@maxim_mazurok/gapi.client.privateca-v1 0.0.20240313 → 0.0.20240410
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/index.d.ts +10 -10
- package/package.json +1 -1
package/index.d.ts
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
// This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
|
|
10
10
|
// In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
|
|
11
11
|
// Generated from: https://privateca.googleapis.com/$discovery/rest?version=v1
|
|
12
|
-
// Revision:
|
|
12
|
+
// Revision: 20240410
|
|
13
13
|
|
|
14
14
|
/// <reference types="gapi.client" />
|
|
15
15
|
|
|
@@ -158,7 +158,7 @@ declare namespace gapi.client {
|
|
|
158
158
|
publicKey?: PublicKey;
|
|
159
159
|
/** Required. Specifies some of the values in a certificate that are related to the subject. */
|
|
160
160
|
subjectConfig?: SubjectConfig;
|
|
161
|
-
/** Optional. When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside
|
|
161
|
+
/** Optional. When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2. */
|
|
162
162
|
subjectKeyId?: CertificateConfigKeyId;
|
|
163
163
|
/** Required. Describes how some of the technical X.509 fields in a certificate should be populated. */
|
|
164
164
|
x509Config?: X509Parameters;
|
|
@@ -234,7 +234,7 @@ declare namespace gapi.client {
|
|
|
234
234
|
identityConstraints?: CertificateIdentityConstraints;
|
|
235
235
|
/** Optional. Labels with user-defined metadata. */
|
|
236
236
|
labels?: {[P in string]: string};
|
|
237
|
-
/** Optional. The maximum lifetime allowed for issued Certificates that use this template. If the issuing CaPool's IssuancePolicy specifies a maximum_lifetime the minimum of the two durations will be the maximum lifetime for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
|
|
237
|
+
/** Optional. The maximum lifetime allowed for issued Certificates that use this template. If the issuing CaPool resource's IssuancePolicy specifies a maximum_lifetime the minimum of the two durations will be the maximum lifetime for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
|
|
238
238
|
maximumLifetime?: string;
|
|
239
239
|
/** Output only. The resource name for this CertificateTemplate in the format `projects/*/locations/*/certificateTemplates/*`. */
|
|
240
240
|
name?: string;
|
|
@@ -246,7 +246,7 @@ declare namespace gapi.client {
|
|
|
246
246
|
updateTime?: string;
|
|
247
247
|
}
|
|
248
248
|
interface DisableCertificateAuthorityRequest {
|
|
249
|
-
/** Optional. This field allows this CA to be disabled even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent
|
|
249
|
+
/** Optional. This field allows this CA to be disabled even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resources since the CA will no longer be able to issue certificates. */
|
|
250
250
|
ignoreDependentResources?: boolean;
|
|
251
251
|
/** Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000). */
|
|
252
252
|
requestId?: string;
|
|
@@ -289,7 +289,7 @@ declare namespace gapi.client {
|
|
|
289
289
|
requestId?: string;
|
|
290
290
|
}
|
|
291
291
|
interface FetchCaCertsResponse {
|
|
292
|
-
/** The PEM encoded CA certificate chains of all
|
|
292
|
+
/** The PEM encoded CA certificate chains of all certificate authorities in this CaPool in the ENABLED, DISABLED, or STAGED states. */
|
|
293
293
|
caCerts?: CertChain[];
|
|
294
294
|
}
|
|
295
295
|
interface FetchCertificateAuthorityCsrResponse {
|
|
@@ -311,7 +311,7 @@ declare namespace gapi.client {
|
|
|
311
311
|
baselineValues?: X509Parameters;
|
|
312
312
|
/** Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity. */
|
|
313
313
|
identityConstraints?: CertificateIdentityConstraints;
|
|
314
|
-
/** Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
|
|
314
|
+
/** Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate resource's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
|
|
315
315
|
maximumLifetime?: string;
|
|
316
316
|
/** Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values. */
|
|
317
317
|
passthroughExtensions?: CertificateExtensionConstraints;
|
|
@@ -487,7 +487,7 @@ declare namespace gapi.client {
|
|
|
487
487
|
key?: string;
|
|
488
488
|
}
|
|
489
489
|
interface PublishingOptions {
|
|
490
|
-
/** Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM. */
|
|
490
|
+
/** Optional. Specifies the encoding format of each CertificateAuthority resource's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM. */
|
|
491
491
|
encodingFormat?: string;
|
|
492
492
|
/** Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates. */
|
|
493
493
|
publishCaCert?: boolean;
|
|
@@ -992,7 +992,7 @@ declare namespace gapi.client {
|
|
|
992
992
|
fields?: string;
|
|
993
993
|
/** Optional. This field allows the CA to be deleted even if the CA has active certs. Active certs include both unrevoked and unexpired certs. */
|
|
994
994
|
ignoreActiveCertificates?: boolean;
|
|
995
|
-
/** Optional. This field allows this
|
|
995
|
+
/** Optional. This field allows this CA to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resources since the CA will no longer be able to issue certificates. */
|
|
996
996
|
ignoreDependentResources?: boolean;
|
|
997
997
|
/** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
|
|
998
998
|
key?: string;
|
|
@@ -1685,7 +1685,7 @@ declare namespace gapi.client {
|
|
|
1685
1685
|
callback?: string;
|
|
1686
1686
|
/** Selector specifying which fields to include in a partial response. */
|
|
1687
1687
|
fields?: string;
|
|
1688
|
-
/** Optional. This field allows this pool to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent
|
|
1688
|
+
/** Optional. This field allows this pool to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resources since the pool will no longer be able to issue certificates. */
|
|
1689
1689
|
ignoreDependentResources?: boolean;
|
|
1690
1690
|
/** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
|
|
1691
1691
|
key?: string;
|
|
@@ -1704,7 +1704,7 @@ declare namespace gapi.client {
|
|
|
1704
1704
|
/** Legacy upload protocol for media (e.g. "media", "multipart"). */
|
|
1705
1705
|
uploadType?: string;
|
|
1706
1706
|
}): Request<Operation>;
|
|
1707
|
-
/** FetchCaCerts returns the current trust anchor for the CaPool. This will include CA certificate chains for all
|
|
1707
|
+
/** FetchCaCerts returns the current trust anchor for the CaPool. This will include CA certificate chains for all certificate authorities in the ENABLED, DISABLED, or STAGED states. */
|
|
1708
1708
|
fetchCaCerts(request: {
|
|
1709
1709
|
/** V1 error format. */
|
|
1710
1710
|
'$.xgafv'?: string;
|