@maxim_mazurok/gapi.client.privateca-v1 0.0.20250101 → 0.0.20250120

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/index.d.ts +32 -24
  2. package/package.json +1 -1
  3. package/readme.md +2 -2
package/index.d.ts CHANGED
@@ -9,14 +9,14 @@
9
9
  // This file was generated by https://github.com/Maxim-Mazurok/google-api-typings-generator. Please do not edit it manually.
10
10
  // In case of any problems please post issue to https://github.com/Maxim-Mazurok/google-api-typings-generator
11
11
  // Generated from: https://privateca.googleapis.com/$discovery/rest?version=v1
12
- // Revision: 20250101
12
+ // Revision: 20250120
13
13
 
14
14
  /// <reference types="gapi.client" />
15
15
 
16
16
  declare namespace gapi.client {
17
17
  /** Load Certificate Authority API v1 */
18
18
  function load(
19
- urlOrObject: 'https://privateca.googleapis.com/$discovery/rest?version=v1'
19
+ urlOrObject: 'https://privateca.googleapis.com/$discovery/rest?version=v1',
20
20
  ): Promise<void>;
21
21
  /** @deprecated Please load APIs with discovery documents. */
22
22
  function load(name: 'privateca', version: 'v1'): Promise<void>;
@@ -156,6 +156,8 @@ declare namespace gapi.client {
156
156
  type?: string;
157
157
  /** Output only. The time at which this CertificateAuthority was last updated. */
158
158
  updateTime?: string;
159
+ /** Optional. User-defined URLs for accessing content published by this CertificateAuthority, including the CA certificate and the PEM-encoded CRLs. The service does not publish content to these URLs. It is up to the user to mirror content to these URLs. */
160
+ userDefinedAccessUrls?: UserDefinedAccessUrls;
159
161
  }
160
162
  interface CertificateConfig {
161
163
  /** Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR. */
@@ -618,6 +620,12 @@ declare namespace gapi.client {
618
620
  /** Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000). */
619
621
  requestId?: string;
620
622
  }
623
+ interface UserDefinedAccessUrls {
624
+ /** Optional. A list of URLs where the issuer CA certificate may be downloaded, which appears in the "Authority Information Access" extension in the certificate. */
625
+ aiaIssuingCertificateUrls?: string[];
626
+ /** Optional. A list of URLs where to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13 */
627
+ crlAccessUrls?: string[];
628
+ }
621
629
  interface X509Extension {
622
630
  /** Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error). */
623
631
  critical?: boolean;
@@ -796,7 +804,7 @@ declare namespace gapi.client {
796
804
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
797
805
  uploadType?: string;
798
806
  },
799
- body: CertificateRevocationList
807
+ body: CertificateRevocationList,
800
808
  ): Request<Operation>;
801
809
  /** Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors. */
802
810
  setIamPolicy(
@@ -826,7 +834,7 @@ declare namespace gapi.client {
826
834
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
827
835
  uploadType?: string;
828
836
  },
829
- body: SetIamPolicyRequest
837
+ body: SetIamPolicyRequest,
830
838
  ): Request<Policy>;
831
839
  /** Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning. */
832
840
  testIamPermissions(
@@ -856,7 +864,7 @@ declare namespace gapi.client {
856
864
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
857
865
  uploadType?: string;
858
866
  },
859
- body: TestIamPermissionsRequest
867
+ body: TestIamPermissionsRequest,
860
868
  ): Request<TestIamPermissionsResponse>;
861
869
  }
862
870
  interface CertificateAuthoritiesResource {
@@ -916,7 +924,7 @@ declare namespace gapi.client {
916
924
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
917
925
  uploadType?: string;
918
926
  },
919
- body: ActivateCertificateAuthorityRequest
927
+ body: ActivateCertificateAuthorityRequest,
920
928
  ): Request<Operation>;
921
929
  /** Create a new CertificateAuthority in a given Project and Location. */
922
930
  create(request: {
@@ -982,7 +990,7 @@ declare namespace gapi.client {
982
990
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
983
991
  uploadType?: string;
984
992
  },
985
- body: CertificateAuthority
993
+ body: CertificateAuthority,
986
994
  ): Request<Operation>;
987
995
  /** Delete a CertificateAuthority. */
988
996
  delete(request?: {
@@ -1075,7 +1083,7 @@ declare namespace gapi.client {
1075
1083
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1076
1084
  uploadType?: string;
1077
1085
  },
1078
- body: DisableCertificateAuthorityRequest
1086
+ body: DisableCertificateAuthorityRequest,
1079
1087
  ): Request<Operation>;
1080
1088
  /** Enable a CertificateAuthority. */
1081
1089
  enable(request: {
@@ -1133,7 +1141,7 @@ declare namespace gapi.client {
1133
1141
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1134
1142
  uploadType?: string;
1135
1143
  },
1136
- body: EnableCertificateAuthorityRequest
1144
+ body: EnableCertificateAuthorityRequest,
1137
1145
  ): Request<Operation>;
1138
1146
  /** Fetch a certificate signing request (CSR) from a CertificateAuthority that is in state AWAITING_USER_ACTIVATION and is of type SUBORDINATE. The CSR must then be signed by the desired parent Certificate Authority, which could be another CertificateAuthority resource, or could be an on-prem certificate authority. See also ActivateCertificateAuthority. */
1139
1147
  fetch(request?: {
@@ -1288,7 +1296,7 @@ declare namespace gapi.client {
1288
1296
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1289
1297
  uploadType?: string;
1290
1298
  },
1291
- body: CertificateAuthority
1299
+ body: CertificateAuthority,
1292
1300
  ): Request<Operation>;
1293
1301
  /** Undelete a CertificateAuthority that has been deleted. */
1294
1302
  undelete(request: {
@@ -1346,7 +1354,7 @@ declare namespace gapi.client {
1346
1354
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1347
1355
  uploadType?: string;
1348
1356
  },
1349
- body: UndeleteCertificateAuthorityRequest
1357
+ body: UndeleteCertificateAuthorityRequest,
1350
1358
  ): Request<Operation>;
1351
1359
  certificateRevocationLists: CertificateRevocationListsResource;
1352
1360
  }
@@ -1423,7 +1431,7 @@ declare namespace gapi.client {
1423
1431
  /** Optional. If this is true, no Certificate resource will be persisted regardless of the CaPool's tier, and the returned Certificate will not contain the pem_certificate field. */
1424
1432
  validateOnly?: boolean;
1425
1433
  },
1426
- body: Certificate
1434
+ body: Certificate,
1427
1435
  ): Request<Certificate>;
1428
1436
  /** Returns a Certificate. */
1429
1437
  get(request?: {
@@ -1551,7 +1559,7 @@ declare namespace gapi.client {
1551
1559
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1552
1560
  uploadType?: string;
1553
1561
  },
1554
- body: Certificate
1562
+ body: Certificate,
1555
1563
  ): Request<Certificate>;
1556
1564
  /** Revoke a Certificate. */
1557
1565
  revoke(request: {
@@ -1609,7 +1617,7 @@ declare namespace gapi.client {
1609
1617
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1610
1618
  uploadType?: string;
1611
1619
  },
1612
- body: RevokeCertificateRequest
1620
+ body: RevokeCertificateRequest,
1613
1621
  ): Request<Certificate>;
1614
1622
  }
1615
1623
  interface CaPoolsResource {
@@ -1677,7 +1685,7 @@ declare namespace gapi.client {
1677
1685
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1678
1686
  uploadType?: string;
1679
1687
  },
1680
- body: CaPool
1688
+ body: CaPool,
1681
1689
  ): Request<Operation>;
1682
1690
  /** Delete a CaPool. */
1683
1691
  delete(request?: {
@@ -1766,7 +1774,7 @@ declare namespace gapi.client {
1766
1774
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1767
1775
  uploadType?: string;
1768
1776
  },
1769
- body: FetchCaCertsRequest
1777
+ body: FetchCaCertsRequest,
1770
1778
  ): Request<FetchCaCertsResponse>;
1771
1779
  /** Returns a CaPool. */
1772
1780
  get(request?: {
@@ -1923,7 +1931,7 @@ declare namespace gapi.client {
1923
1931
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1924
1932
  uploadType?: string;
1925
1933
  },
1926
- body: CaPool
1934
+ body: CaPool,
1927
1935
  ): Request<Operation>;
1928
1936
  /** Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors. */
1929
1937
  setIamPolicy(
@@ -1953,7 +1961,7 @@ declare namespace gapi.client {
1953
1961
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1954
1962
  uploadType?: string;
1955
1963
  },
1956
- body: SetIamPolicyRequest
1964
+ body: SetIamPolicyRequest,
1957
1965
  ): Request<Policy>;
1958
1966
  /** Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning. */
1959
1967
  testIamPermissions(
@@ -1983,7 +1991,7 @@ declare namespace gapi.client {
1983
1991
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
1984
1992
  uploadType?: string;
1985
1993
  },
1986
- body: TestIamPermissionsRequest
1994
+ body: TestIamPermissionsRequest,
1987
1995
  ): Request<TestIamPermissionsResponse>;
1988
1996
  certificateAuthorities: CertificateAuthoritiesResource;
1989
1997
  certificates: CertificatesResource;
@@ -2053,7 +2061,7 @@ declare namespace gapi.client {
2053
2061
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
2054
2062
  uploadType?: string;
2055
2063
  },
2056
- body: CertificateTemplate
2064
+ body: CertificateTemplate,
2057
2065
  ): Request<Operation>;
2058
2066
  /** DeleteCertificateTemplate deletes a CertificateTemplate. */
2059
2067
  delete(request?: {
@@ -2239,7 +2247,7 @@ declare namespace gapi.client {
2239
2247
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
2240
2248
  uploadType?: string;
2241
2249
  },
2242
- body: CertificateTemplate
2250
+ body: CertificateTemplate,
2243
2251
  ): Request<Operation>;
2244
2252
  /** Sets the access control policy on the specified resource. Replaces any existing policy. Can return `NOT_FOUND`, `INVALID_ARGUMENT`, and `PERMISSION_DENIED` errors. */
2245
2253
  setIamPolicy(
@@ -2269,7 +2277,7 @@ declare namespace gapi.client {
2269
2277
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
2270
2278
  uploadType?: string;
2271
2279
  },
2272
- body: SetIamPolicyRequest
2280
+ body: SetIamPolicyRequest,
2273
2281
  ): Request<Policy>;
2274
2282
  /** Returns permissions that a caller has on the specified resource. If the resource does not exist, this will return an empty set of permissions, not a `NOT_FOUND` error. Note: This operation is designed to be used for building permission-aware UIs and command-line tools, not for authorization checking. This operation may "fail open" without warning. */
2275
2283
  testIamPermissions(
@@ -2299,7 +2307,7 @@ declare namespace gapi.client {
2299
2307
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
2300
2308
  uploadType?: string;
2301
2309
  },
2302
- body: TestIamPermissionsRequest
2310
+ body: TestIamPermissionsRequest,
2303
2311
  ): Request<TestIamPermissionsResponse>;
2304
2312
  }
2305
2313
  interface OperationsResource {
@@ -2359,7 +2367,7 @@ declare namespace gapi.client {
2359
2367
  /** Legacy upload protocol for media (e.g. "media", "multipart"). */
2360
2368
  uploadType?: string;
2361
2369
  },
2362
- body: CancelOperationRequest
2370
+ body: CancelOperationRequest,
2363
2371
  ): Request<{}>;
2364
2372
  /** Deletes a long-running operation. This method indicates that the client is no longer interested in the operation result. It does not cancel the operation. If the server doesn't support this method, it returns `google.rpc.Code.UNIMPLEMENTED`. */
2365
2373
  delete(request?: {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@maxim_mazurok/gapi.client.privateca-v1",
3
- "version": "0.0.20250101",
3
+ "version": "0.0.20250120",
4
4
  "description": "TypeScript typings for Certificate Authority API v1",
5
5
  "repository": {
6
6
  "type": "git",
package/readme.md CHANGED
@@ -30,7 +30,7 @@ gapi.client.load(
30
30
  () => {
31
31
  // now we can use:
32
32
  // gapi.client.privateca
33
- }
33
+ },
34
34
  );
35
35
  ```
36
36
 
@@ -62,7 +62,7 @@ gapi.auth.authorize(
62
62
  } else {
63
63
  /* handle authorization error */
64
64
  }
65
- }
65
+ },
66
66
  );
67
67
  ```
68
68