/
secret_expiry_rule.go
69 lines (57 loc) · 3.02 KB
/
secret_expiry_rule.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// Vault Secret Management API
//
// Use the Secret Management API to manage secrets and secret versions. For more information, see Managing Secrets (https://docs.cloud.oracle.com/Content/KeyManagement/Tasks/managingsecrets.htm).
//
package vault
import (
"encoding/json"
"fmt"
"github.com/oracle/oci-go-sdk/v65/common"
"strings"
)
// SecretExpiryRule A rule that helps enforce the expiration of a secret's contents.
type SecretExpiryRule struct {
// A property indicating how long the secret contents will be considered valid, expressed in
// ISO 8601 (https://en.wikipedia.org/wiki/ISO_8601#Time_intervals) format. The secret needs to be
// updated when the secret content expires.
// The timer resets after you update the secret contents.
// The minimum value is 1 day and the maximum value is 90 days for this property. Currently, only intervals expressed in days are supported.
// For example, pass `P3D` to have the secret version expire every 3 days.
SecretVersionExpiryInterval *string `mandatory:"false" json:"secretVersionExpiryInterval"`
// An optional property indicating the absolute time when this secret will expire, expressed in RFC 3339 (https://tools.ietf.org/html/rfc3339) timestamp format.
// The minimum number of days from current time is 1 day and the maximum number of days from current time is 365 days.
// Example: `2019-04-03T21:10:29.600Z`
TimeOfAbsoluteExpiry *common.SDKTime `mandatory:"false" json:"timeOfAbsoluteExpiry"`
// A property indicating whether to block retrieval of the secret content, on expiry. The default is false.
// If the secret has already expired and you would like to retrieve the secret contents,
// you need to edit the secret rule to disable this property, to allow reading the secret content.
IsSecretContentRetrievalBlockedOnExpiry *bool `mandatory:"false" json:"isSecretContentRetrievalBlockedOnExpiry"`
}
func (m SecretExpiryRule) String() string {
return common.PointerString(m)
}
// ValidateEnumValue returns an error when providing an unsupported enum value
// This function is being called during constructing API request process
// Not recommended for calling this function directly
func (m SecretExpiryRule) ValidateEnumValue() (bool, error) {
errMessage := []string{}
if len(errMessage) > 0 {
return true, fmt.Errorf(strings.Join(errMessage, "\n"))
}
return false, nil
}
// MarshalJSON marshals to json representation
func (m SecretExpiryRule) MarshalJSON() (buff []byte, e error) {
type MarshalTypeSecretExpiryRule SecretExpiryRule
s := struct {
DiscriminatorParam string `json:"ruleType"`
MarshalTypeSecretExpiryRule
}{
"SECRET_EXPIRY_RULE",
(MarshalTypeSecretExpiryRule)(m),
}
return json.Marshal(&s)
}