Skip to content
This repository has been archived by the owner on Jul 6, 2023. It is now read-only.

Commit

Permalink
docs: mark CaPool.lifetime as IMMUTABLE (#177)
Browse files Browse the repository at this point in the history
- [ ] Regenerate this pull request now.

PiperOrigin-RevId: 425978220

Source-Link: googleapis/googleapis@16ce675

Source-Link: googleapis/googleapis-gen@ca09154
Copy-Tag: eyJwIjoiLmdpdGh1Yi8uT3dsQm90LnlhbWwiLCJoIjoiY2EwOTE1NDk0YTc3MDhkMDRjMTM3MDU4YzRlYWZlNjU4MTZhMWU3YiJ9

docs: add format requirements on `custom_sans`
  • Loading branch information
gcf-owl-bot[bot] committed Feb 3, 2022
1 parent d63e401 commit 259f1c9
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 18 deletions.
27 changes: 14 additions & 13 deletions google/cloud/security/privateca_v1/types/resources.py
Expand Up @@ -103,9 +103,9 @@ class CertificateAuthority(proto.Message):
Required. Immutable. The config used to
create a self-signed X.509 certificate or CSR.
lifetime (google.protobuf.duration_pb2.Duration):
Required. The desired lifetime of the CA certificate. Used
to create the "not_before_time" and "not_after_time" fields
inside an X.509 certificate.
Required. Immutable. The desired lifetime of the CA
certificate. Used to create the "not_before_time" and
"not_after_time" fields inside an X.509 certificate.
key_spec (google.cloud.security.privateca_v1.types.CertificateAuthority.KeyVersionSpec):
Required. Immutable. Used when issuing certificates for this
[CertificateAuthority][google.cloud.security.privateca.v1.CertificateAuthority].
Expand Down Expand Up @@ -212,7 +212,7 @@ class SignHashAlgorithm(proto.Enum):
[CryptoKeyVersionAlgorithm][google.cloud.kms.v1.CryptoKeyVersion.CryptoKeyVersionAlgorithm]
values. For RSA signing algorithms, the PSS algorithms should be
preferred, use PKCS1 algorithms if required for compatibility. For
further recommandations, see
further recommendations, see
https://cloud.google.com/kms/docs/algorithms#algorithm_recommendations.
"""
SIGN_HASH_ALGORITHM_UNSPECIFIED = 0
Expand Down Expand Up @@ -502,14 +502,14 @@ class RsaKeyType(proto.Message):
Attributes:
min_modulus_size (int):
Optional. The minimum allowed RSA modulus
size, in bits. If this is not set, or if set to
zero, the service-level min RSA modulus size
will continue to apply.
size (inclusive), in bits. If this is not set,
or if set to zero, the service-level min RSA
modulus size will continue to apply.
max_modulus_size (int):
Optional. The maximum allowed RSA modulus
size, in bits. If this is not set, or if set to
zero, the service will not enforce an explicit
upper bound on RSA modulus sizes.
size (inclusive), in bits. If this is not set,
or if set to zero, the service will not enforce
an explicit upper bound on RSA modulus sizes.
"""

min_modulus_size = proto.Field(proto.INT64, number=1,)
Expand Down Expand Up @@ -987,7 +987,7 @@ class SubordinateConfig(proto.Message):
certificate_authority (str):
Required. This can refer to a
[CertificateAuthority][google.cloud.security.privateca.v1.CertificateAuthority]
in the same project that was used to create a subordinate
that was used to create a subordinate
[CertificateAuthority][google.cloud.security.privateca.v1.CertificateAuthority].
This field is used for information and usability purposes
only. The resource name is in the format
Expand Down Expand Up @@ -1410,8 +1410,9 @@ class SubjectAltNames(proto.Message):
Contains only valid 32-bit IPv4 addresses or
RFC 4291 IPv6 addresses.
custom_sans (Sequence[google.cloud.security.privateca_v1.types.X509Extension]):
Contains additional subject alternative name
values.
Contains additional subject alternative name values. For
each custom_san, the ``value`` field must contain an ASN.1
encoded UTF8String.
"""

dns_names = proto.RepeatedField(proto.STRING, number=1,)
Expand Down
10 changes: 5 additions & 5 deletions google/cloud/security/privateca_v1/types/service.py
Expand Up @@ -95,11 +95,11 @@ class CreateCertificateRequest(proto.Message):
minutes since the first request.
For example, consider a situation where you make
an initial request and t he request times out.
If you make the request again with the same
request ID, the server can check if original
operation with the same request ID was received,
and if so, will ignore the second request. This
an initial request and the request times out. If
you make the request again with the same request
ID, the server can check if original operation
with the same request ID was received, and if
so, will ignore the second request. This
prevents clients from accidentally creating
duplicate commitments.
The request ID must be a valid UUID with the
Expand Down
Empty file added security-privateca-v1-py.tar.gz
Empty file.

0 comments on commit 259f1c9

Please sign in to comment.