// This is an automatically generated code sample.
// To make this code sample work in your Oracle Cloud tenancy,
// please replace the values for any parameters whose current values do not fit
// your use case (such as resource IDs, strings containing ‘EXAMPLE’ or ‘unique_id’, and
// boolean, number, and enum parameters with values not fitting your use case).

import * as core from "oci-core";
import common = require("oci-common");

// Create a default authentication provider that uses the DEFAULT
// profile in the configuration file.
// Refer to <see href="https://docs.cloud.oracle.com/en-us/iaas/Content/API/Concepts/sdkconfig.htm#SDK_and_CLI_Configuration_File>the public documentation</see> on how to prepare a configuration file.

const provider: common.ConfigFileAuthenticationDetailsProvider = new common.ConfigFileAuthenticationDetailsProvider();

(async () => {
  try {
    // Create a service client
    const client = new core.VirtualNetworkClient({ authenticationDetailsProvider: provider });

    // Create a request and dependent object(s).
    const updateIPSecConnectionTunnelDetails = {
      displayName: "EXAMPLE-displayName-Value",
      routing: core.models.UpdateIPSecConnectionTunnelDetails.Routing.Static,
      ikeVersion: core.models.UpdateIPSecConnectionTunnelDetails.IkeVersion.V1,
      bgpSessionConfig: {
        oracleInterfaceIp: "EXAMPLE-oracleInterfaceIp-Value",
        customerInterfaceIp: "EXAMPLE-customerInterfaceIp-Value",
        oracleInterfaceIpv6: "EXAMPLE-oracleInterfaceIpv6-Value",
        customerInterfaceIpv6: "EXAMPLE-customerInterfaceIpv6-Value",
        customerBgpAsn: "EXAMPLE-customerBgpAsn-Value"
      },
      oracleInitiation:
        core.models.UpdateIPSecConnectionTunnelDetails.OracleInitiation.ResponderOnly,
      natTranslationEnabled:
        core.models.UpdateIPSecConnectionTunnelDetails.NatTranslationEnabled.Enabled,
      phaseOneConfig: {
        isCustomPhaseOneConfig: true,
        authenticationAlgorithm: core.models.PhaseOneConfigDetails.AuthenticationAlgorithm.Sha2256,
        encryptionAlgorithm: core.models.PhaseOneConfigDetails.EncryptionAlgorithm.Aes128Cbc,
        diffieHelmanGroup: core.models.PhaseOneConfigDetails.DiffieHelmanGroup.Group2,
        lifetimeInSeconds: 758
      },
      phaseTwoConfig: {
        isCustomPhaseTwoConfig: true,
        authenticationAlgorithm:
          core.models.PhaseTwoConfigDetails.AuthenticationAlgorithm.HmacSha2256128,
        encryptionAlgorithm: core.models.PhaseTwoConfigDetails.EncryptionAlgorithm.Aes128Cbc,
        lifetimeInSeconds: 884,
        isPfsEnabled: false,
        pfsDhGroup: core.models.PhaseTwoConfigDetails.PfsDhGroup.Group19
      },
      dpdConfig: {
        dpdMode: core.models.DpdConfig.DpdMode.RespondOnly,
        dpdTimeoutInSec: 112
      },
      encryptionDomainConfig: {
        oracleTrafficSelector: ["EXAMPLE--Value"],
        cpeTrafficSelector: ["EXAMPLE--Value"]
      }
    };

    const updateIPSecConnectionTunnelRequest: core.requests.UpdateIPSecConnectionTunnelRequest = {
      ipscId: "ocid1.test.oc1..<unique_ID>EXAMPLE-ipscId-Value",
      tunnelId: "ocid1.test.oc1..<unique_ID>EXAMPLE-tunnelId-Value",
      updateIPSecConnectionTunnelDetails: updateIPSecConnectionTunnelDetails,
      ifMatch: "EXAMPLE-ifMatch-Value",
      opcRequestId: "GB4MHUP88ASLJVUYANNU<unique_ID>"
    };

    // Send request to the Client.
    const updateIPSecConnectionTunnelResponse = await client.updateIPSecConnectionTunnel(
      updateIPSecConnectionTunnelRequest
    );
  } catch (error) {
    console.log("updateIPSecConnectionTunnel Failed with error  " + error);
  }
})();