/
create_secret_details.go
157 lines (123 loc) · 6.26 KB
/
create_secret_details.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// Vault Secret Management API
//
// Use the Secret Management API to manage secrets and secret versions. For more information, see Managing Secrets (https://docs.cloud.oracle.com/Content/KeyManagement/Tasks/managingsecrets.htm).
//
package vault
import (
"encoding/json"
"fmt"
"github.com/oracle/oci-go-sdk/v65/common"
"strings"
)
// CreateSecretDetails The details of the secret that you want to create.
type CreateSecretDetails struct {
// The OCID of the compartment where you want to create the secret.
CompartmentId *string `mandatory:"true" json:"compartmentId"`
// The OCID of the master encryption key that is used to encrypt the secret. You must specify a symmetric key to encrypt the secret during import to the vault. You cannot encrypt secrets with asymmetric keys. Furthermore, the key must exist in the vault that you specify.
KeyId *string `mandatory:"true" json:"keyId"`
// A user-friendly name for the secret. Secret names should be unique within a vault. Avoid entering confidential information. Valid characters are uppercase or lowercase letters, numbers, hyphens, underscores, and periods.
SecretName *string `mandatory:"true" json:"secretName"`
// The OCID of the vault where you want to create the secret.
VaultId *string `mandatory:"true" json:"vaultId"`
// Defined tags for this resource. Each key is predefined and scoped to a namespace.
// For more information, see Resource Tags (https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
// Example: `{"Operations": {"CostCenter": "42"}}`
DefinedTags map[string]map[string]interface{} `mandatory:"false" json:"definedTags"`
// A brief description of the secret. Avoid entering confidential information.
Description *string `mandatory:"false" json:"description"`
// Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
// For more information, see Resource Tags (https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
// Example: `{"Department": "Finance"}`
FreeformTags map[string]string `mandatory:"false" json:"freeformTags"`
// Additional metadata that you can use to provide context about how to use the secret during rotation or
// other administrative tasks. For example, for a secret that you use to connect to a database, the additional
// metadata might specify the connection endpoint and the connection string. Provide additional metadata as key-value pairs.
Metadata map[string]interface{} `mandatory:"false" json:"metadata"`
SecretContent SecretContentDetails `mandatory:"false" json:"secretContent"`
RotationConfig *RotationConfig `mandatory:"false" json:"rotationConfig"`
// A list of rules to control how the secret is used and managed.
SecretRules []SecretRule `mandatory:"false" json:"secretRules"`
SecretGenerationContext SecretGenerationContext `mandatory:"false" json:"secretGenerationContext"`
// The value of this flag determines whether or not secret content will be generated automatically. If not set, it defaults to false.
EnableAutoGeneration *bool `mandatory:"false" json:"enableAutoGeneration"`
}
func (m CreateSecretDetails) String() string {
return common.PointerString(m)
}
// ValidateEnumValue returns an error when providing an unsupported enum value
// This function is being called during constructing API request process
// Not recommended for calling this function directly
func (m CreateSecretDetails) ValidateEnumValue() (bool, error) {
errMessage := []string{}
if len(errMessage) > 0 {
return true, fmt.Errorf(strings.Join(errMessage, "\n"))
}
return false, nil
}
// UnmarshalJSON unmarshals from json
func (m *CreateSecretDetails) UnmarshalJSON(data []byte) (e error) {
model := struct {
DefinedTags map[string]map[string]interface{} `json:"definedTags"`
Description *string `json:"description"`
FreeformTags map[string]string `json:"freeformTags"`
Metadata map[string]interface{} `json:"metadata"`
SecretContent secretcontentdetails `json:"secretContent"`
RotationConfig *RotationConfig `json:"rotationConfig"`
SecretRules []secretrule `json:"secretRules"`
SecretGenerationContext secretgenerationcontext `json:"secretGenerationContext"`
EnableAutoGeneration *bool `json:"enableAutoGeneration"`
CompartmentId *string `json:"compartmentId"`
KeyId *string `json:"keyId"`
SecretName *string `json:"secretName"`
VaultId *string `json:"vaultId"`
}{}
e = json.Unmarshal(data, &model)
if e != nil {
return
}
var nn interface{}
m.DefinedTags = model.DefinedTags
m.Description = model.Description
m.FreeformTags = model.FreeformTags
m.Metadata = model.Metadata
nn, e = model.SecretContent.UnmarshalPolymorphicJSON(model.SecretContent.JsonData)
if e != nil {
return
}
if nn != nil {
m.SecretContent = nn.(SecretContentDetails)
} else {
m.SecretContent = nil
}
m.RotationConfig = model.RotationConfig
m.SecretRules = make([]SecretRule, len(model.SecretRules))
for i, n := range model.SecretRules {
nn, e = n.UnmarshalPolymorphicJSON(n.JsonData)
if e != nil {
return e
}
if nn != nil {
m.SecretRules[i] = nn.(SecretRule)
} else {
m.SecretRules[i] = nil
}
}
nn, e = model.SecretGenerationContext.UnmarshalPolymorphicJSON(model.SecretGenerationContext.JsonData)
if e != nil {
return
}
if nn != nil {
m.SecretGenerationContext = nn.(SecretGenerationContext)
} else {
m.SecretGenerationContext = nil
}
m.EnableAutoGeneration = model.EnableAutoGeneration
m.CompartmentId = model.CompartmentId
m.KeyId = model.KeyId
m.SecretName = model.SecretName
m.VaultId = model.VaultId
return
}