@wix/secrets 1.0.18 → 1.0.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (61) hide show
  1. package/build/cjs/context.d.ts +1 -1
  2. package/build/cjs/context.js +1 -1
  3. package/build/cjs/context.js.map +1 -1
  4. package/build/cjs/index.d.ts +1 -1
  5. package/build/cjs/index.js +1 -1
  6. package/build/cjs/index.js.map +1 -1
  7. package/build/cjs/meta.d.ts +1 -1
  8. package/build/cjs/meta.js +1 -1
  9. package/build/cjs/meta.js.map +1 -1
  10. package/build/es/context.d.ts +1 -1
  11. package/build/es/context.js +1 -1
  12. package/build/es/context.js.map +1 -1
  13. package/build/es/index.d.ts +1 -1
  14. package/build/es/index.js +1 -1
  15. package/build/es/index.js.map +1 -1
  16. package/build/es/meta.d.ts +1 -1
  17. package/build/es/meta.js +1 -1
  18. package/build/es/meta.js.map +1 -1
  19. package/package.json +11 -9
  20. package/build/cjs/index.typings.d.ts +0 -1
  21. package/build/cjs/index.typings.js +0 -28
  22. package/build/cjs/index.typings.js.map +0 -1
  23. package/build/cjs/src/velo-secrets-vault-v1-secret.context.d.ts +0 -7
  24. package/build/cjs/src/velo-secrets-vault-v1-secret.context.js +0 -60
  25. package/build/cjs/src/velo-secrets-vault-v1-secret.context.js.map +0 -1
  26. package/build/cjs/src/velo-secrets-vault-v1-secret.http.d.ts +0 -54
  27. package/build/cjs/src/velo-secrets-vault-v1-secret.http.js +0 -202
  28. package/build/cjs/src/velo-secrets-vault-v1-secret.http.js.map +0 -1
  29. package/build/cjs/src/velo-secrets-vault-v1-secret.meta.d.ts +0 -23
  30. package/build/cjs/src/velo-secrets-vault-v1-secret.meta.js +0 -123
  31. package/build/cjs/src/velo-secrets-vault-v1-secret.meta.js.map +0 -1
  32. package/build/cjs/src/velo-secrets-vault-v1-secret.public.d.ts +0 -12
  33. package/build/cjs/src/velo-secrets-vault-v1-secret.public.js +0 -40
  34. package/build/cjs/src/velo-secrets-vault-v1-secret.public.js.map +0 -1
  35. package/build/cjs/src/velo-secrets-vault-v1-secret.types.d.ts +0 -135
  36. package/build/cjs/src/velo-secrets-vault-v1-secret.types.js +0 -3
  37. package/build/cjs/src/velo-secrets-vault-v1-secret.types.js.map +0 -1
  38. package/build/cjs/src/velo-secrets-vault-v1-secret.universal.d.ts +0 -250
  39. package/build/cjs/src/velo-secrets-vault-v1-secret.universal.js +0 -364
  40. package/build/cjs/src/velo-secrets-vault-v1-secret.universal.js.map +0 -1
  41. package/build/es/index.typings.d.ts +0 -1
  42. package/build/es/index.typings.js +0 -2
  43. package/build/es/index.typings.js.map +0 -1
  44. package/build/es/src/velo-secrets-vault-v1-secret.context.d.ts +0 -7
  45. package/build/es/src/velo-secrets-vault-v1-secret.context.js +0 -52
  46. package/build/es/src/velo-secrets-vault-v1-secret.context.js.map +0 -1
  47. package/build/es/src/velo-secrets-vault-v1-secret.http.d.ts +0 -54
  48. package/build/es/src/velo-secrets-vault-v1-secret.http.js +0 -194
  49. package/build/es/src/velo-secrets-vault-v1-secret.http.js.map +0 -1
  50. package/build/es/src/velo-secrets-vault-v1-secret.meta.d.ts +0 -23
  51. package/build/es/src/velo-secrets-vault-v1-secret.meta.js +0 -92
  52. package/build/es/src/velo-secrets-vault-v1-secret.meta.js.map +0 -1
  53. package/build/es/src/velo-secrets-vault-v1-secret.public.d.ts +0 -12
  54. package/build/es/src/velo-secrets-vault-v1-secret.public.js +0 -29
  55. package/build/es/src/velo-secrets-vault-v1-secret.public.js.map +0 -1
  56. package/build/es/src/velo-secrets-vault-v1-secret.types.d.ts +0 -135
  57. package/build/es/src/velo-secrets-vault-v1-secret.types.js +0 -2
  58. package/build/es/src/velo-secrets-vault-v1-secret.types.js.map +0 -1
  59. package/build/es/src/velo-secrets-vault-v1-secret.universal.d.ts +0 -250
  60. package/build/es/src/velo-secrets-vault-v1-secret.universal.js +0 -333
  61. package/build/es/src/velo-secrets-vault-v1-secret.universal.js.map +0 -1
@@ -1,364 +0,0 @@
1
- "use strict";
2
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
- if (k2 === undefined) k2 = k;
4
- var desc = Object.getOwnPropertyDescriptor(m, k);
5
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
6
- desc = { enumerable: true, get: function() { return m[k]; } };
7
- }
8
- Object.defineProperty(o, k2, desc);
9
- }) : (function(o, m, k, k2) {
10
- if (k2 === undefined) k2 = k;
11
- o[k2] = m[k];
12
- }));
13
- var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
14
- Object.defineProperty(o, "default", { enumerable: true, value: v });
15
- }) : function(o, v) {
16
- o["default"] = v;
17
- });
18
- var __importStar = (this && this.__importStar) || function (mod) {
19
- if (mod && mod.__esModule) return mod;
20
- var result = {};
21
- if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
22
- __setModuleDefault(result, mod);
23
- return result;
24
- };
25
- var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
26
- function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
27
- return new (P || (P = Promise))(function (resolve, reject) {
28
- function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
29
- function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
30
- function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
31
- step((generator = generator.apply(thisArg, _arguments || [])).next());
32
- });
33
- };
34
- Object.defineProperty(exports, "__esModule", { value: true });
35
- exports.updateSecret = exports.deleteSecret = exports.createSecret = exports.listSecretInfo = exports.getSecretValue = exports.onSecretUpdated = exports.onSecretDeleted = exports.onSecretCreated = void 0;
36
- const velo_1 = require("@wix/metro-runtime/velo");
37
- const transform_error_1 = require("@wix/sdk-runtime/transform-error");
38
- const sdk_types_1 = require("@wix/sdk-types");
39
- const ambassadorWixVeloSecretsVaultV1Secret = __importStar(require("./velo-secrets-vault-v1-secret.http"));
40
- const _toVeloEntity = '$';
41
- const _fromVeloEntity = '$';
42
- const _createSecretRequest = {};
43
- const _createSecretResponse = {};
44
- const _deleteSecretRequest = {};
45
- const _deleteSecretResponse = {};
46
- const _getSecretValueRequest = {};
47
- const _getSecretValueResponse = {};
48
- const _listSecretInfoRequest = {};
49
- const _listSecretInfoResponse = {};
50
- const _updateSecretRequest = {};
51
- const _updateSecretResponse = {};
52
- exports.onSecretCreated = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_created')();
53
- exports.onSecretDeleted = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_deleted')();
54
- exports.onSecretUpdated = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_updated')();
55
- /**
56
- * Retrieves the secret value specified by the secret name.
57
- *
58
- * The `getSecretValue()` function returns a Promise that resolves to the value of the secret with the specified given name.
59
- *
60
- * >**Note:**
61
- * > Only use a secret's value in the backend code. Returning the secret value in the frontend is a security risk.
62
- * @public
63
- * @requiredField name
64
- * @param name - The name of the secret to get the value of.
65
- * @permissionScope Manage Secrets
66
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
67
- * @applicableIdentity APP
68
- * @returns Fulfilled - The value of the secret. Rejected - Error message.
69
- */
70
- function getSecretValue(name) {
71
- var _a, _b, _c;
72
- return __awaiter(this, arguments, void 0, function* () {
73
- const requestTransformation = { name: '$[0]' };
74
- const responseTransformation = '$';
75
- // @ts-ignore
76
- const { httpClient, sideEffects } = arguments[1];
77
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
78
- rootSchema: _getSecretValueRequest,
79
- depSchemas: {},
80
- fqdnTransformation: {
81
- paths: [],
82
- transformation: _fromVeloEntity,
83
- },
84
- customTransformation: requestTransformation,
85
- });
86
- const { fromJSON } = (0, velo_1.serializer)({
87
- rootSchema: _getSecretValueResponse,
88
- depSchemas: {},
89
- fqdnTransformation: {
90
- paths: [],
91
- transformation: _toVeloEntity,
92
- },
93
- customTransformation: responseTransformation,
94
- });
95
- const payload = toAmbassadorRequest([name]);
96
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.getSecretValue(payload);
97
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
98
- try {
99
- const result = yield httpClient.request(reqOpts);
100
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
101
- return fromJSON(result.data);
102
- }
103
- catch (err) {
104
- const transformedError = (0, transform_error_1.transformError)(err, {
105
- spreadPathsToArguments: {},
106
- explicitPathsToArguments: { name: '$[0]' },
107
- singleArgumentUnchanged: false,
108
- }, ['name']);
109
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
110
- throw transformedError;
111
- }
112
- });
113
- }
114
- exports.getSecretValue = getSecretValue;
115
- /**
116
- * Retrieves a list of objects containing information about all secrets.
117
- *
118
- * The `listSecretInfo()` function returns a Promise that resolves to a list containing information about all secrets stored on your site.
119
- *
120
- * > **Note:**
121
- * > - The secret's value does not get returned for security reasons. To retrieve a secret's value, use the [`getSecretValue()`](#getSecretValue) function.
122
- * @public
123
- * @permissionScope Manage Secrets
124
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
125
- * @applicableIdentity APP
126
- * @returns Fulfilled - A list of objects containing information about your site's secrets. Rejected - Error message.
127
- */
128
- function listSecretInfo() {
129
- var _a, _b, _c;
130
- return __awaiter(this, arguments, void 0, function* () {
131
- const requestTransformation = {};
132
- const responseTransformation = '$';
133
- // @ts-ignore
134
- const { httpClient, sideEffects } = arguments[0];
135
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
136
- rootSchema: _listSecretInfoRequest,
137
- depSchemas: {},
138
- fqdnTransformation: {
139
- paths: [],
140
- transformation: _fromVeloEntity,
141
- },
142
- customTransformation: requestTransformation,
143
- });
144
- const { fromJSON } = (0, velo_1.serializer)({
145
- rootSchema: _listSecretInfoResponse,
146
- depSchemas: {},
147
- fqdnTransformation: {
148
- paths: [...['Array#secrets']],
149
- transformation: _toVeloEntity,
150
- },
151
- customTransformation: responseTransformation,
152
- });
153
- const payload = toAmbassadorRequest([]);
154
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.listSecretInfo(payload);
155
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
156
- try {
157
- const result = yield httpClient.request(reqOpts);
158
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
159
- return fromJSON(result.data);
160
- }
161
- catch (err) {
162
- const transformedError = (0, transform_error_1.transformError)(err, {
163
- spreadPathsToArguments: {},
164
- explicitPathsToArguments: {},
165
- singleArgumentUnchanged: false,
166
- }, []);
167
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
168
- throw transformedError;
169
- }
170
- });
171
- }
172
- exports.listSecretInfo = listSecretInfo;
173
- /**
174
- * Creates a new secret.
175
- *
176
- * The `createSecret()` function returns a Promise that resolves secret ID when the secret is created.
177
- *
178
- * >**Notes:**
179
- * > - The secret's name cannot start with `'wix'` or be identical to an existing secret's name.
180
- * > - Don't leave private keys in your code. Leaving them in your code is a security risk. Make sure to delete the keys from the code after running `createSecret()`.
181
- * @public
182
- * @requiredField secret
183
- * @requiredField secret.name
184
- * @requiredField secret.value
185
- * @param secret - Fields of a new secret.
186
- * @permissionScope Manage Secrets
187
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
188
- * @applicableIdentity APP
189
- * @returns Fulfilled - The ID of the created secret.
190
- * Rejected - Error message.
191
- */
192
- function createSecret(secret) {
193
- var _a, _b, _c;
194
- return __awaiter(this, arguments, void 0, function* () {
195
- const requestTransformation = { secret: '$[0]' };
196
- const responseTransformation = '$._id';
197
- // @ts-ignore
198
- const { httpClient, sideEffects } = arguments[1];
199
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
200
- rootSchema: _createSecretRequest,
201
- depSchemas: {},
202
- fqdnTransformation: {
203
- paths: [...['secret']],
204
- transformation: _fromVeloEntity,
205
- },
206
- customTransformation: requestTransformation,
207
- });
208
- const { fromJSON } = (0, velo_1.serializer)({
209
- rootSchema: _createSecretResponse,
210
- depSchemas: {},
211
- fqdnTransformation: {
212
- paths: [],
213
- transformation: _toVeloEntity,
214
- },
215
- customTransformation: responseTransformation,
216
- });
217
- const payload = toAmbassadorRequest([secret]);
218
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.createSecret(payload);
219
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
220
- try {
221
- const result = yield httpClient.request(reqOpts);
222
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
223
- return fromJSON(result.data);
224
- }
225
- catch (err) {
226
- const transformedError = (0, transform_error_1.transformError)(err, {
227
- spreadPathsToArguments: {},
228
- explicitPathsToArguments: { secret: '$[0]' },
229
- singleArgumentUnchanged: false,
230
- }, ['secret']);
231
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
232
- throw transformedError;
233
- }
234
- });
235
- }
236
- exports.createSecret = createSecret;
237
- /**
238
- * Deletes an existing secret by ID.
239
- *
240
- * The `deleteSecret()` function returns a Promise that resolves when the secret is deleted. You can retrieve the secret `_id` using the [`listSecretInfo()`](#listsecretinfo) function.
241
- *
242
- * >**Note:**
243
- * > Deleting a secret is irreversible and will break all code using the secret.
244
- *
245
- * @public
246
- * @requiredField _id
247
- * @param _id - The unique ID of the secret to be deleted.
248
- * @permissionScope Manage Secrets
249
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
250
- * @applicableIdentity APP
251
- * @returns Fulfilled - When the secret is successfully deleted. Rejected - Error message.
252
- */
253
- function deleteSecret(_id) {
254
- var _a, _b, _c;
255
- return __awaiter(this, arguments, void 0, function* () {
256
- const requestTransformation = { id: '$[0]' };
257
- const responseTransformation = '$';
258
- // @ts-ignore
259
- const { httpClient, sideEffects } = arguments[1];
260
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
261
- rootSchema: _deleteSecretRequest,
262
- depSchemas: {},
263
- fqdnTransformation: {
264
- paths: [],
265
- transformation: _fromVeloEntity,
266
- },
267
- customTransformation: requestTransformation,
268
- });
269
- const { fromJSON } = (0, velo_1.serializer)({
270
- rootSchema: _deleteSecretResponse,
271
- depSchemas: {},
272
- fqdnTransformation: {
273
- paths: [],
274
- transformation: _toVeloEntity,
275
- },
276
- customTransformation: responseTransformation,
277
- });
278
- const payload = toAmbassadorRequest([_id]);
279
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.deleteSecret(payload);
280
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
281
- try {
282
- const result = yield httpClient.request(reqOpts);
283
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
284
- }
285
- catch (err) {
286
- const transformedError = (0, transform_error_1.transformError)(err, {
287
- spreadPathsToArguments: {},
288
- explicitPathsToArguments: { id: '$[0]' },
289
- singleArgumentUnchanged: false,
290
- }, ['_id']);
291
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
292
- throw transformedError;
293
- }
294
- });
295
- }
296
- exports.deleteSecret = deleteSecret;
297
- /**
298
- * Updates the specified fields of an existing secret by ID.
299
- *
300
- *
301
- * The `updateSecret()` function returns a Promise that resolves when the secret is successfully updated. You can update one or more fields. Only fields passed in the `secret` object will be updated. All other properties will remain unchanged.
302
- *
303
- * You can retrieve the `_id` parameter from the [`listSecretInfo()`](#listsecretinfo) function. The secret `_id` is different from the secret `name` used by the [`getSecretValue()`](#getsecretvalue) function.
304
- *
305
- * > **Notes:**
306
- * > - Changing a secret's name or value will break all code using the secret.
307
- * > - You can't rename the secret with a name of an existing secret.
308
- * > - Don't leave private keys in your code! Leaving them in is a security risk. Make sure to delete the keys from the code after running `updateSecret()`.
309
- * @param _id - The unique ID of the secret to be updated.
310
- * @param secret - The secret fields to update.
311
- * @public
312
- * @requiredField _id
313
- * @requiredField secret
314
- * @permissionScope Manage Secrets
315
- * @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
316
- * @applicableIdentity APP
317
- * @returns Fulfilled - When the secret is updated.
318
- * Rejected - Error message.
319
- */
320
- function updateSecret(_id, secret) {
321
- var _a, _b, _c;
322
- return __awaiter(this, arguments, void 0, function* () {
323
- const requestTransformation = { id: '$[0]', secret: '$[1]' };
324
- const responseTransformation = '$';
325
- // @ts-ignore
326
- const { httpClient, sideEffects } = arguments[2];
327
- const { toAmbassadorRequest } = (0, velo_1.serializer)({
328
- rootSchema: _updateSecretRequest,
329
- depSchemas: {},
330
- fqdnTransformation: {
331
- paths: [...['secret']],
332
- transformation: _fromVeloEntity,
333
- },
334
- customTransformation: requestTransformation,
335
- });
336
- const { fromJSON } = (0, velo_1.serializer)({
337
- rootSchema: _updateSecretResponse,
338
- depSchemas: {},
339
- fqdnTransformation: {
340
- paths: [],
341
- transformation: _toVeloEntity,
342
- },
343
- customTransformation: responseTransformation,
344
- });
345
- const payload = toAmbassadorRequest([_id, secret]);
346
- const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.partiallyUpdateSecret(payload);
347
- (_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
348
- try {
349
- const result = yield httpClient.request(reqOpts);
350
- (_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
351
- }
352
- catch (err) {
353
- const transformedError = (0, transform_error_1.transformError)(err, {
354
- spreadPathsToArguments: {},
355
- explicitPathsToArguments: { id: '$[0]', secret: '$[1]' },
356
- singleArgumentUnchanged: false,
357
- }, ['_id', 'secret']);
358
- (_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
359
- throw transformedError;
360
- }
361
- });
362
- }
363
- exports.updateSecret = updateSecret;
364
- //# sourceMappingURL=velo-secrets-vault-v1-secret.universal.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"velo-secrets-vault-v1-secret.universal.js","sourceRoot":"","sources":["../../../src/velo-secrets-vault-v1-secret.universal.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,kDAAqD;AACrD,sEAAuF;AACvF,8CAA6D;AAC7D,2GAA6F;AAE7F,MAAM,aAAa,GAAG,GAAG,CAAC;AAC1B,MAAM,eAAe,GAAG,GAAG,CAAC;AA8L5B,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACjC,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACjC,MAAM,sBAAsB,GAAG,EAAE,CAAC;AAClC,MAAM,uBAAuB,GAAG,EAAE,CAAC;AACnC,MAAM,sBAAsB,GAAG,EAAE,CAAC;AAClC,MAAM,uBAAuB,GAAG,EAAE,CAAC;AACnC,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACpB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AACnB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AACnB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AAEhC;;;;;;;;;;;;;;GAcG;AACH,SAAsB,cAAc,CAClC,IAAY;;;QAEZ,MAAM,qBAAqB,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;QAC/C,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,sBAAsB;YAClC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,uBAAuB;YACnC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC;QAE5C,MAAM,OAAO,GAAG,qCAAqC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE9E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE;gBAC1C,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAxDD,wCAwDC;AAED;;;;;;;;;;;;GAYG;AACH,SAAsB,cAAc;;;QAGlC,MAAM,qBAAqB,GAAG,EAAE,CAAC;QACjC,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,sBAAsB;YAClC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,uBAAuB;YACnC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;gBAC7B,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,EAAE,CAAC,CAAC;QAExC,MAAM,OAAO,GAAG,qCAAqC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE9E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE;gBAC5B,uBAAuB,EAAE,KAAK;aAC/B,EACD,EAAE,CACH,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAxDD,wCAwDC;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,SAAsB,YAAY,CAAC,MAAc;;;QAC/C,MAAM,qBAAqB,GAAG,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QACjD,MAAM,sBAAsB,GAAG,OAAO,CAAC;QAEvC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACtB,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAE9C,MAAM,OAAO,GAAG,qCAAqC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE5E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE;gBAC5C,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAtDD,oCAsDC;AAED;;;;;;;;;;;;;;;GAeG;AACH,SAAsB,YAAY,CAAC,GAAW;;;QAC5C,MAAM,qBAAqB,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,CAAC;QAC7C,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAE3C,MAAM,OAAO,GAAG,qCAAqC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE5E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;gBACxC,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,KAAK,CAAC,CACR,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AApDD,oCAoDC;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,SAAsB,YAAY,CAAC,GAAW,EAAE,MAAc;;;QAC5D,MAAM,qBAAqB,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QAC7D,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACtB,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC;QAEnD,MAAM,OAAO,GACX,qCAAqC,CAAC,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAEvE,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE;gBACxD,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,KAAK,EAAE,QAAQ,CAAC,CAClB,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AArDD,oCAqDC"}
@@ -1 +0,0 @@
1
- export * as secrets from './src/velo-secrets-vault-v1-secret.universal';
@@ -1,2 +0,0 @@
1
- export * as secrets from './src/velo-secrets-vault-v1-secret.universal';
2
- //# sourceMappingURL=index.typings.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.typings.js","sourceRoot":"","sources":["../../index.typings.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,8CAA8C,CAAC"}
@@ -1,7 +0,0 @@
1
- import { getSecretValue as publicGetSecretValue, listSecretInfo as publicListSecretInfo, createSecret as publicCreateSecret, deleteSecret as publicDeleteSecret, updateSecret as publicUpdateSecret } from './velo-secrets-vault-v1-secret.public';
2
- import { BuildRESTFunction } from '@wix/sdk-types';
3
- export declare const getSecretValue: BuildRESTFunction<typeof publicGetSecretValue>;
4
- export declare const listSecretInfo: BuildRESTFunction<typeof publicListSecretInfo>;
5
- export declare const createSecret: BuildRESTFunction<typeof publicCreateSecret>;
6
- export declare const deleteSecret: BuildRESTFunction<typeof publicDeleteSecret>;
7
- export declare const updateSecret: BuildRESTFunction<typeof publicUpdateSecret>;
@@ -1,52 +0,0 @@
1
- import { getSecretValue as publicGetSecretValue, listSecretInfo as publicListSecretInfo, createSecret as publicCreateSecret, deleteSecret as publicDeleteSecret, updateSecret as publicUpdateSecret, } from './velo-secrets-vault-v1-secret.public';
2
- export const getSecretValue = (...args) => {
3
- // @ts-expect-error
4
- if (!globalThis.__wix_context__) {
5
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
6
- }
7
- // @ts-expect-error
8
- return globalThis.__wix_context__
9
- .initWixModules(publicGetSecretValue)
10
- .apply(undefined, args);
11
- };
12
- export const listSecretInfo = (...args) => {
13
- // @ts-expect-error
14
- if (!globalThis.__wix_context__) {
15
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
16
- }
17
- // @ts-expect-error
18
- return globalThis.__wix_context__
19
- .initWixModules(publicListSecretInfo)
20
- .apply(undefined, args);
21
- };
22
- export const createSecret = (...args) => {
23
- // @ts-expect-error
24
- if (!globalThis.__wix_context__) {
25
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
26
- }
27
- // @ts-expect-error
28
- return globalThis.__wix_context__
29
- .initWixModules(publicCreateSecret)
30
- .apply(undefined, args);
31
- };
32
- export const deleteSecret = (...args) => {
33
- // @ts-expect-error
34
- if (!globalThis.__wix_context__) {
35
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
36
- }
37
- // @ts-expect-error
38
- return globalThis.__wix_context__
39
- .initWixModules(publicDeleteSecret)
40
- .apply(undefined, args);
41
- };
42
- export const updateSecret = (...args) => {
43
- // @ts-expect-error
44
- if (!globalThis.__wix_context__) {
45
- throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
46
- }
47
- // @ts-expect-error
48
- return globalThis.__wix_context__
49
- .initWixModules(publicUpdateSecret)
50
- .apply(undefined, args);
51
- };
52
- //# sourceMappingURL=velo-secrets-vault-v1-secret.context.js.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"velo-secrets-vault-v1-secret.context.js","sourceRoot":"","sources":["../../../src/velo-secrets-vault-v1-secret.context.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,cAAc,IAAI,oBAAoB,EACtC,cAAc,IAAI,oBAAoB,EACtC,YAAY,IAAI,kBAAkB,EAClC,YAAY,IAAI,kBAAkB,EAClC,YAAY,IAAI,kBAAkB,GACnC,MAAM,uCAAuC,CAAC;AAG/C,MAAM,CAAC,MAAM,cAAc,GAAmD,CAC5E,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,oBAAoB,CAAC;SACpC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,cAAc,GAAmD,CAC5E,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,oBAAoB,CAAC;SACpC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC"}
@@ -1,54 +0,0 @@
1
- import { RequestOptionsFactory } from '@wix/sdk-types';
2
- import { CreateSecretRequest, CreateSecretResponse, DeleteSecretRequest, DeleteSecretResponse, GetSecretValueRequest, GetSecretValueResponse, ListSecretInfoRequest, ListSecretInfoResponse, UpdateSecretRequest, UpdateSecretResponse, GetSecretValueResponseNonNullableFields, ListSecretInfoResponseNonNullableFields, CreateSecretResponseNonNullableFields } from './velo-secrets-vault-v1-secret.types';
3
- /**
4
- * Retrieves the secret value specified by the secret name.
5
- *
6
- * The `getSecretValue()` function returns a Promise that resolves to the value of the secret with the specified given name.
7
- *
8
- * >**Note:**
9
- * > Only use a secret's value in the backend code. Returning the secret value in the frontend is a security risk.
10
- */
11
- export declare function getSecretValue(payload: GetSecretValueRequest): RequestOptionsFactory<GetSecretValueResponse & GetSecretValueResponseNonNullableFields>;
12
- /**
13
- * Retrieves a list of objects containing information about all secrets.
14
- *
15
- * The `listSecretInfo()` function returns a Promise that resolves to a list containing information about all secrets stored on your site.
16
- *
17
- * > **Note:**
18
- * > - The secret's value does not get returned for security reasons. To retrieve a secret's value, use the [`getSecretValue()`](#getSecretValue) function.
19
- */
20
- export declare function listSecretInfo(payload: ListSecretInfoRequest): RequestOptionsFactory<ListSecretInfoResponse & ListSecretInfoResponseNonNullableFields>;
21
- /**
22
- * Creates a new secret.
23
- *
24
- * The `createSecret()` function returns a Promise that resolves secret ID when the secret is created.
25
- *
26
- * >**Notes:**
27
- * > - The secret's name cannot start with `'wix'` or be identical to an existing secret's name.
28
- * > - Don't leave private keys in your code. Leaving them in your code is a security risk. Make sure to delete the keys from the code after running `createSecret()`.
29
- */
30
- export declare function createSecret(payload: CreateSecretRequest): RequestOptionsFactory<CreateSecretResponse & CreateSecretResponseNonNullableFields>;
31
- /**
32
- * Deletes an existing secret by ID.
33
- *
34
- * The `deleteSecret()` function returns a Promise that resolves when the secret is deleted. You can retrieve the secret `_id` using the [`listSecretInfo()`](#listsecretinfo) function.
35
- *
36
- * >**Note:**
37
- * > Deleting a secret is irreversible and will break all code using the secret.
38
- *
39
- */
40
- export declare function deleteSecret(payload: DeleteSecretRequest): RequestOptionsFactory<DeleteSecretResponse>;
41
- /**
42
- * Updates the specified fields of an existing secret by ID.
43
- *
44
- *
45
- * The `updateSecret()` function returns a Promise that resolves when the secret is successfully updated. You can update one or more fields. Only fields passed in the `secret` object will be updated. All other properties will remain unchanged.
46
- *
47
- * You can retrieve the `_id` parameter from the [`listSecretInfo()`](#listsecretinfo) function. The secret `_id` is different from the secret `name` used by the [`getSecretValue()`](#getsecretvalue) function.
48
- *
49
- * > **Notes:**
50
- * > - Changing a secret's name or value will break all code using the secret.
51
- * > - You can't rename the secret with a name of an existing secret.
52
- * > - Don't leave private keys in your code! Leaving them in is a security risk. Make sure to delete the keys from the code after running `updateSecret()`.
53
- */
54
- export declare function partiallyUpdateSecret(payload: UpdateSecretRequest): RequestOptionsFactory<UpdateSecretResponse>;