@wix/secrets 1.0.18 → 1.0.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/build/cjs/context.d.ts +1 -1
- package/build/cjs/context.js +1 -1
- package/build/cjs/context.js.map +1 -1
- package/build/cjs/index.d.ts +1 -1
- package/build/cjs/index.js +1 -1
- package/build/cjs/index.js.map +1 -1
- package/build/cjs/meta.d.ts +1 -1
- package/build/cjs/meta.js +1 -1
- package/build/cjs/meta.js.map +1 -1
- package/build/es/context.d.ts +1 -1
- package/build/es/context.js +1 -1
- package/build/es/context.js.map +1 -1
- package/build/es/index.d.ts +1 -1
- package/build/es/index.js +1 -1
- package/build/es/index.js.map +1 -1
- package/build/es/meta.d.ts +1 -1
- package/build/es/meta.js +1 -1
- package/build/es/meta.js.map +1 -1
- package/package.json +11 -9
- package/build/cjs/index.typings.d.ts +0 -1
- package/build/cjs/index.typings.js +0 -28
- package/build/cjs/index.typings.js.map +0 -1
- package/build/cjs/src/velo-secrets-vault-v1-secret.context.d.ts +0 -7
- package/build/cjs/src/velo-secrets-vault-v1-secret.context.js +0 -60
- package/build/cjs/src/velo-secrets-vault-v1-secret.context.js.map +0 -1
- package/build/cjs/src/velo-secrets-vault-v1-secret.http.d.ts +0 -54
- package/build/cjs/src/velo-secrets-vault-v1-secret.http.js +0 -202
- package/build/cjs/src/velo-secrets-vault-v1-secret.http.js.map +0 -1
- package/build/cjs/src/velo-secrets-vault-v1-secret.meta.d.ts +0 -23
- package/build/cjs/src/velo-secrets-vault-v1-secret.meta.js +0 -123
- package/build/cjs/src/velo-secrets-vault-v1-secret.meta.js.map +0 -1
- package/build/cjs/src/velo-secrets-vault-v1-secret.public.d.ts +0 -12
- package/build/cjs/src/velo-secrets-vault-v1-secret.public.js +0 -40
- package/build/cjs/src/velo-secrets-vault-v1-secret.public.js.map +0 -1
- package/build/cjs/src/velo-secrets-vault-v1-secret.types.d.ts +0 -135
- package/build/cjs/src/velo-secrets-vault-v1-secret.types.js +0 -3
- package/build/cjs/src/velo-secrets-vault-v1-secret.types.js.map +0 -1
- package/build/cjs/src/velo-secrets-vault-v1-secret.universal.d.ts +0 -250
- package/build/cjs/src/velo-secrets-vault-v1-secret.universal.js +0 -364
- package/build/cjs/src/velo-secrets-vault-v1-secret.universal.js.map +0 -1
- package/build/es/index.typings.d.ts +0 -1
- package/build/es/index.typings.js +0 -2
- package/build/es/index.typings.js.map +0 -1
- package/build/es/src/velo-secrets-vault-v1-secret.context.d.ts +0 -7
- package/build/es/src/velo-secrets-vault-v1-secret.context.js +0 -52
- package/build/es/src/velo-secrets-vault-v1-secret.context.js.map +0 -1
- package/build/es/src/velo-secrets-vault-v1-secret.http.d.ts +0 -54
- package/build/es/src/velo-secrets-vault-v1-secret.http.js +0 -194
- package/build/es/src/velo-secrets-vault-v1-secret.http.js.map +0 -1
- package/build/es/src/velo-secrets-vault-v1-secret.meta.d.ts +0 -23
- package/build/es/src/velo-secrets-vault-v1-secret.meta.js +0 -92
- package/build/es/src/velo-secrets-vault-v1-secret.meta.js.map +0 -1
- package/build/es/src/velo-secrets-vault-v1-secret.public.d.ts +0 -12
- package/build/es/src/velo-secrets-vault-v1-secret.public.js +0 -29
- package/build/es/src/velo-secrets-vault-v1-secret.public.js.map +0 -1
- package/build/es/src/velo-secrets-vault-v1-secret.types.d.ts +0 -135
- package/build/es/src/velo-secrets-vault-v1-secret.types.js +0 -2
- package/build/es/src/velo-secrets-vault-v1-secret.types.js.map +0 -1
- package/build/es/src/velo-secrets-vault-v1-secret.universal.d.ts +0 -250
- package/build/es/src/velo-secrets-vault-v1-secret.universal.js +0 -333
- package/build/es/src/velo-secrets-vault-v1-secret.universal.js.map +0 -1
|
@@ -1,364 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
3
|
-
if (k2 === undefined) k2 = k;
|
|
4
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
5
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
6
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
7
|
-
}
|
|
8
|
-
Object.defineProperty(o, k2, desc);
|
|
9
|
-
}) : (function(o, m, k, k2) {
|
|
10
|
-
if (k2 === undefined) k2 = k;
|
|
11
|
-
o[k2] = m[k];
|
|
12
|
-
}));
|
|
13
|
-
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
14
|
-
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
15
|
-
}) : function(o, v) {
|
|
16
|
-
o["default"] = v;
|
|
17
|
-
});
|
|
18
|
-
var __importStar = (this && this.__importStar) || function (mod) {
|
|
19
|
-
if (mod && mod.__esModule) return mod;
|
|
20
|
-
var result = {};
|
|
21
|
-
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
22
|
-
__setModuleDefault(result, mod);
|
|
23
|
-
return result;
|
|
24
|
-
};
|
|
25
|
-
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
26
|
-
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
|
27
|
-
return new (P || (P = Promise))(function (resolve, reject) {
|
|
28
|
-
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
29
|
-
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
30
|
-
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
|
31
|
-
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
32
|
-
});
|
|
33
|
-
};
|
|
34
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
35
|
-
exports.updateSecret = exports.deleteSecret = exports.createSecret = exports.listSecretInfo = exports.getSecretValue = exports.onSecretUpdated = exports.onSecretDeleted = exports.onSecretCreated = void 0;
|
|
36
|
-
const velo_1 = require("@wix/metro-runtime/velo");
|
|
37
|
-
const transform_error_1 = require("@wix/sdk-runtime/transform-error");
|
|
38
|
-
const sdk_types_1 = require("@wix/sdk-types");
|
|
39
|
-
const ambassadorWixVeloSecretsVaultV1Secret = __importStar(require("./velo-secrets-vault-v1-secret.http"));
|
|
40
|
-
const _toVeloEntity = '$';
|
|
41
|
-
const _fromVeloEntity = '$';
|
|
42
|
-
const _createSecretRequest = {};
|
|
43
|
-
const _createSecretResponse = {};
|
|
44
|
-
const _deleteSecretRequest = {};
|
|
45
|
-
const _deleteSecretResponse = {};
|
|
46
|
-
const _getSecretValueRequest = {};
|
|
47
|
-
const _getSecretValueResponse = {};
|
|
48
|
-
const _listSecretInfoRequest = {};
|
|
49
|
-
const _listSecretInfoResponse = {};
|
|
50
|
-
const _updateSecretRequest = {};
|
|
51
|
-
const _updateSecretResponse = {};
|
|
52
|
-
exports.onSecretCreated = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_created')();
|
|
53
|
-
exports.onSecretDeleted = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_deleted')();
|
|
54
|
-
exports.onSecretUpdated = (0, sdk_types_1.EventDefinition)('wix.velo.secrets_vault.v1.secret_updated')();
|
|
55
|
-
/**
|
|
56
|
-
* Retrieves the secret value specified by the secret name.
|
|
57
|
-
*
|
|
58
|
-
* The `getSecretValue()` function returns a Promise that resolves to the value of the secret with the specified given name.
|
|
59
|
-
*
|
|
60
|
-
* >**Note:**
|
|
61
|
-
* > Only use a secret's value in the backend code. Returning the secret value in the frontend is a security risk.
|
|
62
|
-
* @public
|
|
63
|
-
* @requiredField name
|
|
64
|
-
* @param name - The name of the secret to get the value of.
|
|
65
|
-
* @permissionScope Manage Secrets
|
|
66
|
-
* @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
|
|
67
|
-
* @applicableIdentity APP
|
|
68
|
-
* @returns Fulfilled - The value of the secret. Rejected - Error message.
|
|
69
|
-
*/
|
|
70
|
-
function getSecretValue(name) {
|
|
71
|
-
var _a, _b, _c;
|
|
72
|
-
return __awaiter(this, arguments, void 0, function* () {
|
|
73
|
-
const requestTransformation = { name: '$[0]' };
|
|
74
|
-
const responseTransformation = '$';
|
|
75
|
-
// @ts-ignore
|
|
76
|
-
const { httpClient, sideEffects } = arguments[1];
|
|
77
|
-
const { toAmbassadorRequest } = (0, velo_1.serializer)({
|
|
78
|
-
rootSchema: _getSecretValueRequest,
|
|
79
|
-
depSchemas: {},
|
|
80
|
-
fqdnTransformation: {
|
|
81
|
-
paths: [],
|
|
82
|
-
transformation: _fromVeloEntity,
|
|
83
|
-
},
|
|
84
|
-
customTransformation: requestTransformation,
|
|
85
|
-
});
|
|
86
|
-
const { fromJSON } = (0, velo_1.serializer)({
|
|
87
|
-
rootSchema: _getSecretValueResponse,
|
|
88
|
-
depSchemas: {},
|
|
89
|
-
fqdnTransformation: {
|
|
90
|
-
paths: [],
|
|
91
|
-
transformation: _toVeloEntity,
|
|
92
|
-
},
|
|
93
|
-
customTransformation: responseTransformation,
|
|
94
|
-
});
|
|
95
|
-
const payload = toAmbassadorRequest([name]);
|
|
96
|
-
const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.getSecretValue(payload);
|
|
97
|
-
(_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
|
|
98
|
-
try {
|
|
99
|
-
const result = yield httpClient.request(reqOpts);
|
|
100
|
-
(_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
|
|
101
|
-
return fromJSON(result.data);
|
|
102
|
-
}
|
|
103
|
-
catch (err) {
|
|
104
|
-
const transformedError = (0, transform_error_1.transformError)(err, {
|
|
105
|
-
spreadPathsToArguments: {},
|
|
106
|
-
explicitPathsToArguments: { name: '$[0]' },
|
|
107
|
-
singleArgumentUnchanged: false,
|
|
108
|
-
}, ['name']);
|
|
109
|
-
(_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
|
|
110
|
-
throw transformedError;
|
|
111
|
-
}
|
|
112
|
-
});
|
|
113
|
-
}
|
|
114
|
-
exports.getSecretValue = getSecretValue;
|
|
115
|
-
/**
|
|
116
|
-
* Retrieves a list of objects containing information about all secrets.
|
|
117
|
-
*
|
|
118
|
-
* The `listSecretInfo()` function returns a Promise that resolves to a list containing information about all secrets stored on your site.
|
|
119
|
-
*
|
|
120
|
-
* > **Note:**
|
|
121
|
-
* > - The secret's value does not get returned for security reasons. To retrieve a secret's value, use the [`getSecretValue()`](#getSecretValue) function.
|
|
122
|
-
* @public
|
|
123
|
-
* @permissionScope Manage Secrets
|
|
124
|
-
* @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
|
|
125
|
-
* @applicableIdentity APP
|
|
126
|
-
* @returns Fulfilled - A list of objects containing information about your site's secrets. Rejected - Error message.
|
|
127
|
-
*/
|
|
128
|
-
function listSecretInfo() {
|
|
129
|
-
var _a, _b, _c;
|
|
130
|
-
return __awaiter(this, arguments, void 0, function* () {
|
|
131
|
-
const requestTransformation = {};
|
|
132
|
-
const responseTransformation = '$';
|
|
133
|
-
// @ts-ignore
|
|
134
|
-
const { httpClient, sideEffects } = arguments[0];
|
|
135
|
-
const { toAmbassadorRequest } = (0, velo_1.serializer)({
|
|
136
|
-
rootSchema: _listSecretInfoRequest,
|
|
137
|
-
depSchemas: {},
|
|
138
|
-
fqdnTransformation: {
|
|
139
|
-
paths: [],
|
|
140
|
-
transformation: _fromVeloEntity,
|
|
141
|
-
},
|
|
142
|
-
customTransformation: requestTransformation,
|
|
143
|
-
});
|
|
144
|
-
const { fromJSON } = (0, velo_1.serializer)({
|
|
145
|
-
rootSchema: _listSecretInfoResponse,
|
|
146
|
-
depSchemas: {},
|
|
147
|
-
fqdnTransformation: {
|
|
148
|
-
paths: [...['Array#secrets']],
|
|
149
|
-
transformation: _toVeloEntity,
|
|
150
|
-
},
|
|
151
|
-
customTransformation: responseTransformation,
|
|
152
|
-
});
|
|
153
|
-
const payload = toAmbassadorRequest([]);
|
|
154
|
-
const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.listSecretInfo(payload);
|
|
155
|
-
(_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
|
|
156
|
-
try {
|
|
157
|
-
const result = yield httpClient.request(reqOpts);
|
|
158
|
-
(_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
|
|
159
|
-
return fromJSON(result.data);
|
|
160
|
-
}
|
|
161
|
-
catch (err) {
|
|
162
|
-
const transformedError = (0, transform_error_1.transformError)(err, {
|
|
163
|
-
spreadPathsToArguments: {},
|
|
164
|
-
explicitPathsToArguments: {},
|
|
165
|
-
singleArgumentUnchanged: false,
|
|
166
|
-
}, []);
|
|
167
|
-
(_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
|
|
168
|
-
throw transformedError;
|
|
169
|
-
}
|
|
170
|
-
});
|
|
171
|
-
}
|
|
172
|
-
exports.listSecretInfo = listSecretInfo;
|
|
173
|
-
/**
|
|
174
|
-
* Creates a new secret.
|
|
175
|
-
*
|
|
176
|
-
* The `createSecret()` function returns a Promise that resolves secret ID when the secret is created.
|
|
177
|
-
*
|
|
178
|
-
* >**Notes:**
|
|
179
|
-
* > - The secret's name cannot start with `'wix'` or be identical to an existing secret's name.
|
|
180
|
-
* > - Don't leave private keys in your code. Leaving them in your code is a security risk. Make sure to delete the keys from the code after running `createSecret()`.
|
|
181
|
-
* @public
|
|
182
|
-
* @requiredField secret
|
|
183
|
-
* @requiredField secret.name
|
|
184
|
-
* @requiredField secret.value
|
|
185
|
-
* @param secret - Fields of a new secret.
|
|
186
|
-
* @permissionScope Manage Secrets
|
|
187
|
-
* @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
|
|
188
|
-
* @applicableIdentity APP
|
|
189
|
-
* @returns Fulfilled - The ID of the created secret.
|
|
190
|
-
* Rejected - Error message.
|
|
191
|
-
*/
|
|
192
|
-
function createSecret(secret) {
|
|
193
|
-
var _a, _b, _c;
|
|
194
|
-
return __awaiter(this, arguments, void 0, function* () {
|
|
195
|
-
const requestTransformation = { secret: '$[0]' };
|
|
196
|
-
const responseTransformation = '$._id';
|
|
197
|
-
// @ts-ignore
|
|
198
|
-
const { httpClient, sideEffects } = arguments[1];
|
|
199
|
-
const { toAmbassadorRequest } = (0, velo_1.serializer)({
|
|
200
|
-
rootSchema: _createSecretRequest,
|
|
201
|
-
depSchemas: {},
|
|
202
|
-
fqdnTransformation: {
|
|
203
|
-
paths: [...['secret']],
|
|
204
|
-
transformation: _fromVeloEntity,
|
|
205
|
-
},
|
|
206
|
-
customTransformation: requestTransformation,
|
|
207
|
-
});
|
|
208
|
-
const { fromJSON } = (0, velo_1.serializer)({
|
|
209
|
-
rootSchema: _createSecretResponse,
|
|
210
|
-
depSchemas: {},
|
|
211
|
-
fqdnTransformation: {
|
|
212
|
-
paths: [],
|
|
213
|
-
transformation: _toVeloEntity,
|
|
214
|
-
},
|
|
215
|
-
customTransformation: responseTransformation,
|
|
216
|
-
});
|
|
217
|
-
const payload = toAmbassadorRequest([secret]);
|
|
218
|
-
const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.createSecret(payload);
|
|
219
|
-
(_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
|
|
220
|
-
try {
|
|
221
|
-
const result = yield httpClient.request(reqOpts);
|
|
222
|
-
(_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
|
|
223
|
-
return fromJSON(result.data);
|
|
224
|
-
}
|
|
225
|
-
catch (err) {
|
|
226
|
-
const transformedError = (0, transform_error_1.transformError)(err, {
|
|
227
|
-
spreadPathsToArguments: {},
|
|
228
|
-
explicitPathsToArguments: { secret: '$[0]' },
|
|
229
|
-
singleArgumentUnchanged: false,
|
|
230
|
-
}, ['secret']);
|
|
231
|
-
(_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
|
|
232
|
-
throw transformedError;
|
|
233
|
-
}
|
|
234
|
-
});
|
|
235
|
-
}
|
|
236
|
-
exports.createSecret = createSecret;
|
|
237
|
-
/**
|
|
238
|
-
* Deletes an existing secret by ID.
|
|
239
|
-
*
|
|
240
|
-
* The `deleteSecret()` function returns a Promise that resolves when the secret is deleted. You can retrieve the secret `_id` using the [`listSecretInfo()`](#listsecretinfo) function.
|
|
241
|
-
*
|
|
242
|
-
* >**Note:**
|
|
243
|
-
* > Deleting a secret is irreversible and will break all code using the secret.
|
|
244
|
-
*
|
|
245
|
-
* @public
|
|
246
|
-
* @requiredField _id
|
|
247
|
-
* @param _id - The unique ID of the secret to be deleted.
|
|
248
|
-
* @permissionScope Manage Secrets
|
|
249
|
-
* @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
|
|
250
|
-
* @applicableIdentity APP
|
|
251
|
-
* @returns Fulfilled - When the secret is successfully deleted. Rejected - Error message.
|
|
252
|
-
*/
|
|
253
|
-
function deleteSecret(_id) {
|
|
254
|
-
var _a, _b, _c;
|
|
255
|
-
return __awaiter(this, arguments, void 0, function* () {
|
|
256
|
-
const requestTransformation = { id: '$[0]' };
|
|
257
|
-
const responseTransformation = '$';
|
|
258
|
-
// @ts-ignore
|
|
259
|
-
const { httpClient, sideEffects } = arguments[1];
|
|
260
|
-
const { toAmbassadorRequest } = (0, velo_1.serializer)({
|
|
261
|
-
rootSchema: _deleteSecretRequest,
|
|
262
|
-
depSchemas: {},
|
|
263
|
-
fqdnTransformation: {
|
|
264
|
-
paths: [],
|
|
265
|
-
transformation: _fromVeloEntity,
|
|
266
|
-
},
|
|
267
|
-
customTransformation: requestTransformation,
|
|
268
|
-
});
|
|
269
|
-
const { fromJSON } = (0, velo_1.serializer)({
|
|
270
|
-
rootSchema: _deleteSecretResponse,
|
|
271
|
-
depSchemas: {},
|
|
272
|
-
fqdnTransformation: {
|
|
273
|
-
paths: [],
|
|
274
|
-
transformation: _toVeloEntity,
|
|
275
|
-
},
|
|
276
|
-
customTransformation: responseTransformation,
|
|
277
|
-
});
|
|
278
|
-
const payload = toAmbassadorRequest([_id]);
|
|
279
|
-
const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.deleteSecret(payload);
|
|
280
|
-
(_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
|
|
281
|
-
try {
|
|
282
|
-
const result = yield httpClient.request(reqOpts);
|
|
283
|
-
(_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
|
|
284
|
-
}
|
|
285
|
-
catch (err) {
|
|
286
|
-
const transformedError = (0, transform_error_1.transformError)(err, {
|
|
287
|
-
spreadPathsToArguments: {},
|
|
288
|
-
explicitPathsToArguments: { id: '$[0]' },
|
|
289
|
-
singleArgumentUnchanged: false,
|
|
290
|
-
}, ['_id']);
|
|
291
|
-
(_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
|
|
292
|
-
throw transformedError;
|
|
293
|
-
}
|
|
294
|
-
});
|
|
295
|
-
}
|
|
296
|
-
exports.deleteSecret = deleteSecret;
|
|
297
|
-
/**
|
|
298
|
-
* Updates the specified fields of an existing secret by ID.
|
|
299
|
-
*
|
|
300
|
-
*
|
|
301
|
-
* The `updateSecret()` function returns a Promise that resolves when the secret is successfully updated. You can update one or more fields. Only fields passed in the `secret` object will be updated. All other properties will remain unchanged.
|
|
302
|
-
*
|
|
303
|
-
* You can retrieve the `_id` parameter from the [`listSecretInfo()`](#listsecretinfo) function. The secret `_id` is different from the secret `name` used by the [`getSecretValue()`](#getsecretvalue) function.
|
|
304
|
-
*
|
|
305
|
-
* > **Notes:**
|
|
306
|
-
* > - Changing a secret's name or value will break all code using the secret.
|
|
307
|
-
* > - You can't rename the secret with a name of an existing secret.
|
|
308
|
-
* > - Don't leave private keys in your code! Leaving them in is a security risk. Make sure to delete the keys from the code after running `updateSecret()`.
|
|
309
|
-
* @param _id - The unique ID of the secret to be updated.
|
|
310
|
-
* @param secret - The secret fields to update.
|
|
311
|
-
* @public
|
|
312
|
-
* @requiredField _id
|
|
313
|
-
* @requiredField secret
|
|
314
|
-
* @permissionScope Manage Secrets
|
|
315
|
-
* @permissionScopeId SCOPE.VELO.MANAGE_SECRETS
|
|
316
|
-
* @applicableIdentity APP
|
|
317
|
-
* @returns Fulfilled - When the secret is updated.
|
|
318
|
-
* Rejected - Error message.
|
|
319
|
-
*/
|
|
320
|
-
function updateSecret(_id, secret) {
|
|
321
|
-
var _a, _b, _c;
|
|
322
|
-
return __awaiter(this, arguments, void 0, function* () {
|
|
323
|
-
const requestTransformation = { id: '$[0]', secret: '$[1]' };
|
|
324
|
-
const responseTransformation = '$';
|
|
325
|
-
// @ts-ignore
|
|
326
|
-
const { httpClient, sideEffects } = arguments[2];
|
|
327
|
-
const { toAmbassadorRequest } = (0, velo_1.serializer)({
|
|
328
|
-
rootSchema: _updateSecretRequest,
|
|
329
|
-
depSchemas: {},
|
|
330
|
-
fqdnTransformation: {
|
|
331
|
-
paths: [...['secret']],
|
|
332
|
-
transformation: _fromVeloEntity,
|
|
333
|
-
},
|
|
334
|
-
customTransformation: requestTransformation,
|
|
335
|
-
});
|
|
336
|
-
const { fromJSON } = (0, velo_1.serializer)({
|
|
337
|
-
rootSchema: _updateSecretResponse,
|
|
338
|
-
depSchemas: {},
|
|
339
|
-
fqdnTransformation: {
|
|
340
|
-
paths: [],
|
|
341
|
-
transformation: _toVeloEntity,
|
|
342
|
-
},
|
|
343
|
-
customTransformation: responseTransformation,
|
|
344
|
-
});
|
|
345
|
-
const payload = toAmbassadorRequest([_id, secret]);
|
|
346
|
-
const reqOpts = ambassadorWixVeloSecretsVaultV1Secret.partiallyUpdateSecret(payload);
|
|
347
|
-
(_a = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSiteCall) === null || _a === void 0 ? void 0 : _a.call(sideEffects);
|
|
348
|
-
try {
|
|
349
|
-
const result = yield httpClient.request(reqOpts);
|
|
350
|
-
(_b = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onSuccess) === null || _b === void 0 ? void 0 : _b.call(sideEffects, result);
|
|
351
|
-
}
|
|
352
|
-
catch (err) {
|
|
353
|
-
const transformedError = (0, transform_error_1.transformError)(err, {
|
|
354
|
-
spreadPathsToArguments: {},
|
|
355
|
-
explicitPathsToArguments: { id: '$[0]', secret: '$[1]' },
|
|
356
|
-
singleArgumentUnchanged: false,
|
|
357
|
-
}, ['_id', 'secret']);
|
|
358
|
-
(_c = sideEffects === null || sideEffects === void 0 ? void 0 : sideEffects.onError) === null || _c === void 0 ? void 0 : _c.call(sideEffects, err);
|
|
359
|
-
throw transformedError;
|
|
360
|
-
}
|
|
361
|
-
});
|
|
362
|
-
}
|
|
363
|
-
exports.updateSecret = updateSecret;
|
|
364
|
-
//# sourceMappingURL=velo-secrets-vault-v1-secret.universal.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"velo-secrets-vault-v1-secret.universal.js","sourceRoot":"","sources":["../../../src/velo-secrets-vault-v1-secret.universal.ts"],"names":[],"mappings":";;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;AAAA,kDAAqD;AACrD,sEAAuF;AACvF,8CAA6D;AAC7D,2GAA6F;AAE7F,MAAM,aAAa,GAAG,GAAG,CAAC;AAC1B,MAAM,eAAe,GAAG,GAAG,CAAC;AA8L5B,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACjC,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACjC,MAAM,sBAAsB,GAAG,EAAE,CAAC;AAClC,MAAM,uBAAuB,GAAG,EAAE,CAAC;AACnC,MAAM,sBAAsB,GAAG,EAAE,CAAC;AAClC,MAAM,uBAAuB,GAAG,EAAE,CAAC;AACnC,MAAM,oBAAoB,GAAG,EAAE,CAAC;AAChC,MAAM,qBAAqB,GAAG,EAAE,CAAC;AACpB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AACnB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AACnB,QAAA,eAAe,GAAG,IAAA,2BAAe,EAC5C,0CAA0C,CAC3C,EAA8B,CAAC;AAEhC;;;;;;;;;;;;;;GAcG;AACH,SAAsB,cAAc,CAClC,IAAY;;;QAEZ,MAAM,qBAAqB,GAAG,EAAE,IAAI,EAAE,MAAM,EAAE,CAAC;QAC/C,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,sBAAsB;YAClC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,uBAAuB;YACnC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC;QAE5C,MAAM,OAAO,GAAG,qCAAqC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE9E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,IAAI,EAAE,MAAM,EAAE;gBAC1C,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,MAAM,CAAC,CACT,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAxDD,wCAwDC;AAED;;;;;;;;;;;;GAYG;AACH,SAAsB,cAAc;;;QAGlC,MAAM,qBAAqB,GAAG,EAAE,CAAC;QACjC,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,sBAAsB;YAClC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,uBAAuB;YACnC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,eAAe,CAAC,CAAC;gBAC7B,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,EAAE,CAAC,CAAC;QAExC,MAAM,OAAO,GAAG,qCAAqC,CAAC,cAAc,CAAC,OAAO,CAAC,CAAC;QAE9E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE;gBAC5B,uBAAuB,EAAE,KAAK;aAC/B,EACD,EAAE,CACH,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAxDD,wCAwDC;AAED;;;;;;;;;;;;;;;;;;GAkBG;AACH,SAAsB,YAAY,CAAC,MAAc;;;QAC/C,MAAM,qBAAqB,GAAG,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QACjD,MAAM,sBAAsB,GAAG,OAAO,CAAC;QAEvC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACtB,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC;QAE9C,MAAM,OAAO,GAAG,qCAAqC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE5E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;YAEjC,OAAO,QAAQ,CAAC,MAAM,CAAC,IAAI,CAAQ,CAAC;QACtC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE;gBAC5C,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,QAAQ,CAAC,CACX,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AAtDD,oCAsDC;AAED;;;;;;;;;;;;;;;GAeG;AACH,SAAsB,YAAY,CAAC,GAAW;;;QAC5C,MAAM,qBAAqB,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,CAAC;QAC7C,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC;QAE3C,MAAM,OAAO,GAAG,qCAAqC,CAAC,YAAY,CAAC,OAAO,CAAC,CAAC;QAE5E,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE;gBACxC,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,KAAK,CAAC,CACR,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AApDD,oCAoDC;AAED;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,SAAsB,YAAY,CAAC,GAAW,EAAE,MAAc;;;QAC5D,MAAM,qBAAqB,GAAG,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC;QAC7D,MAAM,sBAAsB,GAAG,GAAG,CAAC;QAEnC,aAAa;QACb,MAAM,EAAE,UAAU,EAAE,WAAW,EAAE,GAAG,SAAS,CAAC,CAAC,CAG9C,CAAC;QAEF,MAAM,EAAE,mBAAmB,EAAE,GAAG,IAAA,iBAAU,EAAC;YACzC,UAAU,EAAE,oBAAoB;YAChC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;gBACtB,cAAc,EAAE,eAAe;aAChC;YACD,oBAAoB,EAAE,qBAAqB;SAC5C,CAAC,CAAC;QAEH,MAAM,EAAE,QAAQ,EAAE,GAAG,IAAA,iBAAU,EAAC;YAC9B,UAAU,EAAE,qBAAqB;YACjC,UAAU,EAAE,EAAE;YACd,kBAAkB,EAAE;gBAClB,KAAK,EAAE,EAAE;gBACT,cAAc,EAAE,aAAa;aAC9B;YACD,oBAAoB,EAAE,sBAAsB;SAC7C,CAAC,CAAC;QAEH,MAAM,OAAO,GAAG,mBAAmB,CAAC,CAAC,GAAG,EAAE,MAAM,CAAC,CAAC,CAAC;QAEnD,MAAM,OAAO,GACX,qCAAqC,CAAC,qBAAqB,CAAC,OAAO,CAAC,CAAC;QAEvE,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,UAAU,2DAAI,CAAC;QAC5B,IAAI,CAAC;YACH,MAAM,MAAM,GAAG,MAAM,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YACjD,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,SAAS,4DAAG,MAAM,CAAC,CAAC;QACnC,CAAC;QAAC,OAAO,GAAQ,EAAE,CAAC;YAClB,MAAM,gBAAgB,GAAG,IAAA,gCAAiB,EACxC,GAAG,EACH;gBACE,sBAAsB,EAAE,EAAE;gBAC1B,wBAAwB,EAAE,EAAE,EAAE,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE;gBACxD,uBAAuB,EAAE,KAAK;aAC/B,EACD,CAAC,KAAK,EAAE,QAAQ,CAAC,CAClB,CAAC;YACF,MAAA,WAAW,aAAX,WAAW,uBAAX,WAAW,CAAE,OAAO,4DAAG,GAAG,CAAC,CAAC;YAE5B,MAAM,gBAAgB,CAAC;QACzB,CAAC;;CACF;AArDD,oCAqDC"}
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
export * as secrets from './src/velo-secrets-vault-v1-secret.universal';
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"index.typings.js","sourceRoot":"","sources":["../../index.typings.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,8CAA8C,CAAC"}
|
|
@@ -1,7 +0,0 @@
|
|
|
1
|
-
import { getSecretValue as publicGetSecretValue, listSecretInfo as publicListSecretInfo, createSecret as publicCreateSecret, deleteSecret as publicDeleteSecret, updateSecret as publicUpdateSecret } from './velo-secrets-vault-v1-secret.public';
|
|
2
|
-
import { BuildRESTFunction } from '@wix/sdk-types';
|
|
3
|
-
export declare const getSecretValue: BuildRESTFunction<typeof publicGetSecretValue>;
|
|
4
|
-
export declare const listSecretInfo: BuildRESTFunction<typeof publicListSecretInfo>;
|
|
5
|
-
export declare const createSecret: BuildRESTFunction<typeof publicCreateSecret>;
|
|
6
|
-
export declare const deleteSecret: BuildRESTFunction<typeof publicDeleteSecret>;
|
|
7
|
-
export declare const updateSecret: BuildRESTFunction<typeof publicUpdateSecret>;
|
|
@@ -1,52 +0,0 @@
|
|
|
1
|
-
import { getSecretValue as publicGetSecretValue, listSecretInfo as publicListSecretInfo, createSecret as publicCreateSecret, deleteSecret as publicDeleteSecret, updateSecret as publicUpdateSecret, } from './velo-secrets-vault-v1-secret.public';
|
|
2
|
-
export const getSecretValue = (...args) => {
|
|
3
|
-
// @ts-expect-error
|
|
4
|
-
if (!globalThis.__wix_context__) {
|
|
5
|
-
throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
|
|
6
|
-
}
|
|
7
|
-
// @ts-expect-error
|
|
8
|
-
return globalThis.__wix_context__
|
|
9
|
-
.initWixModules(publicGetSecretValue)
|
|
10
|
-
.apply(undefined, args);
|
|
11
|
-
};
|
|
12
|
-
export const listSecretInfo = (...args) => {
|
|
13
|
-
// @ts-expect-error
|
|
14
|
-
if (!globalThis.__wix_context__) {
|
|
15
|
-
throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
|
|
16
|
-
}
|
|
17
|
-
// @ts-expect-error
|
|
18
|
-
return globalThis.__wix_context__
|
|
19
|
-
.initWixModules(publicListSecretInfo)
|
|
20
|
-
.apply(undefined, args);
|
|
21
|
-
};
|
|
22
|
-
export const createSecret = (...args) => {
|
|
23
|
-
// @ts-expect-error
|
|
24
|
-
if (!globalThis.__wix_context__) {
|
|
25
|
-
throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
|
|
26
|
-
}
|
|
27
|
-
// @ts-expect-error
|
|
28
|
-
return globalThis.__wix_context__
|
|
29
|
-
.initWixModules(publicCreateSecret)
|
|
30
|
-
.apply(undefined, args);
|
|
31
|
-
};
|
|
32
|
-
export const deleteSecret = (...args) => {
|
|
33
|
-
// @ts-expect-error
|
|
34
|
-
if (!globalThis.__wix_context__) {
|
|
35
|
-
throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
|
|
36
|
-
}
|
|
37
|
-
// @ts-expect-error
|
|
38
|
-
return globalThis.__wix_context__
|
|
39
|
-
.initWixModules(publicDeleteSecret)
|
|
40
|
-
.apply(undefined, args);
|
|
41
|
-
};
|
|
42
|
-
export const updateSecret = (...args) => {
|
|
43
|
-
// @ts-expect-error
|
|
44
|
-
if (!globalThis.__wix_context__) {
|
|
45
|
-
throw new Error('Wix context is not available. Make sure to initialize the Wix context before using SDK modules');
|
|
46
|
-
}
|
|
47
|
-
// @ts-expect-error
|
|
48
|
-
return globalThis.__wix_context__
|
|
49
|
-
.initWixModules(publicUpdateSecret)
|
|
50
|
-
.apply(undefined, args);
|
|
51
|
-
};
|
|
52
|
-
//# sourceMappingURL=velo-secrets-vault-v1-secret.context.js.map
|
|
@@ -1 +0,0 @@
|
|
|
1
|
-
{"version":3,"file":"velo-secrets-vault-v1-secret.context.js","sourceRoot":"","sources":["../../../src/velo-secrets-vault-v1-secret.context.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,cAAc,IAAI,oBAAoB,EACtC,cAAc,IAAI,oBAAoB,EACtC,YAAY,IAAI,kBAAkB,EAClC,YAAY,IAAI,kBAAkB,EAClC,YAAY,IAAI,kBAAkB,GACnC,MAAM,uCAAuC,CAAC;AAG/C,MAAM,CAAC,MAAM,cAAc,GAAmD,CAC5E,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,oBAAoB,CAAC;SACpC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,cAAc,GAAmD,CAC5E,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,oBAAoB,CAAC;SACpC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC;AACF,MAAM,CAAC,MAAM,YAAY,GAAiD,CACxE,GAAG,IAAS,EACZ,EAAE;IACF,mBAAmB;IACnB,IAAI,CAAC,UAAU,CAAC,eAAe,EAAE,CAAC;QAChC,MAAM,IAAI,KAAK,CACb,gGAAgG,CACjG,CAAC;IACJ,CAAC;IACD,mBAAmB;IACnB,OAAO,UAAU,CAAC,eAAe;SAC9B,cAAc,CAAC,kBAAkB,CAAC;SAClC,KAAK,CAAC,SAAS,EAAE,IAAI,CAAC,CAAC;AAC5B,CAAC,CAAC"}
|
|
@@ -1,54 +0,0 @@
|
|
|
1
|
-
import { RequestOptionsFactory } from '@wix/sdk-types';
|
|
2
|
-
import { CreateSecretRequest, CreateSecretResponse, DeleteSecretRequest, DeleteSecretResponse, GetSecretValueRequest, GetSecretValueResponse, ListSecretInfoRequest, ListSecretInfoResponse, UpdateSecretRequest, UpdateSecretResponse, GetSecretValueResponseNonNullableFields, ListSecretInfoResponseNonNullableFields, CreateSecretResponseNonNullableFields } from './velo-secrets-vault-v1-secret.types';
|
|
3
|
-
/**
|
|
4
|
-
* Retrieves the secret value specified by the secret name.
|
|
5
|
-
*
|
|
6
|
-
* The `getSecretValue()` function returns a Promise that resolves to the value of the secret with the specified given name.
|
|
7
|
-
*
|
|
8
|
-
* >**Note:**
|
|
9
|
-
* > Only use a secret's value in the backend code. Returning the secret value in the frontend is a security risk.
|
|
10
|
-
*/
|
|
11
|
-
export declare function getSecretValue(payload: GetSecretValueRequest): RequestOptionsFactory<GetSecretValueResponse & GetSecretValueResponseNonNullableFields>;
|
|
12
|
-
/**
|
|
13
|
-
* Retrieves a list of objects containing information about all secrets.
|
|
14
|
-
*
|
|
15
|
-
* The `listSecretInfo()` function returns a Promise that resolves to a list containing information about all secrets stored on your site.
|
|
16
|
-
*
|
|
17
|
-
* > **Note:**
|
|
18
|
-
* > - The secret's value does not get returned for security reasons. To retrieve a secret's value, use the [`getSecretValue()`](#getSecretValue) function.
|
|
19
|
-
*/
|
|
20
|
-
export declare function listSecretInfo(payload: ListSecretInfoRequest): RequestOptionsFactory<ListSecretInfoResponse & ListSecretInfoResponseNonNullableFields>;
|
|
21
|
-
/**
|
|
22
|
-
* Creates a new secret.
|
|
23
|
-
*
|
|
24
|
-
* The `createSecret()` function returns a Promise that resolves secret ID when the secret is created.
|
|
25
|
-
*
|
|
26
|
-
* >**Notes:**
|
|
27
|
-
* > - The secret's name cannot start with `'wix'` or be identical to an existing secret's name.
|
|
28
|
-
* > - Don't leave private keys in your code. Leaving them in your code is a security risk. Make sure to delete the keys from the code after running `createSecret()`.
|
|
29
|
-
*/
|
|
30
|
-
export declare function createSecret(payload: CreateSecretRequest): RequestOptionsFactory<CreateSecretResponse & CreateSecretResponseNonNullableFields>;
|
|
31
|
-
/**
|
|
32
|
-
* Deletes an existing secret by ID.
|
|
33
|
-
*
|
|
34
|
-
* The `deleteSecret()` function returns a Promise that resolves when the secret is deleted. You can retrieve the secret `_id` using the [`listSecretInfo()`](#listsecretinfo) function.
|
|
35
|
-
*
|
|
36
|
-
* >**Note:**
|
|
37
|
-
* > Deleting a secret is irreversible and will break all code using the secret.
|
|
38
|
-
*
|
|
39
|
-
*/
|
|
40
|
-
export declare function deleteSecret(payload: DeleteSecretRequest): RequestOptionsFactory<DeleteSecretResponse>;
|
|
41
|
-
/**
|
|
42
|
-
* Updates the specified fields of an existing secret by ID.
|
|
43
|
-
*
|
|
44
|
-
*
|
|
45
|
-
* The `updateSecret()` function returns a Promise that resolves when the secret is successfully updated. You can update one or more fields. Only fields passed in the `secret` object will be updated. All other properties will remain unchanged.
|
|
46
|
-
*
|
|
47
|
-
* You can retrieve the `_id` parameter from the [`listSecretInfo()`](#listsecretinfo) function. The secret `_id` is different from the secret `name` used by the [`getSecretValue()`](#getsecretvalue) function.
|
|
48
|
-
*
|
|
49
|
-
* > **Notes:**
|
|
50
|
-
* > - Changing a secret's name or value will break all code using the secret.
|
|
51
|
-
* > - You can't rename the secret with a name of an existing secret.
|
|
52
|
-
* > - Don't leave private keys in your code! Leaving them in is a security risk. Make sure to delete the keys from the code after running `updateSecret()`.
|
|
53
|
-
*/
|
|
54
|
-
export declare function partiallyUpdateSecret(payload: UpdateSecretRequest): RequestOptionsFactory<UpdateSecretResponse>;
|