// This is an automatically generated code sample.
// To make this code sample work in your Oracle Cloud tenancy,
// please replace the values for any parameters whose current values do not fit
// your use case (such as resource IDs, strings containing ‘EXAMPLE’ or ‘unique_id’, and
// boolean, number, and enum parameters with values not fitting your use case).
import * as vault from "oci-vault";
import common = require("oci-common");
// Create a default authentication provider that uses the DEFAULT
// profile in the configuration file.
// Refer to <see href="https://docs.cloud.oracle.com/en-us/iaas/Content/API/Concepts/sdkconfig.htm#SDK_and_CLI_Configuration_File>the public documentation</see> on how to prepare a configuration file.
const provider: common.ConfigFileAuthenticationDetailsProvider = new common.ConfigFileAuthenticationDetailsProvider();
(async () => {
try {
// Create a service client
const client = new vault.VaultsClient({ authenticationDetailsProvider: provider });
// Create a request and dependent object(s).
const updateSecretDetails = {
currentVersionNumber: 25,
definedTags: {
EXAMPLE_KEY_ZHey6: {
EXAMPLE_KEY_7zLLs: "EXAMPLE--Value"
}
},
description: "EXAMPLE-description-Value",
freeformTags: {
EXAMPLE_KEY_wgqOB: "EXAMPLE_VALUE_vE1y3A4xsg2sm3UTaHde"
},
metadata: {
EXAMPLE_KEY_Oz1sh: "EXAMPLE--Value"
},
secretContent: {
contentType: "BASE64",
content: "EXAMPLE-content-Value",
name: "EXAMPLE-name-Value",
stage: vault.models.SecretContentDetails.Stage.Pending
},
rotationConfig: {
rotationInterval: "EXAMPLE-rotationInterval-Value",
targetSystemDetails: {
targetSystemType: "FUNCTION",
functionId: "ocid1.test.oc1..<unique_ID>EXAMPLE-functionId-Value"
},
isScheduledRotationEnabled: true
},
secretRules: [
{
ruleType: "SECRET_REUSE_RULE",
isEnforcedOnDeletedSecretVersions: true
}
],
secretGenerationContext: {
generationType: "SSH_KEY",
generationTemplate: vault.models.SshKeyGenerationContext.GenerationTemplate.Rsa2048,
secretTemplate: "EXAMPLE-secretTemplate-Value"
},
enableAutoGeneration: false
};
const updateSecretRequest: vault.requests.UpdateSecretRequest = {
secretId: "ocid1.test.oc1..<unique_ID>EXAMPLE-secretId-Value",
updateSecretDetails: updateSecretDetails,
ifMatch: "EXAMPLE-ifMatch-Value",
opcRequestId: "3G9I6V9LCVS1TRF5F7TN<unique_ID>"
};
// Send request to the Client.
const updateSecretResponse = await client.updateSecret(updateSecretRequest);
} catch (error) {
console.log("updateSecret Failed with error " + error);
}
})();