@maxim_mazurok/gapi.client.privateca-v1 0.0.20220804
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +2858 -0
- package/package.json +20 -0
- package/readme.md +68 -0
- package/tests.ts +1798 -0
- package/tsconfig.json +18 -0
- package/tslint.json +6 -0
package/tests.ts
ADDED
|
@@ -0,0 +1,1798 @@
|
|
|
1
|
+
/* This is stub file for gapi.client.privateca-v1 definition tests */
|
|
2
|
+
// IMPORTANT
|
|
3
|
+
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
4
|
+
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
5
|
+
|
|
6
|
+
// Revision: 20220804
|
|
7
|
+
|
|
8
|
+
gapi.load('client', async () => {
|
|
9
|
+
/** now we can use gapi.client */
|
|
10
|
+
|
|
11
|
+
await gapi.client.load('https://privateca.googleapis.com/$discovery/rest?version=v1');
|
|
12
|
+
/** now we can use gapi.client.privateca */
|
|
13
|
+
|
|
14
|
+
/** don't forget to authenticate your client before sending any request to resources: */
|
|
15
|
+
/** declare client_id registered in Google Developers Console */
|
|
16
|
+
const client_id = '<<PUT YOUR CLIENT ID HERE>>';
|
|
17
|
+
const scope = [
|
|
18
|
+
/** See, edit, configure, and delete your Google Cloud data and see the email address for your Google Account. */
|
|
19
|
+
'https://www.googleapis.com/auth/cloud-platform',
|
|
20
|
+
];
|
|
21
|
+
const immediate = false;
|
|
22
|
+
gapi.auth.authorize({ client_id, scope, immediate }, authResult => {
|
|
23
|
+
if (authResult && !authResult.error) {
|
|
24
|
+
/** handle successful authorization */
|
|
25
|
+
run();
|
|
26
|
+
} else {
|
|
27
|
+
/** handle authorization error */
|
|
28
|
+
}
|
|
29
|
+
});
|
|
30
|
+
|
|
31
|
+
async function run() {
|
|
32
|
+
/** Gets information about a location. */
|
|
33
|
+
await gapi.client.privateca.projects.locations.get({
|
|
34
|
+
name: "Test string",
|
|
35
|
+
});
|
|
36
|
+
/** Lists information about the supported locations for this service. */
|
|
37
|
+
await gapi.client.privateca.projects.locations.list({
|
|
38
|
+
filter: "Test string",
|
|
39
|
+
name: "Test string",
|
|
40
|
+
pageSize: 42,
|
|
41
|
+
pageToken: "Test string",
|
|
42
|
+
});
|
|
43
|
+
/** Create a CaPool. */
|
|
44
|
+
await gapi.client.privateca.projects.locations.caPools.create({
|
|
45
|
+
caPoolId: "Test string",
|
|
46
|
+
parent: "Test string",
|
|
47
|
+
requestId: "Test string",
|
|
48
|
+
}, {
|
|
49
|
+
issuancePolicy: {
|
|
50
|
+
allowedIssuanceModes: {
|
|
51
|
+
allowConfigBasedIssuance: true,
|
|
52
|
+
allowCsrBasedIssuance: true,
|
|
53
|
+
},
|
|
54
|
+
allowedKeyTypes: [
|
|
55
|
+
{
|
|
56
|
+
ellipticCurve: {
|
|
57
|
+
signatureAlgorithm: "Test string",
|
|
58
|
+
},
|
|
59
|
+
rsa: {
|
|
60
|
+
maxModulusSize: "Test string",
|
|
61
|
+
minModulusSize: "Test string",
|
|
62
|
+
},
|
|
63
|
+
}
|
|
64
|
+
],
|
|
65
|
+
baselineValues: {
|
|
66
|
+
additionalExtensions: [
|
|
67
|
+
{
|
|
68
|
+
critical: true,
|
|
69
|
+
objectId: {
|
|
70
|
+
objectIdPath: [
|
|
71
|
+
42
|
|
72
|
+
],
|
|
73
|
+
},
|
|
74
|
+
value: "Test string",
|
|
75
|
+
}
|
|
76
|
+
],
|
|
77
|
+
aiaOcspServers: [
|
|
78
|
+
"Test string"
|
|
79
|
+
],
|
|
80
|
+
caOptions: {
|
|
81
|
+
isCa: true,
|
|
82
|
+
maxIssuerPathLength: 42,
|
|
83
|
+
},
|
|
84
|
+
keyUsage: {
|
|
85
|
+
baseKeyUsage: {
|
|
86
|
+
certSign: true,
|
|
87
|
+
contentCommitment: true,
|
|
88
|
+
crlSign: true,
|
|
89
|
+
dataEncipherment: true,
|
|
90
|
+
decipherOnly: true,
|
|
91
|
+
digitalSignature: true,
|
|
92
|
+
encipherOnly: true,
|
|
93
|
+
keyAgreement: true,
|
|
94
|
+
keyEncipherment: true,
|
|
95
|
+
},
|
|
96
|
+
extendedKeyUsage: {
|
|
97
|
+
clientAuth: true,
|
|
98
|
+
codeSigning: true,
|
|
99
|
+
emailProtection: true,
|
|
100
|
+
ocspSigning: true,
|
|
101
|
+
serverAuth: true,
|
|
102
|
+
timeStamping: true,
|
|
103
|
+
},
|
|
104
|
+
unknownExtendedKeyUsages: [
|
|
105
|
+
{
|
|
106
|
+
objectIdPath: [
|
|
107
|
+
42
|
|
108
|
+
],
|
|
109
|
+
}
|
|
110
|
+
],
|
|
111
|
+
},
|
|
112
|
+
policyIds: [
|
|
113
|
+
{
|
|
114
|
+
objectIdPath: [
|
|
115
|
+
42
|
|
116
|
+
],
|
|
117
|
+
}
|
|
118
|
+
],
|
|
119
|
+
},
|
|
120
|
+
identityConstraints: {
|
|
121
|
+
allowSubjectAltNamesPassthrough: true,
|
|
122
|
+
allowSubjectPassthrough: true,
|
|
123
|
+
celExpression: {
|
|
124
|
+
description: "Test string",
|
|
125
|
+
expression: "Test string",
|
|
126
|
+
location: "Test string",
|
|
127
|
+
title: "Test string",
|
|
128
|
+
},
|
|
129
|
+
},
|
|
130
|
+
maximumLifetime: "Test string",
|
|
131
|
+
passthroughExtensions: {
|
|
132
|
+
additionalExtensions: [
|
|
133
|
+
{
|
|
134
|
+
objectIdPath: [
|
|
135
|
+
42
|
|
136
|
+
],
|
|
137
|
+
}
|
|
138
|
+
],
|
|
139
|
+
knownExtensions: [
|
|
140
|
+
"Test string"
|
|
141
|
+
],
|
|
142
|
+
},
|
|
143
|
+
},
|
|
144
|
+
labels: {
|
|
145
|
+
A: "Test string"
|
|
146
|
+
},
|
|
147
|
+
name: "Test string",
|
|
148
|
+
publishingOptions: {
|
|
149
|
+
publishCaCert: true,
|
|
150
|
+
publishCrl: true,
|
|
151
|
+
},
|
|
152
|
+
tier: "Test string",
|
|
153
|
+
});
|
|
154
|
+
/** Delete a CaPool. */
|
|
155
|
+
await gapi.client.privateca.projects.locations.caPools.delete({
|
|
156
|
+
name: "Test string",
|
|
157
|
+
requestId: "Test string",
|
|
158
|
+
});
|
|
159
|
+
/** FetchCaCerts returns the current trust anchor for the CaPool. This will include CA certificate chains for all ACTIVE CertificateAuthority resources in the CaPool. */
|
|
160
|
+
await gapi.client.privateca.projects.locations.caPools.fetchCaCerts({
|
|
161
|
+
caPool: "Test string",
|
|
162
|
+
}, {
|
|
163
|
+
requestId: "Test string",
|
|
164
|
+
});
|
|
165
|
+
/** Returns a CaPool. */
|
|
166
|
+
await gapi.client.privateca.projects.locations.caPools.get({
|
|
167
|
+
name: "Test string",
|
|
168
|
+
});
|
|
169
|
+
/** Gets the access control policy for a resource. Returns an empty policy if the resource exists and does not have a policy set. */
|
|
170
|
+
await gapi.client.privateca.projects.locations.caPools.getIamPolicy({
|
|
171
|
+
"options.requestedPolicyVersion": 42,
|
|
172
|
+
resource: "Test string",
|
|
173
|
+
});
|
|
174
|
+
/** Lists CaPools. */
|
|
175
|
+
await gapi.client.privateca.projects.locations.caPools.list({
|
|
176
|
+
filter: "Test string",
|
|
177
|
+
orderBy: "Test string",
|
|
178
|
+
pageSize: 42,
|
|
179
|
+
pageToken: "Test string",
|
|
180
|
+
parent: "Test string",
|
|
181
|
+
});
|
|
182
|
+
/** Update a CaPool. */
|
|
183
|
+
await gapi.client.privateca.projects.locations.caPools.patch({
|
|
184
|
+
name: "Test string",
|
|
185
|
+
requestId: "Test string",
|
|
186
|
+
updateMask: "Test string",
|
|
187
|
+
}, {
|
|
188
|
+
issuancePolicy: {
|
|
189
|
+
allowedIssuanceModes: {
|
|
190
|
+
allowConfigBasedIssuance: true,
|
|
191
|
+
allowCsrBasedIssuance: true,
|
|
192
|
+
},
|
|
193
|
+
allowedKeyTypes: [
|
|
194
|
+
{
|
|
195
|
+
ellipticCurve: {
|
|
196
|
+
signatureAlgorithm: "Test string",
|
|
197
|
+
},
|
|
198
|
+
rsa: {
|
|
199
|
+
maxModulusSize: "Test string",
|
|
200
|
+
minModulusSize: "Test string",
|
|
201
|
+
},
|
|
202
|
+
}
|
|
203
|
+
],
|
|
204
|
+
baselineValues: {
|
|
205
|
+
additionalExtensions: [
|
|
206
|
+
{
|
|
207
|
+
critical: true,
|
|
208
|
+
objectId: {
|
|
209
|
+
objectIdPath: [
|
|
210
|
+
42
|
|
211
|
+
],
|
|
212
|
+
},
|
|
213
|
+
value: "Test string",
|
|
214
|
+
}
|
|
215
|
+
],
|
|
216
|
+
aiaOcspServers: [
|
|
217
|
+
"Test string"
|
|
218
|
+
],
|
|
219
|
+
caOptions: {
|
|
220
|
+
isCa: true,
|
|
221
|
+
maxIssuerPathLength: 42,
|
|
222
|
+
},
|
|
223
|
+
keyUsage: {
|
|
224
|
+
baseKeyUsage: {
|
|
225
|
+
certSign: true,
|
|
226
|
+
contentCommitment: true,
|
|
227
|
+
crlSign: true,
|
|
228
|
+
dataEncipherment: true,
|
|
229
|
+
decipherOnly: true,
|
|
230
|
+
digitalSignature: true,
|
|
231
|
+
encipherOnly: true,
|
|
232
|
+
keyAgreement: true,
|
|
233
|
+
keyEncipherment: true,
|
|
234
|
+
},
|
|
235
|
+
extendedKeyUsage: {
|
|
236
|
+
clientAuth: true,
|
|
237
|
+
codeSigning: true,
|
|
238
|
+
emailProtection: true,
|
|
239
|
+
ocspSigning: true,
|
|
240
|
+
serverAuth: true,
|
|
241
|
+
timeStamping: true,
|
|
242
|
+
},
|
|
243
|
+
unknownExtendedKeyUsages: [
|
|
244
|
+
{
|
|
245
|
+
objectIdPath: [
|
|
246
|
+
42
|
|
247
|
+
],
|
|
248
|
+
}
|
|
249
|
+
],
|
|
250
|
+
},
|
|
251
|
+
policyIds: [
|
|
252
|
+
{
|
|
253
|
+
objectIdPath: [
|
|
254
|
+
42
|
|
255
|
+
],
|
|
256
|
+
}
|
|
257
|
+
],
|
|
258
|
+
},
|
|
259
|
+
identityConstraints: {
|
|
260
|
+
allowSubjectAltNamesPassthrough: true,
|
|
261
|
+
allowSubjectPassthrough: true,
|
|
262
|
+
celExpression: {
|
|
263
|
+
description: "Test string",
|
|
264
|
+
expression: "Test string",
|
|
265
|
+
location: "Test string",
|
|
266
|
+
title: "Test string",
|
|
267
|
+
},
|
|
268
|
+
},
|
|
269
|
+
maximumLifetime: "Test string",
|
|
270
|
+
passthroughExtensions: {
|
|
271
|
+
additionalExtensions: [
|
|
272
|
+
{
|
|
273
|
+
objectIdPath: [
|
|
274
|
+
42
|
|
275
|
+
],
|
|
276
|
+
}
|
|
277
|
+
],
|
|
278
|
+
knownExtensions: [
|
|
279
|
+
"Test string"
|
|
280
|
+
],
|
|
281
|
+
},
|
|
282
|
+
},
|
|
283
|
+
labels: {
|
|
284
|
+
A: "Test string"
|
|
285
|
+
},
|
|
286
|
+
name: "Test string",
|
|
287
|
+
publishingOptions: {
|
|
288
|
+
publishCaCert: true,
|
|
289
|
+
publishCrl: true,
|
|
290
|
+
},
|
|
291
|
+
tier: "Test string",
|
|
292
|
+
});
|
|
293
|
+
/** Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors. */
|
|
294
|
+
await gapi.client.privateca.projects.locations.caPools.setIamPolicy({
|
|
295
|
+
resource: "Test string",
|
|
296
|
+
}, {
|
|
297
|
+
policy: {
|
|
298
|
+
auditConfigs: [
|
|
299
|
+
{
|
|
300
|
+
auditLogConfigs: [
|
|
301
|
+
{
|
|
302
|
+
exemptedMembers: [
|
|
303
|
+
"Test string"
|
|
304
|
+
],
|
|
305
|
+
logType: "Test string",
|
|
306
|
+
}
|
|
307
|
+
],
|
|
308
|
+
service: "Test string",
|
|
309
|
+
}
|
|
310
|
+
],
|
|
311
|
+
bindings: [
|
|
312
|
+
{
|
|
313
|
+
condition: {
|
|
314
|
+
description: "Test string",
|
|
315
|
+
expression: "Test string",
|
|
316
|
+
location: "Test string",
|
|
317
|
+
title: "Test string",
|
|
318
|
+
},
|
|
319
|
+
members: [
|
|
320
|
+
"Test string"
|
|
321
|
+
],
|
|
322
|
+
role: "Test string",
|
|
323
|
+
}
|
|
324
|
+
],
|
|
325
|
+
etag: "Test string",
|
|
326
|
+
version: 42,
|
|
327
|
+
},
|
|
328
|
+
updateMask: "Test string",
|
|
329
|
+
});
|
|
330
|
+
/**
|
|
331
|
+
* Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This
|
|
332
|
+
* operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning.
|
|
333
|
+
*/
|
|
334
|
+
await gapi.client.privateca.projects.locations.caPools.testIamPermissions({
|
|
335
|
+
resource: "Test string",
|
|
336
|
+
}, {
|
|
337
|
+
permissions: [
|
|
338
|
+
"Test string"
|
|
339
|
+
],
|
|
340
|
+
});
|
|
341
|
+
/**
|
|
342
|
+
* Activate a CertificateAuthority that is in state AWAITING_USER_ACTIVATION and is of type SUBORDINATE. After the parent Certificate Authority signs a certificate signing request from
|
|
343
|
+
* FetchCertificateAuthorityCsr, this method can complete the activation process.
|
|
344
|
+
*/
|
|
345
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.activate({
|
|
346
|
+
name: "Test string",
|
|
347
|
+
}, {
|
|
348
|
+
pemCaCertificate: "Test string",
|
|
349
|
+
requestId: "Test string",
|
|
350
|
+
subordinateConfig: {
|
|
351
|
+
certificateAuthority: "Test string",
|
|
352
|
+
pemIssuerChain: {
|
|
353
|
+
pemCertificates: [
|
|
354
|
+
"Test string"
|
|
355
|
+
],
|
|
356
|
+
},
|
|
357
|
+
},
|
|
358
|
+
});
|
|
359
|
+
/** Create a new CertificateAuthority in a given Project and Location. */
|
|
360
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.create({
|
|
361
|
+
certificateAuthorityId: "Test string",
|
|
362
|
+
parent: "Test string",
|
|
363
|
+
requestId: "Test string",
|
|
364
|
+
}, {
|
|
365
|
+
accessUrls: {
|
|
366
|
+
caCertificateAccessUrl: "Test string",
|
|
367
|
+
crlAccessUrls: [
|
|
368
|
+
"Test string"
|
|
369
|
+
],
|
|
370
|
+
},
|
|
371
|
+
caCertificateDescriptions: [
|
|
372
|
+
{
|
|
373
|
+
aiaIssuingCertificateUrls: [
|
|
374
|
+
"Test string"
|
|
375
|
+
],
|
|
376
|
+
authorityKeyId: {
|
|
377
|
+
keyId: "Test string",
|
|
378
|
+
},
|
|
379
|
+
certFingerprint: {
|
|
380
|
+
sha256Hash: "Test string",
|
|
381
|
+
},
|
|
382
|
+
crlDistributionPoints: [
|
|
383
|
+
"Test string"
|
|
384
|
+
],
|
|
385
|
+
publicKey: {
|
|
386
|
+
format: "Test string",
|
|
387
|
+
key: "Test string",
|
|
388
|
+
},
|
|
389
|
+
subjectDescription: {
|
|
390
|
+
hexSerialNumber: "Test string",
|
|
391
|
+
lifetime: "Test string",
|
|
392
|
+
notAfterTime: "Test string",
|
|
393
|
+
notBeforeTime: "Test string",
|
|
394
|
+
subject: {
|
|
395
|
+
commonName: "Test string",
|
|
396
|
+
countryCode: "Test string",
|
|
397
|
+
locality: "Test string",
|
|
398
|
+
organization: "Test string",
|
|
399
|
+
organizationalUnit: "Test string",
|
|
400
|
+
postalCode: "Test string",
|
|
401
|
+
province: "Test string",
|
|
402
|
+
streetAddress: "Test string",
|
|
403
|
+
},
|
|
404
|
+
subjectAltName: {
|
|
405
|
+
customSans: [
|
|
406
|
+
{
|
|
407
|
+
critical: true,
|
|
408
|
+
objectId: {
|
|
409
|
+
objectIdPath: [
|
|
410
|
+
42
|
|
411
|
+
],
|
|
412
|
+
},
|
|
413
|
+
value: "Test string",
|
|
414
|
+
}
|
|
415
|
+
],
|
|
416
|
+
dnsNames: [
|
|
417
|
+
"Test string"
|
|
418
|
+
],
|
|
419
|
+
emailAddresses: [
|
|
420
|
+
"Test string"
|
|
421
|
+
],
|
|
422
|
+
ipAddresses: [
|
|
423
|
+
"Test string"
|
|
424
|
+
],
|
|
425
|
+
uris: [
|
|
426
|
+
"Test string"
|
|
427
|
+
],
|
|
428
|
+
},
|
|
429
|
+
},
|
|
430
|
+
subjectKeyId: {
|
|
431
|
+
keyId: "Test string",
|
|
432
|
+
},
|
|
433
|
+
x509Description: {
|
|
434
|
+
additionalExtensions: [
|
|
435
|
+
{
|
|
436
|
+
critical: true,
|
|
437
|
+
objectId: {
|
|
438
|
+
objectIdPath: [
|
|
439
|
+
42
|
|
440
|
+
],
|
|
441
|
+
},
|
|
442
|
+
value: "Test string",
|
|
443
|
+
}
|
|
444
|
+
],
|
|
445
|
+
aiaOcspServers: [
|
|
446
|
+
"Test string"
|
|
447
|
+
],
|
|
448
|
+
caOptions: {
|
|
449
|
+
isCa: true,
|
|
450
|
+
maxIssuerPathLength: 42,
|
|
451
|
+
},
|
|
452
|
+
keyUsage: {
|
|
453
|
+
baseKeyUsage: {
|
|
454
|
+
certSign: true,
|
|
455
|
+
contentCommitment: true,
|
|
456
|
+
crlSign: true,
|
|
457
|
+
dataEncipherment: true,
|
|
458
|
+
decipherOnly: true,
|
|
459
|
+
digitalSignature: true,
|
|
460
|
+
encipherOnly: true,
|
|
461
|
+
keyAgreement: true,
|
|
462
|
+
keyEncipherment: true,
|
|
463
|
+
},
|
|
464
|
+
extendedKeyUsage: {
|
|
465
|
+
clientAuth: true,
|
|
466
|
+
codeSigning: true,
|
|
467
|
+
emailProtection: true,
|
|
468
|
+
ocspSigning: true,
|
|
469
|
+
serverAuth: true,
|
|
470
|
+
timeStamping: true,
|
|
471
|
+
},
|
|
472
|
+
unknownExtendedKeyUsages: [
|
|
473
|
+
{
|
|
474
|
+
objectIdPath: [
|
|
475
|
+
42
|
|
476
|
+
],
|
|
477
|
+
}
|
|
478
|
+
],
|
|
479
|
+
},
|
|
480
|
+
policyIds: [
|
|
481
|
+
{
|
|
482
|
+
objectIdPath: [
|
|
483
|
+
42
|
|
484
|
+
],
|
|
485
|
+
}
|
|
486
|
+
],
|
|
487
|
+
},
|
|
488
|
+
}
|
|
489
|
+
],
|
|
490
|
+
config: {
|
|
491
|
+
publicKey: {
|
|
492
|
+
format: "Test string",
|
|
493
|
+
key: "Test string",
|
|
494
|
+
},
|
|
495
|
+
subjectConfig: {
|
|
496
|
+
subject: {
|
|
497
|
+
commonName: "Test string",
|
|
498
|
+
countryCode: "Test string",
|
|
499
|
+
locality: "Test string",
|
|
500
|
+
organization: "Test string",
|
|
501
|
+
organizationalUnit: "Test string",
|
|
502
|
+
postalCode: "Test string",
|
|
503
|
+
province: "Test string",
|
|
504
|
+
streetAddress: "Test string",
|
|
505
|
+
},
|
|
506
|
+
subjectAltName: {
|
|
507
|
+
customSans: [
|
|
508
|
+
{
|
|
509
|
+
critical: true,
|
|
510
|
+
objectId: {
|
|
511
|
+
objectIdPath: [
|
|
512
|
+
42
|
|
513
|
+
],
|
|
514
|
+
},
|
|
515
|
+
value: "Test string",
|
|
516
|
+
}
|
|
517
|
+
],
|
|
518
|
+
dnsNames: [
|
|
519
|
+
"Test string"
|
|
520
|
+
],
|
|
521
|
+
emailAddresses: [
|
|
522
|
+
"Test string"
|
|
523
|
+
],
|
|
524
|
+
ipAddresses: [
|
|
525
|
+
"Test string"
|
|
526
|
+
],
|
|
527
|
+
uris: [
|
|
528
|
+
"Test string"
|
|
529
|
+
],
|
|
530
|
+
},
|
|
531
|
+
},
|
|
532
|
+
x509Config: {
|
|
533
|
+
additionalExtensions: [
|
|
534
|
+
{
|
|
535
|
+
critical: true,
|
|
536
|
+
objectId: {
|
|
537
|
+
objectIdPath: [
|
|
538
|
+
42
|
|
539
|
+
],
|
|
540
|
+
},
|
|
541
|
+
value: "Test string",
|
|
542
|
+
}
|
|
543
|
+
],
|
|
544
|
+
aiaOcspServers: [
|
|
545
|
+
"Test string"
|
|
546
|
+
],
|
|
547
|
+
caOptions: {
|
|
548
|
+
isCa: true,
|
|
549
|
+
maxIssuerPathLength: 42,
|
|
550
|
+
},
|
|
551
|
+
keyUsage: {
|
|
552
|
+
baseKeyUsage: {
|
|
553
|
+
certSign: true,
|
|
554
|
+
contentCommitment: true,
|
|
555
|
+
crlSign: true,
|
|
556
|
+
dataEncipherment: true,
|
|
557
|
+
decipherOnly: true,
|
|
558
|
+
digitalSignature: true,
|
|
559
|
+
encipherOnly: true,
|
|
560
|
+
keyAgreement: true,
|
|
561
|
+
keyEncipherment: true,
|
|
562
|
+
},
|
|
563
|
+
extendedKeyUsage: {
|
|
564
|
+
clientAuth: true,
|
|
565
|
+
codeSigning: true,
|
|
566
|
+
emailProtection: true,
|
|
567
|
+
ocspSigning: true,
|
|
568
|
+
serverAuth: true,
|
|
569
|
+
timeStamping: true,
|
|
570
|
+
},
|
|
571
|
+
unknownExtendedKeyUsages: [
|
|
572
|
+
{
|
|
573
|
+
objectIdPath: [
|
|
574
|
+
42
|
|
575
|
+
],
|
|
576
|
+
}
|
|
577
|
+
],
|
|
578
|
+
},
|
|
579
|
+
policyIds: [
|
|
580
|
+
{
|
|
581
|
+
objectIdPath: [
|
|
582
|
+
42
|
|
583
|
+
],
|
|
584
|
+
}
|
|
585
|
+
],
|
|
586
|
+
},
|
|
587
|
+
},
|
|
588
|
+
createTime: "Test string",
|
|
589
|
+
deleteTime: "Test string",
|
|
590
|
+
expireTime: "Test string",
|
|
591
|
+
gcsBucket: "Test string",
|
|
592
|
+
keySpec: {
|
|
593
|
+
algorithm: "Test string",
|
|
594
|
+
cloudKmsKeyVersion: "Test string",
|
|
595
|
+
},
|
|
596
|
+
labels: {
|
|
597
|
+
A: "Test string"
|
|
598
|
+
},
|
|
599
|
+
lifetime: "Test string",
|
|
600
|
+
name: "Test string",
|
|
601
|
+
pemCaCertificates: [
|
|
602
|
+
"Test string"
|
|
603
|
+
],
|
|
604
|
+
state: "Test string",
|
|
605
|
+
subordinateConfig: {
|
|
606
|
+
certificateAuthority: "Test string",
|
|
607
|
+
pemIssuerChain: {
|
|
608
|
+
pemCertificates: [
|
|
609
|
+
"Test string"
|
|
610
|
+
],
|
|
611
|
+
},
|
|
612
|
+
},
|
|
613
|
+
tier: "Test string",
|
|
614
|
+
type: "Test string",
|
|
615
|
+
updateTime: "Test string",
|
|
616
|
+
});
|
|
617
|
+
/** Delete a CertificateAuthority. */
|
|
618
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.delete({
|
|
619
|
+
ignoreActiveCertificates: true,
|
|
620
|
+
name: "Test string",
|
|
621
|
+
requestId: "Test string",
|
|
622
|
+
skipGracePeriod: true,
|
|
623
|
+
});
|
|
624
|
+
/** Disable a CertificateAuthority. */
|
|
625
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.disable({
|
|
626
|
+
name: "Test string",
|
|
627
|
+
}, {
|
|
628
|
+
requestId: "Test string",
|
|
629
|
+
});
|
|
630
|
+
/** Enable a CertificateAuthority. */
|
|
631
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.enable({
|
|
632
|
+
name: "Test string",
|
|
633
|
+
}, {
|
|
634
|
+
requestId: "Test string",
|
|
635
|
+
});
|
|
636
|
+
/**
|
|
637
|
+
* Fetch a certificate signing request (CSR) from a CertificateAuthority that is in state AWAITING_USER_ACTIVATION and is of type SUBORDINATE. The CSR must then be signed by the desired
|
|
638
|
+
* parent Certificate Authority, which could be another CertificateAuthority resource, or could be an on-prem certificate authority. See also ActivateCertificateAuthority.
|
|
639
|
+
*/
|
|
640
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.fetch({
|
|
641
|
+
name: "Test string",
|
|
642
|
+
});
|
|
643
|
+
/** Returns a CertificateAuthority. */
|
|
644
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.get({
|
|
645
|
+
name: "Test string",
|
|
646
|
+
});
|
|
647
|
+
/** Lists CertificateAuthorities. */
|
|
648
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.list({
|
|
649
|
+
filter: "Test string",
|
|
650
|
+
orderBy: "Test string",
|
|
651
|
+
pageSize: 42,
|
|
652
|
+
pageToken: "Test string",
|
|
653
|
+
parent: "Test string",
|
|
654
|
+
});
|
|
655
|
+
/** Update a CertificateAuthority. */
|
|
656
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.patch({
|
|
657
|
+
name: "Test string",
|
|
658
|
+
requestId: "Test string",
|
|
659
|
+
updateMask: "Test string",
|
|
660
|
+
}, {
|
|
661
|
+
accessUrls: {
|
|
662
|
+
caCertificateAccessUrl: "Test string",
|
|
663
|
+
crlAccessUrls: [
|
|
664
|
+
"Test string"
|
|
665
|
+
],
|
|
666
|
+
},
|
|
667
|
+
caCertificateDescriptions: [
|
|
668
|
+
{
|
|
669
|
+
aiaIssuingCertificateUrls: [
|
|
670
|
+
"Test string"
|
|
671
|
+
],
|
|
672
|
+
authorityKeyId: {
|
|
673
|
+
keyId: "Test string",
|
|
674
|
+
},
|
|
675
|
+
certFingerprint: {
|
|
676
|
+
sha256Hash: "Test string",
|
|
677
|
+
},
|
|
678
|
+
crlDistributionPoints: [
|
|
679
|
+
"Test string"
|
|
680
|
+
],
|
|
681
|
+
publicKey: {
|
|
682
|
+
format: "Test string",
|
|
683
|
+
key: "Test string",
|
|
684
|
+
},
|
|
685
|
+
subjectDescription: {
|
|
686
|
+
hexSerialNumber: "Test string",
|
|
687
|
+
lifetime: "Test string",
|
|
688
|
+
notAfterTime: "Test string",
|
|
689
|
+
notBeforeTime: "Test string",
|
|
690
|
+
subject: {
|
|
691
|
+
commonName: "Test string",
|
|
692
|
+
countryCode: "Test string",
|
|
693
|
+
locality: "Test string",
|
|
694
|
+
organization: "Test string",
|
|
695
|
+
organizationalUnit: "Test string",
|
|
696
|
+
postalCode: "Test string",
|
|
697
|
+
province: "Test string",
|
|
698
|
+
streetAddress: "Test string",
|
|
699
|
+
},
|
|
700
|
+
subjectAltName: {
|
|
701
|
+
customSans: [
|
|
702
|
+
{
|
|
703
|
+
critical: true,
|
|
704
|
+
objectId: {
|
|
705
|
+
objectIdPath: [
|
|
706
|
+
42
|
|
707
|
+
],
|
|
708
|
+
},
|
|
709
|
+
value: "Test string",
|
|
710
|
+
}
|
|
711
|
+
],
|
|
712
|
+
dnsNames: [
|
|
713
|
+
"Test string"
|
|
714
|
+
],
|
|
715
|
+
emailAddresses: [
|
|
716
|
+
"Test string"
|
|
717
|
+
],
|
|
718
|
+
ipAddresses: [
|
|
719
|
+
"Test string"
|
|
720
|
+
],
|
|
721
|
+
uris: [
|
|
722
|
+
"Test string"
|
|
723
|
+
],
|
|
724
|
+
},
|
|
725
|
+
},
|
|
726
|
+
subjectKeyId: {
|
|
727
|
+
keyId: "Test string",
|
|
728
|
+
},
|
|
729
|
+
x509Description: {
|
|
730
|
+
additionalExtensions: [
|
|
731
|
+
{
|
|
732
|
+
critical: true,
|
|
733
|
+
objectId: {
|
|
734
|
+
objectIdPath: [
|
|
735
|
+
42
|
|
736
|
+
],
|
|
737
|
+
},
|
|
738
|
+
value: "Test string",
|
|
739
|
+
}
|
|
740
|
+
],
|
|
741
|
+
aiaOcspServers: [
|
|
742
|
+
"Test string"
|
|
743
|
+
],
|
|
744
|
+
caOptions: {
|
|
745
|
+
isCa: true,
|
|
746
|
+
maxIssuerPathLength: 42,
|
|
747
|
+
},
|
|
748
|
+
keyUsage: {
|
|
749
|
+
baseKeyUsage: {
|
|
750
|
+
certSign: true,
|
|
751
|
+
contentCommitment: true,
|
|
752
|
+
crlSign: true,
|
|
753
|
+
dataEncipherment: true,
|
|
754
|
+
decipherOnly: true,
|
|
755
|
+
digitalSignature: true,
|
|
756
|
+
encipherOnly: true,
|
|
757
|
+
keyAgreement: true,
|
|
758
|
+
keyEncipherment: true,
|
|
759
|
+
},
|
|
760
|
+
extendedKeyUsage: {
|
|
761
|
+
clientAuth: true,
|
|
762
|
+
codeSigning: true,
|
|
763
|
+
emailProtection: true,
|
|
764
|
+
ocspSigning: true,
|
|
765
|
+
serverAuth: true,
|
|
766
|
+
timeStamping: true,
|
|
767
|
+
},
|
|
768
|
+
unknownExtendedKeyUsages: [
|
|
769
|
+
{
|
|
770
|
+
objectIdPath: [
|
|
771
|
+
42
|
|
772
|
+
],
|
|
773
|
+
}
|
|
774
|
+
],
|
|
775
|
+
},
|
|
776
|
+
policyIds: [
|
|
777
|
+
{
|
|
778
|
+
objectIdPath: [
|
|
779
|
+
42
|
|
780
|
+
],
|
|
781
|
+
}
|
|
782
|
+
],
|
|
783
|
+
},
|
|
784
|
+
}
|
|
785
|
+
],
|
|
786
|
+
config: {
|
|
787
|
+
publicKey: {
|
|
788
|
+
format: "Test string",
|
|
789
|
+
key: "Test string",
|
|
790
|
+
},
|
|
791
|
+
subjectConfig: {
|
|
792
|
+
subject: {
|
|
793
|
+
commonName: "Test string",
|
|
794
|
+
countryCode: "Test string",
|
|
795
|
+
locality: "Test string",
|
|
796
|
+
organization: "Test string",
|
|
797
|
+
organizationalUnit: "Test string",
|
|
798
|
+
postalCode: "Test string",
|
|
799
|
+
province: "Test string",
|
|
800
|
+
streetAddress: "Test string",
|
|
801
|
+
},
|
|
802
|
+
subjectAltName: {
|
|
803
|
+
customSans: [
|
|
804
|
+
{
|
|
805
|
+
critical: true,
|
|
806
|
+
objectId: {
|
|
807
|
+
objectIdPath: [
|
|
808
|
+
42
|
|
809
|
+
],
|
|
810
|
+
},
|
|
811
|
+
value: "Test string",
|
|
812
|
+
}
|
|
813
|
+
],
|
|
814
|
+
dnsNames: [
|
|
815
|
+
"Test string"
|
|
816
|
+
],
|
|
817
|
+
emailAddresses: [
|
|
818
|
+
"Test string"
|
|
819
|
+
],
|
|
820
|
+
ipAddresses: [
|
|
821
|
+
"Test string"
|
|
822
|
+
],
|
|
823
|
+
uris: [
|
|
824
|
+
"Test string"
|
|
825
|
+
],
|
|
826
|
+
},
|
|
827
|
+
},
|
|
828
|
+
x509Config: {
|
|
829
|
+
additionalExtensions: [
|
|
830
|
+
{
|
|
831
|
+
critical: true,
|
|
832
|
+
objectId: {
|
|
833
|
+
objectIdPath: [
|
|
834
|
+
42
|
|
835
|
+
],
|
|
836
|
+
},
|
|
837
|
+
value: "Test string",
|
|
838
|
+
}
|
|
839
|
+
],
|
|
840
|
+
aiaOcspServers: [
|
|
841
|
+
"Test string"
|
|
842
|
+
],
|
|
843
|
+
caOptions: {
|
|
844
|
+
isCa: true,
|
|
845
|
+
maxIssuerPathLength: 42,
|
|
846
|
+
},
|
|
847
|
+
keyUsage: {
|
|
848
|
+
baseKeyUsage: {
|
|
849
|
+
certSign: true,
|
|
850
|
+
contentCommitment: true,
|
|
851
|
+
crlSign: true,
|
|
852
|
+
dataEncipherment: true,
|
|
853
|
+
decipherOnly: true,
|
|
854
|
+
digitalSignature: true,
|
|
855
|
+
encipherOnly: true,
|
|
856
|
+
keyAgreement: true,
|
|
857
|
+
keyEncipherment: true,
|
|
858
|
+
},
|
|
859
|
+
extendedKeyUsage: {
|
|
860
|
+
clientAuth: true,
|
|
861
|
+
codeSigning: true,
|
|
862
|
+
emailProtection: true,
|
|
863
|
+
ocspSigning: true,
|
|
864
|
+
serverAuth: true,
|
|
865
|
+
timeStamping: true,
|
|
866
|
+
},
|
|
867
|
+
unknownExtendedKeyUsages: [
|
|
868
|
+
{
|
|
869
|
+
objectIdPath: [
|
|
870
|
+
42
|
|
871
|
+
],
|
|
872
|
+
}
|
|
873
|
+
],
|
|
874
|
+
},
|
|
875
|
+
policyIds: [
|
|
876
|
+
{
|
|
877
|
+
objectIdPath: [
|
|
878
|
+
42
|
|
879
|
+
],
|
|
880
|
+
}
|
|
881
|
+
],
|
|
882
|
+
},
|
|
883
|
+
},
|
|
884
|
+
createTime: "Test string",
|
|
885
|
+
deleteTime: "Test string",
|
|
886
|
+
expireTime: "Test string",
|
|
887
|
+
gcsBucket: "Test string",
|
|
888
|
+
keySpec: {
|
|
889
|
+
algorithm: "Test string",
|
|
890
|
+
cloudKmsKeyVersion: "Test string",
|
|
891
|
+
},
|
|
892
|
+
labels: {
|
|
893
|
+
A: "Test string"
|
|
894
|
+
},
|
|
895
|
+
lifetime: "Test string",
|
|
896
|
+
name: "Test string",
|
|
897
|
+
pemCaCertificates: [
|
|
898
|
+
"Test string"
|
|
899
|
+
],
|
|
900
|
+
state: "Test string",
|
|
901
|
+
subordinateConfig: {
|
|
902
|
+
certificateAuthority: "Test string",
|
|
903
|
+
pemIssuerChain: {
|
|
904
|
+
pemCertificates: [
|
|
905
|
+
"Test string"
|
|
906
|
+
],
|
|
907
|
+
},
|
|
908
|
+
},
|
|
909
|
+
tier: "Test string",
|
|
910
|
+
type: "Test string",
|
|
911
|
+
updateTime: "Test string",
|
|
912
|
+
});
|
|
913
|
+
/** Undelete a CertificateAuthority that has been deleted. */
|
|
914
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.undelete({
|
|
915
|
+
name: "Test string",
|
|
916
|
+
}, {
|
|
917
|
+
requestId: "Test string",
|
|
918
|
+
});
|
|
919
|
+
/** Returns a CertificateRevocationList. */
|
|
920
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.certificateRevocationLists.get({
|
|
921
|
+
name: "Test string",
|
|
922
|
+
});
|
|
923
|
+
/** Gets the access control policy for a resource. Returns an empty policy if the resource exists and does not have a policy set. */
|
|
924
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.certificateRevocationLists.getIamPolicy({
|
|
925
|
+
"options.requestedPolicyVersion": 42,
|
|
926
|
+
resource: "Test string",
|
|
927
|
+
});
|
|
928
|
+
/** Lists CertificateRevocationLists. */
|
|
929
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.certificateRevocationLists.list({
|
|
930
|
+
filter: "Test string",
|
|
931
|
+
orderBy: "Test string",
|
|
932
|
+
pageSize: 42,
|
|
933
|
+
pageToken: "Test string",
|
|
934
|
+
parent: "Test string",
|
|
935
|
+
});
|
|
936
|
+
/** Update a CertificateRevocationList. */
|
|
937
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.certificateRevocationLists.patch({
|
|
938
|
+
name: "Test string",
|
|
939
|
+
requestId: "Test string",
|
|
940
|
+
updateMask: "Test string",
|
|
941
|
+
}, {
|
|
942
|
+
accessUrl: "Test string",
|
|
943
|
+
createTime: "Test string",
|
|
944
|
+
labels: {
|
|
945
|
+
A: "Test string"
|
|
946
|
+
},
|
|
947
|
+
name: "Test string",
|
|
948
|
+
pemCrl: "Test string",
|
|
949
|
+
revisionId: "Test string",
|
|
950
|
+
revokedCertificates: [
|
|
951
|
+
{
|
|
952
|
+
certificate: "Test string",
|
|
953
|
+
hexSerialNumber: "Test string",
|
|
954
|
+
revocationReason: "Test string",
|
|
955
|
+
}
|
|
956
|
+
],
|
|
957
|
+
sequenceNumber: "Test string",
|
|
958
|
+
state: "Test string",
|
|
959
|
+
updateTime: "Test string",
|
|
960
|
+
});
|
|
961
|
+
/** Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors. */
|
|
962
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.certificateRevocationLists.setIamPolicy({
|
|
963
|
+
resource: "Test string",
|
|
964
|
+
}, {
|
|
965
|
+
policy: {
|
|
966
|
+
auditConfigs: [
|
|
967
|
+
{
|
|
968
|
+
auditLogConfigs: [
|
|
969
|
+
{
|
|
970
|
+
exemptedMembers: [
|
|
971
|
+
"Test string"
|
|
972
|
+
],
|
|
973
|
+
logType: "Test string",
|
|
974
|
+
}
|
|
975
|
+
],
|
|
976
|
+
service: "Test string",
|
|
977
|
+
}
|
|
978
|
+
],
|
|
979
|
+
bindings: [
|
|
980
|
+
{
|
|
981
|
+
condition: {
|
|
982
|
+
description: "Test string",
|
|
983
|
+
expression: "Test string",
|
|
984
|
+
location: "Test string",
|
|
985
|
+
title: "Test string",
|
|
986
|
+
},
|
|
987
|
+
members: [
|
|
988
|
+
"Test string"
|
|
989
|
+
],
|
|
990
|
+
role: "Test string",
|
|
991
|
+
}
|
|
992
|
+
],
|
|
993
|
+
etag: "Test string",
|
|
994
|
+
version: 42,
|
|
995
|
+
},
|
|
996
|
+
updateMask: "Test string",
|
|
997
|
+
});
|
|
998
|
+
/**
|
|
999
|
+
* Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This
|
|
1000
|
+
* operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning.
|
|
1001
|
+
*/
|
|
1002
|
+
await gapi.client.privateca.projects.locations.caPools.certificateAuthorities.certificateRevocationLists.testIamPermissions({
|
|
1003
|
+
resource: "Test string",
|
|
1004
|
+
}, {
|
|
1005
|
+
permissions: [
|
|
1006
|
+
"Test string"
|
|
1007
|
+
],
|
|
1008
|
+
});
|
|
1009
|
+
/** Create a new Certificate in a given Project, Location from a particular CaPool. */
|
|
1010
|
+
await gapi.client.privateca.projects.locations.caPools.certificates.create({
|
|
1011
|
+
certificateId: "Test string",
|
|
1012
|
+
issuingCertificateAuthorityId: "Test string",
|
|
1013
|
+
parent: "Test string",
|
|
1014
|
+
requestId: "Test string",
|
|
1015
|
+
validateOnly: true,
|
|
1016
|
+
}, {
|
|
1017
|
+
certificateDescription: {
|
|
1018
|
+
aiaIssuingCertificateUrls: [
|
|
1019
|
+
"Test string"
|
|
1020
|
+
],
|
|
1021
|
+
authorityKeyId: {
|
|
1022
|
+
keyId: "Test string",
|
|
1023
|
+
},
|
|
1024
|
+
certFingerprint: {
|
|
1025
|
+
sha256Hash: "Test string",
|
|
1026
|
+
},
|
|
1027
|
+
crlDistributionPoints: [
|
|
1028
|
+
"Test string"
|
|
1029
|
+
],
|
|
1030
|
+
publicKey: {
|
|
1031
|
+
format: "Test string",
|
|
1032
|
+
key: "Test string",
|
|
1033
|
+
},
|
|
1034
|
+
subjectDescription: {
|
|
1035
|
+
hexSerialNumber: "Test string",
|
|
1036
|
+
lifetime: "Test string",
|
|
1037
|
+
notAfterTime: "Test string",
|
|
1038
|
+
notBeforeTime: "Test string",
|
|
1039
|
+
subject: {
|
|
1040
|
+
commonName: "Test string",
|
|
1041
|
+
countryCode: "Test string",
|
|
1042
|
+
locality: "Test string",
|
|
1043
|
+
organization: "Test string",
|
|
1044
|
+
organizationalUnit: "Test string",
|
|
1045
|
+
postalCode: "Test string",
|
|
1046
|
+
province: "Test string",
|
|
1047
|
+
streetAddress: "Test string",
|
|
1048
|
+
},
|
|
1049
|
+
subjectAltName: {
|
|
1050
|
+
customSans: [
|
|
1051
|
+
{
|
|
1052
|
+
critical: true,
|
|
1053
|
+
objectId: {
|
|
1054
|
+
objectIdPath: [
|
|
1055
|
+
42
|
|
1056
|
+
],
|
|
1057
|
+
},
|
|
1058
|
+
value: "Test string",
|
|
1059
|
+
}
|
|
1060
|
+
],
|
|
1061
|
+
dnsNames: [
|
|
1062
|
+
"Test string"
|
|
1063
|
+
],
|
|
1064
|
+
emailAddresses: [
|
|
1065
|
+
"Test string"
|
|
1066
|
+
],
|
|
1067
|
+
ipAddresses: [
|
|
1068
|
+
"Test string"
|
|
1069
|
+
],
|
|
1070
|
+
uris: [
|
|
1071
|
+
"Test string"
|
|
1072
|
+
],
|
|
1073
|
+
},
|
|
1074
|
+
},
|
|
1075
|
+
subjectKeyId: {
|
|
1076
|
+
keyId: "Test string",
|
|
1077
|
+
},
|
|
1078
|
+
x509Description: {
|
|
1079
|
+
additionalExtensions: [
|
|
1080
|
+
{
|
|
1081
|
+
critical: true,
|
|
1082
|
+
objectId: {
|
|
1083
|
+
objectIdPath: [
|
|
1084
|
+
42
|
|
1085
|
+
],
|
|
1086
|
+
},
|
|
1087
|
+
value: "Test string",
|
|
1088
|
+
}
|
|
1089
|
+
],
|
|
1090
|
+
aiaOcspServers: [
|
|
1091
|
+
"Test string"
|
|
1092
|
+
],
|
|
1093
|
+
caOptions: {
|
|
1094
|
+
isCa: true,
|
|
1095
|
+
maxIssuerPathLength: 42,
|
|
1096
|
+
},
|
|
1097
|
+
keyUsage: {
|
|
1098
|
+
baseKeyUsage: {
|
|
1099
|
+
certSign: true,
|
|
1100
|
+
contentCommitment: true,
|
|
1101
|
+
crlSign: true,
|
|
1102
|
+
dataEncipherment: true,
|
|
1103
|
+
decipherOnly: true,
|
|
1104
|
+
digitalSignature: true,
|
|
1105
|
+
encipherOnly: true,
|
|
1106
|
+
keyAgreement: true,
|
|
1107
|
+
keyEncipherment: true,
|
|
1108
|
+
},
|
|
1109
|
+
extendedKeyUsage: {
|
|
1110
|
+
clientAuth: true,
|
|
1111
|
+
codeSigning: true,
|
|
1112
|
+
emailProtection: true,
|
|
1113
|
+
ocspSigning: true,
|
|
1114
|
+
serverAuth: true,
|
|
1115
|
+
timeStamping: true,
|
|
1116
|
+
},
|
|
1117
|
+
unknownExtendedKeyUsages: [
|
|
1118
|
+
{
|
|
1119
|
+
objectIdPath: [
|
|
1120
|
+
42
|
|
1121
|
+
],
|
|
1122
|
+
}
|
|
1123
|
+
],
|
|
1124
|
+
},
|
|
1125
|
+
policyIds: [
|
|
1126
|
+
{
|
|
1127
|
+
objectIdPath: [
|
|
1128
|
+
42
|
|
1129
|
+
],
|
|
1130
|
+
}
|
|
1131
|
+
],
|
|
1132
|
+
},
|
|
1133
|
+
},
|
|
1134
|
+
certificateTemplate: "Test string",
|
|
1135
|
+
config: {
|
|
1136
|
+
publicKey: {
|
|
1137
|
+
format: "Test string",
|
|
1138
|
+
key: "Test string",
|
|
1139
|
+
},
|
|
1140
|
+
subjectConfig: {
|
|
1141
|
+
subject: {
|
|
1142
|
+
commonName: "Test string",
|
|
1143
|
+
countryCode: "Test string",
|
|
1144
|
+
locality: "Test string",
|
|
1145
|
+
organization: "Test string",
|
|
1146
|
+
organizationalUnit: "Test string",
|
|
1147
|
+
postalCode: "Test string",
|
|
1148
|
+
province: "Test string",
|
|
1149
|
+
streetAddress: "Test string",
|
|
1150
|
+
},
|
|
1151
|
+
subjectAltName: {
|
|
1152
|
+
customSans: [
|
|
1153
|
+
{
|
|
1154
|
+
critical: true,
|
|
1155
|
+
objectId: {
|
|
1156
|
+
objectIdPath: [
|
|
1157
|
+
42
|
|
1158
|
+
],
|
|
1159
|
+
},
|
|
1160
|
+
value: "Test string",
|
|
1161
|
+
}
|
|
1162
|
+
],
|
|
1163
|
+
dnsNames: [
|
|
1164
|
+
"Test string"
|
|
1165
|
+
],
|
|
1166
|
+
emailAddresses: [
|
|
1167
|
+
"Test string"
|
|
1168
|
+
],
|
|
1169
|
+
ipAddresses: [
|
|
1170
|
+
"Test string"
|
|
1171
|
+
],
|
|
1172
|
+
uris: [
|
|
1173
|
+
"Test string"
|
|
1174
|
+
],
|
|
1175
|
+
},
|
|
1176
|
+
},
|
|
1177
|
+
x509Config: {
|
|
1178
|
+
additionalExtensions: [
|
|
1179
|
+
{
|
|
1180
|
+
critical: true,
|
|
1181
|
+
objectId: {
|
|
1182
|
+
objectIdPath: [
|
|
1183
|
+
42
|
|
1184
|
+
],
|
|
1185
|
+
},
|
|
1186
|
+
value: "Test string",
|
|
1187
|
+
}
|
|
1188
|
+
],
|
|
1189
|
+
aiaOcspServers: [
|
|
1190
|
+
"Test string"
|
|
1191
|
+
],
|
|
1192
|
+
caOptions: {
|
|
1193
|
+
isCa: true,
|
|
1194
|
+
maxIssuerPathLength: 42,
|
|
1195
|
+
},
|
|
1196
|
+
keyUsage: {
|
|
1197
|
+
baseKeyUsage: {
|
|
1198
|
+
certSign: true,
|
|
1199
|
+
contentCommitment: true,
|
|
1200
|
+
crlSign: true,
|
|
1201
|
+
dataEncipherment: true,
|
|
1202
|
+
decipherOnly: true,
|
|
1203
|
+
digitalSignature: true,
|
|
1204
|
+
encipherOnly: true,
|
|
1205
|
+
keyAgreement: true,
|
|
1206
|
+
keyEncipherment: true,
|
|
1207
|
+
},
|
|
1208
|
+
extendedKeyUsage: {
|
|
1209
|
+
clientAuth: true,
|
|
1210
|
+
codeSigning: true,
|
|
1211
|
+
emailProtection: true,
|
|
1212
|
+
ocspSigning: true,
|
|
1213
|
+
serverAuth: true,
|
|
1214
|
+
timeStamping: true,
|
|
1215
|
+
},
|
|
1216
|
+
unknownExtendedKeyUsages: [
|
|
1217
|
+
{
|
|
1218
|
+
objectIdPath: [
|
|
1219
|
+
42
|
|
1220
|
+
],
|
|
1221
|
+
}
|
|
1222
|
+
],
|
|
1223
|
+
},
|
|
1224
|
+
policyIds: [
|
|
1225
|
+
{
|
|
1226
|
+
objectIdPath: [
|
|
1227
|
+
42
|
|
1228
|
+
],
|
|
1229
|
+
}
|
|
1230
|
+
],
|
|
1231
|
+
},
|
|
1232
|
+
},
|
|
1233
|
+
createTime: "Test string",
|
|
1234
|
+
issuerCertificateAuthority: "Test string",
|
|
1235
|
+
labels: {
|
|
1236
|
+
A: "Test string"
|
|
1237
|
+
},
|
|
1238
|
+
lifetime: "Test string",
|
|
1239
|
+
name: "Test string",
|
|
1240
|
+
pemCertificate: "Test string",
|
|
1241
|
+
pemCertificateChain: [
|
|
1242
|
+
"Test string"
|
|
1243
|
+
],
|
|
1244
|
+
pemCsr: "Test string",
|
|
1245
|
+
revocationDetails: {
|
|
1246
|
+
revocationState: "Test string",
|
|
1247
|
+
revocationTime: "Test string",
|
|
1248
|
+
},
|
|
1249
|
+
subjectMode: "Test string",
|
|
1250
|
+
updateTime: "Test string",
|
|
1251
|
+
});
|
|
1252
|
+
/** Returns a Certificate. */
|
|
1253
|
+
await gapi.client.privateca.projects.locations.caPools.certificates.get({
|
|
1254
|
+
name: "Test string",
|
|
1255
|
+
});
|
|
1256
|
+
/** Lists Certificates. */
|
|
1257
|
+
await gapi.client.privateca.projects.locations.caPools.certificates.list({
|
|
1258
|
+
filter: "Test string",
|
|
1259
|
+
orderBy: "Test string",
|
|
1260
|
+
pageSize: 42,
|
|
1261
|
+
pageToken: "Test string",
|
|
1262
|
+
parent: "Test string",
|
|
1263
|
+
});
|
|
1264
|
+
/** Update a Certificate. Currently, the only field you can update is the labels field. */
|
|
1265
|
+
await gapi.client.privateca.projects.locations.caPools.certificates.patch({
|
|
1266
|
+
name: "Test string",
|
|
1267
|
+
requestId: "Test string",
|
|
1268
|
+
updateMask: "Test string",
|
|
1269
|
+
}, {
|
|
1270
|
+
certificateDescription: {
|
|
1271
|
+
aiaIssuingCertificateUrls: [
|
|
1272
|
+
"Test string"
|
|
1273
|
+
],
|
|
1274
|
+
authorityKeyId: {
|
|
1275
|
+
keyId: "Test string",
|
|
1276
|
+
},
|
|
1277
|
+
certFingerprint: {
|
|
1278
|
+
sha256Hash: "Test string",
|
|
1279
|
+
},
|
|
1280
|
+
crlDistributionPoints: [
|
|
1281
|
+
"Test string"
|
|
1282
|
+
],
|
|
1283
|
+
publicKey: {
|
|
1284
|
+
format: "Test string",
|
|
1285
|
+
key: "Test string",
|
|
1286
|
+
},
|
|
1287
|
+
subjectDescription: {
|
|
1288
|
+
hexSerialNumber: "Test string",
|
|
1289
|
+
lifetime: "Test string",
|
|
1290
|
+
notAfterTime: "Test string",
|
|
1291
|
+
notBeforeTime: "Test string",
|
|
1292
|
+
subject: {
|
|
1293
|
+
commonName: "Test string",
|
|
1294
|
+
countryCode: "Test string",
|
|
1295
|
+
locality: "Test string",
|
|
1296
|
+
organization: "Test string",
|
|
1297
|
+
organizationalUnit: "Test string",
|
|
1298
|
+
postalCode: "Test string",
|
|
1299
|
+
province: "Test string",
|
|
1300
|
+
streetAddress: "Test string",
|
|
1301
|
+
},
|
|
1302
|
+
subjectAltName: {
|
|
1303
|
+
customSans: [
|
|
1304
|
+
{
|
|
1305
|
+
critical: true,
|
|
1306
|
+
objectId: {
|
|
1307
|
+
objectIdPath: [
|
|
1308
|
+
42
|
|
1309
|
+
],
|
|
1310
|
+
},
|
|
1311
|
+
value: "Test string",
|
|
1312
|
+
}
|
|
1313
|
+
],
|
|
1314
|
+
dnsNames: [
|
|
1315
|
+
"Test string"
|
|
1316
|
+
],
|
|
1317
|
+
emailAddresses: [
|
|
1318
|
+
"Test string"
|
|
1319
|
+
],
|
|
1320
|
+
ipAddresses: [
|
|
1321
|
+
"Test string"
|
|
1322
|
+
],
|
|
1323
|
+
uris: [
|
|
1324
|
+
"Test string"
|
|
1325
|
+
],
|
|
1326
|
+
},
|
|
1327
|
+
},
|
|
1328
|
+
subjectKeyId: {
|
|
1329
|
+
keyId: "Test string",
|
|
1330
|
+
},
|
|
1331
|
+
x509Description: {
|
|
1332
|
+
additionalExtensions: [
|
|
1333
|
+
{
|
|
1334
|
+
critical: true,
|
|
1335
|
+
objectId: {
|
|
1336
|
+
objectIdPath: [
|
|
1337
|
+
42
|
|
1338
|
+
],
|
|
1339
|
+
},
|
|
1340
|
+
value: "Test string",
|
|
1341
|
+
}
|
|
1342
|
+
],
|
|
1343
|
+
aiaOcspServers: [
|
|
1344
|
+
"Test string"
|
|
1345
|
+
],
|
|
1346
|
+
caOptions: {
|
|
1347
|
+
isCa: true,
|
|
1348
|
+
maxIssuerPathLength: 42,
|
|
1349
|
+
},
|
|
1350
|
+
keyUsage: {
|
|
1351
|
+
baseKeyUsage: {
|
|
1352
|
+
certSign: true,
|
|
1353
|
+
contentCommitment: true,
|
|
1354
|
+
crlSign: true,
|
|
1355
|
+
dataEncipherment: true,
|
|
1356
|
+
decipherOnly: true,
|
|
1357
|
+
digitalSignature: true,
|
|
1358
|
+
encipherOnly: true,
|
|
1359
|
+
keyAgreement: true,
|
|
1360
|
+
keyEncipherment: true,
|
|
1361
|
+
},
|
|
1362
|
+
extendedKeyUsage: {
|
|
1363
|
+
clientAuth: true,
|
|
1364
|
+
codeSigning: true,
|
|
1365
|
+
emailProtection: true,
|
|
1366
|
+
ocspSigning: true,
|
|
1367
|
+
serverAuth: true,
|
|
1368
|
+
timeStamping: true,
|
|
1369
|
+
},
|
|
1370
|
+
unknownExtendedKeyUsages: [
|
|
1371
|
+
{
|
|
1372
|
+
objectIdPath: [
|
|
1373
|
+
42
|
|
1374
|
+
],
|
|
1375
|
+
}
|
|
1376
|
+
],
|
|
1377
|
+
},
|
|
1378
|
+
policyIds: [
|
|
1379
|
+
{
|
|
1380
|
+
objectIdPath: [
|
|
1381
|
+
42
|
|
1382
|
+
],
|
|
1383
|
+
}
|
|
1384
|
+
],
|
|
1385
|
+
},
|
|
1386
|
+
},
|
|
1387
|
+
certificateTemplate: "Test string",
|
|
1388
|
+
config: {
|
|
1389
|
+
publicKey: {
|
|
1390
|
+
format: "Test string",
|
|
1391
|
+
key: "Test string",
|
|
1392
|
+
},
|
|
1393
|
+
subjectConfig: {
|
|
1394
|
+
subject: {
|
|
1395
|
+
commonName: "Test string",
|
|
1396
|
+
countryCode: "Test string",
|
|
1397
|
+
locality: "Test string",
|
|
1398
|
+
organization: "Test string",
|
|
1399
|
+
organizationalUnit: "Test string",
|
|
1400
|
+
postalCode: "Test string",
|
|
1401
|
+
province: "Test string",
|
|
1402
|
+
streetAddress: "Test string",
|
|
1403
|
+
},
|
|
1404
|
+
subjectAltName: {
|
|
1405
|
+
customSans: [
|
|
1406
|
+
{
|
|
1407
|
+
critical: true,
|
|
1408
|
+
objectId: {
|
|
1409
|
+
objectIdPath: [
|
|
1410
|
+
42
|
|
1411
|
+
],
|
|
1412
|
+
},
|
|
1413
|
+
value: "Test string",
|
|
1414
|
+
}
|
|
1415
|
+
],
|
|
1416
|
+
dnsNames: [
|
|
1417
|
+
"Test string"
|
|
1418
|
+
],
|
|
1419
|
+
emailAddresses: [
|
|
1420
|
+
"Test string"
|
|
1421
|
+
],
|
|
1422
|
+
ipAddresses: [
|
|
1423
|
+
"Test string"
|
|
1424
|
+
],
|
|
1425
|
+
uris: [
|
|
1426
|
+
"Test string"
|
|
1427
|
+
],
|
|
1428
|
+
},
|
|
1429
|
+
},
|
|
1430
|
+
x509Config: {
|
|
1431
|
+
additionalExtensions: [
|
|
1432
|
+
{
|
|
1433
|
+
critical: true,
|
|
1434
|
+
objectId: {
|
|
1435
|
+
objectIdPath: [
|
|
1436
|
+
42
|
|
1437
|
+
],
|
|
1438
|
+
},
|
|
1439
|
+
value: "Test string",
|
|
1440
|
+
}
|
|
1441
|
+
],
|
|
1442
|
+
aiaOcspServers: [
|
|
1443
|
+
"Test string"
|
|
1444
|
+
],
|
|
1445
|
+
caOptions: {
|
|
1446
|
+
isCa: true,
|
|
1447
|
+
maxIssuerPathLength: 42,
|
|
1448
|
+
},
|
|
1449
|
+
keyUsage: {
|
|
1450
|
+
baseKeyUsage: {
|
|
1451
|
+
certSign: true,
|
|
1452
|
+
contentCommitment: true,
|
|
1453
|
+
crlSign: true,
|
|
1454
|
+
dataEncipherment: true,
|
|
1455
|
+
decipherOnly: true,
|
|
1456
|
+
digitalSignature: true,
|
|
1457
|
+
encipherOnly: true,
|
|
1458
|
+
keyAgreement: true,
|
|
1459
|
+
keyEncipherment: true,
|
|
1460
|
+
},
|
|
1461
|
+
extendedKeyUsage: {
|
|
1462
|
+
clientAuth: true,
|
|
1463
|
+
codeSigning: true,
|
|
1464
|
+
emailProtection: true,
|
|
1465
|
+
ocspSigning: true,
|
|
1466
|
+
serverAuth: true,
|
|
1467
|
+
timeStamping: true,
|
|
1468
|
+
},
|
|
1469
|
+
unknownExtendedKeyUsages: [
|
|
1470
|
+
{
|
|
1471
|
+
objectIdPath: [
|
|
1472
|
+
42
|
|
1473
|
+
],
|
|
1474
|
+
}
|
|
1475
|
+
],
|
|
1476
|
+
},
|
|
1477
|
+
policyIds: [
|
|
1478
|
+
{
|
|
1479
|
+
objectIdPath: [
|
|
1480
|
+
42
|
|
1481
|
+
],
|
|
1482
|
+
}
|
|
1483
|
+
],
|
|
1484
|
+
},
|
|
1485
|
+
},
|
|
1486
|
+
createTime: "Test string",
|
|
1487
|
+
issuerCertificateAuthority: "Test string",
|
|
1488
|
+
labels: {
|
|
1489
|
+
A: "Test string"
|
|
1490
|
+
},
|
|
1491
|
+
lifetime: "Test string",
|
|
1492
|
+
name: "Test string",
|
|
1493
|
+
pemCertificate: "Test string",
|
|
1494
|
+
pemCertificateChain: [
|
|
1495
|
+
"Test string"
|
|
1496
|
+
],
|
|
1497
|
+
pemCsr: "Test string",
|
|
1498
|
+
revocationDetails: {
|
|
1499
|
+
revocationState: "Test string",
|
|
1500
|
+
revocationTime: "Test string",
|
|
1501
|
+
},
|
|
1502
|
+
subjectMode: "Test string",
|
|
1503
|
+
updateTime: "Test string",
|
|
1504
|
+
});
|
|
1505
|
+
/** Revoke a Certificate. */
|
|
1506
|
+
await gapi.client.privateca.projects.locations.caPools.certificates.revoke({
|
|
1507
|
+
name: "Test string",
|
|
1508
|
+
}, {
|
|
1509
|
+
reason: "Test string",
|
|
1510
|
+
requestId: "Test string",
|
|
1511
|
+
});
|
|
1512
|
+
/** Create a new CertificateTemplate in a given Project and Location. */
|
|
1513
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.create({
|
|
1514
|
+
certificateTemplateId: "Test string",
|
|
1515
|
+
parent: "Test string",
|
|
1516
|
+
requestId: "Test string",
|
|
1517
|
+
}, {
|
|
1518
|
+
createTime: "Test string",
|
|
1519
|
+
description: "Test string",
|
|
1520
|
+
identityConstraints: {
|
|
1521
|
+
allowSubjectAltNamesPassthrough: true,
|
|
1522
|
+
allowSubjectPassthrough: true,
|
|
1523
|
+
celExpression: {
|
|
1524
|
+
description: "Test string",
|
|
1525
|
+
expression: "Test string",
|
|
1526
|
+
location: "Test string",
|
|
1527
|
+
title: "Test string",
|
|
1528
|
+
},
|
|
1529
|
+
},
|
|
1530
|
+
labels: {
|
|
1531
|
+
A: "Test string"
|
|
1532
|
+
},
|
|
1533
|
+
name: "Test string",
|
|
1534
|
+
passthroughExtensions: {
|
|
1535
|
+
additionalExtensions: [
|
|
1536
|
+
{
|
|
1537
|
+
objectIdPath: [
|
|
1538
|
+
42
|
|
1539
|
+
],
|
|
1540
|
+
}
|
|
1541
|
+
],
|
|
1542
|
+
knownExtensions: [
|
|
1543
|
+
"Test string"
|
|
1544
|
+
],
|
|
1545
|
+
},
|
|
1546
|
+
predefinedValues: {
|
|
1547
|
+
additionalExtensions: [
|
|
1548
|
+
{
|
|
1549
|
+
critical: true,
|
|
1550
|
+
objectId: {
|
|
1551
|
+
objectIdPath: [
|
|
1552
|
+
42
|
|
1553
|
+
],
|
|
1554
|
+
},
|
|
1555
|
+
value: "Test string",
|
|
1556
|
+
}
|
|
1557
|
+
],
|
|
1558
|
+
aiaOcspServers: [
|
|
1559
|
+
"Test string"
|
|
1560
|
+
],
|
|
1561
|
+
caOptions: {
|
|
1562
|
+
isCa: true,
|
|
1563
|
+
maxIssuerPathLength: 42,
|
|
1564
|
+
},
|
|
1565
|
+
keyUsage: {
|
|
1566
|
+
baseKeyUsage: {
|
|
1567
|
+
certSign: true,
|
|
1568
|
+
contentCommitment: true,
|
|
1569
|
+
crlSign: true,
|
|
1570
|
+
dataEncipherment: true,
|
|
1571
|
+
decipherOnly: true,
|
|
1572
|
+
digitalSignature: true,
|
|
1573
|
+
encipherOnly: true,
|
|
1574
|
+
keyAgreement: true,
|
|
1575
|
+
keyEncipherment: true,
|
|
1576
|
+
},
|
|
1577
|
+
extendedKeyUsage: {
|
|
1578
|
+
clientAuth: true,
|
|
1579
|
+
codeSigning: true,
|
|
1580
|
+
emailProtection: true,
|
|
1581
|
+
ocspSigning: true,
|
|
1582
|
+
serverAuth: true,
|
|
1583
|
+
timeStamping: true,
|
|
1584
|
+
},
|
|
1585
|
+
unknownExtendedKeyUsages: [
|
|
1586
|
+
{
|
|
1587
|
+
objectIdPath: [
|
|
1588
|
+
42
|
|
1589
|
+
],
|
|
1590
|
+
}
|
|
1591
|
+
],
|
|
1592
|
+
},
|
|
1593
|
+
policyIds: [
|
|
1594
|
+
{
|
|
1595
|
+
objectIdPath: [
|
|
1596
|
+
42
|
|
1597
|
+
],
|
|
1598
|
+
}
|
|
1599
|
+
],
|
|
1600
|
+
},
|
|
1601
|
+
updateTime: "Test string",
|
|
1602
|
+
});
|
|
1603
|
+
/** DeleteCertificateTemplate deletes a CertificateTemplate. */
|
|
1604
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.delete({
|
|
1605
|
+
name: "Test string",
|
|
1606
|
+
requestId: "Test string",
|
|
1607
|
+
});
|
|
1608
|
+
/** Returns a CertificateTemplate. */
|
|
1609
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.get({
|
|
1610
|
+
name: "Test string",
|
|
1611
|
+
});
|
|
1612
|
+
/** Gets the access control policy for a resource. Returns an empty policy if the resource exists and does not have a policy set. */
|
|
1613
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.getIamPolicy({
|
|
1614
|
+
"options.requestedPolicyVersion": 42,
|
|
1615
|
+
resource: "Test string",
|
|
1616
|
+
});
|
|
1617
|
+
/** Lists CertificateTemplates. */
|
|
1618
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.list({
|
|
1619
|
+
filter: "Test string",
|
|
1620
|
+
orderBy: "Test string",
|
|
1621
|
+
pageSize: 42,
|
|
1622
|
+
pageToken: "Test string",
|
|
1623
|
+
parent: "Test string",
|
|
1624
|
+
});
|
|
1625
|
+
/** Update a CertificateTemplate. */
|
|
1626
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.patch({
|
|
1627
|
+
name: "Test string",
|
|
1628
|
+
requestId: "Test string",
|
|
1629
|
+
updateMask: "Test string",
|
|
1630
|
+
}, {
|
|
1631
|
+
createTime: "Test string",
|
|
1632
|
+
description: "Test string",
|
|
1633
|
+
identityConstraints: {
|
|
1634
|
+
allowSubjectAltNamesPassthrough: true,
|
|
1635
|
+
allowSubjectPassthrough: true,
|
|
1636
|
+
celExpression: {
|
|
1637
|
+
description: "Test string",
|
|
1638
|
+
expression: "Test string",
|
|
1639
|
+
location: "Test string",
|
|
1640
|
+
title: "Test string",
|
|
1641
|
+
},
|
|
1642
|
+
},
|
|
1643
|
+
labels: {
|
|
1644
|
+
A: "Test string"
|
|
1645
|
+
},
|
|
1646
|
+
name: "Test string",
|
|
1647
|
+
passthroughExtensions: {
|
|
1648
|
+
additionalExtensions: [
|
|
1649
|
+
{
|
|
1650
|
+
objectIdPath: [
|
|
1651
|
+
42
|
|
1652
|
+
],
|
|
1653
|
+
}
|
|
1654
|
+
],
|
|
1655
|
+
knownExtensions: [
|
|
1656
|
+
"Test string"
|
|
1657
|
+
],
|
|
1658
|
+
},
|
|
1659
|
+
predefinedValues: {
|
|
1660
|
+
additionalExtensions: [
|
|
1661
|
+
{
|
|
1662
|
+
critical: true,
|
|
1663
|
+
objectId: {
|
|
1664
|
+
objectIdPath: [
|
|
1665
|
+
42
|
|
1666
|
+
],
|
|
1667
|
+
},
|
|
1668
|
+
value: "Test string",
|
|
1669
|
+
}
|
|
1670
|
+
],
|
|
1671
|
+
aiaOcspServers: [
|
|
1672
|
+
"Test string"
|
|
1673
|
+
],
|
|
1674
|
+
caOptions: {
|
|
1675
|
+
isCa: true,
|
|
1676
|
+
maxIssuerPathLength: 42,
|
|
1677
|
+
},
|
|
1678
|
+
keyUsage: {
|
|
1679
|
+
baseKeyUsage: {
|
|
1680
|
+
certSign: true,
|
|
1681
|
+
contentCommitment: true,
|
|
1682
|
+
crlSign: true,
|
|
1683
|
+
dataEncipherment: true,
|
|
1684
|
+
decipherOnly: true,
|
|
1685
|
+
digitalSignature: true,
|
|
1686
|
+
encipherOnly: true,
|
|
1687
|
+
keyAgreement: true,
|
|
1688
|
+
keyEncipherment: true,
|
|
1689
|
+
},
|
|
1690
|
+
extendedKeyUsage: {
|
|
1691
|
+
clientAuth: true,
|
|
1692
|
+
codeSigning: true,
|
|
1693
|
+
emailProtection: true,
|
|
1694
|
+
ocspSigning: true,
|
|
1695
|
+
serverAuth: true,
|
|
1696
|
+
timeStamping: true,
|
|
1697
|
+
},
|
|
1698
|
+
unknownExtendedKeyUsages: [
|
|
1699
|
+
{
|
|
1700
|
+
objectIdPath: [
|
|
1701
|
+
42
|
|
1702
|
+
],
|
|
1703
|
+
}
|
|
1704
|
+
],
|
|
1705
|
+
},
|
|
1706
|
+
policyIds: [
|
|
1707
|
+
{
|
|
1708
|
+
objectIdPath: [
|
|
1709
|
+
42
|
|
1710
|
+
],
|
|
1711
|
+
}
|
|
1712
|
+
],
|
|
1713
|
+
},
|
|
1714
|
+
updateTime: "Test string",
|
|
1715
|
+
});
|
|
1716
|
+
/** Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors. */
|
|
1717
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.setIamPolicy({
|
|
1718
|
+
resource: "Test string",
|
|
1719
|
+
}, {
|
|
1720
|
+
policy: {
|
|
1721
|
+
auditConfigs: [
|
|
1722
|
+
{
|
|
1723
|
+
auditLogConfigs: [
|
|
1724
|
+
{
|
|
1725
|
+
exemptedMembers: [
|
|
1726
|
+
"Test string"
|
|
1727
|
+
],
|
|
1728
|
+
logType: "Test string",
|
|
1729
|
+
}
|
|
1730
|
+
],
|
|
1731
|
+
service: "Test string",
|
|
1732
|
+
}
|
|
1733
|
+
],
|
|
1734
|
+
bindings: [
|
|
1735
|
+
{
|
|
1736
|
+
condition: {
|
|
1737
|
+
description: "Test string",
|
|
1738
|
+
expression: "Test string",
|
|
1739
|
+
location: "Test string",
|
|
1740
|
+
title: "Test string",
|
|
1741
|
+
},
|
|
1742
|
+
members: [
|
|
1743
|
+
"Test string"
|
|
1744
|
+
],
|
|
1745
|
+
role: "Test string",
|
|
1746
|
+
}
|
|
1747
|
+
],
|
|
1748
|
+
etag: "Test string",
|
|
1749
|
+
version: 42,
|
|
1750
|
+
},
|
|
1751
|
+
updateMask: "Test string",
|
|
1752
|
+
});
|
|
1753
|
+
/**
|
|
1754
|
+
* Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This
|
|
1755
|
+
* operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning.
|
|
1756
|
+
*/
|
|
1757
|
+
await gapi.client.privateca.projects.locations.certificateTemplates.testIamPermissions({
|
|
1758
|
+
resource: "Test string",
|
|
1759
|
+
}, {
|
|
1760
|
+
permissions: [
|
|
1761
|
+
"Test string"
|
|
1762
|
+
],
|
|
1763
|
+
});
|
|
1764
|
+
/**
|
|
1765
|
+
* Starts asynchronous cancellation on a long-running operation. The server makes a best effort to cancel the operation, but success is not guaranteed. If the server doesn't support this
|
|
1766
|
+
* method, it returns `google.rpc.Code.UNIMPLEMENTED`. Clients can use Operations.GetOperation or other methods to check whether the cancellation succeeded or whether the operation
|
|
1767
|
+
* completed despite cancellation. On successful cancellation, the operation is not deleted; instead, it becomes an operation with an Operation.error value with a google.rpc.Status.code of
|
|
1768
|
+
* 1, corresponding to `Code.CANCELLED`.
|
|
1769
|
+
*/
|
|
1770
|
+
await gapi.client.privateca.projects.locations.operations.cancel({
|
|
1771
|
+
name: "Test string",
|
|
1772
|
+
}, {
|
|
1773
|
+
});
|
|
1774
|
+
/**
|
|
1775
|
+
* Deletes a long-running operation. This method indicates that the client is no longer interested in the operation result. It does not cancel the operation. If the server doesn't support
|
|
1776
|
+
* this method, it returns `google.rpc.Code.UNIMPLEMENTED`.
|
|
1777
|
+
*/
|
|
1778
|
+
await gapi.client.privateca.projects.locations.operations.delete({
|
|
1779
|
+
name: "Test string",
|
|
1780
|
+
});
|
|
1781
|
+
/** Gets the latest state of a long-running operation. Clients can use this method to poll the operation result at intervals as recommended by the API service. */
|
|
1782
|
+
await gapi.client.privateca.projects.locations.operations.get({
|
|
1783
|
+
name: "Test string",
|
|
1784
|
+
});
|
|
1785
|
+
/**
|
|
1786
|
+
* Lists operations that match the specified filter in the request. If the server doesn't support this method, it returns `UNIMPLEMENTED`. NOTE: the `name` binding allows API services to
|
|
1787
|
+
* override the binding to use different resource name schemes, such as `users/*/operations`. To override the binding, API services can add a binding such as
|
|
1788
|
+
* `"/v1/{name=users/*}/operations"` to their service configuration. For backwards compatibility, the default name includes the operations collection id, however overriding users must
|
|
1789
|
+
* ensure the name binding is the parent resource, without the operations collection id.
|
|
1790
|
+
*/
|
|
1791
|
+
await gapi.client.privateca.projects.locations.operations.list({
|
|
1792
|
+
filter: "Test string",
|
|
1793
|
+
name: "Test string",
|
|
1794
|
+
pageSize: 42,
|
|
1795
|
+
pageToken: "Test string",
|
|
1796
|
+
});
|
|
1797
|
+
}
|
|
1798
|
+
});
|