You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/privateca_v1.projects.locations.caPools.html
-8
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,6 @@ <h3>Method Details</h3>
133
133
The object takes the form of:
134
134
135
135
{ # A CaPool represents a group of CertificateAuthorities that form a trust anchor. A CaPool can be used to manage issuance policies for one or more CertificateAuthority resources and to rotate CA certificates in and out of the trust anchor.
136
-
"createTime": "A String", # Output only. The time at which this CaPool was created.
137
136
"issuancePolicy": { # Defines controls over all certificate issuance within a CaPool. # Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
138
137
"allowedIssuanceModes": { # IssuanceModes specifies the allowed ways in which Certificates may be requested from this CaPool. # Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
139
138
"allowConfigBasedIssuance": True or False, # Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
@@ -238,7 +237,6 @@ <h3>Method Details</h3>
238
237
"publishCrl": True or False, # Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
239
238
},
240
239
"tier": "A String", # Required. Immutable. The Tier of this CaPool.
241
-
"updateTime": "A String", # Output only. The time at which this CaPool was last updated.
242
240
}
243
241
244
242
caPoolId: string, Required. It must be unique within a location and match the regular expression `[a-zA-Z0-9_-]{1,63}`
@@ -355,7 +353,6 @@ <h3>Method Details</h3>
355
353
An object of the form:
356
354
357
355
{ # A CaPool represents a group of CertificateAuthorities that form a trust anchor. A CaPool can be used to manage issuance policies for one or more CertificateAuthority resources and to rotate CA certificates in and out of the trust anchor.
358
-
"createTime": "A String", # Output only. The time at which this CaPool was created.
359
356
"issuancePolicy": { # Defines controls over all certificate issuance within a CaPool. # Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
360
357
"allowedIssuanceModes": { # IssuanceModes specifies the allowed ways in which Certificates may be requested from this CaPool. # Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
361
358
"allowConfigBasedIssuance": True or False, # Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
@@ -460,7 +457,6 @@ <h3>Method Details</h3>
460
457
"publishCrl": True or False, # Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
461
458
},
462
459
"tier": "A String", # Required. Immutable. The Tier of this CaPool.
463
-
"updateTime": "A String", # Output only. The time at which this CaPool was last updated.
464
460
}</pre>
465
461
</div>
466
462
@@ -533,7 +529,6 @@ <h3>Method Details</h3>
533
529
{ # Response message for CertificateAuthorityService.ListCaPools.
534
530
"caPools": [ # The list of CaPools.
535
531
{ # A CaPool represents a group of CertificateAuthorities that form a trust anchor. A CaPool can be used to manage issuance policies for one or more CertificateAuthority resources and to rotate CA certificates in and out of the trust anchor.
536
-
"createTime": "A String", # Output only. The time at which this CaPool was created.
537
532
"issuancePolicy": { # Defines controls over all certificate issuance within a CaPool. # Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
538
533
"allowedIssuanceModes": { # IssuanceModes specifies the allowed ways in which Certificates may be requested from this CaPool. # Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
539
534
"allowConfigBasedIssuance": True or False, # Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
@@ -638,7 +633,6 @@ <h3>Method Details</h3>
638
633
"publishCrl": True or False, # Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
639
634
},
640
635
"tier": "A String", # Required. Immutable. The Tier of this CaPool.
641
-
"updateTime": "A String", # Output only. The time at which this CaPool was last updated.
642
636
},
643
637
],
644
638
"nextPageToken": "A String", # A token to retrieve next page of results. Pass this value in ListCertificateAuthoritiesRequest.next_page_token to retrieve the next page of results.
@@ -672,7 +666,6 @@ <h3>Method Details</h3>
672
666
The object takes the form of:
673
667
674
668
{ # A CaPool represents a group of CertificateAuthorities that form a trust anchor. A CaPool can be used to manage issuance policies for one or more CertificateAuthority resources and to rotate CA certificates in and out of the trust anchor.
675
-
"createTime": "A String", # Output only. The time at which this CaPool was created.
676
669
"issuancePolicy": { # Defines controls over all certificate issuance within a CaPool. # Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
677
670
"allowedIssuanceModes": { # IssuanceModes specifies the allowed ways in which Certificates may be requested from this CaPool. # Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
678
671
"allowConfigBasedIssuance": True or False, # Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
@@ -777,7 +770,6 @@ <h3>Method Details</h3>
777
770
"publishCrl": True or False, # Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
778
771
},
779
772
"tier": "A String", # Required. Immutable. The Tier of this CaPool.
780
-
"updateTime": "A String", # Output only. The time at which this CaPool was last updated.
781
773
}
782
774
783
775
requestId: string, Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
Copy file name to clipboardExpand all lines: googleapiclient/discovery_cache/documents/privateca.v1.json
+1-13
Original file line number
Diff line number
Diff line change
@@ -1590,7 +1590,7 @@
1590
1590
}
1591
1591
}
1592
1592
},
1593
-
"revision": "20211020",
1593
+
"revision": "20211101",
1594
1594
"rootUrl": "https://privateca.googleapis.com/",
1595
1595
"schemas": {
1596
1596
"AccessUrls": {
@@ -1735,12 +1735,6 @@
1735
1735
"description": "A CaPool represents a group of CertificateAuthorities that form a trust anchor. A CaPool can be used to manage issuance policies for one or more CertificateAuthority resources and to rotate CA certificates in and out of the trust anchor.",
1736
1736
"id": "CaPool",
1737
1737
"properties": {
1738
-
"createTime": {
1739
-
"description": "Output only. The time at which this CaPool was created.",
1740
-
"format": "google-datetime",
1741
-
"readOnly": true,
1742
-
"type": "string"
1743
-
},
1744
1738
"issuancePolicy": {
1745
1739
"$ref": "IssuancePolicy",
1746
1740
"description": "Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool."
@@ -1774,12 +1768,6 @@
1774
1768
"DevOps tier."
1775
1769
],
1776
1770
"type": "string"
1777
-
},
1778
-
"updateTime": {
1779
-
"description": "Output only. The time at which this CaPool was last updated.",
0 commit comments