|
15 | 15 | */
|
16 | 16 |
|
17 | 17 | /*
|
18 |
| - * IBM OpenAPI SDK Code Generator Version: 3.93.0-c40121e6-20240729-182103 |
| 18 | + * IBM OpenAPI SDK Code Generator Version: 3.94.1-71478489-20240820-161623 |
19 | 19 | */
|
20 | 20 |
|
21 | 21 | // Package secretsmanagerv2 : Operations and models for the SecretsManagerV2 service
|
@@ -477,7 +477,7 @@ func (secretsManager *SecretsManagerV2) UpdateSecretGroupWithContext(ctx context
|
477 | 477 | // Delete a secret group by specifying the ID of the secret group.
|
478 | 478 | //
|
479 | 479 | // **Note:** To delete a secret group, it must be empty. If you need to remove a secret group that contains secrets, you
|
480 |
| -// must first [delete the secrets](#delete-secret) that are associated with the group. |
| 480 | +// must first delete the secrets that are associated with the group. |
481 | 481 | func (secretsManager *SecretsManagerV2) DeleteSecretGroup(deleteSecretGroupOptions *DeleteSecretGroupOptions) (response *core.DetailedResponse, err error) {
|
482 | 482 | response, err = secretsManager.DeleteSecretGroupWithContext(context.Background(), deleteSecretGroupOptions)
|
483 | 483 | err = core.RepurposeSDKProblem(err, "")
|
@@ -701,8 +701,7 @@ func (secretsManager *SecretsManagerV2) ListSecretsWithContext(ctx context.Conte
|
701 | 701 | // Get a secret and its details by specifying the ID of the secret.
|
702 | 702 | //
|
703 | 703 | // A successful request returns the secret data that is associated with your secret, along with other metadata. To view
|
704 |
| -// only the details of a specified secret without retrieving its value, use the [Get secret |
705 |
| -// metadata](#get-secret-metadata) operation. |
| 704 | +// only the details of a specified secret without retrieving its value, use the Get secret metadata operation. |
706 | 705 | func (secretsManager *SecretsManagerV2) GetSecret(getSecretOptions *GetSecretOptions) (result SecretIntf, response *core.DetailedResponse, err error) {
|
707 | 706 | result, response, err = secretsManager.GetSecretWithContext(context.Background(), getSecretOptions)
|
708 | 707 | err = core.RepurposeSDKProblem(err, "")
|
@@ -1054,8 +1053,7 @@ func (secretsManager *SecretsManagerV2) CreateSecretActionWithContext(ctx contex
|
1054 | 1053 | // Get a secret and its details by specifying the Name and Type of the secret.
|
1055 | 1054 | //
|
1056 | 1055 | // A successful request returns the secret data that is associated with your secret, along with other metadata. To view
|
1057 |
| -// only the details of a specified secret without retrieving its value, use the [Get secret |
1058 |
| -// metadata](#get-secret-metadata) operation. |
| 1056 | +// only the details of a specified secret without retrieving its value, use the Get secret metadata operation. |
1059 | 1057 | func (secretsManager *SecretsManagerV2) GetSecretByNameType(getSecretByNameTypeOptions *GetSecretByNameTypeOptions) (result SecretIntf, response *core.DetailedResponse, err error) {
|
1060 | 1058 | result, response, err = secretsManager.GetSecretByNameTypeWithContext(context.Background(), getSecretByNameTypeOptions)
|
1061 | 1059 | err = core.RepurposeSDKProblem(err, "")
|
@@ -12984,6 +12982,10 @@ type IAMCredentialsSecretVersion struct {
|
12984 | 12982 | // A v4 UUID identifier.
|
12985 | 12983 | SecretID *string `json:"secret_id" validate:"required"`
|
12986 | 12984 |
|
| 12985 | + // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types: |
| 12986 | + // Arbitrary, username_password. |
| 12987 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
| 12988 | + |
12987 | 12989 | // The ID of the API key that is generated for this secret.
|
12988 | 12990 | ApiKeyID *string `json:"api_key_id,omitempty"`
|
12989 | 12991 |
|
@@ -13094,6 +13096,11 @@ func UnmarshalIAMCredentialsSecretVersion(m map[string]json.RawMessage, result i
|
13094 | 13096 | err = core.SDKErrorf(err, "", "secret_id-error", common.GetComponentInfo())
|
13095 | 13097 | return
|
13096 | 13098 | }
|
| 13099 | + err = core.UnmarshalPrimitive(m, "expiration_date", &obj.ExpirationDate) |
| 13100 | + if err != nil { |
| 13101 | + err = core.SDKErrorf(err, "", "expiration_date-error", common.GetComponentInfo()) |
| 13102 | + return |
| 13103 | + } |
13097 | 13104 | err = core.UnmarshalPrimitive(m, "api_key_id", &obj.ApiKeyID)
|
13098 | 13105 | if err != nil {
|
13099 | 13106 | err = core.SDKErrorf(err, "", "api_key_id-error", common.GetComponentInfo())
|
@@ -13155,6 +13162,10 @@ type IAMCredentialsSecretVersionMetadata struct {
|
13155 | 13162 | // A v4 UUID identifier.
|
13156 | 13163 | SecretID *string `json:"secret_id" validate:"required"`
|
13157 | 13164 |
|
| 13165 | + // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types: |
| 13166 | + // Arbitrary, username_password. |
| 13167 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
| 13168 | + |
13158 | 13169 | // The ID of the API key that is generated for this secret.
|
13159 | 13170 | ApiKeyID *string `json:"api_key_id,omitempty"`
|
13160 | 13171 |
|
@@ -13258,6 +13269,11 @@ func UnmarshalIAMCredentialsSecretVersionMetadata(m map[string]json.RawMessage,
|
13258 | 13269 | err = core.SDKErrorf(err, "", "secret_id-error", common.GetComponentInfo())
|
13259 | 13270 | return
|
13260 | 13271 | }
|
| 13272 | + err = core.UnmarshalPrimitive(m, "expiration_date", &obj.ExpirationDate) |
| 13273 | + if err != nil { |
| 13274 | + err = core.SDKErrorf(err, "", "expiration_date-error", common.GetComponentInfo()) |
| 13275 | + return |
| 13276 | + } |
13261 | 13277 | err = core.UnmarshalPrimitive(m, "api_key_id", &obj.ApiKeyID)
|
13262 | 13278 | if err != nil {
|
13263 | 13279 | err = core.SDKErrorf(err, "", "api_key_id-error", common.GetComponentInfo())
|
@@ -14121,7 +14137,7 @@ type ImportedCertificateVersion struct {
|
14121 | 14137 |
|
14122 | 14138 | // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types:
|
14123 | 14139 | // Arbitrary, username_password.
|
14124 |
| - ExpirationDate *strfmt.DateTime `json:"expiration_date" validate:"required"` |
| 14140 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
14125 | 14141 |
|
14126 | 14142 | // The unique serial number that was assigned to a certificate by the issuing certificate authority.
|
14127 | 14143 | SerialNumber *string `json:"serial_number" validate:"required"`
|
@@ -14308,7 +14324,7 @@ type ImportedCertificateVersionMetadata struct {
|
14308 | 14324 |
|
14309 | 14325 | // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types:
|
14310 | 14326 | // Arbitrary, username_password.
|
14311 |
| - ExpirationDate *strfmt.DateTime `json:"expiration_date" validate:"required"` |
| 14327 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
14312 | 14328 |
|
14313 | 14329 | // The unique serial number that was assigned to a certificate by the issuing certificate authority.
|
14314 | 14330 | SerialNumber *string `json:"serial_number" validate:"required"`
|
@@ -15106,6 +15122,10 @@ type KVSecretVersion struct {
|
15106 | 15122 | // A v4 UUID identifier.
|
15107 | 15123 | SecretID *string `json:"secret_id" validate:"required"`
|
15108 | 15124 |
|
| 15125 | + // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types: |
| 15126 | + // Arbitrary, username_password. |
| 15127 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
| 15128 | + |
15109 | 15129 | // The payload data of a key-value secret.
|
15110 | 15130 | Data map[string]interface{} `json:"data" validate:"required"`
|
15111 | 15131 | }
|
@@ -15199,6 +15219,11 @@ func UnmarshalKVSecretVersion(m map[string]json.RawMessage, result interface{})
|
15199 | 15219 | err = core.SDKErrorf(err, "", "secret_id-error", common.GetComponentInfo())
|
15200 | 15220 | return
|
15201 | 15221 | }
|
| 15222 | + err = core.UnmarshalPrimitive(m, "expiration_date", &obj.ExpirationDate) |
| 15223 | + if err != nil { |
| 15224 | + err = core.SDKErrorf(err, "", "expiration_date-error", common.GetComponentInfo()) |
| 15225 | + return |
| 15226 | + } |
15202 | 15227 | err = core.UnmarshalPrimitive(m, "data", &obj.Data)
|
15203 | 15228 | if err != nil {
|
15204 | 15229 | err = core.SDKErrorf(err, "", "data-error", common.GetComponentInfo())
|
@@ -15249,6 +15274,10 @@ type KVSecretVersionMetadata struct {
|
15249 | 15274 |
|
15250 | 15275 | // A v4 UUID identifier.
|
15251 | 15276 | SecretID *string `json:"secret_id" validate:"required"`
|
| 15277 | + |
| 15278 | + // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types: |
| 15279 | + // Arbitrary, username_password. |
| 15280 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
15252 | 15281 | }
|
15253 | 15282 |
|
15254 | 15283 | // Constants associated with the KVSecretVersionMetadata.SecretType property.
|
@@ -15340,6 +15369,11 @@ func UnmarshalKVSecretVersionMetadata(m map[string]json.RawMessage, result inter
|
15340 | 15369 | err = core.SDKErrorf(err, "", "secret_id-error", common.GetComponentInfo())
|
15341 | 15370 | return
|
15342 | 15371 | }
|
| 15372 | + err = core.UnmarshalPrimitive(m, "expiration_date", &obj.ExpirationDate) |
| 15373 | + if err != nil { |
| 15374 | + err = core.SDKErrorf(err, "", "expiration_date-error", common.GetComponentInfo()) |
| 15375 | + return |
| 15376 | + } |
15343 | 15377 | reflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))
|
15344 | 15378 | return
|
15345 | 15379 | }
|
@@ -21405,7 +21439,7 @@ type PrivateCertificateVersion struct {
|
21405 | 21439 |
|
21406 | 21440 | // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types:
|
21407 | 21441 | // Arbitrary, username_password.
|
21408 |
| - ExpirationDate *strfmt.DateTime `json:"expiration_date" validate:"required"` |
| 21442 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
21409 | 21443 |
|
21410 | 21444 | // The unique serial number that was assigned to a certificate by the issuing certificate authority.
|
21411 | 21445 | SerialNumber *string `json:"serial_number" validate:"required"`
|
@@ -21677,7 +21711,7 @@ type PrivateCertificateVersionMetadata struct {
|
21677 | 21711 |
|
21678 | 21712 | // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types:
|
21679 | 21713 | // Arbitrary, username_password.
|
21680 |
| - ExpirationDate *strfmt.DateTime `json:"expiration_date" validate:"required"` |
| 21714 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
21681 | 21715 |
|
21682 | 21716 | // The unique serial number that was assigned to a certificate by the issuing certificate authority.
|
21683 | 21717 | SerialNumber *string `json:"serial_number" validate:"required"`
|
@@ -26237,6 +26271,10 @@ type UsernamePasswordSecretVersion struct {
|
26237 | 26271 | // A v4 UUID identifier.
|
26238 | 26272 | SecretID *string `json:"secret_id" validate:"required"`
|
26239 | 26273 |
|
| 26274 | + // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types: |
| 26275 | + // Arbitrary, username_password. |
| 26276 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
| 26277 | + |
26240 | 26278 | // The username that is assigned to an `username_password` secret.
|
26241 | 26279 | Username *string `json:"username" validate:"required"`
|
26242 | 26280 |
|
@@ -26333,6 +26371,11 @@ func UnmarshalUsernamePasswordSecretVersion(m map[string]json.RawMessage, result
|
26333 | 26371 | err = core.SDKErrorf(err, "", "secret_id-error", common.GetComponentInfo())
|
26334 | 26372 | return
|
26335 | 26373 | }
|
| 26374 | + err = core.UnmarshalPrimitive(m, "expiration_date", &obj.ExpirationDate) |
| 26375 | + if err != nil { |
| 26376 | + err = core.SDKErrorf(err, "", "expiration_date-error", common.GetComponentInfo()) |
| 26377 | + return |
| 26378 | + } |
26336 | 26379 | err = core.UnmarshalPrimitive(m, "username", &obj.Username)
|
26337 | 26380 | if err != nil {
|
26338 | 26381 | err = core.SDKErrorf(err, "", "username-error", common.GetComponentInfo())
|
@@ -26388,6 +26431,10 @@ type UsernamePasswordSecretVersionMetadata struct {
|
26388 | 26431 |
|
26389 | 26432 | // A v4 UUID identifier.
|
26390 | 26433 | SecretID *string `json:"secret_id" validate:"required"`
|
| 26434 | + |
| 26435 | + // The date when the secret material expires. The date format follows the `RFC 3339` format. Supported secret types: |
| 26436 | + // Arbitrary, username_password. |
| 26437 | + ExpirationDate *strfmt.DateTime `json:"expiration_date,omitempty"` |
26391 | 26438 | }
|
26392 | 26439 |
|
26393 | 26440 | // Constants associated with the UsernamePasswordSecretVersionMetadata.SecretType property.
|
@@ -26479,6 +26526,11 @@ func UnmarshalUsernamePasswordSecretVersionMetadata(m map[string]json.RawMessage
|
26479 | 26526 | err = core.SDKErrorf(err, "", "secret_id-error", common.GetComponentInfo())
|
26480 | 26527 | return
|
26481 | 26528 | }
|
| 26529 | + err = core.UnmarshalPrimitive(m, "expiration_date", &obj.ExpirationDate) |
| 26530 | + if err != nil { |
| 26531 | + err = core.SDKErrorf(err, "", "expiration_date-error", common.GetComponentInfo()) |
| 26532 | + return |
| 26533 | + } |
26482 | 26534 | reflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))
|
26483 | 26535 | return
|
26484 | 26536 | }
|
|
0 commit comments