@maxim_mazurok/gapi.client.privateca-v1 0.0.20240313 → 0.0.20240410

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/index.d.ts +10 -10
  2. package/package.json +1 -1
package/index.d.ts CHANGED
@@ -9,7 +9,7 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://privateca.googleapis.com/$discovery/rest?version=v1
12
- // Revision: 20240313
12
+ // Revision: 20240410
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
@@ -158,7 +158,7 @@ declare namespace gapi.client {
158
158
  publicKey?: PublicKey;
159
159
  /** Required. Specifies some of the values in a certificate that are related to the subject. */
160
160
  subjectConfig?: SubjectConfig;
161
- /** Optional. When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CAS, which was not generated using method (1) described in RFC 5280 section 4.2.1.2. */
161
+ /** Optional. When specified this provides a custom SKI to be used in the certificate. This should only be used to maintain a SKI of an existing CA originally created outside CA service, which was not generated using method (1) described in RFC 5280 section 4.2.1.2. */
162
162
  subjectKeyId?: CertificateConfigKeyId;
163
163
  /** Required. Describes how some of the technical X.509 fields in a certificate should be populated. */
164
164
  x509Config?: X509Parameters;
@@ -234,7 +234,7 @@ declare namespace gapi.client {
234
234
  identityConstraints?: CertificateIdentityConstraints;
235
235
  /** Optional. Labels with user-defined metadata. */
236
236
  labels?: {[P in string]: string};
237
- /** Optional. The maximum lifetime allowed for issued Certificates that use this template. If the issuing CaPool's IssuancePolicy specifies a maximum_lifetime the minimum of the two durations will be the maximum lifetime for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
237
+ /** Optional. The maximum lifetime allowed for issued Certificates that use this template. If the issuing CaPool resource's IssuancePolicy specifies a maximum_lifetime the minimum of the two durations will be the maximum lifetime for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
238
238
  maximumLifetime?: string;
239
239
  /** Output only. The resource name for this CertificateTemplate in the format `projects/*‍/locations/*‍/certificateTemplates/*`. */
240
240
  name?: string;
@@ -246,7 +246,7 @@ declare namespace gapi.client {
246
246
  updateTime?: string;
247
247
  }
248
248
  interface DisableCertificateAuthorityRequest {
249
- /** Optional. This field allows this CA to be disabled even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resource(s) since the CA will no longer be able to issue certificates. */
249
+ /** Optional. This field allows this CA to be disabled even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resources since the CA will no longer be able to issue certificates. */
250
250
  ignoreDependentResources?: boolean;
251
251
  /** Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000). */
252
252
  requestId?: string;
@@ -289,7 +289,7 @@ declare namespace gapi.client {
289
289
  requestId?: string;
290
290
  }
291
291
  interface FetchCaCertsResponse {
292
- /** The PEM encoded CA certificate chains of all Certificate Authorities in this CaPool in the ENABLED, DISABLED, or STAGED states. */
292
+ /** The PEM encoded CA certificate chains of all certificate authorities in this CaPool in the ENABLED, DISABLED, or STAGED states. */
293
293
  caCerts?: CertChain[];
294
294
  }
295
295
  interface FetchCertificateAuthorityCsrResponse {
@@ -311,7 +311,7 @@ declare namespace gapi.client {
311
311
  baselineValues?: X509Parameters;
312
312
  /** Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity. */
313
313
  identityConstraints?: CertificateIdentityConstraints;
314
- /** Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
314
+ /** Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate resource's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it. */
315
315
  maximumLifetime?: string;
316
316
  /** Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values. */
317
317
  passthroughExtensions?: CertificateExtensionConstraints;
@@ -487,7 +487,7 @@ declare namespace gapi.client {
487
487
  key?: string;
488
488
  }
489
489
  interface PublishingOptions {
490
- /** Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM. */
490
+ /** Optional. Specifies the encoding format of each CertificateAuthority resource's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM. */
491
491
  encodingFormat?: string;
492
492
  /** Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates. */
493
493
  publishCaCert?: boolean;
@@ -992,7 +992,7 @@ declare namespace gapi.client {
992
992
  fields?: string;
993
993
  /** Optional. This field allows the CA to be deleted even if the CA has active certs. Active certs include both unrevoked and unexpired certs. */
994
994
  ignoreActiveCertificates?: boolean;
995
- /** Optional. This field allows this ca to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resource(s) since the CA will no longer be able to issue certificates. */
995
+ /** Optional. This field allows this CA to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resources since the CA will no longer be able to issue certificates. */
996
996
  ignoreDependentResources?: boolean;
997
997
  /** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
998
998
  key?: string;
@@ -1685,7 +1685,7 @@ declare namespace gapi.client {
1685
1685
  callback?: string;
1686
1686
  /** Selector specifying which fields to include in a partial response. */
1687
1687
  fields?: string;
1688
- /** Optional. This field allows this pool to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resource(s) since the pool will no longer be able to issue certificates. */
1688
+ /** Optional. This field allows this pool to be deleted even if it's being depended on by another resource. However, doing so may result in unintended and unrecoverable effects on any dependent resources since the pool will no longer be able to issue certificates. */
1689
1689
  ignoreDependentResources?: boolean;
1690
1690
  /** API key. Your API key identifies your project and provides you with API access, quota, and reports. Required unless you provide an OAuth 2.0 token. */
1691
1691
  key?: string;
@@ -1704,7 +1704,7 @@ declare namespace gapi.client {
1704
1704
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1705
1705
  uploadType?: string;
1706
1706
  }): Request<Operation>;
1707
- /** FetchCaCerts returns the current trust anchor for the CaPool. This will include CA certificate chains for all Certificate Authorities in the ENABLED, DISABLED, or STAGED states. */
1707
+ /** FetchCaCerts returns the current trust anchor for the CaPool. This will include CA certificate chains for all certificate authorities in the ENABLED, DISABLED, or STAGED states. */
1708
1708
  fetchCaCerts(request: {
1709
1709
  /** V1 error format. */
1710
1710
  '$.xgafv'?: string;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.privateca-v1",
3
- "version": "0.0.20240313",
3
+ "version": "0.0.20240410",
4
4
  "description": "TypeScript typings for Certificate Authority API v1",
5
5
  "repository": {
6
6
  "type": "git",