@ibm-cloud/secrets-manager 2.0.8 → 2.0.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +2 -0
- package/README.md +0 -1
- package/examples/secrets-manager.v2.test.js +1211 -1211
- package/package.json +2 -2
- package/secrets-manager/v2.d.ts +383 -177
- package/secrets-manager/v2.js +94 -68
- package/secrets-manager/v2.js.map +1 -1
package/secrets-manager/v2.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* (C) Copyright IBM Corp.
|
|
2
|
+
* (C) Copyright IBM Corp. 2025.
|
|
3
3
|
*
|
|
4
4
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
5
5
|
* you may not use this file except in compliance with the License.
|
|
@@ -106,7 +106,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
106
106
|
* Get the properties of an existing secret group by specifying the ID of the group.
|
|
107
107
|
*
|
|
108
108
|
* @param {Object} params - The parameters to send to the service.
|
|
109
|
-
* @param {string} params.id - The
|
|
109
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret group.
|
|
110
110
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
111
111
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretGroup>>}
|
|
112
112
|
*/
|
|
@@ -117,7 +117,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
117
117
|
* Update the properties of an existing secret group, such as its name or description.
|
|
118
118
|
*
|
|
119
119
|
* @param {Object} params - The parameters to send to the service.
|
|
120
|
-
* @param {string} params.id - The
|
|
120
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret group.
|
|
121
121
|
* @param {string} [params.name] - The name of your secret group.
|
|
122
122
|
* @param {string} [params.description] - An extended description of your secret group.
|
|
123
123
|
*
|
|
@@ -136,7 +136,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
136
136
|
* you must first delete the secrets that are associated with the group.
|
|
137
137
|
*
|
|
138
138
|
* @param {Object} params - The parameters to send to the service.
|
|
139
|
-
* @param {string} params.id - The
|
|
139
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret group.
|
|
140
140
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
141
141
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
|
|
142
142
|
*/
|
|
@@ -226,7 +226,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
226
226
|
* view only the details of a specified secret without retrieving its value, use the Get secret metadata operation.
|
|
227
227
|
*
|
|
228
228
|
* @param {Object} params - The parameters to send to the service.
|
|
229
|
-
* @param {string} params.id - The
|
|
229
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
230
230
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
231
231
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.Secret>>}
|
|
232
232
|
*/
|
|
@@ -237,7 +237,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
237
237
|
* Delete a secret by specifying the ID of the secret.
|
|
238
238
|
*
|
|
239
239
|
* @param {Object} params - The parameters to send to the service.
|
|
240
|
-
* @param {string} params.id - The
|
|
240
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
241
241
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
242
242
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
|
|
243
243
|
*/
|
|
@@ -248,7 +248,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
248
248
|
* Get the metadata of a secret by specifying the ID of the secret.
|
|
249
249
|
*
|
|
250
250
|
* @param {Object} params - The parameters to send to the service.
|
|
251
|
-
* @param {string} params.id - The
|
|
251
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
252
252
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
253
253
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
|
|
254
254
|
*/
|
|
@@ -259,7 +259,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
259
259
|
* Update the metadata of a secret, such as its name or description.
|
|
260
260
|
*
|
|
261
261
|
* @param {Object} params - The parameters to send to the service.
|
|
262
|
-
* @param {string} params.id - The
|
|
262
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
263
263
|
* @param {SecretMetadataPatch} params.secretMetadataPatch -
|
|
264
264
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
265
265
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretMetadata>>}
|
|
@@ -271,7 +271,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
271
271
|
* Create a secret action. This operation supports the following actions:.
|
|
272
272
|
*
|
|
273
273
|
* @param {Object} params - The parameters to send to the service.
|
|
274
|
-
* @param {string} params.id - The
|
|
274
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
275
275
|
* @param {SecretActionPrototype} params.secretActionPrototype -
|
|
276
276
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
277
277
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretAction>>}
|
|
@@ -304,7 +304,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
304
304
|
* Create a new secret version.
|
|
305
305
|
*
|
|
306
306
|
* @param {Object} params - The parameters to send to the service.
|
|
307
|
-
* @param {string} params.secretId - The
|
|
307
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
308
308
|
* @param {SecretVersionPrototype} params.secretVersionPrototype -
|
|
309
309
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
310
310
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
|
|
@@ -318,7 +318,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
318
318
|
* A successful request returns the list of versions of a secret, along with the metadata of each version.
|
|
319
319
|
*
|
|
320
320
|
* @param {Object} params - The parameters to send to the service.
|
|
321
|
-
* @param {string} params.secretId - The
|
|
321
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
322
322
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
323
323
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadataCollection>>}
|
|
324
324
|
*/
|
|
@@ -333,8 +333,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
333
333
|
* with other metadata.
|
|
334
334
|
*
|
|
335
335
|
* @param {Object} params - The parameters to send to the service.
|
|
336
|
-
* @param {string} params.secretId - The
|
|
337
|
-
* @param {string} params.id - The
|
|
336
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
337
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
338
338
|
* `previous` aliases to refer to the current or previous secret version.
|
|
339
339
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
340
340
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersion>>}
|
|
@@ -348,8 +348,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
348
348
|
* This operation is available for secret type: iam_credentials current version.
|
|
349
349
|
*
|
|
350
350
|
* @param {Object} params - The parameters to send to the service.
|
|
351
|
-
* @param {string} params.secretId - The
|
|
352
|
-
* @param {string} params.id - The
|
|
351
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
352
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
353
353
|
* `previous` aliases to refer to the current or previous secret version.
|
|
354
354
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
355
355
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.EmptyObject>>}
|
|
@@ -364,8 +364,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
364
364
|
* A successful request returns the metadata that is associated with the specified version of your secret.
|
|
365
365
|
*
|
|
366
366
|
* @param {Object} params - The parameters to send to the service.
|
|
367
|
-
* @param {string} params.secretId - The
|
|
368
|
-
* @param {string} params.id - The
|
|
367
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
368
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
369
369
|
* `previous` aliases to refer to the current or previous secret version.
|
|
370
370
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
371
371
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretVersionMetadata>>}
|
|
@@ -377,8 +377,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
377
377
|
* Update the custom metadata of a secret version.
|
|
378
378
|
*
|
|
379
379
|
* @param {Object} params - The parameters to send to the service.
|
|
380
|
-
* @param {string} params.secretId - The
|
|
381
|
-
* @param {string} params.id - The
|
|
380
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
381
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
382
382
|
* `previous` aliases to refer to the current or previous secret version.
|
|
383
383
|
* @param {JsonObject} [params.versionCustomMetadata] - The secret version metadata that a user can customize.
|
|
384
384
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
@@ -393,8 +393,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
393
393
|
* - `private_cert_action_revoke_certificate`: Revoke a version of a private certificate.
|
|
394
394
|
*
|
|
395
395
|
* @param {Object} params - The parameters to send to the service.
|
|
396
|
-
* @param {string} params.secretId - The
|
|
397
|
-
* @param {string} params.id - The
|
|
396
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
397
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
398
398
|
* `previous` aliases to refer to the current or previous secret version.
|
|
399
399
|
* @param {SecretVersionActionPrototype} params.secretVersionActionPrototype -
|
|
400
400
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
@@ -442,7 +442,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
442
442
|
* List the locks that are associated with a specified secret.
|
|
443
443
|
*
|
|
444
444
|
* @param {Object} params - The parameters to send to the service.
|
|
445
|
-
* @param {string} params.id - The
|
|
445
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
446
446
|
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
447
447
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
448
448
|
*
|
|
@@ -485,7 +485,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
485
485
|
* the data of the previous secret version if it doesn't have any locks.
|
|
486
486
|
*
|
|
487
487
|
* @param {Object} params - The parameters to send to the service.
|
|
488
|
-
* @param {string} params.id - The
|
|
488
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
489
489
|
* @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
|
|
490
490
|
* @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
|
|
491
491
|
* modes to clear any matching locks on a secret version.
|
|
@@ -510,7 +510,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
510
510
|
* of your secret.
|
|
511
511
|
*
|
|
512
512
|
* @param {Object} params - The parameters to send to the service.
|
|
513
|
-
* @param {string} params.id - The
|
|
513
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret.
|
|
514
514
|
* @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
|
|
515
515
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
516
516
|
* @returns {Promise<SecretsManagerV2.Response<SecretsManagerV2.SecretLocks>>}
|
|
@@ -522,8 +522,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
522
522
|
* List the locks that are associated with a specified secret version.
|
|
523
523
|
*
|
|
524
524
|
* @param {Object} params - The parameters to send to the service.
|
|
525
|
-
* @param {string} params.secretId - The
|
|
526
|
-
* @param {string} params.id - The
|
|
525
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
526
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
527
527
|
* `previous` aliases to refer to the current or previous secret version.
|
|
528
528
|
* @param {number} [params.offset] - The number of locks to skip. By specifying `offset`, you retrieve a subset of
|
|
529
529
|
* items that starts with the `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
@@ -567,8 +567,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
567
567
|
* the data of the previous secret version if it doesn't have any locks.
|
|
568
568
|
*
|
|
569
569
|
* @param {Object} params - The parameters to send to the service.
|
|
570
|
-
* @param {string} params.secretId - The
|
|
571
|
-
* @param {string} params.id - The
|
|
570
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
571
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
572
572
|
* `previous` aliases to refer to the current or previous secret version.
|
|
573
573
|
* @param {SecretLockPrototype[]} params.locks - The locks data to be attached to a secret version.
|
|
574
574
|
* @param {string} [params.mode] - An optional lock mode. When you create a lock, you can set one of the following
|
|
@@ -594,8 +594,8 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
594
594
|
* of your secret.
|
|
595
595
|
*
|
|
596
596
|
* @param {Object} params - The parameters to send to the service.
|
|
597
|
-
* @param {string} params.secretId - The
|
|
598
|
-
* @param {string} params.id - The
|
|
597
|
+
* @param {string} params.secretId - The UUID that uniquely identifies your secret.
|
|
598
|
+
* @param {string} params.id - The UUID that uniquely identifies your secret version. You can use the `current` or
|
|
599
599
|
* `previous` aliases to refer to the current or previous secret version.
|
|
600
600
|
* @param {string[]} [params.name] - Specify the names of the secret locks to be deleted.
|
|
601
601
|
* @param {OutgoingHttpHeaders} [params.headers] - Custom request headers
|
|
@@ -839,13 +839,13 @@ declare namespace SecretsManagerV2 {
|
|
|
839
839
|
}
|
|
840
840
|
/** Parameters for the `getSecretGroup` operation. */
|
|
841
841
|
interface GetSecretGroupParams {
|
|
842
|
-
/** The
|
|
842
|
+
/** The UUID that uniquely identifies your secret group. */
|
|
843
843
|
id: string;
|
|
844
844
|
headers?: OutgoingHttpHeaders;
|
|
845
845
|
}
|
|
846
846
|
/** Parameters for the `updateSecretGroup` operation. */
|
|
847
847
|
interface UpdateSecretGroupParams {
|
|
848
|
-
/** The
|
|
848
|
+
/** The UUID that uniquely identifies your secret group. */
|
|
849
849
|
id: string;
|
|
850
850
|
/** The name of your secret group. */
|
|
851
851
|
name?: string;
|
|
@@ -859,7 +859,7 @@ declare namespace SecretsManagerV2 {
|
|
|
859
859
|
}
|
|
860
860
|
/** Parameters for the `deleteSecretGroup` operation. */
|
|
861
861
|
interface DeleteSecretGroupParams {
|
|
862
|
-
/** The
|
|
862
|
+
/** The UUID that uniquely identifies your secret group. */
|
|
863
863
|
id: string;
|
|
864
864
|
headers?: OutgoingHttpHeaders;
|
|
865
865
|
}
|
|
@@ -946,32 +946,32 @@ declare namespace SecretsManagerV2 {
|
|
|
946
946
|
}
|
|
947
947
|
/** Parameters for the `getSecret` operation. */
|
|
948
948
|
interface GetSecretParams {
|
|
949
|
-
/** The
|
|
949
|
+
/** The UUID that uniquely identifies your secret. */
|
|
950
950
|
id: string;
|
|
951
951
|
headers?: OutgoingHttpHeaders;
|
|
952
952
|
}
|
|
953
953
|
/** Parameters for the `deleteSecret` operation. */
|
|
954
954
|
interface DeleteSecretParams {
|
|
955
|
-
/** The
|
|
955
|
+
/** The UUID that uniquely identifies your secret. */
|
|
956
956
|
id: string;
|
|
957
957
|
headers?: OutgoingHttpHeaders;
|
|
958
958
|
}
|
|
959
959
|
/** Parameters for the `getSecretMetadata` operation. */
|
|
960
960
|
interface GetSecretMetadataParams {
|
|
961
|
-
/** The
|
|
961
|
+
/** The UUID that uniquely identifies your secret. */
|
|
962
962
|
id: string;
|
|
963
963
|
headers?: OutgoingHttpHeaders;
|
|
964
964
|
}
|
|
965
965
|
/** Parameters for the `updateSecretMetadata` operation. */
|
|
966
966
|
interface UpdateSecretMetadataParams {
|
|
967
|
-
/** The
|
|
967
|
+
/** The UUID that uniquely identifies your secret. */
|
|
968
968
|
id: string;
|
|
969
969
|
secretMetadataPatch: SecretMetadataPatch;
|
|
970
970
|
headers?: OutgoingHttpHeaders;
|
|
971
971
|
}
|
|
972
972
|
/** Parameters for the `createSecretAction` operation. */
|
|
973
973
|
interface CreateSecretActionParams {
|
|
974
|
-
/** The
|
|
974
|
+
/** The UUID that uniquely identifies your secret. */
|
|
975
975
|
id: string;
|
|
976
976
|
secretActionPrototype: SecretActionPrototype;
|
|
977
977
|
headers?: OutgoingHttpHeaders;
|
|
@@ -1006,22 +1006,22 @@ declare namespace SecretsManagerV2 {
|
|
|
1006
1006
|
}
|
|
1007
1007
|
/** Parameters for the `createSecretVersion` operation. */
|
|
1008
1008
|
interface CreateSecretVersionParams {
|
|
1009
|
-
/** The
|
|
1009
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1010
1010
|
secretId: string;
|
|
1011
1011
|
secretVersionPrototype: SecretVersionPrototype;
|
|
1012
1012
|
headers?: OutgoingHttpHeaders;
|
|
1013
1013
|
}
|
|
1014
1014
|
/** Parameters for the `listSecretVersions` operation. */
|
|
1015
1015
|
interface ListSecretVersionsParams {
|
|
1016
|
-
/** The
|
|
1016
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1017
1017
|
secretId: string;
|
|
1018
1018
|
headers?: OutgoingHttpHeaders;
|
|
1019
1019
|
}
|
|
1020
1020
|
/** Parameters for the `getSecretVersion` operation. */
|
|
1021
1021
|
interface GetSecretVersionParams {
|
|
1022
|
-
/** The
|
|
1022
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1023
1023
|
secretId: string;
|
|
1024
|
-
/** The
|
|
1024
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1025
1025
|
* refer to the current or previous secret version.
|
|
1026
1026
|
*/
|
|
1027
1027
|
id: string;
|
|
@@ -1029,9 +1029,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1029
1029
|
}
|
|
1030
1030
|
/** Parameters for the `deleteSecretVersionData` operation. */
|
|
1031
1031
|
interface DeleteSecretVersionDataParams {
|
|
1032
|
-
/** The
|
|
1032
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1033
1033
|
secretId: string;
|
|
1034
|
-
/** The
|
|
1034
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1035
1035
|
* refer to the current or previous secret version.
|
|
1036
1036
|
*/
|
|
1037
1037
|
id: string;
|
|
@@ -1039,9 +1039,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1039
1039
|
}
|
|
1040
1040
|
/** Parameters for the `getSecretVersionMetadata` operation. */
|
|
1041
1041
|
interface GetSecretVersionMetadataParams {
|
|
1042
|
-
/** The
|
|
1042
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1043
1043
|
secretId: string;
|
|
1044
|
-
/** The
|
|
1044
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1045
1045
|
* refer to the current or previous secret version.
|
|
1046
1046
|
*/
|
|
1047
1047
|
id: string;
|
|
@@ -1049,9 +1049,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1049
1049
|
}
|
|
1050
1050
|
/** Parameters for the `updateSecretVersionMetadata` operation. */
|
|
1051
1051
|
interface UpdateSecretVersionMetadataParams {
|
|
1052
|
-
/** The
|
|
1052
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1053
1053
|
secretId: string;
|
|
1054
|
-
/** The
|
|
1054
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1055
1055
|
* refer to the current or previous secret version.
|
|
1056
1056
|
*/
|
|
1057
1057
|
id: string;
|
|
@@ -1061,9 +1061,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1061
1061
|
}
|
|
1062
1062
|
/** Parameters for the `createSecretVersionAction` operation. */
|
|
1063
1063
|
interface CreateSecretVersionActionParams {
|
|
1064
|
-
/** The
|
|
1064
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1065
1065
|
secretId: string;
|
|
1066
|
-
/** The
|
|
1066
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1067
1067
|
* refer to the current or previous secret version.
|
|
1068
1068
|
*/
|
|
1069
1069
|
id: string;
|
|
@@ -1106,7 +1106,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1106
1106
|
}
|
|
1107
1107
|
/** Parameters for the `listSecretLocks` operation. */
|
|
1108
1108
|
interface ListSecretLocksParams {
|
|
1109
|
-
/** The
|
|
1109
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1110
1110
|
id: string;
|
|
1111
1111
|
/** The number of locks to skip. By specifying `offset`, you retrieve a subset of items that starts with the
|
|
1112
1112
|
* `offset` value. Use `offset` with `limit` to page through your available resources.
|
|
@@ -1141,7 +1141,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1141
1141
|
}
|
|
1142
1142
|
/** Parameters for the `createSecretLocksBulk` operation. */
|
|
1143
1143
|
interface CreateSecretLocksBulkParams {
|
|
1144
|
-
/** The
|
|
1144
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1145
1145
|
id: string;
|
|
1146
1146
|
/** The locks data to be attached to a secret version. */
|
|
1147
1147
|
locks: SecretLockPrototype[];
|
|
@@ -1164,7 +1164,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1164
1164
|
}
|
|
1165
1165
|
/** Parameters for the `deleteSecretLocksBulk` operation. */
|
|
1166
1166
|
interface DeleteSecretLocksBulkParams {
|
|
1167
|
-
/** The
|
|
1167
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1168
1168
|
id: string;
|
|
1169
1169
|
/** Specify the names of the secret locks to be deleted. */
|
|
1170
1170
|
name?: string[];
|
|
@@ -1172,9 +1172,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1172
1172
|
}
|
|
1173
1173
|
/** Parameters for the `listSecretVersionLocks` operation. */
|
|
1174
1174
|
interface ListSecretVersionLocksParams {
|
|
1175
|
-
/** The
|
|
1175
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1176
1176
|
secretId: string;
|
|
1177
|
-
/** The
|
|
1177
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1178
1178
|
* refer to the current or previous secret version.
|
|
1179
1179
|
*/
|
|
1180
1180
|
id: string;
|
|
@@ -1211,9 +1211,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1211
1211
|
}
|
|
1212
1212
|
/** Parameters for the `createSecretVersionLocksBulk` operation. */
|
|
1213
1213
|
interface CreateSecretVersionLocksBulkParams {
|
|
1214
|
-
/** The
|
|
1214
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1215
1215
|
secretId: string;
|
|
1216
|
-
/** The
|
|
1216
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1217
1217
|
* refer to the current or previous secret version.
|
|
1218
1218
|
*/
|
|
1219
1219
|
id: string;
|
|
@@ -1238,9 +1238,9 @@ declare namespace SecretsManagerV2 {
|
|
|
1238
1238
|
}
|
|
1239
1239
|
/** Parameters for the `deleteSecretVersionLocksBulk` operation. */
|
|
1240
1240
|
interface DeleteSecretVersionLocksBulkParams {
|
|
1241
|
-
/** The
|
|
1241
|
+
/** The UUID that uniquely identifies your secret. */
|
|
1242
1242
|
secretId: string;
|
|
1243
|
-
/** The
|
|
1243
|
+
/** The UUID that uniquely identifies your secret version. You can use the `current` or `previous` aliases to
|
|
1244
1244
|
* refer to the current or previous secret version.
|
|
1245
1245
|
*/
|
|
1246
1246
|
id: string;
|
|
@@ -1536,6 +1536,200 @@ declare namespace SecretsManagerV2 {
|
|
|
1536
1536
|
*/
|
|
1537
1537
|
interface ConfigurationPrototype {
|
|
1538
1538
|
}
|
|
1539
|
+
/**
|
|
1540
|
+
* The data specified to create the CSR and the private key.
|
|
1541
|
+
*/
|
|
1542
|
+
interface ImportedCertificateManagedCsr {
|
|
1543
|
+
/** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
|
|
1544
|
+
ou?: string[];
|
|
1545
|
+
/** The Organization (O) values to define in the subject field of the resulting certificate. */
|
|
1546
|
+
organization?: string[];
|
|
1547
|
+
/** The Country (C) values to define in the subject field of the resulting certificate. */
|
|
1548
|
+
country?: string[];
|
|
1549
|
+
/** The Locality (L) values to define in the subject field of the resulting certificate. */
|
|
1550
|
+
locality?: string[];
|
|
1551
|
+
/** The Province (ST) values to define in the subject field of the resulting certificate. */
|
|
1552
|
+
province?: string[];
|
|
1553
|
+
/** The street address values to define in the subject field of the resulting certificate. */
|
|
1554
|
+
street_address?: string[];
|
|
1555
|
+
/** The postal code values to define in the subject field of the resulting certificate. */
|
|
1556
|
+
postal_code?: string[];
|
|
1557
|
+
/** If set to false, makes the common_name field optional while generating a certificate. */
|
|
1558
|
+
require_cn?: boolean;
|
|
1559
|
+
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
1560
|
+
common_name?: string;
|
|
1561
|
+
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
1562
|
+
* SSL certificate.
|
|
1563
|
+
*/
|
|
1564
|
+
alt_names?: string;
|
|
1565
|
+
/** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1566
|
+
ip_sans?: string;
|
|
1567
|
+
/** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1568
|
+
uri_sans?: string;
|
|
1569
|
+
/** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
|
|
1570
|
+
* in a comma-delimited list.
|
|
1571
|
+
*
|
|
1572
|
+
* The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
|
|
1573
|
+
*/
|
|
1574
|
+
other_sans?: string;
|
|
1575
|
+
/** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
|
|
1576
|
+
*
|
|
1577
|
+
* If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
|
|
1578
|
+
* useful if the common name is a human-readable identifier, instead of a hostname or an email address.
|
|
1579
|
+
*/
|
|
1580
|
+
exclude_cn_from_sans?: boolean;
|
|
1581
|
+
/** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
|
|
1582
|
+
* signed certificate.
|
|
1583
|
+
*/
|
|
1584
|
+
user_ids?: string;
|
|
1585
|
+
/** This field indicates whether certificate is flagged for server use. */
|
|
1586
|
+
server_flag?: boolean;
|
|
1587
|
+
/** This field indicates whether certificate is flagged for client use. */
|
|
1588
|
+
client_flag?: boolean;
|
|
1589
|
+
/** This field indicates whether certificate is flagged for code signing use. */
|
|
1590
|
+
code_signing_flag?: boolean;
|
|
1591
|
+
/** This field indicates whether certificate is flagged for email protection use. */
|
|
1592
|
+
email_protection_flag?: boolean;
|
|
1593
|
+
/** The type of private key to generate. */
|
|
1594
|
+
key_type?: ImportedCertificateManagedCsr.Constants.KeyType | string;
|
|
1595
|
+
/** The number of bits to use to generate the private key.
|
|
1596
|
+
*
|
|
1597
|
+
* Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
|
|
1598
|
+
* `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
|
|
1599
|
+
* ed25519 keys.
|
|
1600
|
+
*/
|
|
1601
|
+
key_bits?: number;
|
|
1602
|
+
/** The allowed key usage constraint to define for certificate, in a comma-delimited list.
|
|
1603
|
+
*
|
|
1604
|
+
* You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
|
|
1605
|
+
* the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
|
|
1606
|
+
* field to an empty string.
|
|
1607
|
+
*/
|
|
1608
|
+
key_usage?: string;
|
|
1609
|
+
/** The allowed extended key usage constraint on certificate, in a comma-delimited list.
|
|
1610
|
+
*
|
|
1611
|
+
* You can find valid values in the [Go x509 package
|
|
1612
|
+
* documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
|
|
1613
|
+
* Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
|
|
1614
|
+
*/
|
|
1615
|
+
ext_key_usage?: string;
|
|
1616
|
+
/** A comma-delimited list of policy Object Identifiers (OIDs). */
|
|
1617
|
+
policy_identifiers?: string;
|
|
1618
|
+
/** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
|
|
1619
|
+
ext_key_usage_oids?: string;
|
|
1620
|
+
/** This field indicates whether the private key will be rotated. */
|
|
1621
|
+
rotate_keys?: boolean;
|
|
1622
|
+
}
|
|
1623
|
+
namespace ImportedCertificateManagedCsr {
|
|
1624
|
+
namespace Constants {
|
|
1625
|
+
/** The type of private key to generate. */
|
|
1626
|
+
enum KeyType {
|
|
1627
|
+
RSA = "rsa",
|
|
1628
|
+
EC = "ec",
|
|
1629
|
+
ED25519 = "ed25519"
|
|
1630
|
+
}
|
|
1631
|
+
}
|
|
1632
|
+
}
|
|
1633
|
+
/**
|
|
1634
|
+
* The data specified to create the CSR and the private key.
|
|
1635
|
+
*/
|
|
1636
|
+
interface ImportedCertificateManagedCsrResponse {
|
|
1637
|
+
/** The Organizational Unit (OU) values to define in the subject field of the resulting certificate. */
|
|
1638
|
+
ou: string[];
|
|
1639
|
+
/** The Organization (O) values to define in the subject field of the resulting certificate. */
|
|
1640
|
+
organization: string[];
|
|
1641
|
+
/** The Country (C) values to define in the subject field of the resulting certificate. */
|
|
1642
|
+
country: string[];
|
|
1643
|
+
/** The Locality (L) values to define in the subject field of the resulting certificate. */
|
|
1644
|
+
locality: string[];
|
|
1645
|
+
/** The Province (ST) values to define in the subject field of the resulting certificate. */
|
|
1646
|
+
province: string[];
|
|
1647
|
+
/** The street address values to define in the subject field of the resulting certificate. */
|
|
1648
|
+
street_address: string[];
|
|
1649
|
+
/** The postal code values to define in the subject field of the resulting certificate. */
|
|
1650
|
+
postal_code: string[];
|
|
1651
|
+
/** If set to false, makes the common_name field optional while generating a certificate. */
|
|
1652
|
+
require_cn: boolean;
|
|
1653
|
+
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
1654
|
+
common_name?: string;
|
|
1655
|
+
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
1656
|
+
* SSL certificate.
|
|
1657
|
+
*/
|
|
1658
|
+
alt_names?: string;
|
|
1659
|
+
/** The IP Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1660
|
+
ip_sans?: string;
|
|
1661
|
+
/** The URI Subject Alternative Names to define for the certificate, in a comma-delimited list. */
|
|
1662
|
+
uri_sans?: string;
|
|
1663
|
+
/** The custom Object Identifier (OID) or UTF8-string Subject Alternative Names to define for the certificate,
|
|
1664
|
+
* in a comma-delimited list.
|
|
1665
|
+
*
|
|
1666
|
+
* The format is the same as OpenSSL: `<oid>:<type>:<value>` where the current valid type is `UTF8`.
|
|
1667
|
+
*/
|
|
1668
|
+
other_sans?: string;
|
|
1669
|
+
/** This parameter controls whether the common name is excluded from Subject Alternative Names (SANs).
|
|
1670
|
+
*
|
|
1671
|
+
* If the common name is set to `true`, it is not included in DNS, or email SANs if they apply. This field can be
|
|
1672
|
+
* useful if the common name is a human-readable identifier, instead of a hostname or an email address.
|
|
1673
|
+
*/
|
|
1674
|
+
exclude_cn_from_sans: boolean;
|
|
1675
|
+
/** Specifies the list of requested User ID (OID 0.9.2342.19200300.100.1.1) Subject values to be placed on the
|
|
1676
|
+
* signed certificate.
|
|
1677
|
+
*/
|
|
1678
|
+
user_ids?: string;
|
|
1679
|
+
/** This field indicates whether certificate is flagged for server use. */
|
|
1680
|
+
server_flag: boolean;
|
|
1681
|
+
/** This field indicates whether certificate is flagged for client use. */
|
|
1682
|
+
client_flag: boolean;
|
|
1683
|
+
/** This field indicates whether certificate is flagged for code signing use. */
|
|
1684
|
+
code_signing_flag: boolean;
|
|
1685
|
+
/** This field indicates whether certificate is flagged for email protection use. */
|
|
1686
|
+
email_protection_flag: boolean;
|
|
1687
|
+
/** The type of private key to generate. */
|
|
1688
|
+
key_type: ImportedCertificateManagedCsrResponse.Constants.KeyType | string;
|
|
1689
|
+
/** The number of bits to use to generate the private key.
|
|
1690
|
+
*
|
|
1691
|
+
* Allowable values for RSA keys are: `2048`, `3072`, `4096` and `8192`. Allowable values for EC keys are: `224`,
|
|
1692
|
+
* `256`, `384`, and `521`. The default for RSA keys is `2048`. The default for EC keys is `256`. Ignored for
|
|
1693
|
+
* ed25519 keys.
|
|
1694
|
+
*/
|
|
1695
|
+
key_bits: number;
|
|
1696
|
+
/** The allowed key usage constraint to define for certificate, in a comma-delimited list.
|
|
1697
|
+
*
|
|
1698
|
+
* You can find valid values in the [Go x509 package documentation](https://pkg.go.dev/crypto/x509#KeyUsage). Omit
|
|
1699
|
+
* the `KeyUsage` part of the value. Values are not case-sensitive. To specify no key usage constraints, set this
|
|
1700
|
+
* field to an empty string.
|
|
1701
|
+
*/
|
|
1702
|
+
key_usage?: string;
|
|
1703
|
+
/** The allowed extended key usage constraint on certificate, in a comma-delimited list.
|
|
1704
|
+
*
|
|
1705
|
+
* You can find valid values in the [Go x509 package
|
|
1706
|
+
* documentation](https://golang.org/pkg/crypto/x509/#ExtKeyUsage). Omit the `ExtKeyUsage` part of the value.
|
|
1707
|
+
* Values are not case-sensitive. To specify no key usage constraints, set this field to an empty string.
|
|
1708
|
+
*/
|
|
1709
|
+
ext_key_usage?: string;
|
|
1710
|
+
/** A comma-delimited list of policy Object Identifiers (OIDs). */
|
|
1711
|
+
policy_identifiers?: string;
|
|
1712
|
+
/** A comma-delimited list of extended key usage Object Identifiers (OIDs). */
|
|
1713
|
+
ext_key_usage_oids?: string;
|
|
1714
|
+
/** This field indicates whether the private key will be rotated. */
|
|
1715
|
+
rotate_keys?: boolean;
|
|
1716
|
+
/** The certificate signing request. */
|
|
1717
|
+
csr: string;
|
|
1718
|
+
/** The PEM-encoded private key that is associated with the certificate. The data must be formatted on a single
|
|
1719
|
+
* line with embedded newline characters.
|
|
1720
|
+
*/
|
|
1721
|
+
private_key: string;
|
|
1722
|
+
}
|
|
1723
|
+
namespace ImportedCertificateManagedCsrResponse {
|
|
1724
|
+
namespace Constants {
|
|
1725
|
+
/** The type of private key to generate. */
|
|
1726
|
+
enum KeyType {
|
|
1727
|
+
RSA = "rsa",
|
|
1728
|
+
EC = "ec",
|
|
1729
|
+
ED25519 = "ed25519"
|
|
1730
|
+
}
|
|
1731
|
+
}
|
|
1732
|
+
}
|
|
1539
1733
|
/**
|
|
1540
1734
|
* The details of the Event Notifications registration.
|
|
1541
1735
|
*/
|
|
@@ -1769,7 +1963,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1769
1963
|
* Properties that describe a secret group.
|
|
1770
1964
|
*/
|
|
1771
1965
|
interface SecretGroup {
|
|
1772
|
-
/** A
|
|
1966
|
+
/** A UUID identifier, or `default` secret group. */
|
|
1773
1967
|
id: string;
|
|
1774
1968
|
/** The name of your existing secret group. */
|
|
1775
1969
|
name?: string;
|
|
@@ -1819,11 +2013,11 @@ declare namespace SecretsManagerV2 {
|
|
|
1819
2013
|
updated_at: string;
|
|
1820
2014
|
/** The unique identifier that is associated with the entity that created the secret. */
|
|
1821
2015
|
created_by: string;
|
|
1822
|
-
/** A
|
|
2016
|
+
/** A UUID identifier, or `default` secret group. */
|
|
1823
2017
|
secret_group_id: string;
|
|
1824
|
-
/** A
|
|
2018
|
+
/** A UUID identifier. */
|
|
1825
2019
|
secret_id: string;
|
|
1826
|
-
/** A
|
|
2020
|
+
/** A UUID identifier. */
|
|
1827
2021
|
secret_version_id: string;
|
|
1828
2022
|
/** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
|
|
1829
2023
|
* is used for version `n-1`.
|
|
@@ -1862,14 +2056,14 @@ declare namespace SecretsManagerV2 {
|
|
|
1862
2056
|
* Create locks response body containing a collection of locks that are attached to a secret.
|
|
1863
2057
|
*/
|
|
1864
2058
|
interface SecretLocks {
|
|
1865
|
-
/** A
|
|
2059
|
+
/** A UUID identifier. */
|
|
1866
2060
|
secret_id: string;
|
|
1867
|
-
/** A
|
|
2061
|
+
/** A UUID identifier, or `default` secret group. */
|
|
1868
2062
|
secret_group_id: string;
|
|
1869
2063
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
1870
2064
|
* service_credentials, kv, and username_password.
|
|
1871
2065
|
*/
|
|
1872
|
-
secret_type
|
|
2066
|
+
secret_type: SecretLocks.Constants.SecretType | string;
|
|
1873
2067
|
/** The human-readable name of your secret. */
|
|
1874
2068
|
secret_name?: string;
|
|
1875
2069
|
/** A collection of locks that are attached to a secret. */
|
|
@@ -1961,7 +2155,7 @@ declare namespace SecretsManagerV2 {
|
|
|
1961
2155
|
* SecretVersionLocks.
|
|
1962
2156
|
*/
|
|
1963
2157
|
interface SecretVersionLocks {
|
|
1964
|
-
/** A
|
|
2158
|
+
/** A UUID identifier. */
|
|
1965
2159
|
version_id: string;
|
|
1966
2160
|
/** A human-readable alias that describes the secret version. 'Current' is used for version `n` and 'previous'
|
|
1967
2161
|
* is used for version `n-1`.
|
|
@@ -2215,7 +2409,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2215
2409
|
* call to the service API.
|
|
2216
2410
|
*/
|
|
2217
2411
|
downloaded?: boolean;
|
|
2218
|
-
/** A
|
|
2412
|
+
/** A UUID identifier. */
|
|
2219
2413
|
id: string;
|
|
2220
2414
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2221
2415
|
*
|
|
@@ -2228,7 +2422,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2228
2422
|
locks_total?: number;
|
|
2229
2423
|
/** The human-readable name of your secret. */
|
|
2230
2424
|
name?: string;
|
|
2231
|
-
/** A
|
|
2425
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2232
2426
|
secret_group_id: string;
|
|
2233
2427
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2234
2428
|
* service_credentials, kv, and username_password.
|
|
@@ -2298,7 +2492,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2298
2492
|
* call to the service API.
|
|
2299
2493
|
*/
|
|
2300
2494
|
downloaded?: boolean;
|
|
2301
|
-
/** A
|
|
2495
|
+
/** A UUID identifier. */
|
|
2302
2496
|
id: string;
|
|
2303
2497
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2304
2498
|
*
|
|
@@ -2311,7 +2505,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2311
2505
|
locks_total?: number;
|
|
2312
2506
|
/** The human-readable name of your secret. */
|
|
2313
2507
|
name?: string;
|
|
2314
|
-
/** A
|
|
2508
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2315
2509
|
secret_group_id: string;
|
|
2316
2510
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2317
2511
|
* service_credentials, kv, and username_password.
|
|
@@ -2414,7 +2608,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2414
2608
|
* To protect your privacy, do not use personal data, such as your name or location, as a name for your secret.
|
|
2415
2609
|
*/
|
|
2416
2610
|
name: string;
|
|
2417
|
-
/** A
|
|
2611
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2418
2612
|
secret_group_id?: string;
|
|
2419
2613
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2420
2614
|
* service_credentials, kv, and username_password.
|
|
@@ -2454,7 +2648,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2454
2648
|
* call to the service API.
|
|
2455
2649
|
*/
|
|
2456
2650
|
downloaded?: boolean;
|
|
2457
|
-
/** A
|
|
2651
|
+
/** A UUID identifier. */
|
|
2458
2652
|
id: string;
|
|
2459
2653
|
/** The human-readable name of your secret. */
|
|
2460
2654
|
secret_name?: string;
|
|
@@ -2462,7 +2656,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2462
2656
|
* service_credentials, kv, and username_password.
|
|
2463
2657
|
*/
|
|
2464
2658
|
secret_type: ArbitrarySecretVersion.Constants.SecretType | string;
|
|
2465
|
-
/** A
|
|
2659
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2466
2660
|
secret_group_id: string;
|
|
2467
2661
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
2468
2662
|
payload_available: boolean;
|
|
@@ -2472,7 +2666,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2472
2666
|
alias?: ArbitrarySecretVersion.Constants.Alias | string;
|
|
2473
2667
|
/** The secret version metadata that a user can customize. */
|
|
2474
2668
|
version_custom_metadata?: JsonObject;
|
|
2475
|
-
/** A
|
|
2669
|
+
/** A UUID identifier. */
|
|
2476
2670
|
secret_id: string;
|
|
2477
2671
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
2478
2672
|
* types: Arbitrary, username_password.
|
|
@@ -2515,7 +2709,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2515
2709
|
* call to the service API.
|
|
2516
2710
|
*/
|
|
2517
2711
|
downloaded?: boolean;
|
|
2518
|
-
/** A
|
|
2712
|
+
/** A UUID identifier. */
|
|
2519
2713
|
id: string;
|
|
2520
2714
|
/** The human-readable name of your secret. */
|
|
2521
2715
|
secret_name?: string;
|
|
@@ -2523,7 +2717,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2523
2717
|
* service_credentials, kv, and username_password.
|
|
2524
2718
|
*/
|
|
2525
2719
|
secret_type: ArbitrarySecretVersionMetadata.Constants.SecretType | string;
|
|
2526
|
-
/** A
|
|
2720
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2527
2721
|
secret_group_id: string;
|
|
2528
2722
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
2529
2723
|
payload_available: boolean;
|
|
@@ -2533,7 +2727,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2533
2727
|
alias?: ArbitrarySecretVersionMetadata.Constants.Alias | string;
|
|
2534
2728
|
/** The secret version metadata that a user can customize. */
|
|
2535
2729
|
version_custom_metadata?: JsonObject;
|
|
2536
|
-
/** A
|
|
2730
|
+
/** A UUID identifier. */
|
|
2537
2731
|
secret_id: string;
|
|
2538
2732
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
2539
2733
|
* types: Arbitrary, username_password.
|
|
@@ -2778,7 +2972,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2778
2972
|
* call to the service API.
|
|
2779
2973
|
*/
|
|
2780
2974
|
downloaded?: boolean;
|
|
2781
|
-
/** A
|
|
2975
|
+
/** A UUID identifier. */
|
|
2782
2976
|
id: string;
|
|
2783
2977
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2784
2978
|
*
|
|
@@ -2791,7 +2985,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2791
2985
|
locks_total?: number;
|
|
2792
2986
|
/** The human-readable name of your secret. */
|
|
2793
2987
|
name?: string;
|
|
2794
|
-
/** A
|
|
2988
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2795
2989
|
secret_group_id: string;
|
|
2796
2990
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2797
2991
|
* service_credentials, kv, and username_password.
|
|
@@ -2919,7 +3113,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2919
3113
|
* call to the service API.
|
|
2920
3114
|
*/
|
|
2921
3115
|
downloaded?: boolean;
|
|
2922
|
-
/** A
|
|
3116
|
+
/** A UUID identifier. */
|
|
2923
3117
|
id: string;
|
|
2924
3118
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
2925
3119
|
*
|
|
@@ -2932,7 +3126,7 @@ declare namespace SecretsManagerV2 {
|
|
|
2932
3126
|
locks_total?: number;
|
|
2933
3127
|
/** The human-readable name of your secret. */
|
|
2934
3128
|
name?: string;
|
|
2935
|
-
/** A
|
|
3129
|
+
/** A UUID identifier, or `default` secret group. */
|
|
2936
3130
|
secret_group_id: string;
|
|
2937
3131
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
2938
3132
|
* service_credentials, kv, and username_password.
|
|
@@ -3088,7 +3282,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3088
3282
|
* secret group.
|
|
3089
3283
|
*/
|
|
3090
3284
|
description?: string;
|
|
3091
|
-
/** A
|
|
3285
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3092
3286
|
secret_group_id?: string;
|
|
3093
3287
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3094
3288
|
*
|
|
@@ -3160,7 +3354,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3160
3354
|
* IAMCredentialsSecretRestoreFromVersionPrototype.
|
|
3161
3355
|
*/
|
|
3162
3356
|
interface IAMCredentialsSecretRestoreFromVersionPrototype extends SecretVersionPrototype {
|
|
3163
|
-
/** A
|
|
3357
|
+
/** A UUID identifier, or `current` or `previous` secret version aliases. */
|
|
3164
3358
|
restore_from_version: string;
|
|
3165
3359
|
/** The secret metadata that a user can customize. */
|
|
3166
3360
|
custom_metadata?: JsonObject;
|
|
@@ -3181,7 +3375,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3181
3375
|
* call to the service API.
|
|
3182
3376
|
*/
|
|
3183
3377
|
downloaded?: boolean;
|
|
3184
|
-
/** A
|
|
3378
|
+
/** A UUID identifier. */
|
|
3185
3379
|
id: string;
|
|
3186
3380
|
/** The human-readable name of your secret. */
|
|
3187
3381
|
secret_name?: string;
|
|
@@ -3189,7 +3383,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3189
3383
|
* service_credentials, kv, and username_password.
|
|
3190
3384
|
*/
|
|
3191
3385
|
secret_type: IAMCredentialsSecretVersion.Constants.SecretType | string;
|
|
3192
|
-
/** A
|
|
3386
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3193
3387
|
secret_group_id: string;
|
|
3194
3388
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3195
3389
|
payload_available: boolean;
|
|
@@ -3199,7 +3393,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3199
3393
|
alias?: IAMCredentialsSecretVersion.Constants.Alias | string;
|
|
3200
3394
|
/** The secret version metadata that a user can customize. */
|
|
3201
3395
|
version_custom_metadata?: JsonObject;
|
|
3202
|
-
/** A
|
|
3396
|
+
/** A UUID identifier. */
|
|
3203
3397
|
secret_id: string;
|
|
3204
3398
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3205
3399
|
* types: Arbitrary, username_password.
|
|
@@ -3259,7 +3453,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3259
3453
|
* call to the service API.
|
|
3260
3454
|
*/
|
|
3261
3455
|
downloaded?: boolean;
|
|
3262
|
-
/** A
|
|
3456
|
+
/** A UUID identifier. */
|
|
3263
3457
|
id: string;
|
|
3264
3458
|
/** The human-readable name of your secret. */
|
|
3265
3459
|
secret_name?: string;
|
|
@@ -3267,7 +3461,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3267
3461
|
* service_credentials, kv, and username_password.
|
|
3268
3462
|
*/
|
|
3269
3463
|
secret_type: IAMCredentialsSecretVersionMetadata.Constants.SecretType | string;
|
|
3270
|
-
/** A
|
|
3464
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3271
3465
|
secret_group_id: string;
|
|
3272
3466
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3273
3467
|
payload_available: boolean;
|
|
@@ -3277,7 +3471,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3277
3471
|
alias?: IAMCredentialsSecretVersionMetadata.Constants.Alias | string;
|
|
3278
3472
|
/** The secret version metadata that a user can customize. */
|
|
3279
3473
|
version_custom_metadata?: JsonObject;
|
|
3280
|
-
/** A
|
|
3474
|
+
/** A UUID identifier. */
|
|
3281
3475
|
secret_id: string;
|
|
3282
3476
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3283
3477
|
* types: Arbitrary, username_password.
|
|
@@ -3347,7 +3541,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3347
3541
|
* call to the service API.
|
|
3348
3542
|
*/
|
|
3349
3543
|
downloaded?: boolean;
|
|
3350
|
-
/** A
|
|
3544
|
+
/** A UUID identifier. */
|
|
3351
3545
|
id: string;
|
|
3352
3546
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3353
3547
|
*
|
|
@@ -3360,7 +3554,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3360
3554
|
locks_total?: number;
|
|
3361
3555
|
/** The human-readable name of your secret. */
|
|
3362
3556
|
name?: string;
|
|
3363
|
-
/** A
|
|
3557
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3364
3558
|
secret_group_id: string;
|
|
3365
3559
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3366
3560
|
* service_credentials, kv, and username_password.
|
|
@@ -3381,7 +3575,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3381
3575
|
/** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
|
|
3382
3576
|
* certificate.
|
|
3383
3577
|
*/
|
|
3384
|
-
signing_algorithm
|
|
3578
|
+
signing_algorithm?: string;
|
|
3385
3579
|
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
3386
3580
|
* SSL certificate.
|
|
3387
3581
|
*/
|
|
@@ -3391,23 +3585,25 @@ declare namespace SecretsManagerV2 {
|
|
|
3391
3585
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3392
3586
|
* types: Arbitrary, username_password.
|
|
3393
3587
|
*/
|
|
3394
|
-
expiration_date
|
|
3588
|
+
expiration_date?: string;
|
|
3395
3589
|
/** Indicates whether the certificate was imported with an associated intermediate certificate. */
|
|
3396
|
-
intermediate_included
|
|
3590
|
+
intermediate_included?: boolean;
|
|
3397
3591
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3398
|
-
issuer
|
|
3592
|
+
issuer?: string;
|
|
3399
3593
|
/** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
|
|
3400
3594
|
* certificate.
|
|
3401
3595
|
*/
|
|
3402
3596
|
key_algorithm?: string;
|
|
3403
3597
|
/** Indicates whether the certificate was imported with an associated private key. */
|
|
3404
|
-
private_key_included
|
|
3598
|
+
private_key_included?: boolean;
|
|
3405
3599
|
/** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
|
|
3406
|
-
serial_number
|
|
3600
|
+
serial_number?: string;
|
|
3407
3601
|
/** The date and time that the certificate validity period begins and ends. */
|
|
3408
|
-
validity
|
|
3602
|
+
validity?: CertificateValidity;
|
|
3603
|
+
/** The data specified to create the CSR and the private key. */
|
|
3604
|
+
managed_csr?: ImportedCertificateManagedCsrResponse;
|
|
3409
3605
|
/** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
|
|
3410
|
-
certificate
|
|
3606
|
+
certificate?: string;
|
|
3411
3607
|
/** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
|
|
3412
3608
|
* formatted on a single line with embedded newline characters.
|
|
3413
3609
|
*/
|
|
@@ -3416,6 +3612,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3416
3612
|
* line with embedded newline characters.
|
|
3417
3613
|
*/
|
|
3418
3614
|
private_key?: string;
|
|
3615
|
+
/** The certificate signing request. */
|
|
3616
|
+
csr?: string;
|
|
3419
3617
|
}
|
|
3420
3618
|
namespace ImportedCertificate {
|
|
3421
3619
|
namespace Constants {
|
|
@@ -3462,7 +3660,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3462
3660
|
* call to the service API.
|
|
3463
3661
|
*/
|
|
3464
3662
|
downloaded?: boolean;
|
|
3465
|
-
/** A
|
|
3663
|
+
/** A UUID identifier. */
|
|
3466
3664
|
id: string;
|
|
3467
3665
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3468
3666
|
*
|
|
@@ -3475,7 +3673,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3475
3673
|
locks_total?: number;
|
|
3476
3674
|
/** The human-readable name of your secret. */
|
|
3477
3675
|
name?: string;
|
|
3478
|
-
/** A
|
|
3676
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3479
3677
|
secret_group_id: string;
|
|
3480
3678
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3481
3679
|
* service_credentials, kv, and username_password.
|
|
@@ -3496,7 +3694,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3496
3694
|
/** The identifier for the cryptographic algorithm that is used by the issuing certificate authority to sign a
|
|
3497
3695
|
* certificate.
|
|
3498
3696
|
*/
|
|
3499
|
-
signing_algorithm
|
|
3697
|
+
signing_algorithm?: string;
|
|
3500
3698
|
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
3501
3699
|
* SSL certificate.
|
|
3502
3700
|
*/
|
|
@@ -3506,21 +3704,23 @@ declare namespace SecretsManagerV2 {
|
|
|
3506
3704
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3507
3705
|
* types: Arbitrary, username_password.
|
|
3508
3706
|
*/
|
|
3509
|
-
expiration_date
|
|
3707
|
+
expiration_date?: string;
|
|
3510
3708
|
/** Indicates whether the certificate was imported with an associated intermediate certificate. */
|
|
3511
|
-
intermediate_included
|
|
3709
|
+
intermediate_included?: boolean;
|
|
3512
3710
|
/** The distinguished name that identifies the entity that signed and issued the certificate. */
|
|
3513
|
-
issuer
|
|
3711
|
+
issuer?: string;
|
|
3514
3712
|
/** The identifier for the cryptographic algorithm used to generate the public key that is associated with the
|
|
3515
3713
|
* certificate.
|
|
3516
3714
|
*/
|
|
3517
3715
|
key_algorithm?: string;
|
|
3518
3716
|
/** Indicates whether the certificate was imported with an associated private key. */
|
|
3519
|
-
private_key_included
|
|
3717
|
+
private_key_included?: boolean;
|
|
3520
3718
|
/** The unique serial number that was assigned to a certificate by the issuing certificate authority. */
|
|
3521
|
-
serial_number
|
|
3719
|
+
serial_number?: string;
|
|
3522
3720
|
/** The date and time that the certificate validity period begins and ends. */
|
|
3523
|
-
validity
|
|
3721
|
+
validity?: CertificateValidity;
|
|
3722
|
+
/** The data specified to create the CSR and the private key. */
|
|
3723
|
+
managed_csr?: ImportedCertificateManagedCsrResponse;
|
|
3524
3724
|
}
|
|
3525
3725
|
namespace ImportedCertificateMetadata {
|
|
3526
3726
|
namespace Constants {
|
|
@@ -3569,6 +3769,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3569
3769
|
labels?: string[];
|
|
3570
3770
|
/** The secret metadata that a user can customize. */
|
|
3571
3771
|
custom_metadata?: JsonObject;
|
|
3772
|
+
/** The data specified to create the CSR and the private key. */
|
|
3773
|
+
managed_csr?: ImportedCertificateManagedCsr;
|
|
3572
3774
|
}
|
|
3573
3775
|
/**
|
|
3574
3776
|
* ImportedCertificatePrototype.
|
|
@@ -3589,7 +3791,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3589
3791
|
* secret group.
|
|
3590
3792
|
*/
|
|
3591
3793
|
description?: string;
|
|
3592
|
-
/** A
|
|
3794
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3593
3795
|
secret_group_id?: string;
|
|
3594
3796
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3595
3797
|
*
|
|
@@ -3599,7 +3801,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3599
3801
|
*/
|
|
3600
3802
|
labels?: string[];
|
|
3601
3803
|
/** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
|
|
3602
|
-
certificate
|
|
3804
|
+
certificate?: string;
|
|
3603
3805
|
/** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
|
|
3604
3806
|
* formatted on a single line with embedded newline characters.
|
|
3605
3807
|
*/
|
|
@@ -3608,6 +3810,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3608
3810
|
* line with embedded newline characters.
|
|
3609
3811
|
*/
|
|
3610
3812
|
private_key?: string;
|
|
3813
|
+
/** The data specified to create the CSR and the private key. */
|
|
3814
|
+
managed_csr?: ImportedCertificateManagedCsr;
|
|
3611
3815
|
/** The secret metadata that a user can customize. */
|
|
3612
3816
|
custom_metadata?: JsonObject;
|
|
3613
3817
|
/** The secret version metadata that a user can customize. */
|
|
@@ -3642,7 +3846,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3642
3846
|
* call to the service API.
|
|
3643
3847
|
*/
|
|
3644
3848
|
downloaded?: boolean;
|
|
3645
|
-
/** A
|
|
3849
|
+
/** A UUID identifier. */
|
|
3646
3850
|
id: string;
|
|
3647
3851
|
/** The human-readable name of your secret. */
|
|
3648
3852
|
secret_name?: string;
|
|
@@ -3650,7 +3854,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3650
3854
|
* service_credentials, kv, and username_password.
|
|
3651
3855
|
*/
|
|
3652
3856
|
secret_type: ImportedCertificateVersion.Constants.SecretType | string;
|
|
3653
|
-
/** A
|
|
3857
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3654
3858
|
secret_group_id: string;
|
|
3655
3859
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3656
3860
|
payload_available: boolean;
|
|
@@ -3660,7 +3864,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3660
3864
|
alias?: ImportedCertificateVersion.Constants.Alias | string;
|
|
3661
3865
|
/** The secret version metadata that a user can customize. */
|
|
3662
3866
|
version_custom_metadata?: JsonObject;
|
|
3663
|
-
/** A
|
|
3867
|
+
/** A UUID identifier. */
|
|
3664
3868
|
secret_id: string;
|
|
3665
3869
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3666
3870
|
* types: Arbitrary, username_password.
|
|
@@ -3671,7 +3875,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3671
3875
|
/** The date and time that the certificate validity period begins and ends. */
|
|
3672
3876
|
validity: CertificateValidity;
|
|
3673
3877
|
/** Your PEM-encoded certificate. The data must be formatted on a single line with embedded newline characters. */
|
|
3674
|
-
certificate
|
|
3878
|
+
certificate?: string;
|
|
3675
3879
|
/** The PEM-encoded intermediate certificate that is associated with the root certificate. The data must be
|
|
3676
3880
|
* formatted on a single line with embedded newline characters.
|
|
3677
3881
|
*/
|
|
@@ -3680,6 +3884,8 @@ declare namespace SecretsManagerV2 {
|
|
|
3680
3884
|
* line with embedded newline characters.
|
|
3681
3885
|
*/
|
|
3682
3886
|
private_key?: string;
|
|
3887
|
+
/** The certificate signing request. */
|
|
3888
|
+
csr?: string;
|
|
3683
3889
|
}
|
|
3684
3890
|
namespace ImportedCertificateVersion {
|
|
3685
3891
|
namespace Constants {
|
|
@@ -3715,7 +3921,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3715
3921
|
* call to the service API.
|
|
3716
3922
|
*/
|
|
3717
3923
|
downloaded?: boolean;
|
|
3718
|
-
/** A
|
|
3924
|
+
/** A UUID identifier. */
|
|
3719
3925
|
id: string;
|
|
3720
3926
|
/** The human-readable name of your secret. */
|
|
3721
3927
|
secret_name?: string;
|
|
@@ -3723,7 +3929,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3723
3929
|
* service_credentials, kv, and username_password.
|
|
3724
3930
|
*/
|
|
3725
3931
|
secret_type: ImportedCertificateVersionMetadata.Constants.SecretType | string;
|
|
3726
|
-
/** A
|
|
3932
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3727
3933
|
secret_group_id: string;
|
|
3728
3934
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
3729
3935
|
payload_available: boolean;
|
|
@@ -3733,7 +3939,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3733
3939
|
alias?: ImportedCertificateVersionMetadata.Constants.Alias | string;
|
|
3734
3940
|
/** The secret version metadata that a user can customize. */
|
|
3735
3941
|
version_custom_metadata?: JsonObject;
|
|
3736
|
-
/** A
|
|
3942
|
+
/** A UUID identifier. */
|
|
3737
3943
|
secret_id: string;
|
|
3738
3944
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
3739
3945
|
* types: Arbitrary, username_password.
|
|
@@ -3805,7 +4011,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3805
4011
|
* call to the service API.
|
|
3806
4012
|
*/
|
|
3807
4013
|
downloaded?: boolean;
|
|
3808
|
-
/** A
|
|
4014
|
+
/** A UUID identifier. */
|
|
3809
4015
|
id: string;
|
|
3810
4016
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3811
4017
|
*
|
|
@@ -3818,7 +4024,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3818
4024
|
locks_total?: number;
|
|
3819
4025
|
/** The human-readable name of your secret. */
|
|
3820
4026
|
name?: string;
|
|
3821
|
-
/** A
|
|
4027
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3822
4028
|
secret_group_id: string;
|
|
3823
4029
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3824
4030
|
* service_credentials, kv, and username_password.
|
|
@@ -3884,7 +4090,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3884
4090
|
* call to the service API.
|
|
3885
4091
|
*/
|
|
3886
4092
|
downloaded?: boolean;
|
|
3887
|
-
/** A
|
|
4093
|
+
/** A UUID identifier. */
|
|
3888
4094
|
id: string;
|
|
3889
4095
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3890
4096
|
*
|
|
@@ -3897,7 +4103,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3897
4103
|
locks_total?: number;
|
|
3898
4104
|
/** The human-readable name of your secret. */
|
|
3899
4105
|
name?: string;
|
|
3900
|
-
/** A
|
|
4106
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3901
4107
|
secret_group_id: string;
|
|
3902
4108
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
3903
4109
|
* service_credentials, kv, and username_password.
|
|
@@ -3983,7 +4189,7 @@ declare namespace SecretsManagerV2 {
|
|
|
3983
4189
|
* secret group.
|
|
3984
4190
|
*/
|
|
3985
4191
|
description?: string;
|
|
3986
|
-
/** A
|
|
4192
|
+
/** A UUID identifier, or `default` secret group. */
|
|
3987
4193
|
secret_group_id?: string;
|
|
3988
4194
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
3989
4195
|
*
|
|
@@ -4028,7 +4234,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4028
4234
|
* call to the service API.
|
|
4029
4235
|
*/
|
|
4030
4236
|
downloaded?: boolean;
|
|
4031
|
-
/** A
|
|
4237
|
+
/** A UUID identifier. */
|
|
4032
4238
|
id: string;
|
|
4033
4239
|
/** The human-readable name of your secret. */
|
|
4034
4240
|
secret_name?: string;
|
|
@@ -4036,7 +4242,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4036
4242
|
* service_credentials, kv, and username_password.
|
|
4037
4243
|
*/
|
|
4038
4244
|
secret_type: KVSecretVersion.Constants.SecretType | string;
|
|
4039
|
-
/** A
|
|
4245
|
+
/** A UUID identifier, or `default` secret group. */
|
|
4040
4246
|
secret_group_id: string;
|
|
4041
4247
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
4042
4248
|
payload_available: boolean;
|
|
@@ -4046,7 +4252,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4046
4252
|
alias?: KVSecretVersion.Constants.Alias | string;
|
|
4047
4253
|
/** The secret version metadata that a user can customize. */
|
|
4048
4254
|
version_custom_metadata?: JsonObject;
|
|
4049
|
-
/** A
|
|
4255
|
+
/** A UUID identifier. */
|
|
4050
4256
|
secret_id: string;
|
|
4051
4257
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
4052
4258
|
* types: Arbitrary, username_password.
|
|
@@ -4089,7 +4295,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4089
4295
|
* call to the service API.
|
|
4090
4296
|
*/
|
|
4091
4297
|
downloaded?: boolean;
|
|
4092
|
-
/** A
|
|
4298
|
+
/** A UUID identifier. */
|
|
4093
4299
|
id: string;
|
|
4094
4300
|
/** The human-readable name of your secret. */
|
|
4095
4301
|
secret_name?: string;
|
|
@@ -4097,7 +4303,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4097
4303
|
* service_credentials, kv, and username_password.
|
|
4098
4304
|
*/
|
|
4099
4305
|
secret_type: KVSecretVersionMetadata.Constants.SecretType | string;
|
|
4100
|
-
/** A
|
|
4306
|
+
/** A UUID identifier, or `default` secret group. */
|
|
4101
4307
|
secret_group_id: string;
|
|
4102
4308
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
4103
4309
|
payload_available: boolean;
|
|
@@ -4107,7 +4313,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4107
4313
|
alias?: KVSecretVersionMetadata.Constants.Alias | string;
|
|
4108
4314
|
/** The secret version metadata that a user can customize. */
|
|
4109
4315
|
version_custom_metadata?: JsonObject;
|
|
4110
|
-
/** A
|
|
4316
|
+
/** A UUID identifier. */
|
|
4111
4317
|
secret_id: string;
|
|
4112
4318
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
4113
4319
|
* types: Arbitrary, username_password.
|
|
@@ -4167,7 +4373,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4167
4373
|
* call to the service API.
|
|
4168
4374
|
*/
|
|
4169
4375
|
downloaded?: boolean;
|
|
4170
|
-
/** A
|
|
4376
|
+
/** A UUID identifier. */
|
|
4171
4377
|
id: string;
|
|
4172
4378
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
4173
4379
|
*
|
|
@@ -4180,7 +4386,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4180
4386
|
locks_total?: number;
|
|
4181
4387
|
/** The human-readable name of your secret. */
|
|
4182
4388
|
name?: string;
|
|
4183
|
-
/** A
|
|
4389
|
+
/** A UUID identifier, or `default` secret group. */
|
|
4184
4390
|
secret_group_id: string;
|
|
4185
4391
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
4186
4392
|
* service_credentials, kv, and username_password.
|
|
@@ -4423,7 +4629,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4423
4629
|
}
|
|
4424
4630
|
}
|
|
4425
4631
|
/**
|
|
4426
|
-
* The request body to specify the properties of the action to rotate
|
|
4632
|
+
* The request body to specify the properties of the action to rotate an intermediate CA certificate.
|
|
4427
4633
|
*/
|
|
4428
4634
|
interface PrivateCertificateConfigurationActionRotatePrototype extends ConfigurationActionPrototype {
|
|
4429
4635
|
/** The type of configuration action. */
|
|
@@ -6504,7 +6710,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6504
6710
|
* call to the service API.
|
|
6505
6711
|
*/
|
|
6506
6712
|
downloaded?: boolean;
|
|
6507
|
-
/** A
|
|
6713
|
+
/** A UUID identifier. */
|
|
6508
6714
|
id: string;
|
|
6509
6715
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
6510
6716
|
*
|
|
@@ -6517,7 +6723,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6517
6723
|
locks_total?: number;
|
|
6518
6724
|
/** The human-readable name of your secret. */
|
|
6519
6725
|
name?: string;
|
|
6520
|
-
/** A
|
|
6726
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6521
6727
|
secret_group_id: string;
|
|
6522
6728
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
6523
6729
|
* service_credentials, kv, and username_password.
|
|
@@ -6649,7 +6855,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6649
6855
|
* secret group.
|
|
6650
6856
|
*/
|
|
6651
6857
|
description?: string;
|
|
6652
|
-
/** A
|
|
6858
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6653
6859
|
secret_group_id?: string;
|
|
6654
6860
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
6655
6861
|
*
|
|
@@ -6744,7 +6950,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6744
6950
|
* call to the service API.
|
|
6745
6951
|
*/
|
|
6746
6952
|
downloaded?: boolean;
|
|
6747
|
-
/** A
|
|
6953
|
+
/** A UUID identifier. */
|
|
6748
6954
|
id: string;
|
|
6749
6955
|
/** The human-readable name of your secret. */
|
|
6750
6956
|
secret_name?: string;
|
|
@@ -6752,7 +6958,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6752
6958
|
* service_credentials, kv, and username_password.
|
|
6753
6959
|
*/
|
|
6754
6960
|
secret_type: PrivateCertificateVersion.Constants.SecretType | string;
|
|
6755
|
-
/** A
|
|
6961
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6756
6962
|
secret_group_id: string;
|
|
6757
6963
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
6758
6964
|
payload_available: boolean;
|
|
@@ -6762,7 +6968,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6762
6968
|
alias?: PrivateCertificateVersion.Constants.Alias | string;
|
|
6763
6969
|
/** The secret version metadata that a user can customize. */
|
|
6764
6970
|
version_custom_metadata?: JsonObject;
|
|
6765
|
-
/** A
|
|
6971
|
+
/** A UUID identifier. */
|
|
6766
6972
|
secret_id: string;
|
|
6767
6973
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
6768
6974
|
* types: Arbitrary, username_password.
|
|
@@ -6849,7 +7055,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6849
7055
|
* call to the service API.
|
|
6850
7056
|
*/
|
|
6851
7057
|
downloaded?: boolean;
|
|
6852
|
-
/** A
|
|
7058
|
+
/** A UUID identifier. */
|
|
6853
7059
|
id: string;
|
|
6854
7060
|
/** The human-readable name of your secret. */
|
|
6855
7061
|
secret_name?: string;
|
|
@@ -6857,7 +7063,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6857
7063
|
* service_credentials, kv, and username_password.
|
|
6858
7064
|
*/
|
|
6859
7065
|
secret_type: PrivateCertificateVersionMetadata.Constants.SecretType | string;
|
|
6860
|
-
/** A
|
|
7066
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6861
7067
|
secret_group_id: string;
|
|
6862
7068
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
6863
7069
|
payload_available: boolean;
|
|
@@ -6867,7 +7073,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6867
7073
|
alias?: PrivateCertificateVersionMetadata.Constants.Alias | string;
|
|
6868
7074
|
/** The secret version metadata that a user can customize. */
|
|
6869
7075
|
version_custom_metadata?: JsonObject;
|
|
6870
|
-
/** A
|
|
7076
|
+
/** A UUID identifier. */
|
|
6871
7077
|
secret_id: string;
|
|
6872
7078
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
6873
7079
|
* types: Arbitrary, username_password.
|
|
@@ -6931,7 +7137,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6931
7137
|
* call to the service API.
|
|
6932
7138
|
*/
|
|
6933
7139
|
downloaded?: boolean;
|
|
6934
|
-
/** A
|
|
7140
|
+
/** A UUID identifier. */
|
|
6935
7141
|
id: string;
|
|
6936
7142
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
6937
7143
|
*
|
|
@@ -6944,7 +7150,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6944
7150
|
locks_total?: number;
|
|
6945
7151
|
/** The human-readable name of your secret. */
|
|
6946
7152
|
name?: string;
|
|
6947
|
-
/** A
|
|
7153
|
+
/** A UUID identifier, or `default` secret group. */
|
|
6948
7154
|
secret_group_id: string;
|
|
6949
7155
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
6950
7156
|
* service_credentials, kv, and username_password.
|
|
@@ -6971,7 +7177,7 @@ declare namespace SecretsManagerV2 {
|
|
|
6971
7177
|
*/
|
|
6972
7178
|
alt_names?: string[];
|
|
6973
7179
|
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
6974
|
-
common_name
|
|
7180
|
+
common_name?: string;
|
|
6975
7181
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
6976
7182
|
* types: Arbitrary, username_password.
|
|
6977
7183
|
*/
|
|
@@ -7640,7 +7846,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7640
7846
|
* call to the service API.
|
|
7641
7847
|
*/
|
|
7642
7848
|
downloaded?: boolean;
|
|
7643
|
-
/** A
|
|
7849
|
+
/** A UUID identifier. */
|
|
7644
7850
|
id: string;
|
|
7645
7851
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
7646
7852
|
*
|
|
@@ -7653,7 +7859,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7653
7859
|
locks_total?: number;
|
|
7654
7860
|
/** The human-readable name of your secret. */
|
|
7655
7861
|
name?: string;
|
|
7656
|
-
/** A
|
|
7862
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7657
7863
|
secret_group_id: string;
|
|
7658
7864
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
7659
7865
|
* service_credentials, kv, and username_password.
|
|
@@ -7680,7 +7886,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7680
7886
|
*/
|
|
7681
7887
|
alt_names?: string[];
|
|
7682
7888
|
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
7683
|
-
common_name
|
|
7889
|
+
common_name?: string;
|
|
7684
7890
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7685
7891
|
* types: Arbitrary, username_password.
|
|
7686
7892
|
*/
|
|
@@ -7783,7 +7989,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7783
7989
|
* secret group.
|
|
7784
7990
|
*/
|
|
7785
7991
|
description?: string;
|
|
7786
|
-
/** A
|
|
7992
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7787
7993
|
secret_group_id?: string;
|
|
7788
7994
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
7789
7995
|
*
|
|
@@ -7793,7 +7999,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7793
7999
|
*/
|
|
7794
8000
|
labels?: string[];
|
|
7795
8001
|
/** The Common Name (CN) represents the server name protected by the SSL certificate. */
|
|
7796
|
-
common_name
|
|
8002
|
+
common_name?: string;
|
|
7797
8003
|
/** With the Subject Alternative Name field, you can specify additional hostnames to be protected by a single
|
|
7798
8004
|
* SSL certificate.
|
|
7799
8005
|
*/
|
|
@@ -7873,7 +8079,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7873
8079
|
* call to the service API.
|
|
7874
8080
|
*/
|
|
7875
8081
|
downloaded?: boolean;
|
|
7876
|
-
/** A
|
|
8082
|
+
/** A UUID identifier. */
|
|
7877
8083
|
id: string;
|
|
7878
8084
|
/** The human-readable name of your secret. */
|
|
7879
8085
|
secret_name?: string;
|
|
@@ -7881,7 +8087,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7881
8087
|
* service_credentials, kv, and username_password.
|
|
7882
8088
|
*/
|
|
7883
8089
|
secret_type: PublicCertificateVersion.Constants.SecretType | string;
|
|
7884
|
-
/** A
|
|
8090
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7885
8091
|
secret_group_id: string;
|
|
7886
8092
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
7887
8093
|
payload_available: boolean;
|
|
@@ -7891,7 +8097,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7891
8097
|
alias?: PublicCertificateVersion.Constants.Alias | string;
|
|
7892
8098
|
/** The secret version metadata that a user can customize. */
|
|
7893
8099
|
version_custom_metadata?: JsonObject;
|
|
7894
|
-
/** A
|
|
8100
|
+
/** A UUID identifier. */
|
|
7895
8101
|
secret_id: string;
|
|
7896
8102
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7897
8103
|
* types: Arbitrary, username_password.
|
|
@@ -7946,7 +8152,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7946
8152
|
* call to the service API.
|
|
7947
8153
|
*/
|
|
7948
8154
|
downloaded?: boolean;
|
|
7949
|
-
/** A
|
|
8155
|
+
/** A UUID identifier. */
|
|
7950
8156
|
id: string;
|
|
7951
8157
|
/** The human-readable name of your secret. */
|
|
7952
8158
|
secret_name?: string;
|
|
@@ -7954,7 +8160,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7954
8160
|
* service_credentials, kv, and username_password.
|
|
7955
8161
|
*/
|
|
7956
8162
|
secret_type: PublicCertificateVersionMetadata.Constants.SecretType | string;
|
|
7957
|
-
/** A
|
|
8163
|
+
/** A UUID identifier, or `default` secret group. */
|
|
7958
8164
|
secret_group_id: string;
|
|
7959
8165
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
7960
8166
|
payload_available: boolean;
|
|
@@ -7964,7 +8170,7 @@ declare namespace SecretsManagerV2 {
|
|
|
7964
8170
|
alias?: PublicCertificateVersionMetadata.Constants.Alias | string;
|
|
7965
8171
|
/** The secret version metadata that a user can customize. */
|
|
7966
8172
|
version_custom_metadata?: JsonObject;
|
|
7967
|
-
/** A
|
|
8173
|
+
/** A UUID identifier. */
|
|
7968
8174
|
secret_id: string;
|
|
7969
8175
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7970
8176
|
* types: Arbitrary, username_password.
|
|
@@ -8028,7 +8234,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8028
8234
|
* call to the service API.
|
|
8029
8235
|
*/
|
|
8030
8236
|
downloaded?: boolean;
|
|
8031
|
-
/** A
|
|
8237
|
+
/** A UUID identifier. */
|
|
8032
8238
|
id: string;
|
|
8033
8239
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8034
8240
|
*
|
|
@@ -8041,7 +8247,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8041
8247
|
locks_total?: number;
|
|
8042
8248
|
/** The human-readable name of your secret. */
|
|
8043
8249
|
name?: string;
|
|
8044
|
-
/** A
|
|
8250
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8045
8251
|
secret_group_id: string;
|
|
8046
8252
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8047
8253
|
* service_credentials, kv, and username_password.
|
|
@@ -8132,7 +8338,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8132
8338
|
* call to the service API.
|
|
8133
8339
|
*/
|
|
8134
8340
|
downloaded?: boolean;
|
|
8135
|
-
/** A
|
|
8341
|
+
/** A UUID identifier. */
|
|
8136
8342
|
id: string;
|
|
8137
8343
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8138
8344
|
*
|
|
@@ -8145,7 +8351,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8145
8351
|
locks_total?: number;
|
|
8146
8352
|
/** The human-readable name of your secret. */
|
|
8147
8353
|
name?: string;
|
|
8148
|
-
/** A
|
|
8354
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8149
8355
|
secret_group_id: string;
|
|
8150
8356
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8151
8357
|
* service_credentials, kv, and username_password.
|
|
@@ -8278,7 +8484,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8278
8484
|
* username_password, private_cert, public_cert, iam_credentials.
|
|
8279
8485
|
*/
|
|
8280
8486
|
rotation?: RotationPolicy;
|
|
8281
|
-
/** A
|
|
8487
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8282
8488
|
secret_group_id?: string;
|
|
8283
8489
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8284
8490
|
* service_credentials, kv, and username_password.
|
|
@@ -8329,7 +8535,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8329
8535
|
* call to the service API.
|
|
8330
8536
|
*/
|
|
8331
8537
|
downloaded?: boolean;
|
|
8332
|
-
/** A
|
|
8538
|
+
/** A UUID identifier. */
|
|
8333
8539
|
id: string;
|
|
8334
8540
|
/** The human-readable name of your secret. */
|
|
8335
8541
|
secret_name?: string;
|
|
@@ -8337,7 +8543,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8337
8543
|
* service_credentials, kv, and username_password.
|
|
8338
8544
|
*/
|
|
8339
8545
|
secret_type: ServiceCredentialsSecretVersion.Constants.SecretType | string;
|
|
8340
|
-
/** A
|
|
8546
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8341
8547
|
secret_group_id: string;
|
|
8342
8548
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8343
8549
|
payload_available: boolean;
|
|
@@ -8347,7 +8553,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8347
8553
|
alias?: ServiceCredentialsSecretVersion.Constants.Alias | string;
|
|
8348
8554
|
/** The secret version metadata that a user can customize. */
|
|
8349
8555
|
version_custom_metadata?: JsonObject;
|
|
8350
|
-
/** A
|
|
8556
|
+
/** A UUID identifier. */
|
|
8351
8557
|
secret_id: string;
|
|
8352
8558
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8353
8559
|
* types: Arbitrary, username_password.
|
|
@@ -8392,7 +8598,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8392
8598
|
* call to the service API.
|
|
8393
8599
|
*/
|
|
8394
8600
|
downloaded?: boolean;
|
|
8395
|
-
/** A
|
|
8601
|
+
/** A UUID identifier. */
|
|
8396
8602
|
id: string;
|
|
8397
8603
|
/** The human-readable name of your secret. */
|
|
8398
8604
|
secret_name?: string;
|
|
@@ -8400,7 +8606,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8400
8606
|
* service_credentials, kv, and username_password.
|
|
8401
8607
|
*/
|
|
8402
8608
|
secret_type: ServiceCredentialsSecretVersionMetadata.Constants.SecretType | string;
|
|
8403
|
-
/** A
|
|
8609
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8404
8610
|
secret_group_id: string;
|
|
8405
8611
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8406
8612
|
payload_available: boolean;
|
|
@@ -8410,7 +8616,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8410
8616
|
alias?: ServiceCredentialsSecretVersionMetadata.Constants.Alias | string;
|
|
8411
8617
|
/** The secret version metadata that a user can customize. */
|
|
8412
8618
|
version_custom_metadata?: JsonObject;
|
|
8413
|
-
/** A
|
|
8619
|
+
/** A UUID identifier. */
|
|
8414
8620
|
secret_id: string;
|
|
8415
8621
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8416
8622
|
* types: Arbitrary, username_password.
|
|
@@ -8470,7 +8676,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8470
8676
|
* call to the service API.
|
|
8471
8677
|
*/
|
|
8472
8678
|
downloaded?: boolean;
|
|
8473
|
-
/** A
|
|
8679
|
+
/** A UUID identifier. */
|
|
8474
8680
|
id: string;
|
|
8475
8681
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8476
8682
|
*
|
|
@@ -8483,7 +8689,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8483
8689
|
locks_total?: number;
|
|
8484
8690
|
/** The human-readable name of your secret. */
|
|
8485
8691
|
name?: string;
|
|
8486
|
-
/** A
|
|
8692
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8487
8693
|
secret_group_id: string;
|
|
8488
8694
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8489
8695
|
* service_credentials, kv, and username_password.
|
|
@@ -8567,7 +8773,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8567
8773
|
* call to the service API.
|
|
8568
8774
|
*/
|
|
8569
8775
|
downloaded?: boolean;
|
|
8570
|
-
/** A
|
|
8776
|
+
/** A UUID identifier. */
|
|
8571
8777
|
id: string;
|
|
8572
8778
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8573
8779
|
*
|
|
@@ -8580,7 +8786,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8580
8786
|
locks_total?: number;
|
|
8581
8787
|
/** The human-readable name of your secret. */
|
|
8582
8788
|
name?: string;
|
|
8583
|
-
/** A
|
|
8789
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8584
8790
|
secret_group_id: string;
|
|
8585
8791
|
/** The secret type. Supported types are arbitrary, imported_cert, public_cert, private_cert, iam_credentials,
|
|
8586
8792
|
* service_credentials, kv, and username_password.
|
|
@@ -8694,7 +8900,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8694
8900
|
* secret group.
|
|
8695
8901
|
*/
|
|
8696
8902
|
description?: string;
|
|
8697
|
-
/** A
|
|
8903
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8698
8904
|
secret_group_id?: string;
|
|
8699
8905
|
/** Labels that you can use to search secrets in your instance. Only 30 labels can be created.
|
|
8700
8906
|
*
|
|
@@ -8753,7 +8959,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8753
8959
|
* call to the service API.
|
|
8754
8960
|
*/
|
|
8755
8961
|
downloaded?: boolean;
|
|
8756
|
-
/** A
|
|
8962
|
+
/** A UUID identifier. */
|
|
8757
8963
|
id: string;
|
|
8758
8964
|
/** The human-readable name of your secret. */
|
|
8759
8965
|
secret_name?: string;
|
|
@@ -8761,7 +8967,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8761
8967
|
* service_credentials, kv, and username_password.
|
|
8762
8968
|
*/
|
|
8763
8969
|
secret_type: UsernamePasswordSecretVersion.Constants.SecretType | string;
|
|
8764
|
-
/** A
|
|
8970
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8765
8971
|
secret_group_id: string;
|
|
8766
8972
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8767
8973
|
payload_available: boolean;
|
|
@@ -8771,7 +8977,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8771
8977
|
alias?: UsernamePasswordSecretVersion.Constants.Alias | string;
|
|
8772
8978
|
/** The secret version metadata that a user can customize. */
|
|
8773
8979
|
version_custom_metadata?: JsonObject;
|
|
8774
|
-
/** A
|
|
8980
|
+
/** A UUID identifier. */
|
|
8775
8981
|
secret_id: string;
|
|
8776
8982
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8777
8983
|
* types: Arbitrary, username_password.
|
|
@@ -8816,7 +9022,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8816
9022
|
* call to the service API.
|
|
8817
9023
|
*/
|
|
8818
9024
|
downloaded?: boolean;
|
|
8819
|
-
/** A
|
|
9025
|
+
/** A UUID identifier. */
|
|
8820
9026
|
id: string;
|
|
8821
9027
|
/** The human-readable name of your secret. */
|
|
8822
9028
|
secret_name?: string;
|
|
@@ -8824,7 +9030,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8824
9030
|
* service_credentials, kv, and username_password.
|
|
8825
9031
|
*/
|
|
8826
9032
|
secret_type: UsernamePasswordSecretVersionMetadata.Constants.SecretType | string;
|
|
8827
|
-
/** A
|
|
9033
|
+
/** A UUID identifier, or `default` secret group. */
|
|
8828
9034
|
secret_group_id: string;
|
|
8829
9035
|
/** Indicates whether the secret payload is available in this secret version. */
|
|
8830
9036
|
payload_available: boolean;
|
|
@@ -8834,7 +9040,7 @@ declare namespace SecretsManagerV2 {
|
|
|
8834
9040
|
alias?: UsernamePasswordSecretVersionMetadata.Constants.Alias | string;
|
|
8835
9041
|
/** The secret version metadata that a user can customize. */
|
|
8836
9042
|
version_custom_metadata?: JsonObject;
|
|
8837
|
-
/** A
|
|
9043
|
+
/** A UUID identifier. */
|
|
8838
9044
|
secret_id: string;
|
|
8839
9045
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
8840
9046
|
* types: Arbitrary, username_password.
|