oci-vault 2.79.1 → 2.81.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/lib/client.d.ts +15 -14
- package/lib/client.js +73 -29
- package/lib/client.js.map +1 -1
- package/lib/model/bytes-generation-context.d.ts +39 -0
- package/lib/model/bytes-generation-context.js +64 -0
- package/lib/model/bytes-generation-context.js.map +1 -0
- package/lib/model/create-secret-details.d.ts +7 -1
- package/lib/model/create-secret-details.js +6 -0
- package/lib/model/create-secret-details.js.map +1 -1
- package/lib/model/index.d.ts +8 -0
- package/lib/model/index.js +9 -1
- package/lib/model/index.js.map +1 -1
- package/lib/model/passphrase-generation-context.d.ts +43 -0
- package/lib/model/passphrase-generation-context.js +64 -0
- package/lib/model/passphrase-generation-context.js.map +1 -0
- package/lib/model/secret-content-details.js +4 -2
- package/lib/model/secret-content-details.js.map +1 -1
- package/lib/model/secret-generation-context.d.ts +29 -0
- package/lib/model/secret-generation-context.js +76 -0
- package/lib/model/secret-generation-context.js.map +1 -0
- package/lib/model/secret-rule.js +4 -2
- package/lib/model/secret-rule.js.map +1 -1
- package/lib/model/secret-summary.d.ts +6 -0
- package/lib/model/secret-summary.js +6 -0
- package/lib/model/secret-summary.js.map +1 -1
- package/lib/model/secret-version-summary.d.ts +5 -0
- package/lib/model/secret-version-summary.js.map +1 -1
- package/lib/model/secret-version.d.ts +5 -0
- package/lib/model/secret-version.js.map +1 -1
- package/lib/model/secret.d.ts +6 -0
- package/lib/model/secret.js +6 -0
- package/lib/model/secret.js.map +1 -1
- package/lib/model/ssh-key-generation-context.d.ts +40 -0
- package/lib/model/ssh-key-generation-context.js +65 -0
- package/lib/model/ssh-key-generation-context.js.map +1 -0
- package/lib/model/target-system-details.js +4 -2
- package/lib/model/target-system-details.js.map +1 -1
- package/lib/model/update-secret-details.d.ts +6 -0
- package/lib/model/update-secret-details.js +6 -0
- package/lib/model/update-secret-details.js.map +1 -1
- package/lib/request/cancel-secret-deletion-request.d.ts +1 -1
- package/lib/request/cancel-secret-rotation-request.d.ts +1 -1
- package/lib/request/cancel-secret-version-deletion-request.d.ts +1 -1
- package/lib/request/change-secret-compartment-request.d.ts +1 -1
- package/lib/request/create-secret-request.d.ts +1 -1
- package/lib/request/get-secret-request.d.ts +1 -1
- package/lib/request/get-secret-version-request.d.ts +1 -1
- package/lib/request/list-secret-versions-request.d.ts +1 -1
- package/lib/request/list-secrets-request.d.ts +1 -1
- package/lib/request/rotate-secret-request.d.ts +1 -1
- package/lib/request/schedule-secret-deletion-request.d.ts +1 -1
- package/lib/request/schedule-secret-version-deletion-request.d.ts +1 -1
- package/lib/request/update-secret-request.d.ts +1 -1
- package/package.json +3 -3
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vault Secret Management API
|
|
3
|
+
* Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
|
|
4
|
+
* OpenAPI spec version: 20180608
|
|
5
|
+
*
|
|
6
|
+
*
|
|
7
|
+
* NOTE: This class is auto generated by OracleSDKGenerator.
|
|
8
|
+
* Do not edit the class manually.
|
|
9
|
+
*
|
|
10
|
+
* Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
|
|
11
|
+
* This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
|
12
|
+
*/
|
|
13
|
+
import * as model from "../model";
|
|
14
|
+
/**
|
|
15
|
+
* Generates random bytes. By default, secrets of type Bytes has no structure. The generated bytes are stored as a Base64 encoded string.
|
|
16
|
+
* The SecretTemplate must have the %GENERATED_BYTES% keyword which is replaced with the generated bytes, if provided
|
|
17
|
+
*
|
|
18
|
+
*/
|
|
19
|
+
export interface BytesGenerationContext extends model.SecretGenerationContext {
|
|
20
|
+
/**
|
|
21
|
+
* Name of random bytes generation template for generating random byte type secret.
|
|
22
|
+
*/
|
|
23
|
+
"generationTemplate": BytesGenerationContext.GenerationTemplate;
|
|
24
|
+
"generationType": string;
|
|
25
|
+
}
|
|
26
|
+
export declare namespace BytesGenerationContext {
|
|
27
|
+
enum GenerationTemplate {
|
|
28
|
+
Bytes512 = "BYTES_512",
|
|
29
|
+
Bytes1024 = "BYTES_1024",
|
|
30
|
+
/**
|
|
31
|
+
* This value is used if a service returns a value for this enum that is not recognized by this
|
|
32
|
+
* version of the SDK.
|
|
33
|
+
*/
|
|
34
|
+
UnknownValue = "UNKNOWN_VALUE"
|
|
35
|
+
}
|
|
36
|
+
function getJsonObj(obj: BytesGenerationContext, isParentJsonObj?: boolean): object;
|
|
37
|
+
const generationType = "BYTES";
|
|
38
|
+
function getDeserializedJsonObj(obj: BytesGenerationContext, isParentJsonObj?: boolean): object;
|
|
39
|
+
}
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vault Secret Management API
|
|
4
|
+
* Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
|
|
5
|
+
* OpenAPI spec version: 20180608
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OracleSDKGenerator.
|
|
9
|
+
* Do not edit the class manually.
|
|
10
|
+
*
|
|
11
|
+
* Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
|
|
12
|
+
* This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
|
13
|
+
*/
|
|
14
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
15
|
+
if (k2 === undefined) k2 = k;
|
|
16
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
17
|
+
}) : (function(o, m, k, k2) {
|
|
18
|
+
if (k2 === undefined) k2 = k;
|
|
19
|
+
o[k2] = m[k];
|
|
20
|
+
}));
|
|
21
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
22
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
23
|
+
}) : function(o, v) {
|
|
24
|
+
o["default"] = v;
|
|
25
|
+
});
|
|
26
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
27
|
+
if (mod && mod.__esModule) return mod;
|
|
28
|
+
var result = {};
|
|
29
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
30
|
+
__setModuleDefault(result, mod);
|
|
31
|
+
return result;
|
|
32
|
+
};
|
|
33
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
34
|
+
exports.BytesGenerationContext = void 0;
|
|
35
|
+
const model = __importStar(require("../model"));
|
|
36
|
+
var BytesGenerationContext;
|
|
37
|
+
(function (BytesGenerationContext) {
|
|
38
|
+
let GenerationTemplate;
|
|
39
|
+
(function (GenerationTemplate) {
|
|
40
|
+
GenerationTemplate["Bytes512"] = "BYTES_512";
|
|
41
|
+
GenerationTemplate["Bytes1024"] = "BYTES_1024";
|
|
42
|
+
/**
|
|
43
|
+
* This value is used if a service returns a value for this enum that is not recognized by this
|
|
44
|
+
* version of the SDK.
|
|
45
|
+
*/
|
|
46
|
+
GenerationTemplate["UnknownValue"] = "UNKNOWN_VALUE";
|
|
47
|
+
})(GenerationTemplate = BytesGenerationContext.GenerationTemplate || (BytesGenerationContext.GenerationTemplate = {}));
|
|
48
|
+
function getJsonObj(obj, isParentJsonObj) {
|
|
49
|
+
const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
|
|
50
|
+
? obj
|
|
51
|
+
: model.SecretGenerationContext.getJsonObj(obj))), {});
|
|
52
|
+
return jsonObj;
|
|
53
|
+
}
|
|
54
|
+
BytesGenerationContext.getJsonObj = getJsonObj;
|
|
55
|
+
BytesGenerationContext.generationType = "BYTES";
|
|
56
|
+
function getDeserializedJsonObj(obj, isParentJsonObj) {
|
|
57
|
+
const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
|
|
58
|
+
? obj
|
|
59
|
+
: model.SecretGenerationContext.getDeserializedJsonObj(obj))), {});
|
|
60
|
+
return jsonObj;
|
|
61
|
+
}
|
|
62
|
+
BytesGenerationContext.getDeserializedJsonObj = getDeserializedJsonObj;
|
|
63
|
+
})(BytesGenerationContext = exports.BytesGenerationContext || (exports.BytesGenerationContext = {}));
|
|
64
|
+
//# sourceMappingURL=bytes-generation-context.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"bytes-generation-context.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/bytes-generation-context.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAiBlC,IAAiB,sBAAsB,CAmCtC;AAnCD,WAAiB,sBAAsB;IACrC,IAAY,kBAQX;IARD,WAAY,kBAAkB;QAC5B,4CAAsB,CAAA;QACtB,8CAAwB,CAAA;QACxB;;;WAGG;QACH,oDAA8B,CAAA;IAChC,CAAC,EARW,kBAAkB,GAAlB,yCAAkB,KAAlB,yCAAkB,QAQ7B;IAED,SAAgB,UAAU,CAAC,GAA2B,EAAE,eAAyB;QAC/E,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAA4B,CAAC,GAC3E,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IATe,iCAAU,aASzB,CAAA;IACY,qCAAc,GAAG,OAAO,CAAC;IACtC,SAAgB,sBAAsB,CACpC,GAA2B,EAC3B,eAAyB;QAEzB,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CAAC,GAAG,CAA4B,CAAC,GACvF,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAZe,6CAAsB,yBAYrC,CAAA;AACH,CAAC,EAnCgB,sBAAsB,GAAtB,8BAAsB,KAAtB,8BAAsB,QAmCtC"}
|
|
@@ -47,7 +47,7 @@ export interface CreateSecretDetails {
|
|
|
47
47
|
* The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
|
|
48
48
|
*
|
|
49
49
|
*/
|
|
50
|
-
"keyId"
|
|
50
|
+
"keyId": string;
|
|
51
51
|
/**
|
|
52
52
|
* Additional metadata that you can use to provide context about how to use the secret during rotation or
|
|
53
53
|
* other administrative tasks. For example, for a secret that you use to connect to a database, the additional
|
|
@@ -72,6 +72,12 @@ export interface CreateSecretDetails {
|
|
|
72
72
|
* The OCID of the vault where you want to create the secret.
|
|
73
73
|
*/
|
|
74
74
|
"vaultId": string;
|
|
75
|
+
"secretGenerationContext"?: model.PassphraseGenerationContext | model.SshKeyGenerationContext | model.BytesGenerationContext;
|
|
76
|
+
/**
|
|
77
|
+
* The value of this flag determines whether or not secret content will be generated automatically. If not set, it defaults to false.
|
|
78
|
+
*
|
|
79
|
+
*/
|
|
80
|
+
"enableAutoGeneration"?: boolean;
|
|
75
81
|
}
|
|
76
82
|
export declare namespace CreateSecretDetails {
|
|
77
83
|
function getJsonObj(obj: CreateSecretDetails): object;
|
|
@@ -47,6 +47,9 @@ var CreateSecretDetails;
|
|
|
47
47
|
? obj.secretRules.map(item => {
|
|
48
48
|
return model.SecretRule.getJsonObj(item);
|
|
49
49
|
})
|
|
50
|
+
: undefined,
|
|
51
|
+
"secretGenerationContext": obj.secretGenerationContext
|
|
52
|
+
? model.SecretGenerationContext.getJsonObj(obj.secretGenerationContext)
|
|
50
53
|
: undefined
|
|
51
54
|
});
|
|
52
55
|
return jsonObj;
|
|
@@ -64,6 +67,9 @@ var CreateSecretDetails;
|
|
|
64
67
|
? obj.secretRules.map(item => {
|
|
65
68
|
return model.SecretRule.getDeserializedJsonObj(item);
|
|
66
69
|
})
|
|
70
|
+
: undefined,
|
|
71
|
+
"secretGenerationContext": obj.secretGenerationContext
|
|
72
|
+
? model.SecretGenerationContext.getDeserializedJsonObj(obj.secretGenerationContext)
|
|
67
73
|
: undefined
|
|
68
74
|
});
|
|
69
75
|
return jsonObj;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"create-secret-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/create-secret-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;
|
|
1
|
+
{"version":3,"file":"create-secret-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/create-secret-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAmElC,IAAiB,mBAAmB,CAmDnC;AAnDD,WAAiB,mBAAmB;IAClC,SAAgB,UAAU,CAAC,GAAwB;QACjD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,eAAe,EAAE,GAAG,CAAC,aAAa;gBAChC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,UAAU,CAAC,GAAG,CAAC,aAAa,CAAC;gBAC1D,CAAC,CAAC,SAAS;YACb,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,CAAC,GAAG,CAAC,cAAc,CAAC;gBACrD,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,GAAG,CAAC,WAAW;gBAC5B,CAAC,CAAC,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACzB,OAAO,KAAK,CAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;gBAC3C,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACvE,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAxBe,8BAAU,aAwBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAwB;QAC7D,MAAM,OAAO,mCACR,GAAG,GACH;YACD,eAAe,EAAE,GAAG,CAAC,aAAa;gBAChC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,sBAAsB,CAAC,GAAG,CAAC,aAAa,CAAC;gBACtE,CAAC,CAAC,SAAS;YACb,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAC,cAAc,CAAC;gBACjE,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,GAAG,CAAC,WAAW;gBAC5B,CAAC,CAAC,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACzB,OAAO,KAAK,CAAC,UAAU,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;gBACvD,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACnF,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAxBe,0CAAsB,yBAwBrC,CAAA;AACH,CAAC,EAnDgB,mBAAmB,GAAnB,2BAAmB,KAAnB,2BAAmB,QAmDnC"}
|
package/lib/model/index.d.ts
CHANGED
|
@@ -24,6 +24,8 @@ import * as Secret from "./secret";
|
|
|
24
24
|
export import Secret = Secret.Secret;
|
|
25
25
|
import * as SecretContentDetails from "./secret-content-details";
|
|
26
26
|
export import SecretContentDetails = SecretContentDetails.SecretContentDetails;
|
|
27
|
+
import * as SecretGenerationContext from "./secret-generation-context";
|
|
28
|
+
export import SecretGenerationContext = SecretGenerationContext.SecretGenerationContext;
|
|
27
29
|
import * as SecretRule from "./secret-rule";
|
|
28
30
|
export import SecretRule = SecretRule.SecretRule;
|
|
29
31
|
import * as SecretSummary from "./secret-summary";
|
|
@@ -40,9 +42,15 @@ import * as AdbTargetSystemDetails from "./adb-target-system-details";
|
|
|
40
42
|
export import AdbTargetSystemDetails = AdbTargetSystemDetails.AdbTargetSystemDetails;
|
|
41
43
|
import * as Base64SecretContentDetails from "./base64-secret-content-details";
|
|
42
44
|
export import Base64SecretContentDetails = Base64SecretContentDetails.Base64SecretContentDetails;
|
|
45
|
+
import * as BytesGenerationContext from "./bytes-generation-context";
|
|
46
|
+
export import BytesGenerationContext = BytesGenerationContext.BytesGenerationContext;
|
|
43
47
|
import * as FunctionTargetSystemDetails from "./function-target-system-details";
|
|
44
48
|
export import FunctionTargetSystemDetails = FunctionTargetSystemDetails.FunctionTargetSystemDetails;
|
|
49
|
+
import * as PassphraseGenerationContext from "./passphrase-generation-context";
|
|
50
|
+
export import PassphraseGenerationContext = PassphraseGenerationContext.PassphraseGenerationContext;
|
|
45
51
|
import * as SecretExpiryRule from "./secret-expiry-rule";
|
|
46
52
|
export import SecretExpiryRule = SecretExpiryRule.SecretExpiryRule;
|
|
47
53
|
import * as SecretReuseRule from "./secret-reuse-rule";
|
|
48
54
|
export import SecretReuseRule = SecretReuseRule.SecretReuseRule;
|
|
55
|
+
import * as SshKeyGenerationContext from "./ssh-key-generation-context";
|
|
56
|
+
export import SshKeyGenerationContext = SshKeyGenerationContext.SshKeyGenerationContext;
|
package/lib/model/index.js
CHANGED
|
@@ -31,7 +31,7 @@ var __importStar = (this && this.__importStar) || function (mod) {
|
|
|
31
31
|
return result;
|
|
32
32
|
};
|
|
33
33
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
34
|
-
exports.SecretReuseRule = exports.SecretExpiryRule = exports.FunctionTargetSystemDetails = exports.Base64SecretContentDetails = exports.AdbTargetSystemDetails = exports.UpdateSecretDetails = exports.TargetSystemDetails = exports.SecretVersionSummary = exports.SecretVersion = exports.SecretSummary = exports.SecretRule = exports.SecretContentDetails = exports.Secret = exports.ScheduleSecretVersionDeletionDetails = exports.ScheduleSecretDeletionDetails = exports.RotationConfig = exports.CreateSecretDetails = exports.ChangeSecretCompartmentDetails = void 0;
|
|
34
|
+
exports.SshKeyGenerationContext = exports.SecretReuseRule = exports.SecretExpiryRule = exports.PassphraseGenerationContext = exports.FunctionTargetSystemDetails = exports.BytesGenerationContext = exports.Base64SecretContentDetails = exports.AdbTargetSystemDetails = exports.UpdateSecretDetails = exports.TargetSystemDetails = exports.SecretVersionSummary = exports.SecretVersion = exports.SecretSummary = exports.SecretRule = exports.SecretGenerationContext = exports.SecretContentDetails = exports.Secret = exports.ScheduleSecretVersionDeletionDetails = exports.ScheduleSecretDeletionDetails = exports.RotationConfig = exports.CreateSecretDetails = exports.ChangeSecretCompartmentDetails = void 0;
|
|
35
35
|
const ChangeSecretCompartmentDetails = __importStar(require("./change-secret-compartment-details"));
|
|
36
36
|
exports.ChangeSecretCompartmentDetails = ChangeSecretCompartmentDetails.ChangeSecretCompartmentDetails;
|
|
37
37
|
const CreateSecretDetails = __importStar(require("./create-secret-details"));
|
|
@@ -46,6 +46,8 @@ const Secret = __importStar(require("./secret"));
|
|
|
46
46
|
exports.Secret = Secret.Secret;
|
|
47
47
|
const SecretContentDetails = __importStar(require("./secret-content-details"));
|
|
48
48
|
exports.SecretContentDetails = SecretContentDetails.SecretContentDetails;
|
|
49
|
+
const SecretGenerationContext = __importStar(require("./secret-generation-context"));
|
|
50
|
+
exports.SecretGenerationContext = SecretGenerationContext.SecretGenerationContext;
|
|
49
51
|
const SecretRule = __importStar(require("./secret-rule"));
|
|
50
52
|
exports.SecretRule = SecretRule.SecretRule;
|
|
51
53
|
const SecretSummary = __importStar(require("./secret-summary"));
|
|
@@ -62,10 +64,16 @@ const AdbTargetSystemDetails = __importStar(require("./adb-target-system-details
|
|
|
62
64
|
exports.AdbTargetSystemDetails = AdbTargetSystemDetails.AdbTargetSystemDetails;
|
|
63
65
|
const Base64SecretContentDetails = __importStar(require("./base64-secret-content-details"));
|
|
64
66
|
exports.Base64SecretContentDetails = Base64SecretContentDetails.Base64SecretContentDetails;
|
|
67
|
+
const BytesGenerationContext = __importStar(require("./bytes-generation-context"));
|
|
68
|
+
exports.BytesGenerationContext = BytesGenerationContext.BytesGenerationContext;
|
|
65
69
|
const FunctionTargetSystemDetails = __importStar(require("./function-target-system-details"));
|
|
66
70
|
exports.FunctionTargetSystemDetails = FunctionTargetSystemDetails.FunctionTargetSystemDetails;
|
|
71
|
+
const PassphraseGenerationContext = __importStar(require("./passphrase-generation-context"));
|
|
72
|
+
exports.PassphraseGenerationContext = PassphraseGenerationContext.PassphraseGenerationContext;
|
|
67
73
|
const SecretExpiryRule = __importStar(require("./secret-expiry-rule"));
|
|
68
74
|
exports.SecretExpiryRule = SecretExpiryRule.SecretExpiryRule;
|
|
69
75
|
const SecretReuseRule = __importStar(require("./secret-reuse-rule"));
|
|
70
76
|
exports.SecretReuseRule = SecretReuseRule.SecretReuseRule;
|
|
77
|
+
const SshKeyGenerationContext = __importStar(require("./ssh-key-generation-context"));
|
|
78
|
+
exports.SshKeyGenerationContext = SshKeyGenerationContext.SshKeyGenerationContext;
|
|
71
79
|
//# sourceMappingURL=index.js.map
|
package/lib/model/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/index.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,oGAAsF;AACxE,QAAA,8BAA8B,GAAG,8BAA8B,CAAC,8BAA8B,CAAC;AAC7G,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,kEAAoD;AACtC,QAAA,cAAc,GAAG,cAAc,CAAC,cAAc,CAAC;AAC7D,kGAAoF;AACtE,QAAA,6BAA6B,GAAG,6BAA6B,CAAC,6BAA6B,CAAC;AAC1G,iHAAmG;AACrF,QAAA,oCAAoC,GAAG,oCAAoC,CAAC,oCAAoC,CAAC;AAC/H,iDAAmC;AACrB,QAAA,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC;AACrC,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,0DAA4C;AAC9B,QAAA,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;AACjD,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAE5E,oFAAsE;AACxD,QAAA,sBAAsB,GAAG,sBAAsB,CAAC,sBAAsB,CAAC;AACrF,4FAA8E;AAChE,QAAA,0BAA0B,GAAG,0BAA0B,CAAC,0BAA0B,CAAC;AACjG,8FAAgF;AAClE,QAAA,2BAA2B,GAAG,2BAA2B,CAAC,2BAA2B,CAAC;AACpG,uEAAyD;AAC3C,QAAA,gBAAgB,GAAG,gBAAgB,CAAC,gBAAgB,CAAC;AACnE,qEAAuD;AACzC,QAAA,eAAe,GAAG,eAAe,CAAC,eAAe,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/index.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,oGAAsF;AACxE,QAAA,8BAA8B,GAAG,8BAA8B,CAAC,8BAA8B,CAAC;AAC7G,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,kEAAoD;AACtC,QAAA,cAAc,GAAG,cAAc,CAAC,cAAc,CAAC;AAC7D,kGAAoF;AACtE,QAAA,6BAA6B,GAAG,6BAA6B,CAAC,6BAA6B,CAAC;AAC1G,iHAAmG;AACrF,QAAA,oCAAoC,GAAG,oCAAoC,CAAC,oCAAoC,CAAC;AAC/H,iDAAmC;AACrB,QAAA,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC;AACrC,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,qFAAuE;AACzD,QAAA,uBAAuB,GAAG,uBAAuB,CAAC,uBAAuB,CAAC;AACxF,0DAA4C;AAC9B,QAAA,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;AACjD,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAE5E,oFAAsE;AACxD,QAAA,sBAAsB,GAAG,sBAAsB,CAAC,sBAAsB,CAAC;AACrF,4FAA8E;AAChE,QAAA,0BAA0B,GAAG,0BAA0B,CAAC,0BAA0B,CAAC;AACjG,mFAAqE;AACvD,QAAA,sBAAsB,GAAG,sBAAsB,CAAC,sBAAsB,CAAC;AACrF,8FAAgF;AAClE,QAAA,2BAA2B,GAAG,2BAA2B,CAAC,2BAA2B,CAAC;AACpG,6FAA+E;AACjE,QAAA,2BAA2B,GAAG,2BAA2B,CAAC,2BAA2B,CAAC;AACpG,uEAAyD;AAC3C,QAAA,gBAAgB,GAAG,gBAAgB,CAAC,gBAAgB,CAAC;AACnE,qEAAuD;AACzC,QAAA,eAAe,GAAG,eAAe,CAAC,eAAe,CAAC;AAChE,sFAAwE;AAC1D,QAAA,uBAAuB,GAAG,uBAAuB,CAAC,uBAAuB,CAAC"}
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vault Secret Management API
|
|
3
|
+
* Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
|
|
4
|
+
* OpenAPI spec version: 20180608
|
|
5
|
+
*
|
|
6
|
+
*
|
|
7
|
+
* NOTE: This class is auto generated by OracleSDKGenerator.
|
|
8
|
+
* Do not edit the class manually.
|
|
9
|
+
*
|
|
10
|
+
* Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
|
|
11
|
+
* This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
|
12
|
+
*/
|
|
13
|
+
import * as model from "../model";
|
|
14
|
+
/**
|
|
15
|
+
* Generates Passphrase type secrets. By default, passphrase type secrets have no structure. The generated content is stored in Base64 format.
|
|
16
|
+
* The SecretTemplate must have the %GENERATED_PASSPHRASE% keyword, which is later replaced with the generated content, if provided.
|
|
17
|
+
*
|
|
18
|
+
*/
|
|
19
|
+
export interface PassphraseGenerationContext extends model.SecretGenerationContext {
|
|
20
|
+
/**
|
|
21
|
+
* Name of passphrase generation template to generate passphrase type secret.
|
|
22
|
+
*/
|
|
23
|
+
"generationTemplate": PassphraseGenerationContext.GenerationTemplate;
|
|
24
|
+
/**
|
|
25
|
+
* Length of the passphrase to be generated Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
|
|
26
|
+
*/
|
|
27
|
+
"passphraseLength"?: number;
|
|
28
|
+
"generationType": string;
|
|
29
|
+
}
|
|
30
|
+
export declare namespace PassphraseGenerationContext {
|
|
31
|
+
enum GenerationTemplate {
|
|
32
|
+
SecretsDefaultPassword = "SECRETS_DEFAULT_PASSWORD",
|
|
33
|
+
DbaasDefaultPassword = "DBAAS_DEFAULT_PASSWORD",
|
|
34
|
+
/**
|
|
35
|
+
* This value is used if a service returns a value for this enum that is not recognized by this
|
|
36
|
+
* version of the SDK.
|
|
37
|
+
*/
|
|
38
|
+
UnknownValue = "UNKNOWN_VALUE"
|
|
39
|
+
}
|
|
40
|
+
function getJsonObj(obj: PassphraseGenerationContext, isParentJsonObj?: boolean): object;
|
|
41
|
+
const generationType = "PASSPHRASE";
|
|
42
|
+
function getDeserializedJsonObj(obj: PassphraseGenerationContext, isParentJsonObj?: boolean): object;
|
|
43
|
+
}
|
|
@@ -0,0 +1,64 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vault Secret Management API
|
|
4
|
+
* Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
|
|
5
|
+
* OpenAPI spec version: 20180608
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OracleSDKGenerator.
|
|
9
|
+
* Do not edit the class manually.
|
|
10
|
+
*
|
|
11
|
+
* Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
|
|
12
|
+
* This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
|
13
|
+
*/
|
|
14
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
15
|
+
if (k2 === undefined) k2 = k;
|
|
16
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
17
|
+
}) : (function(o, m, k, k2) {
|
|
18
|
+
if (k2 === undefined) k2 = k;
|
|
19
|
+
o[k2] = m[k];
|
|
20
|
+
}));
|
|
21
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
22
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
23
|
+
}) : function(o, v) {
|
|
24
|
+
o["default"] = v;
|
|
25
|
+
});
|
|
26
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
27
|
+
if (mod && mod.__esModule) return mod;
|
|
28
|
+
var result = {};
|
|
29
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
30
|
+
__setModuleDefault(result, mod);
|
|
31
|
+
return result;
|
|
32
|
+
};
|
|
33
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
34
|
+
exports.PassphraseGenerationContext = void 0;
|
|
35
|
+
const model = __importStar(require("../model"));
|
|
36
|
+
var PassphraseGenerationContext;
|
|
37
|
+
(function (PassphraseGenerationContext) {
|
|
38
|
+
let GenerationTemplate;
|
|
39
|
+
(function (GenerationTemplate) {
|
|
40
|
+
GenerationTemplate["SecretsDefaultPassword"] = "SECRETS_DEFAULT_PASSWORD";
|
|
41
|
+
GenerationTemplate["DbaasDefaultPassword"] = "DBAAS_DEFAULT_PASSWORD";
|
|
42
|
+
/**
|
|
43
|
+
* This value is used if a service returns a value for this enum that is not recognized by this
|
|
44
|
+
* version of the SDK.
|
|
45
|
+
*/
|
|
46
|
+
GenerationTemplate["UnknownValue"] = "UNKNOWN_VALUE";
|
|
47
|
+
})(GenerationTemplate = PassphraseGenerationContext.GenerationTemplate || (PassphraseGenerationContext.GenerationTemplate = {}));
|
|
48
|
+
function getJsonObj(obj, isParentJsonObj) {
|
|
49
|
+
const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
|
|
50
|
+
? obj
|
|
51
|
+
: model.SecretGenerationContext.getJsonObj(obj))), {});
|
|
52
|
+
return jsonObj;
|
|
53
|
+
}
|
|
54
|
+
PassphraseGenerationContext.getJsonObj = getJsonObj;
|
|
55
|
+
PassphraseGenerationContext.generationType = "PASSPHRASE";
|
|
56
|
+
function getDeserializedJsonObj(obj, isParentJsonObj) {
|
|
57
|
+
const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
|
|
58
|
+
? obj
|
|
59
|
+
: model.SecretGenerationContext.getDeserializedJsonObj(obj))), {});
|
|
60
|
+
return jsonObj;
|
|
61
|
+
}
|
|
62
|
+
PassphraseGenerationContext.getDeserializedJsonObj = getDeserializedJsonObj;
|
|
63
|
+
})(PassphraseGenerationContext = exports.PassphraseGenerationContext || (exports.PassphraseGenerationContext = {}));
|
|
64
|
+
//# sourceMappingURL=passphrase-generation-context.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"passphrase-generation-context.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/passphrase-generation-context.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAqBlC,IAAiB,2BAA2B,CAqC3C;AArCD,WAAiB,2BAA2B;IAC1C,IAAY,kBAQX;IARD,WAAY,kBAAkB;QAC5B,yEAAmD,CAAA;QACnD,qEAA+C,CAAA;QAC/C;;;WAGG;QACH,oDAA8B,CAAA;IAChC,CAAC,EARW,kBAAkB,GAAlB,8CAAkB,KAAlB,8CAAkB,QAQ7B;IAED,SAAgB,UAAU,CAAC,GAAgC,EAAE,eAAyB;QACpF,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAAiC,CAAC,GAChF,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IATe,sCAAU,aASzB,CAAA;IACY,0CAAc,GAAG,YAAY,CAAC;IAC3C,SAAgB,sBAAsB,CACpC,GAAgC,EAChC,eAAyB;QAEzB,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CACnD,GAAG,CAC4B,CAAC,GACnC,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAde,kDAAsB,yBAcrC,CAAA;AACH,CAAC,EArCgB,2BAA2B,GAA3B,mCAA2B,KAA3B,mCAA2B,QAqC3C"}
|
|
@@ -48,7 +48,8 @@ var SecretContentDetails;
|
|
|
48
48
|
case "BASE64":
|
|
49
49
|
return model.Base64SecretContentDetails.getJsonObj(jsonObj, true);
|
|
50
50
|
default:
|
|
51
|
-
common.logger
|
|
51
|
+
if (common.LOG.logger)
|
|
52
|
+
common.LOG.logger.info(`Unknown value for: ${obj.contentType}`);
|
|
52
53
|
}
|
|
53
54
|
}
|
|
54
55
|
return jsonObj;
|
|
@@ -61,7 +62,8 @@ var SecretContentDetails;
|
|
|
61
62
|
case "BASE64":
|
|
62
63
|
return model.Base64SecretContentDetails.getDeserializedJsonObj(jsonObj, true);
|
|
63
64
|
default:
|
|
64
|
-
common.logger
|
|
65
|
+
if (common.LOG.logger)
|
|
66
|
+
common.LOG.logger.info(`Unknown value for: ${obj.contentType}`);
|
|
65
67
|
}
|
|
66
68
|
}
|
|
67
69
|
return jsonObj;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret-content-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-content-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAuBtC,IAAiB,oBAAoB,CAsCpC;AAtCD,WAAiB,oBAAoB;IACnC,IAAY,KAGX;IAHD,WAAY,KAAK;QACf,4BAAmB,CAAA;QACnB,4BAAmB,CAAA;IACrB,CAAC,EAHW,KAAK,GAAL,0BAAK,KAAL,0BAAK,QAGhB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,UAAU,CACL,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"secret-content-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-content-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAuBtC,IAAiB,oBAAoB,CAsCpC;AAtCD,WAAiB,oBAAoB;IACnC,IAAY,KAGX;IAHD,WAAY,KAAK;QACf,4BAAmB,CAAA;QACnB,4BAAmB,CAAA;IACrB,CAAC,EAHW,KAAK,GAAL,0BAAK,KAAL,0BAAK,QAGhB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,UAAU,CACL,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;aAC1F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,+BAAU,aAezB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,sBAAsB,CACjB,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;aAC1F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,2CAAsB,yBAerC,CAAA;AACH,CAAC,EAtCgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QAsCpC"}
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Vault Secret Management API
|
|
3
|
+
* Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
|
|
4
|
+
* OpenAPI spec version: 20180608
|
|
5
|
+
*
|
|
6
|
+
*
|
|
7
|
+
* NOTE: This class is auto generated by OracleSDKGenerator.
|
|
8
|
+
* Do not edit the class manually.
|
|
9
|
+
*
|
|
10
|
+
* Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
|
|
11
|
+
* This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
|
12
|
+
*/
|
|
13
|
+
/**
|
|
14
|
+
* Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
|
|
15
|
+
*/
|
|
16
|
+
export interface SecretGenerationContext {
|
|
17
|
+
/**
|
|
18
|
+
* SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type.
|
|
19
|
+
* The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets.
|
|
20
|
+
* These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
|
|
21
|
+
*
|
|
22
|
+
*/
|
|
23
|
+
"secretTemplate"?: string;
|
|
24
|
+
"generationType": string;
|
|
25
|
+
}
|
|
26
|
+
export declare namespace SecretGenerationContext {
|
|
27
|
+
function getJsonObj(obj: SecretGenerationContext): object;
|
|
28
|
+
function getDeserializedJsonObj(obj: SecretGenerationContext): object;
|
|
29
|
+
}
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Vault Secret Management API
|
|
4
|
+
* Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
|
|
5
|
+
* OpenAPI spec version: 20180608
|
|
6
|
+
*
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OracleSDKGenerator.
|
|
9
|
+
* Do not edit the class manually.
|
|
10
|
+
*
|
|
11
|
+
* Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
|
|
12
|
+
* This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
|
|
13
|
+
*/
|
|
14
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
15
|
+
if (k2 === undefined) k2 = k;
|
|
16
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
17
|
+
}) : (function(o, m, k, k2) {
|
|
18
|
+
if (k2 === undefined) k2 = k;
|
|
19
|
+
o[k2] = m[k];
|
|
20
|
+
}));
|
|
21
|
+
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
22
|
+
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
23
|
+
}) : function(o, v) {
|
|
24
|
+
o["default"] = v;
|
|
25
|
+
});
|
|
26
|
+
var __importStar = (this && this.__importStar) || function (mod) {
|
|
27
|
+
if (mod && mod.__esModule) return mod;
|
|
28
|
+
var result = {};
|
|
29
|
+
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
|
|
30
|
+
__setModuleDefault(result, mod);
|
|
31
|
+
return result;
|
|
32
|
+
};
|
|
33
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
34
|
+
exports.SecretGenerationContext = void 0;
|
|
35
|
+
const model = __importStar(require("../model"));
|
|
36
|
+
const common = require("oci-common");
|
|
37
|
+
var SecretGenerationContext;
|
|
38
|
+
(function (SecretGenerationContext) {
|
|
39
|
+
function getJsonObj(obj) {
|
|
40
|
+
const jsonObj = Object.assign(Object.assign({}, obj), {});
|
|
41
|
+
if (obj && "generationType" in obj && obj.generationType) {
|
|
42
|
+
switch (obj.generationType) {
|
|
43
|
+
case "PASSPHRASE":
|
|
44
|
+
return model.PassphraseGenerationContext.getJsonObj(jsonObj, true);
|
|
45
|
+
case "SSH_KEY":
|
|
46
|
+
return model.SshKeyGenerationContext.getJsonObj(jsonObj, true);
|
|
47
|
+
case "BYTES":
|
|
48
|
+
return model.BytesGenerationContext.getJsonObj(jsonObj, true);
|
|
49
|
+
default:
|
|
50
|
+
if (common.LOG.logger)
|
|
51
|
+
common.LOG.logger.info(`Unknown value for: ${obj.generationType}`);
|
|
52
|
+
}
|
|
53
|
+
}
|
|
54
|
+
return jsonObj;
|
|
55
|
+
}
|
|
56
|
+
SecretGenerationContext.getJsonObj = getJsonObj;
|
|
57
|
+
function getDeserializedJsonObj(obj) {
|
|
58
|
+
const jsonObj = Object.assign(Object.assign({}, obj), {});
|
|
59
|
+
if (obj && "generationType" in obj && obj.generationType) {
|
|
60
|
+
switch (obj.generationType) {
|
|
61
|
+
case "PASSPHRASE":
|
|
62
|
+
return model.PassphraseGenerationContext.getDeserializedJsonObj(jsonObj, true);
|
|
63
|
+
case "SSH_KEY":
|
|
64
|
+
return model.SshKeyGenerationContext.getDeserializedJsonObj(jsonObj, true);
|
|
65
|
+
case "BYTES":
|
|
66
|
+
return model.BytesGenerationContext.getDeserializedJsonObj(jsonObj, true);
|
|
67
|
+
default:
|
|
68
|
+
if (common.LOG.logger)
|
|
69
|
+
common.LOG.logger.info(`Unknown value for: ${obj.generationType}`);
|
|
70
|
+
}
|
|
71
|
+
}
|
|
72
|
+
return jsonObj;
|
|
73
|
+
}
|
|
74
|
+
SecretGenerationContext.getDeserializedJsonObj = getDeserializedJsonObj;
|
|
75
|
+
})(SecretGenerationContext = exports.SecretGenerationContext || (exports.SecretGenerationContext = {}));
|
|
76
|
+
//# sourceMappingURL=secret-generation-context.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"secret-generation-context.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-generation-context.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAiBtC,IAAiB,uBAAuB,CAqDvC;AArDD,WAAiB,uBAAuB;IACtC,SAAgB,UAAU,CAAC,GAA4B;QACrD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,gBAAgB,IAAI,GAAG,IAAI,GAAG,CAAC,cAAc,EAAE;YACxD,QAAQ,GAAG,CAAC,cAAc,EAAE;gBAC1B,KAAK,YAAY;oBACf,OAAO,KAAK,CAAC,2BAA2B,CAAC,UAAU,CACL,OAAQ,EACpD,IAAI,CACL,CAAC;gBACJ,KAAK,SAAS;oBACZ,OAAO,KAAK,CAAC,uBAAuB,CAAC,UAAU,CACL,OAAQ,EAChD,IAAI,CACL,CAAC;gBACJ,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,sBAAsB,CAAC,UAAU,CACL,OAAQ,EAC/C,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,cAAc,EAAE,CAAC,CAAC;aAC7F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAzBe,kCAAU,aAyBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAA4B;QACjE,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,gBAAgB,IAAI,GAAG,IAAI,GAAG,CAAC,cAAc,EAAE;YACxD,QAAQ,GAAG,CAAC,cAAc,EAAE;gBAC1B,KAAK,YAAY;oBACf,OAAO,KAAK,CAAC,2BAA2B,CAAC,sBAAsB,CACjB,OAAQ,EACpD,IAAI,CACL,CAAC;gBACJ,KAAK,SAAS;oBACZ,OAAO,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CACjB,OAAQ,EAChD,IAAI,CACL,CAAC;gBACJ,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,sBAAsB,CAAC,sBAAsB,CACjB,OAAQ,EAC/C,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,cAAc,EAAE,CAAC,CAAC;aAC7F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAzBe,8CAAsB,yBAyBrC,CAAA;AACH,CAAC,EArDgB,uBAAuB,GAAvB,+BAAuB,KAAvB,+BAAuB,QAqDvC"}
|
package/lib/model/secret-rule.js
CHANGED
|
@@ -45,7 +45,8 @@ var SecretRule;
|
|
|
45
45
|
case "SECRET_REUSE_RULE":
|
|
46
46
|
return model.SecretReuseRule.getJsonObj(jsonObj, true);
|
|
47
47
|
default:
|
|
48
|
-
common.logger
|
|
48
|
+
if (common.LOG.logger)
|
|
49
|
+
common.LOG.logger.info(`Unknown value for: ${obj.ruleType}`);
|
|
49
50
|
}
|
|
50
51
|
}
|
|
51
52
|
return jsonObj;
|
|
@@ -60,7 +61,8 @@ var SecretRule;
|
|
|
60
61
|
case "SECRET_REUSE_RULE":
|
|
61
62
|
return model.SecretReuseRule.getDeserializedJsonObj(jsonObj, true);
|
|
62
63
|
default:
|
|
63
|
-
common.logger
|
|
64
|
+
if (common.LOG.logger)
|
|
65
|
+
common.LOG.logger.info(`Unknown value for: ${obj.ruleType}`);
|
|
64
66
|
}
|
|
65
67
|
}
|
|
66
68
|
return jsonObj;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret-rule.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-rule.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAStC,IAAiB,UAAU,CAqC1B;AArCD,WAAiB,UAAU;IACzB,SAAgB,UAAU,CAAC,GAAe;QACxC,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,UAAU,CAAkC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC5F,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,UAAU,CAAiC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC1F;oBACE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"secret-rule.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-rule.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAStC,IAAiB,UAAU,CAqC1B;AArCD,WAAiB,UAAU;IACzB,SAAgB,UAAU,CAAC,GAAe;QACxC,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,UAAU,CAAkC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC5F,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,UAAU,CAAiC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC1F;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAde,qBAAU,aAczB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAe;QACpD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,sBAAsB,CACjB,OAAQ,EACzC,IAAI,CACL,CAAC;gBACJ,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,sBAAsB,CACjB,OAAQ,EACxC,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,iCAAsB,yBAoBrC,CAAA;AACH,CAAC,EArCgB,UAAU,GAAV,kBAAU,KAAV,kBAAU,QAqC1B"}
|
|
@@ -114,6 +114,12 @@ export interface SecretSummary {
|
|
|
114
114
|
* The OCID of the Vault in which the secret exists
|
|
115
115
|
*/
|
|
116
116
|
"vaultId": string;
|
|
117
|
+
"secretGenerationContext"?: model.PassphraseGenerationContext | model.SshKeyGenerationContext | model.BytesGenerationContext;
|
|
118
|
+
/**
|
|
119
|
+
* The value of this flag determines whether or not secret content will be generated automatically.
|
|
120
|
+
*
|
|
121
|
+
*/
|
|
122
|
+
"isAutoGenerationEnabled"?: boolean;
|
|
117
123
|
}
|
|
118
124
|
export declare namespace SecretSummary {
|
|
119
125
|
enum LifecycleState {
|
|
@@ -56,6 +56,9 @@ var SecretSummary;
|
|
|
56
56
|
const jsonObj = Object.assign(Object.assign({}, obj), {
|
|
57
57
|
"rotationConfig": obj.rotationConfig
|
|
58
58
|
? model.RotationConfig.getJsonObj(obj.rotationConfig)
|
|
59
|
+
: undefined,
|
|
60
|
+
"secretGenerationContext": obj.secretGenerationContext
|
|
61
|
+
? model.SecretGenerationContext.getJsonObj(obj.secretGenerationContext)
|
|
59
62
|
: undefined
|
|
60
63
|
});
|
|
61
64
|
return jsonObj;
|
|
@@ -65,6 +68,9 @@ var SecretSummary;
|
|
|
65
68
|
const jsonObj = Object.assign(Object.assign({}, obj), {
|
|
66
69
|
"rotationConfig": obj.rotationConfig
|
|
67
70
|
? model.RotationConfig.getDeserializedJsonObj(obj.rotationConfig)
|
|
71
|
+
: undefined,
|
|
72
|
+
"secretGenerationContext": obj.secretGenerationContext
|
|
73
|
+
? model.SecretGenerationContext.getDeserializedJsonObj(obj.secretGenerationContext)
|
|
68
74
|
: undefined
|
|
69
75
|
});
|
|
70
76
|
return jsonObj;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;
|
|
1
|
+
{"version":3,"file":"secret-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AA2GlC,IAAiB,aAAa,CAkD7B;AAlDD,WAAiB,aAAa;IAC5B,IAAY,cAeX;IAfD,WAAY,cAAc;QACxB,uCAAqB,CAAA;QACrB,mCAAiB,CAAA;QACjB,uCAAqB,CAAA;QACrB,uCAAqB,CAAA;QACrB,qCAAmB,CAAA;QACnB,4DAA0C,CAAA;QAC1C,sDAAoC,CAAA;QACpC,4DAA0C,CAAA;QAC1C,mCAAiB,CAAA;QACjB;;;WAGG;QACH,gDAA8B,CAAA;IAChC,CAAC,EAfW,cAAc,GAAd,4BAAc,KAAd,4BAAc,QAezB;IAED,SAAgB,UAAU,CAAC,GAAkB;QAC3C,MAAM,OAAO,mCACR,GAAG,GACH;YACD,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,CAAC,GAAG,CAAC,cAAc,CAAC;gBACrD,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACvE,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,wBAAU,aAezB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAkB;QACvD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAC,cAAc,CAAC;gBACjE,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACnF,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,oCAAsB,yBAerC,CAAA;AACH,CAAC,EAlDgB,aAAa,GAAb,qBAAa,KAAb,qBAAa,QAkD7B"}
|
|
@@ -70,6 +70,11 @@ export interface SecretVersionSummary {
|
|
|
70
70
|
[key: string]: any;
|
|
71
71
|
};
|
|
72
72
|
};
|
|
73
|
+
/**
|
|
74
|
+
* Boolean flag indicating whether secret content for this secret version was auto-generated or not.
|
|
75
|
+
*
|
|
76
|
+
*/
|
|
77
|
+
"isContentAutoGenerated"?: boolean;
|
|
73
78
|
}
|
|
74
79
|
export declare namespace SecretVersionSummary {
|
|
75
80
|
enum ContentType {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret-version-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;
|
|
1
|
+
{"version":3,"file":"secret-version-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AAoEH,IAAiB,oBAAoB,CAiCpC;AAjCD,WAAiB,oBAAoB;IACnC,IAAY,WAOX;IAPD,WAAY,WAAW;QACrB,gCAAiB,CAAA;QACjB;;;WAGG;QACH,6CAA8B,CAAA;IAChC,CAAC,EAPW,WAAW,GAAX,gCAAW,KAAX,gCAAW,QAOtB;IAED,IAAY,MAWX;IAXD,WAAY,MAAM;QAChB,6BAAmB,CAAA;QACnB,6BAAmB,CAAA;QACnB,2BAAiB,CAAA;QACjB,+BAAqB,CAAA;QACrB,mCAAyB,CAAA;QACzB;;;WAGG;QACH,wCAA8B,CAAA;IAChC,CAAC,EAXW,MAAM,GAAN,2BAAM,KAAN,2BAAM,QAWjB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,+BAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,2CAAsB,yBAIrC,CAAA;AACH,CAAC,EAjCgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QAiCpC"}
|
|
@@ -59,6 +59,11 @@ export interface SecretVersion {
|
|
|
59
59
|
* The version number of the secret. Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
|
|
60
60
|
*/
|
|
61
61
|
"versionNumber"?: number;
|
|
62
|
+
/**
|
|
63
|
+
* Boolean flag indicating whether secret content for this secret version was auto-generated or not.
|
|
64
|
+
*
|
|
65
|
+
*/
|
|
66
|
+
"isContentAutoGenerated"?: boolean;
|
|
62
67
|
}
|
|
63
68
|
export declare namespace SecretVersion {
|
|
64
69
|
enum ContentType {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret-version.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;
|
|
1
|
+
{"version":3,"file":"secret-version.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AA6DH,IAAiB,aAAa,CAiC7B;AAjCD,WAAiB,aAAa;IAC5B,IAAY,WAOX;IAPD,WAAY,WAAW;QACrB,gCAAiB,CAAA;QACjB;;;WAGG;QACH,6CAA8B,CAAA;IAChC,CAAC,EAPW,WAAW,GAAX,yBAAW,KAAX,yBAAW,QAOtB;IAED,IAAY,MAWX;IAXD,WAAY,MAAM;QAChB,6BAAmB,CAAA;QACnB,6BAAmB,CAAA;QACnB,2BAAiB,CAAA;QACjB,+BAAqB,CAAA;QACrB,mCAAyB,CAAA;QACzB;;;WAGG;QACH,wCAA8B,CAAA;IAChC,CAAC,EAXW,MAAM,GAAN,oBAAM,KAAN,oBAAM,QAWjB;IAED,SAAgB,UAAU,CAAC,GAAkB;QAC3C,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,wBAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAkB;QACvD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,oCAAsB,yBAIrC,CAAA;AACH,CAAC,EAjCgB,aAAa,GAAb,qBAAa,KAAb,qBAAa,QAiC7B"}
|
package/lib/model/secret.d.ts
CHANGED
|
@@ -120,6 +120,12 @@ export interface Secret {
|
|
|
120
120
|
* The OCID of the vault where the secret exists.
|
|
121
121
|
*/
|
|
122
122
|
"vaultId": string;
|
|
123
|
+
"secretGenerationContext"?: model.PassphraseGenerationContext | model.SshKeyGenerationContext | model.BytesGenerationContext;
|
|
124
|
+
/**
|
|
125
|
+
* The value of this flag determines whether or not secret content will be generated automatically.
|
|
126
|
+
*
|
|
127
|
+
*/
|
|
128
|
+
"isAutoGenerationEnabled"?: boolean;
|
|
123
129
|
}
|
|
124
130
|
export declare namespace Secret {
|
|
125
131
|
enum LifecycleState {
|