oci-vault 2.79.1 → 2.81.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/lib/client.d.ts +15 -14
  2. package/lib/client.js +73 -29
  3. package/lib/client.js.map +1 -1
  4. package/lib/model/bytes-generation-context.d.ts +39 -0
  5. package/lib/model/bytes-generation-context.js +64 -0
  6. package/lib/model/bytes-generation-context.js.map +1 -0
  7. package/lib/model/create-secret-details.d.ts +7 -1
  8. package/lib/model/create-secret-details.js +6 -0
  9. package/lib/model/create-secret-details.js.map +1 -1
  10. package/lib/model/index.d.ts +8 -0
  11. package/lib/model/index.js +9 -1
  12. package/lib/model/index.js.map +1 -1
  13. package/lib/model/passphrase-generation-context.d.ts +43 -0
  14. package/lib/model/passphrase-generation-context.js +64 -0
  15. package/lib/model/passphrase-generation-context.js.map +1 -0
  16. package/lib/model/secret-content-details.js +4 -2
  17. package/lib/model/secret-content-details.js.map +1 -1
  18. package/lib/model/secret-generation-context.d.ts +29 -0
  19. package/lib/model/secret-generation-context.js +76 -0
  20. package/lib/model/secret-generation-context.js.map +1 -0
  21. package/lib/model/secret-rule.js +4 -2
  22. package/lib/model/secret-rule.js.map +1 -1
  23. package/lib/model/secret-summary.d.ts +6 -0
  24. package/lib/model/secret-summary.js +6 -0
  25. package/lib/model/secret-summary.js.map +1 -1
  26. package/lib/model/secret-version-summary.d.ts +5 -0
  27. package/lib/model/secret-version-summary.js.map +1 -1
  28. package/lib/model/secret-version.d.ts +5 -0
  29. package/lib/model/secret-version.js.map +1 -1
  30. package/lib/model/secret.d.ts +6 -0
  31. package/lib/model/secret.js +6 -0
  32. package/lib/model/secret.js.map +1 -1
  33. package/lib/model/ssh-key-generation-context.d.ts +40 -0
  34. package/lib/model/ssh-key-generation-context.js +65 -0
  35. package/lib/model/ssh-key-generation-context.js.map +1 -0
  36. package/lib/model/target-system-details.js +4 -2
  37. package/lib/model/target-system-details.js.map +1 -1
  38. package/lib/model/update-secret-details.d.ts +6 -0
  39. package/lib/model/update-secret-details.js +6 -0
  40. package/lib/model/update-secret-details.js.map +1 -1
  41. package/lib/request/cancel-secret-deletion-request.d.ts +1 -1
  42. package/lib/request/cancel-secret-rotation-request.d.ts +1 -1
  43. package/lib/request/cancel-secret-version-deletion-request.d.ts +1 -1
  44. package/lib/request/change-secret-compartment-request.d.ts +1 -1
  45. package/lib/request/create-secret-request.d.ts +1 -1
  46. package/lib/request/get-secret-request.d.ts +1 -1
  47. package/lib/request/get-secret-version-request.d.ts +1 -1
  48. package/lib/request/list-secret-versions-request.d.ts +1 -1
  49. package/lib/request/list-secrets-request.d.ts +1 -1
  50. package/lib/request/rotate-secret-request.d.ts +1 -1
  51. package/lib/request/schedule-secret-deletion-request.d.ts +1 -1
  52. package/lib/request/schedule-secret-version-deletion-request.d.ts +1 -1
  53. package/lib/request/update-secret-request.d.ts +1 -1
  54. package/package.json +3 -3
@@ -0,0 +1,39 @@
1
+ /**
2
+ * Vault Secret Management API
3
+ * Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
4
+ * OpenAPI spec version: 20180608
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ import * as model from "../model";
14
+ /**
15
+ * Generates random bytes. By default, secrets of type Bytes has no structure. The generated bytes are stored as a Base64 encoded string.
16
+ * The SecretTemplate must have the %GENERATED_BYTES% keyword which is replaced with the generated bytes, if provided
17
+ *
18
+ */
19
+ export interface BytesGenerationContext extends model.SecretGenerationContext {
20
+ /**
21
+ * Name of random bytes generation template for generating random byte type secret.
22
+ */
23
+ "generationTemplate": BytesGenerationContext.GenerationTemplate;
24
+ "generationType": string;
25
+ }
26
+ export declare namespace BytesGenerationContext {
27
+ enum GenerationTemplate {
28
+ Bytes512 = "BYTES_512",
29
+ Bytes1024 = "BYTES_1024",
30
+ /**
31
+ * This value is used if a service returns a value for this enum that is not recognized by this
32
+ * version of the SDK.
33
+ */
34
+ UnknownValue = "UNKNOWN_VALUE"
35
+ }
36
+ function getJsonObj(obj: BytesGenerationContext, isParentJsonObj?: boolean): object;
37
+ const generationType = "BYTES";
38
+ function getDeserializedJsonObj(obj: BytesGenerationContext, isParentJsonObj?: boolean): object;
39
+ }
@@ -0,0 +1,64 @@
1
+ "use strict";
2
+ /**
3
+ * Vault Secret Management API
4
+ * Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
5
+ * OpenAPI spec version: 20180608
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.BytesGenerationContext = void 0;
35
+ const model = __importStar(require("../model"));
36
+ var BytesGenerationContext;
37
+ (function (BytesGenerationContext) {
38
+ let GenerationTemplate;
39
+ (function (GenerationTemplate) {
40
+ GenerationTemplate["Bytes512"] = "BYTES_512";
41
+ GenerationTemplate["Bytes1024"] = "BYTES_1024";
42
+ /**
43
+ * This value is used if a service returns a value for this enum that is not recognized by this
44
+ * version of the SDK.
45
+ */
46
+ GenerationTemplate["UnknownValue"] = "UNKNOWN_VALUE";
47
+ })(GenerationTemplate = BytesGenerationContext.GenerationTemplate || (BytesGenerationContext.GenerationTemplate = {}));
48
+ function getJsonObj(obj, isParentJsonObj) {
49
+ const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
50
+ ? obj
51
+ : model.SecretGenerationContext.getJsonObj(obj))), {});
52
+ return jsonObj;
53
+ }
54
+ BytesGenerationContext.getJsonObj = getJsonObj;
55
+ BytesGenerationContext.generationType = "BYTES";
56
+ function getDeserializedJsonObj(obj, isParentJsonObj) {
57
+ const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
58
+ ? obj
59
+ : model.SecretGenerationContext.getDeserializedJsonObj(obj))), {});
60
+ return jsonObj;
61
+ }
62
+ BytesGenerationContext.getDeserializedJsonObj = getDeserializedJsonObj;
63
+ })(BytesGenerationContext = exports.BytesGenerationContext || (exports.BytesGenerationContext = {}));
64
+ //# sourceMappingURL=bytes-generation-context.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"bytes-generation-context.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/bytes-generation-context.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAiBlC,IAAiB,sBAAsB,CAmCtC;AAnCD,WAAiB,sBAAsB;IACrC,IAAY,kBAQX;IARD,WAAY,kBAAkB;QAC5B,4CAAsB,CAAA;QACtB,8CAAwB,CAAA;QACxB;;;WAGG;QACH,oDAA8B,CAAA;IAChC,CAAC,EARW,kBAAkB,GAAlB,yCAAkB,KAAlB,yCAAkB,QAQ7B;IAED,SAAgB,UAAU,CAAC,GAA2B,EAAE,eAAyB;QAC/E,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAA4B,CAAC,GAC3E,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IATe,iCAAU,aASzB,CAAA;IACY,qCAAc,GAAG,OAAO,CAAC;IACtC,SAAgB,sBAAsB,CACpC,GAA2B,EAC3B,eAAyB;QAEzB,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CAAC,GAAG,CAA4B,CAAC,GACvF,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAZe,6CAAsB,yBAYrC,CAAA;AACH,CAAC,EAnCgB,sBAAsB,GAAtB,8BAAsB,KAAtB,8BAAsB,QAmCtC"}
@@ -47,7 +47,7 @@ export interface CreateSecretDetails {
47
47
  * The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
48
48
  *
49
49
  */
50
- "keyId"?: string;
50
+ "keyId": string;
51
51
  /**
52
52
  * Additional metadata that you can use to provide context about how to use the secret during rotation or
53
53
  * other administrative tasks. For example, for a secret that you use to connect to a database, the additional
@@ -72,6 +72,12 @@ export interface CreateSecretDetails {
72
72
  * The OCID of the vault where you want to create the secret.
73
73
  */
74
74
  "vaultId": string;
75
+ "secretGenerationContext"?: model.PassphraseGenerationContext | model.SshKeyGenerationContext | model.BytesGenerationContext;
76
+ /**
77
+ * The value of this flag determines whether or not secret content will be generated automatically. If not set, it defaults to false.
78
+ *
79
+ */
80
+ "enableAutoGeneration"?: boolean;
75
81
  }
76
82
  export declare namespace CreateSecretDetails {
77
83
  function getJsonObj(obj: CreateSecretDetails): object;
@@ -47,6 +47,9 @@ var CreateSecretDetails;
47
47
  ? obj.secretRules.map(item => {
48
48
  return model.SecretRule.getJsonObj(item);
49
49
  })
50
+ : undefined,
51
+ "secretGenerationContext": obj.secretGenerationContext
52
+ ? model.SecretGenerationContext.getJsonObj(obj.secretGenerationContext)
50
53
  : undefined
51
54
  });
52
55
  return jsonObj;
@@ -64,6 +67,9 @@ var CreateSecretDetails;
64
67
  ? obj.secretRules.map(item => {
65
68
  return model.SecretRule.getDeserializedJsonObj(item);
66
69
  })
70
+ : undefined,
71
+ "secretGenerationContext": obj.secretGenerationContext
72
+ ? model.SecretGenerationContext.getDeserializedJsonObj(obj.secretGenerationContext)
67
73
  : undefined
68
74
  });
69
75
  return jsonObj;
@@ -1 +1 @@
1
- {"version":3,"file":"create-secret-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/create-secret-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AA0DlC,IAAiB,mBAAmB,CA2CnC;AA3CD,WAAiB,mBAAmB;IAClC,SAAgB,UAAU,CAAC,GAAwB;QACjD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,eAAe,EAAE,GAAG,CAAC,aAAa;gBAChC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,UAAU,CAAC,GAAG,CAAC,aAAa,CAAC;gBAC1D,CAAC,CAAC,SAAS;YACb,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,CAAC,GAAG,CAAC,cAAc,CAAC;gBACrD,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,GAAG,CAAC,WAAW;gBAC5B,CAAC,CAAC,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACzB,OAAO,KAAK,CAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;gBAC3C,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,8BAAU,aAoBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAwB;QAC7D,MAAM,OAAO,mCACR,GAAG,GACH;YACD,eAAe,EAAE,GAAG,CAAC,aAAa;gBAChC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,sBAAsB,CAAC,GAAG,CAAC,aAAa,CAAC;gBACtE,CAAC,CAAC,SAAS;YACb,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAC,cAAc,CAAC;gBACjE,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,GAAG,CAAC,WAAW;gBAC5B,CAAC,CAAC,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACzB,OAAO,KAAK,CAAC,UAAU,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;gBACvD,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,0CAAsB,yBAoBrC,CAAA;AACH,CAAC,EA3CgB,mBAAmB,GAAnB,2BAAmB,KAAnB,2BAAmB,QA2CnC"}
1
+ {"version":3,"file":"create-secret-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/create-secret-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAmElC,IAAiB,mBAAmB,CAmDnC;AAnDD,WAAiB,mBAAmB;IAClC,SAAgB,UAAU,CAAC,GAAwB;QACjD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,eAAe,EAAE,GAAG,CAAC,aAAa;gBAChC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,UAAU,CAAC,GAAG,CAAC,aAAa,CAAC;gBAC1D,CAAC,CAAC,SAAS;YACb,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,CAAC,GAAG,CAAC,cAAc,CAAC;gBACrD,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,GAAG,CAAC,WAAW;gBAC5B,CAAC,CAAC,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACzB,OAAO,KAAK,CAAC,UAAU,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;gBAC3C,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACvE,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAxBe,8BAAU,aAwBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAwB;QAC7D,MAAM,OAAO,mCACR,GAAG,GACH;YACD,eAAe,EAAE,GAAG,CAAC,aAAa;gBAChC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,sBAAsB,CAAC,GAAG,CAAC,aAAa,CAAC;gBACtE,CAAC,CAAC,SAAS;YACb,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAC,cAAc,CAAC;gBACjE,CAAC,CAAC,SAAS;YAEb,aAAa,EAAE,GAAG,CAAC,WAAW;gBAC5B,CAAC,CAAC,GAAG,CAAC,WAAW,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE;oBACzB,OAAO,KAAK,CAAC,UAAU,CAAC,sBAAsB,CAAC,IAAI,CAAC,CAAC;gBACvD,CAAC,CAAC;gBACJ,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACnF,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAxBe,0CAAsB,yBAwBrC,CAAA;AACH,CAAC,EAnDgB,mBAAmB,GAAnB,2BAAmB,KAAnB,2BAAmB,QAmDnC"}
@@ -24,6 +24,8 @@ import * as Secret from "./secret";
24
24
  export import Secret = Secret.Secret;
25
25
  import * as SecretContentDetails from "./secret-content-details";
26
26
  export import SecretContentDetails = SecretContentDetails.SecretContentDetails;
27
+ import * as SecretGenerationContext from "./secret-generation-context";
28
+ export import SecretGenerationContext = SecretGenerationContext.SecretGenerationContext;
27
29
  import * as SecretRule from "./secret-rule";
28
30
  export import SecretRule = SecretRule.SecretRule;
29
31
  import * as SecretSummary from "./secret-summary";
@@ -40,9 +42,15 @@ import * as AdbTargetSystemDetails from "./adb-target-system-details";
40
42
  export import AdbTargetSystemDetails = AdbTargetSystemDetails.AdbTargetSystemDetails;
41
43
  import * as Base64SecretContentDetails from "./base64-secret-content-details";
42
44
  export import Base64SecretContentDetails = Base64SecretContentDetails.Base64SecretContentDetails;
45
+ import * as BytesGenerationContext from "./bytes-generation-context";
46
+ export import BytesGenerationContext = BytesGenerationContext.BytesGenerationContext;
43
47
  import * as FunctionTargetSystemDetails from "./function-target-system-details";
44
48
  export import FunctionTargetSystemDetails = FunctionTargetSystemDetails.FunctionTargetSystemDetails;
49
+ import * as PassphraseGenerationContext from "./passphrase-generation-context";
50
+ export import PassphraseGenerationContext = PassphraseGenerationContext.PassphraseGenerationContext;
45
51
  import * as SecretExpiryRule from "./secret-expiry-rule";
46
52
  export import SecretExpiryRule = SecretExpiryRule.SecretExpiryRule;
47
53
  import * as SecretReuseRule from "./secret-reuse-rule";
48
54
  export import SecretReuseRule = SecretReuseRule.SecretReuseRule;
55
+ import * as SshKeyGenerationContext from "./ssh-key-generation-context";
56
+ export import SshKeyGenerationContext = SshKeyGenerationContext.SshKeyGenerationContext;
@@ -31,7 +31,7 @@ var __importStar = (this && this.__importStar) || function (mod) {
31
31
  return result;
32
32
  };
33
33
  Object.defineProperty(exports, "__esModule", { value: true });
34
- exports.SecretReuseRule = exports.SecretExpiryRule = exports.FunctionTargetSystemDetails = exports.Base64SecretContentDetails = exports.AdbTargetSystemDetails = exports.UpdateSecretDetails = exports.TargetSystemDetails = exports.SecretVersionSummary = exports.SecretVersion = exports.SecretSummary = exports.SecretRule = exports.SecretContentDetails = exports.Secret = exports.ScheduleSecretVersionDeletionDetails = exports.ScheduleSecretDeletionDetails = exports.RotationConfig = exports.CreateSecretDetails = exports.ChangeSecretCompartmentDetails = void 0;
34
+ exports.SshKeyGenerationContext = exports.SecretReuseRule = exports.SecretExpiryRule = exports.PassphraseGenerationContext = exports.FunctionTargetSystemDetails = exports.BytesGenerationContext = exports.Base64SecretContentDetails = exports.AdbTargetSystemDetails = exports.UpdateSecretDetails = exports.TargetSystemDetails = exports.SecretVersionSummary = exports.SecretVersion = exports.SecretSummary = exports.SecretRule = exports.SecretGenerationContext = exports.SecretContentDetails = exports.Secret = exports.ScheduleSecretVersionDeletionDetails = exports.ScheduleSecretDeletionDetails = exports.RotationConfig = exports.CreateSecretDetails = exports.ChangeSecretCompartmentDetails = void 0;
35
35
  const ChangeSecretCompartmentDetails = __importStar(require("./change-secret-compartment-details"));
36
36
  exports.ChangeSecretCompartmentDetails = ChangeSecretCompartmentDetails.ChangeSecretCompartmentDetails;
37
37
  const CreateSecretDetails = __importStar(require("./create-secret-details"));
@@ -46,6 +46,8 @@ const Secret = __importStar(require("./secret"));
46
46
  exports.Secret = Secret.Secret;
47
47
  const SecretContentDetails = __importStar(require("./secret-content-details"));
48
48
  exports.SecretContentDetails = SecretContentDetails.SecretContentDetails;
49
+ const SecretGenerationContext = __importStar(require("./secret-generation-context"));
50
+ exports.SecretGenerationContext = SecretGenerationContext.SecretGenerationContext;
49
51
  const SecretRule = __importStar(require("./secret-rule"));
50
52
  exports.SecretRule = SecretRule.SecretRule;
51
53
  const SecretSummary = __importStar(require("./secret-summary"));
@@ -62,10 +64,16 @@ const AdbTargetSystemDetails = __importStar(require("./adb-target-system-details
62
64
  exports.AdbTargetSystemDetails = AdbTargetSystemDetails.AdbTargetSystemDetails;
63
65
  const Base64SecretContentDetails = __importStar(require("./base64-secret-content-details"));
64
66
  exports.Base64SecretContentDetails = Base64SecretContentDetails.Base64SecretContentDetails;
67
+ const BytesGenerationContext = __importStar(require("./bytes-generation-context"));
68
+ exports.BytesGenerationContext = BytesGenerationContext.BytesGenerationContext;
65
69
  const FunctionTargetSystemDetails = __importStar(require("./function-target-system-details"));
66
70
  exports.FunctionTargetSystemDetails = FunctionTargetSystemDetails.FunctionTargetSystemDetails;
71
+ const PassphraseGenerationContext = __importStar(require("./passphrase-generation-context"));
72
+ exports.PassphraseGenerationContext = PassphraseGenerationContext.PassphraseGenerationContext;
67
73
  const SecretExpiryRule = __importStar(require("./secret-expiry-rule"));
68
74
  exports.SecretExpiryRule = SecretExpiryRule.SecretExpiryRule;
69
75
  const SecretReuseRule = __importStar(require("./secret-reuse-rule"));
70
76
  exports.SecretReuseRule = SecretReuseRule.SecretReuseRule;
77
+ const SshKeyGenerationContext = __importStar(require("./ssh-key-generation-context"));
78
+ exports.SshKeyGenerationContext = SshKeyGenerationContext.SshKeyGenerationContext;
71
79
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/index.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,oGAAsF;AACxE,QAAA,8BAA8B,GAAG,8BAA8B,CAAC,8BAA8B,CAAC;AAC7G,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,kEAAoD;AACtC,QAAA,cAAc,GAAG,cAAc,CAAC,cAAc,CAAC;AAC7D,kGAAoF;AACtE,QAAA,6BAA6B,GAAG,6BAA6B,CAAC,6BAA6B,CAAC;AAC1G,iHAAmG;AACrF,QAAA,oCAAoC,GAAG,oCAAoC,CAAC,oCAAoC,CAAC;AAC/H,iDAAmC;AACrB,QAAA,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC;AACrC,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,0DAA4C;AAC9B,QAAA,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;AACjD,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAE5E,oFAAsE;AACxD,QAAA,sBAAsB,GAAG,sBAAsB,CAAC,sBAAsB,CAAC;AACrF,4FAA8E;AAChE,QAAA,0BAA0B,GAAG,0BAA0B,CAAC,0BAA0B,CAAC;AACjG,8FAAgF;AAClE,QAAA,2BAA2B,GAAG,2BAA2B,CAAC,2BAA2B,CAAC;AACpG,uEAAyD;AAC3C,QAAA,gBAAgB,GAAG,gBAAgB,CAAC,gBAAgB,CAAC;AACnE,qEAAuD;AACzC,QAAA,eAAe,GAAG,eAAe,CAAC,eAAe,CAAC"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/index.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,oGAAsF;AACxE,QAAA,8BAA8B,GAAG,8BAA8B,CAAC,8BAA8B,CAAC;AAC7G,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,kEAAoD;AACtC,QAAA,cAAc,GAAG,cAAc,CAAC,cAAc,CAAC;AAC7D,kGAAoF;AACtE,QAAA,6BAA6B,GAAG,6BAA6B,CAAC,6BAA6B,CAAC;AAC1G,iHAAmG;AACrF,QAAA,oCAAoC,GAAG,oCAAoC,CAAC,oCAAoC,CAAC;AAC/H,iDAAmC;AACrB,QAAA,MAAM,GAAG,MAAM,CAAC,MAAM,CAAC;AACrC,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,qFAAuE;AACzD,QAAA,uBAAuB,GAAG,uBAAuB,CAAC,uBAAuB,CAAC;AACxF,0DAA4C;AAC9B,QAAA,UAAU,GAAG,UAAU,CAAC,UAAU,CAAC;AACjD,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,gEAAkD;AACpC,QAAA,aAAa,GAAG,aAAa,CAAC,aAAa,CAAC;AAC1D,+EAAiE;AACnD,QAAA,oBAAoB,GAAG,oBAAoB,CAAC,oBAAoB,CAAC;AAC/E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAC5E,6EAA+D;AACjD,QAAA,mBAAmB,GAAG,mBAAmB,CAAC,mBAAmB,CAAC;AAE5E,oFAAsE;AACxD,QAAA,sBAAsB,GAAG,sBAAsB,CAAC,sBAAsB,CAAC;AACrF,4FAA8E;AAChE,QAAA,0BAA0B,GAAG,0BAA0B,CAAC,0BAA0B,CAAC;AACjG,mFAAqE;AACvD,QAAA,sBAAsB,GAAG,sBAAsB,CAAC,sBAAsB,CAAC;AACrF,8FAAgF;AAClE,QAAA,2BAA2B,GAAG,2BAA2B,CAAC,2BAA2B,CAAC;AACpG,6FAA+E;AACjE,QAAA,2BAA2B,GAAG,2BAA2B,CAAC,2BAA2B,CAAC;AACpG,uEAAyD;AAC3C,QAAA,gBAAgB,GAAG,gBAAgB,CAAC,gBAAgB,CAAC;AACnE,qEAAuD;AACzC,QAAA,eAAe,GAAG,eAAe,CAAC,eAAe,CAAC;AAChE,sFAAwE;AAC1D,QAAA,uBAAuB,GAAG,uBAAuB,CAAC,uBAAuB,CAAC"}
@@ -0,0 +1,43 @@
1
+ /**
2
+ * Vault Secret Management API
3
+ * Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
4
+ * OpenAPI spec version: 20180608
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ import * as model from "../model";
14
+ /**
15
+ * Generates Passphrase type secrets. By default, passphrase type secrets have no structure. The generated content is stored in Base64 format.
16
+ * The SecretTemplate must have the %GENERATED_PASSPHRASE% keyword, which is later replaced with the generated content, if provided.
17
+ *
18
+ */
19
+ export interface PassphraseGenerationContext extends model.SecretGenerationContext {
20
+ /**
21
+ * Name of passphrase generation template to generate passphrase type secret.
22
+ */
23
+ "generationTemplate": PassphraseGenerationContext.GenerationTemplate;
24
+ /**
25
+ * Length of the passphrase to be generated Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
26
+ */
27
+ "passphraseLength"?: number;
28
+ "generationType": string;
29
+ }
30
+ export declare namespace PassphraseGenerationContext {
31
+ enum GenerationTemplate {
32
+ SecretsDefaultPassword = "SECRETS_DEFAULT_PASSWORD",
33
+ DbaasDefaultPassword = "DBAAS_DEFAULT_PASSWORD",
34
+ /**
35
+ * This value is used if a service returns a value for this enum that is not recognized by this
36
+ * version of the SDK.
37
+ */
38
+ UnknownValue = "UNKNOWN_VALUE"
39
+ }
40
+ function getJsonObj(obj: PassphraseGenerationContext, isParentJsonObj?: boolean): object;
41
+ const generationType = "PASSPHRASE";
42
+ function getDeserializedJsonObj(obj: PassphraseGenerationContext, isParentJsonObj?: boolean): object;
43
+ }
@@ -0,0 +1,64 @@
1
+ "use strict";
2
+ /**
3
+ * Vault Secret Management API
4
+ * Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
5
+ * OpenAPI spec version: 20180608
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.PassphraseGenerationContext = void 0;
35
+ const model = __importStar(require("../model"));
36
+ var PassphraseGenerationContext;
37
+ (function (PassphraseGenerationContext) {
38
+ let GenerationTemplate;
39
+ (function (GenerationTemplate) {
40
+ GenerationTemplate["SecretsDefaultPassword"] = "SECRETS_DEFAULT_PASSWORD";
41
+ GenerationTemplate["DbaasDefaultPassword"] = "DBAAS_DEFAULT_PASSWORD";
42
+ /**
43
+ * This value is used if a service returns a value for this enum that is not recognized by this
44
+ * version of the SDK.
45
+ */
46
+ GenerationTemplate["UnknownValue"] = "UNKNOWN_VALUE";
47
+ })(GenerationTemplate = PassphraseGenerationContext.GenerationTemplate || (PassphraseGenerationContext.GenerationTemplate = {}));
48
+ function getJsonObj(obj, isParentJsonObj) {
49
+ const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
50
+ ? obj
51
+ : model.SecretGenerationContext.getJsonObj(obj))), {});
52
+ return jsonObj;
53
+ }
54
+ PassphraseGenerationContext.getJsonObj = getJsonObj;
55
+ PassphraseGenerationContext.generationType = "PASSPHRASE";
56
+ function getDeserializedJsonObj(obj, isParentJsonObj) {
57
+ const jsonObj = Object.assign(Object.assign({}, (isParentJsonObj
58
+ ? obj
59
+ : model.SecretGenerationContext.getDeserializedJsonObj(obj))), {});
60
+ return jsonObj;
61
+ }
62
+ PassphraseGenerationContext.getDeserializedJsonObj = getDeserializedJsonObj;
63
+ })(PassphraseGenerationContext = exports.PassphraseGenerationContext || (exports.PassphraseGenerationContext = {}));
64
+ //# sourceMappingURL=passphrase-generation-context.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"passphrase-generation-context.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/passphrase-generation-context.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAqBlC,IAAiB,2BAA2B,CAqC3C;AArCD,WAAiB,2BAA2B;IAC1C,IAAY,kBAQX;IARD,WAAY,kBAAkB;QAC5B,yEAAmD,CAAA;QACnD,qEAA+C,CAAA;QAC/C;;;WAGG;QACH,oDAA8B,CAAA;IAChC,CAAC,EARW,kBAAkB,GAAlB,8CAAkB,KAAlB,8CAAkB,QAQ7B;IAED,SAAgB,UAAU,CAAC,GAAgC,EAAE,eAAyB;QACpF,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAAiC,CAAC,GAChF,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IATe,sCAAU,aASzB,CAAA;IACY,0CAAc,GAAG,YAAY,CAAC;IAC3C,SAAgB,sBAAsB,CACpC,GAAgC,EAChC,eAAyB;QAEzB,MAAM,OAAO,mCACR,CAAC,eAAe;YACjB,CAAC,CAAC,GAAG;YACL,CAAC,CAAE,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CACnD,GAAG,CAC4B,CAAC,GACnC,EAAE,CACN,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAde,kDAAsB,yBAcrC,CAAA;AACH,CAAC,EArCgB,2BAA2B,GAA3B,mCAA2B,KAA3B,mCAA2B,QAqC3C"}
@@ -48,7 +48,8 @@ var SecretContentDetails;
48
48
  case "BASE64":
49
49
  return model.Base64SecretContentDetails.getJsonObj(jsonObj, true);
50
50
  default:
51
- common.logger.info(`Unknown value for: ${obj.contentType}`);
51
+ if (common.LOG.logger)
52
+ common.LOG.logger.info(`Unknown value for: ${obj.contentType}`);
52
53
  }
53
54
  }
54
55
  return jsonObj;
@@ -61,7 +62,8 @@ var SecretContentDetails;
61
62
  case "BASE64":
62
63
  return model.Base64SecretContentDetails.getDeserializedJsonObj(jsonObj, true);
63
64
  default:
64
- common.logger.info(`Unknown value for: ${obj.contentType}`);
65
+ if (common.LOG.logger)
66
+ common.LOG.logger.info(`Unknown value for: ${obj.contentType}`);
65
67
  }
66
68
  }
67
69
  return jsonObj;
@@ -1 +1 @@
1
- {"version":3,"file":"secret-content-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-content-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAuBtC,IAAiB,oBAAoB,CAsCpC;AAtCD,WAAiB,oBAAoB;IACnC,IAAY,KAGX;IAHD,WAAY,KAAK;QACf,4BAAmB,CAAA;QACnB,4BAAmB,CAAA;IACrB,CAAC,EAHW,KAAK,GAAL,0BAAK,KAAL,0BAAK,QAGhB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,UAAU,CACL,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;aAC/D;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,+BAAU,aAezB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,sBAAsB,CACjB,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;aAC/D;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,2CAAsB,yBAerC,CAAA;AACH,CAAC,EAtCgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QAsCpC"}
1
+ {"version":3,"file":"secret-content-details.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-content-details.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAuBtC,IAAiB,oBAAoB,CAsCpC;AAtCD,WAAiB,oBAAoB;IACnC,IAAY,KAGX;IAHD,WAAY,KAAK;QACf,4BAAmB,CAAA;QACnB,4BAAmB,CAAA;IACrB,CAAC,EAHW,KAAK,GAAL,0BAAK,KAAL,0BAAK,QAGhB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,UAAU,CACL,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;aAC1F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,+BAAU,aAezB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,aAAa,IAAI,GAAG,IAAI,GAAG,CAAC,WAAW,EAAE;YAClD,QAAQ,GAAG,CAAC,WAAW,EAAE;gBACvB,KAAK,QAAQ;oBACX,OAAO,KAAK,CAAC,0BAA0B,CAAC,sBAAsB,CACjB,OAAQ,EACnD,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,WAAW,EAAE,CAAC,CAAC;aAC1F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,2CAAsB,yBAerC,CAAA;AACH,CAAC,EAtCgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QAsCpC"}
@@ -0,0 +1,29 @@
1
+ /**
2
+ * Vault Secret Management API
3
+ * Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
4
+ * OpenAPI spec version: 20180608
5
+ *
6
+ *
7
+ * NOTE: This class is auto generated by OracleSDKGenerator.
8
+ * Do not edit the class manually.
9
+ *
10
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
11
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
12
+ */
13
+ /**
14
+ * Captures a configurable set of secret generation rules such as length, base characters, additional characters, and so on.
15
+ */
16
+ export interface SecretGenerationContext {
17
+ /**
18
+ * SecretTemplate captures structure in which customer wants to store secrets. This is optional and a default structure is available for each secret type.
19
+ * The template can have any structure with static values that are not generated. Within the template, you can insert predefined placeholders to store secrets.
20
+ * These placeholders are later replaced with the generated content and saved as a Base64 encoded content.
21
+ *
22
+ */
23
+ "secretTemplate"?: string;
24
+ "generationType": string;
25
+ }
26
+ export declare namespace SecretGenerationContext {
27
+ function getJsonObj(obj: SecretGenerationContext): object;
28
+ function getDeserializedJsonObj(obj: SecretGenerationContext): object;
29
+ }
@@ -0,0 +1,76 @@
1
+ "use strict";
2
+ /**
3
+ * Vault Secret Management API
4
+ * Use the Secret Management API to manage secrets and secret versions. For more information, see [Managing Secrets](/Content/KeyManagement/Tasks/managingsecrets.htm).
5
+ * OpenAPI spec version: 20180608
6
+ *
7
+ *
8
+ * NOTE: This class is auto generated by OracleSDKGenerator.
9
+ * Do not edit the class manually.
10
+ *
11
+ * Copyright (c) 2020, 2024, Oracle and/or its affiliates. All rights reserved.
12
+ * This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
13
+ */
14
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
15
+ if (k2 === undefined) k2 = k;
16
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
17
+ }) : (function(o, m, k, k2) {
18
+ if (k2 === undefined) k2 = k;
19
+ o[k2] = m[k];
20
+ }));
21
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
22
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
23
+ }) : function(o, v) {
24
+ o["default"] = v;
25
+ });
26
+ var __importStar = (this && this.__importStar) || function (mod) {
27
+ if (mod && mod.__esModule) return mod;
28
+ var result = {};
29
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
30
+ __setModuleDefault(result, mod);
31
+ return result;
32
+ };
33
+ Object.defineProperty(exports, "__esModule", { value: true });
34
+ exports.SecretGenerationContext = void 0;
35
+ const model = __importStar(require("../model"));
36
+ const common = require("oci-common");
37
+ var SecretGenerationContext;
38
+ (function (SecretGenerationContext) {
39
+ function getJsonObj(obj) {
40
+ const jsonObj = Object.assign(Object.assign({}, obj), {});
41
+ if (obj && "generationType" in obj && obj.generationType) {
42
+ switch (obj.generationType) {
43
+ case "PASSPHRASE":
44
+ return model.PassphraseGenerationContext.getJsonObj(jsonObj, true);
45
+ case "SSH_KEY":
46
+ return model.SshKeyGenerationContext.getJsonObj(jsonObj, true);
47
+ case "BYTES":
48
+ return model.BytesGenerationContext.getJsonObj(jsonObj, true);
49
+ default:
50
+ if (common.LOG.logger)
51
+ common.LOG.logger.info(`Unknown value for: ${obj.generationType}`);
52
+ }
53
+ }
54
+ return jsonObj;
55
+ }
56
+ SecretGenerationContext.getJsonObj = getJsonObj;
57
+ function getDeserializedJsonObj(obj) {
58
+ const jsonObj = Object.assign(Object.assign({}, obj), {});
59
+ if (obj && "generationType" in obj && obj.generationType) {
60
+ switch (obj.generationType) {
61
+ case "PASSPHRASE":
62
+ return model.PassphraseGenerationContext.getDeserializedJsonObj(jsonObj, true);
63
+ case "SSH_KEY":
64
+ return model.SshKeyGenerationContext.getDeserializedJsonObj(jsonObj, true);
65
+ case "BYTES":
66
+ return model.BytesGenerationContext.getDeserializedJsonObj(jsonObj, true);
67
+ default:
68
+ if (common.LOG.logger)
69
+ common.LOG.logger.info(`Unknown value for: ${obj.generationType}`);
70
+ }
71
+ }
72
+ return jsonObj;
73
+ }
74
+ SecretGenerationContext.getDeserializedJsonObj = getDeserializedJsonObj;
75
+ })(SecretGenerationContext = exports.SecretGenerationContext || (exports.SecretGenerationContext = {}));
76
+ //# sourceMappingURL=secret-generation-context.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secret-generation-context.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-generation-context.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAiBtC,IAAiB,uBAAuB,CAqDvC;AArDD,WAAiB,uBAAuB;IACtC,SAAgB,UAAU,CAAC,GAA4B;QACrD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,gBAAgB,IAAI,GAAG,IAAI,GAAG,CAAC,cAAc,EAAE;YACxD,QAAQ,GAAG,CAAC,cAAc,EAAE;gBAC1B,KAAK,YAAY;oBACf,OAAO,KAAK,CAAC,2BAA2B,CAAC,UAAU,CACL,OAAQ,EACpD,IAAI,CACL,CAAC;gBACJ,KAAK,SAAS;oBACZ,OAAO,KAAK,CAAC,uBAAuB,CAAC,UAAU,CACL,OAAQ,EAChD,IAAI,CACL,CAAC;gBACJ,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,sBAAsB,CAAC,UAAU,CACL,OAAQ,EAC/C,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,cAAc,EAAE,CAAC,CAAC;aAC7F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAzBe,kCAAU,aAyBzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAA4B;QACjE,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,gBAAgB,IAAI,GAAG,IAAI,GAAG,CAAC,cAAc,EAAE;YACxD,QAAQ,GAAG,CAAC,cAAc,EAAE;gBAC1B,KAAK,YAAY;oBACf,OAAO,KAAK,CAAC,2BAA2B,CAAC,sBAAsB,CACjB,OAAQ,EACpD,IAAI,CACL,CAAC;gBACJ,KAAK,SAAS;oBACZ,OAAO,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CACjB,OAAQ,EAChD,IAAI,CACL,CAAC;gBACJ,KAAK,OAAO;oBACV,OAAO,KAAK,CAAC,sBAAsB,CAAC,sBAAsB,CACjB,OAAQ,EAC/C,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,cAAc,EAAE,CAAC,CAAC;aAC7F;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAzBe,8CAAsB,yBAyBrC,CAAA;AACH,CAAC,EArDgB,uBAAuB,GAAvB,+BAAuB,KAAvB,+BAAuB,QAqDvC"}
@@ -45,7 +45,8 @@ var SecretRule;
45
45
  case "SECRET_REUSE_RULE":
46
46
  return model.SecretReuseRule.getJsonObj(jsonObj, true);
47
47
  default:
48
- common.logger.info(`Unknown value for: ${obj.ruleType}`);
48
+ if (common.LOG.logger)
49
+ common.LOG.logger.info(`Unknown value for: ${obj.ruleType}`);
49
50
  }
50
51
  }
51
52
  return jsonObj;
@@ -60,7 +61,8 @@ var SecretRule;
60
61
  case "SECRET_REUSE_RULE":
61
62
  return model.SecretReuseRule.getDeserializedJsonObj(jsonObj, true);
62
63
  default:
63
- common.logger.info(`Unknown value for: ${obj.ruleType}`);
64
+ if (common.LOG.logger)
65
+ common.LOG.logger.info(`Unknown value for: ${obj.ruleType}`);
64
66
  }
65
67
  }
66
68
  return jsonObj;
@@ -1 +1 @@
1
- {"version":3,"file":"secret-rule.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-rule.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAStC,IAAiB,UAAU,CAqC1B;AArCD,WAAiB,UAAU;IACzB,SAAgB,UAAU,CAAC,GAAe;QACxC,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,UAAU,CAAkC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC5F,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,UAAU,CAAiC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC1F;oBACE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aAC5D;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAde,qBAAU,aAczB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAe;QACpD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,sBAAsB,CACjB,OAAQ,EACzC,IAAI,CACL,CAAC;gBACJ,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,sBAAsB,CACjB,OAAQ,EACxC,IAAI,CACL,CAAC;gBACJ;oBACE,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aAC5D;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,iCAAsB,yBAoBrC,CAAA;AACH,CAAC,EArCgB,UAAU,GAAV,kBAAU,KAAV,kBAAU,QAqC1B"}
1
+ {"version":3,"file":"secret-rule.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-rule.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAClC,qCAAsC;AAStC,IAAiB,UAAU,CAqC1B;AArCD,WAAiB,UAAU;IACzB,SAAgB,UAAU,CAAC,GAAe;QACxC,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,UAAU,CAAkC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC5F,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,UAAU,CAAiC,OAAQ,EAAE,IAAI,CAAC,CAAC;gBAC1F;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IAde,qBAAU,aAczB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAe;QACpD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,IAAI,GAAG,IAAI,UAAU,IAAI,GAAG,IAAI,GAAG,CAAC,QAAQ,EAAE;YAC5C,QAAQ,GAAG,CAAC,QAAQ,EAAE;gBACpB,KAAK,oBAAoB;oBACvB,OAAO,KAAK,CAAC,gBAAgB,CAAC,sBAAsB,CACjB,OAAQ,EACzC,IAAI,CACL,CAAC;gBACJ,KAAK,mBAAmB;oBACtB,OAAO,KAAK,CAAC,eAAe,CAAC,sBAAsB,CACjB,OAAQ,EACxC,IAAI,CACL,CAAC;gBACJ;oBACE,IAAI,MAAM,CAAC,GAAG,CAAC,MAAM;wBAAE,MAAM,CAAC,GAAG,CAAC,MAAM,CAAC,IAAI,CAAC,sBAAsB,GAAG,CAAC,QAAQ,EAAE,CAAC,CAAC;aACvF;SACF;QACD,OAAO,OAAO,CAAC;IACjB,CAAC;IApBe,iCAAsB,yBAoBrC,CAAA;AACH,CAAC,EArCgB,UAAU,GAAV,kBAAU,KAAV,kBAAU,QAqC1B"}
@@ -114,6 +114,12 @@ export interface SecretSummary {
114
114
  * The OCID of the Vault in which the secret exists
115
115
  */
116
116
  "vaultId": string;
117
+ "secretGenerationContext"?: model.PassphraseGenerationContext | model.SshKeyGenerationContext | model.BytesGenerationContext;
118
+ /**
119
+ * The value of this flag determines whether or not secret content will be generated automatically.
120
+ *
121
+ */
122
+ "isAutoGenerationEnabled"?: boolean;
117
123
  }
118
124
  export declare namespace SecretSummary {
119
125
  enum LifecycleState {
@@ -56,6 +56,9 @@ var SecretSummary;
56
56
  const jsonObj = Object.assign(Object.assign({}, obj), {
57
57
  "rotationConfig": obj.rotationConfig
58
58
  ? model.RotationConfig.getJsonObj(obj.rotationConfig)
59
+ : undefined,
60
+ "secretGenerationContext": obj.secretGenerationContext
61
+ ? model.SecretGenerationContext.getJsonObj(obj.secretGenerationContext)
59
62
  : undefined
60
63
  });
61
64
  return jsonObj;
@@ -65,6 +68,9 @@ var SecretSummary;
65
68
  const jsonObj = Object.assign(Object.assign({}, obj), {
66
69
  "rotationConfig": obj.rotationConfig
67
70
  ? model.RotationConfig.getDeserializedJsonObj(obj.rotationConfig)
71
+ : undefined,
72
+ "secretGenerationContext": obj.secretGenerationContext
73
+ ? model.SecretGenerationContext.getDeserializedJsonObj(obj.secretGenerationContext)
68
74
  : undefined
69
75
  });
70
76
  return jsonObj;
@@ -1 +1 @@
1
- {"version":3,"file":"secret-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AAkGlC,IAAiB,aAAa,CA0C7B;AA1CD,WAAiB,aAAa;IAC5B,IAAY,cAeX;IAfD,WAAY,cAAc;QACxB,uCAAqB,CAAA;QACrB,mCAAiB,CAAA;QACjB,uCAAqB,CAAA;QACrB,uCAAqB,CAAA;QACrB,qCAAmB,CAAA;QACnB,4DAA0C,CAAA;QAC1C,sDAAoC,CAAA;QACpC,4DAA0C,CAAA;QAC1C,mCAAiB,CAAA;QACjB;;;WAGG;QACH,gDAA8B,CAAA;IAChC,CAAC,EAfW,cAAc,GAAd,4BAAc,KAAd,4BAAc,QAezB;IAED,SAAgB,UAAU,CAAC,GAAkB;QAC3C,MAAM,OAAO,mCACR,GAAG,GACH;YACD,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,CAAC,GAAG,CAAC,cAAc,CAAC;gBACrD,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAXe,wBAAU,aAWzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAkB;QACvD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAC,cAAc,CAAC;gBACjE,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAXe,oCAAsB,yBAWrC,CAAA;AACH,CAAC,EA1CgB,aAAa,GAAb,qBAAa,KAAb,qBAAa,QA0C7B"}
1
+ {"version":3,"file":"secret-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;;;;;;;;;;;;;;;;;;;;AAEH,gDAAkC;AA2GlC,IAAiB,aAAa,CAkD7B;AAlDD,WAAiB,aAAa;IAC5B,IAAY,cAeX;IAfD,WAAY,cAAc;QACxB,uCAAqB,CAAA;QACrB,mCAAiB,CAAA;QACjB,uCAAqB,CAAA;QACrB,uCAAqB,CAAA;QACrB,qCAAmB,CAAA;QACnB,4DAA0C,CAAA;QAC1C,sDAAoC,CAAA;QACpC,4DAA0C,CAAA;QAC1C,mCAAiB,CAAA;QACjB;;;WAGG;QACH,gDAA8B,CAAA;IAChC,CAAC,EAfW,cAAc,GAAd,4BAAc,KAAd,4BAAc,QAezB;IAED,SAAgB,UAAU,CAAC,GAAkB;QAC3C,MAAM,OAAO,mCACR,GAAG,GACH;YACD,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,UAAU,CAAC,GAAG,CAAC,cAAc,CAAC;gBACrD,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,UAAU,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACvE,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,wBAAU,aAezB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAkB;QACvD,MAAM,OAAO,mCACR,GAAG,GACH;YACD,gBAAgB,EAAE,GAAG,CAAC,cAAc;gBAClC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,sBAAsB,CAAC,GAAG,CAAC,cAAc,CAAC;gBACjE,CAAC,CAAC,SAAS;YAEb,yBAAyB,EAAE,GAAG,CAAC,uBAAuB;gBACpD,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,sBAAsB,CAAC,GAAG,CAAC,uBAAuB,CAAC;gBACnF,CAAC,CAAC,SAAS;SACd,CACF,CAAC;QAEF,OAAO,OAAO,CAAC;IACjB,CAAC;IAfe,oCAAsB,yBAerC,CAAA;AACH,CAAC,EAlDgB,aAAa,GAAb,qBAAa,KAAb,qBAAa,QAkD7B"}
@@ -70,6 +70,11 @@ export interface SecretVersionSummary {
70
70
  [key: string]: any;
71
71
  };
72
72
  };
73
+ /**
74
+ * Boolean flag indicating whether secret content for this secret version was auto-generated or not.
75
+ *
76
+ */
77
+ "isContentAutoGenerated"?: boolean;
73
78
  }
74
79
  export declare namespace SecretVersionSummary {
75
80
  enum ContentType {
@@ -1 +1 @@
1
- {"version":3,"file":"secret-version-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AA+DH,IAAiB,oBAAoB,CAiCpC;AAjCD,WAAiB,oBAAoB;IACnC,IAAY,WAOX;IAPD,WAAY,WAAW;QACrB,gCAAiB,CAAA;QACjB;;;WAGG;QACH,6CAA8B,CAAA;IAChC,CAAC,EAPW,WAAW,GAAX,gCAAW,KAAX,gCAAW,QAOtB;IAED,IAAY,MAWX;IAXD,WAAY,MAAM;QAChB,6BAAmB,CAAA;QACnB,6BAAmB,CAAA;QACnB,2BAAiB,CAAA;QACjB,+BAAqB,CAAA;QACrB,mCAAyB,CAAA;QACzB;;;WAGG;QACH,wCAA8B,CAAA;IAChC,CAAC,EAXW,MAAM,GAAN,2BAAM,KAAN,2BAAM,QAWjB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,+BAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,2CAAsB,yBAIrC,CAAA;AACH,CAAC,EAjCgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QAiCpC"}
1
+ {"version":3,"file":"secret-version-summary.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version-summary.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AAoEH,IAAiB,oBAAoB,CAiCpC;AAjCD,WAAiB,oBAAoB;IACnC,IAAY,WAOX;IAPD,WAAY,WAAW;QACrB,gCAAiB,CAAA;QACjB;;;WAGG;QACH,6CAA8B,CAAA;IAChC,CAAC,EAPW,WAAW,GAAX,gCAAW,KAAX,gCAAW,QAOtB;IAED,IAAY,MAWX;IAXD,WAAY,MAAM;QAChB,6BAAmB,CAAA;QACnB,6BAAmB,CAAA;QACnB,2BAAiB,CAAA;QACjB,+BAAqB,CAAA;QACrB,mCAAyB,CAAA;QACzB;;;WAGG;QACH,wCAA8B,CAAA;IAChC,CAAC,EAXW,MAAM,GAAN,2BAAM,KAAN,2BAAM,QAWjB;IAED,SAAgB,UAAU,CAAC,GAAyB;QAClD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,+BAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAyB;QAC9D,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,2CAAsB,yBAIrC,CAAA;AACH,CAAC,EAjCgB,oBAAoB,GAApB,4BAAoB,KAApB,4BAAoB,QAiCpC"}
@@ -59,6 +59,11 @@ export interface SecretVersion {
59
59
  * The version number of the secret. Note: Numbers greater than Number.MAX_SAFE_INTEGER will result in rounding issues.
60
60
  */
61
61
  "versionNumber"?: number;
62
+ /**
63
+ * Boolean flag indicating whether secret content for this secret version was auto-generated or not.
64
+ *
65
+ */
66
+ "isContentAutoGenerated"?: boolean;
62
67
  }
63
68
  export declare namespace SecretVersion {
64
69
  enum ContentType {
@@ -1 +1 @@
1
- {"version":3,"file":"secret-version.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AAwDH,IAAiB,aAAa,CAiC7B;AAjCD,WAAiB,aAAa;IAC5B,IAAY,WAOX;IAPD,WAAY,WAAW;QACrB,gCAAiB,CAAA;QACjB;;;WAGG;QACH,6CAA8B,CAAA;IAChC,CAAC,EAPW,WAAW,GAAX,yBAAW,KAAX,yBAAW,QAOtB;IAED,IAAY,MAWX;IAXD,WAAY,MAAM;QAChB,6BAAmB,CAAA;QACnB,6BAAmB,CAAA;QACnB,2BAAiB,CAAA;QACjB,+BAAqB,CAAA;QACrB,mCAAyB,CAAA;QACzB;;;WAGG;QACH,wCAA8B,CAAA;IAChC,CAAC,EAXW,MAAM,GAAN,oBAAM,KAAN,oBAAM,QAWjB;IAED,SAAgB,UAAU,CAAC,GAAkB;QAC3C,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,wBAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAkB;QACvD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,oCAAsB,yBAIrC,CAAA;AACH,CAAC,EAjCgB,aAAa,GAAb,qBAAa,KAAb,qBAAa,QAiC7B"}
1
+ {"version":3,"file":"secret-version.js","sourceRoot":"","sources":["../../../../../lib/vault/lib/model/secret-version.ts"],"names":[],"mappings":";AAAA;;;;;;;;;;;GAWG;;;AA6DH,IAAiB,aAAa,CAiC7B;AAjCD,WAAiB,aAAa;IAC5B,IAAY,WAOX;IAPD,WAAY,WAAW;QACrB,gCAAiB,CAAA;QACjB;;;WAGG;QACH,6CAA8B,CAAA;IAChC,CAAC,EAPW,WAAW,GAAX,yBAAW,KAAX,yBAAW,QAOtB;IAED,IAAY,MAWX;IAXD,WAAY,MAAM;QAChB,6BAAmB,CAAA;QACnB,6BAAmB,CAAA;QACnB,2BAAiB,CAAA;QACjB,+BAAqB,CAAA;QACrB,mCAAyB,CAAA;QACzB;;;WAGG;QACH,wCAA8B,CAAA;IAChC,CAAC,EAXW,MAAM,GAAN,oBAAM,KAAN,oBAAM,QAWjB;IAED,SAAgB,UAAU,CAAC,GAAkB;QAC3C,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,wBAAU,aAIzB,CAAA;IACD,SAAgB,sBAAsB,CAAC,GAAkB;QACvD,MAAM,OAAO,mCAAQ,GAAG,GAAK,EAAE,CAAE,CAAC;QAElC,OAAO,OAAO,CAAC;IACjB,CAAC;IAJe,oCAAsB,yBAIrC,CAAA;AACH,CAAC,EAjCgB,aAAa,GAAb,qBAAa,KAAb,qBAAa,QAiC7B"}
@@ -120,6 +120,12 @@ export interface Secret {
120
120
  * The OCID of the vault where the secret exists.
121
121
  */
122
122
  "vaultId": string;
123
+ "secretGenerationContext"?: model.PassphraseGenerationContext | model.SshKeyGenerationContext | model.BytesGenerationContext;
124
+ /**
125
+ * The value of this flag determines whether or not secret content will be generated automatically.
126
+ *
127
+ */
128
+ "isAutoGenerationEnabled"?: boolean;
123
129
  }
124
130
  export declare namespace Secret {
125
131
  enum LifecycleState {