. */
|
|
1731
2017
|
secret_group_id: string;
|
|
1732
|
-
/** A
|
|
2018
|
+
/** A UUID identifier. */
|
|
1733
2019
|
secret_id: string;
|
|
1734
|
-
/** A
|
|
2020
|
+
/** A UUID identifier. */
|
|
1735
2021
|
secret_version_id: string;
|
|
1736
2022
|
/** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
|
|
1737
2023
|
* is used for version `n-1`.
|
|
@@ -1770,14 +2056,14 @@ declare namespace SecretsManagerV2 {
|
|
|
1770
2056
|
* Create locks response body containing a collection of locks that are attached to a secret.
|
|
1771
2057
|
*/
|
|
1772
2058
|
interface SecretLocks {
|
|
1773
|
-
/** A
|
|
2059
|
+
/** A UUID identifier. */
|
|
1774
2060
|
secret_id: string;
|
|
1775
|
-
/** A
|
|
2061
|
+
/** A UUID identifier, or `default` secret group. */
|
|
1776
2062
|
secret_group_id: string;
|
|
1777
2063
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
1778
2064
|
* service_credentials, kv, and username_password.
|
|
1779
2065
|
*/
|
|
1780
|
-
secret_type
|
|
2066
|
+
secret_type: SecretLocks.Constants.SecretType | string;
|
|
1781
2067
|
/** The human-readable name of your secret. */
|
|
1782
2068
|
secret_name?: string;
|
|
1783
2069
|
/** A collection of locks that are attached to a secret. */
|
|
@@ -1869,7 +2155,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1869
2155
|
* SecretVersionLocks.
|
|
1870
2156
|
*/
|
|
1871
2157
|
interface SecretVersionLocks {
|
|
1872
|
-
/** A
|
|
2158
|
+
/** A UUID identifier. */
|
|
1873
2159
|
version_id: string;
|
|
1874
2160
|
/** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
|
|
1875
2161
|
* is used for version `n-1`.
|
|
@@ -2123,7 +2409,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2123
2409
|
* call to the service API.
|
|
2124
2410
|
*/
|
|
2125
2411
|
downloaded?: boolean;
|
|
2126
|
-
/** A
|
|
2412
|
+
/** A UUID identifier. */
|
|
2127
2413
|
id: string;
|
|
2128
2414
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2129
2415
|
*
|
|
@@ -2136,7 +2422,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2136
2422
|
locks_total?: number;
|
|
2137
2423
|
/** The human-readable name of your secret. */
|
|
2138
2424
|
name?: string;
|
|
2139
|
-
/** A
|
|
2425
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2140
2426
|
secret_group_id: string;
|
|
2141
2427
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2142
2428
|
* service_credentials, kv, and username_password.
|
|
@@ -2206,7 +2492,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2206
2492
|
* call to the service API.
|
|
2207
2493
|
*/
|
|
2208
2494
|
downloaded?: boolean;
|
|
2209
|
-
/** A
|
|
2495
|
+
/** A UUID identifier. */
|
|
2210
2496
|
id: string;
|
|
2211
2497
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2212
2498
|
*
|
|
@@ -2219,7 +2505,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2219
2505
|
locks_total?: number;
|
|
2220
2506
|
/** The human-readable name of your secret. */
|
|
2221
2507
|
name?: string;
|
|
2222
|
-
/** A
|
|
2508
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2223
2509
|
secret_group_id: string;
|
|
2224
2510
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2225
2511
|
* service_credentials, kv, and username_password.
|
|
@@ -2322,7 +2608,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2322
2608
|
* To protect your privacy, do not use personal data, such as your name or location, as a name for your secret.
|
|
2323
2609
|
*/
|
|
2324
2610
|
name: string;
|
|
2325
|
-
/** A
|
|
2611
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2326
2612
|
secret_group_id?: string;
|
|
2327
2613
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2328
2614
|
* service_credentials, kv, and username_password.
|
|
@@ -2362,7 +2648,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2362
2648
|
* call to the service API.
|
|
2363
2649
|
*/
|
|
2364
2650
|
downloaded?: boolean;
|
|
2365
|
-
/** A
|
|
2651
|
+
/** A UUID identifier. */
|
|
2366
2652
|
id: string;
|
|
2367
2653
|
/** The human-readable name of your secret. */
|
|
2368
2654
|
secret_name?: string;
|
|
@@ -2370,7 +2656,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2370
2656
|
* service_credentials, kv, and username_password.
|
|
2371
2657
|
*/
|
|
2372
2658
|
secret_type: ArbitrarySecretVersion.Constants.SecretType | string;
|
|
2373
|
-
/** A
|
|
2659
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2374
2660
|
secret_group_id: string;
|
|
2375
2661
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
2376
2662
|
payload_available: boolean;
|
|
@@ -2380,7 +2666,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2380
2666
|
alias?: ArbitrarySecretVersion.Constants.Alias | string;
|
|
2381
2667
|
/** The secret version metadata that a user can customize. */
|
|
2382
2668
|
version_custom_metadata?: JsonObject;
|
|
2383
|
-
/** A
|
|
2669
|
+
/** A UUID identifier. */
|
|
2384
2670
|
secret_id: string;
|
|
2385
2671
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
2386
2672
|
* types: Arbitrary, username_password.
|
|
@@ -2423,7 +2709,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2423
2709
|
* call to the service API.
|
|
2424
2710
|
*/
|
|
2425
2711
|
downloaded?: boolean;
|
|
2426
|
-
/** A
|
|
2712
|
+
/** A UUID identifier. */
|
|
2427
2713
|
id: string;
|
|
2428
2714
|
/** The human-readable name of your secret. */
|
|
2429
2715
|
secret_name?: string;
|
|
@@ -2431,7 +2717,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2431
2717
|
* service_credentials, kv, and username_password.
|
|
2432
2718
|
*/
|
|
2433
2719
|
secret_type: ArbitrarySecretVersionMetadata.Constants.SecretType | string;
|
|
2434
|
-
/** A
|
|
2720
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2435
2721
|
secret_group_id: string;
|
|
2436
2722
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
2437
2723
|
payload_available: boolean;
|
|
@@ -2441,7 +2727,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2441
2727
|
alias?: ArbitrarySecretVersionMetadata.Constants.Alias | string;
|
|
2442
2728
|
/** The secret version metadata that a user can customize. */
|
|
2443
2729
|
version_custom_metadata?: JsonObject;
|
|
2444
|
-
/** A
|
|
2730
|
+
/** A UUID identifier. */
|
|
2445
2731
|
secret_id: string;
|
|
2446
2732
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
2447
2733
|
* types: Arbitrary, username_password.
|
|
@@ -2686,7 +2972,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2686
2972
|
* call to the service API.
|
|
2687
2973
|
*/
|
|
2688
2974
|
downloaded?: boolean;
|
|
2689
|
-
/** A
|
|
2975
|
+
/** A UUID identifier. */
|
|
2690
2976
|
id: string;
|
|
2691
2977
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2692
2978
|
*
|
|
@@ -2699,7 +2985,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2699
2985
|
locks_total?: number;
|
|
2700
2986
|
/** The human-readable name of your secret. */
|
|
2701
2987
|
name?: string;
|
|
2702
|
-
/** A
|
|
2988
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2703
2989
|
secret_group_id: string;
|
|
2704
2990
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2705
2991
|
* service_credentials, kv, and username_password.
|
|
@@ -2827,7 +3113,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2827
3113
|
* call to the service API.
|
|
2828
3114
|
*/
|
|
2829
3115
|
downloaded?: boolean;
|
|
2830
|
-
/** A
|
|
3116
|
+
/** A UUID identifier. */
|
|
2831
3117
|
id: string;
|
|
2832
3118
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2833
3119
|
*
|
|
@@ -2840,7 +3126,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2840
3126
|
locks_total?: number;
|
|
2841
3127
|
/** The human-readable name of your secret. */
|
|
2842
3128
|
name?: string;
|
|
2843
|
-
/** A
|
|
3129
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2844
3130
|
secret_group_id: string;
|
|
2845
3131
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2846
3132
|
* service_credentials, kv, and username_password.
|
|
@@ -2996,7 +3282,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2996
3282
|
* secret group.
|
|
2997
3283
|
*/
|
|
2998
3284
|
description?: string;
|
|
2999
|
-
/** A
|
|
3285
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3000
3286
|
secret_group_id?: string;
|
|
3001
3287
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3002
3288
|
*
|
|
@@ -3068,7 +3354,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3068
3354
|
* IAMCredentialsSecretRestoreFromVersionPrototype.
|
|
3069
3355
|
*/
|
|
3070
3356
|
interface IAMCredentialsSecretRestoreFromVersionPrototype extends SecretVersionPrototype {
|
|
3071
|
-
/** A
|
|
3357
|
+
/** A UUID identifier, or `current` or `previous` secret version aliases. */
|
|
3072
3358
|
restore_from_version: string;
|
|
3073
3359
|
/** The secret metadata that a user can customize. */
|
|
3074
3360
|
custom_metadata?: JsonObject;
|
|
@@ -3089,7 +3375,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3089
3375
|
* call to the service API.
|
|
3090
3376
|
*/
|
|
3091
3377
|
downloaded?: boolean;
|
|
3092
|
-
/** A
|
|
3378
|
+
/** A UUID identifier. */
|
|
3093
3379
|
id: string;
|
|
3094
3380
|
/** The human-readable name of your secret. */
|
|
3095
3381
|
secret_name?: string;
|
|
@@ -3097,7 +3383,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3097
3383
|
* service_credentials, kv, and username_password.
|
|
3098
3384
|
*/
|
|
3099
3385
|
secret_type: IAMCredentialsSecretVersion.Constants.SecretType | string;
|
|
3100
|
-
/** A
|
|
3386
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3101
3387
|
secret_group_id: string;
|
|
3102
3388
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3103
3389
|
payload_available: boolean;
|
|
@@ -3107,7 +3393,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3107
3393
|
alias?: IAMCredentialsSecretVersion.Constants.Alias | string;
|
|
3108
3394
|
/** The secret version metadata that a user can customize. */
|
|
3109
3395
|
version_custom_metadata?: JsonObject;
|
|
3110
|
-
/** A
|
|
3396
|
+
/** A UUID identifier. */
|
|
3111
3397
|
secret_id: string;
|
|
3112
3398
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3113
3399
|
* types: Arbitrary, username_password.
|
|
@@ -3167,7 +3453,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3167
3453
|
* call to the service API.
|
|
3168
3454
|
*/
|
|
3169
3455
|
downloaded?: boolean;
|
|
3170
|
-
/** A
|
|
3456
|
+
/** A UUID identifier. */
|
|
3171
3457
|
id: string;
|
|
3172
3458
|
/** The human-readable name of your secret. */
|
|
3173
3459
|
secret_name?: string;
|
|
@@ -3175,7 +3461,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3175
3461
|
* service_credentials, kv, and username_password.
|
|
3176
3462
|
*/
|
|
3177
3463
|
secret_type: IAMCredentialsSecretVersionMetadata.Constants.SecretType | string;
|
|
3178
|
-
/** A
|
|
3464
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3179
3465
|
secret_group_id: string;
|
|
3180
3466
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3181
3467
|
payload_available: boolean;
|
|
@@ -3185,7 +3471,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3185
3471
|
alias?: IAMCredentialsSecretVersionMetadata.Constants.Alias | string;
|
|
3186
3472
|
/** The secret version metadata that a user can customize. */
|
|
3187
3473
|
version_custom_metadata?: JsonObject;
|
|
3188
|
-
/** A
|
|
3474
|
+
/** A UUID identifier. */
|
|
3189
3475
|
secret_id: string;
|
|
3190
3476
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3191
3477
|
* types: Arbitrary, username_password.
|
|
@@ -3255,7 +3541,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3255
3541
|
* call to the service API.
|
|
3256
3542
|
*/
|
|
3257
3543
|
downloaded?: boolean;
|
|
3258
|
-
/** A
|
|
3544
|
+
/** A UUID identifier. */
|
|
3259
3545
|
id: string;
|
|
3260
3546
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3261
3547
|
*
|
|
@@ -3268,7 +3554,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3268
3554
|
locks_total?: number;
|
|
3269
3555
|
/** The human-readable name of your secret. */
|
|
3270
3556
|
name?: string;
|
|
3271
|
-
/** A
|
|
3557
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3272
3558
|
secret_group_id: string;
|
|
3273
3559
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3274
3560
|
* service_credentials, kv, and username_password.
|
|
@@ -3289,7 +3575,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3289
3575
|
/** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
|
|
3290
3576
|
* certificate.
|
|
3291
3577
|
*/
|
|
3292
|
-
signing_algorithm
|
|
3578
|
+
signing_algorithm?: string;
|
|
3293
3579
|
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
3294
3580
|
* SSL certificate.
|
|
3295
3581
|
*/
|
|
@@ -3299,23 +3585,25 @@ declare namespace SecretsManagerV2 {
|
|
|
3299
3585
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3300
3586
|
* types: Arbitrary, username_password.
|
|
3301
3587
|
*/
|
|
3302
|
-
expiration_date
|
|
3588
|
+
expiration_date?: string;
|
|
3303
3589
|
/** Indicates whether the certificate was imported with an associated intermediate certificate. */
|
|
3304
|
-
intermediate_included
|
|
3590
|
+
intermediate_included?: boolean;
|
|
3305
3591
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3306
|
-
issuer
|
|
3592
|
+
issuer?: string;
|
|
3307
3593
|
/** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
|
|
3308
3594
|
* certificate.
|
|
3309
3595
|
*/
|
|
3310
3596
|
key_algorithm?: string;
|
|
3311
3597
|
/** Indicates whether the certificate was imported with an associated private key. */
|
|
3312
|
-
private_key_included
|
|
3598
|
+
private_key_included?: boolean;
|
|
3313
3599
|
/** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
|
|
3314
|
-
serial_number
|
|
3600
|
+
serial_number?: string;
|
|
3315
3601
|
/** The date and time that the certificate validity period begins and ends. */
|
|
3316
|
-
validity
|
|
3602
|
+
validity?: CertificateValidity;
|
|
3603
|
+
/** The data specified to create the CSR and the private key. */
|
|
3604
|
+
managed_csr?: ImportedCertificateManagedCsrResponse;
|
|
3317
3605
|
/** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
|
|
3318
|
-
certificate
|
|
3606
|
+
certificate?: string;
|
|
3319
3607
|
/** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
|
|
3320
3608
|
* formatted on a single line with embedded newline characters.
|
|
3321
3609
|
*/
|
|
@@ -3324,6 +3612,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3324
3612
|
* line with embedded newline characters.
|
|
3325
3613
|
*/
|
|
3326
3614
|
private_key?: string;
|
|
3615
|
+
/** The certificate signing request. */
|
|
3616
|
+
csr?: string;
|
|
3327
3617
|
}
|
|
3328
3618
|
namespace ImportedCertificate {
|
|
3329
3619
|
namespace Constants {
|
|
@@ -3370,7 +3660,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3370
3660
|
* call to the service API.
|
|
3371
3661
|
*/
|
|
3372
3662
|
downloaded?: boolean;
|
|
3373
|
-
/** A
|
|
3663
|
+
/** A UUID identifier. */
|
|
3374
3664
|
id: string;
|
|
3375
3665
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3376
3666
|
*
|
|
@@ -3383,7 +3673,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3383
3673
|
locks_total?: number;
|
|
3384
3674
|
/** The human-readable name of your secret. */
|
|
3385
3675
|
name?: string;
|
|
3386
|
-
/** A
|
|
3676
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3387
3677
|
secret_group_id: string;
|
|
3388
3678
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3389
3679
|
* service_credentials, kv, and username_password.
|
|
@@ -3404,7 +3694,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3404
3694
|
/** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
|
|
3405
3695
|
* certificate.
|
|
3406
3696
|
*/
|
|
3407
|
-
signing_algorithm
|
|
3697
|
+
signing_algorithm?: string;
|
|
3408
3698
|
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
3409
3699
|
* SSL certificate.
|
|
3410
3700
|
*/
|
|
@@ -3414,21 +3704,23 @@ declare namespace SecretsManagerV2 {
|
|
|
3414
3704
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3415
3705
|
* types: Arbitrary, username_password.
|
|
3416
3706
|
*/
|
|
3417
|
-
expiration_date
|
|
3707
|
+
expiration_date?: string;
|
|
3418
3708
|
/** Indicates whether the certificate was imported with an associated intermediate certificate. */
|
|
3419
|
-
intermediate_included
|
|
3709
|
+
intermediate_included?: boolean;
|
|
3420
3710
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3421
|
-
issuer
|
|
3711
|
+
issuer?: string;
|
|
3422
3712
|
/** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
|
|
3423
3713
|
* certificate.
|
|
3424
3714
|
*/
|
|
3425
3715
|
key_algorithm?: string;
|
|
3426
3716
|
/** Indicates whether the certificate was imported with an associated private key. */
|
|
3427
|
-
private_key_included
|
|
3717
|
+
private_key_included?: boolean;
|
|
3428
3718
|
/** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
|
|
3429
|
-
serial_number
|
|
3719
|
+
serial_number?: string;
|
|
3430
3720
|
/** The date and time that the certificate validity period begins and ends. */
|
|
3431
|
-
validity
|
|
3721
|
+
validity?: CertificateValidity;
|
|
3722
|
+
/** The data specified to create the CSR and the private key. */
|
|
3723
|
+
managed_csr?: ImportedCertificateManagedCsrResponse;
|
|
3432
3724
|
}
|
|
3433
3725
|
namespace ImportedCertificateMetadata {
|
|
3434
3726
|
namespace Constants {
|
|
@@ -3477,6 +3769,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3477
3769
|
labels?: string[];
|
|
3478
3770
|
/** The secret metadata that a user can customize. */
|
|
3479
3771
|
custom_metadata?: JsonObject;
|
|
3772
|
+
/** The data specified to create the CSR and the private key. */
|
|
3773
|
+
managed_csr?: ImportedCertificateManagedCsr;
|
|
3480
3774
|
}
|
|
3481
3775
|
/**
|
|
3482
3776
|
* ImportedCertificatePrototype.
|
|
@@ -3497,7 +3791,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3497
3791
|
* secret group.
|
|
3498
3792
|
*/
|
|
3499
3793
|
description?: string;
|
|
3500
|
-
/** A
|
|
3794
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3501
3795
|
secret_group_id?: string;
|
|
3502
3796
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3503
3797
|
*
|
|
@@ -3507,7 +3801,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3507
3801
|
*/
|
|
3508
3802
|
labels?: string[];
|
|
3509
3803
|
/** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
|
|
3510
|
-
certificate
|
|
3804
|
+
certificate?: string;
|
|
3511
3805
|
/** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
|
|
3512
3806
|
* formatted on a single line with embedded newline characters.
|
|
3513
3807
|
*/
|
|
@@ -3516,6 +3810,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3516
3810
|
* line with embedded newline characters.
|
|
3517
3811
|
*/
|
|
3518
3812
|
private_key?: string;
|
|
3813
|
+
/** The data specified to create the CSR and the private key. */
|
|
3814
|
+
managed_csr?: ImportedCertificateManagedCsr;
|
|
3519
3815
|
/** The secret metadata that a user can customize. */
|
|
3520
3816
|
custom_metadata?: JsonObject;
|
|
3521
3817
|
/** The secret version metadata that a user can customize. */
|
|
@@ -3550,7 +3846,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3550
3846
|
* call to the service API.
|
|
3551
3847
|
*/
|
|
3552
3848
|
downloaded?: boolean;
|
|
3553
|
-
/** A
|
|
3849
|
+
/** A UUID identifier. */
|
|
3554
3850
|
id: string;
|
|
3555
3851
|
/** The human-readable name of your secret. */
|
|
3556
3852
|
secret_name?: string;
|
|
@@ -3558,7 +3854,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3558
3854
|
* service_credentials, kv, and username_password.
|
|
3559
3855
|
*/
|
|
3560
3856
|
secret_type: ImportedCertificateVersion.Constants.SecretType | string;
|
|
3561
|
-
/** A
|
|
3857
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3562
3858
|
secret_group_id: string;
|
|
3563
3859
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3564
3860
|
payload_available: boolean;
|
|
@@ -3568,7 +3864,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3568
3864
|
alias?: ImportedCertificateVersion.Constants.Alias | string;
|
|
3569
3865
|
/** The secret version metadata that a user can customize. */
|
|
3570
3866
|
version_custom_metadata?: JsonObject;
|
|
3571
|
-
/** A
|
|
3867
|
+
/** A UUID identifier. */
|
|
3572
3868
|
secret_id: string;
|
|
3573
3869
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3574
3870
|
* types: Arbitrary, username_password.
|
|
@@ -3579,7 +3875,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3579
3875
|
/** The date and time that the certificate validity period begins and ends. */
|
|
3580
3876
|
validity: CertificateValidity;
|
|
3581
3877
|
/** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
|
|
3582
|
-
certificate
|
|
3878
|
+
certificate?: string;
|
|
3583
3879
|
/** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
|
|
3584
3880
|
* formatted on a single line with embedded newline characters.
|
|
3585
3881
|
*/
|
|
@@ -3588,6 +3884,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3588
3884
|
* line with embedded newline characters.
|
|
3589
3885
|
*/
|
|
3590
3886
|
private_key?: string;
|
|
3887
|
+
/** The certificate signing request. */
|
|
3888
|
+
csr?: string;
|
|
3591
3889
|
}
|
|
3592
3890
|
namespace ImportedCertificateVersion {
|
|
3593
3891
|
namespace Constants {
|
|
@@ -3623,7 +3921,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3623
3921
|
* call to the service API.
|
|
3624
3922
|
*/
|
|
3625
3923
|
downloaded?: boolean;
|
|
3626
|
-
/** A
|
|
3924
|
+
/** A UUID identifier. */
|
|
3627
3925
|
id: string;
|
|
3628
3926
|
/** The human-readable name of your secret. */
|
|
3629
3927
|
secret_name?: string;
|
|
@@ -3631,7 +3929,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3631
3929
|
* service_credentials, kv, and username_password.
|
|
3632
3930
|
*/
|
|
3633
3931
|
secret_type: ImportedCertificateVersionMetadata.Constants.SecretType | string;
|
|
3634
|
-
/** A
|
|
3932
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3635
3933
|
secret_group_id: string;
|
|
3636
3934
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3637
3935
|
payload_available: boolean;
|
|
@@ -3641,7 +3939,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3641
3939
|
alias?: ImportedCertificateVersionMetadata.Constants.Alias | string;
|
|
3642
3940
|
/** The secret version metadata that a user can customize. */
|
|
3643
3941
|
version_custom_metadata?: JsonObject;
|
|
3644
|
-
/** A
|
|
3942
|
+
/** A UUID identifier. */
|
|
3645
3943
|
secret_id: string;
|
|
3646
3944
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3647
3945
|
* types: Arbitrary, username_password.
|
|
@@ -3713,7 +4011,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3713
4011
|
* call to the service API.
|
|
3714
4012
|
*/
|
|
3715
4013
|
downloaded?: boolean;
|
|
3716
|
-
/** A
|
|
4014
|
+
/** A UUID identifier. */
|
|
3717
4015
|
id: string;
|
|
3718
4016
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3719
4017
|
*
|
|
@@ -3726,7 +4024,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3726
4024
|
locks_total?: number;
|
|
3727
4025
|
/** The human-readable name of your secret. */
|
|
3728
4026
|
name?: string;
|
|
3729
|
-
/** A
|
|
4027
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3730
4028
|
secret_group_id: string;
|
|
3731
4029
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3732
4030
|
* service_credentials, kv, and username_password.
|
|
@@ -3792,7 +4090,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3792
4090
|
* call to the service API.
|
|
3793
4091
|
*/
|
|
3794
4092
|
downloaded?: boolean;
|
|
3795
|
-
/** A
|
|
4093
|
+
/** A UUID identifier. */
|
|
3796
4094
|
id: string;
|
|
3797
4095
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3798
4096
|
*
|
|
@@ -3805,7 +4103,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3805
4103
|
locks_total?: number;
|
|
3806
4104
|
/** The human-readable name of your secret. */
|
|
3807
4105
|
name?: string;
|
|
3808
|
-
/** A
|
|
4106
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3809
4107
|
secret_group_id: string;
|
|
3810
4108
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3811
4109
|
* service_credentials, kv, and username_password.
|
|
@@ -3891,7 +4189,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3891
4189
|
* secret group.
|
|
3892
4190
|
*/
|
|
3893
4191
|
description?: string;
|
|
3894
|
-
/** A
|
|
4192
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3895
4193
|
secret_group_id?: string;
|
|
3896
4194
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3897
4195
|
*
|
|
@@ -3936,7 +4234,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3936
4234
|
* call to the service API.
|
|
3937
4235
|
*/
|
|
3938
4236
|
downloaded?: boolean;
|
|
3939
|
-
/** A
|
|
4237
|
+
/** A UUID identifier. */
|
|
3940
4238
|
id: string;
|
|
3941
4239
|
/** The human-readable name of your secret. */
|
|
3942
4240
|
secret_name?: string;
|
|
@@ -3944,7 +4242,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3944
4242
|
* service_credentials, kv, and username_password.
|
|
3945
4243
|
*/
|
|
3946
4244
|
secret_type: KVSecretVersion.Constants.SecretType | string;
|
|
3947
|
-
/** A
|
|
4245
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3948
4246
|
secret_group_id: string;
|
|
3949
4247
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3950
4248
|
payload_available: boolean;
|
|
@@ -3954,7 +4252,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3954
4252
|
alias?: KVSecretVersion.Constants.Alias | string;
|
|
3955
4253
|
/** The secret version metadata that a user can customize. */
|
|
3956
4254
|
version_custom_metadata?: JsonObject;
|
|
3957
|
-
/** A
|
|
4255
|
+
/** A UUID identifier. */
|
|
3958
4256
|
secret_id: string;
|
|
3959
4257
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3960
4258
|
* types: Arbitrary, username_password.
|
|
@@ -3997,7 +4295,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3997
4295
|
* call to the service API.
|
|
3998
4296
|
*/
|
|
3999
4297
|
downloaded?: boolean;
|
|
4000
|
-
/** A
|
|
4298
|
+
/** A UUID identifier. */
|
|
4001
4299
|
id: string;
|
|
4002
4300
|
/** The human-readable name of your secret. */
|
|
4003
4301
|
secret_name?: string;
|
|
@@ -4005,7 +4303,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4005
4303
|
* service_credentials, kv, and username_password.
|
|
4006
4304
|
*/
|
|
4007
4305
|
secret_type: KVSecretVersionMetadata.Constants.SecretType | string;
|
|
4008
|
-
/** A
|
|
4306
|
+
/** A UUID identifier, or `default` secret group. */
|
|
4009
4307
|
secret_group_id: string;
|
|
4010
4308
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
4011
4309
|
payload_available: boolean;
|
|
@@ -4015,7 +4313,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4015
4313
|
alias?: KVSecretVersionMetadata.Constants.Alias | string;
|
|
4016
4314
|
/** The secret version metadata that a user can customize. */
|
|
4017
4315
|
version_custom_metadata?: JsonObject;
|
|
4018
|
-
/** A
|
|
4316
|
+
/** A UUID identifier. */
|
|
4019
4317
|
secret_id: string;
|
|
4020
4318
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
4021
4319
|
* types: Arbitrary, username_password.
|
|
@@ -4075,7 +4373,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4075
4373
|
* call to the service API.
|
|
4076
4374
|
*/
|
|
4077
4375
|
downloaded?: boolean;
|
|
4078
|
-
/** A
|
|
4376
|
+
/** A UUID identifier. */
|
|
4079
4377
|
id: string;
|
|
4080
4378
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
4081
4379
|
*
|
|
@@ -4088,7 +4386,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4088
4386
|
locks_total?: number;
|
|
4089
4387
|
/** The human-readable name of your secret. */
|
|
4090
4388
|
name?: string;
|
|
4091
|
-
/** A
|
|
4389
|
+
/** A UUID identifier, or `default` secret group. */
|
|
4092
4390
|
secret_group_id: string;
|
|
4093
4391
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
4094
4392
|
* service_credentials, kv, and username_password.
|
|
@@ -4233,7 +4531,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4233
4531
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4234
4532
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4235
4533
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4236
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4534
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4535
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4237
4536
|
}
|
|
4238
4537
|
}
|
|
4239
4538
|
}
|
|
@@ -4252,7 +4551,34 @@ declare namespace SecretsManagerV2 {
|
|
|
4252
4551
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4253
4552
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4254
4553
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4255
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4554
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4555
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4556
|
+
}
|
|
4557
|
+
}
|
|
4558
|
+
}
|
|
4559
|
+
/**
|
|
4560
|
+
* The response body to specify the properties of the action to rotate the private certificate.
|
|
4561
|
+
*/
|
|
4562
|
+
interface PrivateCertificateConfigurationActionRotate extends ConfigurationAction {
|
|
4563
|
+
/** The type of configuration action. */
|
|
4564
|
+
action_type: PrivateCertificateConfigurationActionRotate.Constants.ActionType | string;
|
|
4565
|
+
/** The name of the intermediate certificate authority configuration. */
|
|
4566
|
+
name: string;
|
|
4567
|
+
/** The response body of the action to rotate an intermediate certificate authority for the private certificate
|
|
4568
|
+
* configuration.
|
|
4569
|
+
*/
|
|
4570
|
+
config: PrivateCertificateConfigurationRotateAction;
|
|
4571
|
+
}
|
|
4572
|
+
namespace PrivateCertificateConfigurationActionRotate {
|
|
4573
|
+
namespace Constants {
|
|
4574
|
+
/** The type of configuration action. */
|
|
4575
|
+
enum ActionType {
|
|
4576
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_CRL = "private_cert_configuration_action_rotate_crl",
|
|
4577
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4578
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4579
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4580
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4581
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4256
4582
|
}
|
|
4257
4583
|
}
|
|
4258
4584
|
}
|
|
@@ -4276,7 +4602,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4276
4602
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4277
4603
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4278
4604
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4279
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4605
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4606
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4280
4607
|
}
|
|
4281
4608
|
}
|
|
4282
4609
|
}
|
|
@@ -4296,7 +4623,28 @@ declare namespace SecretsManagerV2 {
|
|
|
4296
4623
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4297
4624
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4298
4625
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4299
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4626
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4627
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4628
|
+
}
|
|
4629
|
+
}
|
|
4630
|
+
}
|
|
4631
|
+
/**
|
|
4632
|
+
* The request body to specify the properties of the action to rotate an intermediate CA certificate.
|
|
4633
|
+
*/
|
|
4634
|
+
interface PrivateCertificateConfigurationActionRotatePrototype extends ConfigurationActionPrototype {
|
|
4635
|
+
/** The type of configuration action. */
|
|
4636
|
+
action_type: PrivateCertificateConfigurationActionRotatePrototype.Constants.ActionType | string;
|
|
4637
|
+
}
|
|
4638
|
+
namespace PrivateCertificateConfigurationActionRotatePrototype {
|
|
4639
|
+
namespace Constants {
|
|
4640
|
+
/** The type of configuration action. */
|
|
4641
|
+
enum ActionType {
|
|
4642
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_CRL = "private_cert_configuration_action_rotate_crl",
|
|
4643
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4644
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4645
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4646
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4647
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4300
4648
|
}
|
|
4301
4649
|
}
|
|
4302
4650
|
}
|
|
@@ -4318,7 +4666,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4318
4666
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4319
4667
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4320
4668
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4321
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4669
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4670
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4322
4671
|
}
|
|
4323
4672
|
}
|
|
4324
4673
|
}
|
|
@@ -4340,7 +4689,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4340
4689
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4341
4690
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4342
4691
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4343
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4692
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4693
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4344
4694
|
}
|
|
4345
4695
|
}
|
|
4346
4696
|
}
|
|
@@ -4443,7 +4793,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4443
4793
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4444
4794
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4445
4795
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4446
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4796
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4797
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4447
4798
|
}
|
|
4448
4799
|
}
|
|
4449
4800
|
}
|
|
@@ -4544,7 +4895,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4544
4895
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4545
4896
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4546
4897
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4547
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
4898
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
4899
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4548
4900
|
}
|
|
4549
4901
|
}
|
|
4550
4902
|
}
|
|
@@ -4646,7 +4998,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4646
4998
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4647
4999
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4648
5000
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4649
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
5001
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
5002
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4650
5003
|
}
|
|
4651
5004
|
}
|
|
4652
5005
|
}
|
|
@@ -4748,7 +5101,8 @@ declare namespace SecretsManagerV2 {
|
|
|
4748
5101
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_INTERMEDIATE = "private_cert_configuration_action_sign_intermediate",
|
|
4749
5102
|
PRIVATE_CERT_CONFIGURATION_ACTION_SIGN_CSR = "private_cert_configuration_action_sign_csr",
|
|
4750
5103
|
PRIVATE_CERT_CONFIGURATION_ACTION_SET_SIGNED = "private_cert_configuration_action_set_signed",
|
|
4751
|
-
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate"
|
|
5104
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_REVOKE_CA_CERTIFICATE = "private_cert_configuration_action_revoke_ca_certificate",
|
|
5105
|
+
PRIVATE_CERT_CONFIGURATION_ACTION_ROTATE_INTERMEDIATE = "private_cert_configuration_action_rotate_intermediate"
|
|
4752
5106
|
}
|
|
4753
5107
|
}
|
|
4754
5108
|
}
|
|
@@ -6356,7 +6710,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6356
6710
|
* call to the service API.
|
|
6357
6711
|
*/
|
|
6358
6712
|
downloaded?: boolean;
|
|
6359
|
-
/** A
|
|
6713
|
+
/** A UUID identifier. */
|
|
6360
6714
|
id: string;
|
|
6361
6715
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
6362
6716
|
*
|
|
@@ -6369,7 +6723,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6369
6723
|
locks_total?: number;
|
|
6370
6724
|
/** The human-readable name of your secret. */
|
|
6371
6725
|
name?: string;
|
|
6372
|
-
/** A
|
|
6726
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6373
6727
|
secret_group_id: string;
|
|
6374
6728
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
6375
6729
|
* service_credentials, kv, and username_password.
|
|
@@ -6501,7 +6855,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6501
6855
|
* secret group.
|
|
6502
6856
|
*/
|
|
6503
6857
|
description?: string;
|
|
6504
|
-
/** A
|
|
6858
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6505
6859
|
secret_group_id?: string;
|
|
6506
6860
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
6507
6861
|
*
|
|
@@ -6596,7 +6950,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6596
6950
|
* call to the service API.
|
|
6597
6951
|
*/
|
|
6598
6952
|
downloaded?: boolean;
|
|
6599
|
-
/** A
|
|
6953
|
+
/** A UUID identifier. */
|
|
6600
6954
|
id: string;
|
|
6601
6955
|
/** The human-readable name of your secret. */
|
|
6602
6956
|
secret_name?: string;
|
|
@@ -6604,7 +6958,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6604
6958
|
* service_credentials, kv, and username_password.
|
|
6605
6959
|
*/
|
|
6606
6960
|
secret_type: PrivateCertificateVersion.Constants.SecretType | string;
|
|
6607
|
-
/** A
|
|
6961
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6608
6962
|
secret_group_id: string;
|
|
6609
6963
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
6610
6964
|
payload_available: boolean;
|
|
@@ -6614,7 +6968,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6614
6968
|
alias?: PrivateCertificateVersion.Constants.Alias | string;
|
|
6615
6969
|
/** The secret version metadata that a user can customize. */
|
|
6616
6970
|
version_custom_metadata?: JsonObject;
|
|
6617
|
-
/** A
|
|
6971
|
+
/** A UUID identifier. */
|
|
6618
6972
|
secret_id: string;
|
|
6619
6973
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
6620
6974
|
* types: Arbitrary, username_password.
|
|
@@ -6701,7 +7055,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6701
7055
|
* call to the service API.
|
|
6702
7056
|
*/
|
|
6703
7057
|
downloaded?: boolean;
|
|
6704
|
-
/** A
|
|
7058
|
+
/** A UUID identifier. */
|
|
6705
7059
|
id: string;
|
|
6706
7060
|
/** The human-readable name of your secret. */
|
|
6707
7061
|
secret_name?: string;
|
|
@@ -6709,7 +7063,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6709
7063
|
* service_credentials, kv, and username_password.
|
|
6710
7064
|
*/
|
|
6711
7065
|
secret_type: PrivateCertificateVersionMetadata.Constants.SecretType | string;
|
|
6712
|
-
/** A
|
|
7066
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6713
7067
|
secret_group_id: string;
|
|
6714
7068
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
6715
7069
|
payload_available: boolean;
|
|
@@ -6719,7 +7073,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6719
7073
|
alias?: PrivateCertificateVersionMetadata.Constants.Alias | string;
|
|
6720
7074
|
/** The secret version metadata that a user can customize. */
|
|
6721
7075
|
version_custom_metadata?: JsonObject;
|
|
6722
|
-
/** A
|
|
7076
|
+
/** A UUID identifier. */
|
|
6723
7077
|
secret_id: string;
|
|
6724
7078
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
6725
7079
|
* types: Arbitrary, username_password.
|
|
@@ -6783,7 +7137,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6783
7137
|
* call to the service API.
|
|
6784
7138
|
*/
|
|
6785
7139
|
downloaded?: boolean;
|
|
6786
|
-
/** A
|
|
7140
|
+
/** A UUID identifier. */
|
|
6787
7141
|
id: string;
|
|
6788
7142
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
6789
7143
|
*
|
|
@@ -6796,7 +7150,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6796
7150
|
locks_total?: number;
|
|
6797
7151
|
/** The human-readable name of your secret. */
|
|
6798
7152
|
name?: string;
|
|
6799
|
-
/** A
|
|
7153
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6800
7154
|
secret_group_id: string;
|
|
6801
7155
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
6802
7156
|
* service_credentials, kv, and username_password.
|
|
@@ -6823,7 +7177,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6823
7177
|
*/
|
|
6824
7178
|
alt_names?: string[];
|
|
6825
7179
|
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
6826
|
-
common_name
|
|
7180
|
+
common_name?: string;
|
|
6827
7181
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
6828
7182
|
* types: Arbitrary, username_password.
|
|
6829
7183
|
*/
|
|
@@ -7492,7 +7846,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7492
7846
|
* call to the service API.
|
|
7493
7847
|
*/
|
|
7494
7848
|
downloaded?: boolean;
|
|
7495
|
-
/** A
|
|
7849
|
+
/** A UUID identifier. */
|
|
7496
7850
|
id: string;
|
|
7497
7851
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
7498
7852
|
*
|
|
@@ -7505,7 +7859,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7505
7859
|
locks_total?: number;
|
|
7506
7860
|
/** The human-readable name of your secret. */
|
|
7507
7861
|
name?: string;
|
|
7508
|
-
/** A
|
|
7862
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7509
7863
|
secret_group_id: string;
|
|
7510
7864
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
7511
7865
|
* service_credentials, kv, and username_password.
|
|
@@ -7532,7 +7886,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7532
7886
|
*/
|
|
7533
7887
|
alt_names?: string[];
|
|
7534
7888
|
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
7535
|
-
common_name
|
|
7889
|
+
common_name?: string;
|
|
7536
7890
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7537
7891
|
* types: Arbitrary, username_password.
|
|
7538
7892
|
*/
|
|
@@ -7635,7 +7989,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7635
7989
|
* secret group.
|
|
7636
7990
|
*/
|
|
7637
7991
|
description?: string;
|
|
7638
|
-
/** A
|
|
7992
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7639
7993
|
secret_group_id?: string;
|
|
7640
7994
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
7641
7995
|
*
|
|
@@ -7645,7 +7999,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7645
7999
|
*/
|
|
7646
8000
|
labels?: string[];
|
|
7647
8001
|
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
7648
|
-
common_name
|
|
8002
|
+
common_name?: string;
|
|
7649
8003
|
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
7650
8004
|
* SSL certificate.
|
|
7651
8005
|
*/
|
|
@@ -7725,7 +8079,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7725
8079
|
* call to the service API.
|
|
7726
8080
|
*/
|
|
7727
8081
|
downloaded?: boolean;
|
|
7728
|
-
/** A
|
|
8082
|
+
/** A UUID identifier. */
|
|
7729
8083
|
id: string;
|
|
7730
8084
|
/** The human-readable name of your secret. */
|
|
7731
8085
|
secret_name?: string;
|
|
@@ -7733,7 +8087,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7733
8087
|
* service_credentials, kv, and username_password.
|
|
7734
8088
|
*/
|
|
7735
8089
|
secret_type: PublicCertificateVersion.Constants.SecretType | string;
|
|
7736
|
-
/** A
|
|
8090
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7737
8091
|
secret_group_id: string;
|
|
7738
8092
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
7739
8093
|
payload_available: boolean;
|
|
@@ -7743,7 +8097,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7743
8097
|
alias?: PublicCertificateVersion.Constants.Alias | string;
|
|
7744
8098
|
/** The secret version metadata that a user can customize. */
|
|
7745
8099
|
version_custom_metadata?: JsonObject;
|
|
7746
|
-
/** A
|
|
8100
|
+
/** A UUID identifier. */
|
|
7747
8101
|
secret_id: string;
|
|
7748
8102
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7749
8103
|
* types: Arbitrary, username_password.
|
|
@@ -7798,7 +8152,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7798
8152
|
* call to the service API.
|
|
7799
8153
|
*/
|
|
7800
8154
|
downloaded?: boolean;
|
|
7801
|
-
/** A
|
|
8155
|
+
/** A UUID identifier. */
|
|
7802
8156
|
id: string;
|
|
7803
8157
|
/** The human-readable name of your secret. */
|
|
7804
8158
|
secret_name?: string;
|
|
@@ -7806,7 +8160,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7806
8160
|
* service_credentials, kv, and username_password.
|
|
7807
8161
|
*/
|
|
7808
8162
|
secret_type: PublicCertificateVersionMetadata.Constants.SecretType | string;
|
|
7809
|
-
/** A
|
|
8163
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7810
8164
|
secret_group_id: string;
|
|
7811
8165
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
7812
8166
|
payload_available: boolean;
|
|
@@ -7816,7 +8170,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7816
8170
|
alias?: PublicCertificateVersionMetadata.Constants.Alias | string;
|
|
7817
8171
|
/** The secret version metadata that a user can customize. */
|
|
7818
8172
|
version_custom_metadata?: JsonObject;
|
|
7819
|
-
/** A
|
|
8173
|
+
/** A UUID identifier. */
|
|
7820
8174
|
secret_id: string;
|
|
7821
8175
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7822
8176
|
* types: Arbitrary, username_password.
|
|
@@ -7880,7 +8234,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7880
8234
|
* call to the service API.
|
|
7881
8235
|
*/
|
|
7882
8236
|
downloaded?: boolean;
|
|
7883
|
-
/** A
|
|
8237
|
+
/** A UUID identifier. */
|
|
7884
8238
|
id: string;
|
|
7885
8239
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
7886
8240
|
*
|
|
@@ -7893,7 +8247,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7893
8247
|
locks_total?: number;
|
|
7894
8248
|
/** The human-readable name of your secret. */
|
|
7895
8249
|
name?: string;
|
|
7896
|
-
/** A
|
|
8250
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7897
8251
|
secret_group_id: string;
|
|
7898
8252
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
7899
8253
|
* service_credentials, kv, and username_password.
|
|
@@ -7984,7 +8338,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7984
8338
|
* call to the service API.
|
|
7985
8339
|
*/
|
|
7986
8340
|
downloaded?: boolean;
|
|
7987
|
-
/** A
|
|
8341
|
+
/** A UUID identifier. */
|
|
7988
8342
|
id: string;
|
|
7989
8343
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
7990
8344
|
*
|
|
@@ -7997,7 +8351,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7997
8351
|
locks_total?: number;
|
|
7998
8352
|
/** The human-readable name of your secret. */
|
|
7999
8353
|
name?: string;
|
|
8000
|
-
/** A
|
|
8354
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8001
8355
|
secret_group_id: string;
|
|
8002
8356
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8003
8357
|
* service_credentials, kv, and username_password.
|
|
@@ -8130,7 +8484,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8130
8484
|
* username_password, private_cert, public_cert, iam_credentials.
|
|
8131
8485
|
*/
|
|
8132
8486
|
rotation?: RotationPolicy;
|
|
8133
|
-
/** A
|
|
8487
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8134
8488
|
secret_group_id?: string;
|
|
8135
8489
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8136
8490
|
* service_credentials, kv, and username_password.
|
|
@@ -8181,7 +8535,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8181
8535
|
* call to the service API.
|
|
8182
8536
|
*/
|
|
8183
8537
|
downloaded?: boolean;
|
|
8184
|
-
/** A
|
|
8538
|
+
/** A UUID identifier. */
|
|
8185
8539
|
id: string;
|
|
8186
8540
|
/** The human-readable name of your secret. */
|
|
8187
8541
|
secret_name?: string;
|
|
@@ -8189,7 +8543,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8189
8543
|
* service_credentials, kv, and username_password.
|
|
8190
8544
|
*/
|
|
8191
8545
|
secret_type: ServiceCredentialsSecretVersion.Constants.SecretType | string;
|
|
8192
|
-
/** A
|
|
8546
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8193
8547
|
secret_group_id: string;
|
|
8194
8548
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8195
8549
|
payload_available: boolean;
|
|
@@ -8199,7 +8553,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8199
8553
|
alias?: ServiceCredentialsSecretVersion.Constants.Alias | string;
|
|
8200
8554
|
/** The secret version metadata that a user can customize. */
|
|
8201
8555
|
version_custom_metadata?: JsonObject;
|
|
8202
|
-
/** A
|
|
8556
|
+
/** A UUID identifier. */
|
|
8203
8557
|
secret_id: string;
|
|
8204
8558
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8205
8559
|
* types: Arbitrary, username_password.
|
|
@@ -8244,7 +8598,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8244
8598
|
* call to the service API.
|
|
8245
8599
|
*/
|
|
8246
8600
|
downloaded?: boolean;
|
|
8247
|
-
/** A
|
|
8601
|
+
/** A UUID identifier. */
|
|
8248
8602
|
id: string;
|
|
8249
8603
|
/** The human-readable name of your secret. */
|
|
8250
8604
|
secret_name?: string;
|
|
@@ -8252,7 +8606,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8252
8606
|
* service_credentials, kv, and username_password.
|
|
8253
8607
|
*/
|
|
8254
8608
|
secret_type: ServiceCredentialsSecretVersionMetadata.Constants.SecretType | string;
|
|
8255
|
-
/** A
|
|
8609
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8256
8610
|
secret_group_id: string;
|
|
8257
8611
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8258
8612
|
payload_available: boolean;
|
|
@@ -8262,7 +8616,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8262
8616
|
alias?: ServiceCredentialsSecretVersionMetadata.Constants.Alias | string;
|
|
8263
8617
|
/** The secret version metadata that a user can customize. */
|
|
8264
8618
|
version_custom_metadata?: JsonObject;
|
|
8265
|
-
/** A
|
|
8619
|
+
/** A UUID identifier. */
|
|
8266
8620
|
secret_id: string;
|
|
8267
8621
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8268
8622
|
* types: Arbitrary, username_password.
|
|
@@ -8322,7 +8676,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8322
8676
|
* call to the service API.
|
|
8323
8677
|
*/
|
|
8324
8678
|
downloaded?: boolean;
|
|
8325
|
-
/** A
|
|
8679
|
+
/** A UUID identifier. */
|
|
8326
8680
|
id: string;
|
|
8327
8681
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8328
8682
|
*
|
|
@@ -8335,7 +8689,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8335
8689
|
locks_total?: number;
|
|
8336
8690
|
/** The human-readable name of your secret. */
|
|
8337
8691
|
name?: string;
|
|
8338
|
-
/** A
|
|
8692
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8339
8693
|
secret_group_id: string;
|
|
8340
8694
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8341
8695
|
* service_credentials, kv, and username_password.
|
|
@@ -8419,7 +8773,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8419
8773
|
* call to the service API.
|
|
8420
8774
|
*/
|
|
8421
8775
|
downloaded?: boolean;
|
|
8422
|
-
/** A
|
|
8776
|
+
/** A UUID identifier. */
|
|
8423
8777
|
id: string;
|
|
8424
8778
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8425
8779
|
*
|
|
@@ -8432,7 +8786,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8432
8786
|
locks_total?: number;
|
|
8433
8787
|
/** The human-readable name of your secret. */
|
|
8434
8788
|
name?: string;
|
|
8435
|
-
/** A
|
|
8789
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8436
8790
|
secret_group_id: string;
|
|
8437
8791
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8438
8792
|
* service_credentials, kv, and username_password.
|
|
@@ -8546,7 +8900,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8546
8900
|
* secret group.
|
|
8547
8901
|
*/
|
|
8548
8902
|
description?: string;
|
|
8549
|
-
/** A
|
|
8903
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8550
8904
|
secret_group_id?: string;
|
|
8551
8905
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8552
8906
|
*
|
|
@@ -8605,7 +8959,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8605
8959
|
* call to the service API.
|
|
8606
8960
|
*/
|
|
8607
8961
|
downloaded?: boolean;
|
|
8608
|
-
/** A
|
|
8962
|
+
/** A UUID identifier. */
|
|
8609
8963
|
id: string;
|
|
8610
8964
|
/** The human-readable name of your secret. */
|
|
8611
8965
|
secret_name?: string;
|
|
@@ -8613,7 +8967,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8613
8967
|
* service_credentials, kv, and username_password.
|
|
8614
8968
|
*/
|
|
8615
8969
|
secret_type: UsernamePasswordSecretVersion.Constants.SecretType | string;
|
|
8616
|
-
/** A
|
|
8970
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8617
8971
|
secret_group_id: string;
|
|
8618
8972
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8619
8973
|
payload_available: boolean;
|
|
@@ -8623,7 +8977,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8623
8977
|
alias?: UsernamePasswordSecretVersion.Constants.Alias | string;
|
|
8624
8978
|
/** The secret version metadata that a user can customize. */
|
|
8625
8979
|
version_custom_metadata?: JsonObject;
|
|
8626
|
-
/** A
|
|
8980
|
+
/** A UUID identifier. */
|
|
8627
8981
|
secret_id: string;
|
|
8628
8982
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8629
8983
|
* types: Arbitrary, username_password.
|
|
@@ -8668,7 +9022,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8668
9022
|
* call to the service API.
|
|
8669
9023
|
*/
|
|
8670
9024
|
downloaded?: boolean;
|
|
8671
|
-
/** A
|
|
9025
|
+
/** A UUID identifier. */
|
|
8672
9026
|
id: string;
|
|
8673
9027
|
/** The human-readable name of your secret. */
|
|
8674
9028
|
secret_name?: string;
|
|
@@ -8676,7 +9030,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8676
9030
|
* service_credentials, kv, and username_password.
|
|
8677
9031
|
*/
|
|
8678
9032
|
secret_type: UsernamePasswordSecretVersionMetadata.Constants.SecretType | string;
|
|
8679
|
-
/** A
|
|
9033
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8680
9034
|
secret_group_id: string;
|
|
8681
9035
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8682
9036
|
payload_available: boolean;
|
|
@@ -8686,7 +9040,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8686
9040
|
alias?: UsernamePasswordSecretVersionMetadata.Constants.Alias | string;
|
|
8687
9041
|
/** The secret version metadata that a user can customize. */
|
|
8688
9042
|
version_custom_metadata?: JsonObject;
|
|
8689
|
-
/** A
|
|
9043
|
+
/** A UUID identifier. */
|
|
8690
9044
|
secret_id: string;
|
|
8691
9045
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8692
9046
|
* types: Arbitrary, username_password.
|