@@ -30,8 +30,8 @@ export interface AccessSecretVersionResponse {
3030 /** The base64-encoded secret payload of the version. */
3131 data : string
3232 /**
33- * The CRC32 checksum of the data as a base-10 integer. This field is present
34- * only if a CRC32 was supplied during the creation of the version.
33+ * The CRC32 checksum of the data as a base-10 integer. This field is only
34+ * available if a CRC32 was supplied during the creation of the version.
3535 */
3636 dataCrc32 ?: number
3737}
@@ -235,7 +235,7 @@ export type CreateSecretVersionRequest = {
235235 disablePrevious ?: boolean
236236 /**
237237 * Options to generate a password. Optional. If specified, a random password
238- * will be generated. The data and data_crc32 fields must be empty. By
238+ * will be generated. The ` data` and ` data_crc32` fields must be empty. By
239239 * default, the generator will use upper and lower case letters, and digits.
240240 * This behavior can be tuned using the generation parameters.
241241 *
@@ -245,9 +245,9 @@ export type CreateSecretVersionRequest = {
245245 passwordGeneration ?: PasswordGenerationParams
246246 /**
247247 * The CRC32 checksum of the data as a base-10 integer. Optional. If
248- * specified, the Secret Manager will verify the integrity of the data
249- * received against the given CRC32. An error is returned if the CRC32 does
250- * not match. Otherwise, the CRC32 will be stored and returned along with the
248+ * specified, Secret Manager will verify the integrity of the data received
249+ * against the given CRC32. An error is returned if the CRC32 does not match.
250+ * Otherwise, the CRC32 will be stored and returned along with the
251251 * SecretVersion on futur accesses.
252252 */
253253 dataCrc32 ?: number
0 commit comments