diff --git a/ibm_secrets_manager_sdk/secrets_manager_v2.py b/ibm_secrets_manager_sdk/secrets_manager_v2.py index fece0a7..bb1e07a 100644 --- a/ibm_secrets_manager_sdk/secrets_manager_v2.py +++ b/ibm_secrets_manager_sdk/secrets_manager_v2.py @@ -14,7 +14,7 @@ # See the License for the specific language governing permissions and # limitations under the License. -# IBM OpenAPI SDK Code Generator Version: 3.107.0-b68ebf7a-20250811-145645 +# IBM OpenAPI SDK Code Generator Version: 3.104.0-b4a47c49-20250418-184351 """ With IBM Cloud® Secrets Manager, you can create, lease, and centrally manage secrets that @@ -80,7 +80,7 @@ def construct_service_url( :param str instance_id: (optional) The Secrets Manager Instance ID assigned by the service provider (default 'provide-here-your-smgr-instanceuuid') - :param str region: (optional) The region where you provisioned your Secrets Manager Instance. Available values: us-south, us-east, au-syd, jp-osa, jp-tok, eu-de, eu-gb, eu-es, ca-tor, ca-mon, br-sao + :param str region: (optional) The region where you provisioned your Secrets Manager Instance. Available values: us-south, us-east, au-syd, jp-osa, jp-tok, eu-de, eu-gb, eu-es, ca-tor, br-sao (default 'us-south') :return: The formatted URL with all variable placeholders replaced by values. :rtype: str @@ -442,8 +442,8 @@ def list_secrets( `..?limit=25`. :param str sort: (optional) Sort a collection of secrets by the specified field in ascending order. To sort in descending order use the `-` character - **Available values:** id | created_at | updated_at | retrieved_at | - expiration_date | secret_type | name + **Available values:** id | created_at | updated_at | expiration_date | + secret_type | name **Usage:** To sort a list of secrets by their creation date, use `../secrets?sort=created_at`. :param str search: (optional) Obtain a collection of secrets that contain @@ -9183,9 +9183,6 @@ class ArbitrarySecret(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -9236,7 +9233,6 @@ def __init__( updated_at: datetime, versions_total: int, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -9265,9 +9261,6 @@ def __init__( :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -9284,7 +9277,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -9315,8 +9307,6 @@ def from_dict(cls, _dict: Dict) -> 'ArbitrarySecret': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in ArbitrarySecret JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -9377,8 +9367,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -9471,9 +9459,6 @@ class ArbitrarySecretMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -9522,7 +9507,6 @@ def __init__( updated_at: datetime, versions_total: int, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -9550,9 +9534,6 @@ def __init__( :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -9567,7 +9548,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -9597,8 +9577,6 @@ def from_dict(cls, _dict: Dict) -> 'ArbitrarySecretMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in ArbitrarySecretMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -9657,8 +9635,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -10558,12 +10534,6 @@ def __ne__(self, other: 'ArbitrarySecretVersionPrototype') -> bool: class CommonRotationPolicy(RotationPolicy): """ This field indicates whether Secrets Manager rotates your secrets automatically. - Rotation interval cannot exceed the assiged TTL value. - Custom Credentials: Minimum 6 hours, Maximum 3 months. - Service Credentials: Minimum 1 day, Maximum 3 months. - IAM Credentials: Minimum 1 day, Maximum 3 months. - Private certificate: Minimum 1 day, Maximum 24 months. - User credentials: Minimum 1 day, Maximum 24 months. :param bool auto_rotate: This field indicates whether Secrets Manager rotates your secret automatically. @@ -10652,7 +10622,6 @@ class UnitEnum(str, Enum): DAY = 'day' MONTH = 'month' - HOUR = 'hour' @@ -11361,9 +11330,6 @@ class CustomCredentialsSecret(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -11425,8 +11391,6 @@ class CustomCredentialsSecret(Secret): :param str processing_task_id: (optional) A Secret Manager task identifier. :param int queued_task_count: (optional) Number of queued tasks for this secret. :param str last_failed_task_id: (optional) A Secret Manager task identifier. - :param bool last_rotation_failed: (optional) Indicates if the last rotation - (automatic or manual) for the secret failed. :param str configuration: The name of the custom credentials configuration. :param dict parameters: (optional) The fields that can be passed to and from the custom credentials engine. Allowed types are 'string', 'integer' and 'boolean'. @@ -11447,7 +11411,6 @@ def __init__( configuration: str, credentials_content: dict, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -11465,7 +11428,6 @@ def __init__( processing_task_id: Optional[str] = None, queued_task_count: Optional[int] = None, last_failed_task_id: Optional[str] = None, - last_rotation_failed: Optional[bool] = None, parameters: Optional[dict] = None, ) -> None: """ @@ -11488,9 +11450,6 @@ def __init__( :param dict credentials_content: The fields that can be passed to and from the custom credentials engine. Allowed types are 'string', 'integer' and 'boolean'. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -11528,7 +11487,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -11552,7 +11510,6 @@ def __init__( self.processing_task_id = processing_task_id self.queued_task_count = queued_task_count self.last_failed_task_id = last_failed_task_id - self.last_rotation_failed = last_rotation_failed self.configuration = configuration self.parameters = parameters self.credentials_content = credentials_content @@ -11569,8 +11526,6 @@ def from_dict(cls, _dict: Dict) -> 'CustomCredentialsSecret': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in CustomCredentialsSecret JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -11629,8 +11584,6 @@ def from_dict(cls, _dict: Dict) -> 'CustomCredentialsSecret': args['queued_task_count'] = queued_task_count if (last_failed_task_id := _dict.get('last_failed_task_id')) is not None: args['last_failed_task_id'] = last_failed_task_id - if (last_rotation_failed := _dict.get('last_rotation_failed')) is not None: - args['last_rotation_failed'] = last_rotation_failed if (configuration := _dict.get('configuration')) is not None: args['configuration'] = configuration else: @@ -11655,8 +11608,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -11706,8 +11657,6 @@ def to_dict(self) -> Dict: _dict['queued_task_count'] = getattr(self, 'queued_task_count') if hasattr(self, 'last_failed_task_id') and self.last_failed_task_id is not None: _dict['last_failed_task_id'] = self.last_failed_task_id - if hasattr(self, 'last_rotation_failed') and getattr(self, 'last_rotation_failed') is not None: - _dict['last_rotation_failed'] = getattr(self, 'last_rotation_failed') if hasattr(self, 'configuration') and self.configuration is not None: _dict['configuration'] = self.configuration if hasattr(self, 'parameters') and self.parameters is not None: @@ -11772,9 +11721,6 @@ class CustomCredentialsSecretMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -11836,8 +11782,6 @@ class CustomCredentialsSecretMetadata(SecretMetadata): :param str processing_task_id: (optional) A Secret Manager task identifier. :param int queued_task_count: (optional) Number of queued tasks for this secret. :param str last_failed_task_id: (optional) A Secret Manager task identifier. - :param bool last_rotation_failed: (optional) Indicates if the last rotation - (automatic or manual) for the secret failed. :param str configuration: The name of the custom credentials configuration. :param dict parameters: (optional) The fields that can be passed to and from the custom credentials engine. Allowed types are 'string', 'integer' and 'boolean'. @@ -11855,7 +11799,6 @@ def __init__( versions_total: int, configuration: str, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -11873,7 +11816,6 @@ def __init__( processing_task_id: Optional[str] = None, queued_task_count: Optional[int] = None, last_failed_task_id: Optional[str] = None, - last_rotation_failed: Optional[bool] = None, parameters: Optional[dict] = None, ) -> None: """ @@ -11893,9 +11835,6 @@ def __init__( format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. :param str configuration: The name of the custom credentials configuration. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -11933,7 +11872,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -11957,7 +11895,6 @@ def __init__( self.processing_task_id = processing_task_id self.queued_task_count = queued_task_count self.last_failed_task_id = last_failed_task_id - self.last_rotation_failed = last_rotation_failed self.configuration = configuration self.parameters = parameters @@ -11973,8 +11910,6 @@ def from_dict(cls, _dict: Dict) -> 'CustomCredentialsSecretMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in CustomCredentialsSecretMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -12033,8 +11968,6 @@ def from_dict(cls, _dict: Dict) -> 'CustomCredentialsSecretMetadata': args['queued_task_count'] = queued_task_count if (last_failed_task_id := _dict.get('last_failed_task_id')) is not None: args['last_failed_task_id'] = last_failed_task_id - if (last_rotation_failed := _dict.get('last_rotation_failed')) is not None: - args['last_rotation_failed'] = last_rotation_failed if (configuration := _dict.get('configuration')) is not None: args['configuration'] = configuration else: @@ -12055,8 +11988,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -12106,8 +12037,6 @@ def to_dict(self) -> Dict: _dict['queued_task_count'] = getattr(self, 'queued_task_count') if hasattr(self, 'last_failed_task_id') and self.last_failed_task_id is not None: _dict['last_failed_task_id'] = self.last_failed_task_id - if hasattr(self, 'last_rotation_failed') and getattr(self, 'last_rotation_failed') is not None: - _dict['last_rotation_failed'] = getattr(self, 'last_rotation_failed') if hasattr(self, 'configuration') and self.configuration is not None: _dict['configuration'] = self.configuration if hasattr(self, 'parameters') and self.parameters is not None: @@ -13669,9 +13598,6 @@ class IAMCredentialsSecret(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -13775,7 +13701,6 @@ def __init__( ttl: str, reuse_api_key: bool, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -13828,9 +13753,6 @@ def __init__( If it is set to `true`, the service reuses the current credentials. If it is set to `false`, a new service ID and API key are generated each time that the secret is read or accessed. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -13865,7 +13787,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -13905,8 +13826,6 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecret': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in IAMCredentialsSecret JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -13989,8 +13908,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -14104,9 +14021,6 @@ class IAMCredentialsSecretMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -14205,7 +14119,6 @@ def __init__( ttl: str, reuse_api_key: bool, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -14257,9 +14170,6 @@ def __init__( If it is set to `true`, the service reuses the current credentials. If it is set to `false`, a new service ID and API key are generated each time that the secret is read or accessed. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -14294,7 +14204,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -14333,8 +14242,6 @@ def from_dict(cls, _dict: Dict) -> 'IAMCredentialsSecretMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in IAMCredentialsSecretMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -14415,8 +14322,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -15606,9 +15511,6 @@ class ImportedCertificate(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -15689,7 +15591,6 @@ def __init__( updated_at: datetime, versions_total: int, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -15731,9 +15632,6 @@ def __init__( :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -15777,7 +15675,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -15821,8 +15718,6 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificate': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in ImportedCertificate JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -15909,8 +15804,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -16035,9 +15928,6 @@ class ImportedCertificateMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -16109,7 +15999,6 @@ def __init__( updated_at: datetime, versions_total: int, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -16147,9 +16036,6 @@ def __init__( :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -16184,7 +16070,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -16224,8 +16109,6 @@ def from_dict(cls, _dict: Dict) -> 'ImportedCertificateMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in ImportedCertificateMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -16304,8 +16187,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -17372,9 +17253,6 @@ class KVSecret(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -17421,7 +17299,6 @@ def __init__( versions_total: int, data: dict, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -17449,9 +17326,6 @@ def __init__( format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. :param dict data: The payload data of a key-value secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -17466,7 +17340,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -17496,8 +17369,6 @@ def from_dict(cls, _dict: Dict) -> 'KVSecret': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in KVSecret JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -17558,8 +17429,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -17650,9 +17519,6 @@ class KVSecretMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -17697,7 +17563,6 @@ def __init__( updated_at: datetime, versions_total: int, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -17724,9 +17589,6 @@ def __init__( :param datetime updated_at: The date when a resource was modified. The date format follows `RFC 3339`. :param int versions_total: The number of versions of your secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -17741,7 +17603,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -17770,8 +17631,6 @@ def from_dict(cls, _dict: Dict) -> 'KVSecretMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in KVSecretMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -17828,8 +17687,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -18706,9 +18563,6 @@ class PrivateCertificate(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -18806,7 +18660,6 @@ def __init__( certificate: str, private_key: str, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -18860,9 +18713,6 @@ def __init__( :param str private_key: The PEM-encoded private key that is associated with the certificate. The data must be formatted on a single line with embedded newline characters. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -18884,7 +18734,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -18931,8 +18780,6 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificate': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in PrivateCertificate JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -19041,8 +18888,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -26571,9 +26416,6 @@ class PrivateCertificateMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -26660,7 +26502,6 @@ def __init__( serial_number: str, validity: 'CertificateValidity', *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -26707,9 +26548,6 @@ def __init__( certificate by the issuing certificate authority. :param CertificateValidity validity: The date and time that the certificate validity period begins and ends. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -26731,7 +26569,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -26774,8 +26611,6 @@ def from_dict(cls, _dict: Dict) -> 'PrivateCertificateMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in PrivateCertificateMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -26872,8 +26707,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -28187,9 +28020,6 @@ class PublicCertificate(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -28278,7 +28108,6 @@ def __init__( key_algorithm: str, rotation: 'RotationPolicy', *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -28331,9 +28160,6 @@ def __init__( Manager rotates your secrets automatically. Supported secret types: username_password, private_cert, public_cert, iam_credentials, custom_credentials. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -28370,7 +28196,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -28415,8 +28240,6 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificate': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in PublicCertificate JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -28509,8 +28332,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -30696,9 +30517,6 @@ class PublicCertificateMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -30779,7 +30597,6 @@ def __init__( key_algorithm: str, rotation: 'RotationPolicy', *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -30829,9 +30646,6 @@ def __init__( Manager rotates your secrets automatically. Supported secret types: username_password, private_cert, public_cert, iam_credentials, custom_credentials. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -30860,7 +30674,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -30902,8 +30715,6 @@ def from_dict(cls, _dict: Dict) -> 'PublicCertificateMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in PublicCertificateMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -30990,8 +30801,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -32398,9 +32207,6 @@ class ServiceCredentialsSecret(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -32476,7 +32282,6 @@ def __init__( source_service: 'ServiceCredentialsSecretSourceServiceRO', credentials: 'ServiceCredentialsSecretCredentials', *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -32512,9 +32317,6 @@ def __init__( instance. :param ServiceCredentialsSecretCredentials credentials: The properties of the service credentials secret payload. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -32546,7 +32348,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -32581,8 +32382,6 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecret': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in ServiceCredentialsSecret JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -32655,8 +32454,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -32766,9 +32563,6 @@ class ServiceCredentialsSecretMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -32841,7 +32635,6 @@ def __init__( versions_total: int, source_service: 'ServiceCredentialsSecretSourceServiceRO', *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -32875,9 +32668,6 @@ def __init__( :param ServiceCredentialsSecretSourceServiceRO source_service: The properties of the resource key that was created for this source service instance. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -32909,7 +32699,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -32943,8 +32732,6 @@ def from_dict(cls, _dict: Dict) -> 'ServiceCredentialsSecretMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in ServiceCredentialsSecretMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -33013,8 +32800,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -34031,9 +33816,6 @@ class UsernamePasswordSecret(Secret): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -34099,7 +33881,6 @@ def __init__( username: str, password: str, *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -34137,9 +33918,6 @@ def __init__( `username_password` secret. :param str password: The password that is assigned to an `username_password` secret. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -34156,7 +33934,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -34191,8 +33968,6 @@ def from_dict(cls, _dict: Dict) -> 'UsernamePasswordSecret': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in UsernamePasswordSecret JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -34267,8 +34042,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -34375,9 +34148,6 @@ class UsernamePasswordSecretMetadata(SecretMetadata): that created the secret. :param datetime created_at: The date when the resource was created. The date format follows `RFC 3339`. - :param datetime retrieved_at: (optional) The date when the data of the secret - was last retrieved. The date format follows RFC 3339. Epoch date if there is no - record of secret data retrieval. :param str crn: A CRN that uniquely identifies an IBM Cloud resource. :param dict custom_metadata: (optional) The secret metadata that a user can customize. @@ -34437,7 +34207,6 @@ def __init__( versions_total: int, rotation: 'RotationPolicy', *, - retrieved_at: Optional[datetime] = None, custom_metadata: Optional[dict] = None, description: Optional[str] = None, downloaded: Optional[bool] = None, @@ -34471,9 +34240,6 @@ def __init__( Manager rotates your secrets automatically. Supported secret types: username_password, private_cert, public_cert, iam_credentials, custom_credentials. - :param datetime retrieved_at: (optional) The date when the data of the - secret was last retrieved. The date format follows RFC 3339. Epoch date if - there is no record of secret data retrieval. :param dict custom_metadata: (optional) The secret metadata that a user can customize. :param str description: (optional) An extended description of your secret. @@ -34490,7 +34256,6 @@ def __init__( # pylint: disable=super-init-not-called self.created_by = created_by self.created_at = created_at - self.retrieved_at = retrieved_at self.crn = crn self.custom_metadata = custom_metadata self.description = description @@ -34523,8 +34288,6 @@ def from_dict(cls, _dict: Dict) -> 'UsernamePasswordSecretMetadata': args['created_at'] = string_to_datetime(created_at) else: raise ValueError('Required property \'created_at\' not present in UsernamePasswordSecretMetadata JSON') - if (retrieved_at := _dict.get('retrieved_at')) is not None: - args['retrieved_at'] = string_to_datetime(retrieved_at) if (crn := _dict.get('crn')) is not None: args['crn'] = crn else: @@ -34591,8 +34354,6 @@ def to_dict(self) -> Dict: _dict['created_by'] = self.created_by if hasattr(self, 'created_at') and self.created_at is not None: _dict['created_at'] = datetime_to_string(self.created_at) - if hasattr(self, 'retrieved_at') and self.retrieved_at is not None: - _dict['retrieved_at'] = datetime_to_string(self.retrieved_at) if hasattr(self, 'crn') and self.crn is not None: _dict['crn'] = self.crn if hasattr(self, 'custom_metadata') and self.custom_metadata is not None: @@ -35624,8 +35385,8 @@ def __init__( `..?limit=25`. :param str sort: (optional) Sort a collection of secrets by the specified field in ascending order. To sort in descending order use the `-` character - **Available values:** id | created_at | updated_at | retrieved_at | - expiration_date | secret_type | name + **Available values:** id | created_at | updated_at | expiration_date | + secret_type | name **Usage:** To sort a list of secrets by their creation date, use `../secrets?sort=created_at`. :param str search: (optional) Obtain a collection of secrets that contain diff --git a/test/unit/test_secrets_manager_v2.py b/test/unit/test_secrets_manager_v2.py index 0eea423..c85e7f7 100644 --- a/test/unit/test_secrets_manager_v2.py +++ b/test/unit/test_secrets_manager_v2.py @@ -530,7 +530,7 @@ def test_create_secret_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/secrets') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.POST, url, @@ -583,7 +583,7 @@ def test_create_secret_value_error(self): """ # Set up mock url = preprocess_url('/api/v2/secrets') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.POST, url, @@ -638,7 +638,7 @@ def test_list_secrets_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/secrets') - mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "secrets": [{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}]}' + mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "secrets": [{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}]}' responses.add( responses.GET, url, @@ -698,7 +698,7 @@ def test_list_secrets_required_params(self): """ # Set up mock url = preprocess_url('/api/v2/secrets') - mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "secrets": [{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}]}' + mock_response = '{"total_count": 0, "limit": 25, "offset": 25, "first": {"href": "href"}, "next": {"href": "href"}, "previous": {"href": "href"}, "last": {"href": "href"}, "secrets": [{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}]}' responses.add( responses.GET, url, @@ -730,8 +730,8 @@ def test_list_secrets_with_pager_get_next(self): """ # Set up a two-page mock response url = preprocess_url('/api/v2/secrets') - mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","retrieved_at":"2025-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' - mock_response2 = '{"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","retrieved_at":"2025-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' + mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' + mock_response2 = '{"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' responses.add( responses.GET, url, @@ -771,8 +771,8 @@ def test_list_secrets_with_pager_get_all(self): """ # Set up a two-page mock response url = preprocess_url('/api/v2/secrets') - mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","retrieved_at":"2025-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' - mock_response2 = '{"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","retrieved_at":"2025-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' + mock_response1 = '{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' + mock_response2 = '{"total_count":2,"limit":1,"secrets":[{"created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","crn":"crn","custom_metadata":{"anyKey":"anyValue"},"description":"Extended description for this secret.","downloaded":true,"id":"b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5","labels":["my-label"],"locks_total":0,"name":"my-secret","secret_group_id":"default","secret_type":"arbitrary","state":0,"state_description":"active","updated_at":"2022-04-12T23:20:50.520Z","versions_total":0,"referenced_by":["my-example-engine-config"],"expiration_date":"2033-04-12T23:20:50.520Z"}]}' responses.add( responses.GET, url, @@ -815,7 +815,7 @@ def test_get_secret_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.GET, url, @@ -853,7 +853,7 @@ def test_get_secret_value_error(self): """ # Set up mock url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.GET, url, @@ -1012,7 +1012,7 @@ def test_get_secret_metadata_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/metadata') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.GET, url, @@ -1050,7 +1050,7 @@ def test_get_secret_metadata_value_error(self): """ # Set up mock url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/metadata') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.GET, url, @@ -1093,7 +1093,7 @@ def test_update_secret_metadata_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/metadata') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.PATCH, url, @@ -1144,7 +1144,7 @@ def test_update_secret_metadata_value_error(self): """ # Set up mock url = preprocess_url('/api/v2/secrets/0b5571f7-21e6-42b7-91c5-3f5ac9793a46/metadata') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z"}' responses.add( responses.PATCH, url, @@ -1293,7 +1293,7 @@ def test_get_secret_by_name_type_all_params(self): """ # Set up mock url = preprocess_url('/api/v2/secret_groups/default/secret_types/arbitrary/secrets/my-secret') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.GET, url, @@ -1335,7 +1335,7 @@ def test_get_secret_by_name_type_value_error(self): """ # Set up mock url = preprocess_url('/api/v2/secret_groups/default/secret_types/arbitrary/secrets/my-secret') - mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "retrieved_at": "2025-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' + mock_response = '{"created_by": "iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21", "created_at": "2022-04-12T23:20:50.520Z", "crn": "crn", "custom_metadata": {"anyKey": "anyValue"}, "description": "Extended description for this secret.", "downloaded": true, "id": "b49ad24d-81d4-5ebc-b9b9-b0937d1c84d5", "labels": ["my-label"], "locks_total": 0, "name": "my-secret", "secret_group_id": "default", "secret_type": "arbitrary", "state": 0, "state_description": "active", "updated_at": "2022-04-12T23:20:50.520Z", "versions_total": 0, "referenced_by": ["my-example-engine-config"], "expiration_date": "2033-04-12T23:20:50.520Z", "payload": "secret-credentials"}' responses.add( responses.GET, url, @@ -5820,7 +5820,6 @@ def test_secret_metadata_paginated_collection_serialization(self): secret_metadata_model = {} # ArbitrarySecretMetadata secret_metadata_model['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' secret_metadata_model['created_at'] = '2022-04-12T23:20:50.520000Z' - secret_metadata_model['retrieved_at'] = '2025-04-12T23:20:50.520000Z' secret_metadata_model['crn'] = 'testString' secret_metadata_model['custom_metadata'] = {'key': 'value'} secret_metadata_model['description'] = 'Extended description for this secret.' @@ -6632,7 +6631,6 @@ def test_arbitrary_secret_serialization(self): arbitrary_secret_model_json = {} arbitrary_secret_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' arbitrary_secret_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - arbitrary_secret_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' arbitrary_secret_model_json['crn'] = 'testString' arbitrary_secret_model_json['custom_metadata'] = {'key': 'value'} arbitrary_secret_model_json['description'] = 'Extended description for this secret.' @@ -6674,7 +6672,6 @@ def test_arbitrary_secret_metadata_serialization(self): arbitrary_secret_metadata_model_json = {} arbitrary_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' arbitrary_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - arbitrary_secret_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' arbitrary_secret_metadata_model_json['crn'] = 'testString' arbitrary_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} arbitrary_secret_metadata_model_json['description'] = 'Extended description for this secret.' @@ -7128,7 +7125,6 @@ def test_custom_credentials_secret_serialization(self): custom_credentials_secret_model_json = {} custom_credentials_secret_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' custom_credentials_secret_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - custom_credentials_secret_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' custom_credentials_secret_model_json['crn'] = 'testString' custom_credentials_secret_model_json['custom_metadata'] = {'key': 'value'} custom_credentials_secret_model_json['description'] = 'Extended description for this secret.' @@ -7183,7 +7179,6 @@ def test_custom_credentials_secret_metadata_serialization(self): custom_credentials_secret_metadata_model_json = {} custom_credentials_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' custom_credentials_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - custom_credentials_secret_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' custom_credentials_secret_metadata_model_json['crn'] = 'testString' custom_credentials_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} custom_credentials_secret_metadata_model_json['description'] = 'Extended description for this secret.' @@ -7575,7 +7570,6 @@ def test_iam_credentials_secret_serialization(self): iam_credentials_secret_model_json = {} iam_credentials_secret_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' iam_credentials_secret_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - iam_credentials_secret_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' iam_credentials_secret_model_json['crn'] = 'testString' iam_credentials_secret_model_json['custom_metadata'] = {'key': 'value'} iam_credentials_secret_model_json['description'] = 'Extended description for this secret.' @@ -7629,7 +7623,6 @@ def test_iam_credentials_secret_metadata_serialization(self): iam_credentials_secret_metadata_model_json = {} iam_credentials_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' iam_credentials_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - iam_credentials_secret_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' iam_credentials_secret_metadata_model_json['crn'] = 'testString' iam_credentials_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} iam_credentials_secret_metadata_model_json['description'] = 'Extended description for this secret.' @@ -7946,7 +7939,6 @@ def test_imported_certificate_serialization(self): imported_certificate_model_json = {} imported_certificate_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' imported_certificate_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - imported_certificate_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' imported_certificate_model_json['crn'] = 'testString' imported_certificate_model_json['custom_metadata'] = {'key': 'value'} imported_certificate_model_json['description'] = 'Extended description for this secret.' @@ -8036,7 +8028,6 @@ def test_imported_certificate_metadata_serialization(self): imported_certificate_metadata_model_json = {} imported_certificate_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' imported_certificate_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - imported_certificate_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' imported_certificate_metadata_model_json['crn'] = 'testString' imported_certificate_metadata_model_json['custom_metadata'] = {'key': 'value'} imported_certificate_metadata_model_json['description'] = 'Extended description for this secret.' @@ -8352,7 +8343,6 @@ def test_kv_secret_serialization(self): kv_secret_model_json = {} kv_secret_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' kv_secret_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - kv_secret_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' kv_secret_model_json['crn'] = 'testString' kv_secret_model_json['custom_metadata'] = {'key': 'value'} kv_secret_model_json['description'] = 'Extended description for this secret.' @@ -8394,7 +8384,6 @@ def test_kv_secret_metadata_serialization(self): kv_secret_metadata_model_json = {} kv_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' kv_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - kv_secret_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' kv_secret_metadata_model_json['crn'] = 'testString' kv_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} kv_secret_metadata_model_json['description'] = 'Extended description for this secret.' @@ -8627,7 +8616,6 @@ def test_private_certificate_serialization(self): private_certificate_model_json = {} private_certificate_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - private_certificate_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' private_certificate_model_json['crn'] = 'testString' private_certificate_model_json['custom_metadata'] = {'key': 'value'} private_certificate_model_json['description'] = 'Extended description for this secret.' @@ -10033,7 +10021,6 @@ def test_private_certificate_metadata_serialization(self): private_certificate_metadata_model_json = {} private_certificate_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' private_certificate_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - private_certificate_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' private_certificate_metadata_model_json['crn'] = 'testString' private_certificate_metadata_model_json['custom_metadata'] = {'key': 'value'} private_certificate_metadata_model_json['description'] = 'Extended description for this secret.' @@ -10377,7 +10364,6 @@ def test_public_certificate_serialization(self): public_certificate_model_json = {} public_certificate_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' public_certificate_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' public_certificate_model_json['crn'] = 'testString' public_certificate_model_json['custom_metadata'] = {'key': 'value'} public_certificate_model_json['description'] = 'Extended description for this secret.' @@ -10913,7 +10899,6 @@ def test_public_certificate_metadata_serialization(self): public_certificate_metadata_model_json = {} public_certificate_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' public_certificate_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - public_certificate_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' public_certificate_metadata_model_json['crn'] = 'testString' public_certificate_metadata_model_json['custom_metadata'] = {'key': 'value'} public_certificate_metadata_model_json['description'] = 'Extended description for this secret.' @@ -11362,7 +11347,6 @@ def test_service_credentials_secret_serialization(self): service_credentials_secret_model_json = {} service_credentials_secret_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' service_credentials_secret_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - service_credentials_secret_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' service_credentials_secret_model_json['crn'] = 'testString' service_credentials_secret_model_json['custom_metadata'] = {'key': 'value'} service_credentials_secret_model_json['description'] = 'Extended description for this secret.' @@ -11444,7 +11428,6 @@ def test_service_credentials_secret_metadata_serialization(self): service_credentials_secret_metadata_model_json = {} service_credentials_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' service_credentials_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - service_credentials_secret_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' service_credentials_secret_metadata_model_json['crn'] = 'testString' service_credentials_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} service_credentials_secret_metadata_model_json['description'] = 'Extended description for this secret.' @@ -11727,7 +11710,6 @@ def test_username_password_secret_serialization(self): username_password_secret_model_json = {} username_password_secret_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' username_password_secret_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - username_password_secret_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' username_password_secret_model_json['crn'] = 'testString' username_password_secret_model_json['custom_metadata'] = {'key': 'value'} username_password_secret_model_json['description'] = 'Extended description for this secret.' @@ -11785,7 +11767,6 @@ def test_username_password_secret_metadata_serialization(self): username_password_secret_metadata_model_json = {} username_password_secret_metadata_model_json['created_by'] = 'iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21' username_password_secret_metadata_model_json['created_at'] = '2022-04-12T23:20:50.520000Z' - username_password_secret_metadata_model_json['retrieved_at'] = '2025-04-12T23:20:50.520000Z' username_password_secret_metadata_model_json['crn'] = 'testString' username_password_secret_metadata_model_json['custom_metadata'] = {'key': 'value'} username_password_secret_metadata_model_json['description'] = 'Extended description for this secret.'