-
Notifications
You must be signed in to change notification settings - Fork 80
/
key.go
241 lines (202 loc) · 11.1 KB
/
key.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
// Copyright (c) 2016, 2018, 2024, Oracle and/or its affiliates. All rights reserved.
// This software is dual-licensed to you under the Universal Permissive License (UPL) 1.0 as shown at https://oss.oracle.com/licenses/upl or Apache License 2.0 as shown at http://www.apache.org/licenses/LICENSE-2.0. You may choose either license.
// Code generated. DO NOT EDIT.
// Vault Key Management API
//
// Use the Key Management API to manage vaults and keys. For more information, see Managing Vaults (https://docs.cloud.oracle.com/Content/KeyManagement/Tasks/managingvaults.htm) and Managing Keys (https://docs.cloud.oracle.com/Content/KeyManagement/Tasks/managingkeys.htm).
//
package keymanagement
import (
"fmt"
"github.com/oracle/oci-go-sdk/v65/common"
"strings"
)
// Key The logical entities that represent one or more key versions, each of which contains cryptographic material.
type Key struct {
// The OCID of the compartment that contains this master encryption key.
CompartmentId *string `mandatory:"true" json:"compartmentId"`
// The OCID of the key version used in cryptographic operations. During key rotation, the service might be
// in a transitional state where this or a newer key version are used intermittently. The `currentKeyVersion`
// property is updated when the service is guaranteed to use the new key version for all subsequent encryption operations.
CurrentKeyVersion *string `mandatory:"true" json:"currentKeyVersion"`
// A user-friendly name for the key. It does not have to be unique, and it is changeable.
// Avoid entering confidential information.
DisplayName *string `mandatory:"true" json:"displayName"`
// The OCID of the key.
Id *string `mandatory:"true" json:"id"`
KeyShape *KeyShape `mandatory:"true" json:"keyShape"`
// The key's current lifecycle state.
// Example: `ENABLED`
LifecycleState KeyLifecycleStateEnum `mandatory:"true" json:"lifecycleState"`
// The date and time the key was created, expressed in RFC 3339 (https://tools.ietf.org/html/rfc3339) timestamp format.
// Example: `2018-04-03T21:10:29.600Z`
TimeCreated *common.SDKTime `mandatory:"true" json:"timeCreated"`
// The OCID of the vault that contains this key.
VaultId *string `mandatory:"true" json:"vaultId"`
// Defined tags for this resource. Each key is predefined and scoped to a namespace.
// For more information, see Resource Tags (https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
// Example: `{"Operations": {"CostCenter": "42"}}`
DefinedTags map[string]map[string]interface{} `mandatory:"false" json:"definedTags"`
// Free-form tags for this resource. Each tag is a simple key-value pair with no predefined name, type, or namespace.
// For more information, see Resource Tags (https://docs.cloud.oracle.com/Content/General/Concepts/resourcetags.htm).
// Example: `{"Department": "Finance"}`
FreeformTags map[string]string `mandatory:"false" json:"freeformTags"`
// The key's protection mode indicates how the key persists and where cryptographic operations that use the key are performed.
// A protection mode of `HSM` means that the key persists on a hardware security module (HSM) and all cryptographic operations are performed inside
// the HSM. A protection mode of `SOFTWARE` means that the key persists on the server, protected by the vault's RSA wrapping key which persists
// on the HSM. All cryptographic operations that use a key with a protection mode of `SOFTWARE` are performed on the server. By default,
// a key's protection mode is set to `HSM`. You can't change a key's protection mode after the key is created or imported.
// A protection mode of `EXTERNAL` mean that the key persists on the customer's external key manager which is hosted externally outside of oracle.
// Oracle only hold a reference to that key.
// All cryptographic operations that use a key with a protection mode of `EXTERNAL` are performed by external key manager.
ProtectionMode KeyProtectionModeEnum `mandatory:"false" json:"protectionMode,omitempty"`
// An optional property indicating when to delete the key, expressed in RFC 3339 (https://tools.ietf.org/html/rfc3339) timestamp format.
// Example: `2019-04-03T21:10:29.600Z`
TimeOfDeletion *common.SDKTime `mandatory:"false" json:"timeOfDeletion"`
// The OCID of the key from which this key was restored.
RestoredFromKeyId *string `mandatory:"false" json:"restoredFromKeyId"`
ReplicaDetails *KeyReplicaDetails `mandatory:"false" json:"replicaDetails"`
// A Boolean value that indicates whether the Key belongs to primary Vault or replica vault.
IsPrimary *bool `mandatory:"false" json:"isPrimary"`
// A parameter specifying whether the auto key rotation is enabled or not.
IsAutoRotationEnabled *bool `mandatory:"false" json:"isAutoRotationEnabled"`
AutoKeyRotationDetails *AutoKeyRotationDetails `mandatory:"false" json:"autoKeyRotationDetails"`
ExternalKeyReferenceDetails *ExternalKeyReferenceDetails `mandatory:"false" json:"externalKeyReferenceDetails"`
}
func (m Key) String() string {
return common.PointerString(m)
}
// ValidateEnumValue returns an error when providing an unsupported enum value
// This function is being called during constructing API request process
// Not recommended for calling this function directly
func (m Key) ValidateEnumValue() (bool, error) {
errMessage := []string{}
if _, ok := GetMappingKeyLifecycleStateEnum(string(m.LifecycleState)); !ok && m.LifecycleState != "" {
errMessage = append(errMessage, fmt.Sprintf("unsupported enum value for LifecycleState: %s. Supported values are: %s.", m.LifecycleState, strings.Join(GetKeyLifecycleStateEnumStringValues(), ",")))
}
if _, ok := GetMappingKeyProtectionModeEnum(string(m.ProtectionMode)); !ok && m.ProtectionMode != "" {
errMessage = append(errMessage, fmt.Sprintf("unsupported enum value for ProtectionMode: %s. Supported values are: %s.", m.ProtectionMode, strings.Join(GetKeyProtectionModeEnumStringValues(), ",")))
}
if len(errMessage) > 0 {
return true, fmt.Errorf(strings.Join(errMessage, "\n"))
}
return false, nil
}
// KeyProtectionModeEnum Enum with underlying type: string
type KeyProtectionModeEnum string
// Set of constants representing the allowable values for KeyProtectionModeEnum
const (
KeyProtectionModeHsm KeyProtectionModeEnum = "HSM"
KeyProtectionModeSoftware KeyProtectionModeEnum = "SOFTWARE"
KeyProtectionModeExternal KeyProtectionModeEnum = "EXTERNAL"
)
var mappingKeyProtectionModeEnum = map[string]KeyProtectionModeEnum{
"HSM": KeyProtectionModeHsm,
"SOFTWARE": KeyProtectionModeSoftware,
"EXTERNAL": KeyProtectionModeExternal,
}
var mappingKeyProtectionModeEnumLowerCase = map[string]KeyProtectionModeEnum{
"hsm": KeyProtectionModeHsm,
"software": KeyProtectionModeSoftware,
"external": KeyProtectionModeExternal,
}
// GetKeyProtectionModeEnumValues Enumerates the set of values for KeyProtectionModeEnum
func GetKeyProtectionModeEnumValues() []KeyProtectionModeEnum {
values := make([]KeyProtectionModeEnum, 0)
for _, v := range mappingKeyProtectionModeEnum {
values = append(values, v)
}
return values
}
// GetKeyProtectionModeEnumStringValues Enumerates the set of values in String for KeyProtectionModeEnum
func GetKeyProtectionModeEnumStringValues() []string {
return []string{
"HSM",
"SOFTWARE",
"EXTERNAL",
}
}
// GetMappingKeyProtectionModeEnum performs case Insensitive comparison on enum value and return the desired enum
func GetMappingKeyProtectionModeEnum(val string) (KeyProtectionModeEnum, bool) {
enum, ok := mappingKeyProtectionModeEnumLowerCase[strings.ToLower(val)]
return enum, ok
}
// KeyLifecycleStateEnum Enum with underlying type: string
type KeyLifecycleStateEnum string
// Set of constants representing the allowable values for KeyLifecycleStateEnum
const (
KeyLifecycleStateCreating KeyLifecycleStateEnum = "CREATING"
KeyLifecycleStateEnabling KeyLifecycleStateEnum = "ENABLING"
KeyLifecycleStateEnabled KeyLifecycleStateEnum = "ENABLED"
KeyLifecycleStateDisabling KeyLifecycleStateEnum = "DISABLING"
KeyLifecycleStateDisabled KeyLifecycleStateEnum = "DISABLED"
KeyLifecycleStateDeleting KeyLifecycleStateEnum = "DELETING"
KeyLifecycleStateDeleted KeyLifecycleStateEnum = "DELETED"
KeyLifecycleStatePendingDeletion KeyLifecycleStateEnum = "PENDING_DELETION"
KeyLifecycleStateSchedulingDeletion KeyLifecycleStateEnum = "SCHEDULING_DELETION"
KeyLifecycleStateCancellingDeletion KeyLifecycleStateEnum = "CANCELLING_DELETION"
KeyLifecycleStateUpdating KeyLifecycleStateEnum = "UPDATING"
KeyLifecycleStateBackupInProgress KeyLifecycleStateEnum = "BACKUP_IN_PROGRESS"
KeyLifecycleStateRestoring KeyLifecycleStateEnum = "RESTORING"
)
var mappingKeyLifecycleStateEnum = map[string]KeyLifecycleStateEnum{
"CREATING": KeyLifecycleStateCreating,
"ENABLING": KeyLifecycleStateEnabling,
"ENABLED": KeyLifecycleStateEnabled,
"DISABLING": KeyLifecycleStateDisabling,
"DISABLED": KeyLifecycleStateDisabled,
"DELETING": KeyLifecycleStateDeleting,
"DELETED": KeyLifecycleStateDeleted,
"PENDING_DELETION": KeyLifecycleStatePendingDeletion,
"SCHEDULING_DELETION": KeyLifecycleStateSchedulingDeletion,
"CANCELLING_DELETION": KeyLifecycleStateCancellingDeletion,
"UPDATING": KeyLifecycleStateUpdating,
"BACKUP_IN_PROGRESS": KeyLifecycleStateBackupInProgress,
"RESTORING": KeyLifecycleStateRestoring,
}
var mappingKeyLifecycleStateEnumLowerCase = map[string]KeyLifecycleStateEnum{
"creating": KeyLifecycleStateCreating,
"enabling": KeyLifecycleStateEnabling,
"enabled": KeyLifecycleStateEnabled,
"disabling": KeyLifecycleStateDisabling,
"disabled": KeyLifecycleStateDisabled,
"deleting": KeyLifecycleStateDeleting,
"deleted": KeyLifecycleStateDeleted,
"pending_deletion": KeyLifecycleStatePendingDeletion,
"scheduling_deletion": KeyLifecycleStateSchedulingDeletion,
"cancelling_deletion": KeyLifecycleStateCancellingDeletion,
"updating": KeyLifecycleStateUpdating,
"backup_in_progress": KeyLifecycleStateBackupInProgress,
"restoring": KeyLifecycleStateRestoring,
}
// GetKeyLifecycleStateEnumValues Enumerates the set of values for KeyLifecycleStateEnum
func GetKeyLifecycleStateEnumValues() []KeyLifecycleStateEnum {
values := make([]KeyLifecycleStateEnum, 0)
for _, v := range mappingKeyLifecycleStateEnum {
values = append(values, v)
}
return values
}
// GetKeyLifecycleStateEnumStringValues Enumerates the set of values in String for KeyLifecycleStateEnum
func GetKeyLifecycleStateEnumStringValues() []string {
return []string{
"CREATING",
"ENABLING",
"ENABLED",
"DISABLING",
"DISABLED",
"DELETING",
"DELETED",
"PENDING_DELETION",
"SCHEDULING_DELETION",
"CANCELLING_DELETION",
"UPDATING",
"BACKUP_IN_PROGRESS",
"RESTORING",
}
}
// GetMappingKeyLifecycleStateEnum performs case Insensitive comparison on enum value and return the desired enum
func GetMappingKeyLifecycleStateEnum(val string) (KeyLifecycleStateEnum, bool) {
enum, ok := mappingKeyLifecycleStateEnumLowerCase[strings.ToLower(val)]
return enum, ok
}