@ibm-cloud/secrets-manager 2.0.2 → 2.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +2 -0
- package/README.md +1 -2
- package/examples/secrets-manager.v2.test.js +1 -1
- package/package.json +2 -2
- package/secrets-manager/v2.d.ts +122 -55
- package/secrets-manager/v2.js +4 -4
- package/secrets-manager/v2.js.map +1 -1
- package/secrets-manager/v1.d.ts +0 -4805
- package/secrets-manager/v1.js +0 -2495
- package/secrets-manager/v1.js.map +0 -1
package/CHANGELOG.md
CHANGED
|
@@ -1,3 +1,5 @@
|
|
|
1
|
+
## [2.0.3](https://github.com/IBM/secrets-manager-node-sdk/compare/v2.0.2...v2.0.3) (2024-02-07)
|
|
2
|
+
|
|
1
3
|
## [2.0.2](https://github.com/IBM/secrets-manager-node-sdk/compare/v2.0.1...v2.0.2) (2023-12-11)
|
|
2
4
|
|
|
3
5
|
## [2.0.1](https://github.com/IBM/secrets-manager-node-sdk/compare/v2.0.0...v2.0.1) (2023-09-19)
|
package/README.md
CHANGED
|
@@ -227,8 +227,7 @@ npm test
|
|
|
227
227
|
|
|
228
228
|
## Questions
|
|
229
229
|
|
|
230
|
-
If you're having difficulties using this SDK, you can ask questions about this project by
|
|
231
|
-
using [Stack Overflow](https://stackoverflow.com/questions/tagged/ibm-secrets-manager). Be sure to include
|
|
230
|
+
If you're having difficulties using this SDK, you can ask questions about this project by using [Stack Overflow](https://stackoverflow.com/questions/tagged/ibm-secrets-manager). Be sure to include
|
|
232
231
|
the `ibm-cloud` and `ibm-secrets-manager` tags.
|
|
233
232
|
|
|
234
233
|
You can also check out the [Secrets Manager documentation](https://cloud.ibm.com/docs/secrets-manager)
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@ibm-cloud/secrets-manager",
|
|
3
|
-
"version": "2.0.
|
|
3
|
+
"version": "2.0.3",
|
|
4
4
|
"description": "Client library for IBM Cloud Secrets Manager",
|
|
5
5
|
"repository": {
|
|
6
6
|
"type": "git",
|
|
@@ -36,7 +36,7 @@
|
|
|
36
36
|
},
|
|
37
37
|
"dependencies": {
|
|
38
38
|
"extend": "^3.0.2",
|
|
39
|
-
"ibm-cloud-sdk-core": "^4.
|
|
39
|
+
"ibm-cloud-sdk-core": "^4.2.2"
|
|
40
40
|
},
|
|
41
41
|
"jest": {
|
|
42
42
|
"collectCoverage": true,
|
package/secrets-manager/v2.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* (C) Copyright IBM Corp.
|
|
2
|
+
* (C) Copyright IBM Corp. 2024.
|
|
3
3
|
*
|
|
4
4
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
5
5
|
* you may not use this file except in compliance with the License.
|
|
@@ -53,7 +53,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
53
53
|
* @param {UserOptions} [options] - The parameters to send to the service.
|
|
54
54
|
* @param {string} [options.serviceName] - The name of the service to configure
|
|
55
55
|
* @param {Authenticator} [options.authenticator] - The Authenticator object used to authenticate requests to the service
|
|
56
|
-
* @param {string} [options.serviceUrl] - The URL for the service
|
|
56
|
+
* @param {string} [options.serviceUrl] - The base URL for the service
|
|
57
57
|
* @returns {SecretsManagerV2}
|
|
58
58
|
*/
|
|
59
59
|
static newInstance(options: UserOptions): SecretsManagerV2;
|
|
@@ -61,7 +61,7 @@ declare class SecretsManagerV2 extends BaseService {
|
|
|
61
61
|
* Construct a SecretsManagerV2 object.
|
|
62
62
|
*
|
|
63
63
|
* @param {Object} options - Options for the service.
|
|
64
|
-
* @param {string} [options.serviceUrl] - The base
|
|
64
|
+
* @param {string} [options.serviceUrl] - The base URL for the service
|
|
65
65
|
* @param {OutgoingHttpHeaders} [options.headers] - Default headers that shall be included with every request to the service.
|
|
66
66
|
* @param {Authenticator} options.authenticator - The Authenticator object used to authenticate requests to the service
|
|
67
67
|
* @constructor
|
|
@@ -1450,13 +1450,6 @@ declare namespace SecretsManagerV2 {
|
|
|
1450
1450
|
/** The details of your configuration. */
|
|
1451
1451
|
interface ConfigurationPrototype {
|
|
1452
1452
|
}
|
|
1453
|
-
/** The Cloud Object Storage HMAC keys that are returned after you create a service credentials secret. */
|
|
1454
|
-
interface CosHmacKeys {
|
|
1455
|
-
/** The access key ID for Cloud Object Storage HMAC credentials. */
|
|
1456
|
-
access_key_id?: string;
|
|
1457
|
-
/** The secret access key ID for Cloud Object Storage HMAC credentials. */
|
|
1458
|
-
secret_access_key?: string;
|
|
1459
|
-
}
|
|
1460
1453
|
/** The details of the Event Notifications registration. */
|
|
1461
1454
|
interface NotificationsRegistration {
|
|
1462
1455
|
/** A CRN that uniquely identifies an IBM Cloud resource. */
|
|
@@ -1482,6 +1475,39 @@ declare namespace SecretsManagerV2 {
|
|
|
1482
1475
|
/** A URL that points to a page in a collection. */
|
|
1483
1476
|
href: string;
|
|
1484
1477
|
}
|
|
1478
|
+
/** Policy for auto-generated passwords. */
|
|
1479
|
+
interface PasswordGenerationPolicy {
|
|
1480
|
+
/** The length of auto-generated passwords. */
|
|
1481
|
+
length?: number;
|
|
1482
|
+
/** Include digits in auto-generated passwords. */
|
|
1483
|
+
include_digits?: boolean;
|
|
1484
|
+
/** Include symbols in auto-generated passwords. */
|
|
1485
|
+
include_symbols?: boolean;
|
|
1486
|
+
/** Include uppercase letters in auto-generated passwords. */
|
|
1487
|
+
include_uppercase?: boolean;
|
|
1488
|
+
}
|
|
1489
|
+
/** Policy patch for auto-generated passwords. Policy properties that are included in the patch are updated. Properties that are not included in the patch remain unchanged. */
|
|
1490
|
+
interface PasswordGenerationPolicyPatch {
|
|
1491
|
+
/** The length of auto-generated passwords. */
|
|
1492
|
+
length?: number;
|
|
1493
|
+
/** Include digits in auto-generated passwords. */
|
|
1494
|
+
include_digits?: boolean;
|
|
1495
|
+
/** Include symbols in auto-generated passwords. */
|
|
1496
|
+
include_symbols?: boolean;
|
|
1497
|
+
/** Include uppercase letters in auto-generated passwords. */
|
|
1498
|
+
include_uppercase?: boolean;
|
|
1499
|
+
}
|
|
1500
|
+
/** Policy for auto-generated passwords. */
|
|
1501
|
+
interface PasswordGenerationPolicyRO {
|
|
1502
|
+
/** The length of auto-generated passwords. */
|
|
1503
|
+
length?: number;
|
|
1504
|
+
/** Include digits in auto-generated passwords. */
|
|
1505
|
+
include_digits?: boolean;
|
|
1506
|
+
/** Include symbols in auto-generated passwords. */
|
|
1507
|
+
include_symbols?: boolean;
|
|
1508
|
+
/** Include uppercase letters in auto-generated passwords. */
|
|
1509
|
+
include_uppercase?: boolean;
|
|
1510
|
+
}
|
|
1485
1511
|
/** The configuration data of your Private Certificate. */
|
|
1486
1512
|
interface PrivateCertificateCAData {
|
|
1487
1513
|
}
|
|
@@ -1763,10 +1789,6 @@ declare namespace SecretsManagerV2 {
|
|
|
1763
1789
|
* field to understand the duration of the lease.
|
|
1764
1790
|
*/
|
|
1765
1791
|
apikey?: string;
|
|
1766
|
-
/** The Cloud Object Storage HMAC keys that are returned after you create a service credentials secret. */
|
|
1767
|
-
cos_hmac_keys?: CosHmacKeys;
|
|
1768
|
-
/** The endpoints that are returned after you create a service credentials secret. */
|
|
1769
|
-
endpoints?: string;
|
|
1770
1792
|
/** The IAM API key description for the generated service credentials. */
|
|
1771
1793
|
iam_apikey_description?: string;
|
|
1772
1794
|
/** The IAM API key id for the generated service credentials. */
|
|
@@ -1777,8 +1799,8 @@ declare namespace SecretsManagerV2 {
|
|
|
1777
1799
|
iam_role_crn?: string;
|
|
1778
1800
|
/** The IAM Service ID CRN. */
|
|
1779
1801
|
iam_serviceid_crn?: string;
|
|
1780
|
-
/**
|
|
1781
|
-
|
|
1802
|
+
/** ServiceCredentialsSecretCredentials accepts additional properties. */
|
|
1803
|
+
[propName: string]: any;
|
|
1782
1804
|
}
|
|
1783
1805
|
/** The properties that are required to create the service credentials for the specified source service instance. */
|
|
1784
1806
|
interface ServiceCredentialsSecretSourceService {
|
|
@@ -1796,6 +1818,23 @@ declare namespace SecretsManagerV2 {
|
|
|
1796
1818
|
* roles.
|
|
1797
1819
|
*/
|
|
1798
1820
|
role?: ServiceCredentialsSourceServiceRole;
|
|
1821
|
+
}
|
|
1822
|
+
/** The properties of the resource key that was created for this source service instance. */
|
|
1823
|
+
interface ServiceCredentialsSecretSourceServiceRO {
|
|
1824
|
+
/** The source service instance identifier. */
|
|
1825
|
+
instance: ServiceCredentialsSourceServiceInstance;
|
|
1826
|
+
/** Configuration options represented as key-value pairs. Service-defined options are used in the generation of
|
|
1827
|
+
* credentials for some services. For example, Cloud Object Storage accepts the optional boolean parameter HMAC for
|
|
1828
|
+
* creating specific kind of credentials.
|
|
1829
|
+
*/
|
|
1830
|
+
parameters?: ServiceCredentialsSourceServiceParameters;
|
|
1831
|
+
/** The service-specific custom role. CRN is accepted. The role is assigned as part of an access policy to any
|
|
1832
|
+
* auto-generated IAM service ID. If you provide an existing service ID, it is added to the access policy for that
|
|
1833
|
+
* ID. If a role is not provided, any new service IDs that are autogenerated, will not have an assigned access
|
|
1834
|
+
* policy and provided service IDs are not changed in any way. Refer to the service documentation for supported
|
|
1835
|
+
* roles.
|
|
1836
|
+
*/
|
|
1837
|
+
role?: ServiceCredentialsSourceServiceRole;
|
|
1799
1838
|
/** The source service IAM data is returned in case IAM credentials where created for this secret. */
|
|
1800
1839
|
iam?: ServiceCredentialsSourceServiceIam;
|
|
1801
1840
|
/** The source service resource key data of the generated service credentials. */
|
|
@@ -4207,7 +4246,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4207
4246
|
serial_number?: string;
|
|
4208
4247
|
/** The type of configuration action. */
|
|
4209
4248
|
action_type: PrivateCertificateConfigurationActionSignIntermediate.Constants.ActionType | string;
|
|
4210
|
-
/** The
|
|
4249
|
+
/** The name of the intermediate certificate authority configuration. */
|
|
4211
4250
|
intermediate_certificate_authority: string;
|
|
4212
4251
|
}
|
|
4213
4252
|
namespace PrivateCertificateConfigurationActionSignIntermediate {
|
|
@@ -4306,7 +4345,7 @@ declare namespace SecretsManagerV2 {
|
|
|
4306
4345
|
serial_number?: string;
|
|
4307
4346
|
/** The type of configuration action. */
|
|
4308
4347
|
action_type: PrivateCertificateConfigurationActionSignIntermediatePrototype.Constants.ActionType | string;
|
|
4309
|
-
/** The
|
|
4348
|
+
/** The name of the intermediate certificate authority configuration. */
|
|
4310
4349
|
intermediate_certificate_authority: string;
|
|
4311
4350
|
}
|
|
4312
4351
|
namespace PrivateCertificateConfigurationActionSignIntermediatePrototype {
|
|
@@ -6425,8 +6464,8 @@ declare namespace SecretsManagerV2 {
|
|
|
6425
6464
|
updated_at: string;
|
|
6426
6465
|
/** The configuration of the Let's Encrypt CA environment. */
|
|
6427
6466
|
lets_encrypt_environment: PublicCertificateConfigurationCALetsEncrypt.Constants.LetsEncryptEnvironment | string;
|
|
6428
|
-
/**
|
|
6429
|
-
*
|
|
6467
|
+
/** This field supports only the chains that Let's Encrypt provides. Keep empty to use the default or supply a
|
|
6468
|
+
* valid Let's Encrypt-provided value. For a list of supported chains, see: https://letsencrypt.org/certificates/.
|
|
6430
6469
|
*/
|
|
6431
6470
|
lets_encrypt_preferred_chain?: string;
|
|
6432
6471
|
/** The PEM-encoded private key of your Let's Encrypt account. The data must be formatted on a single line with
|
|
@@ -6486,8 +6525,8 @@ declare namespace SecretsManagerV2 {
|
|
|
6486
6525
|
updated_at: string;
|
|
6487
6526
|
/** The configuration of the Let's Encrypt CA environment. */
|
|
6488
6527
|
lets_encrypt_environment: PublicCertificateConfigurationCALetsEncryptMetadata.Constants.LetsEncryptEnvironment | string;
|
|
6489
|
-
/**
|
|
6490
|
-
*
|
|
6528
|
+
/** This field supports only the chains that Let's Encrypt provides. Keep empty to use the default or supply a
|
|
6529
|
+
* valid Let's Encrypt-provided value. For a list of supported chains, see: https://letsencrypt.org/certificates/.
|
|
6491
6530
|
*/
|
|
6492
6531
|
lets_encrypt_preferred_chain?: string;
|
|
6493
6532
|
}
|
|
@@ -6529,8 +6568,8 @@ declare namespace SecretsManagerV2 {
|
|
|
6529
6568
|
* embedded newline characters.
|
|
6530
6569
|
*/
|
|
6531
6570
|
lets_encrypt_private_key?: string;
|
|
6532
|
-
/**
|
|
6533
|
-
*
|
|
6571
|
+
/** This field supports only the chains that Let's Encrypt provides. Keep empty to use the default or supply a
|
|
6572
|
+
* valid Let's Encrypt-provided value. For a list of supported chains, see: https://letsencrypt.org/certificates/.
|
|
6534
6573
|
*/
|
|
6535
6574
|
lets_encrypt_preferred_chain?: string;
|
|
6536
6575
|
}
|
|
@@ -6562,8 +6601,8 @@ declare namespace SecretsManagerV2 {
|
|
|
6562
6601
|
* embedded newline characters.
|
|
6563
6602
|
*/
|
|
6564
6603
|
lets_encrypt_private_key: string;
|
|
6565
|
-
/**
|
|
6566
|
-
*
|
|
6604
|
+
/** This field supports only the chains that Let's Encrypt provides. Keep empty to use the default or supply a
|
|
6605
|
+
* valid Let's Encrypt-provided value. For a list of supported chains, see: https://letsencrypt.org/certificates/.
|
|
6567
6606
|
*/
|
|
6568
6607
|
lets_encrypt_preferred_chain?: string;
|
|
6569
6608
|
}
|
|
@@ -6765,16 +6804,22 @@ declare namespace SecretsManagerV2 {
|
|
|
6765
6804
|
created_at: string;
|
|
6766
6805
|
/** The date when a resource was modified. The date format follows `RFC 3339`. */
|
|
6767
6806
|
updated_at: string;
|
|
6768
|
-
/** An IBM Cloud API key that can
|
|
6807
|
+
/** An IBM Cloud API key that can list domains in your Cloud Internet Services instance and add DNS records.
|
|
6769
6808
|
*
|
|
6770
6809
|
* To grant Secrets Manager the ability to view the Cloud Internet Services instance and all of its domains, the
|
|
6771
|
-
* API key must be assigned the Reader service role on Internet Services (`internet-svcs`).
|
|
6810
|
+
* API key must be assigned the Reader service role on Internet Services (`internet-svcs`). In order to add DNS
|
|
6811
|
+
* records you need to assign the Manager role.
|
|
6772
6812
|
*
|
|
6773
|
-
* If you
|
|
6774
|
-
* recommended that you assign the Reader access role, and then use the
|
|
6813
|
+
* If you want to manage specific domains, you can assign the Manager role for this specific domain. For
|
|
6814
|
+
* production environments, it is recommended that you assign the Reader access role, and then use the
|
|
6775
6815
|
* [IAM Policy Management API](https://cloud.ibm.com/apidocs/iam-policy-management#create-policy) to control
|
|
6776
|
-
* specific domains.
|
|
6777
|
-
*
|
|
6816
|
+
* specific domains.
|
|
6817
|
+
*
|
|
6818
|
+
* If an IBM Cloud API key value is empty Secrets Manager tries to access your Cloud Internet Services instance
|
|
6819
|
+
* with service-to-service authorization.
|
|
6820
|
+
*
|
|
6821
|
+
* For more information, see the
|
|
6822
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-prepare-order-certificates#authorize-cis).
|
|
6778
6823
|
*/
|
|
6779
6824
|
cloud_internet_services_apikey?: string;
|
|
6780
6825
|
/** A CRN that uniquely identifies an IBM Cloud resource. */
|
|
@@ -6853,16 +6898,22 @@ declare namespace SecretsManagerV2 {
|
|
|
6853
6898
|
}
|
|
6854
6899
|
/** The configuration update of the Cloud Internet Services DNS. */
|
|
6855
6900
|
interface PublicCertificateConfigurationDNSCloudInternetServicesPatch extends ConfigurationPatch {
|
|
6856
|
-
/** An IBM Cloud API key that can
|
|
6901
|
+
/** An IBM Cloud API key that can list domains in your Cloud Internet Services instance and add DNS records.
|
|
6857
6902
|
*
|
|
6858
6903
|
* To grant Secrets Manager the ability to view the Cloud Internet Services instance and all of its domains, the
|
|
6859
|
-
* API key must be assigned the Reader service role on Internet Services (`internet-svcs`).
|
|
6904
|
+
* API key must be assigned the Reader service role on Internet Services (`internet-svcs`). In order to add DNS
|
|
6905
|
+
* records you need to assign the Manager role.
|
|
6860
6906
|
*
|
|
6861
|
-
* If you
|
|
6862
|
-
* recommended that you assign the Reader access role, and then use the
|
|
6907
|
+
* If you want to manage specific domains, you can assign the Manager role for this specific domain. For
|
|
6908
|
+
* production environments, it is recommended that you assign the Reader access role, and then use the
|
|
6863
6909
|
* [IAM Policy Management API](https://cloud.ibm.com/apidocs/iam-policy-management#create-policy) to control
|
|
6864
|
-
* specific domains.
|
|
6865
|
-
*
|
|
6910
|
+
* specific domains.
|
|
6911
|
+
*
|
|
6912
|
+
* If an IBM Cloud API key value is empty Secrets Manager tries to access your Cloud Internet Services instance
|
|
6913
|
+
* with service-to-service authorization.
|
|
6914
|
+
*
|
|
6915
|
+
* For more information, see the
|
|
6916
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-prepare-order-certificates#authorize-cis).
|
|
6866
6917
|
*/
|
|
6867
6918
|
cloud_internet_services_apikey: string;
|
|
6868
6919
|
/** A CRN that uniquely identifies an IBM Cloud resource. */
|
|
@@ -6881,16 +6932,22 @@ declare namespace SecretsManagerV2 {
|
|
|
6881
6932
|
* To protect your privacy, do not use personal data, such as your name or location, as an name for your secret.
|
|
6882
6933
|
*/
|
|
6883
6934
|
name: string;
|
|
6884
|
-
/** An IBM Cloud API key that can
|
|
6935
|
+
/** An IBM Cloud API key that can list domains in your Cloud Internet Services instance and add DNS records.
|
|
6885
6936
|
*
|
|
6886
6937
|
* To grant Secrets Manager the ability to view the Cloud Internet Services instance and all of its domains, the
|
|
6887
|
-
* API key must be assigned the Reader service role on Internet Services (`internet-svcs`).
|
|
6938
|
+
* API key must be assigned the Reader service role on Internet Services (`internet-svcs`). In order to add DNS
|
|
6939
|
+
* records you need to assign the Manager role.
|
|
6888
6940
|
*
|
|
6889
|
-
* If you
|
|
6890
|
-
* recommended that you assign the Reader access role, and then use the
|
|
6941
|
+
* If you want to manage specific domains, you can assign the Manager role for this specific domain. For
|
|
6942
|
+
* production environments, it is recommended that you assign the Reader access role, and then use the
|
|
6891
6943
|
* [IAM Policy Management API](https://cloud.ibm.com/apidocs/iam-policy-management#create-policy) to control
|
|
6892
|
-
* specific domains.
|
|
6893
|
-
*
|
|
6944
|
+
* specific domains.
|
|
6945
|
+
*
|
|
6946
|
+
* If an IBM Cloud API key value is empty Secrets Manager tries to access your Cloud Internet Services instance
|
|
6947
|
+
* with service-to-service authorization.
|
|
6948
|
+
*
|
|
6949
|
+
* For more information, see the
|
|
6950
|
+
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-prepare-order-certificates#authorize-cis).
|
|
6894
6951
|
*/
|
|
6895
6952
|
cloud_internet_services_apikey?: string;
|
|
6896
6953
|
/** A CRN that uniquely identifies an IBM Cloud resource. */
|
|
@@ -7346,10 +7403,8 @@ declare namespace SecretsManagerV2 {
|
|
|
7346
7403
|
* optional. If it is set the minimum duration is 1 day. The maximum is 90 days. By default, the TTL is set to 0.
|
|
7347
7404
|
*/
|
|
7348
7405
|
ttl?: string;
|
|
7349
|
-
/** The properties
|
|
7350
|
-
|
|
7351
|
-
*/
|
|
7352
|
-
source_service: ServiceCredentialsSecretSourceService;
|
|
7406
|
+
/** The properties of the resource key that was created for this source service instance. */
|
|
7407
|
+
source_service: ServiceCredentialsSecretSourceServiceRO;
|
|
7353
7408
|
/** The properties of the service credentials secret payload. */
|
|
7354
7409
|
credentials: ServiceCredentialsSecretCredentials;
|
|
7355
7410
|
}
|
|
@@ -7443,10 +7498,8 @@ declare namespace SecretsManagerV2 {
|
|
|
7443
7498
|
* optional. If it is set the minimum duration is 1 day. The maximum is 90 days. By default, the TTL is set to 0.
|
|
7444
7499
|
*/
|
|
7445
7500
|
ttl?: string;
|
|
7446
|
-
/** The properties
|
|
7447
|
-
|
|
7448
|
-
*/
|
|
7449
|
-
source_service: ServiceCredentialsSecretSourceService;
|
|
7501
|
+
/** The properties of the resource key that was created for this source service instance. */
|
|
7502
|
+
source_service: ServiceCredentialsSecretSourceServiceRO;
|
|
7450
7503
|
}
|
|
7451
7504
|
namespace ServiceCredentialsSecretMetadata {
|
|
7452
7505
|
namespace Constants {
|
|
@@ -7758,6 +7811,8 @@ declare namespace SecretsManagerV2 {
|
|
|
7758
7811
|
* for secrets that can be auto-rotated and an existing rotation policy.
|
|
7759
7812
|
*/
|
|
7760
7813
|
next_rotation_date?: string;
|
|
7814
|
+
/** Policy for auto-generated passwords. */
|
|
7815
|
+
password_generation_policy?: PasswordGenerationPolicyRO;
|
|
7761
7816
|
/** The username that is assigned to an `username_password` secret. */
|
|
7762
7817
|
username: string;
|
|
7763
7818
|
/** The password that is assigned to an `username_password` secret. */
|
|
@@ -7849,6 +7904,8 @@ declare namespace SecretsManagerV2 {
|
|
|
7849
7904
|
* for secrets that can be auto-rotated and an existing rotation policy.
|
|
7850
7905
|
*/
|
|
7851
7906
|
next_rotation_date?: string;
|
|
7907
|
+
/** Policy for auto-generated passwords. */
|
|
7908
|
+
password_generation_policy?: PasswordGenerationPolicyRO;
|
|
7852
7909
|
}
|
|
7853
7910
|
namespace UsernamePasswordSecretMetadata {
|
|
7854
7911
|
namespace Constants {
|
|
@@ -7903,6 +7960,10 @@ declare namespace SecretsManagerV2 {
|
|
|
7903
7960
|
* types: Arbitrary, username_password.
|
|
7904
7961
|
*/
|
|
7905
7962
|
expiration_date?: string;
|
|
7963
|
+
/** Policy patch for auto-generated passwords. Policy properties that are included in the patch are updated.
|
|
7964
|
+
* Properties that are not included in the patch remain unchanged.
|
|
7965
|
+
*/
|
|
7966
|
+
password_generation_policy?: PasswordGenerationPolicyPatch;
|
|
7906
7967
|
}
|
|
7907
7968
|
/** UsernamePasswordSecretPrototype. */
|
|
7908
7969
|
interface UsernamePasswordSecretPrototype extends SecretPrototype {
|
|
@@ -7932,8 +7993,10 @@ declare namespace SecretsManagerV2 {
|
|
|
7932
7993
|
labels?: string[];
|
|
7933
7994
|
/** The username that is assigned to an `username_password` secret. */
|
|
7934
7995
|
username: string;
|
|
7935
|
-
/** The password that is assigned to an `username_password` secret.
|
|
7936
|
-
|
|
7996
|
+
/** The password that is assigned to an `username_password` secret. If you omit this parameter, Secrets Manager
|
|
7997
|
+
* generates a new random password for your secret.
|
|
7998
|
+
*/
|
|
7999
|
+
password?: string;
|
|
7937
8000
|
/** The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret
|
|
7938
8001
|
* types: Arbitrary, username_password.
|
|
7939
8002
|
*/
|
|
@@ -7946,6 +8009,8 @@ declare namespace SecretsManagerV2 {
|
|
|
7946
8009
|
* username_password, private_cert, public_cert, iam_credentials.
|
|
7947
8010
|
*/
|
|
7948
8011
|
rotation?: RotationPolicy;
|
|
8012
|
+
/** Policy for auto-generated passwords. */
|
|
8013
|
+
password_generation_policy?: PasswordGenerationPolicy;
|
|
7949
8014
|
}
|
|
7950
8015
|
namespace UsernamePasswordSecretPrototype {
|
|
7951
8016
|
namespace Constants {
|
|
@@ -8074,7 +8139,9 @@ declare namespace SecretsManagerV2 {
|
|
|
8074
8139
|
}
|
|
8075
8140
|
/** UsernamePasswordSecretVersionPrototype. */
|
|
8076
8141
|
interface UsernamePasswordSecretVersionPrototype extends SecretVersionPrototype {
|
|
8077
|
-
/** The password that is assigned to an `username_password` secret.
|
|
8142
|
+
/** The password that is assigned to an `username_password` secret. If you omit this parameter, Secrets Manager
|
|
8143
|
+
* generates a new random password for your secret.
|
|
8144
|
+
*/
|
|
8078
8145
|
password?: string;
|
|
8079
8146
|
/** The secret metadata that a user can customize. */
|
|
8080
8147
|
custom_metadata?: JsonObject;
|
package/secrets-manager/v2.js
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
/**
|
|
3
|
-
* (C) Copyright IBM Corp.
|
|
3
|
+
* (C) Copyright IBM Corp. 2024.
|
|
4
4
|
*
|
|
5
5
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
6
6
|
* you may not use this file except in compliance with the License.
|
|
@@ -77,7 +77,7 @@ var __generator = (this && this.__generator) || function (thisArg, body) {
|
|
|
77
77
|
}
|
|
78
78
|
};
|
|
79
79
|
/**
|
|
80
|
-
* IBM OpenAPI SDK Code Generator Version: 3.
|
|
80
|
+
* IBM OpenAPI SDK Code Generator Version: 3.84.2-a032c73d-20240125-175315
|
|
81
81
|
*/
|
|
82
82
|
/* eslint-disable max-classes-per-file */
|
|
83
83
|
/* eslint-disable no-await-in-loop */
|
|
@@ -97,7 +97,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
|
|
|
97
97
|
* Construct a SecretsManagerV2 object.
|
|
98
98
|
*
|
|
99
99
|
* @param {Object} options - Options for the service.
|
|
100
|
-
* @param {string} [options.serviceUrl] - The base
|
|
100
|
+
* @param {string} [options.serviceUrl] - The base URL for the service
|
|
101
101
|
* @param {OutgoingHttpHeaders} [options.headers] - Default headers that shall be included with every request to the service.
|
|
102
102
|
* @param {Authenticator} options.authenticator - The Authenticator object used to authenticate requests to the service
|
|
103
103
|
* @constructor
|
|
@@ -142,7 +142,7 @@ var SecretsManagerV2 = /** @class */ (function (_super) {
|
|
|
142
142
|
* @param {UserOptions} [options] - The parameters to send to the service.
|
|
143
143
|
* @param {string} [options.serviceName] - The name of the service to configure
|
|
144
144
|
* @param {Authenticator} [options.authenticator] - The Authenticator object used to authenticate requests to the service
|
|
145
|
-
* @param {string} [options.serviceUrl] - The URL for the service
|
|
145
|
+
* @param {string} [options.serviceUrl] - The base URL for the service
|
|
146
146
|
* @returns {SecretsManagerV2}
|
|
147
147
|
*/
|
|
148
148
|
SecretsManagerV2.newInstance = function (options) {
|