// This is an automatically generated code sample.
// To make this code sample work in your Oracle Cloud tenancy,
// please replace the values for any parameters whose current values do not fit
// your use case (such as resource IDs, strings containing ‘EXAMPLE’ or ‘unique_id’, and
// boolean, number, and enum parameters with values not fitting your use case).

import * as vault from "oci-vault";
import common = require("oci-common");

// Create a default authentication provider that uses the DEFAULT
// profile in the configuration file.
// Refer to <see href="https://docs.cloud.oracle.com/en-us/iaas/Content/API/Concepts/sdkconfig.htm#SDK_and_CLI_Configuration_File>the public documentation</see> on how to prepare a configuration file.

const provider: common.ConfigFileAuthenticationDetailsProvider = new common.ConfigFileAuthenticationDetailsProvider();

(async () => {
  try {
    // Create a service client
    const client = new vault.VaultsClient({ authenticationDetailsProvider: provider });

    // Create a request and dependent object(s).
    const createSecretDetails = {
      compartmentId: "ocid1.test.oc1..<unique_ID>EXAMPLE-compartmentId-Value",
      definedTags: {
        EXAMPLE_KEY_ZyD9x: {
          EXAMPLE_KEY_qdG4P: "EXAMPLE--Value"
        }
      },
      description: "EXAMPLE-description-Value",
      freeformTags: {
        EXAMPLE_KEY_VIe3G: "EXAMPLE_VALUE_4mm1jDyMn7fDwDNfUeTQ"
      },
      keyId: "ocid1.test.oc1..<unique_ID>EXAMPLE-keyId-Value",
      metadata: {
        EXAMPLE_KEY_D0GhJ: "EXAMPLE--Value"
      },
      secretContent: {
        contentType: "BASE64",
        content: "EXAMPLE-content-Value",
        name: "EXAMPLE-name-Value",
        stage: vault.models.SecretContentDetails.Stage.Pending
      },
      rotationConfig: {
        rotationInterval: "EXAMPLE-rotationInterval-Value",
        targetSystemDetails: {
          targetSystemType: "FUNCTION",
          functionId: "ocid1.test.oc1..<unique_ID>EXAMPLE-functionId-Value"
        },
        isScheduledRotationEnabled: false
      },
      secretName: "EXAMPLE-secretName-Value",
      secretRules: [
        {
          ruleType: "SECRET_REUSE_RULE",
          isEnforcedOnDeletedSecretVersions: true
        }
      ],
      vaultId: "ocid1.test.oc1..<unique_ID>EXAMPLE-vaultId-Value",
      secretGenerationContext: {
        generationType: "PASSPHRASE",
        generationTemplate:
          vault.models.PassphraseGenerationContext.GenerationTemplate.DbaasDefaultPassword,
        passphraseLength: 684,
        secretTemplate: "EXAMPLE-secretTemplate-Value"
      },
      enableAutoGeneration: false
    };

    const createSecretRequest: vault.requests.CreateSecretRequest = {
      createSecretDetails: createSecretDetails,
      opcRequestId: "MDDCOFUFHR8FJMYV0DC3<unique_ID>",
      opcRetryToken: "EXAMPLE-opcRetryToken-Value"
    };

    // Send request to the Client.
    const createSecretResponse = await client.createSecret(createSecretRequest);
  } catch (error) {
    console.log("createSecret Failed with error  " + error);
  }
})();