@ibm-cloud/secrets-manager 2.0.8 → 2.0.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,5 @@
1
1
  /**
2
- * (C) Copyright IBM Corp. 2024.
2
+ * (C) Copyright IBM Corp. 2025.
3
3
  *
4
4
  * Licensed under the Apache License, Version 2.0 (the "License");
5
5
  * you may not use this file except in compliance with the License.
@@ -106,7 +106,7 @@ declare class SecretsManagerV2 extends BaseService {
106
106
  * Get the properties of an existing secret group by specifying the ID of the group.
107
107
  *
108
108
  * @param {Object} params - The parameters to send to the service.
109
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
109
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
110
110
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
111
111
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretGroup>>}
112
112
  */
@@ -117,7 +117,7 @@ declare class SecretsManagerV2 extends BaseService {
117
117
  * Update the properties of an existing secret group, such as its name or description.
118
118
  *
119
119
  * @param {Object} params - The parameters to send to the service.
120
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
120
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
121
121
  * @param {string} [params.name] - The name of your secret group.
122
122
  * @param {string} [params.description] - An extended description of your secret group.
123
123
  *
@@ -136,7 +136,7 @@ declare class SecretsManagerV2 extends BaseService {
136
136
  * you must first delete the secrets that are associated with the group.
137
137
  *
138
138
  * @param {Object} params - The parameters to send to the service.
139
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret group.
139
+ * @param {string} params.id - The UUID that uniquely identifies your secret group.
140
140
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
141
141
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
142
142
  */
@@ -226,7 +226,7 @@ declare class SecretsManagerV2 extends BaseService {
226
226
  * view only the details of a specified secret without retrieving its value, use the Get secret metadata operation.
227
227
  *
228
228
  * @param {Object} params - The parameters to send to the service.
229
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
229
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
230
230
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
231
231
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.Secret>>}
232
232
  */
@@ -237,7 +237,7 @@ declare class SecretsManagerV2 extends BaseService {
237
237
  * Delete a secret by specifying the ID of the secret.
238
238
  *
239
239
  * @param {Object} params - The parameters to send to the service.
240
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
240
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
241
241
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
242
242
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
243
243
  */
@@ -248,7 +248,7 @@ declare class SecretsManagerV2 extends BaseService {
248
248
  * Get the metadata of a secret by specifying the ID of the secret.
249
249
  *
250
250
  * @param {Object} params - The parameters to send to the service.
251
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
251
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
252
252
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
253
253
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
254
254
  */
@@ -259,7 +259,7 @@ declare class SecretsManagerV2 extends BaseService {
259
259
  * Update the metadata of a secret, such as its name or description.
260
260
  *
261
261
  * @param {Object} params - The parameters to send to the service.
262
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
262
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
263
263
  * @param {SecretMetadataPatch} params.secretMetadataPatch -
264
264
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
265
265
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
@@ -271,7 +271,7 @@ declare class SecretsManagerV2 extends BaseService {
271
271
  * Create a secret action. This operation supports the following actions:.
272
272
  *
273
273
  * @param {Object} params - The parameters to send to the service.
274
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
274
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
275
275
  * @param {SecretActionPrototype} params.secretActionPrototype -
276
276
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
277
277
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretAction>>}
@@ -304,7 +304,7 @@ declare class SecretsManagerV2 extends BaseService {
304
304
  * Create a new secret version.
305
305
  *
306
306
  * @param {Object} params - The parameters to send to the service.
307
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
307
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
308
308
  * @param {SecretVersionPrototype} params.secretVersionPrototype -
309
309
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
310
310
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
@@ -318,7 +318,7 @@ declare class SecretsManagerV2 extends BaseService {
318
318
  * A successful request returns the list of versions of a secret, along with the metadata of each version.
319
319
  *
320
320
  * @param {Object} params - The parameters to send to the service.
321
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
321
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
322
322
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
323
323
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadataCollection>>}
324
324
  */
@@ -333,8 +333,8 @@ declare class SecretsManagerV2 extends BaseService {
333
333
  * with other metadata.
334
334
  *
335
335
  * @param {Object} params - The parameters to send to the service.
336
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
337
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
336
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
337
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
338
338
  * `previous` aliases to refer to the current or previous secret version.
339
339
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
340
340
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
@@ -348,8 +348,8 @@ declare class SecretsManagerV2 extends BaseService {
348
348
  * This operation is available for secret type: iam_credentials current version.
349
349
  *
350
350
  * @param {Object} params - The parameters to send to the service.
351
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
352
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
351
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
352
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
353
353
  * `previous` aliases to refer to the current or previous secret version.
354
354
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
355
355
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
@@ -364,8 +364,8 @@ declare class SecretsManagerV2 extends BaseService {
364
364
  * A successful request returns the metadata that is associated with the specified version of your secret.
365
365
  *
366
366
  * @param {Object} params - The parameters to send to the service.
367
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
368
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
367
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
368
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
369
369
  * `previous` aliases to refer to the current or previous secret version.
370
370
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
371
371
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadata>>}
@@ -377,8 +377,8 @@ declare class SecretsManagerV2 extends BaseService {
377
377
  * Update the custom metadata of a secret version.
378
378
  *
379
379
  * @param {Object} params - The parameters to send to the service.
380
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
381
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
380
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
381
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
382
382
  * `previous` aliases to refer to the current or previous secret version.
383
383
  * @param {JsonObject} [params.versionCustomMetadata] - The secret version metadata that a user can customize.
384
384
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -393,8 +393,8 @@ declare class SecretsManagerV2 extends BaseService {
393
393
  * - `private_cert_action_revoke_certificate`: Revoke a version of a private certificate.
394
394
  *
395
395
  * @param {Object} params - The parameters to send to the service.
396
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
397
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
396
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
397
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
398
398
  * `previous` aliases to refer to the current or previous secret version.
399
399
  * @param {SecretVersionActionPrototype} params.secretVersionActionPrototype -
400
400
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -442,7 +442,7 @@ declare class SecretsManagerV2 extends BaseService {
442
442
  * List the locks that are associated with a specified secret.
443
443
  *
444
444
  * @param {Object} params - The parameters to send to the service.
445
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
445
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
446
446
  * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
447
447
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
448
448
  *
@@ -485,7 +485,7 @@ declare class SecretsManagerV2 extends BaseService {
485
485
  * the data of the previous secret version if it doesn't have any locks.
486
486
  *
487
487
  * @param {Object} params - The parameters to send to the service.
488
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
488
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
489
489
  * @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
490
490
  * @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
491
491
  * modes to clear any matching locks on a secret version.
@@ -510,7 +510,7 @@ declare class SecretsManagerV2 extends BaseService {
510
510
  * of your secret.
511
511
  *
512
512
  * @param {Object} params - The parameters to send to the service.
513
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret.
513
+ * @param {string} params.id - The UUID that uniquely identifies your secret.
514
514
  * @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
515
515
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
516
516
  * @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
@@ -522,8 +522,8 @@ declare class SecretsManagerV2 extends BaseService {
522
522
  * List the locks that are associated with a specified secret version.
523
523
  *
524
524
  * @param {Object} params - The parameters to send to the service.
525
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
526
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
525
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
526
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
527
527
  * `previous` aliases to refer to the current or previous secret version.
528
528
  * @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
529
529
  * items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
@@ -567,8 +567,8 @@ declare class SecretsManagerV2 extends BaseService {
567
567
  * the data of the previous secret version if it doesn't have any locks.
568
568
  *
569
569
  * @param {Object} params - The parameters to send to the service.
570
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
571
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
570
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
571
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
572
572
  * `previous` aliases to refer to the current or previous secret version.
573
573
  * @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
574
574
  * @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
@@ -594,8 +594,8 @@ declare class SecretsManagerV2 extends BaseService {
594
594
  * of your secret.
595
595
  *
596
596
  * @param {Object} params - The parameters to send to the service.
597
- * @param {string} params.secretId - The v4 UUID that uniquely identifies your secret.
598
- * @param {string} params.id - The v4 UUID that uniquely identifies your secret version. You can use the `current` or
597
+ * @param {string} params.secretId - The UUID that uniquely identifies your secret.
598
+ * @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
599
599
  * `previous` aliases to refer to the current or previous secret version.
600
600
  * @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
601
601
  * @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
@@ -839,13 +839,13 @@ declare namespace SecretsManagerV2 {
839
839
  }
840
840
  /** Parameters for the `getSecretGroup` operation. */
841
841
  interface GetSecretGroupParams {
842
- /** The v4 UUID that uniquely identifies your secret group. */
842
+ /** The UUID that uniquely identifies your secret group. */
843
843
  id: string;
844
844
  headers?: OutgoingHttpHeaders;
845
845
  }
846
846
  /** Parameters for the `updateSecretGroup` operation. */
847
847
  interface UpdateSecretGroupParams {
848
- /** The v4 UUID that uniquely identifies your secret group. */
848
+ /** The UUID that uniquely identifies your secret group. */
849
849
  id: string;
850
850
  /** The name of your secret group. */
851
851
  name?: string;
@@ -859,7 +859,7 @@ declare namespace SecretsManagerV2 {
859
859
  }
860
860
  /** Parameters for the `deleteSecretGroup` operation. */
861
861
  interface DeleteSecretGroupParams {
862
- /** The v4 UUID that uniquely identifies your secret group. */
862
+ /** The UUID that uniquely identifies your secret group. */
863
863
  id: string;
864
864
  headers?: OutgoingHttpHeaders;
865
865
  }
@@ -946,32 +946,32 @@ declare namespace SecretsManagerV2 {
946
946
  }
947
947
  /** Parameters for the `getSecret` operation. */
948
948
  interface GetSecretParams {
949
- /** The v4 UUID that uniquely identifies your secret. */
949
+ /** The UUID that uniquely identifies your secret. */
950
950
  id: string;
951
951
  headers?: OutgoingHttpHeaders;
952
952
  }
953
953
  /** Parameters for the `deleteSecret` operation. */
954
954
  interface DeleteSecretParams {
955
- /** The v4 UUID that uniquely identifies your secret. */
955
+ /** The UUID that uniquely identifies your secret. */
956
956
  id: string;
957
957
  headers?: OutgoingHttpHeaders;
958
958
  }
959
959
  /** Parameters for the `getSecretMetadata` operation. */
960
960
  interface GetSecretMetadataParams {
961
- /** The v4 UUID that uniquely identifies your secret. */
961
+ /** The UUID that uniquely identifies your secret. */
962
962
  id: string;
963
963
  headers?: OutgoingHttpHeaders;
964
964
  }
965
965
  /** Parameters for the `updateSecretMetadata` operation. */
966
966
  interface UpdateSecretMetadataParams {
967
- /** The v4 UUID that uniquely identifies your secret. */
967
+ /** The UUID that uniquely identifies your secret. */
968
968
  id: string;
969
969
  secretMetadataPatch: SecretMetadataPatch;
970
970
  headers?: OutgoingHttpHeaders;
971
971
  }
972
972
  /** Parameters for the `createSecretAction` operation. */
973
973
  interface CreateSecretActionParams {
974
- /** The v4 UUID that uniquely identifies your secret. */
974
+ /** The UUID that uniquely identifies your secret. */
975
975
  id: string;
976
976
  secretActionPrototype: SecretActionPrototype;
977
977
  headers?: OutgoingHttpHeaders;
@@ -1006,22 +1006,22 @@ declare namespace SecretsManagerV2 {
1006
1006
  }
1007
1007
  /** Parameters for the `createSecretVersion` operation. */
1008
1008
  interface CreateSecretVersionParams {
1009
- /** The v4 UUID that uniquely identifies your secret. */
1009
+ /** The UUID that uniquely identifies your secret. */
1010
1010
  secretId: string;
1011
1011
  secretVersionPrototype: SecretVersionPrototype;
1012
1012
  headers?: OutgoingHttpHeaders;
1013
1013
  }
1014
1014
  /** Parameters for the `listSecretVersions` operation. */
1015
1015
  interface ListSecretVersionsParams {
1016
- /** The v4 UUID that uniquely identifies your secret. */
1016
+ /** The UUID that uniquely identifies your secret. */
1017
1017
  secretId: string;
1018
1018
  headers?: OutgoingHttpHeaders;
1019
1019
  }
1020
1020
  /** Parameters for the `getSecretVersion` operation. */
1021
1021
  interface GetSecretVersionParams {
1022
- /** The v4 UUID that uniquely identifies your secret. */
1022
+ /** The UUID that uniquely identifies your secret. */
1023
1023
  secretId: string;
1024
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1024
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1025
1025
  * refer to the current or previous secret version.
1026
1026
  */
1027
1027
  id: string;
@@ -1029,9 +1029,9 @@ declare namespace SecretsManagerV2 {
1029
1029
  }
1030
1030
  /** Parameters for the `deleteSecretVersionData` operation. */
1031
1031
  interface DeleteSecretVersionDataParams {
1032
- /** The v4 UUID that uniquely identifies your secret. */
1032
+ /** The UUID that uniquely identifies your secret. */
1033
1033
  secretId: string;
1034
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1034
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1035
1035
  * refer to the current or previous secret version.
1036
1036
  */
1037
1037
  id: string;
@@ -1039,9 +1039,9 @@ declare namespace SecretsManagerV2 {
1039
1039
  }
1040
1040
  /** Parameters for the `getSecretVersionMetadata` operation. */
1041
1041
  interface GetSecretVersionMetadataParams {
1042
- /** The v4 UUID that uniquely identifies your secret. */
1042
+ /** The UUID that uniquely identifies your secret. */
1043
1043
  secretId: string;
1044
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1044
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1045
1045
  * refer to the current or previous secret version.
1046
1046
  */
1047
1047
  id: string;
@@ -1049,9 +1049,9 @@ declare namespace SecretsManagerV2 {
1049
1049
  }
1050
1050
  /** Parameters for the `updateSecretVersionMetadata` operation. */
1051
1051
  interface UpdateSecretVersionMetadataParams {
1052
- /** The v4 UUID that uniquely identifies your secret. */
1052
+ /** The UUID that uniquely identifies your secret. */
1053
1053
  secretId: string;
1054
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1054
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1055
1055
  * refer to the current or previous secret version.
1056
1056
  */
1057
1057
  id: string;
@@ -1061,9 +1061,9 @@ declare namespace SecretsManagerV2 {
1061
1061
  }
1062
1062
  /** Parameters for the `createSecretVersionAction` operation. */
1063
1063
  interface CreateSecretVersionActionParams {
1064
- /** The v4 UUID that uniquely identifies your secret. */
1064
+ /** The UUID that uniquely identifies your secret. */
1065
1065
  secretId: string;
1066
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1066
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1067
1067
  * refer to the current or previous secret version.
1068
1068
  */
1069
1069
  id: string;
@@ -1106,7 +1106,7 @@ declare namespace SecretsManagerV2 {
1106
1106
  }
1107
1107
  /** Parameters for the `listSecretLocks` operation. */
1108
1108
  interface ListSecretLocksParams {
1109
- /** The v4 UUID that uniquely identifies your secret. */
1109
+ /** The UUID that uniquely identifies your secret. */
1110
1110
  id: string;
1111
1111
  /** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
1112
1112
  * `offset` value. Use `offset` with `limit` to page through your available resources.
@@ -1141,7 +1141,7 @@ declare namespace SecretsManagerV2 {
1141
1141
  }
1142
1142
  /** Parameters for the `createSecretLocksBulk` operation. */
1143
1143
  interface CreateSecretLocksBulkParams {
1144
- /** The v4 UUID that uniquely identifies your secret. */
1144
+ /** The UUID that uniquely identifies your secret. */
1145
1145
  id: string;
1146
1146
  /** The locks data to be attached to a secret version. */
1147
1147
  locks: SecretLockPrototype[];
@@ -1164,7 +1164,7 @@ declare namespace SecretsManagerV2 {
1164
1164
  }
1165
1165
  /** Parameters for the `deleteSecretLocksBulk` operation. */
1166
1166
  interface DeleteSecretLocksBulkParams {
1167
- /** The v4 UUID that uniquely identifies your secret. */
1167
+ /** The UUID that uniquely identifies your secret. */
1168
1168
  id: string;
1169
1169
  /** Specify the names of the secret locks to be deleted. */
1170
1170
  name?: string[];
@@ -1172,9 +1172,9 @@ declare namespace SecretsManagerV2 {
1172
1172
  }
1173
1173
  /** Parameters for the `listSecretVersionLocks` operation. */
1174
1174
  interface ListSecretVersionLocksParams {
1175
- /** The v4 UUID that uniquely identifies your secret. */
1175
+ /** The UUID that uniquely identifies your secret. */
1176
1176
  secretId: string;
1177
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1177
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1178
1178
  * refer to the current or previous secret version.
1179
1179
  */
1180
1180
  id: string;
@@ -1211,9 +1211,9 @@ declare namespace SecretsManagerV2 {
1211
1211
  }
1212
1212
  /** Parameters for the `createSecretVersionLocksBulk` operation. */
1213
1213
  interface CreateSecretVersionLocksBulkParams {
1214
- /** The v4 UUID that uniquely identifies your secret. */
1214
+ /** The UUID that uniquely identifies your secret. */
1215
1215
  secretId: string;
1216
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1216
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1217
1217
  * refer to the current or previous secret version.
1218
1218
  */
1219
1219
  id: string;
@@ -1238,9 +1238,9 @@ declare namespace SecretsManagerV2 {
1238
1238
  }
1239
1239
  /** Parameters for the `deleteSecretVersionLocksBulk` operation. */
1240
1240
  interface DeleteSecretVersionLocksBulkParams {
1241
- /** The v4 UUID that uniquely identifies your secret. */
1241
+ /** The UUID that uniquely identifies your secret. */
1242
1242
  secretId: string;
1243
- /** The v4 UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1243
+ /** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
1244
1244
  * refer to the current or previous secret version.
1245
1245
  */
1246
1246
  id: string;
@@ -1536,6 +1536,200 @@ declare namespace SecretsManagerV2 {
1536
1536
  */
1537
1537
  interface ConfigurationPrototype {
1538
1538
  }
1539
+ /**
1540
+ * The data specified to create the CSR and the private key.
1541
+ */
1542
+ interface ImportedCertificateManagedCsr {
1543
+ /** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
1544
+ ou?: string[];
1545
+ /** The Organization (O) values to define in the subject field of the resulting certificate. */
1546
+ organization?: string[];
1547
+ /** The Country (C) values to define in the subject field of the resulting certificate. */
1548
+ country?: string[];
1549
+ /** The Locality (L) values to define in the subject field of the resulting certificate. */
1550
+ locality?: string[];
1551
+ /** The Province (ST) values to define in the subject field of the resulting certificate. */
1552
+ province?: string[];
1553
+ /** The street address values to define in the subject field of the resulting certificate. */
1554
+ street_address?: string[];
1555
+ /** The postal code values to define in the subject field of the resulting certificate. */
1556
+ postal_code?: string[];
1557
+ /** If set to false, makes the common_name field optional while generating a certificate. */
1558
+ require_cn?: boolean;
1559
+ /** The Common Name (CN) represents the server name protected by the SSL certificate. */
1560
+ common_name?: string;
1561
+ /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
1562
+ * SSL certificate.
1563
+ */
1564
+ alt_names?: string;
1565
+ /** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1566
+ ip_sans?: string;
1567
+ /** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1568
+ uri_sans?: string;
1569
+ /** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
1570
+ * in a comma-delimited list.
1571
+ *
1572
+ * The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
1573
+ */
1574
+ other_sans?: string;
1575
+ /** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
1576
+ *
1577
+ * If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
1578
+ * useful if the common name is a human-readable identifier, instead of a hostname or an email address.
1579
+ */
1580
+ exclude_cn_from_sans?: boolean;
1581
+ /** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
1582
+ * signed certificate.
1583
+ */
1584
+ user_ids?: string;
1585
+ /** This field indicates whether certificate is flagged for server use. */
1586
+ server_flag?: boolean;
1587
+ /** This field indicates whether certificate is flagged for client use. */
1588
+ client_flag?: boolean;
1589
+ /** This field indicates whether certificate is flagged for code signing use. */
1590
+ code_signing_flag?: boolean;
1591
+ /** This field indicates whether certificate is flagged for email protection use. */
1592
+ email_protection_flag?: boolean;
1593
+ /** The type of private key to generate. */
1594
+ key_type?: ImportedCertificateManagedCsr.Constants.KeyType | string;
1595
+ /** The number of bits to use to generate the private key.
1596
+ *
1597
+ * Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
1598
+ * `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
1599
+ * ed25519 keys.
1600
+ */
1601
+ key_bits?: number;
1602
+ /** The allowed key usage constraint to define for certificate, in a comma-delimited list.
1603
+ *
1604
+ * You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
1605
+ * the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
1606
+ * field to an empty string.
1607
+ */
1608
+ key_usage?: string;
1609
+ /** The allowed extended key usage constraint on certificate, in a comma-delimited list.
1610
+ *
1611
+ * You can find valid values in the [Go x509 package
1612
+ * documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
1613
+ * Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
1614
+ */
1615
+ ext_key_usage?: string;
1616
+ /** A comma-delimited list of policy Object Identifiers (OIDs). */
1617
+ policy_identifiers?: string;
1618
+ /** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
1619
+ ext_key_usage_oids?: string;
1620
+ /** This field indicates whether the private key will be rotated. */
1621
+ rotate_keys?: boolean;
1622
+ }
1623
+ namespace ImportedCertificateManagedCsr {
1624
+ namespace Constants {
1625
+ /** The type of private key to generate. */
1626
+ enum KeyType {
1627
+ RSA = "rsa",
1628
+ EC = "ec",
1629
+ ED25519 = "ed25519"
1630
+ }
1631
+ }
1632
+ }
1633
+ /**
1634
+ * The data specified to create the CSR and the private key.
1635
+ */
1636
+ interface ImportedCertificateManagedCsrResponse {
1637
+ /** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
1638
+ ou: string[];
1639
+ /** The Organization (O) values to define in the subject field of the resulting certificate. */
1640
+ organization: string[];
1641
+ /** The Country (C) values to define in the subject field of the resulting certificate. */
1642
+ country: string[];
1643
+ /** The Locality (L) values to define in the subject field of the resulting certificate. */
1644
+ locality: string[];
1645
+ /** The Province (ST) values to define in the subject field of the resulting certificate. */
1646
+ province: string[];
1647
+ /** The street address values to define in the subject field of the resulting certificate. */
1648
+ street_address: string[];
1649
+ /** The postal code values to define in the subject field of the resulting certificate. */
1650
+ postal_code: string[];
1651
+ /** If set to false, makes the common_name field optional while generating a certificate. */
1652
+ require_cn: boolean;
1653
+ /** The Common Name (CN) represents the server name protected by the SSL certificate. */
1654
+ common_name?: string;
1655
+ /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
1656
+ * SSL certificate.
1657
+ */
1658
+ alt_names?: string;
1659
+ /** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1660
+ ip_sans?: string;
1661
+ /** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
1662
+ uri_sans?: string;
1663
+ /** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
1664
+ * in a comma-delimited list.
1665
+ *
1666
+ * The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
1667
+ */
1668
+ other_sans?: string;
1669
+ /** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
1670
+ *
1671
+ * If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
1672
+ * useful if the common name is a human-readable identifier, instead of a hostname or an email address.
1673
+ */
1674
+ exclude_cn_from_sans: boolean;
1675
+ /** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
1676
+ * signed certificate.
1677
+ */
1678
+ user_ids?: string;
1679
+ /** This field indicates whether certificate is flagged for server use. */
1680
+ server_flag: boolean;
1681
+ /** This field indicates whether certificate is flagged for client use. */
1682
+ client_flag: boolean;
1683
+ /** This field indicates whether certificate is flagged for code signing use. */
1684
+ code_signing_flag: boolean;
1685
+ /** This field indicates whether certificate is flagged for email protection use. */
1686
+ email_protection_flag: boolean;
1687
+ /** The type of private key to generate. */
1688
+ key_type: ImportedCertificateManagedCsrResponse.Constants.KeyType | string;
1689
+ /** The number of bits to use to generate the private key.
1690
+ *
1691
+ * Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
1692
+ * `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
1693
+ * ed25519 keys.
1694
+ */
1695
+ key_bits: number;
1696
+ /** The allowed key usage constraint to define for certificate, in a comma-delimited list.
1697
+ *
1698
+ * You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
1699
+ * the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
1700
+ * field to an empty string.
1701
+ */
1702
+ key_usage?: string;
1703
+ /** The allowed extended key usage constraint on certificate, in a comma-delimited list.
1704
+ *
1705
+ * You can find valid values in the [Go x509 package
1706
+ * documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
1707
+ * Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
1708
+ */
1709
+ ext_key_usage?: string;
1710
+ /** A comma-delimited list of policy Object Identifiers (OIDs). */
1711
+ policy_identifiers?: string;
1712
+ /** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
1713
+ ext_key_usage_oids?: string;
1714
+ /** This field indicates whether the private key will be rotated. */
1715
+ rotate_keys?: boolean;
1716
+ /** The certificate signing request. */
1717
+ csr: string;
1718
+ /** The PEM-encoded private key that is associated with the certificate. The data must be formatted on a single
1719
+ * line with embedded newline characters.
1720
+ */
1721
+ private_key: string;
1722
+ }
1723
+ namespace ImportedCertificateManagedCsrResponse {
1724
+ namespace Constants {
1725
+ /** The type of private key to generate. */
1726
+ enum KeyType {
1727
+ RSA = "rsa",
1728
+ EC = "ec",
1729
+ ED25519 = "ed25519"
1730
+ }
1731
+ }
1732
+ }
1539
1733
  /**
1540
1734
  * The details of the Event Notifications registration.
1541
1735
  */
@@ -1769,7 +1963,7 @@ declare namespace SecretsManagerV2 {
1769
1963
  * Properties that describe a secret group.
1770
1964
  */
1771
1965
  interface SecretGroup {
1772
- /** A v4 UUID identifier, or `default` secret group. */
1966
+ /** A UUID identifier, or `default` secret group. */
1773
1967
  id: string;
1774
1968
  /** The name of your existing secret group. */
1775
1969
  name?: string;
@@ -1819,11 +2013,11 @@ declare namespace SecretsManagerV2 {
1819
2013
  updated_at: string;
1820
2014
  /** The unique identifier that is associated with the entity that created the secret. */
1821
2015
  created_by: string;
1822
- /** A v4 UUID identifier, or `default` secret group. */
2016
+ /** A UUID identifier, or `default` secret group. */
1823
2017
  secret_group_id: string;
1824
- /** A v4 UUID identifier. */
2018
+ /** A UUID identifier. */
1825
2019
  secret_id: string;
1826
- /** A v4 UUID identifier. */
2020
+ /** A UUID identifier. */
1827
2021
  secret_version_id: string;
1828
2022
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
1829
2023
  * is used for version `n-1`.
@@ -1862,14 +2056,14 @@ declare namespace SecretsManagerV2 {
1862
2056
  * Create locks response body containing a collection of locks that are attached to a secret.
1863
2057
  */
1864
2058
  interface SecretLocks {
1865
- /** A v4 UUID identifier. */
2059
+ /** A UUID identifier. */
1866
2060
  secret_id: string;
1867
- /** A v4 UUID identifier, or `default` secret group. */
2061
+ /** A UUID identifier, or `default` secret group. */
1868
2062
  secret_group_id: string;
1869
2063
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
1870
2064
  * service_credentials, kv, and username_password.
1871
2065
  */
1872
- secret_type?: SecretLocks.Constants.SecretType | string;
2066
+ secret_type: SecretLocks.Constants.SecretType | string;
1873
2067
  /** The human-readable name of your secret. */
1874
2068
  secret_name?: string;
1875
2069
  /** A collection of locks that are attached to a secret. */
@@ -1961,7 +2155,7 @@ declare namespace SecretsManagerV2 {
1961
2155
  * SecretVersionLocks.
1962
2156
  */
1963
2157
  interface SecretVersionLocks {
1964
- /** A v4 UUID identifier. */
2158
+ /** A UUID identifier. */
1965
2159
  version_id: string;
1966
2160
  /** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
1967
2161
  * is used for version `n-1`.
@@ -2215,7 +2409,7 @@ declare namespace SecretsManagerV2 {
2215
2409
  * call to the service API.
2216
2410
  */
2217
2411
  downloaded?: boolean;
2218
- /** A v4 UUID identifier. */
2412
+ /** A UUID identifier. */
2219
2413
  id: string;
2220
2414
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2221
2415
  *
@@ -2228,7 +2422,7 @@ declare namespace SecretsManagerV2 {
2228
2422
  locks_total?: number;
2229
2423
  /** The human-readable name of your secret. */
2230
2424
  name?: string;
2231
- /** A v4 UUID identifier, or `default` secret group. */
2425
+ /** A UUID identifier, or `default` secret group. */
2232
2426
  secret_group_id: string;
2233
2427
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2234
2428
  * service_credentials, kv, and username_password.
@@ -2298,7 +2492,7 @@ declare namespace SecretsManagerV2 {
2298
2492
  * call to the service API.
2299
2493
  */
2300
2494
  downloaded?: boolean;
2301
- /** A v4 UUID identifier. */
2495
+ /** A UUID identifier. */
2302
2496
  id: string;
2303
2497
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2304
2498
  *
@@ -2311,7 +2505,7 @@ declare namespace SecretsManagerV2 {
2311
2505
  locks_total?: number;
2312
2506
  /** The human-readable name of your secret. */
2313
2507
  name?: string;
2314
- /** A v4 UUID identifier, or `default` secret group. */
2508
+ /** A UUID identifier, or `default` secret group. */
2315
2509
  secret_group_id: string;
2316
2510
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2317
2511
  * service_credentials, kv, and username_password.
@@ -2414,7 +2608,7 @@ declare namespace SecretsManagerV2 {
2414
2608
  * To protect your privacy, do not use personal data, such as your name or location, as a name for your secret.
2415
2609
  */
2416
2610
  name: string;
2417
- /** A v4 UUID identifier, or `default` secret group. */
2611
+ /** A UUID identifier, or `default` secret group. */
2418
2612
  secret_group_id?: string;
2419
2613
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2420
2614
  * service_credentials, kv, and username_password.
@@ -2454,7 +2648,7 @@ declare namespace SecretsManagerV2 {
2454
2648
  * call to the service API.
2455
2649
  */
2456
2650
  downloaded?: boolean;
2457
- /** A v4 UUID identifier. */
2651
+ /** A UUID identifier. */
2458
2652
  id: string;
2459
2653
  /** The human-readable name of your secret. */
2460
2654
  secret_name?: string;
@@ -2462,7 +2656,7 @@ declare namespace SecretsManagerV2 {
2462
2656
  * service_credentials, kv, and username_password.
2463
2657
  */
2464
2658
  secret_type: ArbitrarySecretVersion.Constants.SecretType | string;
2465
- /** A v4 UUID identifier, or `default` secret group. */
2659
+ /** A UUID identifier, or `default` secret group. */
2466
2660
  secret_group_id: string;
2467
2661
  /** Indicates whether the secret payload is available in this secret version. */
2468
2662
  payload_available: boolean;
@@ -2472,7 +2666,7 @@ declare namespace SecretsManagerV2 {
2472
2666
  alias?: ArbitrarySecretVersion.Constants.Alias | string;
2473
2667
  /** The secret version metadata that a user can customize. */
2474
2668
  version_custom_metadata?: JsonObject;
2475
- /** A v4 UUID identifier. */
2669
+ /** A UUID identifier. */
2476
2670
  secret_id: string;
2477
2671
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
2478
2672
  * types: Arbitrary, username_password.
@@ -2515,7 +2709,7 @@ declare namespace SecretsManagerV2 {
2515
2709
  * call to the service API.
2516
2710
  */
2517
2711
  downloaded?: boolean;
2518
- /** A v4 UUID identifier. */
2712
+ /** A UUID identifier. */
2519
2713
  id: string;
2520
2714
  /** The human-readable name of your secret. */
2521
2715
  secret_name?: string;
@@ -2523,7 +2717,7 @@ declare namespace SecretsManagerV2 {
2523
2717
  * service_credentials, kv, and username_password.
2524
2718
  */
2525
2719
  secret_type: ArbitrarySecretVersionMetadata.Constants.SecretType | string;
2526
- /** A v4 UUID identifier, or `default` secret group. */
2720
+ /** A UUID identifier, or `default` secret group. */
2527
2721
  secret_group_id: string;
2528
2722
  /** Indicates whether the secret payload is available in this secret version. */
2529
2723
  payload_available: boolean;
@@ -2533,7 +2727,7 @@ declare namespace SecretsManagerV2 {
2533
2727
  alias?: ArbitrarySecretVersionMetadata.Constants.Alias | string;
2534
2728
  /** The secret version metadata that a user can customize. */
2535
2729
  version_custom_metadata?: JsonObject;
2536
- /** A v4 UUID identifier. */
2730
+ /** A UUID identifier. */
2537
2731
  secret_id: string;
2538
2732
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
2539
2733
  * types: Arbitrary, username_password.
@@ -2778,7 +2972,7 @@ declare namespace SecretsManagerV2 {
2778
2972
  * call to the service API.
2779
2973
  */
2780
2974
  downloaded?: boolean;
2781
- /** A v4 UUID identifier. */
2975
+ /** A UUID identifier. */
2782
2976
  id: string;
2783
2977
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2784
2978
  *
@@ -2791,7 +2985,7 @@ declare namespace SecretsManagerV2 {
2791
2985
  locks_total?: number;
2792
2986
  /** The human-readable name of your secret. */
2793
2987
  name?: string;
2794
- /** A v4 UUID identifier, or `default` secret group. */
2988
+ /** A UUID identifier, or `default` secret group. */
2795
2989
  secret_group_id: string;
2796
2990
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2797
2991
  * service_credentials, kv, and username_password.
@@ -2919,7 +3113,7 @@ declare namespace SecretsManagerV2 {
2919
3113
  * call to the service API.
2920
3114
  */
2921
3115
  downloaded?: boolean;
2922
- /** A v4 UUID identifier. */
3116
+ /** A UUID identifier. */
2923
3117
  id: string;
2924
3118
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
2925
3119
  *
@@ -2932,7 +3126,7 @@ declare namespace SecretsManagerV2 {
2932
3126
  locks_total?: number;
2933
3127
  /** The human-readable name of your secret. */
2934
3128
  name?: string;
2935
- /** A v4 UUID identifier, or `default` secret group. */
3129
+ /** A UUID identifier, or `default` secret group. */
2936
3130
  secret_group_id: string;
2937
3131
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
2938
3132
  * service_credentials, kv, and username_password.
@@ -3088,7 +3282,7 @@ declare namespace SecretsManagerV2 {
3088
3282
  * secret group.
3089
3283
  */
3090
3284
  description?: string;
3091
- /** A v4 UUID identifier, or `default` secret group. */
3285
+ /** A UUID identifier, or `default` secret group. */
3092
3286
  secret_group_id?: string;
3093
3287
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3094
3288
  *
@@ -3160,7 +3354,7 @@ declare namespace SecretsManagerV2 {
3160
3354
  * IAMCredentialsSecretRestoreFromVersionPrototype.
3161
3355
  */
3162
3356
  interface IAMCredentialsSecretRestoreFromVersionPrototype extends SecretVersionPrototype {
3163
- /** A v4 UUID identifier, or `current` or `previous` secret version aliases. */
3357
+ /** A UUID identifier, or `current` or `previous` secret version aliases. */
3164
3358
  restore_from_version: string;
3165
3359
  /** The secret metadata that a user can customize. */
3166
3360
  custom_metadata?: JsonObject;
@@ -3181,7 +3375,7 @@ declare namespace SecretsManagerV2 {
3181
3375
  * call to the service API.
3182
3376
  */
3183
3377
  downloaded?: boolean;
3184
- /** A v4 UUID identifier. */
3378
+ /** A UUID identifier. */
3185
3379
  id: string;
3186
3380
  /** The human-readable name of your secret. */
3187
3381
  secret_name?: string;
@@ -3189,7 +3383,7 @@ declare namespace SecretsManagerV2 {
3189
3383
  * service_credentials, kv, and username_password.
3190
3384
  */
3191
3385
  secret_type: IAMCredentialsSecretVersion.Constants.SecretType | string;
3192
- /** A v4 UUID identifier, or `default` secret group. */
3386
+ /** A UUID identifier, or `default` secret group. */
3193
3387
  secret_group_id: string;
3194
3388
  /** Indicates whether the secret payload is available in this secret version. */
3195
3389
  payload_available: boolean;
@@ -3199,7 +3393,7 @@ declare namespace SecretsManagerV2 {
3199
3393
  alias?: IAMCredentialsSecretVersion.Constants.Alias | string;
3200
3394
  /** The secret version metadata that a user can customize. */
3201
3395
  version_custom_metadata?: JsonObject;
3202
- /** A v4 UUID identifier. */
3396
+ /** A UUID identifier. */
3203
3397
  secret_id: string;
3204
3398
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3205
3399
  * types: Arbitrary, username_password.
@@ -3259,7 +3453,7 @@ declare namespace SecretsManagerV2 {
3259
3453
  * call to the service API.
3260
3454
  */
3261
3455
  downloaded?: boolean;
3262
- /** A v4 UUID identifier. */
3456
+ /** A UUID identifier. */
3263
3457
  id: string;
3264
3458
  /** The human-readable name of your secret. */
3265
3459
  secret_name?: string;
@@ -3267,7 +3461,7 @@ declare namespace SecretsManagerV2 {
3267
3461
  * service_credentials, kv, and username_password.
3268
3462
  */
3269
3463
  secret_type: IAMCredentialsSecretVersionMetadata.Constants.SecretType | string;
3270
- /** A v4 UUID identifier, or `default` secret group. */
3464
+ /** A UUID identifier, or `default` secret group. */
3271
3465
  secret_group_id: string;
3272
3466
  /** Indicates whether the secret payload is available in this secret version. */
3273
3467
  payload_available: boolean;
@@ -3277,7 +3471,7 @@ declare namespace SecretsManagerV2 {
3277
3471
  alias?: IAMCredentialsSecretVersionMetadata.Constants.Alias | string;
3278
3472
  /** The secret version metadata that a user can customize. */
3279
3473
  version_custom_metadata?: JsonObject;
3280
- /** A v4 UUID identifier. */
3474
+ /** A UUID identifier. */
3281
3475
  secret_id: string;
3282
3476
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3283
3477
  * types: Arbitrary, username_password.
@@ -3347,7 +3541,7 @@ declare namespace SecretsManagerV2 {
3347
3541
  * call to the service API.
3348
3542
  */
3349
3543
  downloaded?: boolean;
3350
- /** A v4 UUID identifier. */
3544
+ /** A UUID identifier. */
3351
3545
  id: string;
3352
3546
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3353
3547
  *
@@ -3360,7 +3554,7 @@ declare namespace SecretsManagerV2 {
3360
3554
  locks_total?: number;
3361
3555
  /** The human-readable name of your secret. */
3362
3556
  name?: string;
3363
- /** A v4 UUID identifier, or `default` secret group. */
3557
+ /** A UUID identifier, or `default` secret group. */
3364
3558
  secret_group_id: string;
3365
3559
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3366
3560
  * service_credentials, kv, and username_password.
@@ -3381,7 +3575,7 @@ declare namespace SecretsManagerV2 {
3381
3575
  /** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
3382
3576
  * certificate.
3383
3577
  */
3384
- signing_algorithm: string;
3578
+ signing_algorithm?: string;
3385
3579
  /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
3386
3580
  * SSL certificate.
3387
3581
  */
@@ -3391,23 +3585,25 @@ declare namespace SecretsManagerV2 {
3391
3585
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3392
3586
  * types: Arbitrary, username_password.
3393
3587
  */
3394
- expiration_date: string;
3588
+ expiration_date?: string;
3395
3589
  /** Indicates whether the certificate was imported with an associated intermediate certificate. */
3396
- intermediate_included: boolean;
3590
+ intermediate_included?: boolean;
3397
3591
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3398
- issuer: string;
3592
+ issuer?: string;
3399
3593
  /** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
3400
3594
  * certificate.
3401
3595
  */
3402
3596
  key_algorithm?: string;
3403
3597
  /** Indicates whether the certificate was imported with an associated private key. */
3404
- private_key_included: boolean;
3598
+ private_key_included?: boolean;
3405
3599
  /** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
3406
- serial_number: string;
3600
+ serial_number?: string;
3407
3601
  /** The date and time that the certificate validity period begins and ends. */
3408
- validity: CertificateValidity;
3602
+ validity?: CertificateValidity;
3603
+ /** The data specified to create the CSR and the private key. */
3604
+ managed_csr?: ImportedCertificateManagedCsrResponse;
3409
3605
  /** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
3410
- certificate: string;
3606
+ certificate?: string;
3411
3607
  /** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
3412
3608
  * formatted on a single line with embedded newline characters.
3413
3609
  */
@@ -3416,6 +3612,8 @@ declare namespace SecretsManagerV2 {
3416
3612
  * line with embedded newline characters.
3417
3613
  */
3418
3614
  private_key?: string;
3615
+ /** The certificate signing request. */
3616
+ csr?: string;
3419
3617
  }
3420
3618
  namespace ImportedCertificate {
3421
3619
  namespace Constants {
@@ -3462,7 +3660,7 @@ declare namespace SecretsManagerV2 {
3462
3660
  * call to the service API.
3463
3661
  */
3464
3662
  downloaded?: boolean;
3465
- /** A v4 UUID identifier. */
3663
+ /** A UUID identifier. */
3466
3664
  id: string;
3467
3665
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3468
3666
  *
@@ -3475,7 +3673,7 @@ declare namespace SecretsManagerV2 {
3475
3673
  locks_total?: number;
3476
3674
  /** The human-readable name of your secret. */
3477
3675
  name?: string;
3478
- /** A v4 UUID identifier, or `default` secret group. */
3676
+ /** A UUID identifier, or `default` secret group. */
3479
3677
  secret_group_id: string;
3480
3678
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3481
3679
  * service_credentials, kv, and username_password.
@@ -3496,7 +3694,7 @@ declare namespace SecretsManagerV2 {
3496
3694
  /** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
3497
3695
  * certificate.
3498
3696
  */
3499
- signing_algorithm: string;
3697
+ signing_algorithm?: string;
3500
3698
  /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
3501
3699
  * SSL certificate.
3502
3700
  */
@@ -3506,21 +3704,23 @@ declare namespace SecretsManagerV2 {
3506
3704
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3507
3705
  * types: Arbitrary, username_password.
3508
3706
  */
3509
- expiration_date: string;
3707
+ expiration_date?: string;
3510
3708
  /** Indicates whether the certificate was imported with an associated intermediate certificate. */
3511
- intermediate_included: boolean;
3709
+ intermediate_included?: boolean;
3512
3710
  /** The distinguished name that identifies the entity that signed and issued the certificate. */
3513
- issuer: string;
3711
+ issuer?: string;
3514
3712
  /** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
3515
3713
  * certificate.
3516
3714
  */
3517
3715
  key_algorithm?: string;
3518
3716
  /** Indicates whether the certificate was imported with an associated private key. */
3519
- private_key_included: boolean;
3717
+ private_key_included?: boolean;
3520
3718
  /** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
3521
- serial_number: string;
3719
+ serial_number?: string;
3522
3720
  /** The date and time that the certificate validity period begins and ends. */
3523
- validity: CertificateValidity;
3721
+ validity?: CertificateValidity;
3722
+ /** The data specified to create the CSR and the private key. */
3723
+ managed_csr?: ImportedCertificateManagedCsrResponse;
3524
3724
  }
3525
3725
  namespace ImportedCertificateMetadata {
3526
3726
  namespace Constants {
@@ -3569,6 +3769,8 @@ declare namespace SecretsManagerV2 {
3569
3769
  labels?: string[];
3570
3770
  /** The secret metadata that a user can customize. */
3571
3771
  custom_metadata?: JsonObject;
3772
+ /** The data specified to create the CSR and the private key. */
3773
+ managed_csr?: ImportedCertificateManagedCsr;
3572
3774
  }
3573
3775
  /**
3574
3776
  * ImportedCertificatePrototype.
@@ -3589,7 +3791,7 @@ declare namespace SecretsManagerV2 {
3589
3791
  * secret group.
3590
3792
  */
3591
3793
  description?: string;
3592
- /** A v4 UUID identifier, or `default` secret group. */
3794
+ /** A UUID identifier, or `default` secret group. */
3593
3795
  secret_group_id?: string;
3594
3796
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3595
3797
  *
@@ -3599,7 +3801,7 @@ declare namespace SecretsManagerV2 {
3599
3801
  */
3600
3802
  labels?: string[];
3601
3803
  /** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
3602
- certificate: string;
3804
+ certificate?: string;
3603
3805
  /** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
3604
3806
  * formatted on a single line with embedded newline characters.
3605
3807
  */
@@ -3608,6 +3810,8 @@ declare namespace SecretsManagerV2 {
3608
3810
  * line with embedded newline characters.
3609
3811
  */
3610
3812
  private_key?: string;
3813
+ /** The data specified to create the CSR and the private key. */
3814
+ managed_csr?: ImportedCertificateManagedCsr;
3611
3815
  /** The secret metadata that a user can customize. */
3612
3816
  custom_metadata?: JsonObject;
3613
3817
  /** The secret version metadata that a user can customize. */
@@ -3642,7 +3846,7 @@ declare namespace SecretsManagerV2 {
3642
3846
  * call to the service API.
3643
3847
  */
3644
3848
  downloaded?: boolean;
3645
- /** A v4 UUID identifier. */
3849
+ /** A UUID identifier. */
3646
3850
  id: string;
3647
3851
  /** The human-readable name of your secret. */
3648
3852
  secret_name?: string;
@@ -3650,7 +3854,7 @@ declare namespace SecretsManagerV2 {
3650
3854
  * service_credentials, kv, and username_password.
3651
3855
  */
3652
3856
  secret_type: ImportedCertificateVersion.Constants.SecretType | string;
3653
- /** A v4 UUID identifier, or `default` secret group. */
3857
+ /** A UUID identifier, or `default` secret group. */
3654
3858
  secret_group_id: string;
3655
3859
  /** Indicates whether the secret payload is available in this secret version. */
3656
3860
  payload_available: boolean;
@@ -3660,7 +3864,7 @@ declare namespace SecretsManagerV2 {
3660
3864
  alias?: ImportedCertificateVersion.Constants.Alias | string;
3661
3865
  /** The secret version metadata that a user can customize. */
3662
3866
  version_custom_metadata?: JsonObject;
3663
- /** A v4 UUID identifier. */
3867
+ /** A UUID identifier. */
3664
3868
  secret_id: string;
3665
3869
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3666
3870
  * types: Arbitrary, username_password.
@@ -3671,7 +3875,7 @@ declare namespace SecretsManagerV2 {
3671
3875
  /** The date and time that the certificate validity period begins and ends. */
3672
3876
  validity: CertificateValidity;
3673
3877
  /** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
3674
- certificate: string;
3878
+ certificate?: string;
3675
3879
  /** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
3676
3880
  * formatted on a single line with embedded newline characters.
3677
3881
  */
@@ -3680,6 +3884,8 @@ declare namespace SecretsManagerV2 {
3680
3884
  * line with embedded newline characters.
3681
3885
  */
3682
3886
  private_key?: string;
3887
+ /** The certificate signing request. */
3888
+ csr?: string;
3683
3889
  }
3684
3890
  namespace ImportedCertificateVersion {
3685
3891
  namespace Constants {
@@ -3715,7 +3921,7 @@ declare namespace SecretsManagerV2 {
3715
3921
  * call to the service API.
3716
3922
  */
3717
3923
  downloaded?: boolean;
3718
- /** A v4 UUID identifier. */
3924
+ /** A UUID identifier. */
3719
3925
  id: string;
3720
3926
  /** The human-readable name of your secret. */
3721
3927
  secret_name?: string;
@@ -3723,7 +3929,7 @@ declare namespace SecretsManagerV2 {
3723
3929
  * service_credentials, kv, and username_password.
3724
3930
  */
3725
3931
  secret_type: ImportedCertificateVersionMetadata.Constants.SecretType | string;
3726
- /** A v4 UUID identifier, or `default` secret group. */
3932
+ /** A UUID identifier, or `default` secret group. */
3727
3933
  secret_group_id: string;
3728
3934
  /** Indicates whether the secret payload is available in this secret version. */
3729
3935
  payload_available: boolean;
@@ -3733,7 +3939,7 @@ declare namespace SecretsManagerV2 {
3733
3939
  alias?: ImportedCertificateVersionMetadata.Constants.Alias | string;
3734
3940
  /** The secret version metadata that a user can customize. */
3735
3941
  version_custom_metadata?: JsonObject;
3736
- /** A v4 UUID identifier. */
3942
+ /** A UUID identifier. */
3737
3943
  secret_id: string;
3738
3944
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
3739
3945
  * types: Arbitrary, username_password.
@@ -3805,7 +4011,7 @@ declare namespace SecretsManagerV2 {
3805
4011
  * call to the service API.
3806
4012
  */
3807
4013
  downloaded?: boolean;
3808
- /** A v4 UUID identifier. */
4014
+ /** A UUID identifier. */
3809
4015
  id: string;
3810
4016
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3811
4017
  *
@@ -3818,7 +4024,7 @@ declare namespace SecretsManagerV2 {
3818
4024
  locks_total?: number;
3819
4025
  /** The human-readable name of your secret. */
3820
4026
  name?: string;
3821
- /** A v4 UUID identifier, or `default` secret group. */
4027
+ /** A UUID identifier, or `default` secret group. */
3822
4028
  secret_group_id: string;
3823
4029
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3824
4030
  * service_credentials, kv, and username_password.
@@ -3884,7 +4090,7 @@ declare namespace SecretsManagerV2 {
3884
4090
  * call to the service API.
3885
4091
  */
3886
4092
  downloaded?: boolean;
3887
- /** A v4 UUID identifier. */
4093
+ /** A UUID identifier. */
3888
4094
  id: string;
3889
4095
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3890
4096
  *
@@ -3897,7 +4103,7 @@ declare namespace SecretsManagerV2 {
3897
4103
  locks_total?: number;
3898
4104
  /** The human-readable name of your secret. */
3899
4105
  name?: string;
3900
- /** A v4 UUID identifier, or `default` secret group. */
4106
+ /** A UUID identifier, or `default` secret group. */
3901
4107
  secret_group_id: string;
3902
4108
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
3903
4109
  * service_credentials, kv, and username_password.
@@ -3983,7 +4189,7 @@ declare namespace SecretsManagerV2 {
3983
4189
  * secret group.
3984
4190
  */
3985
4191
  description?: string;
3986
- /** A v4 UUID identifier, or `default` secret group. */
4192
+ /** A UUID identifier, or `default` secret group. */
3987
4193
  secret_group_id?: string;
3988
4194
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
3989
4195
  *
@@ -4028,7 +4234,7 @@ declare namespace SecretsManagerV2 {
4028
4234
  * call to the service API.
4029
4235
  */
4030
4236
  downloaded?: boolean;
4031
- /** A v4 UUID identifier. */
4237
+ /** A UUID identifier. */
4032
4238
  id: string;
4033
4239
  /** The human-readable name of your secret. */
4034
4240
  secret_name?: string;
@@ -4036,7 +4242,7 @@ declare namespace SecretsManagerV2 {
4036
4242
  * service_credentials, kv, and username_password.
4037
4243
  */
4038
4244
  secret_type: KVSecretVersion.Constants.SecretType | string;
4039
- /** A v4 UUID identifier, or `default` secret group. */
4245
+ /** A UUID identifier, or `default` secret group. */
4040
4246
  secret_group_id: string;
4041
4247
  /** Indicates whether the secret payload is available in this secret version. */
4042
4248
  payload_available: boolean;
@@ -4046,7 +4252,7 @@ declare namespace SecretsManagerV2 {
4046
4252
  alias?: KVSecretVersion.Constants.Alias | string;
4047
4253
  /** The secret version metadata that a user can customize. */
4048
4254
  version_custom_metadata?: JsonObject;
4049
- /** A v4 UUID identifier. */
4255
+ /** A UUID identifier. */
4050
4256
  secret_id: string;
4051
4257
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
4052
4258
  * types: Arbitrary, username_password.
@@ -4089,7 +4295,7 @@ declare namespace SecretsManagerV2 {
4089
4295
  * call to the service API.
4090
4296
  */
4091
4297
  downloaded?: boolean;
4092
- /** A v4 UUID identifier. */
4298
+ /** A UUID identifier. */
4093
4299
  id: string;
4094
4300
  /** The human-readable name of your secret. */
4095
4301
  secret_name?: string;
@@ -4097,7 +4303,7 @@ declare namespace SecretsManagerV2 {
4097
4303
  * service_credentials, kv, and username_password.
4098
4304
  */
4099
4305
  secret_type: KVSecretVersionMetadata.Constants.SecretType | string;
4100
- /** A v4 UUID identifier, or `default` secret group. */
4306
+ /** A UUID identifier, or `default` secret group. */
4101
4307
  secret_group_id: string;
4102
4308
  /** Indicates whether the secret payload is available in this secret version. */
4103
4309
  payload_available: boolean;
@@ -4107,7 +4313,7 @@ declare namespace SecretsManagerV2 {
4107
4313
  alias?: KVSecretVersionMetadata.Constants.Alias | string;
4108
4314
  /** The secret version metadata that a user can customize. */
4109
4315
  version_custom_metadata?: JsonObject;
4110
- /** A v4 UUID identifier. */
4316
+ /** A UUID identifier. */
4111
4317
  secret_id: string;
4112
4318
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
4113
4319
  * types: Arbitrary, username_password.
@@ -4167,7 +4373,7 @@ declare namespace SecretsManagerV2 {
4167
4373
  * call to the service API.
4168
4374
  */
4169
4375
  downloaded?: boolean;
4170
- /** A v4 UUID identifier. */
4376
+ /** A UUID identifier. */
4171
4377
  id: string;
4172
4378
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
4173
4379
  *
@@ -4180,7 +4386,7 @@ declare namespace SecretsManagerV2 {
4180
4386
  locks_total?: number;
4181
4387
  /** The human-readable name of your secret. */
4182
4388
  name?: string;
4183
- /** A v4 UUID identifier, or `default` secret group. */
4389
+ /** A UUID identifier, or `default` secret group. */
4184
4390
  secret_group_id: string;
4185
4391
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
4186
4392
  * service_credentials, kv, and username_password.
@@ -4423,7 +4629,7 @@ declare namespace SecretsManagerV2 {
4423
4629
  }
4424
4630
  }
4425
4631
  /**
4426
- * The request body to specify the properties of the action to rotate the private certificate configuration.
4632
+ * The request body to specify the properties of the action to rotate an intermediate CA certificate.
4427
4633
  */
4428
4634
  interface PrivateCertificateConfigurationActionRotatePrototype extends ConfigurationActionPrototype {
4429
4635
  /** The type of configuration action. */
@@ -6504,7 +6710,7 @@ declare namespace SecretsManagerV2 {
6504
6710
  * call to the service API.
6505
6711
  */
6506
6712
  downloaded?: boolean;
6507
- /** A v4 UUID identifier. */
6713
+ /** A UUID identifier. */
6508
6714
  id: string;
6509
6715
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
6510
6716
  *
@@ -6517,7 +6723,7 @@ declare namespace SecretsManagerV2 {
6517
6723
  locks_total?: number;
6518
6724
  /** The human-readable name of your secret. */
6519
6725
  name?: string;
6520
- /** A v4 UUID identifier, or `default` secret group. */
6726
+ /** A UUID identifier, or `default` secret group. */
6521
6727
  secret_group_id: string;
6522
6728
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
6523
6729
  * service_credentials, kv, and username_password.
@@ -6649,7 +6855,7 @@ declare namespace SecretsManagerV2 {
6649
6855
  * secret group.
6650
6856
  */
6651
6857
  description?: string;
6652
- /** A v4 UUID identifier, or `default` secret group. */
6858
+ /** A UUID identifier, or `default` secret group. */
6653
6859
  secret_group_id?: string;
6654
6860
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
6655
6861
  *
@@ -6744,7 +6950,7 @@ declare namespace SecretsManagerV2 {
6744
6950
  * call to the service API.
6745
6951
  */
6746
6952
  downloaded?: boolean;
6747
- /** A v4 UUID identifier. */
6953
+ /** A UUID identifier. */
6748
6954
  id: string;
6749
6955
  /** The human-readable name of your secret. */
6750
6956
  secret_name?: string;
@@ -6752,7 +6958,7 @@ declare namespace SecretsManagerV2 {
6752
6958
  * service_credentials, kv, and username_password.
6753
6959
  */
6754
6960
  secret_type: PrivateCertificateVersion.Constants.SecretType | string;
6755
- /** A v4 UUID identifier, or `default` secret group. */
6961
+ /** A UUID identifier, or `default` secret group. */
6756
6962
  secret_group_id: string;
6757
6963
  /** Indicates whether the secret payload is available in this secret version. */
6758
6964
  payload_available: boolean;
@@ -6762,7 +6968,7 @@ declare namespace SecretsManagerV2 {
6762
6968
  alias?: PrivateCertificateVersion.Constants.Alias | string;
6763
6969
  /** The secret version metadata that a user can customize. */
6764
6970
  version_custom_metadata?: JsonObject;
6765
- /** A v4 UUID identifier. */
6971
+ /** A UUID identifier. */
6766
6972
  secret_id: string;
6767
6973
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
6768
6974
  * types: Arbitrary, username_password.
@@ -6849,7 +7055,7 @@ declare namespace SecretsManagerV2 {
6849
7055
  * call to the service API.
6850
7056
  */
6851
7057
  downloaded?: boolean;
6852
- /** A v4 UUID identifier. */
7058
+ /** A UUID identifier. */
6853
7059
  id: string;
6854
7060
  /** The human-readable name of your secret. */
6855
7061
  secret_name?: string;
@@ -6857,7 +7063,7 @@ declare namespace SecretsManagerV2 {
6857
7063
  * service_credentials, kv, and username_password.
6858
7064
  */
6859
7065
  secret_type: PrivateCertificateVersionMetadata.Constants.SecretType | string;
6860
- /** A v4 UUID identifier, or `default` secret group. */
7066
+ /** A UUID identifier, or `default` secret group. */
6861
7067
  secret_group_id: string;
6862
7068
  /** Indicates whether the secret payload is available in this secret version. */
6863
7069
  payload_available: boolean;
@@ -6867,7 +7073,7 @@ declare namespace SecretsManagerV2 {
6867
7073
  alias?: PrivateCertificateVersionMetadata.Constants.Alias | string;
6868
7074
  /** The secret version metadata that a user can customize. */
6869
7075
  version_custom_metadata?: JsonObject;
6870
- /** A v4 UUID identifier. */
7076
+ /** A UUID identifier. */
6871
7077
  secret_id: string;
6872
7078
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
6873
7079
  * types: Arbitrary, username_password.
@@ -6931,7 +7137,7 @@ declare namespace SecretsManagerV2 {
6931
7137
  * call to the service API.
6932
7138
  */
6933
7139
  downloaded?: boolean;
6934
- /** A v4 UUID identifier. */
7140
+ /** A UUID identifier. */
6935
7141
  id: string;
6936
7142
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
6937
7143
  *
@@ -6944,7 +7150,7 @@ declare namespace SecretsManagerV2 {
6944
7150
  locks_total?: number;
6945
7151
  /** The human-readable name of your secret. */
6946
7152
  name?: string;
6947
- /** A v4 UUID identifier, or `default` secret group. */
7153
+ /** A UUID identifier, or `default` secret group. */
6948
7154
  secret_group_id: string;
6949
7155
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
6950
7156
  * service_credentials, kv, and username_password.
@@ -6971,7 +7177,7 @@ declare namespace SecretsManagerV2 {
6971
7177
  */
6972
7178
  alt_names?: string[];
6973
7179
  /** The Common Name (CN) represents the server name protected by the SSL certificate. */
6974
- common_name: string;
7180
+ common_name?: string;
6975
7181
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
6976
7182
  * types: Arbitrary, username_password.
6977
7183
  */
@@ -7640,7 +7846,7 @@ declare namespace SecretsManagerV2 {
7640
7846
  * call to the service API.
7641
7847
  */
7642
7848
  downloaded?: boolean;
7643
- /** A v4 UUID identifier. */
7849
+ /** A UUID identifier. */
7644
7850
  id: string;
7645
7851
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
7646
7852
  *
@@ -7653,7 +7859,7 @@ declare namespace SecretsManagerV2 {
7653
7859
  locks_total?: number;
7654
7860
  /** The human-readable name of your secret. */
7655
7861
  name?: string;
7656
- /** A v4 UUID identifier, or `default` secret group. */
7862
+ /** A UUID identifier, or `default` secret group. */
7657
7863
  secret_group_id: string;
7658
7864
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
7659
7865
  * service_credentials, kv, and username_password.
@@ -7680,7 +7886,7 @@ declare namespace SecretsManagerV2 {
7680
7886
  */
7681
7887
  alt_names?: string[];
7682
7888
  /** The Common Name (CN) represents the server name protected by the SSL certificate. */
7683
- common_name: string;
7889
+ common_name?: string;
7684
7890
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
7685
7891
  * types: Arbitrary, username_password.
7686
7892
  */
@@ -7783,7 +7989,7 @@ declare namespace SecretsManagerV2 {
7783
7989
  * secret group.
7784
7990
  */
7785
7991
  description?: string;
7786
- /** A v4 UUID identifier, or `default` secret group. */
7992
+ /** A UUID identifier, or `default` secret group. */
7787
7993
  secret_group_id?: string;
7788
7994
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
7789
7995
  *
@@ -7793,7 +7999,7 @@ declare namespace SecretsManagerV2 {
7793
7999
  */
7794
8000
  labels?: string[];
7795
8001
  /** The Common Name (CN) represents the server name protected by the SSL certificate. */
7796
- common_name: string;
8002
+ common_name?: string;
7797
8003
  /** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
7798
8004
  * SSL certificate.
7799
8005
  */
@@ -7873,7 +8079,7 @@ declare namespace SecretsManagerV2 {
7873
8079
  * call to the service API.
7874
8080
  */
7875
8081
  downloaded?: boolean;
7876
- /** A v4 UUID identifier. */
8082
+ /** A UUID identifier. */
7877
8083
  id: string;
7878
8084
  /** The human-readable name of your secret. */
7879
8085
  secret_name?: string;
@@ -7881,7 +8087,7 @@ declare namespace SecretsManagerV2 {
7881
8087
  * service_credentials, kv, and username_password.
7882
8088
  */
7883
8089
  secret_type: PublicCertificateVersion.Constants.SecretType | string;
7884
- /** A v4 UUID identifier, or `default` secret group. */
8090
+ /** A UUID identifier, or `default` secret group. */
7885
8091
  secret_group_id: string;
7886
8092
  /** Indicates whether the secret payload is available in this secret version. */
7887
8093
  payload_available: boolean;
@@ -7891,7 +8097,7 @@ declare namespace SecretsManagerV2 {
7891
8097
  alias?: PublicCertificateVersion.Constants.Alias | string;
7892
8098
  /** The secret version metadata that a user can customize. */
7893
8099
  version_custom_metadata?: JsonObject;
7894
- /** A v4 UUID identifier. */
8100
+ /** A UUID identifier. */
7895
8101
  secret_id: string;
7896
8102
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
7897
8103
  * types: Arbitrary, username_password.
@@ -7946,7 +8152,7 @@ declare namespace SecretsManagerV2 {
7946
8152
  * call to the service API.
7947
8153
  */
7948
8154
  downloaded?: boolean;
7949
- /** A v4 UUID identifier. */
8155
+ /** A UUID identifier. */
7950
8156
  id: string;
7951
8157
  /** The human-readable name of your secret. */
7952
8158
  secret_name?: string;
@@ -7954,7 +8160,7 @@ declare namespace SecretsManagerV2 {
7954
8160
  * service_credentials, kv, and username_password.
7955
8161
  */
7956
8162
  secret_type: PublicCertificateVersionMetadata.Constants.SecretType | string;
7957
- /** A v4 UUID identifier, or `default` secret group. */
8163
+ /** A UUID identifier, or `default` secret group. */
7958
8164
  secret_group_id: string;
7959
8165
  /** Indicates whether the secret payload is available in this secret version. */
7960
8166
  payload_available: boolean;
@@ -7964,7 +8170,7 @@ declare namespace SecretsManagerV2 {
7964
8170
  alias?: PublicCertificateVersionMetadata.Constants.Alias | string;
7965
8171
  /** The secret version metadata that a user can customize. */
7966
8172
  version_custom_metadata?: JsonObject;
7967
- /** A v4 UUID identifier. */
8173
+ /** A UUID identifier. */
7968
8174
  secret_id: string;
7969
8175
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
7970
8176
  * types: Arbitrary, username_password.
@@ -8028,7 +8234,7 @@ declare namespace SecretsManagerV2 {
8028
8234
  * call to the service API.
8029
8235
  */
8030
8236
  downloaded?: boolean;
8031
- /** A v4 UUID identifier. */
8237
+ /** A UUID identifier. */
8032
8238
  id: string;
8033
8239
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8034
8240
  *
@@ -8041,7 +8247,7 @@ declare namespace SecretsManagerV2 {
8041
8247
  locks_total?: number;
8042
8248
  /** The human-readable name of your secret. */
8043
8249
  name?: string;
8044
- /** A v4 UUID identifier, or `default` secret group. */
8250
+ /** A UUID identifier, or `default` secret group. */
8045
8251
  secret_group_id: string;
8046
8252
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8047
8253
  * service_credentials, kv, and username_password.
@@ -8132,7 +8338,7 @@ declare namespace SecretsManagerV2 {
8132
8338
  * call to the service API.
8133
8339
  */
8134
8340
  downloaded?: boolean;
8135
- /** A v4 UUID identifier. */
8341
+ /** A UUID identifier. */
8136
8342
  id: string;
8137
8343
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8138
8344
  *
@@ -8145,7 +8351,7 @@ declare namespace SecretsManagerV2 {
8145
8351
  locks_total?: number;
8146
8352
  /** The human-readable name of your secret. */
8147
8353
  name?: string;
8148
- /** A v4 UUID identifier, or `default` secret group. */
8354
+ /** A UUID identifier, or `default` secret group. */
8149
8355
  secret_group_id: string;
8150
8356
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8151
8357
  * service_credentials, kv, and username_password.
@@ -8278,7 +8484,7 @@ declare namespace SecretsManagerV2 {
8278
8484
  * username_password, private_cert, public_cert, iam_credentials.
8279
8485
  */
8280
8486
  rotation?: RotationPolicy;
8281
- /** A v4 UUID identifier, or `default` secret group. */
8487
+ /** A UUID identifier, or `default` secret group. */
8282
8488
  secret_group_id?: string;
8283
8489
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8284
8490
  * service_credentials, kv, and username_password.
@@ -8329,7 +8535,7 @@ declare namespace SecretsManagerV2 {
8329
8535
  * call to the service API.
8330
8536
  */
8331
8537
  downloaded?: boolean;
8332
- /** A v4 UUID identifier. */
8538
+ /** A UUID identifier. */
8333
8539
  id: string;
8334
8540
  /** The human-readable name of your secret. */
8335
8541
  secret_name?: string;
@@ -8337,7 +8543,7 @@ declare namespace SecretsManagerV2 {
8337
8543
  * service_credentials, kv, and username_password.
8338
8544
  */
8339
8545
  secret_type: ServiceCredentialsSecretVersion.Constants.SecretType | string;
8340
- /** A v4 UUID identifier, or `default` secret group. */
8546
+ /** A UUID identifier, or `default` secret group. */
8341
8547
  secret_group_id: string;
8342
8548
  /** Indicates whether the secret payload is available in this secret version. */
8343
8549
  payload_available: boolean;
@@ -8347,7 +8553,7 @@ declare namespace SecretsManagerV2 {
8347
8553
  alias?: ServiceCredentialsSecretVersion.Constants.Alias | string;
8348
8554
  /** The secret version metadata that a user can customize. */
8349
8555
  version_custom_metadata?: JsonObject;
8350
- /** A v4 UUID identifier. */
8556
+ /** A UUID identifier. */
8351
8557
  secret_id: string;
8352
8558
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8353
8559
  * types: Arbitrary, username_password.
@@ -8392,7 +8598,7 @@ declare namespace SecretsManagerV2 {
8392
8598
  * call to the service API.
8393
8599
  */
8394
8600
  downloaded?: boolean;
8395
- /** A v4 UUID identifier. */
8601
+ /** A UUID identifier. */
8396
8602
  id: string;
8397
8603
  /** The human-readable name of your secret. */
8398
8604
  secret_name?: string;
@@ -8400,7 +8606,7 @@ declare namespace SecretsManagerV2 {
8400
8606
  * service_credentials, kv, and username_password.
8401
8607
  */
8402
8608
  secret_type: ServiceCredentialsSecretVersionMetadata.Constants.SecretType | string;
8403
- /** A v4 UUID identifier, or `default` secret group. */
8609
+ /** A UUID identifier, or `default` secret group. */
8404
8610
  secret_group_id: string;
8405
8611
  /** Indicates whether the secret payload is available in this secret version. */
8406
8612
  payload_available: boolean;
@@ -8410,7 +8616,7 @@ declare namespace SecretsManagerV2 {
8410
8616
  alias?: ServiceCredentialsSecretVersionMetadata.Constants.Alias | string;
8411
8617
  /** The secret version metadata that a user can customize. */
8412
8618
  version_custom_metadata?: JsonObject;
8413
- /** A v4 UUID identifier. */
8619
+ /** A UUID identifier. */
8414
8620
  secret_id: string;
8415
8621
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8416
8622
  * types: Arbitrary, username_password.
@@ -8470,7 +8676,7 @@ declare namespace SecretsManagerV2 {
8470
8676
  * call to the service API.
8471
8677
  */
8472
8678
  downloaded?: boolean;
8473
- /** A v4 UUID identifier. */
8679
+ /** A UUID identifier. */
8474
8680
  id: string;
8475
8681
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8476
8682
  *
@@ -8483,7 +8689,7 @@ declare namespace SecretsManagerV2 {
8483
8689
  locks_total?: number;
8484
8690
  /** The human-readable name of your secret. */
8485
8691
  name?: string;
8486
- /** A v4 UUID identifier, or `default` secret group. */
8692
+ /** A UUID identifier, or `default` secret group. */
8487
8693
  secret_group_id: string;
8488
8694
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8489
8695
  * service_credentials, kv, and username_password.
@@ -8567,7 +8773,7 @@ declare namespace SecretsManagerV2 {
8567
8773
  * call to the service API.
8568
8774
  */
8569
8775
  downloaded?: boolean;
8570
- /** A v4 UUID identifier. */
8776
+ /** A UUID identifier. */
8571
8777
  id: string;
8572
8778
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8573
8779
  *
@@ -8580,7 +8786,7 @@ declare namespace SecretsManagerV2 {
8580
8786
  locks_total?: number;
8581
8787
  /** The human-readable name of your secret. */
8582
8788
  name?: string;
8583
- /** A v4 UUID identifier, or `default` secret group. */
8789
+ /** A UUID identifier, or `default` secret group. */
8584
8790
  secret_group_id: string;
8585
8791
  /** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
8586
8792
  * service_credentials, kv, and username_password.
@@ -8694,7 +8900,7 @@ declare namespace SecretsManagerV2 {
8694
8900
  * secret group.
8695
8901
  */
8696
8902
  description?: string;
8697
- /** A v4 UUID identifier, or `default` secret group. */
8903
+ /** A UUID identifier, or `default` secret group. */
8698
8904
  secret_group_id?: string;
8699
8905
  /** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
8700
8906
  *
@@ -8753,7 +8959,7 @@ declare namespace SecretsManagerV2 {
8753
8959
  * call to the service API.
8754
8960
  */
8755
8961
  downloaded?: boolean;
8756
- /** A v4 UUID identifier. */
8962
+ /** A UUID identifier. */
8757
8963
  id: string;
8758
8964
  /** The human-readable name of your secret. */
8759
8965
  secret_name?: string;
@@ -8761,7 +8967,7 @@ declare namespace SecretsManagerV2 {
8761
8967
  * service_credentials, kv, and username_password.
8762
8968
  */
8763
8969
  secret_type: UsernamePasswordSecretVersion.Constants.SecretType | string;
8764
- /** A v4 UUID identifier, or `default` secret group. */
8970
+ /** A UUID identifier, or `default` secret group. */
8765
8971
  secret_group_id: string;
8766
8972
  /** Indicates whether the secret payload is available in this secret version. */
8767
8973
  payload_available: boolean;
@@ -8771,7 +8977,7 @@ declare namespace SecretsManagerV2 {
8771
8977
  alias?: UsernamePasswordSecretVersion.Constants.Alias | string;
8772
8978
  /** The secret version metadata that a user can customize. */
8773
8979
  version_custom_metadata?: JsonObject;
8774
- /** A v4 UUID identifier. */
8980
+ /** A UUID identifier. */
8775
8981
  secret_id: string;
8776
8982
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8777
8983
  * types: Arbitrary, username_password.
@@ -8816,7 +9022,7 @@ declare namespace SecretsManagerV2 {
8816
9022
  * call to the service API.
8817
9023
  */
8818
9024
  downloaded?: boolean;
8819
- /** A v4 UUID identifier. */
9025
+ /** A UUID identifier. */
8820
9026
  id: string;
8821
9027
  /** The human-readable name of your secret. */
8822
9028
  secret_name?: string;
@@ -8824,7 +9030,7 @@ declare namespace SecretsManagerV2 {
8824
9030
  * service_credentials, kv, and username_password.
8825
9031
  */
8826
9032
  secret_type: UsernamePasswordSecretVersionMetadata.Constants.SecretType | string;
8827
- /** A v4 UUID identifier, or `default` secret group. */
9033
+ /** A UUID identifier, or `default` secret group. */
8828
9034
  secret_group_id: string;
8829
9035
  /** Indicates whether the secret payload is available in this secret version. */
8830
9036
  payload_available: boolean;
@@ -8834,7 +9040,7 @@ declare namespace SecretsManagerV2 {
8834
9040
  alias?: UsernamePasswordSecretVersionMetadata.Constants.Alias | string;
8835
9041
  /** The secret version metadata that a user can customize. */
8836
9042
  version_custom_metadata?: JsonObject;
8837
- /** A v4 UUID identifier. */
9043
+ /** A UUID identifier. */
8838
9044
  secret_id: string;
8839
9045
  /** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
8840
9046
  * types: Arbitrary, username_password.