@ibm-cloud/secrets-manager 2.0.8 → 2.0.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,6 +1,6 @@
1
1
  "use strict";
2
2
  /**
3
- * (C) Copyright IBM Corp. 2024.
3
+ * (C) Copyright IBM Corp. 2025.
4
4
  *
5
5
  * Licensed under the Apache License, Version 2.0 (the "License");
6
6
  * you may not use this file except in compliance with the License.
@@ -77,7 +77,7 @@ var __generator = (this && this.__generator) || function (thisArg, body) {
77
77
  }
78
78
  };
79
79
  /**
80
- * IBM OpenAPI SDK Code Generator Version: 3.95.2-120e65bc-20240924-152329
80
+ * IBM OpenAPI SDK Code Generator Version: 3.104.0-b4a47c49-20250418-184351
81
81
  */
82
82
  /* eslint-disable max-classes-per-file */
83
83
  /* eslint-disable no-await-in-loop */
@@ -184,7 +184,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
184
184
  SecretsManagerV2.prototype.createSecretGroup = function (params) {
185
185
  var _params = __assign({}, params);
186
186
  var _requiredParams = ['name'];
187
- var _validParams = ['name', 'description', 'headers'];
187
+ var _validParams = ['name', 'description', 'signal', 'headers'];
188
188
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
189
189
  if (_validationErrors) {
190
190
  return Promise.reject(_validationErrors);
@@ -201,10 +201,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
201
201
  body: body,
202
202
  },
203
203
  defaultOptions: extend(true, {}, this.baseOptions, {
204
- headers: extend(true, sdkHeaders, {
204
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
205
205
  'Accept': 'application/json',
206
206
  'Content-Type': 'application/json',
207
207
  }, _params.headers),
208
+ axiosOptions: {
209
+ signal: _params.signal,
210
+ },
208
211
  }),
209
212
  };
210
213
  return this.createRequest(parameters);
@@ -221,7 +224,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
221
224
  SecretsManagerV2.prototype.listSecretGroups = function (params) {
222
225
  var _params = __assign({}, params);
223
226
  var _requiredParams = [];
224
- var _validParams = ['headers'];
227
+ var _validParams = ['signal', 'headers'];
225
228
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
226
229
  if (_validationErrors) {
227
230
  return Promise.reject(_validationErrors);
@@ -233,9 +236,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
233
236
  method: 'GET',
234
237
  },
235
238
  defaultOptions: extend(true, {}, this.baseOptions, {
236
- headers: extend(true, sdkHeaders, {
239
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
237
240
  'Accept': 'application/json',
238
241
  }, _params.headers),
242
+ axiosOptions: {
243
+ signal: _params.signal,
244
+ },
239
245
  }),
240
246
  };
241
247
  return this.createRequest(parameters);
@@ -246,14 +252,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
246
252
  * Get the properties of an existing secret group by specifying the ID of the group.
247
253
  *
248
254
  * @param {Object} params - The parameters to send to the service.
249
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
255
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
250
256
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
251
257
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretGroup>>}
252
258
  */
253
259
  SecretsManagerV2.prototype.getSecretGroup = function (params) {
254
260
  var _params = __assign({}, params);
255
261
  var _requiredParams = ['id'];
256
- var _validParams = ['id', 'headers'];
262
+ var _validParams = ['id', 'signal', 'headers'];
257
263
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
258
264
  if (_validationErrors) {
259
265
  return Promise.reject(_validationErrors);
@@ -269,9 +275,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
269
275
  path: path,
270
276
  },
271
277
  defaultOptions: extend(true, {}, this.baseOptions, {
272
- headers: extend(true, sdkHeaders, {
278
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
273
279
  'Accept': 'application/json',
274
280
  }, _params.headers),
281
+ axiosOptions: {
282
+ signal: _params.signal,
283
+ },
275
284
  }),
276
285
  };
277
286
  return this.createRequest(parameters);
@@ -282,7 +291,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
282
291
  * Update the properties of an existing secret group, such as its name or description.
283
292
  *
284
293
  * @param {Object} params - The parameters to send to the service.
285
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
294
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
286
295
  * @param {string} [params.name] - The name of your secret group.
287
296
  * @param {string} [params.description] - An extended description of your secret group.
288
297
  *
@@ -294,7 +303,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
294
303
  SecretsManagerV2.prototype.updateSecretGroup = function (params) {
295
304
  var _params = __assign({}, params);
296
305
  var _requiredParams = ['id'];
297
- var _validParams = ['id', 'name', 'description', 'headers'];
306
+ var _validParams = ['id', 'name', 'description', 'signal', 'headers'];
298
307
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
299
308
  if (_validationErrors) {
300
309
  return Promise.reject(_validationErrors);
@@ -315,10 +324,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
315
324
  path: path,
316
325
  },
317
326
  defaultOptions: extend(true, {}, this.baseOptions, {
318
- headers: extend(true, sdkHeaders, {
327
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
319
328
  'Accept': 'application/json',
320
329
  'Content-Type': 'application/merge-patch+json',
321
330
  }, _params.headers),
331
+ axiosOptions: {
332
+ signal: _params.signal,
333
+ },
322
334
  }),
323
335
  };
324
336
  return this.createRequest(parameters);
@@ -332,14 +344,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
332
344
  * you must first delete the secrets that are associated with the group.
333
345
  *
334
346
  * @param {Object} params - The parameters to send to the service.
335
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
347
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
336
348
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
337
349
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
338
350
  */
339
351
  SecretsManagerV2.prototype.deleteSecretGroup = function (params) {
340
352
  var _params = __assign({}, params);
341
353
  var _requiredParams = ['id'];
342
- var _validParams = ['id', 'headers'];
354
+ var _validParams = ['id', 'signal', 'headers'];
343
355
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
344
356
  if (_validationErrors) {
345
357
  return Promise.reject(_validationErrors);
@@ -355,7 +367,10 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
355
367
  path: path,
356
368
  },
357
369
  defaultOptions: extend(true, {}, this.baseOptions, {
358
- headers: extend(true, sdkHeaders, {}, _params.headers),
370
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {}, _params.headers),
371
+ axiosOptions: {
372
+ signal: _params.signal,
373
+ },
359
374
  }),
360
375
  };
361
376
  return this.createRequest(parameters);
@@ -384,7 +399,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
384
399
  SecretsManagerV2.prototype.createSecret = function (params) {
385
400
  var _params = __assign({}, params);
386
401
  var _requiredParams = ['secretPrototype'];
387
- var _validParams = ['secretPrototype', 'headers'];
402
+ var _validParams = ['secretPrototype', 'signal', 'headers'];
388
403
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
389
404
  if (_validationErrors) {
390
405
  return Promise.reject(_validationErrors);
@@ -398,10 +413,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
398
413
  body: body,
399
414
  },
400
415
  defaultOptions: extend(true, {}, this.baseOptions, {
401
- headers: extend(true, sdkHeaders, {
416
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
402
417
  'Accept': 'application/json',
403
418
  'Content-Type': 'application/json',
404
419
  }, _params.headers),
420
+ axiosOptions: {
421
+ signal: _params.signal,
422
+ },
405
423
  }),
406
424
  };
407
425
  return this.createRequest(parameters);
@@ -462,7 +480,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
462
480
  SecretsManagerV2.prototype.listSecrets = function (params) {
463
481
  var _params = __assign({}, params);
464
482
  var _requiredParams = [];
465
- var _validParams = ['offset', 'limit', 'sort', 'search', 'groups', 'secretTypes', 'matchAllLabels', 'headers'];
483
+ var _validParams = ['offset', 'limit', 'sort', 'search', 'groups', 'secretTypes', 'matchAllLabels', 'signal', 'headers'];
466
484
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
467
485
  if (_validationErrors) {
468
486
  return Promise.reject(_validationErrors);
@@ -484,9 +502,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
484
502
  qs: query,
485
503
  },
486
504
  defaultOptions: extend(true, {}, this.baseOptions, {
487
- headers: extend(true, sdkHeaders, {
505
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
488
506
  'Accept': 'application/json',
489
507
  }, _params.headers),
508
+ axiosOptions: {
509
+ signal: _params.signal,
510
+ },
490
511
  }),
491
512
  };
492
513
  return this.createRequest(parameters);
@@ -500,14 +521,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
500
521
  * view only the details of a specified secret without retrieving its value, use the Get secret metadata operation.
501
522
  *
502
523
  * @param {Object} params - The parameters to send to the service.
503
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
524
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
504
525
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
505
526
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.Secret>>}
506
527
  */
507
528
  SecretsManagerV2.prototype.getSecret = function (params) {
508
529
  var _params = __assign({}, params);
509
530
  var _requiredParams = ['id'];
510
- var _validParams = ['id', 'headers'];
531
+ var _validParams = ['id', 'signal', 'headers'];
511
532
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
512
533
  if (_validationErrors) {
513
534
  return Promise.reject(_validationErrors);
@@ -523,9 +544,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
523
544
  path: path,
524
545
  },
525
546
  defaultOptions: extend(true, {}, this.baseOptions, {
526
- headers: extend(true, sdkHeaders, {
547
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
527
548
  'Accept': 'application/json',
528
549
  }, _params.headers),
550
+ axiosOptions: {
551
+ signal: _params.signal,
552
+ },
529
553
  }),
530
554
  };
531
555
  return this.createRequest(parameters);
@@ -536,18 +560,23 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
536
560
  * Delete a secret by specifying the ID of the secret.
537
561
  *
538
562
  * @param {Object} params - The parameters to send to the service.
539
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
563
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
564
+ * @param {boolean} [params.forceDelete] - Set to `true` to force delete the secret. Available only for custom
565
+ * credentials secret type.
540
566
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
541
567
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
542
568
  */
543
569
  SecretsManagerV2.prototype.deleteSecret = function (params) {
544
570
  var _params = __assign({}, params);
545
571
  var _requiredParams = ['id'];
546
- var _validParams = ['id', 'headers'];
572
+ var _validParams = ['id', 'forceDelete', 'signal', 'headers'];
547
573
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
548
574
  if (_validationErrors) {
549
575
  return Promise.reject(_validationErrors);
550
576
  }
577
+ var query = {
578
+ 'force_delete': _params.forceDelete,
579
+ };
551
580
  var path = {
552
581
  'id': _params.id,
553
582
  };
@@ -556,10 +585,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
556
585
  options: {
557
586
  url: '/api/v2/secrets/{id}',
558
587
  method: 'DELETE',
588
+ qs: query,
559
589
  path: path,
560
590
  },
561
591
  defaultOptions: extend(true, {}, this.baseOptions, {
562
- headers: extend(true, sdkHeaders, {}, _params.headers),
592
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {}, _params.headers),
593
+ axiosOptions: {
594
+ signal: _params.signal,
595
+ },
563
596
  }),
564
597
  };
565
598
  return this.createRequest(parameters);
@@ -570,14 +603,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
570
603
  * Get the metadata of a secret by specifying the ID of the secret.
571
604
  *
572
605
  * @param {Object} params - The parameters to send to the service.
573
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
606
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
574
607
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
575
608
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
576
609
  */
577
610
  SecretsManagerV2.prototype.getSecretMetadata = function (params) {
578
611
  var _params = __assign({}, params);
579
612
  var _requiredParams = ['id'];
580
- var _validParams = ['id', 'headers'];
613
+ var _validParams = ['id', 'signal', 'headers'];
581
614
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
582
615
  if (_validationErrors) {
583
616
  return Promise.reject(_validationErrors);
@@ -593,9 +626,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
593
626
  path: path,
594
627
  },
595
628
  defaultOptions: extend(true, {}, this.baseOptions, {
596
- headers: extend(true, sdkHeaders, {
629
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
597
630
  'Accept': 'application/json',
598
631
  }, _params.headers),
632
+ axiosOptions: {
633
+ signal: _params.signal,
634
+ },
599
635
  }),
600
636
  };
601
637
  return this.createRequest(parameters);
@@ -606,7 +642,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
606
642
  * Update the metadata of a secret, such as its name or description.
607
643
  *
608
644
  * @param {Object} params - The parameters to send to the service.
609
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
645
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
610
646
  * @param {SecretMetadataPatch} params.secretMetadataPatch -
611
647
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
612
648
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
@@ -614,7 +650,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
614
650
  SecretsManagerV2.prototype.updateSecretMetadata = function (params) {
615
651
  var _params = __assign({}, params);
616
652
  var _requiredParams = ['id', 'secretMetadataPatch'];
617
- var _validParams = ['id', 'secretMetadataPatch', 'headers'];
653
+ var _validParams = ['id', 'secretMetadataPatch', 'signal', 'headers'];
618
654
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
619
655
  if (_validationErrors) {
620
656
  return Promise.reject(_validationErrors);
@@ -632,10 +668,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
632
668
  path: path,
633
669
  },
634
670
  defaultOptions: extend(true, {}, this.baseOptions, {
635
- headers: extend(true, sdkHeaders, {
671
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
636
672
  'Accept': 'application/json',
637
673
  'Content-Type': 'application/merge-patch+json',
638
674
  }, _params.headers),
675
+ axiosOptions: {
676
+ signal: _params.signal,
677
+ },
639
678
  }),
640
679
  };
641
680
  return this.createRequest(parameters);
@@ -646,7 +685,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
646
685
  * Create a secret action. This operation supports the following actions:.
647
686
  *
648
687
  * @param {Object} params - The parameters to send to the service.
649
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
688
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
650
689
  * @param {SecretActionPrototype} params.secretActionPrototype -
651
690
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
652
691
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretAction>>}
@@ -654,7 +693,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
654
693
  SecretsManagerV2.prototype.createSecretAction = function (params) {
655
694
  var _params = __assign({}, params);
656
695
  var _requiredParams = ['id', 'secretActionPrototype'];
657
- var _validParams = ['id', 'secretActionPrototype', 'headers'];
696
+ var _validParams = ['id', 'secretActionPrototype', 'signal', 'headers'];
658
697
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
659
698
  if (_validationErrors) {
660
699
  return Promise.reject(_validationErrors);
@@ -672,10 +711,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
672
711
  path: path,
673
712
  },
674
713
  defaultOptions: extend(true, {}, this.baseOptions, {
675
- headers: extend(true, sdkHeaders, {
714
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
676
715
  'Accept': 'application/json',
677
716
  'Content-Type': 'application/json',
678
717
  }, _params.headers),
718
+ axiosOptions: {
719
+ signal: _params.signal,
720
+ },
679
721
  }),
680
722
  };
681
723
  return this.createRequest(parameters);
@@ -700,7 +742,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
700
742
  SecretsManagerV2.prototype.getSecretByNameType = function (params) {
701
743
  var _params = __assign({}, params);
702
744
  var _requiredParams = ['secretType', 'name', 'secretGroupName'];
703
- var _validParams = ['secretType', 'name', 'secretGroupName', 'headers'];
745
+ var _validParams = ['secretType', 'name', 'secretGroupName', 'signal', 'headers'];
704
746
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
705
747
  if (_validationErrors) {
706
748
  return Promise.reject(_validationErrors);
@@ -718,9 +760,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
718
760
  path: path,
719
761
  },
720
762
  defaultOptions: extend(true, {}, this.baseOptions, {
721
- headers: extend(true, sdkHeaders, {
763
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
722
764
  'Accept': 'application/json',
723
765
  }, _params.headers),
766
+ axiosOptions: {
767
+ signal: _params.signal,
768
+ },
724
769
  }),
725
770
  };
726
771
  return this.createRequest(parameters);
@@ -734,7 +779,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
734
779
  * Create a new secret version.
735
780
  *
736
781
  * @param {Object} params - The parameters to send to the service.
737
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
782
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
738
783
  * @param {SecretVersionPrototype} params.secretVersionPrototype -
739
784
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
740
785
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
@@ -742,7 +787,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
742
787
  SecretsManagerV2.prototype.createSecretVersion = function (params) {
743
788
  var _params = __assign({}, params);
744
789
  var _requiredParams = ['secretId', 'secretVersionPrototype'];
745
- var _validParams = ['secretId', 'secretVersionPrototype', 'headers'];
790
+ var _validParams = ['secretId', 'secretVersionPrototype', 'signal', 'headers'];
746
791
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
747
792
  if (_validationErrors) {
748
793
  return Promise.reject(_validationErrors);
@@ -760,10 +805,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
760
805
  path: path,
761
806
  },
762
807
  defaultOptions: extend(true, {}, this.baseOptions, {
763
- headers: extend(true, sdkHeaders, {
808
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
764
809
  'Accept': 'application/json',
765
810
  'Content-Type': 'application/json',
766
811
  }, _params.headers),
812
+ axiosOptions: {
813
+ signal: _params.signal,
814
+ },
767
815
  }),
768
816
  };
769
817
  return this.createRequest(parameters);
@@ -776,14 +824,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
776
824
  * A successful request returns the list of versions of a secret, along with the metadata of each version.
777
825
  *
778
826
  * @param {Object} params - The parameters to send to the service.
779
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
827
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
780
828
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
781
829
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadataCollection>>}
782
830
  */
783
831
  SecretsManagerV2.prototype.listSecretVersions = function (params) {
784
832
  var _params = __assign({}, params);
785
833
  var _requiredParams = ['secretId'];
786
- var _validParams = ['secretId', 'headers'];
834
+ var _validParams = ['secretId', 'signal', 'headers'];
787
835
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
788
836
  if (_validationErrors) {
789
837
  return Promise.reject(_validationErrors);
@@ -799,9 +847,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
799
847
  path: path,
800
848
  },
801
849
  defaultOptions: extend(true, {}, this.baseOptions, {
802
- headers: extend(true, sdkHeaders, {
850
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
803
851
  'Accept': 'application/json',
804
852
  }, _params.headers),
853
+ axiosOptions: {
854
+ signal: _params.signal,
855
+ },
805
856
  }),
806
857
  };
807
858
  return this.createRequest(parameters);
@@ -816,8 +867,8 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
816
867
  * with other metadata.
817
868
  *
818
869
  * @param {Object} params - The parameters to send to the service.
819
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
820
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
870
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
871
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
821
872
  * `previous` aliases to refer to the current or previous secret version.
822
873
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
823
874
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
@@ -825,7 +876,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
825
876
  SecretsManagerV2.prototype.getSecretVersion = function (params) {
826
877
  var _params = __assign({}, params);
827
878
  var _requiredParams = ['secretId', 'id'];
828
- var _validParams = ['secretId', 'id', 'headers'];
879
+ var _validParams = ['secretId', 'id', 'signal', 'headers'];
829
880
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
830
881
  if (_validationErrors) {
831
882
  return Promise.reject(_validationErrors);
@@ -842,9 +893,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
842
893
  path: path,
843
894
  },
844
895
  defaultOptions: extend(true, {}, this.baseOptions, {
845
- headers: extend(true, sdkHeaders, {
896
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
846
897
  'Accept': 'application/json',
847
898
  }, _params.headers),
899
+ axiosOptions: {
900
+ signal: _params.signal,
901
+ },
848
902
  }),
849
903
  };
850
904
  return this.createRequest(parameters);
@@ -852,13 +906,17 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
852
906
  /**
853
907
  * Delete the data of a secret version.
854
908
  *
855
- * Delete the data of a secret version by specifying the ID of the version.
909
+ * Delete the data of a secret version by specifying its version ID.
856
910
  *
857
- * This operation is available for secret type: iam_credentials current version.
911
+ * This operation is available for the following secret types:
912
+ *
913
+ * `iam_credentials`: current version only
914
+ *
915
+ * `custom_credentials`: both current and previous versions.
858
916
  *
859
917
  * @param {Object} params - The parameters to send to the service.
860
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
861
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
918
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
919
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
862
920
  * `previous` aliases to refer to the current or previous secret version.
863
921
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
864
922
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
@@ -866,7 +924,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
866
924
  SecretsManagerV2.prototype.deleteSecretVersionData = function (params) {
867
925
  var _params = __assign({}, params);
868
926
  var _requiredParams = ['secretId', 'id'];
869
- var _validParams = ['secretId', 'id', 'headers'];
927
+ var _validParams = ['secretId', 'id', 'signal', 'headers'];
870
928
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
871
929
  if (_validationErrors) {
872
930
  return Promise.reject(_validationErrors);
@@ -883,7 +941,10 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
883
941
  path: path,
884
942
  },
885
943
  defaultOptions: extend(true, {}, this.baseOptions, {
886
- headers: extend(true, sdkHeaders, {}, _params.headers),
944
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {}, _params.headers),
945
+ axiosOptions: {
946
+ signal: _params.signal,
947
+ },
887
948
  }),
888
949
  };
889
950
  return this.createRequest(parameters);
@@ -897,8 +958,8 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
897
958
  * A successful request returns the metadata that is associated with the specified version of your secret.
898
959
  *
899
960
  * @param {Object} params - The parameters to send to the service.
900
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
901
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
961
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
962
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
902
963
  * `previous` aliases to refer to the current or previous secret version.
903
964
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
904
965
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadata>>}
@@ -906,7 +967,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
906
967
  SecretsManagerV2.prototype.getSecretVersionMetadata = function (params) {
907
968
  var _params = __assign({}, params);
908
969
  var _requiredParams = ['secretId', 'id'];
909
- var _validParams = ['secretId', 'id', 'headers'];
970
+ var _validParams = ['secretId', 'id', 'signal', 'headers'];
910
971
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
911
972
  if (_validationErrors) {
912
973
  return Promise.reject(_validationErrors);
@@ -923,9 +984,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
923
984
  path: path,
924
985
  },
925
986
  defaultOptions: extend(true, {}, this.baseOptions, {
926
- headers: extend(true, sdkHeaders, {
987
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
927
988
  'Accept': 'application/json',
928
989
  }, _params.headers),
990
+ axiosOptions: {
991
+ signal: _params.signal,
992
+ },
929
993
  }),
930
994
  };
931
995
  return this.createRequest(parameters);
@@ -936,8 +1000,8 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
936
1000
  * Update the custom metadata of a secret version.
937
1001
  *
938
1002
  * @param {Object} params - The parameters to send to the service.
939
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
940
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
1003
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1004
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
941
1005
  * `previous` aliases to refer to the current or previous secret version.
942
1006
  * @param {JsonObject} [params.versionCustomMetadata] - The secret version metadata that a user can customize.
943
1007
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -946,7 +1010,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
946
1010
  SecretsManagerV2.prototype.updateSecretVersionMetadata = function (params) {
947
1011
  var _params = __assign({}, params);
948
1012
  var _requiredParams = ['secretId', 'id'];
949
- var _validParams = ['secretId', 'id', 'versionCustomMetadata', 'headers'];
1013
+ var _validParams = ['secretId', 'id', 'versionCustomMetadata', 'signal', 'headers'];
950
1014
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
951
1015
  if (_validationErrors) {
952
1016
  return Promise.reject(_validationErrors);
@@ -967,10 +1031,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
967
1031
  path: path,
968
1032
  },
969
1033
  defaultOptions: extend(true, {}, this.baseOptions, {
970
- headers: extend(true, sdkHeaders, {
1034
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
971
1035
  'Accept': 'application/json',
972
1036
  'Content-Type': 'application/merge-patch+json',
973
1037
  }, _params.headers),
1038
+ axiosOptions: {
1039
+ signal: _params.signal,
1040
+ },
974
1041
  }),
975
1042
  };
976
1043
  return this.createRequest(parameters);
@@ -983,8 +1050,8 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
983
1050
  * - `private_cert_action_revoke_certificate`: Revoke a version of a private certificate.
984
1051
  *
985
1052
  * @param {Object} params - The parameters to send to the service.
986
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
987
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
1053
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1054
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
988
1055
  * `previous` aliases to refer to the current or previous secret version.
989
1056
  * @param {SecretVersionActionPrototype} params.secretVersionActionPrototype -
990
1057
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -993,7 +1060,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
993
1060
  SecretsManagerV2.prototype.createSecretVersionAction = function (params) {
994
1061
  var _params = __assign({}, params);
995
1062
  var _requiredParams = ['secretId', 'id', 'secretVersionActionPrototype'];
996
- var _validParams = ['secretId', 'id', 'secretVersionActionPrototype', 'headers'];
1063
+ var _validParams = ['secretId', 'id', 'secretVersionActionPrototype', 'signal', 'headers'];
997
1064
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
998
1065
  if (_validationErrors) {
999
1066
  return Promise.reject(_validationErrors);
@@ -1012,10 +1079,190 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1012
1079
  path: path,
1013
1080
  },
1014
1081
  defaultOptions: extend(true, {}, this.baseOptions, {
1015
- headers: extend(true, sdkHeaders, {
1082
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1016
1083
  'Accept': 'application/json',
1017
1084
  'Content-Type': 'application/json',
1018
1085
  }, _params.headers),
1086
+ axiosOptions: {
1087
+ signal: _params.signal,
1088
+ },
1089
+ }),
1090
+ };
1091
+ return this.createRequest(parameters);
1092
+ };
1093
+ /*************************
1094
+ * secretTasks
1095
+ ************************/
1096
+ /**
1097
+ * List secret tasks.
1098
+ *
1099
+ * List secret tasks.
1100
+ *
1101
+ * Supported secret types: `custom_credentials`.
1102
+ *
1103
+ * @param {Object} params - The parameters to send to the service.
1104
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1105
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1106
+ * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretTaskCollection>>}
1107
+ */
1108
+ SecretsManagerV2.prototype.listSecretTasks = function (params) {
1109
+ var _params = __assign({}, params);
1110
+ var _requiredParams = ['secretId'];
1111
+ var _validParams = ['secretId', 'signal', 'headers'];
1112
+ var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1113
+ if (_validationErrors) {
1114
+ return Promise.reject(_validationErrors);
1115
+ }
1116
+ var path = {
1117
+ 'secret_id': _params.secretId,
1118
+ };
1119
+ var sdkHeaders = (0, common_1.getSdkHeaders)(SecretsManagerV2.DEFAULT_SERVICE_NAME, 'v2', 'listSecretTasks');
1120
+ var parameters = {
1121
+ options: {
1122
+ url: '/api/v2/secrets/{secret_id}/tasks',
1123
+ method: 'GET',
1124
+ path: path,
1125
+ },
1126
+ defaultOptions: extend(true, {}, this.baseOptions, {
1127
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1128
+ 'Accept': 'application/json',
1129
+ }, _params.headers),
1130
+ axiosOptions: {
1131
+ signal: _params.signal,
1132
+ },
1133
+ }),
1134
+ };
1135
+ return this.createRequest(parameters);
1136
+ };
1137
+ /**
1138
+ * Get a secret's task.
1139
+ *
1140
+ * Get a task of a secret and its details by specifying the ID of the task.
1141
+ *
1142
+ * A successful request returns the task that is associated with your secret.
1143
+ *
1144
+ * Supported secret types: `custom_credentials`.
1145
+ *
1146
+ * @param {Object} params - The parameters to send to the service.
1147
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1148
+ * @param {string} params.id - The ID that uniquely identifies your task.
1149
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1150
+ * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretTask>>}
1151
+ */
1152
+ SecretsManagerV2.prototype.getSecretTask = function (params) {
1153
+ var _params = __assign({}, params);
1154
+ var _requiredParams = ['secretId', 'id'];
1155
+ var _validParams = ['secretId', 'id', 'signal', 'headers'];
1156
+ var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1157
+ if (_validationErrors) {
1158
+ return Promise.reject(_validationErrors);
1159
+ }
1160
+ var path = {
1161
+ 'secret_id': _params.secretId,
1162
+ 'id': _params.id,
1163
+ };
1164
+ var sdkHeaders = (0, common_1.getSdkHeaders)(SecretsManagerV2.DEFAULT_SERVICE_NAME, 'v2', 'getSecretTask');
1165
+ var parameters = {
1166
+ options: {
1167
+ url: '/api/v2/secrets/{secret_id}/tasks/{id}',
1168
+ method: 'GET',
1169
+ path: path,
1170
+ },
1171
+ defaultOptions: extend(true, {}, this.baseOptions, {
1172
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1173
+ 'Accept': 'application/json',
1174
+ }, _params.headers),
1175
+ axiosOptions: {
1176
+ signal: _params.signal,
1177
+ },
1178
+ }),
1179
+ };
1180
+ return this.createRequest(parameters);
1181
+ };
1182
+ /**
1183
+ * Update a secret's task.
1184
+ *
1185
+ * A callback endpoint for updating a task with results.
1186
+ *
1187
+ * Supported secret types: `custom_credentials`.
1188
+ *
1189
+ * @param {Object} params - The parameters to send to the service.
1190
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1191
+ * @param {string} params.id - The ID that uniquely identifies your task.
1192
+ * @param {SecretTaskPrototype} params.taskPut -
1193
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1194
+ * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretTask>>}
1195
+ */
1196
+ SecretsManagerV2.prototype.replaceSecretTask = function (params) {
1197
+ var _params = __assign({}, params);
1198
+ var _requiredParams = ['secretId', 'id', 'taskPut'];
1199
+ var _validParams = ['secretId', 'id', 'taskPut', 'signal', 'headers'];
1200
+ var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1201
+ if (_validationErrors) {
1202
+ return Promise.reject(_validationErrors);
1203
+ }
1204
+ var body = _params.taskPut;
1205
+ var path = {
1206
+ 'secret_id': _params.secretId,
1207
+ 'id': _params.id,
1208
+ };
1209
+ var sdkHeaders = (0, common_1.getSdkHeaders)(SecretsManagerV2.DEFAULT_SERVICE_NAME, 'v2', 'replaceSecretTask');
1210
+ var parameters = {
1211
+ options: {
1212
+ url: '/api/v2/secrets/{secret_id}/tasks/{id}',
1213
+ method: 'PUT',
1214
+ body: body,
1215
+ path: path,
1216
+ },
1217
+ defaultOptions: extend(true, {}, this.baseOptions, {
1218
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1219
+ 'Accept': 'application/json',
1220
+ 'Content-Type': 'application/json',
1221
+ }, _params.headers),
1222
+ axiosOptions: {
1223
+ signal: _params.signal,
1224
+ },
1225
+ }),
1226
+ };
1227
+ return this.createRequest(parameters);
1228
+ };
1229
+ /**
1230
+ * Delete a task.
1231
+ *
1232
+ * Delete a task by specifying the ID of the secret.
1233
+ *
1234
+ * Supported secret types: `custom_credentials`.
1235
+ *
1236
+ * @param {Object} params - The parameters to send to the service.
1237
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1238
+ * @param {string} params.id - The ID that uniquely identifies your task.
1239
+ * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1240
+ * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
1241
+ */
1242
+ SecretsManagerV2.prototype.deleteSecretTask = function (params) {
1243
+ var _params = __assign({}, params);
1244
+ var _requiredParams = ['secretId', 'id'];
1245
+ var _validParams = ['secretId', 'id', 'signal', 'headers'];
1246
+ var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1247
+ if (_validationErrors) {
1248
+ return Promise.reject(_validationErrors);
1249
+ }
1250
+ var path = {
1251
+ 'secret_id': _params.secretId,
1252
+ 'id': _params.id,
1253
+ };
1254
+ var sdkHeaders = (0, common_1.getSdkHeaders)(SecretsManagerV2.DEFAULT_SERVICE_NAME, 'v2', 'deleteSecretTask');
1255
+ var parameters = {
1256
+ options: {
1257
+ url: '/api/v2/secrets/{secret_id}/tasks/{id}',
1258
+ method: 'DELETE',
1259
+ path: path,
1260
+ },
1261
+ defaultOptions: extend(true, {}, this.baseOptions, {
1262
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {}, _params.headers),
1263
+ axiosOptions: {
1264
+ signal: _params.signal,
1265
+ },
1019
1266
  }),
1020
1267
  };
1021
1268
  return this.createRequest(parameters);
@@ -1057,7 +1304,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1057
1304
  SecretsManagerV2.prototype.listSecretsLocks = function (params) {
1058
1305
  var _params = __assign({}, params);
1059
1306
  var _requiredParams = [];
1060
- var _validParams = ['offset', 'limit', 'search', 'groups', 'headers'];
1307
+ var _validParams = ['offset', 'limit', 'search', 'groups', 'signal', 'headers'];
1061
1308
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1062
1309
  if (_validationErrors) {
1063
1310
  return Promise.reject(_validationErrors);
@@ -1076,9 +1323,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1076
1323
  qs: query,
1077
1324
  },
1078
1325
  defaultOptions: extend(true, {}, this.baseOptions, {
1079
- headers: extend(true, sdkHeaders, {
1326
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1080
1327
  'Accept': 'application/json',
1081
1328
  }, _params.headers),
1329
+ axiosOptions: {
1330
+ signal: _params.signal,
1331
+ },
1082
1332
  }),
1083
1333
  };
1084
1334
  return this.createRequest(parameters);
@@ -1089,7 +1339,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1089
1339
  * List the locks that are associated with a specified secret.
1090
1340
  *
1091
1341
  * @param {Object} params - The parameters to send to the service.
1092
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
1342
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
1093
1343
  * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
1094
1344
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
1095
1345
  *
@@ -1118,7 +1368,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1118
1368
  SecretsManagerV2.prototype.listSecretLocks = function (params) {
1119
1369
  var _params = __assign({}, params);
1120
1370
  var _requiredParams = ['id'];
1121
- var _validParams = ['id', 'offset', 'limit', 'sort', 'search', 'headers'];
1371
+ var _validParams = ['id', 'offset', 'limit', 'sort', 'search', 'signal', 'headers'];
1122
1372
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1123
1373
  if (_validationErrors) {
1124
1374
  return Promise.reject(_validationErrors);
@@ -1141,9 +1391,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1141
1391
  path: path,
1142
1392
  },
1143
1393
  defaultOptions: extend(true, {}, this.baseOptions, {
1144
- headers: extend(true, sdkHeaders, {
1394
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1145
1395
  'Accept': 'application/json',
1146
1396
  }, _params.headers),
1397
+ axiosOptions: {
1398
+ signal: _params.signal,
1399
+ },
1147
1400
  }),
1148
1401
  };
1149
1402
  return this.createRequest(parameters);
@@ -1164,20 +1417,21 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1164
1417
  * the data of the previous secret version if it doesn't have any locks.
1165
1418
  *
1166
1419
  * @param {Object} params - The parameters to send to the service.
1167
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
1420
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
1168
1421
  * @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
1169
1422
  * @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
1170
1423
  * modes to clear any matching locks on a secret version.
1171
1424
  * - `remove_previous`: Removes any other locks with matching names if they are found in the previous version of the
1172
1425
  * secret. - `remove_previous_and_delete`: Completes the same action as `remove_previous`, but also permanently
1173
- * deletes the data of the previous secret version if it doesn't have any locks.
1426
+ * deletes the data of the previous secret version if it doesn't have any locks. Not supported for custom credentials
1427
+ * secret type.
1174
1428
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1175
1429
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
1176
1430
  */
1177
1431
  SecretsManagerV2.prototype.createSecretLocksBulk = function (params) {
1178
1432
  var _params = __assign({}, params);
1179
1433
  var _requiredParams = ['id', 'locks'];
1180
- var _validParams = ['id', 'locks', 'mode', 'headers'];
1434
+ var _validParams = ['id', 'locks', 'mode', 'signal', 'headers'];
1181
1435
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1182
1436
  if (_validationErrors) {
1183
1437
  return Promise.reject(_validationErrors);
@@ -1201,10 +1455,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1201
1455
  path: path,
1202
1456
  },
1203
1457
  defaultOptions: extend(true, {}, this.baseOptions, {
1204
- headers: extend(true, sdkHeaders, {
1458
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1205
1459
  'Accept': 'application/json',
1206
1460
  'Content-Type': 'application/json',
1207
1461
  }, _params.headers),
1462
+ axiosOptions: {
1463
+ signal: _params.signal,
1464
+ },
1208
1465
  }),
1209
1466
  };
1210
1467
  return this.createRequest(parameters);
@@ -1223,7 +1480,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1223
1480
  * of your secret.
1224
1481
  *
1225
1482
  * @param {Object} params - The parameters to send to the service.
1226
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
1483
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
1227
1484
  * @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
1228
1485
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1229
1486
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
@@ -1231,7 +1488,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1231
1488
  SecretsManagerV2.prototype.deleteSecretLocksBulk = function (params) {
1232
1489
  var _params = __assign({}, params);
1233
1490
  var _requiredParams = ['id'];
1234
- var _validParams = ['id', 'name', 'headers'];
1491
+ var _validParams = ['id', 'name', 'signal', 'headers'];
1235
1492
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1236
1493
  if (_validationErrors) {
1237
1494
  return Promise.reject(_validationErrors);
@@ -1251,9 +1508,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1251
1508
  path: path,
1252
1509
  },
1253
1510
  defaultOptions: extend(true, {}, this.baseOptions, {
1254
- headers: extend(true, sdkHeaders, {
1511
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1255
1512
  'Accept': 'application/json',
1256
1513
  }, _params.headers),
1514
+ axiosOptions: {
1515
+ signal: _params.signal,
1516
+ },
1257
1517
  }),
1258
1518
  };
1259
1519
  return this.createRequest(parameters);
@@ -1264,8 +1524,8 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1264
1524
  * List the locks that are associated with a specified secret version.
1265
1525
  *
1266
1526
  * @param {Object} params - The parameters to send to the service.
1267
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
1268
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
1527
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1528
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
1269
1529
  * `previous` aliases to refer to the current or previous secret version.
1270
1530
  * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
1271
1531
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
@@ -1295,7 +1555,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1295
1555
  SecretsManagerV2.prototype.listSecretVersionLocks = function (params) {
1296
1556
  var _params = __assign({}, params);
1297
1557
  var _requiredParams = ['secretId', 'id'];
1298
- var _validParams = ['secretId', 'id', 'offset', 'limit', 'sort', 'search', 'headers'];
1558
+ var _validParams = ['secretId', 'id', 'offset', 'limit', 'sort', 'search', 'signal', 'headers'];
1299
1559
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1300
1560
  if (_validationErrors) {
1301
1561
  return Promise.reject(_validationErrors);
@@ -1319,9 +1579,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1319
1579
  path: path,
1320
1580
  },
1321
1581
  defaultOptions: extend(true, {}, this.baseOptions, {
1322
- headers: extend(true, sdkHeaders, {
1582
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1323
1583
  'Accept': 'application/json',
1324
1584
  }, _params.headers),
1585
+ axiosOptions: {
1586
+ signal: _params.signal,
1587
+ },
1325
1588
  }),
1326
1589
  };
1327
1590
  return this.createRequest(parameters);
@@ -1342,22 +1605,23 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1342
1605
  * the data of the previous secret version if it doesn't have any locks.
1343
1606
  *
1344
1607
  * @param {Object} params - The parameters to send to the service.
1345
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
1346
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
1608
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1609
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
1347
1610
  * `previous` aliases to refer to the current or previous secret version.
1348
1611
  * @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
1349
1612
  * @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
1350
1613
  * modes to clear any matching locks on a secret version.
1351
1614
  * - `remove_previous`: Removes any other locks with matching names if they are found in the previous version of the
1352
1615
  * secret. - `remove_previous_and_delete`: Completes the same action as `remove_previous`, but also permanently
1353
- * deletes the data of the previous secret version if it doesn't have any locks.
1616
+ * deletes the data of the previous secret version if it doesn't have any locks. Not supported for custom credentials
1617
+ * secret type.
1354
1618
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1355
1619
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
1356
1620
  */
1357
1621
  SecretsManagerV2.prototype.createSecretVersionLocksBulk = function (params) {
1358
1622
  var _params = __assign({}, params);
1359
1623
  var _requiredParams = ['secretId', 'id', 'locks'];
1360
- var _validParams = ['secretId', 'id', 'locks', 'mode', 'headers'];
1624
+ var _validParams = ['secretId', 'id', 'locks', 'mode', 'signal', 'headers'];
1361
1625
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1362
1626
  if (_validationErrors) {
1363
1627
  return Promise.reject(_validationErrors);
@@ -1382,10 +1646,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1382
1646
  path: path,
1383
1647
  },
1384
1648
  defaultOptions: extend(true, {}, this.baseOptions, {
1385
- headers: extend(true, sdkHeaders, {
1649
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1386
1650
  'Accept': 'application/json',
1387
1651
  'Content-Type': 'application/json',
1388
1652
  }, _params.headers),
1653
+ axiosOptions: {
1654
+ signal: _params.signal,
1655
+ },
1389
1656
  }),
1390
1657
  };
1391
1658
  return this.createRequest(parameters);
@@ -1404,8 +1671,8 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1404
1671
  * of your secret.
1405
1672
  *
1406
1673
  * @param {Object} params - The parameters to send to the service.
1407
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
1408
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
1674
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
1675
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
1409
1676
  * `previous` aliases to refer to the current or previous secret version.
1410
1677
  * @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
1411
1678
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -1414,7 +1681,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1414
1681
  SecretsManagerV2.prototype.deleteSecretVersionLocksBulk = function (params) {
1415
1682
  var _params = __assign({}, params);
1416
1683
  var _requiredParams = ['secretId', 'id'];
1417
- var _validParams = ['secretId', 'id', 'name', 'headers'];
1684
+ var _validParams = ['secretId', 'id', 'name', 'signal', 'headers'];
1418
1685
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1419
1686
  if (_validationErrors) {
1420
1687
  return Promise.reject(_validationErrors);
@@ -1435,9 +1702,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1435
1702
  path: path,
1436
1703
  },
1437
1704
  defaultOptions: extend(true, {}, this.baseOptions, {
1438
- headers: extend(true, sdkHeaders, {
1705
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1439
1706
  'Accept': 'application/json',
1440
1707
  }, _params.headers),
1708
+ axiosOptions: {
1709
+ signal: _params.signal,
1710
+ },
1441
1711
  }),
1442
1712
  };
1443
1713
  return this.createRequest(parameters);
@@ -1451,11 +1721,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1451
1721
  * Add a configuration to the specified secret type.
1452
1722
  *
1453
1723
  * Use this operation to define the configurations that are required to create public certificates (`public_cert`),
1454
- * private certificates (`private_cert`) and IAM Credentials secrets (`iam_credentials`).
1724
+ * private certificates (`private_cert`), IAM credentials secrets (`iam_credentials`) and custom credentials secrets
1725
+ * (`custom_credentials`).
1455
1726
  *
1456
1727
  * You can add multiple configurations for your instance as follows:
1457
1728
  *
1458
- * - A single configuration for IAM Credentials.
1729
+ * - A single configuration for IAM credentials.
1459
1730
  * - Up to 10 CA configurations for public certificates.
1460
1731
  * - Up to 10 DNS configurations for public certificates.
1461
1732
  * - Up to 10 Root CA configurations for private certificates.
@@ -1470,7 +1741,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1470
1741
  SecretsManagerV2.prototype.createConfiguration = function (params) {
1471
1742
  var _params = __assign({}, params);
1472
1743
  var _requiredParams = ['configurationPrototype'];
1473
- var _validParams = ['configurationPrototype', 'headers'];
1744
+ var _validParams = ['configurationPrototype', 'signal', 'headers'];
1474
1745
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1475
1746
  if (_validationErrors) {
1476
1747
  return Promise.reject(_validationErrors);
@@ -1484,10 +1755,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1484
1755
  body: body,
1485
1756
  },
1486
1757
  defaultOptions: extend(true, {}, this.baseOptions, {
1487
- headers: extend(true, sdkHeaders, {
1758
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1488
1759
  'Accept': 'application/json',
1489
1760
  'Content-Type': 'application/json',
1490
1761
  }, _params.headers),
1762
+ axiosOptions: {
1763
+ signal: _params.signal,
1764
+ },
1491
1765
  }),
1492
1766
  };
1493
1767
  return this.createRequest(parameters);
@@ -1530,14 +1804,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1530
1804
  * You can apply multiple filters by using a comma-separated list of secret types.
1531
1805
  *
1532
1806
  * **Usage:** To retrieve a list of configurations that are associated with all secret types, use
1533
- * `..?secret_types=iam_credentials,public_cert,private_cert`.
1807
+ * `..?secret_types=iam_credentials,public_cert,private_cert,custom_credentials`.
1534
1808
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
1535
1809
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.ConfigurationMetadataPaginatedCollection>>}
1536
1810
  */
1537
1811
  SecretsManagerV2.prototype.listConfigurations = function (params) {
1538
1812
  var _params = __assign({}, params);
1539
1813
  var _requiredParams = [];
1540
- var _validParams = ['offset', 'limit', 'sort', 'search', 'secretTypes', 'headers'];
1814
+ var _validParams = ['offset', 'limit', 'sort', 'search', 'secretTypes', 'signal', 'headers'];
1541
1815
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1542
1816
  if (_validationErrors) {
1543
1817
  return Promise.reject(_validationErrors);
@@ -1557,9 +1831,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1557
1831
  qs: query,
1558
1832
  },
1559
1833
  defaultOptions: extend(true, {}, this.baseOptions, {
1560
- headers: extend(true, sdkHeaders, {
1834
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1561
1835
  'Accept': 'application/json',
1562
1836
  }, _params.headers),
1837
+ axiosOptions: {
1838
+ signal: _params.signal,
1839
+ },
1563
1840
  }),
1564
1841
  };
1565
1842
  return this.createRequest(parameters);
@@ -1581,7 +1858,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1581
1858
  SecretsManagerV2.prototype.getConfiguration = function (params) {
1582
1859
  var _params = __assign({}, params);
1583
1860
  var _requiredParams = ['name'];
1584
- var _validParams = ['name', 'xSmAcceptConfigurationType', 'headers'];
1861
+ var _validParams = ['name', 'xSmAcceptConfigurationType', 'signal', 'headers'];
1585
1862
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1586
1863
  if (_validationErrors) {
1587
1864
  return Promise.reject(_validationErrors);
@@ -1597,10 +1874,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1597
1874
  path: path,
1598
1875
  },
1599
1876
  defaultOptions: extend(true, {}, this.baseOptions, {
1600
- headers: extend(true, sdkHeaders, {
1877
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1601
1878
  'Accept': 'application/json',
1602
1879
  'X-Sm-Accept-Configuration-Type': _params.xSmAcceptConfigurationType,
1603
1880
  }, _params.headers),
1881
+ axiosOptions: {
1882
+ signal: _params.signal,
1883
+ },
1604
1884
  }),
1605
1885
  };
1606
1886
  return this.createRequest(parameters);
@@ -1621,7 +1901,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1621
1901
  SecretsManagerV2.prototype.updateConfiguration = function (params) {
1622
1902
  var _params = __assign({}, params);
1623
1903
  var _requiredParams = ['name', 'configurationPatch'];
1624
- var _validParams = ['name', 'configurationPatch', 'xSmAcceptConfigurationType', 'headers'];
1904
+ var _validParams = ['name', 'configurationPatch', 'xSmAcceptConfigurationType', 'signal', 'headers'];
1625
1905
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1626
1906
  if (_validationErrors) {
1627
1907
  return Promise.reject(_validationErrors);
@@ -1639,11 +1919,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1639
1919
  path: path,
1640
1920
  },
1641
1921
  defaultOptions: extend(true, {}, this.baseOptions, {
1642
- headers: extend(true, sdkHeaders, {
1922
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1643
1923
  'Accept': 'application/json',
1644
1924
  'Content-Type': 'application/merge-patch+json',
1645
1925
  'X-Sm-Accept-Configuration-Type': _params.xSmAcceptConfigurationType,
1646
1926
  }, _params.headers),
1927
+ axiosOptions: {
1928
+ signal: _params.signal,
1929
+ },
1647
1930
  }),
1648
1931
  };
1649
1932
  return this.createRequest(parameters);
@@ -1663,7 +1946,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1663
1946
  SecretsManagerV2.prototype.deleteConfiguration = function (params) {
1664
1947
  var _params = __assign({}, params);
1665
1948
  var _requiredParams = ['name'];
1666
- var _validParams = ['name', 'xSmAcceptConfigurationType', 'headers'];
1949
+ var _validParams = ['name', 'xSmAcceptConfigurationType', 'signal', 'headers'];
1667
1950
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1668
1951
  if (_validationErrors) {
1669
1952
  return Promise.reject(_validationErrors);
@@ -1679,9 +1962,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1679
1962
  path: path,
1680
1963
  },
1681
1964
  defaultOptions: extend(true, {}, this.baseOptions, {
1682
- headers: extend(true, sdkHeaders, {
1965
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1683
1966
  'X-Sm-Accept-Configuration-Type': _params.xSmAcceptConfigurationType,
1684
1967
  }, _params.headers),
1968
+ axiosOptions: {
1969
+ signal: _params.signal,
1970
+ },
1685
1971
  }),
1686
1972
  };
1687
1973
  return this.createRequest(parameters);
@@ -1712,7 +1998,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1712
1998
  SecretsManagerV2.prototype.createConfigurationAction = function (params) {
1713
1999
  var _params = __assign({}, params);
1714
2000
  var _requiredParams = ['name', 'configActionPrototype'];
1715
- var _validParams = ['name', 'configActionPrototype', 'xSmAcceptConfigurationType', 'headers'];
2001
+ var _validParams = ['name', 'configActionPrototype', 'xSmAcceptConfigurationType', 'signal', 'headers'];
1716
2002
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1717
2003
  if (_validationErrors) {
1718
2004
  return Promise.reject(_validationErrors);
@@ -1730,11 +2016,14 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1730
2016
  path: path,
1731
2017
  },
1732
2018
  defaultOptions: extend(true, {}, this.baseOptions, {
1733
- headers: extend(true, sdkHeaders, {
2019
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1734
2020
  'Accept': 'application/json',
1735
2021
  'Content-Type': 'application/json',
1736
2022
  'X-Sm-Accept-Configuration-Type': _params.xSmAcceptConfigurationType,
1737
2023
  }, _params.headers),
2024
+ axiosOptions: {
2025
+ signal: _params.signal,
2026
+ },
1738
2027
  }),
1739
2028
  };
1740
2029
  return this.createRequest(parameters);
@@ -1764,7 +2053,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1764
2053
  SecretsManagerV2.prototype.createNotificationsRegistration = function (params) {
1765
2054
  var _params = __assign({}, params);
1766
2055
  var _requiredParams = ['eventNotificationsInstanceCrn', 'eventNotificationsSourceName'];
1767
- var _validParams = ['eventNotificationsInstanceCrn', 'eventNotificationsSourceName', 'eventNotificationsSourceDescription', 'headers'];
2056
+ var _validParams = ['eventNotificationsInstanceCrn', 'eventNotificationsSourceName', 'eventNotificationsSourceDescription', 'signal', 'headers'];
1768
2057
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1769
2058
  if (_validationErrors) {
1770
2059
  return Promise.reject(_validationErrors);
@@ -1782,10 +2071,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1782
2071
  body: body,
1783
2072
  },
1784
2073
  defaultOptions: extend(true, {}, this.baseOptions, {
1785
- headers: extend(true, sdkHeaders, {
2074
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1786
2075
  'Accept': 'application/json',
1787
2076
  'Content-Type': 'application/json',
1788
2077
  }, _params.headers),
2078
+ axiosOptions: {
2079
+ signal: _params.signal,
2080
+ },
1789
2081
  }),
1790
2082
  };
1791
2083
  return this.createRequest(parameters);
@@ -1802,7 +2094,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1802
2094
  SecretsManagerV2.prototype.getNotificationsRegistration = function (params) {
1803
2095
  var _params = __assign({}, params);
1804
2096
  var _requiredParams = [];
1805
- var _validParams = ['headers'];
2097
+ var _validParams = ['signal', 'headers'];
1806
2098
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1807
2099
  if (_validationErrors) {
1808
2100
  return Promise.reject(_validationErrors);
@@ -1814,9 +2106,12 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1814
2106
  method: 'GET',
1815
2107
  },
1816
2108
  defaultOptions: extend(true, {}, this.baseOptions, {
1817
- headers: extend(true, sdkHeaders, {
2109
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {
1818
2110
  'Accept': 'application/json',
1819
2111
  }, _params.headers),
2112
+ axiosOptions: {
2113
+ signal: _params.signal,
2114
+ },
1820
2115
  }),
1821
2116
  };
1822
2117
  return this.createRequest(parameters);
@@ -1835,7 +2130,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1835
2130
  SecretsManagerV2.prototype.deleteNotificationsRegistration = function (params) {
1836
2131
  var _params = __assign({}, params);
1837
2132
  var _requiredParams = [];
1838
- var _validParams = ['headers'];
2133
+ var _validParams = ['signal', 'headers'];
1839
2134
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1840
2135
  if (_validationErrors) {
1841
2136
  return Promise.reject(_validationErrors);
@@ -1847,7 +2142,10 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1847
2142
  method: 'DELETE',
1848
2143
  },
1849
2144
  defaultOptions: extend(true, {}, this.baseOptions, {
1850
- headers: extend(true, sdkHeaders, {}, _params.headers),
2145
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {}, _params.headers),
2146
+ axiosOptions: {
2147
+ signal: _params.signal,
2148
+ },
1851
2149
  }),
1852
2150
  };
1853
2151
  return this.createRequest(parameters);
@@ -1869,7 +2167,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1869
2167
  SecretsManagerV2.prototype.getNotificationsRegistrationTest = function (params) {
1870
2168
  var _params = __assign({}, params);
1871
2169
  var _requiredParams = [];
1872
- var _validParams = ['headers'];
2170
+ var _validParams = ['signal', 'headers'];
1873
2171
  var _validationErrors = (0, ibm_cloud_sdk_core_1.validateParams)(_params, _requiredParams, _validParams);
1874
2172
  if (_validationErrors) {
1875
2173
  return Promise.reject(_validationErrors);
@@ -1881,7 +2179,10 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1881
2179
  method: 'GET',
1882
2180
  },
1883
2181
  defaultOptions: extend(true, {}, this.baseOptions, {
1884
- headers: extend(true, sdkHeaders, {}, _params.headers),
2182
+ headers: extend(true, sdkHeaders, this.baseOptions.headers, {}, _params.headers),
2183
+ axiosOptions: {
2184
+ signal: _params.signal,
2185
+ },
1885
2186
  }),
1886
2187
  };
1887
2188
  return this.createRequest(parameters);
@@ -1913,6 +2214,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1913
2214
  SecretTypes["PUBLIC_CERT"] = "public_cert";
1914
2215
  SecretTypes["SERVICE_CREDENTIALS"] = "service_credentials";
1915
2216
  SecretTypes["USERNAME_PASSWORD"] = "username_password";
2217
+ SecretTypes["CUSTOM_CREDENTIALS"] = "custom_credentials";
1916
2218
  })(SecretTypes = ListSecretsConstants.SecretTypes || (ListSecretsConstants.SecretTypes = {}));
1917
2219
  })(ListSecretsConstants = SecretsManagerV2.ListSecretsConstants || (SecretsManagerV2.ListSecretsConstants = {}));
1918
2220
  /** Constants for the `getSecretByNameType` operation. */
@@ -1929,12 +2231,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1929
2231
  SecretType["PUBLIC_CERT"] = "public_cert";
1930
2232
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
1931
2233
  SecretType["USERNAME_PASSWORD"] = "username_password";
2234
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
1932
2235
  })(SecretType = GetSecretByNameTypeConstants.SecretType || (GetSecretByNameTypeConstants.SecretType = {}));
1933
2236
  })(GetSecretByNameTypeConstants = SecretsManagerV2.GetSecretByNameTypeConstants || (SecretsManagerV2.GetSecretByNameTypeConstants = {}));
1934
2237
  /** Constants for the `createSecretLocksBulk` operation. */
1935
2238
  var CreateSecretLocksBulkConstants;
1936
2239
  (function (CreateSecretLocksBulkConstants) {
1937
- /** An optional lock mode. When you create a lock, you can set one of the following modes to clear any matching locks on a secret version. - `remove_previous`: Removes any other locks with matching names if they are found in the previous version of the secret. - `remove_previous_and_delete`: Completes the same action as `remove_previous`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
2240
+ /** An optional lock mode. When you create a lock, you can set one of the following modes to clear any matching locks on a secret version. - `remove_previous`: Removes any other locks with matching names if they are found in the previous version of the secret. - `remove_previous_and_delete`: Completes the same action as `remove_previous`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. Not supported for custom credentials secret type. */
1938
2241
  var Mode;
1939
2242
  (function (Mode) {
1940
2243
  Mode["REMOVE_PREVIOUS"] = "remove_previous";
@@ -1944,7 +2247,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1944
2247
  /** Constants for the `createSecretVersionLocksBulk` operation. */
1945
2248
  var CreateSecretVersionLocksBulkConstants;
1946
2249
  (function (CreateSecretVersionLocksBulkConstants) {
1947
- /** An optional lock mode. When you create a lock, you can set one of the following modes to clear any matching locks on a secret version. - `remove_previous`: Removes any other locks with matching names if they are found in the previous version of the secret. - `remove_previous_and_delete`: Completes the same action as `remove_previous`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. */
2250
+ /** An optional lock mode. When you create a lock, you can set one of the following modes to clear any matching locks on a secret version. - `remove_previous`: Removes any other locks with matching names if they are found in the previous version of the secret. - `remove_previous_and_delete`: Completes the same action as `remove_previous`, but also permanently deletes the data of the previous secret version if it doesn't have any locks. Not supported for custom credentials secret type. */
1948
2251
  var Mode;
1949
2252
  (function (Mode) {
1950
2253
  Mode["REMOVE_PREVIOUS"] = "remove_previous";
@@ -1954,12 +2257,13 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1954
2257
  /** Constants for the `listConfigurations` operation. */
1955
2258
  var ListConfigurationsConstants;
1956
2259
  (function (ListConfigurationsConstants) {
1957
- /** Filter configurations by secret types, iam_credentials, public_cert or private_cert. You can apply multiple filters by using a comma-separated list of secret types. **Usage:** To retrieve a list of configurations that are associated with all secret types, use `..?secret_types=iam_credentials,public_cert,private_cert`. */
2260
+ /** Filter configurations by secret types, iam_credentials, public_cert or private_cert. You can apply multiple filters by using a comma-separated list of secret types. **Usage:** To retrieve a list of configurations that are associated with all secret types, use `..?secret_types=iam_credentials,public_cert,private_cert,custom_credentials`. */
1958
2261
  var SecretTypes;
1959
2262
  (function (SecretTypes) {
1960
2263
  SecretTypes["IAM_CREDENTIALS"] = "iam_credentials";
1961
2264
  SecretTypes["PRIVATE_CERT"] = "private_cert";
1962
2265
  SecretTypes["PUBLIC_CERT"] = "public_cert";
2266
+ SecretTypes["CUSTOM_CREDENTIALS"] = "custom_credentials";
1963
2267
  })(SecretTypes = ListConfigurationsConstants.SecretTypes || (ListConfigurationsConstants.SecretTypes = {}));
1964
2268
  })(ListConfigurationsConstants = SecretsManagerV2.ListConfigurationsConstants || (SecretsManagerV2.ListConfigurationsConstants = {}));
1965
2269
  /** Constants for the `getConfiguration` operation. */
@@ -1975,6 +2279,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1975
2279
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
1976
2280
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
1977
2281
  XSmAcceptConfigurationType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2282
+ XSmAcceptConfigurationType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
1978
2283
  })(XSmAcceptConfigurationType = GetConfigurationConstants.XSmAcceptConfigurationType || (GetConfigurationConstants.XSmAcceptConfigurationType = {}));
1979
2284
  })(GetConfigurationConstants = SecretsManagerV2.GetConfigurationConstants || (SecretsManagerV2.GetConfigurationConstants = {}));
1980
2285
  /** Constants for the `updateConfiguration` operation. */
@@ -1990,6 +2295,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
1990
2295
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
1991
2296
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
1992
2297
  XSmAcceptConfigurationType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2298
+ XSmAcceptConfigurationType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
1993
2299
  })(XSmAcceptConfigurationType = UpdateConfigurationConstants.XSmAcceptConfigurationType || (UpdateConfigurationConstants.XSmAcceptConfigurationType = {}));
1994
2300
  })(UpdateConfigurationConstants = SecretsManagerV2.UpdateConfigurationConstants || (SecretsManagerV2.UpdateConfigurationConstants = {}));
1995
2301
  /** Constants for the `deleteConfiguration` operation. */
@@ -2005,6 +2311,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2005
2311
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2006
2312
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2007
2313
  XSmAcceptConfigurationType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2314
+ XSmAcceptConfigurationType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2008
2315
  })(XSmAcceptConfigurationType = DeleteConfigurationConstants.XSmAcceptConfigurationType || (DeleteConfigurationConstants.XSmAcceptConfigurationType = {}));
2009
2316
  })(DeleteConfigurationConstants = SecretsManagerV2.DeleteConfigurationConstants || (SecretsManagerV2.DeleteConfigurationConstants = {}));
2010
2317
  /** Constants for the `createConfigurationAction` operation. */
@@ -2020,6 +2327,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2020
2327
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2021
2328
  XSmAcceptConfigurationType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2022
2329
  XSmAcceptConfigurationType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2330
+ XSmAcceptConfigurationType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2023
2331
  })(XSmAcceptConfigurationType = CreateConfigurationActionConstants.XSmAcceptConfigurationType || (CreateConfigurationActionConstants.XSmAcceptConfigurationType = {}));
2024
2332
  })(CreateConfigurationActionConstants = SecretsManagerV2.CreateConfigurationActionConstants || (SecretsManagerV2.CreateConfigurationActionConstants = {}));
2025
2333
  var CertificateIssuanceInfo;
@@ -2037,6 +2345,32 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2037
2345
  })(StateDescription = Constants.StateDescription || (Constants.StateDescription = {}));
2038
2346
  })(Constants = CertificateIssuanceInfo.Constants || (CertificateIssuanceInfo.Constants = {}));
2039
2347
  })(CertificateIssuanceInfo = SecretsManagerV2.CertificateIssuanceInfo || (SecretsManagerV2.CertificateIssuanceInfo = {}));
2348
+ var ImportedCertificateManagedCsr;
2349
+ (function (ImportedCertificateManagedCsr) {
2350
+ var Constants;
2351
+ (function (Constants) {
2352
+ /** The type of private key to generate. */
2353
+ var KeyType;
2354
+ (function (KeyType) {
2355
+ KeyType["RSA"] = "rsa";
2356
+ KeyType["EC"] = "ec";
2357
+ KeyType["ED25519"] = "ed25519";
2358
+ })(KeyType = Constants.KeyType || (Constants.KeyType = {}));
2359
+ })(Constants = ImportedCertificateManagedCsr.Constants || (ImportedCertificateManagedCsr.Constants = {}));
2360
+ })(ImportedCertificateManagedCsr = SecretsManagerV2.ImportedCertificateManagedCsr || (SecretsManagerV2.ImportedCertificateManagedCsr = {}));
2361
+ var ImportedCertificateManagedCsrResponse;
2362
+ (function (ImportedCertificateManagedCsrResponse) {
2363
+ var Constants;
2364
+ (function (Constants) {
2365
+ /** The type of private key to generate. */
2366
+ var KeyType;
2367
+ (function (KeyType) {
2368
+ KeyType["RSA"] = "rsa";
2369
+ KeyType["EC"] = "ec";
2370
+ KeyType["ED25519"] = "ed25519";
2371
+ })(KeyType = Constants.KeyType || (Constants.KeyType = {}));
2372
+ })(Constants = ImportedCertificateManagedCsrResponse.Constants || (ImportedCertificateManagedCsrResponse.Constants = {}));
2373
+ })(ImportedCertificateManagedCsrResponse = SecretsManagerV2.ImportedCertificateManagedCsrResponse || (SecretsManagerV2.ImportedCertificateManagedCsrResponse = {}));
2040
2374
  var PrivateCertificateConfigurationRotateAction;
2041
2375
  (function (PrivateCertificateConfigurationRotateAction) {
2042
2376
  var Constants;
@@ -2076,9 +2410,40 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2076
2410
  SecretType["PUBLIC_CERT"] = "public_cert";
2077
2411
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2078
2412
  SecretType["USERNAME_PASSWORD"] = "username_password";
2413
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2079
2414
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2080
2415
  })(Constants = SecretLocks.Constants || (SecretLocks.Constants = {}));
2081
2416
  })(SecretLocks = SecretsManagerV2.SecretLocks || (SecretsManagerV2.SecretLocks = {}));
2417
+ var SecretTask;
2418
+ (function (SecretTask) {
2419
+ var Constants;
2420
+ (function (Constants) {
2421
+ /** The type of the task, can be either "create_credentials" or "delete_credentials". */
2422
+ var Type;
2423
+ (function (Type) {
2424
+ Type["CREATE_CREDENTIALS"] = "create_credentials";
2425
+ Type["DELETE_CREDENTIALS"] = "delete_credentials";
2426
+ })(Type = Constants.Type || (Constants.Type = {}));
2427
+ /** The status of a task, could be one of: queued, processing, succeeded, failed. */
2428
+ var Status;
2429
+ (function (Status) {
2430
+ Status["QUEUED"] = "queued";
2431
+ Status["PROCESSING"] = "processing";
2432
+ Status["CREDENTIALS_CREATED"] = "credentials_created";
2433
+ Status["CREDENTIALS_DELETED"] = "credentials_deleted";
2434
+ Status["FAILED"] = "failed";
2435
+ })(Status = Constants.Status || (Constants.Status = {}));
2436
+ /** Information about what has initiated the task. */
2437
+ var Trigger;
2438
+ (function (Trigger) {
2439
+ Trigger["SECRET_CREATION"] = "secret_creation";
2440
+ Trigger["MANUAL_SECRET_ROTATION"] = "manual_secret_rotation";
2441
+ Trigger["AUTOMATIC_SECRET_ROTATION"] = "automatic_secret_rotation";
2442
+ Trigger["SECRET_VERSION_EXPIRATION"] = "secret_version_expiration";
2443
+ Trigger["SECRET_VERSION_DATA_DELETION"] = "secret_version_data_deletion";
2444
+ })(Trigger = Constants.Trigger || (Constants.Trigger = {}));
2445
+ })(Constants = SecretTask.Constants || (SecretTask.Constants = {}));
2446
+ })(SecretTask = SecretsManagerV2.SecretTask || (SecretsManagerV2.SecretTask = {}));
2082
2447
  var SecretVersionLocks;
2083
2448
  (function (SecretVersionLocks) {
2084
2449
  var Constants;
@@ -2106,6 +2471,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2106
2471
  SecretType["PUBLIC_CERT"] = "public_cert";
2107
2472
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2108
2473
  SecretType["USERNAME_PASSWORD"] = "username_password";
2474
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2109
2475
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2110
2476
  /** A text representation of the secret state. */
2111
2477
  var StateDescription;
@@ -2133,6 +2499,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2133
2499
  SecretType["PUBLIC_CERT"] = "public_cert";
2134
2500
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2135
2501
  SecretType["USERNAME_PASSWORD"] = "username_password";
2502
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2136
2503
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2137
2504
  /** A text representation of the secret state. */
2138
2505
  var StateDescription;
@@ -2160,6 +2527,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2160
2527
  SecretType["PUBLIC_CERT"] = "public_cert";
2161
2528
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2162
2529
  SecretType["USERNAME_PASSWORD"] = "username_password";
2530
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2163
2531
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2164
2532
  })(Constants = ArbitrarySecretPrototype.Constants || (ArbitrarySecretPrototype.Constants = {}));
2165
2533
  })(ArbitrarySecretPrototype = SecretsManagerV2.ArbitrarySecretPrototype || (SecretsManagerV2.ArbitrarySecretPrototype = {}));
@@ -2178,6 +2546,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2178
2546
  SecretType["PUBLIC_CERT"] = "public_cert";
2179
2547
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2180
2548
  SecretType["USERNAME_PASSWORD"] = "username_password";
2549
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2181
2550
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2182
2551
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2183
2552
  var Alias;
@@ -2202,6 +2571,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2202
2571
  SecretType["PUBLIC_CERT"] = "public_cert";
2203
2572
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2204
2573
  SecretType["USERNAME_PASSWORD"] = "username_password";
2574
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2205
2575
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2206
2576
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2207
2577
  var Alias;
@@ -2223,11 +2593,216 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2223
2593
  })(Unit = Constants.Unit || (Constants.Unit = {}));
2224
2594
  })(Constants = CommonRotationPolicy.Constants || (CommonRotationPolicy.Constants = {}));
2225
2595
  })(CommonRotationPolicy = SecretsManagerV2.CommonRotationPolicy || (SecretsManagerV2.CommonRotationPolicy = {}));
2596
+ var CustomCredentialsConfiguration;
2597
+ (function (CustomCredentialsConfiguration) {
2598
+ var Constants;
2599
+ (function (Constants) {
2600
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2601
+ var ConfigType;
2602
+ (function (ConfigType) {
2603
+ ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
2604
+ ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLASSIC_INFRASTRUCTURE"] = "public_cert_configuration_dns_classic_infrastructure";
2605
+ ConfigType["PUBLIC_CERT_CONFIGURATION_CA_LETS_ENCRYPT"] = "public_cert_configuration_ca_lets_encrypt";
2606
+ ConfigType["PRIVATE_CERT_CONFIGURATION_ROOT_CA"] = "private_cert_configuration_root_ca";
2607
+ ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2608
+ ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2609
+ ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2610
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2611
+ })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2612
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2613
+ var SecretType;
2614
+ (function (SecretType) {
2615
+ SecretType["ARBITRARY"] = "arbitrary";
2616
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2617
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2618
+ SecretType["KV"] = "kv";
2619
+ SecretType["PRIVATE_CERT"] = "private_cert";
2620
+ SecretType["PUBLIC_CERT"] = "public_cert";
2621
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2622
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2623
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2624
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2625
+ })(Constants = CustomCredentialsConfiguration.Constants || (CustomCredentialsConfiguration.Constants = {}));
2626
+ })(CustomCredentialsConfiguration = SecretsManagerV2.CustomCredentialsConfiguration || (SecretsManagerV2.CustomCredentialsConfiguration = {}));
2627
+ var CustomCredentialsConfigurationMetadata;
2628
+ (function (CustomCredentialsConfigurationMetadata) {
2629
+ var Constants;
2630
+ (function (Constants) {
2631
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2632
+ var ConfigType;
2633
+ (function (ConfigType) {
2634
+ ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
2635
+ ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLASSIC_INFRASTRUCTURE"] = "public_cert_configuration_dns_classic_infrastructure";
2636
+ ConfigType["PUBLIC_CERT_CONFIGURATION_CA_LETS_ENCRYPT"] = "public_cert_configuration_ca_lets_encrypt";
2637
+ ConfigType["PRIVATE_CERT_CONFIGURATION_ROOT_CA"] = "private_cert_configuration_root_ca";
2638
+ ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2639
+ ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2640
+ ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2641
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2642
+ })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2643
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2644
+ var SecretType;
2645
+ (function (SecretType) {
2646
+ SecretType["ARBITRARY"] = "arbitrary";
2647
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2648
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2649
+ SecretType["KV"] = "kv";
2650
+ SecretType["PRIVATE_CERT"] = "private_cert";
2651
+ SecretType["PUBLIC_CERT"] = "public_cert";
2652
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2653
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2654
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2655
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2656
+ })(Constants = CustomCredentialsConfigurationMetadata.Constants || (CustomCredentialsConfigurationMetadata.Constants = {}));
2657
+ })(CustomCredentialsConfigurationMetadata = SecretsManagerV2.CustomCredentialsConfigurationMetadata || (SecretsManagerV2.CustomCredentialsConfigurationMetadata = {}));
2658
+ var CustomCredentialsConfigurationPrototype;
2659
+ (function (CustomCredentialsConfigurationPrototype) {
2660
+ var Constants;
2661
+ (function (Constants) {
2662
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2663
+ var ConfigType;
2664
+ (function (ConfigType) {
2665
+ ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
2666
+ ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLASSIC_INFRASTRUCTURE"] = "public_cert_configuration_dns_classic_infrastructure";
2667
+ ConfigType["PUBLIC_CERT_CONFIGURATION_CA_LETS_ENCRYPT"] = "public_cert_configuration_ca_lets_encrypt";
2668
+ ConfigType["PRIVATE_CERT_CONFIGURATION_ROOT_CA"] = "private_cert_configuration_root_ca";
2669
+ ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2670
+ ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2671
+ ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2672
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2673
+ })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2674
+ })(Constants = CustomCredentialsConfigurationPrototype.Constants || (CustomCredentialsConfigurationPrototype.Constants = {}));
2675
+ })(CustomCredentialsConfigurationPrototype = SecretsManagerV2.CustomCredentialsConfigurationPrototype || (SecretsManagerV2.CustomCredentialsConfigurationPrototype = {}));
2676
+ var CustomCredentialsSecret;
2677
+ (function (CustomCredentialsSecret) {
2678
+ var Constants;
2679
+ (function (Constants) {
2680
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2681
+ var SecretType;
2682
+ (function (SecretType) {
2683
+ SecretType["ARBITRARY"] = "arbitrary";
2684
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2685
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2686
+ SecretType["KV"] = "kv";
2687
+ SecretType["PRIVATE_CERT"] = "private_cert";
2688
+ SecretType["PUBLIC_CERT"] = "public_cert";
2689
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2690
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2691
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2692
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2693
+ /** A text representation of the secret state. */
2694
+ var StateDescription;
2695
+ (function (StateDescription) {
2696
+ StateDescription["PRE_ACTIVATION"] = "pre_activation";
2697
+ StateDescription["ACTIVE"] = "active";
2698
+ StateDescription["SUSPENDED"] = "suspended";
2699
+ StateDescription["DEACTIVATED"] = "deactivated";
2700
+ StateDescription["DESTROYED"] = "destroyed";
2701
+ })(StateDescription = Constants.StateDescription || (Constants.StateDescription = {}));
2702
+ })(Constants = CustomCredentialsSecret.Constants || (CustomCredentialsSecret.Constants = {}));
2703
+ })(CustomCredentialsSecret = SecretsManagerV2.CustomCredentialsSecret || (SecretsManagerV2.CustomCredentialsSecret = {}));
2704
+ var CustomCredentialsSecretMetadata;
2705
+ (function (CustomCredentialsSecretMetadata) {
2706
+ var Constants;
2707
+ (function (Constants) {
2708
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2709
+ var SecretType;
2710
+ (function (SecretType) {
2711
+ SecretType["ARBITRARY"] = "arbitrary";
2712
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2713
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2714
+ SecretType["KV"] = "kv";
2715
+ SecretType["PRIVATE_CERT"] = "private_cert";
2716
+ SecretType["PUBLIC_CERT"] = "public_cert";
2717
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2718
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2719
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2720
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2721
+ /** A text representation of the secret state. */
2722
+ var StateDescription;
2723
+ (function (StateDescription) {
2724
+ StateDescription["PRE_ACTIVATION"] = "pre_activation";
2725
+ StateDescription["ACTIVE"] = "active";
2726
+ StateDescription["SUSPENDED"] = "suspended";
2727
+ StateDescription["DEACTIVATED"] = "deactivated";
2728
+ StateDescription["DESTROYED"] = "destroyed";
2729
+ })(StateDescription = Constants.StateDescription || (Constants.StateDescription = {}));
2730
+ })(Constants = CustomCredentialsSecretMetadata.Constants || (CustomCredentialsSecretMetadata.Constants = {}));
2731
+ })(CustomCredentialsSecretMetadata = SecretsManagerV2.CustomCredentialsSecretMetadata || (SecretsManagerV2.CustomCredentialsSecretMetadata = {}));
2732
+ var CustomCredentialsSecretPrototype;
2733
+ (function (CustomCredentialsSecretPrototype) {
2734
+ var Constants;
2735
+ (function (Constants) {
2736
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2737
+ var SecretType;
2738
+ (function (SecretType) {
2739
+ SecretType["ARBITRARY"] = "arbitrary";
2740
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2741
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2742
+ SecretType["KV"] = "kv";
2743
+ SecretType["PRIVATE_CERT"] = "private_cert";
2744
+ SecretType["PUBLIC_CERT"] = "public_cert";
2745
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2746
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2747
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2748
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2749
+ })(Constants = CustomCredentialsSecretPrototype.Constants || (CustomCredentialsSecretPrototype.Constants = {}));
2750
+ })(CustomCredentialsSecretPrototype = SecretsManagerV2.CustomCredentialsSecretPrototype || (SecretsManagerV2.CustomCredentialsSecretPrototype = {}));
2751
+ var CustomCredentialsSecretVersion;
2752
+ (function (CustomCredentialsSecretVersion) {
2753
+ var Constants;
2754
+ (function (Constants) {
2755
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2756
+ var SecretType;
2757
+ (function (SecretType) {
2758
+ SecretType["ARBITRARY"] = "arbitrary";
2759
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2760
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2761
+ SecretType["KV"] = "kv";
2762
+ SecretType["PRIVATE_CERT"] = "private_cert";
2763
+ SecretType["PUBLIC_CERT"] = "public_cert";
2764
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2765
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2766
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2767
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2768
+ /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2769
+ var Alias;
2770
+ (function (Alias) {
2771
+ Alias["CURRENT"] = "current";
2772
+ Alias["PREVIOUS"] = "previous";
2773
+ })(Alias = Constants.Alias || (Constants.Alias = {}));
2774
+ })(Constants = CustomCredentialsSecretVersion.Constants || (CustomCredentialsSecretVersion.Constants = {}));
2775
+ })(CustomCredentialsSecretVersion = SecretsManagerV2.CustomCredentialsSecretVersion || (SecretsManagerV2.CustomCredentialsSecretVersion = {}));
2776
+ var CustomCredentialsSecretVersionMetadata;
2777
+ (function (CustomCredentialsSecretVersionMetadata) {
2778
+ var Constants;
2779
+ (function (Constants) {
2780
+ /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2781
+ var SecretType;
2782
+ (function (SecretType) {
2783
+ SecretType["ARBITRARY"] = "arbitrary";
2784
+ SecretType["IAM_CREDENTIALS"] = "iam_credentials";
2785
+ SecretType["IMPORTED_CERT"] = "imported_cert";
2786
+ SecretType["KV"] = "kv";
2787
+ SecretType["PRIVATE_CERT"] = "private_cert";
2788
+ SecretType["PUBLIC_CERT"] = "public_cert";
2789
+ SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2790
+ SecretType["USERNAME_PASSWORD"] = "username_password";
2791
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2792
+ })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2793
+ /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2794
+ var Alias;
2795
+ (function (Alias) {
2796
+ Alias["CURRENT"] = "current";
2797
+ Alias["PREVIOUS"] = "previous";
2798
+ })(Alias = Constants.Alias || (Constants.Alias = {}));
2799
+ })(Constants = CustomCredentialsSecretVersionMetadata.Constants || (CustomCredentialsSecretVersionMetadata.Constants = {}));
2800
+ })(CustomCredentialsSecretVersionMetadata = SecretsManagerV2.CustomCredentialsSecretVersionMetadata || (SecretsManagerV2.CustomCredentialsSecretVersionMetadata = {}));
2226
2801
  var IAMCredentialsConfiguration;
2227
2802
  (function (IAMCredentialsConfiguration) {
2228
2803
  var Constants;
2229
2804
  (function (Constants) {
2230
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
2805
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2231
2806
  var ConfigType;
2232
2807
  (function (ConfigType) {
2233
2808
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -2237,6 +2812,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2237
2812
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2238
2813
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2239
2814
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2815
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2240
2816
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2241
2817
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2242
2818
  var SecretType;
@@ -2249,6 +2825,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2249
2825
  SecretType["PUBLIC_CERT"] = "public_cert";
2250
2826
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2251
2827
  SecretType["USERNAME_PASSWORD"] = "username_password";
2828
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2252
2829
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2253
2830
  })(Constants = IAMCredentialsConfiguration.Constants || (IAMCredentialsConfiguration.Constants = {}));
2254
2831
  })(IAMCredentialsConfiguration = SecretsManagerV2.IAMCredentialsConfiguration || (SecretsManagerV2.IAMCredentialsConfiguration = {}));
@@ -2256,7 +2833,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2256
2833
  (function (IAMCredentialsConfigurationMetadata) {
2257
2834
  var Constants;
2258
2835
  (function (Constants) {
2259
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
2836
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2260
2837
  var ConfigType;
2261
2838
  (function (ConfigType) {
2262
2839
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -2266,6 +2843,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2266
2843
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2267
2844
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2268
2845
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2846
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2269
2847
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2270
2848
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2271
2849
  var SecretType;
@@ -2278,6 +2856,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2278
2856
  SecretType["PUBLIC_CERT"] = "public_cert";
2279
2857
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2280
2858
  SecretType["USERNAME_PASSWORD"] = "username_password";
2859
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2281
2860
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2282
2861
  })(Constants = IAMCredentialsConfigurationMetadata.Constants || (IAMCredentialsConfigurationMetadata.Constants = {}));
2283
2862
  })(IAMCredentialsConfigurationMetadata = SecretsManagerV2.IAMCredentialsConfigurationMetadata || (SecretsManagerV2.IAMCredentialsConfigurationMetadata = {}));
@@ -2285,7 +2864,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2285
2864
  (function (IAMCredentialsConfigurationPrototype) {
2286
2865
  var Constants;
2287
2866
  (function (Constants) {
2288
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
2867
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2289
2868
  var ConfigType;
2290
2869
  (function (ConfigType) {
2291
2870
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -2295,6 +2874,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2295
2874
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2296
2875
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2297
2876
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
2877
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2298
2878
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2299
2879
  })(Constants = IAMCredentialsConfigurationPrototype.Constants || (IAMCredentialsConfigurationPrototype.Constants = {}));
2300
2880
  })(IAMCredentialsConfigurationPrototype = SecretsManagerV2.IAMCredentialsConfigurationPrototype || (SecretsManagerV2.IAMCredentialsConfigurationPrototype = {}));
@@ -2313,6 +2893,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2313
2893
  SecretType["PUBLIC_CERT"] = "public_cert";
2314
2894
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2315
2895
  SecretType["USERNAME_PASSWORD"] = "username_password";
2896
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2316
2897
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2317
2898
  /** A text representation of the secret state. */
2318
2899
  var StateDescription;
@@ -2340,6 +2921,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2340
2921
  SecretType["PUBLIC_CERT"] = "public_cert";
2341
2922
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2342
2923
  SecretType["USERNAME_PASSWORD"] = "username_password";
2924
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2343
2925
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2344
2926
  /** A text representation of the secret state. */
2345
2927
  var StateDescription;
@@ -2367,6 +2949,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2367
2949
  SecretType["PUBLIC_CERT"] = "public_cert";
2368
2950
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2369
2951
  SecretType["USERNAME_PASSWORD"] = "username_password";
2952
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2370
2953
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2371
2954
  })(Constants = IAMCredentialsSecretPrototype.Constants || (IAMCredentialsSecretPrototype.Constants = {}));
2372
2955
  })(IAMCredentialsSecretPrototype = SecretsManagerV2.IAMCredentialsSecretPrototype || (SecretsManagerV2.IAMCredentialsSecretPrototype = {}));
@@ -2385,6 +2968,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2385
2968
  SecretType["PUBLIC_CERT"] = "public_cert";
2386
2969
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2387
2970
  SecretType["USERNAME_PASSWORD"] = "username_password";
2971
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2388
2972
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2389
2973
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2390
2974
  var Alias;
@@ -2409,6 +2993,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2409
2993
  SecretType["PUBLIC_CERT"] = "public_cert";
2410
2994
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2411
2995
  SecretType["USERNAME_PASSWORD"] = "username_password";
2996
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2412
2997
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2413
2998
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2414
2999
  var Alias;
@@ -2433,6 +3018,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2433
3018
  SecretType["PUBLIC_CERT"] = "public_cert";
2434
3019
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2435
3020
  SecretType["USERNAME_PASSWORD"] = "username_password";
3021
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2436
3022
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2437
3023
  /** A text representation of the secret state. */
2438
3024
  var StateDescription;
@@ -2460,6 +3046,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2460
3046
  SecretType["PUBLIC_CERT"] = "public_cert";
2461
3047
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2462
3048
  SecretType["USERNAME_PASSWORD"] = "username_password";
3049
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2463
3050
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2464
3051
  /** A text representation of the secret state. */
2465
3052
  var StateDescription;
@@ -2487,6 +3074,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2487
3074
  SecretType["PUBLIC_CERT"] = "public_cert";
2488
3075
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2489
3076
  SecretType["USERNAME_PASSWORD"] = "username_password";
3077
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2490
3078
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2491
3079
  })(Constants = ImportedCertificatePrototype.Constants || (ImportedCertificatePrototype.Constants = {}));
2492
3080
  })(ImportedCertificatePrototype = SecretsManagerV2.ImportedCertificatePrototype || (SecretsManagerV2.ImportedCertificatePrototype = {}));
@@ -2505,6 +3093,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2505
3093
  SecretType["PUBLIC_CERT"] = "public_cert";
2506
3094
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2507
3095
  SecretType["USERNAME_PASSWORD"] = "username_password";
3096
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2508
3097
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2509
3098
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2510
3099
  var Alias;
@@ -2529,6 +3118,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2529
3118
  SecretType["PUBLIC_CERT"] = "public_cert";
2530
3119
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2531
3120
  SecretType["USERNAME_PASSWORD"] = "username_password";
3121
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2532
3122
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2533
3123
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2534
3124
  var Alias;
@@ -2553,6 +3143,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2553
3143
  SecretType["PUBLIC_CERT"] = "public_cert";
2554
3144
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2555
3145
  SecretType["USERNAME_PASSWORD"] = "username_password";
3146
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2556
3147
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2557
3148
  /** A text representation of the secret state. */
2558
3149
  var StateDescription;
@@ -2580,6 +3171,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2580
3171
  SecretType["PUBLIC_CERT"] = "public_cert";
2581
3172
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2582
3173
  SecretType["USERNAME_PASSWORD"] = "username_password";
3174
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2583
3175
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2584
3176
  /** A text representation of the secret state. */
2585
3177
  var StateDescription;
@@ -2607,6 +3199,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2607
3199
  SecretType["PUBLIC_CERT"] = "public_cert";
2608
3200
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2609
3201
  SecretType["USERNAME_PASSWORD"] = "username_password";
3202
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2610
3203
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2611
3204
  })(Constants = KVSecretPrototype.Constants || (KVSecretPrototype.Constants = {}));
2612
3205
  })(KVSecretPrototype = SecretsManagerV2.KVSecretPrototype || (SecretsManagerV2.KVSecretPrototype = {}));
@@ -2625,6 +3218,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2625
3218
  SecretType["PUBLIC_CERT"] = "public_cert";
2626
3219
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2627
3220
  SecretType["USERNAME_PASSWORD"] = "username_password";
3221
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2628
3222
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2629
3223
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2630
3224
  var Alias;
@@ -2649,6 +3243,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2649
3243
  SecretType["PUBLIC_CERT"] = "public_cert";
2650
3244
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2651
3245
  SecretType["USERNAME_PASSWORD"] = "username_password";
3246
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2652
3247
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2653
3248
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
2654
3249
  var Alias;
@@ -2673,6 +3268,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2673
3268
  SecretType["PUBLIC_CERT"] = "public_cert";
2674
3269
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2675
3270
  SecretType["USERNAME_PASSWORD"] = "username_password";
3271
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2676
3272
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2677
3273
  /** A text representation of the secret state. */
2678
3274
  var StateDescription;
@@ -2929,7 +3525,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2929
3525
  (function (PrivateCertificateConfigurationIntermediateCA) {
2930
3526
  var Constants;
2931
3527
  (function (Constants) {
2932
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3528
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
2933
3529
  var ConfigType;
2934
3530
  (function (ConfigType) {
2935
3531
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -2939,6 +3535,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2939
3535
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
2940
3536
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
2941
3537
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3538
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
2942
3539
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
2943
3540
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
2944
3541
  var SecretType;
@@ -2951,6 +3548,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
2951
3548
  SecretType["PUBLIC_CERT"] = "public_cert";
2952
3549
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
2953
3550
  SecretType["USERNAME_PASSWORD"] = "username_password";
3551
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
2954
3552
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
2955
3553
  /** The type of private key to generate. */
2956
3554
  var KeyType;
@@ -3004,7 +3602,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3004
3602
  (function (PrivateCertificateConfigurationIntermediateCAMetadata) {
3005
3603
  var Constants;
3006
3604
  (function (Constants) {
3007
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3605
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3008
3606
  var ConfigType;
3009
3607
  (function (ConfigType) {
3010
3608
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3014,6 +3612,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3014
3612
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3015
3613
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3016
3614
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3615
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3017
3616
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3018
3617
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3019
3618
  var SecretType;
@@ -3026,6 +3625,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3026
3625
  SecretType["PUBLIC_CERT"] = "public_cert";
3027
3626
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3028
3627
  SecretType["USERNAME_PASSWORD"] = "username_password";
3628
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3029
3629
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3030
3630
  /** The type of private key to generate. */
3031
3631
  var KeyType;
@@ -3055,7 +3655,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3055
3655
  (function (PrivateCertificateConfigurationIntermediateCAPrototype) {
3056
3656
  var Constants;
3057
3657
  (function (Constants) {
3058
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3658
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3059
3659
  var ConfigType;
3060
3660
  (function (ConfigType) {
3061
3661
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3065,6 +3665,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3065
3665
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3066
3666
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3067
3667
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3668
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3068
3669
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3069
3670
  /** The signing method to use with this certificate authority to generate private certificates. You can choose between internal or externally signed options. For more information, see the [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-intermediate-certificate-authorities). */
3070
3671
  var SigningMethod;
@@ -3096,7 +3697,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3096
3697
  (function (PrivateCertificateConfigurationRootCA) {
3097
3698
  var Constants;
3098
3699
  (function (Constants) {
3099
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3700
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3100
3701
  var ConfigType;
3101
3702
  (function (ConfigType) {
3102
3703
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3106,6 +3707,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3106
3707
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3107
3708
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3108
3709
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3710
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3109
3711
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3110
3712
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3111
3713
  var SecretType;
@@ -3118,6 +3720,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3118
3720
  SecretType["PUBLIC_CERT"] = "public_cert";
3119
3721
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3120
3722
  SecretType["USERNAME_PASSWORD"] = "username_password";
3723
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3121
3724
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3122
3725
  /** The type of private key to generate. */
3123
3726
  var KeyType;
@@ -3153,7 +3756,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3153
3756
  (function (PrivateCertificateConfigurationRootCAMetadata) {
3154
3757
  var Constants;
3155
3758
  (function (Constants) {
3156
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3759
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3157
3760
  var ConfigType;
3158
3761
  (function (ConfigType) {
3159
3762
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3163,6 +3766,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3163
3766
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3164
3767
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3165
3768
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3769
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3166
3770
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3167
3771
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3168
3772
  var SecretType;
@@ -3175,6 +3779,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3175
3779
  SecretType["PUBLIC_CERT"] = "public_cert";
3176
3780
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3177
3781
  SecretType["USERNAME_PASSWORD"] = "username_password";
3782
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3178
3783
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3179
3784
  /** The type of private key to generate. */
3180
3785
  var KeyType;
@@ -3198,7 +3803,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3198
3803
  (function (PrivateCertificateConfigurationRootCAPrototype) {
3199
3804
  var Constants;
3200
3805
  (function (Constants) {
3201
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3806
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3202
3807
  var ConfigType;
3203
3808
  (function (ConfigType) {
3204
3809
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3208,6 +3813,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3208
3813
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3209
3814
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3210
3815
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3816
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3211
3817
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3212
3818
  /** The format of the returned data. */
3213
3819
  var Format;
@@ -3233,7 +3839,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3233
3839
  (function (PrivateCertificateConfigurationTemplate) {
3234
3840
  var Constants;
3235
3841
  (function (Constants) {
3236
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3842
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3237
3843
  var ConfigType;
3238
3844
  (function (ConfigType) {
3239
3845
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3243,6 +3849,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3243
3849
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3244
3850
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3245
3851
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3852
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3246
3853
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3247
3854
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3248
3855
  var SecretType;
@@ -3255,6 +3862,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3255
3862
  SecretType["PUBLIC_CERT"] = "public_cert";
3256
3863
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3257
3864
  SecretType["USERNAME_PASSWORD"] = "username_password";
3865
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3258
3866
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3259
3867
  /** The type of private key to generate. */
3260
3868
  var KeyType;
@@ -3268,7 +3876,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3268
3876
  (function (PrivateCertificateConfigurationTemplateMetadata) {
3269
3877
  var Constants;
3270
3878
  (function (Constants) {
3271
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3879
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3272
3880
  var ConfigType;
3273
3881
  (function (ConfigType) {
3274
3882
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3278,6 +3886,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3278
3886
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3279
3887
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3280
3888
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3889
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3281
3890
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3282
3891
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3283
3892
  var SecretType;
@@ -3290,6 +3899,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3290
3899
  SecretType["PUBLIC_CERT"] = "public_cert";
3291
3900
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3292
3901
  SecretType["USERNAME_PASSWORD"] = "username_password";
3902
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3293
3903
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3294
3904
  })(Constants = PrivateCertificateConfigurationTemplateMetadata.Constants || (PrivateCertificateConfigurationTemplateMetadata.Constants = {}));
3295
3905
  })(PrivateCertificateConfigurationTemplateMetadata = SecretsManagerV2.PrivateCertificateConfigurationTemplateMetadata || (SecretsManagerV2.PrivateCertificateConfigurationTemplateMetadata = {}));
@@ -3309,7 +3919,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3309
3919
  (function (PrivateCertificateConfigurationTemplatePrototype) {
3310
3920
  var Constants;
3311
3921
  (function (Constants) {
3312
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
3922
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3313
3923
  var ConfigType;
3314
3924
  (function (ConfigType) {
3315
3925
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3319,6 +3929,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3319
3929
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3320
3930
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3321
3931
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
3932
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3322
3933
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3323
3934
  /** The type of private key to generate. */
3324
3935
  var KeyType;
@@ -3354,6 +3965,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3354
3965
  SecretType["PUBLIC_CERT"] = "public_cert";
3355
3966
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3356
3967
  SecretType["USERNAME_PASSWORD"] = "username_password";
3968
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3357
3969
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3358
3970
  /** A text representation of the secret state. */
3359
3971
  var StateDescription;
@@ -3381,6 +3993,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3381
3993
  SecretType["PUBLIC_CERT"] = "public_cert";
3382
3994
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3383
3995
  SecretType["USERNAME_PASSWORD"] = "username_password";
3996
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3384
3997
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3385
3998
  /** The format of the returned data. */
3386
3999
  var Format;
@@ -3411,6 +4024,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3411
4024
  SecretType["PUBLIC_CERT"] = "public_cert";
3412
4025
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3413
4026
  SecretType["USERNAME_PASSWORD"] = "username_password";
4027
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3414
4028
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3415
4029
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
3416
4030
  var Alias;
@@ -3457,6 +4071,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3457
4071
  SecretType["PUBLIC_CERT"] = "public_cert";
3458
4072
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3459
4073
  SecretType["USERNAME_PASSWORD"] = "username_password";
4074
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3460
4075
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3461
4076
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
3462
4077
  var Alias;
@@ -3481,6 +4096,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3481
4096
  SecretType["PUBLIC_CERT"] = "public_cert";
3482
4097
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3483
4098
  SecretType["USERNAME_PASSWORD"] = "username_password";
4099
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3484
4100
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3485
4101
  /** A text representation of the secret state. */
3486
4102
  var StateDescription;
@@ -3521,7 +4137,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3521
4137
  (function (PublicCertificateConfigurationCALetsEncrypt) {
3522
4138
  var Constants;
3523
4139
  (function (Constants) {
3524
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4140
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3525
4141
  var ConfigType;
3526
4142
  (function (ConfigType) {
3527
4143
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3531,6 +4147,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3531
4147
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3532
4148
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3533
4149
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4150
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3534
4151
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3535
4152
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3536
4153
  var SecretType;
@@ -3543,6 +4160,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3543
4160
  SecretType["PUBLIC_CERT"] = "public_cert";
3544
4161
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3545
4162
  SecretType["USERNAME_PASSWORD"] = "username_password";
4163
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3546
4164
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3547
4165
  /** The configuration of the Let's Encrypt CA environment. */
3548
4166
  var LetsEncryptEnvironment;
@@ -3556,7 +4174,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3556
4174
  (function (PublicCertificateConfigurationCALetsEncryptMetadata) {
3557
4175
  var Constants;
3558
4176
  (function (Constants) {
3559
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4177
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3560
4178
  var ConfigType;
3561
4179
  (function (ConfigType) {
3562
4180
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3566,6 +4184,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3566
4184
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3567
4185
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3568
4186
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4187
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3569
4188
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3570
4189
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3571
4190
  var SecretType;
@@ -3578,6 +4197,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3578
4197
  SecretType["PUBLIC_CERT"] = "public_cert";
3579
4198
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3580
4199
  SecretType["USERNAME_PASSWORD"] = "username_password";
4200
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3581
4201
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3582
4202
  /** The configuration of the Let's Encrypt CA environment. */
3583
4203
  var LetsEncryptEnvironment;
@@ -3603,7 +4223,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3603
4223
  (function (PublicCertificateConfigurationCALetsEncryptPrototype) {
3604
4224
  var Constants;
3605
4225
  (function (Constants) {
3606
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4226
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3607
4227
  var ConfigType;
3608
4228
  (function (ConfigType) {
3609
4229
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3613,6 +4233,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3613
4233
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3614
4234
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3615
4235
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4236
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3616
4237
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3617
4238
  /** The configuration of the Let's Encrypt CA environment. */
3618
4239
  var LetsEncryptEnvironment;
@@ -3626,7 +4247,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3626
4247
  (function (PublicCertificateConfigurationDNSClassicInfrastructure) {
3627
4248
  var Constants;
3628
4249
  (function (Constants) {
3629
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4250
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3630
4251
  var ConfigType;
3631
4252
  (function (ConfigType) {
3632
4253
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3636,6 +4257,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3636
4257
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3637
4258
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3638
4259
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4260
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3639
4261
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3640
4262
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3641
4263
  var SecretType;
@@ -3648,6 +4270,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3648
4270
  SecretType["PUBLIC_CERT"] = "public_cert";
3649
4271
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3650
4272
  SecretType["USERNAME_PASSWORD"] = "username_password";
4273
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3651
4274
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3652
4275
  })(Constants = PublicCertificateConfigurationDNSClassicInfrastructure.Constants || (PublicCertificateConfigurationDNSClassicInfrastructure.Constants = {}));
3653
4276
  })(PublicCertificateConfigurationDNSClassicInfrastructure = SecretsManagerV2.PublicCertificateConfigurationDNSClassicInfrastructure || (SecretsManagerV2.PublicCertificateConfigurationDNSClassicInfrastructure = {}));
@@ -3655,7 +4278,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3655
4278
  (function (PublicCertificateConfigurationDNSClassicInfrastructureMetadata) {
3656
4279
  var Constants;
3657
4280
  (function (Constants) {
3658
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4281
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3659
4282
  var ConfigType;
3660
4283
  (function (ConfigType) {
3661
4284
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3665,6 +4288,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3665
4288
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3666
4289
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3667
4290
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4291
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3668
4292
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3669
4293
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3670
4294
  var SecretType;
@@ -3677,6 +4301,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3677
4301
  SecretType["PUBLIC_CERT"] = "public_cert";
3678
4302
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3679
4303
  SecretType["USERNAME_PASSWORD"] = "username_password";
4304
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3680
4305
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3681
4306
  })(Constants = PublicCertificateConfigurationDNSClassicInfrastructureMetadata.Constants || (PublicCertificateConfigurationDNSClassicInfrastructureMetadata.Constants = {}));
3682
4307
  })(PublicCertificateConfigurationDNSClassicInfrastructureMetadata = SecretsManagerV2.PublicCertificateConfigurationDNSClassicInfrastructureMetadata || (SecretsManagerV2.PublicCertificateConfigurationDNSClassicInfrastructureMetadata = {}));
@@ -3684,7 +4309,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3684
4309
  (function (PublicCertificateConfigurationDNSClassicInfrastructurePrototype) {
3685
4310
  var Constants;
3686
4311
  (function (Constants) {
3687
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4312
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3688
4313
  var ConfigType;
3689
4314
  (function (ConfigType) {
3690
4315
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3694,6 +4319,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3694
4319
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3695
4320
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3696
4321
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4322
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3697
4323
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3698
4324
  })(Constants = PublicCertificateConfigurationDNSClassicInfrastructurePrototype.Constants || (PublicCertificateConfigurationDNSClassicInfrastructurePrototype.Constants = {}));
3699
4325
  })(PublicCertificateConfigurationDNSClassicInfrastructurePrototype = SecretsManagerV2.PublicCertificateConfigurationDNSClassicInfrastructurePrototype || (SecretsManagerV2.PublicCertificateConfigurationDNSClassicInfrastructurePrototype = {}));
@@ -3701,7 +4327,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3701
4327
  (function (PublicCertificateConfigurationDNSCloudInternetServices) {
3702
4328
  var Constants;
3703
4329
  (function (Constants) {
3704
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4330
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3705
4331
  var ConfigType;
3706
4332
  (function (ConfigType) {
3707
4333
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3711,6 +4337,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3711
4337
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3712
4338
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3713
4339
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4340
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3714
4341
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3715
4342
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3716
4343
  var SecretType;
@@ -3723,6 +4350,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3723
4350
  SecretType["PUBLIC_CERT"] = "public_cert";
3724
4351
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3725
4352
  SecretType["USERNAME_PASSWORD"] = "username_password";
4353
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3726
4354
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3727
4355
  })(Constants = PublicCertificateConfigurationDNSCloudInternetServices.Constants || (PublicCertificateConfigurationDNSCloudInternetServices.Constants = {}));
3728
4356
  })(PublicCertificateConfigurationDNSCloudInternetServices = SecretsManagerV2.PublicCertificateConfigurationDNSCloudInternetServices || (SecretsManagerV2.PublicCertificateConfigurationDNSCloudInternetServices = {}));
@@ -3730,7 +4358,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3730
4358
  (function (PublicCertificateConfigurationDNSCloudInternetServicesMetadata) {
3731
4359
  var Constants;
3732
4360
  (function (Constants) {
3733
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4361
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3734
4362
  var ConfigType;
3735
4363
  (function (ConfigType) {
3736
4364
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3740,6 +4368,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3740
4368
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3741
4369
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3742
4370
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4371
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3743
4372
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3744
4373
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials, service_credentials, kv, and username_password. */
3745
4374
  var SecretType;
@@ -3752,6 +4381,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3752
4381
  SecretType["PUBLIC_CERT"] = "public_cert";
3753
4382
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3754
4383
  SecretType["USERNAME_PASSWORD"] = "username_password";
4384
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3755
4385
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3756
4386
  })(Constants = PublicCertificateConfigurationDNSCloudInternetServicesMetadata.Constants || (PublicCertificateConfigurationDNSCloudInternetServicesMetadata.Constants = {}));
3757
4387
  })(PublicCertificateConfigurationDNSCloudInternetServicesMetadata = SecretsManagerV2.PublicCertificateConfigurationDNSCloudInternetServicesMetadata || (SecretsManagerV2.PublicCertificateConfigurationDNSCloudInternetServicesMetadata = {}));
@@ -3759,7 +4389,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3759
4389
  (function (PublicCertificateConfigurationDNSCloudInternetServicesPrototype) {
3760
4390
  var Constants;
3761
4391
  (function (Constants) {
3762
- /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template. */
4392
+ /** The configuration type. Can be one of: iam_credentials_configuration, public_cert_configuration_ca_lets_encrypt, public_cert_configuration_dns_classic_infrastructure, public_cert_configuration_dns_cloud_internet_services, private_cert_configuration_root_ca, private_cert_configuration_intermediate_ca, private_cert_configuration_template, custom_credentials_configuration. */
3763
4393
  var ConfigType;
3764
4394
  (function (ConfigType) {
3765
4395
  ConfigType["PUBLIC_CERT_CONFIGURATION_DNS_CLOUD_INTERNET_SERVICES"] = "public_cert_configuration_dns_cloud_internet_services";
@@ -3769,6 +4399,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3769
4399
  ConfigType["PRIVATE_CERT_CONFIGURATION_INTERMEDIATE_CA"] = "private_cert_configuration_intermediate_ca";
3770
4400
  ConfigType["PRIVATE_CERT_CONFIGURATION_TEMPLATE"] = "private_cert_configuration_template";
3771
4401
  ConfigType["IAM_CREDENTIALS_CONFIGURATION"] = "iam_credentials_configuration";
4402
+ ConfigType["CUSTOM_CREDENTIALS_CONFIGURATION"] = "custom_credentials_configuration";
3772
4403
  })(ConfigType = Constants.ConfigType || (Constants.ConfigType = {}));
3773
4404
  })(Constants = PublicCertificateConfigurationDNSCloudInternetServicesPrototype.Constants || (PublicCertificateConfigurationDNSCloudInternetServicesPrototype.Constants = {}));
3774
4405
  })(PublicCertificateConfigurationDNSCloudInternetServicesPrototype = SecretsManagerV2.PublicCertificateConfigurationDNSCloudInternetServicesPrototype || (SecretsManagerV2.PublicCertificateConfigurationDNSCloudInternetServicesPrototype = {}));
@@ -3787,6 +4418,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3787
4418
  SecretType["PUBLIC_CERT"] = "public_cert";
3788
4419
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3789
4420
  SecretType["USERNAME_PASSWORD"] = "username_password";
4421
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3790
4422
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3791
4423
  /** A text representation of the secret state. */
3792
4424
  var StateDescription;
@@ -3814,6 +4446,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3814
4446
  SecretType["PUBLIC_CERT"] = "public_cert";
3815
4447
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3816
4448
  SecretType["USERNAME_PASSWORD"] = "username_password";
4449
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3817
4450
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3818
4451
  })(Constants = PublicCertificatePrototype.Constants || (PublicCertificatePrototype.Constants = {}));
3819
4452
  })(PublicCertificatePrototype = SecretsManagerV2.PublicCertificatePrototype || (SecretsManagerV2.PublicCertificatePrototype = {}));
@@ -3832,6 +4465,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3832
4465
  SecretType["PUBLIC_CERT"] = "public_cert";
3833
4466
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3834
4467
  SecretType["USERNAME_PASSWORD"] = "username_password";
4468
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3835
4469
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3836
4470
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
3837
4471
  var Alias;
@@ -3856,6 +4490,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3856
4490
  SecretType["PUBLIC_CERT"] = "public_cert";
3857
4491
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3858
4492
  SecretType["USERNAME_PASSWORD"] = "username_password";
4493
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3859
4494
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3860
4495
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
3861
4496
  var Alias;
@@ -3865,6 +4500,39 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3865
4500
  })(Alias = Constants.Alias || (Constants.Alias = {}));
3866
4501
  })(Constants = PublicCertificateVersionMetadata.Constants || (PublicCertificateVersionMetadata.Constants = {}));
3867
4502
  })(PublicCertificateVersionMetadata = SecretsManagerV2.PublicCertificateVersionMetadata || (SecretsManagerV2.PublicCertificateVersionMetadata = {}));
4503
+ var SecretTaskPrototypeUpdateSecretTaskCredentialsCreated;
4504
+ (function (SecretTaskPrototypeUpdateSecretTaskCredentialsCreated) {
4505
+ var Constants;
4506
+ (function (Constants) {
4507
+ /** Describes the status of a secret's task. */
4508
+ var Status;
4509
+ (function (Status) {
4510
+ Status["CREDENTIALS_CREATED"] = "credentials_created";
4511
+ })(Status = Constants.Status || (Constants.Status = {}));
4512
+ })(Constants = SecretTaskPrototypeUpdateSecretTaskCredentialsCreated.Constants || (SecretTaskPrototypeUpdateSecretTaskCredentialsCreated.Constants = {}));
4513
+ })(SecretTaskPrototypeUpdateSecretTaskCredentialsCreated = SecretsManagerV2.SecretTaskPrototypeUpdateSecretTaskCredentialsCreated || (SecretsManagerV2.SecretTaskPrototypeUpdateSecretTaskCredentialsCreated = {}));
4514
+ var SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted;
4515
+ (function (SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted) {
4516
+ var Constants;
4517
+ (function (Constants) {
4518
+ /** Describes the status of a secret's task. */
4519
+ var Status;
4520
+ (function (Status) {
4521
+ Status["CREDENTIALS_DELETED"] = "credentials_deleted";
4522
+ })(Status = Constants.Status || (Constants.Status = {}));
4523
+ })(Constants = SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted.Constants || (SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted.Constants = {}));
4524
+ })(SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted = SecretsManagerV2.SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted || (SecretsManagerV2.SecretTaskPrototypeUpdateSecretTaskCredentialsDeleted = {}));
4525
+ var SecretTaskPrototypeUpdateSecretTaskFailed;
4526
+ (function (SecretTaskPrototypeUpdateSecretTaskFailed) {
4527
+ var Constants;
4528
+ (function (Constants) {
4529
+ /** Describes the status of a secret's task. */
4530
+ var Status;
4531
+ (function (Status) {
4532
+ Status["FAILED"] = "failed";
4533
+ })(Status = Constants.Status || (Constants.Status = {}));
4534
+ })(Constants = SecretTaskPrototypeUpdateSecretTaskFailed.Constants || (SecretTaskPrototypeUpdateSecretTaskFailed.Constants = {}));
4535
+ })(SecretTaskPrototypeUpdateSecretTaskFailed = SecretsManagerV2.SecretTaskPrototypeUpdateSecretTaskFailed || (SecretsManagerV2.SecretTaskPrototypeUpdateSecretTaskFailed = {}));
3868
4536
  var ServiceCredentialsSecret;
3869
4537
  (function (ServiceCredentialsSecret) {
3870
4538
  var Constants;
@@ -3880,6 +4548,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3880
4548
  SecretType["PUBLIC_CERT"] = "public_cert";
3881
4549
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3882
4550
  SecretType["USERNAME_PASSWORD"] = "username_password";
4551
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3883
4552
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3884
4553
  /** A text representation of the secret state. */
3885
4554
  var StateDescription;
@@ -3907,6 +4576,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3907
4576
  SecretType["PUBLIC_CERT"] = "public_cert";
3908
4577
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3909
4578
  SecretType["USERNAME_PASSWORD"] = "username_password";
4579
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3910
4580
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3911
4581
  /** A text representation of the secret state. */
3912
4582
  var StateDescription;
@@ -3934,6 +4604,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3934
4604
  SecretType["PUBLIC_CERT"] = "public_cert";
3935
4605
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3936
4606
  SecretType["USERNAME_PASSWORD"] = "username_password";
4607
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3937
4608
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3938
4609
  })(Constants = ServiceCredentialsSecretPrototype.Constants || (ServiceCredentialsSecretPrototype.Constants = {}));
3939
4610
  })(ServiceCredentialsSecretPrototype = SecretsManagerV2.ServiceCredentialsSecretPrototype || (SecretsManagerV2.ServiceCredentialsSecretPrototype = {}));
@@ -3952,6 +4623,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3952
4623
  SecretType["PUBLIC_CERT"] = "public_cert";
3953
4624
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3954
4625
  SecretType["USERNAME_PASSWORD"] = "username_password";
4626
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3955
4627
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3956
4628
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
3957
4629
  var Alias;
@@ -3976,6 +4648,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
3976
4648
  SecretType["PUBLIC_CERT"] = "public_cert";
3977
4649
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
3978
4650
  SecretType["USERNAME_PASSWORD"] = "username_password";
4651
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
3979
4652
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
3980
4653
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
3981
4654
  var Alias;
@@ -4000,6 +4673,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
4000
4673
  SecretType["PUBLIC_CERT"] = "public_cert";
4001
4674
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
4002
4675
  SecretType["USERNAME_PASSWORD"] = "username_password";
4676
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
4003
4677
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
4004
4678
  /** A text representation of the secret state. */
4005
4679
  var StateDescription;
@@ -4027,6 +4701,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
4027
4701
  SecretType["PUBLIC_CERT"] = "public_cert";
4028
4702
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
4029
4703
  SecretType["USERNAME_PASSWORD"] = "username_password";
4704
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
4030
4705
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
4031
4706
  /** A text representation of the secret state. */
4032
4707
  var StateDescription;
@@ -4054,6 +4729,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
4054
4729
  SecretType["PUBLIC_CERT"] = "public_cert";
4055
4730
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
4056
4731
  SecretType["USERNAME_PASSWORD"] = "username_password";
4732
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
4057
4733
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
4058
4734
  })(Constants = UsernamePasswordSecretPrototype.Constants || (UsernamePasswordSecretPrototype.Constants = {}));
4059
4735
  })(UsernamePasswordSecretPrototype = SecretsManagerV2.UsernamePasswordSecretPrototype || (SecretsManagerV2.UsernamePasswordSecretPrototype = {}));
@@ -4072,6 +4748,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
4072
4748
  SecretType["PUBLIC_CERT"] = "public_cert";
4073
4749
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
4074
4750
  SecretType["USERNAME_PASSWORD"] = "username_password";
4751
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
4075
4752
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
4076
4753
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
4077
4754
  var Alias;
@@ -4096,6 +4773,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
4096
4773
  SecretType["PUBLIC_CERT"] = "public_cert";
4097
4774
  SecretType["SERVICE_CREDENTIALS"] = "service_credentials";
4098
4775
  SecretType["USERNAME_PASSWORD"] = "username_password";
4776
+ SecretType["CUSTOM_CREDENTIALS"] = "custom_credentials";
4099
4777
  })(SecretType = Constants.SecretType || (Constants.SecretType = {}));
4100
4778
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous' is used for version `n-1`. */
4101
4779
  var Alias;