@wix/secrets 1.0.17 → 1.0.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (61) hide show
  1. package/build/cjs/context.d.ts +1 -1
  2. package/build/cjs/context.js +1 -1
  3. package/build/cjs/context.js.map +1 -1
  4. package/build/cjs/index.d.ts +1 -1
  5. package/build/cjs/index.js +1 -1
  6. package/build/cjs/index.js.map +1 -1
  7. package/build/cjs/meta.d.ts +1 -1
  8. package/build/cjs/meta.js +1 -1
  9. package/build/cjs/meta.js.map +1 -1
  10. package/build/es/context.d.ts +1 -1
  11. package/build/es/context.js +1 -1
  12. package/build/es/context.js.map +1 -1
  13. package/build/es/index.d.ts +1 -1
  14. package/build/es/index.js +1 -1
  15. package/build/es/index.js.map +1 -1
  16. package/build/es/meta.d.ts +1 -1
  17. package/build/es/meta.js +1 -1
  18. package/build/es/meta.js.map +1 -1
  19. package/package.json +11 -9
  20. package/build/cjs/index.typings.d.ts +0 -1
  21. package/build/cjs/index.typings.js +0 -28
  22. package/build/cjs/index.typings.js.map +0 -1
  23. package/build/cjs/src/velo-secrets-vault-v1-secret.context.d.ts +0 -7
  24. package/build/cjs/src/velo-secrets-vault-v1-secret.context.js +0 -60
  25. package/build/cjs/src/velo-secrets-vault-v1-secret.context.js.map +0 -1
  26. package/build/cjs/src/velo-secrets-vault-v1-secret.http.d.ts +0 -54
  27. package/build/cjs/src/velo-secrets-vault-v1-secret.http.js +0 -202
  28. package/build/cjs/src/velo-secrets-vault-v1-secret.http.js.map +0 -1
  29. package/build/cjs/src/velo-secrets-vault-v1-secret.meta.d.ts +0 -23
  30. package/build/cjs/src/velo-secrets-vault-v1-secret.meta.js +0 -123
  31. package/build/cjs/src/velo-secrets-vault-v1-secret.meta.js.map +0 -1
  32. package/build/cjs/src/velo-secrets-vault-v1-secret.public.d.ts +0 -12
  33. package/build/cjs/src/velo-secrets-vault-v1-secret.public.js +0 -40
  34. package/build/cjs/src/velo-secrets-vault-v1-secret.public.js.map +0 -1
  35. package/build/cjs/src/velo-secrets-vault-v1-secret.types.d.ts +0 -135
  36. package/build/cjs/src/velo-secrets-vault-v1-secret.types.js +0 -3
  37. package/build/cjs/src/velo-secrets-vault-v1-secret.types.js.map +0 -1
  38. package/build/cjs/src/velo-secrets-vault-v1-secret.universal.d.ts +0 -257
  39. package/build/cjs/src/velo-secrets-vault-v1-secret.universal.js +0 -369
  40. package/build/cjs/src/velo-secrets-vault-v1-secret.universal.js.map +0 -1
  41. package/build/es/index.typings.d.ts +0 -1
  42. package/build/es/index.typings.js +0 -2
  43. package/build/es/index.typings.js.map +0 -1
  44. package/build/es/src/velo-secrets-vault-v1-secret.context.d.ts +0 -7
  45. package/build/es/src/velo-secrets-vault-v1-secret.context.js +0 -52
  46. package/build/es/src/velo-secrets-vault-v1-secret.context.js.map +0 -1
  47. package/build/es/src/velo-secrets-vault-v1-secret.http.d.ts +0 -54
  48. package/build/es/src/velo-secrets-vault-v1-secret.http.js +0 -194
  49. package/build/es/src/velo-secrets-vault-v1-secret.http.js.map +0 -1
  50. package/build/es/src/velo-secrets-vault-v1-secret.meta.d.ts +0 -23
  51. package/build/es/src/velo-secrets-vault-v1-secret.meta.js +0 -92
  52. package/build/es/src/velo-secrets-vault-v1-secret.meta.js.map +0 -1
  53. package/build/es/src/velo-secrets-vault-v1-secret.public.d.ts +0 -12
  54. package/build/es/src/velo-secrets-vault-v1-secret.public.js +0 -29
  55. package/build/es/src/velo-secrets-vault-v1-secret.public.js.map +0 -1
  56. package/build/es/src/velo-secrets-vault-v1-secret.types.d.ts +0 -135
  57. package/build/es/src/velo-secrets-vault-v1-secret.types.js +0 -2
  58. package/build/es/src/velo-secrets-vault-v1-secret.types.js.map +0 -1
  59. package/build/es/src/velo-secrets-vault-v1-secret.universal.d.ts +0 -257
  60. package/build/es/src/velo-secrets-vault-v1-secret.universal.js +0 -338
  61. package/build/es/src/velo-secrets-vault-v1-secret.universal.js.map +0 -1
@@ -1,369 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
26
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
27
- return new (P || (P = Promise))(function (resolve, reject) {
28
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
29
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
30
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
31
- step((generator = generator.apply(thisArg, _arguments || [])).next());
32
- });
33
- };
34
- Object.defineProperty(exports, "__esModule", { value: true });
35
- exports.updateSecret = exports.deleteSecret = exports.createSecret = exports.listSecretInfo = exports.getSecretValue = exports.onSecretUpdated = exports.onSecretDeleted = exports.onSecretCreated = void 0;
36
- const velo_1 = require("@wix/metro-runtime/velo");
37
- const transform_error_1 = require("@wix/sdk-runtime/transform-error");
38
- const sdk_types_1 = require("@wix/sdk-types");
39
- const ambassadorWixVeloSecretsVaultV1Secret = __importStar(require("./velo-secrets-vault-v1-secret.http"));
40
- const _toVeloEntity = '$';
41
- const _fromVeloEntity = '$';
42
- const _createSecretRequest = {};
43
- const _createSecretResponse = {};
44
- const _deleteSecretRequest = {};
45
- const _deleteSecretResponse = {};
46
- const _getSecretValueRequest = {};
47
- const _getSecretValueResponse = {};
48
- const _listSecretInfoRequest = {};
49
- const _listSecretInfoResponse = {};
50
- const _updateSecretRequest = {};
51
- const _updateSecretResponse = {};
52
- exports.onSecretCreated = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_created')();
53
- exports.onSecretDeleted = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_deleted')();
54
- exports.onSecretUpdated = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_updated')();
55
- /**
56
- * Retrieves the secret value specified by the secret name.
57
- *
58
- * The `getSecretValue()` function returns a Promise that resolves to the value of the secret with the specified given name.
59
- *
60
- * >**Note:**
61
- * > Only use a secret's value in the backend code. Returning the secret value in the frontend is a security risk.
62
- * @public
63
- * @documentationMaturity preview
64
- * @requiredField name
65
- * @param name - The name of the secret to get the value of.
66
- * @permissionScope Manage Secrets
67
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
68
- * @applicableIdentity APP
69
- * @returns Fulfilled - The value of the secret. Rejected - Error message.
70
- */
71
- function getSecretValue(name) {
72
- var _a, _b, _c;
73
- return __awaiter(this, arguments, void 0, function* () {
74
- const requestTransformation = { name: '$[0]' };
75
- const responseTransformation = '$';
76
- // @ts-ignore
77
- const { httpClient, sideEffects } = arguments[1];
78
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
79
- rootSchema: _getSecretValueRequest,
80
- depSchemas: {},
81
- fqdnTransformation: {
82
- paths: [],
83
- transformation: _fromVeloEntity,
84
- },
85
- customTransformation: requestTransformation,
86
- });
87
- const { fromJSON } = (0, velo_1.serializer)({
88
- rootSchema: _getSecretValueResponse,
89
- depSchemas: {},
90
- fqdnTransformation: {
91
- paths: [],
92
- transformation: _toVeloEntity,
93
- },
94
- customTransformation: responseTransformation,
95
- });
96
- const payload = toAmbassadorRequest([name]);
97
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.getSecretValue(payload);
98
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
99
- try {
100
- const result = yield httpClient.request(reqOpts);
101
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
102
- return fromJSON(result.data);
103
- }
104
- catch (err) {
105
- const transformedError = (0, transform_error_1.transformError)(err, {
106
- spreadPathsToArguments: {},
107
- explicitPathsToArguments: { name: '$[0]' },
108
- singleArgumentUnchanged: false,
109
- }, ['name']);
110
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
111
- throw transformedError;
112
- }
113
- });
114
- }
115
- exports.getSecretValue = getSecretValue;
116
- /**
117
- * Retrieves a list of objects containing information about all secrets.
118
- *
119
- * The `listSecretInfo()` function returns a Promise that resolves to a list containing information about all secrets stored on your site.
120
- *
121
- * > **Note:**
122
- * > - The secret's value does not get returned for security reasons. To retrieve a secret's value, use the [`getSecretValue()`](#getSecretValue) function.
123
- * @public
124
- * @documentationMaturity preview
125
- * @permissionScope Manage Secrets
126
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
127
- * @applicableIdentity APP
128
- * @returns Fulfilled - A list of objects containing information about your site's secrets. Rejected - Error message.
129
- */
130
- function listSecretInfo() {
131
- var _a, _b, _c;
132
- return __awaiter(this, arguments, void 0, function* () {
133
- const requestTransformation = {};
134
- const responseTransformation = '$';
135
- // @ts-ignore
136
- const { httpClient, sideEffects } = arguments[0];
137
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
138
- rootSchema: _listSecretInfoRequest,
139
- depSchemas: {},
140
- fqdnTransformation: {
141
- paths: [],
142
- transformation: _fromVeloEntity,
143
- },
144
- customTransformation: requestTransformation,
145
- });
146
- const { fromJSON } = (0, velo_1.serializer)({
147
- rootSchema: _listSecretInfoResponse,
148
- depSchemas: {},
149
- fqdnTransformation: {
150
- paths: [...['Array#secrets']],
151
- transformation: _toVeloEntity,
152
- },
153
- customTransformation: responseTransformation,
154
- });
155
- const payload = toAmbassadorRequest([]);
156
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.listSecretInfo(payload);
157
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
158
- try {
159
- const result = yield httpClient.request(reqOpts);
160
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
161
- return fromJSON(result.data);
162
- }
163
- catch (err) {
164
- const transformedError = (0, transform_error_1.transformError)(err, {
165
- spreadPathsToArguments: {},
166
- explicitPathsToArguments: {},
167
- singleArgumentUnchanged: false,
168
- }, []);
169
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
170
- throw transformedError;
171
- }
172
- });
173
- }
174
- exports.listSecretInfo = listSecretInfo;
175
- /**
176
- * Creates a new secret.
177
- *
178
- * The `createSecret()` function returns a Promise that resolves secret ID when the secret is created.
179
- *
180
- * >**Notes:**
181
- * > - The secret's name cannot start with `'wix'` or be identical to an existing secret's name.
182
- * > - Don't leave private keys in your code. Leaving them in your code is a security risk. Make sure to delete the keys from the code after running `createSecret()`.
183
- * @public
184
- * @documentationMaturity preview
185
- * @requiredField secret
186
- * @requiredField secret.name
187
- * @requiredField secret.value
188
- * @param secret - Fields of a new secret.
189
- * @permissionScope Manage Secrets
190
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
191
- * @applicableIdentity APP
192
- * @returns Fulfilled - The ID of the created secret.
193
- * Rejected - Error message.
194
- */
195
- function createSecret(secret) {
196
- var _a, _b, _c;
197
- return __awaiter(this, arguments, void 0, function* () {
198
- const requestTransformation = { secret: '$[0]' };
199
- const responseTransformation = '$._id';
200
- // @ts-ignore
201
- const { httpClient, sideEffects } = arguments[1];
202
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
203
- rootSchema: _createSecretRequest,
204
- depSchemas: {},
205
- fqdnTransformation: {
206
- paths: [...['secret']],
207
- transformation: _fromVeloEntity,
208
- },
209
- customTransformation: requestTransformation,
210
- });
211
- const { fromJSON } = (0, velo_1.serializer)({
212
- rootSchema: _createSecretResponse,
213
- depSchemas: {},
214
- fqdnTransformation: {
215
- paths: [],
216
- transformation: _toVeloEntity,
217
- },
218
- customTransformation: responseTransformation,
219
- });
220
- const payload = toAmbassadorRequest([secret]);
221
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.createSecret(payload);
222
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
223
- try {
224
- const result = yield httpClient.request(reqOpts);
225
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
226
- return fromJSON(result.data);
227
- }
228
- catch (err) {
229
- const transformedError = (0, transform_error_1.transformError)(err, {
230
- spreadPathsToArguments: {},
231
- explicitPathsToArguments: { secret: '$[0]' },
232
- singleArgumentUnchanged: false,
233
- }, ['secret']);
234
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
235
- throw transformedError;
236
- }
237
- });
238
- }
239
- exports.createSecret = createSecret;
240
- /**
241
- * Deletes an existing secret by ID.
242
- *
243
- * The `deleteSecret()` function returns a Promise that resolves when the secret is deleted. You can retrieve the secret `_id` using the [`listSecretInfo()`](#listsecretinfo) function.
244
- *
245
- * >**Note:**
246
- * > Deleting a secret is irreversible and will break all code using the secret.
247
- *
248
- * @public
249
- * @documentationMaturity preview
250
- * @requiredField _id
251
- * @param _id - The unique ID of the secret to be deleted.
252
- * @permissionScope Manage Secrets
253
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
254
- * @applicableIdentity APP
255
- * @returns Fulfilled - When the secret is successfully deleted. Rejected - Error message.
256
- */
257
- function deleteSecret(_id) {
258
- var _a, _b, _c;
259
- return __awaiter(this, arguments, void 0, function* () {
260
- const requestTransformation = { id: '$[0]' };
261
- const responseTransformation = '$';
262
- // @ts-ignore
263
- const { httpClient, sideEffects } = arguments[1];
264
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
265
- rootSchema: _deleteSecretRequest,
266
- depSchemas: {},
267
- fqdnTransformation: {
268
- paths: [],
269
- transformation: _fromVeloEntity,
270
- },
271
- customTransformation: requestTransformation,
272
- });
273
- const { fromJSON } = (0, velo_1.serializer)({
274
- rootSchema: _deleteSecretResponse,
275
- depSchemas: {},
276
- fqdnTransformation: {
277
- paths: [],
278
- transformation: _toVeloEntity,
279
- },
280
- customTransformation: responseTransformation,
281
- });
282
- const payload = toAmbassadorRequest([_id]);
283
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.deleteSecret(payload);
284
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
285
- try {
286
- const result = yield httpClient.request(reqOpts);
287
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
288
- }
289
- catch (err) {
290
- const transformedError = (0, transform_error_1.transformError)(err, {
291
- spreadPathsToArguments: {},
292
- explicitPathsToArguments: { id: '$[0]' },
293
- singleArgumentUnchanged: false,
294
- }, ['_id']);
295
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
296
- throw transformedError;
297
- }
298
- });
299
- }
300
- exports.deleteSecret = deleteSecret;
301
- /**
302
- * Updates the specified fields of an existing secret by ID.
303
- *
304
- *
305
- * The `updateSecret()` function returns a Promise that resolves when the secret is successfully updated. You can update one or more fields. Only fields passed in the `secret` object will be updated. All other properties will remain unchanged.
306
- *
307
- * You can retrieve the `_id` parameter from the [`listSecretInfo()`](#listsecretinfo) function. The secret `_id` is different from the secret `name` used by the [`getSecretValue()`](#getsecretvalue) function.
308
- *
309
- * > **Notes:**
310
- * > - Changing a secret's name or value will break all code using the secret.
311
- * > - You can't rename the secret with a name of an existing secret.
312
- * > - Don't leave private keys in your code! Leaving them in is a security risk. Make sure to delete the keys from the code after running `updateSecret()`.
313
- * @param _id - The unique ID of the secret to be updated.
314
- * @param secret - The secret fields to update.
315
- * @public
316
- * @documentationMaturity preview
317
- * @requiredField _id
318
- * @requiredField secret
319
- * @permissionScope Manage Secrets
320
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
321
- * @applicableIdentity APP
322
- * @returns Fulfilled - When the secret is updated.
323
- * Rejected - Error message.
324
- */
325
- function updateSecret(_id, secret) {
326
- var _a, _b, _c;
327
- return __awaiter(this, arguments, void 0, function* () {
328
- const requestTransformation = { id: '$[0]', secret: '$[1]' };
329
- const responseTransformation = '$';
330
- // @ts-ignore
331
- const { httpClient, sideEffects } = arguments[2];
332
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
333
- rootSchema: _updateSecretRequest,
334
- depSchemas: {},
335
- fqdnTransformation: {
336
- paths: [...['secret']],
337
- transformation: _fromVeloEntity,
338
- },
339
- customTransformation: requestTransformation,
340
- });
341
- const { fromJSON } = (0, velo_1.serializer)({
342
- rootSchema: _updateSecretResponse,
343
- depSchemas: {},
344
- fqdnTransformation: {
345
- paths: [],
346
- transformation: _toVeloEntity,
347
- },
348
- customTransformation: responseTransformation,
349
- });
350
- const payload = toAmbassadorRequest([_id, secret]);
351
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.partiallyUpdateSecret(payload);
352
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
353
- try {
354
- const result = yield httpClient.request(reqOpts);
355
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
356
- }
357
- catch (err) {
358
- const transformedError = (0, transform_error_1.transformError)(err, {
359
- spreadPathsToArguments: {},
360
- explicitPathsToArguments: { id: '$[0]', secret: '$[1]' },
361
- singleArgumentUnchanged: false,
362
- }, ['_id', 'secret']);
363
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
364
- throw transformedError;
365
- }
366
- });
367
- }
368
- exports.updateSecret = updateSecret;
369
- //# sourceMappingURL=velo-secrets-vault-v1-secret.universal.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"velo-secrets-vault-v1-secret.universal.js","sourceRoot":"","sources":["../../../src/velo-secrets-vault-v1-secret.universal.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,kDAAqD;AACrD,sEAAuF;AACvF,8CAA6D;AAC7D,2GAA6F;AAE7F,MAAM,aAAa,GAAG,GAAG,CAAC;AAC1B,MAAM,eAAe,GAAG,GAAG,CAAC;AAgM5B,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACjC,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACjC,MAAM,sBAAsB,GAAG,EAAE,CAAC;AAClC,MAAM,uBAAuB,GAAG,EAAE,CAAC;AACnC,MAAM,sBAAsB,GAAG,EAAE,CAAC;AAClC,MAAM,uBAAuB,GAAG,EAAE,CAAC;AACnC,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACpB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AACnB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AACnB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AAEhC;;;;;;;;;;;;;;;GAeG;AACH,SAAsB,cAAc,CAClC,IAAY;;;QAEZ,MAAM,qBAAqB,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;QAC/C,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,sBAAsB;YAClC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,uBAAuB;YACnC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC;QAE5C,MAAM,OAAO,GAAG,qCAAqC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE9E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE;gBAC1C,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAxDD,wCAwDC;AAED;;;;;;;;;;;;;GAaG;AACH,SAAsB,cAAc;;;QAGlC,MAAM,qBAAqB,GAAG,EAAE,CAAC;QACjC,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,sBAAsB;YAClC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,uBAAuB;YACnC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;gBAC7B,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,EAAE,CAAC,CAAC;QAExC,MAAM,OAAO,GAAG,qCAAqC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE9E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE;gBAC5B,uBAAuB,EAAE,KAAK;aAC/B,EACD,EAAE,CACH,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAxDD,wCAwDC;AAED;;;;;;;;;;;;;;;;;;;GAmBG;AACH,SAAsB,YAAY,CAAC,MAAc;;;QAC/C,MAAM,qBAAqB,GAAG,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QACjD,MAAM,sBAAsB,GAAG,OAAO,CAAC;QAEvC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACtB,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAE9C,MAAM,OAAO,GAAG,qCAAqC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE5E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE;gBAC5C,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAtDD,oCAsDC;AAED;;;;;;;;;;;;;;;;GAgBG;AACH,SAAsB,YAAY,CAAC,GAAW;;;QAC5C,MAAM,qBAAqB,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,CAAC;QAC7C,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAE3C,MAAM,OAAO,GAAG,qCAAqC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE5E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;gBACxC,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,KAAK,CAAC,CACR,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AApDD,oCAoDC;AAED;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,SAAsB,YAAY,CAAC,GAAW,EAAE,MAAc;;;QAC5D,MAAM,qBAAqB,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QAC7D,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACtB,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC;QAEnD,MAAM,OAAO,GACX,qCAAqC,CAAC,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAEvE,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE;gBACxD,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,KAAK,EAAE,QAAQ,CAAC,CAClB,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AArDD,oCAqDC"}
@@ -1 +0,0 @@
1
- export * as secrets from './src/velo-secrets-vault-v1-secret.universal';
@@ -1,2 +0,0 @@
1
- export * as secrets from './src/velo-secrets-vault-v1-secret.universal';
2
- //# sourceMappingURL=index.typings.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.typings.js","sourceRoot":"","sources":["../../index.typings.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,8CAA8C,CAAC"}
@@ -1,7 +0,0 @@
1
- import { getSecretValue as publicGetSecretValue, listSecretInfo as publicListSecretInfo, createSecret as publicCreateSecret, deleteSecret as publicDeleteSecret, updateSecret as publicUpdateSecret } from './velo-secrets-vault-v1-secret.public';
2
- import { BuildRESTFunction } from '@wix/sdk-types';
3
- export declare const getSecretValue: BuildRESTFunction<typeof publicGetSecretValue>;
4
- export declare const listSecretInfo: BuildRESTFunction<typeof publicListSecretInfo>;
5
- export declare const createSecret: BuildRESTFunction<typeof publicCreateSecret>;
6
- export declare const deleteSecret: BuildRESTFunction<typeof publicDeleteSecret>;
7
- export declare const updateSecret: BuildRESTFunction<typeof publicUpdateSecret>;
@@ -1,52 +0,0 @@
1
- import { getSecretValue as publicGetSecretValue, listSecretInfo as publicListSecretInfo, createSecret as publicCreateSecret, deleteSecret as publicDeleteSecret, updateSecret as publicUpdateSecret, } from './velo-secrets-vault-v1-secret.public';
2
- export const getSecretValue = (...args) => {
3
- // @ts-expect-error
4
- if (!globalThis.__wix_context__) {
5
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
6
- }
7
- // @ts-expect-error
8
- return globalThis.__wix_context__
9
- .initWixModules(publicGetSecretValue)
10
- .apply(undefined, args);
11
- };
12
- export const listSecretInfo = (...args) => {
13
- // @ts-expect-error
14
- if (!globalThis.__wix_context__) {
15
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
16
- }
17
- // @ts-expect-error
18
- return globalThis.__wix_context__
19
- .initWixModules(publicListSecretInfo)
20
- .apply(undefined, args);
21
- };
22
- export const createSecret = (...args) => {
23
- // @ts-expect-error
24
- if (!globalThis.__wix_context__) {
25
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
26
- }
27
- // @ts-expect-error
28
- return globalThis.__wix_context__
29
- .initWixModules(publicCreateSecret)
30
- .apply(undefined, args);
31
- };
32
- export const deleteSecret = (...args) => {
33
- // @ts-expect-error
34
- if (!globalThis.__wix_context__) {
35
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
36
- }
37
- // @ts-expect-error
38
- return globalThis.__wix_context__
39
- .initWixModules(publicDeleteSecret)
40
- .apply(undefined, args);
41
- };
42
- export const updateSecret = (...args) => {
43
- // @ts-expect-error
44
- if (!globalThis.__wix_context__) {
45
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
46
- }
47
- // @ts-expect-error
48
- return globalThis.__wix_context__
49
- .initWixModules(publicUpdateSecret)
50
- .apply(undefined, args);
51
- };
52
- //# sourceMappingURL=velo-secrets-vault-v1-secret.context.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"velo-secrets-vault-v1-secret.context.js","sourceRoot":"","sources":["../../../src/velo-secrets-vault-v1-secret.context.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,cAAc,IAAI,oBAAoB,EACtC,cAAc,IAAI,oBAAoB,EACtC,YAAY,IAAI,kBAAkB,EAClC,YAAY,IAAI,kBAAkB,EAClC,YAAY,IAAI,kBAAkB,GACnC,MAAM,uCAAuC,CAAC;AAG/C,MAAM,CAAC,MAAM,cAAc,GAAmD,CAC5E,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,oBAAoB,CAAC;SACpC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,cAAc,GAAmD,CAC5E,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,oBAAoB,CAAC;SACpC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC"}
@@ -1,54 +0,0 @@
1
- import { RequestOptionsFactory } from '@wix/sdk-types';
2
- import { CreateSecretRequest, CreateSecretResponse, DeleteSecretRequest, DeleteSecretResponse, GetSecretValueRequest, GetSecretValueResponse, ListSecretInfoRequest, ListSecretInfoResponse, UpdateSecretRequest, UpdateSecretResponse, GetSecretValueResponseNonNullableFields, ListSecretInfoResponseNonNullableFields, CreateSecretResponseNonNullableFields } from './velo-secrets-vault-v1-secret.types';
3
- /**
4
- * Retrieves the secret value specified by the secret name.
5
- *
6
- * The `getSecretValue()` function returns a Promise that resolves to the value of the secret with the specified given name.
7
- *
8
- * >**Note:**
9
- * > Only use a secret's value in the backend code. Returning the secret value in the frontend is a security risk.
10
- */
11
- export declare function getSecretValue(payload: GetSecretValueRequest): RequestOptionsFactory<GetSecretValueResponse & GetSecretValueResponseNonNullableFields>;
12
- /**
13
- * Retrieves a list of objects containing information about all secrets.
14
- *
15
- * The `listSecretInfo()` function returns a Promise that resolves to a list containing information about all secrets stored on your site.
16
- *
17
- * > **Note:**
18
- * > - The secret's value does not get returned for security reasons. To retrieve a secret's value, use the [`getSecretValue()`](#getSecretValue) function.
19
- */
20
- export declare function listSecretInfo(payload: ListSecretInfoRequest): RequestOptionsFactory<ListSecretInfoResponse & ListSecretInfoResponseNonNullableFields>;
21
- /**
22
- * Creates a new secret.
23
- *
24
- * The `createSecret()` function returns a Promise that resolves secret ID when the secret is created.
25
- *
26
- * >**Notes:**
27
- * > - The secret's name cannot start with `'wix'` or be identical to an existing secret's name.
28
- * > - Don't leave private keys in your code. Leaving them in your code is a security risk. Make sure to delete the keys from the code after running `createSecret()`.
29
- */
30
- export declare function createSecret(payload: CreateSecretRequest): RequestOptionsFactory<CreateSecretResponse & CreateSecretResponseNonNullableFields>;
31
- /**
32
- * Deletes an existing secret by ID.
33
- *
34
- * The `deleteSecret()` function returns a Promise that resolves when the secret is deleted. You can retrieve the secret `_id` using the [`listSecretInfo()`](#listsecretinfo) function.
35
- *
36
- * >**Note:**
37
- * > Deleting a secret is irreversible and will break all code using the secret.
38
- *
39
- */
40
- export declare function deleteSecret(payload: DeleteSecretRequest): RequestOptionsFactory<DeleteSecretResponse>;
41
- /**
42
- * Updates the specified fields of an existing secret by ID.
43
- *
44
- *
45
- * The `updateSecret()` function returns a Promise that resolves when the secret is successfully updated. You can update one or more fields. Only fields passed in the `secret` object will be updated. All other properties will remain unchanged.
46
- *
47
- * You can retrieve the `_id` parameter from the [`listSecretInfo()`](#listsecretinfo) function. The secret `_id` is different from the secret `name` used by the [`getSecretValue()`](#getsecretvalue) function.
48
- *
49
- * > **Notes:**
50
- * > - Changing a secret's name or value will break all code using the secret.
51
- * > - You can't rename the secret with a name of an existing secret.
52
- * > - Don't leave private keys in your code! Leaving them in is a security risk. Make sure to delete the keys from the code after running `updateSecret()`.
53
- */
54
- export declare function partiallyUpdateSecret(payload: UpdateSecretRequest): RequestOptionsFactory<UpdateSecretResponse>;