diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/client/secret_service/get_gateway_pool_certificate_parameters.go b/clients/cloud-vault-secrets/preview/2023-11-28/client/secret_service/get_gateway_pool_certificate_parameters.go index 106ce47f..e00be994 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/client/secret_service/get_gateway_pool_certificate_parameters.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/client/secret_service/get_gateway_pool_certificate_parameters.go @@ -61,6 +61,9 @@ GetGatewayPoolCertificateParams contains all the parameters to send to the API e */ type GetGatewayPoolCertificateParams struct { + // CsrPem. + CsrPem *string + // GatewayPoolName. GatewayPoolName string @@ -123,6 +126,17 @@ func (o *GetGatewayPoolCertificateParams) SetHTTPClient(client *http.Client) { o.HTTPClient = client } +// WithCsrPem adds the csrPem to the get gateway pool certificate params +func (o *GetGatewayPoolCertificateParams) WithCsrPem(csrPem *string) *GetGatewayPoolCertificateParams { + o.SetCsrPem(csrPem) + return o +} + +// SetCsrPem adds the csrPem to the get gateway pool certificate params +func (o *GetGatewayPoolCertificateParams) SetCsrPem(csrPem *string) { + o.CsrPem = csrPem +} + // WithGatewayPoolName adds the gatewayPoolName to the get gateway pool certificate params func (o *GetGatewayPoolCertificateParams) WithGatewayPoolName(gatewayPoolName string) *GetGatewayPoolCertificateParams { o.SetGatewayPoolName(gatewayPoolName) @@ -164,6 +178,23 @@ func (o *GetGatewayPoolCertificateParams) WriteToRequest(r runtime.ClientRequest } var res []error + if o.CsrPem != nil { + + // query param csr_pem + var qrCsrPem string + + if o.CsrPem != nil { + qrCsrPem = *o.CsrPem + } + qCsrPem := qrCsrPem + if qCsrPem != "" { + + if err := r.SetQueryParam("csr_pem", qCsrPem); err != nil { + return err + } + } + } + // path param gateway_pool_name if err := r.SetPathParam("gateway_pool_name", o.GatewayPoolName); err != nil { return err diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/git_hub_repository_visibility.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/git_hub_repository_visibility.go deleted file mode 100644 index 08a0c4c3..00000000 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/git_hub_repository_visibility.go +++ /dev/null @@ -1,81 +0,0 @@ -// Code generated by go-swagger; DO NOT EDIT. - -package models - -// This file was generated by the swagger tool. -// Editing this file might prove futile when you re-run the swagger generate command - -import ( - "context" - "encoding/json" - - "github.com/go-openapi/errors" - "github.com/go-openapi/strfmt" - "github.com/go-openapi/validate" -) - -// GitHubRepositoryVisibility git hub repository visibility -// -// swagger:model GitHubRepositoryVisibility -type GitHubRepositoryVisibility string - -func NewGitHubRepositoryVisibility(value GitHubRepositoryVisibility) *GitHubRepositoryVisibility { - return &value -} - -// Pointer returns a pointer to a freshly-allocated GitHubRepositoryVisibility. -func (m GitHubRepositoryVisibility) Pointer() *GitHubRepositoryVisibility { - return &m -} - -const ( - - // GitHubRepositoryVisibilityUNKNOWN captures enum value "UNKNOWN" - GitHubRepositoryVisibilityUNKNOWN GitHubRepositoryVisibility = "UNKNOWN" - - // GitHubRepositoryVisibilityPUBLIC captures enum value "PUBLIC" - GitHubRepositoryVisibilityPUBLIC GitHubRepositoryVisibility = "PUBLIC" - - // GitHubRepositoryVisibilityPRIVATE captures enum value "PRIVATE" - GitHubRepositoryVisibilityPRIVATE GitHubRepositoryVisibility = "PRIVATE" -) - -// for schema -var gitHubRepositoryVisibilityEnum []interface{} - -func init() { - var res []GitHubRepositoryVisibility - if err := json.Unmarshal([]byte(`["UNKNOWN","PUBLIC","PRIVATE"]`), &res); err != nil { - panic(err) - } - for _, v := range res { - gitHubRepositoryVisibilityEnum = append(gitHubRepositoryVisibilityEnum, v) - } -} - -func (m GitHubRepositoryVisibility) validateGitHubRepositoryVisibilityEnum(path, location string, value GitHubRepositoryVisibility) error { - if err := validate.EnumCase(path, location, value, gitHubRepositoryVisibilityEnum, true); err != nil { - return err - } - return nil -} - -// Validate validates this git hub repository visibility -func (m GitHubRepositoryVisibility) Validate(formats strfmt.Registry) error { - var res []error - - // value enum - if err := m.validateGitHubRepositoryVisibilityEnum("", "body", m); err != nil { - return err - } - - if len(res) > 0 { - return errors.CompositeValidationError(res...) - } - return nil -} - -// ContextValidate validates this git hub repository visibility based on context it is used -func (m GitHubRepositoryVisibility) ContextValidate(ctx context.Context, formats strfmt.Registry) error { - return nil -} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_aws_integration_body.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_aws_integration_body.go index ca7b2370..2eb44ac1 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_aws_integration_body.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_aws_integration_body.go @@ -19,6 +19,9 @@ import ( // swagger:model SecretServiceCreateAwsIntegrationBody type SecretServiceCreateAwsIntegrationBody struct { + // access keys + AccessKeys *Secrets20231128AwsAccessKeysRequest `json:"access_keys,omitempty"` + // capabilities Capabilities []*Secrets20231128Capability `json:"capabilities"` @@ -27,24 +30,21 @@ type SecretServiceCreateAwsIntegrationBody struct { // name Name string `json:"name,omitempty"` - - // static credentials - StaticCredentials *Secrets20231128AwsStaticCredentialsRequest `json:"static_credentials,omitempty"` } // Validate validates this secret service create aws integration body func (m *SecretServiceCreateAwsIntegrationBody) Validate(formats strfmt.Registry) error { var res []error - if err := m.validateCapabilities(formats); err != nil { + if err := m.validateAccessKeys(formats); err != nil { res = append(res, err) } - if err := m.validateFederatedWorkloadIdentity(formats); err != nil { + if err := m.validateCapabilities(formats); err != nil { res = append(res, err) } - if err := m.validateStaticCredentials(formats); err != nil { + if err := m.validateFederatedWorkloadIdentity(formats); err != nil { res = append(res, err) } @@ -54,6 +54,25 @@ func (m *SecretServiceCreateAwsIntegrationBody) Validate(formats strfmt.Registry return nil } +func (m *SecretServiceCreateAwsIntegrationBody) validateAccessKeys(formats strfmt.Registry) error { + if swag.IsZero(m.AccessKeys) { // not required + return nil + } + + if m.AccessKeys != nil { + if err := m.AccessKeys.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("access_keys") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("access_keys") + } + return err + } + } + + return nil +} + func (m *SecretServiceCreateAwsIntegrationBody) validateCapabilities(formats strfmt.Registry) error { if swag.IsZero(m.Capabilities) { // not required return nil @@ -99,38 +118,19 @@ func (m *SecretServiceCreateAwsIntegrationBody) validateFederatedWorkloadIdentit return nil } -func (m *SecretServiceCreateAwsIntegrationBody) validateStaticCredentials(formats strfmt.Registry) error { - if swag.IsZero(m.StaticCredentials) { // not required - return nil - } - - if m.StaticCredentials != nil { - if err := m.StaticCredentials.Validate(formats); err != nil { - if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("static_credentials") - } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("static_credentials") - } - return err - } - } - - return nil -} - // ContextValidate validate this secret service create aws integration body based on the context it is used func (m *SecretServiceCreateAwsIntegrationBody) ContextValidate(ctx context.Context, formats strfmt.Registry) error { var res []error - if err := m.contextValidateCapabilities(ctx, formats); err != nil { + if err := m.contextValidateAccessKeys(ctx, formats); err != nil { res = append(res, err) } - if err := m.contextValidateFederatedWorkloadIdentity(ctx, formats); err != nil { + if err := m.contextValidateCapabilities(ctx, formats); err != nil { res = append(res, err) } - if err := m.contextValidateStaticCredentials(ctx, formats); err != nil { + if err := m.contextValidateFederatedWorkloadIdentity(ctx, formats); err != nil { res = append(res, err) } @@ -140,6 +140,27 @@ func (m *SecretServiceCreateAwsIntegrationBody) ContextValidate(ctx context.Cont return nil } +func (m *SecretServiceCreateAwsIntegrationBody) contextValidateAccessKeys(ctx context.Context, formats strfmt.Registry) error { + + if m.AccessKeys != nil { + + if swag.IsZero(m.AccessKeys) { // not required + return nil + } + + if err := m.AccessKeys.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("access_keys") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("access_keys") + } + return err + } + } + + return nil +} + func (m *SecretServiceCreateAwsIntegrationBody) contextValidateCapabilities(ctx context.Context, formats strfmt.Registry) error { for i := 0; i < len(m.Capabilities); i++ { @@ -186,27 +207,6 @@ func (m *SecretServiceCreateAwsIntegrationBody) contextValidateFederatedWorkload return nil } -func (m *SecretServiceCreateAwsIntegrationBody) contextValidateStaticCredentials(ctx context.Context, formats strfmt.Registry) error { - - if m.StaticCredentials != nil { - - if swag.IsZero(m.StaticCredentials) { // not required - return nil - } - - if err := m.StaticCredentials.ContextValidate(ctx, formats); err != nil { - if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("static_credentials") - } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("static_credentials") - } - return err - } - } - - return nil -} - // MarshalBinary interface implementation func (m *SecretServiceCreateAwsIntegrationBody) MarshalBinary() ([]byte, error) { if m == nil { diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_gcp_integration_body.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_gcp_integration_body.go index 6262efcb..1daaf919 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_gcp_integration_body.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_gcp_integration_body.go @@ -27,6 +27,9 @@ type SecretServiceCreateGcpIntegrationBody struct { // name Name string `json:"name,omitempty"` + + // service account key + ServiceAccountKey *Secrets20231128GcpServiceAccountKeyRequest `json:"service_account_key,omitempty"` } // Validate validates this secret service create gcp integration body @@ -41,6 +44,10 @@ func (m *SecretServiceCreateGcpIntegrationBody) Validate(formats strfmt.Registry res = append(res, err) } + if err := m.validateServiceAccountKey(formats); err != nil { + res = append(res, err) + } + if len(res) > 0 { return errors.CompositeValidationError(res...) } @@ -92,6 +99,25 @@ func (m *SecretServiceCreateGcpIntegrationBody) validateFederatedWorkloadIdentit return nil } +func (m *SecretServiceCreateGcpIntegrationBody) validateServiceAccountKey(formats strfmt.Registry) error { + if swag.IsZero(m.ServiceAccountKey) { // not required + return nil + } + + if m.ServiceAccountKey != nil { + if err := m.ServiceAccountKey.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("service_account_key") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("service_account_key") + } + return err + } + } + + return nil +} + // ContextValidate validate this secret service create gcp integration body based on the context it is used func (m *SecretServiceCreateGcpIntegrationBody) ContextValidate(ctx context.Context, formats strfmt.Registry) error { var res []error @@ -104,6 +130,10 @@ func (m *SecretServiceCreateGcpIntegrationBody) ContextValidate(ctx context.Cont res = append(res, err) } + if err := m.contextValidateServiceAccountKey(ctx, formats); err != nil { + res = append(res, err) + } + if len(res) > 0 { return errors.CompositeValidationError(res...) } @@ -156,6 +186,27 @@ func (m *SecretServiceCreateGcpIntegrationBody) contextValidateFederatedWorkload return nil } +func (m *SecretServiceCreateGcpIntegrationBody) contextValidateServiceAccountKey(ctx context.Context, formats strfmt.Registry) error { + + if m.ServiceAccountKey != nil { + + if swag.IsZero(m.ServiceAccountKey) { // not required + return nil + } + + if err := m.ServiceAccountKey.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("service_account_key") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("service_account_key") + } + return err + } + } + + return nil +} + // MarshalBinary interface implementation func (m *SecretServiceCreateGcpIntegrationBody) MarshalBinary() ([]byte, error) { if m == nil { diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_mongo_d_b_atlas_integration_body.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_mongo_d_b_atlas_integration_body.go index 9a637396..165220fa 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_mongo_d_b_atlas_integration_body.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_mongo_d_b_atlas_integration_body.go @@ -22,9 +22,6 @@ type SecretServiceCreateMongoDBAtlasIntegrationBody struct { // capabilities Capabilities []*Secrets20231128Capability `json:"capabilities"` - // gateway pool id - GatewayPoolID string `json:"gateway_pool_id,omitempty"` - // integration name IntegrationName string `json:"integration_name,omitempty"` diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_twilio_integration_body.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_twilio_integration_body.go index 4945e414..62870e81 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_twilio_integration_body.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secret_service_create_twilio_integration_body.go @@ -22,9 +22,6 @@ type SecretServiceCreateTwilioIntegrationBody struct { // capabilities Capabilities []*Secrets20231128Capability `json:"capabilities"` - // gateway pool id - GatewayPoolID string `json:"gateway_pool_id,omitempty"` - // integration name IntegrationName string `json:"integration_name,omitempty"` diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_access_keys_request.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_access_keys_request.go new file mode 100644 index 00000000..d0b6111c --- /dev/null +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_access_keys_request.go @@ -0,0 +1,53 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128AwsAccessKeysRequest secrets 20231128 aws access keys request +// +// swagger:model secrets_20231128AwsAccessKeysRequest +type Secrets20231128AwsAccessKeysRequest struct { + + // access key id + AccessKeyID string `json:"access_key_id,omitempty"` + + // secret access key + SecretAccessKey string `json:"secret_access_key,omitempty"` +} + +// Validate validates this secrets 20231128 aws access keys request +func (m *Secrets20231128AwsAccessKeysRequest) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 aws access keys request based on context it is used +func (m *Secrets20231128AwsAccessKeysRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128AwsAccessKeysRequest) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128AwsAccessKeysRequest) UnmarshalBinary(b []byte) error { + var res Secrets20231128AwsAccessKeysRequest + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_access_keys_response.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_access_keys_response.go new file mode 100644 index 00000000..7cf35654 --- /dev/null +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_access_keys_response.go @@ -0,0 +1,50 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128AwsAccessKeysResponse secrets 20231128 aws access keys response +// +// swagger:model secrets_20231128AwsAccessKeysResponse +type Secrets20231128AwsAccessKeysResponse struct { + + // access key id + AccessKeyID string `json:"access_key_id,omitempty"` +} + +// Validate validates this secrets 20231128 aws access keys response +func (m *Secrets20231128AwsAccessKeysResponse) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 aws access keys response based on context it is used +func (m *Secrets20231128AwsAccessKeysResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128AwsAccessKeysResponse) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128AwsAccessKeysResponse) UnmarshalBinary(b []byte) error { + var res Secrets20231128AwsAccessKeysResponse + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_integration.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_integration.go index 02875516..29c92a07 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_integration.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_integration.go @@ -20,6 +20,9 @@ import ( // swagger:model secrets_20231128AwsIntegration type Secrets20231128AwsIntegration struct { + // access keys + AccessKeys *Secrets20231128AwsAccessKeysResponse `json:"access_keys,omitempty"` + // capabilities Capabilities []*Secrets20231128Capability `json:"capabilities"` @@ -42,9 +45,6 @@ type Secrets20231128AwsIntegration struct { // resource name ResourceName string `json:"resource_name,omitempty"` - // static credentials - StaticCredentials *Secrets20231128AwsStaticCredentialsResponse `json:"static_credentials,omitempty"` - // updated at // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty"` @@ -60,19 +60,19 @@ type Secrets20231128AwsIntegration struct { func (m *Secrets20231128AwsIntegration) Validate(formats strfmt.Registry) error { var res []error - if err := m.validateCapabilities(formats); err != nil { + if err := m.validateAccessKeys(formats); err != nil { res = append(res, err) } - if err := m.validateCreatedAt(formats); err != nil { + if err := m.validateCapabilities(formats); err != nil { res = append(res, err) } - if err := m.validateFederatedWorkloadIdentity(formats); err != nil { + if err := m.validateCreatedAt(formats); err != nil { res = append(res, err) } - if err := m.validateStaticCredentials(formats); err != nil { + if err := m.validateFederatedWorkloadIdentity(formats); err != nil { res = append(res, err) } @@ -90,6 +90,25 @@ func (m *Secrets20231128AwsIntegration) Validate(formats strfmt.Registry) error return nil } +func (m *Secrets20231128AwsIntegration) validateAccessKeys(formats strfmt.Registry) error { + if swag.IsZero(m.AccessKeys) { // not required + return nil + } + + if m.AccessKeys != nil { + if err := m.AccessKeys.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("access_keys") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("access_keys") + } + return err + } + } + + return nil +} + func (m *Secrets20231128AwsIntegration) validateCapabilities(formats strfmt.Registry) error { if swag.IsZero(m.Capabilities) { // not required return nil @@ -147,25 +166,6 @@ func (m *Secrets20231128AwsIntegration) validateFederatedWorkloadIdentity(format return nil } -func (m *Secrets20231128AwsIntegration) validateStaticCredentials(formats strfmt.Registry) error { - if swag.IsZero(m.StaticCredentials) { // not required - return nil - } - - if m.StaticCredentials != nil { - if err := m.StaticCredentials.Validate(formats); err != nil { - if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("static_credentials") - } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("static_credentials") - } - return err - } - } - - return nil -} - func (m *Secrets20231128AwsIntegration) validateUpdatedAt(formats strfmt.Registry) error { if swag.IsZero(m.UpdatedAt) { // not required return nil @@ -208,15 +208,15 @@ func (m *Secrets20231128AwsIntegration) validateUsedBy(formats strfmt.Registry) func (m *Secrets20231128AwsIntegration) ContextValidate(ctx context.Context, formats strfmt.Registry) error { var res []error - if err := m.contextValidateCapabilities(ctx, formats); err != nil { + if err := m.contextValidateAccessKeys(ctx, formats); err != nil { res = append(res, err) } - if err := m.contextValidateFederatedWorkloadIdentity(ctx, formats); err != nil { + if err := m.contextValidateCapabilities(ctx, formats); err != nil { res = append(res, err) } - if err := m.contextValidateStaticCredentials(ctx, formats); err != nil { + if err := m.contextValidateFederatedWorkloadIdentity(ctx, formats); err != nil { res = append(res, err) } @@ -230,6 +230,27 @@ func (m *Secrets20231128AwsIntegration) ContextValidate(ctx context.Context, for return nil } +func (m *Secrets20231128AwsIntegration) contextValidateAccessKeys(ctx context.Context, formats strfmt.Registry) error { + + if m.AccessKeys != nil { + + if swag.IsZero(m.AccessKeys) { // not required + return nil + } + + if err := m.AccessKeys.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("access_keys") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("access_keys") + } + return err + } + } + + return nil +} + func (m *Secrets20231128AwsIntegration) contextValidateCapabilities(ctx context.Context, formats strfmt.Registry) error { for i := 0; i < len(m.Capabilities); i++ { @@ -276,27 +297,6 @@ func (m *Secrets20231128AwsIntegration) contextValidateFederatedWorkloadIdentity return nil } -func (m *Secrets20231128AwsIntegration) contextValidateStaticCredentials(ctx context.Context, formats strfmt.Registry) error { - - if m.StaticCredentials != nil { - - if swag.IsZero(m.StaticCredentials) { // not required - return nil - } - - if err := m.StaticCredentials.ContextValidate(ctx, formats); err != nil { - if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("static_credentials") - } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("static_credentials") - } - return err - } - } - - return nil -} - func (m *Secrets20231128AwsIntegration) contextValidateUsedBy(ctx context.Context, formats strfmt.Registry) error { for k := range m.UsedBy { diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_static_credentials_request.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_static_credentials_request.go deleted file mode 100644 index e331ebd0..00000000 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_static_credentials_request.go +++ /dev/null @@ -1,53 +0,0 @@ -// Code generated by go-swagger; DO NOT EDIT. - -package models - -// This file was generated by the swagger tool. -// Editing this file might prove futile when you re-run the swagger generate command - -import ( - "context" - - "github.com/go-openapi/strfmt" - "github.com/go-openapi/swag" -) - -// Secrets20231128AwsStaticCredentialsRequest secrets 20231128 aws static credentials request -// -// swagger:model secrets_20231128AwsStaticCredentialsRequest -type Secrets20231128AwsStaticCredentialsRequest struct { - - // access key id - AccessKeyID string `json:"access_key_id,omitempty"` - - // secret access key - SecretAccessKey string `json:"secret_access_key,omitempty"` -} - -// Validate validates this secrets 20231128 aws static credentials request -func (m *Secrets20231128AwsStaticCredentialsRequest) Validate(formats strfmt.Registry) error { - return nil -} - -// ContextValidate validates this secrets 20231128 aws static credentials request based on context it is used -func (m *Secrets20231128AwsStaticCredentialsRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error { - return nil -} - -// MarshalBinary interface implementation -func (m *Secrets20231128AwsStaticCredentialsRequest) MarshalBinary() ([]byte, error) { - if m == nil { - return nil, nil - } - return swag.WriteJSON(m) -} - -// UnmarshalBinary interface implementation -func (m *Secrets20231128AwsStaticCredentialsRequest) UnmarshalBinary(b []byte) error { - var res Secrets20231128AwsStaticCredentialsRequest - if err := swag.ReadJSON(b, &res); err != nil { - return err - } - *m = res - return nil -} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_static_credentials_response.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_static_credentials_response.go deleted file mode 100644 index ace7249d..00000000 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_aws_static_credentials_response.go +++ /dev/null @@ -1,50 +0,0 @@ -// Code generated by go-swagger; DO NOT EDIT. - -package models - -// This file was generated by the swagger tool. -// Editing this file might prove futile when you re-run the swagger generate command - -import ( - "context" - - "github.com/go-openapi/strfmt" - "github.com/go-openapi/swag" -) - -// Secrets20231128AwsStaticCredentialsResponse secrets 20231128 aws static credentials response -// -// swagger:model secrets_20231128AwsStaticCredentialsResponse -type Secrets20231128AwsStaticCredentialsResponse struct { - - // access key id - AccessKeyID string `json:"access_key_id,omitempty"` -} - -// Validate validates this secrets 20231128 aws static credentials response -func (m *Secrets20231128AwsStaticCredentialsResponse) Validate(formats strfmt.Registry) error { - return nil -} - -// ContextValidate validates this secrets 20231128 aws static credentials response based on context it is used -func (m *Secrets20231128AwsStaticCredentialsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error { - return nil -} - -// MarshalBinary interface implementation -func (m *Secrets20231128AwsStaticCredentialsResponse) MarshalBinary() ([]byte, error) { - if m == nil { - return nil, nil - } - return swag.WriteJSON(m) -} - -// UnmarshalBinary interface implementation -func (m *Secrets20231128AwsStaticCredentialsResponse) UnmarshalBinary(b []byte) error { - var res Secrets20231128AwsStaticCredentialsResponse - if err := swag.ReadJSON(b, &res); err != nil { - return err - } - *m = res - return nil -} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_create_gateway_pool_response.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_create_gateway_pool_response.go index 42d780c3..c57f5e74 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_create_gateway_pool_response.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_create_gateway_pool_response.go @@ -18,6 +18,9 @@ import ( // swagger:model secrets_20231128CreateGatewayPoolResponse type Secrets20231128CreateGatewayPoolResponse struct { + // cert pem + CertPem string `json:"cert_pem,omitempty"` + // client_id is the oauth client_id for the gateway service principal ClientID string `json:"client_id,omitempty"` diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_integration.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_integration.go index 0cd00669..5b5ca41b 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_integration.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_integration.go @@ -42,6 +42,9 @@ type Secrets20231128GcpIntegration struct { // resource name ResourceName string `json:"resource_name,omitempty"` + // service account key + ServiceAccountKey *Secrets20231128GcpServiceAccountKeyResponse `json:"service_account_key,omitempty"` + // updated at // Format: date-time UpdatedAt strfmt.DateTime `json:"updated_at,omitempty"` @@ -69,6 +72,10 @@ func (m *Secrets20231128GcpIntegration) Validate(formats strfmt.Registry) error res = append(res, err) } + if err := m.validateServiceAccountKey(formats); err != nil { + res = append(res, err) + } + if err := m.validateUpdatedAt(formats); err != nil { res = append(res, err) } @@ -140,6 +147,25 @@ func (m *Secrets20231128GcpIntegration) validateFederatedWorkloadIdentity(format return nil } +func (m *Secrets20231128GcpIntegration) validateServiceAccountKey(formats strfmt.Registry) error { + if swag.IsZero(m.ServiceAccountKey) { // not required + return nil + } + + if m.ServiceAccountKey != nil { + if err := m.ServiceAccountKey.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("service_account_key") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("service_account_key") + } + return err + } + } + + return nil +} + func (m *Secrets20231128GcpIntegration) validateUpdatedAt(formats strfmt.Registry) error { if swag.IsZero(m.UpdatedAt) { // not required return nil @@ -190,6 +216,10 @@ func (m *Secrets20231128GcpIntegration) ContextValidate(ctx context.Context, for res = append(res, err) } + if err := m.contextValidateServiceAccountKey(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateUsedBy(ctx, formats); err != nil { res = append(res, err) } @@ -246,6 +276,27 @@ func (m *Secrets20231128GcpIntegration) contextValidateFederatedWorkloadIdentity return nil } +func (m *Secrets20231128GcpIntegration) contextValidateServiceAccountKey(ctx context.Context, formats strfmt.Registry) error { + + if m.ServiceAccountKey != nil { + + if swag.IsZero(m.ServiceAccountKey) { // not required + return nil + } + + if err := m.ServiceAccountKey.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("service_account_key") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("service_account_key") + } + return err + } + } + + return nil +} + func (m *Secrets20231128GcpIntegration) contextValidateUsedBy(ctx context.Context, formats strfmt.Registry) error { for k := range m.UsedBy { diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_service_account_key_request.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_service_account_key_request.go new file mode 100644 index 00000000..77460165 --- /dev/null +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_service_account_key_request.go @@ -0,0 +1,50 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128GcpServiceAccountKeyRequest secrets 20231128 gcp service account key request +// +// swagger:model secrets_20231128GcpServiceAccountKeyRequest +type Secrets20231128GcpServiceAccountKeyRequest struct { + + // credentials + Credentials string `json:"credentials,omitempty"` +} + +// Validate validates this secrets 20231128 gcp service account key request +func (m *Secrets20231128GcpServiceAccountKeyRequest) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 gcp service account key request based on context it is used +func (m *Secrets20231128GcpServiceAccountKeyRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128GcpServiceAccountKeyRequest) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128GcpServiceAccountKeyRequest) UnmarshalBinary(b []byte) error { + var res Secrets20231128GcpServiceAccountKeyRequest + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_service_account_key_response.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_service_account_key_response.go new file mode 100644 index 00000000..03885ccf --- /dev/null +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_gcp_service_account_key_response.go @@ -0,0 +1,53 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128GcpServiceAccountKeyResponse secrets 20231128 gcp service account key response +// +// swagger:model secrets_20231128GcpServiceAccountKeyResponse +type Secrets20231128GcpServiceAccountKeyResponse struct { + + // client email + ClientEmail string `json:"client_email,omitempty"` + + // project id + ProjectID string `json:"project_id,omitempty"` +} + +// Validate validates this secrets 20231128 gcp service account key response +func (m *Secrets20231128GcpServiceAccountKeyResponse) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 gcp service account key response based on context it is used +func (m *Secrets20231128GcpServiceAccountKeyResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128GcpServiceAccountKeyResponse) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128GcpServiceAccountKeyResponse) UnmarshalBinary(b []byte) error { + var res Secrets20231128GcpServiceAccountKeyResponse + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository.go index b2f597c1..ace961bb 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository.go @@ -22,7 +22,7 @@ type Secrets20231128GitHubRepository struct { Name string `json:"name,omitempty"` // visibility - Visibility *GitHubRepositoryVisibility `json:"visibility,omitempty"` + Visibility *Secrets20231128GitHubRepositoryVisibility `json:"visibility,omitempty"` } // Validate validates this secrets 20231128 git hub repository diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository_visibility.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository_visibility.go new file mode 100644 index 00000000..0449a38b --- /dev/null +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_git_hub_repository_visibility.go @@ -0,0 +1,81 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + "encoding/json" + + "github.com/go-openapi/errors" + "github.com/go-openapi/strfmt" + "github.com/go-openapi/validate" +) + +// Secrets20231128GitHubRepositoryVisibility secrets 20231128 git hub repository visibility +// +// swagger:model secrets_20231128GitHubRepositoryVisibility +type Secrets20231128GitHubRepositoryVisibility string + +func NewSecrets20231128GitHubRepositoryVisibility(value Secrets20231128GitHubRepositoryVisibility) *Secrets20231128GitHubRepositoryVisibility { + return &value +} + +// Pointer returns a pointer to a freshly-allocated Secrets20231128GitHubRepositoryVisibility. +func (m Secrets20231128GitHubRepositoryVisibility) Pointer() *Secrets20231128GitHubRepositoryVisibility { + return &m +} + +const ( + + // Secrets20231128GitHubRepositoryVisibilityUNKNOWN captures enum value "UNKNOWN" + Secrets20231128GitHubRepositoryVisibilityUNKNOWN Secrets20231128GitHubRepositoryVisibility = "UNKNOWN" + + // Secrets20231128GitHubRepositoryVisibilityPUBLIC captures enum value "PUBLIC" + Secrets20231128GitHubRepositoryVisibilityPUBLIC Secrets20231128GitHubRepositoryVisibility = "PUBLIC" + + // Secrets20231128GitHubRepositoryVisibilityPRIVATE captures enum value "PRIVATE" + Secrets20231128GitHubRepositoryVisibilityPRIVATE Secrets20231128GitHubRepositoryVisibility = "PRIVATE" +) + +// for schema +var secrets20231128GitHubRepositoryVisibilityEnum []interface{} + +func init() { + var res []Secrets20231128GitHubRepositoryVisibility + if err := json.Unmarshal([]byte(`["UNKNOWN","PUBLIC","PRIVATE"]`), &res); err != nil { + panic(err) + } + for _, v := range res { + secrets20231128GitHubRepositoryVisibilityEnum = append(secrets20231128GitHubRepositoryVisibilityEnum, v) + } +} + +func (m Secrets20231128GitHubRepositoryVisibility) validateSecrets20231128GitHubRepositoryVisibilityEnum(path, location string, value Secrets20231128GitHubRepositoryVisibility) error { + if err := validate.EnumCase(path, location, value, secrets20231128GitHubRepositoryVisibilityEnum, true); err != nil { + return err + } + return nil +} + +// Validate validates this secrets 20231128 git hub repository visibility +func (m Secrets20231128GitHubRepositoryVisibility) Validate(formats strfmt.Registry) error { + var res []error + + // value enum + if err := m.validateSecrets20231128GitHubRepositoryVisibilityEnum("", "body", m); err != nil { + return err + } + + if len(res) > 0 { + return errors.CompositeValidationError(res...) + } + return nil +} + +// ContextValidate validates this secrets 20231128 git hub repository visibility based on context it is used +func (m Secrets20231128GitHubRepositoryVisibility) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_integration.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_integration.go index 2dcc4e20..79b65924 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_integration.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_integration.go @@ -20,12 +20,12 @@ import ( // swagger:model secrets_20231128Integration type Secrets20231128Integration struct { + // aws access keys + AwsAccessKeys *Secrets20231128AwsAccessKeysResponse `json:"aws_access_keys,omitempty"` + // aws federated workload identity AwsFederatedWorkloadIdentity *Secrets20231128AwsFederatedWorkloadIdentityResponse `json:"aws_federated_workload_identity,omitempty"` - // aws static credentials - AwsStaticCredentials *Secrets20231128AwsStaticCredentialsResponse `json:"aws_static_credentials,omitempty"` - // capabilities Capabilities []*Secrets20231128Capability `json:"capabilities"` @@ -39,6 +39,9 @@ type Secrets20231128Integration struct { // gcp federated workload identity GcpFederatedWorkloadIdentity *Secrets20231128GcpFederatedWorkloadIdentityResponse `json:"gcp_federated_workload_identity,omitempty"` + // gcp service account key + GcpServiceAccountKey *Secrets20231128GcpServiceAccountKeyResponse `json:"gcp_service_account_key,omitempty"` + // mongo db atlas static credentials MongoDbAtlasStaticCredentials *Secrets20231128MongoDBAtlasStaticCredentialsResponse `json:"mongo_db_atlas_static_credentials,omitempty"` @@ -72,11 +75,11 @@ type Secrets20231128Integration struct { func (m *Secrets20231128Integration) Validate(formats strfmt.Registry) error { var res []error - if err := m.validateAwsFederatedWorkloadIdentity(formats); err != nil { + if err := m.validateAwsAccessKeys(formats); err != nil { res = append(res, err) } - if err := m.validateAwsStaticCredentials(formats); err != nil { + if err := m.validateAwsFederatedWorkloadIdentity(formats); err != nil { res = append(res, err) } @@ -92,6 +95,10 @@ func (m *Secrets20231128Integration) Validate(formats strfmt.Registry) error { res = append(res, err) } + if err := m.validateGcpServiceAccountKey(formats); err != nil { + res = append(res, err) + } + if err := m.validateMongoDbAtlasStaticCredentials(formats); err != nil { res = append(res, err) } @@ -114,17 +121,17 @@ func (m *Secrets20231128Integration) Validate(formats strfmt.Registry) error { return nil } -func (m *Secrets20231128Integration) validateAwsFederatedWorkloadIdentity(formats strfmt.Registry) error { - if swag.IsZero(m.AwsFederatedWorkloadIdentity) { // not required +func (m *Secrets20231128Integration) validateAwsAccessKeys(formats strfmt.Registry) error { + if swag.IsZero(m.AwsAccessKeys) { // not required return nil } - if m.AwsFederatedWorkloadIdentity != nil { - if err := m.AwsFederatedWorkloadIdentity.Validate(formats); err != nil { + if m.AwsAccessKeys != nil { + if err := m.AwsAccessKeys.Validate(formats); err != nil { if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("aws_federated_workload_identity") + return ve.ValidateName("aws_access_keys") } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("aws_federated_workload_identity") + return ce.ValidateName("aws_access_keys") } return err } @@ -133,17 +140,17 @@ func (m *Secrets20231128Integration) validateAwsFederatedWorkloadIdentity(format return nil } -func (m *Secrets20231128Integration) validateAwsStaticCredentials(formats strfmt.Registry) error { - if swag.IsZero(m.AwsStaticCredentials) { // not required +func (m *Secrets20231128Integration) validateAwsFederatedWorkloadIdentity(formats strfmt.Registry) error { + if swag.IsZero(m.AwsFederatedWorkloadIdentity) { // not required return nil } - if m.AwsStaticCredentials != nil { - if err := m.AwsStaticCredentials.Validate(formats); err != nil { + if m.AwsFederatedWorkloadIdentity != nil { + if err := m.AwsFederatedWorkloadIdentity.Validate(formats); err != nil { if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("aws_static_credentials") + return ve.ValidateName("aws_federated_workload_identity") } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("aws_static_credentials") + return ce.ValidateName("aws_federated_workload_identity") } return err } @@ -209,6 +216,25 @@ func (m *Secrets20231128Integration) validateGcpFederatedWorkloadIdentity(format return nil } +func (m *Secrets20231128Integration) validateGcpServiceAccountKey(formats strfmt.Registry) error { + if swag.IsZero(m.GcpServiceAccountKey) { // not required + return nil + } + + if m.GcpServiceAccountKey != nil { + if err := m.GcpServiceAccountKey.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("gcp_service_account_key") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("gcp_service_account_key") + } + return err + } + } + + return nil +} + func (m *Secrets20231128Integration) validateMongoDbAtlasStaticCredentials(formats strfmt.Registry) error { if swag.IsZero(m.MongoDbAtlasStaticCredentials) { // not required return nil @@ -289,11 +315,11 @@ func (m *Secrets20231128Integration) validateUsedBy(formats strfmt.Registry) err func (m *Secrets20231128Integration) ContextValidate(ctx context.Context, formats strfmt.Registry) error { var res []error - if err := m.contextValidateAwsFederatedWorkloadIdentity(ctx, formats); err != nil { + if err := m.contextValidateAwsAccessKeys(ctx, formats); err != nil { res = append(res, err) } - if err := m.contextValidateAwsStaticCredentials(ctx, formats); err != nil { + if err := m.contextValidateAwsFederatedWorkloadIdentity(ctx, formats); err != nil { res = append(res, err) } @@ -305,6 +331,10 @@ func (m *Secrets20231128Integration) ContextValidate(ctx context.Context, format res = append(res, err) } + if err := m.contextValidateGcpServiceAccountKey(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMongoDbAtlasStaticCredentials(ctx, formats); err != nil { res = append(res, err) } @@ -323,19 +353,19 @@ func (m *Secrets20231128Integration) ContextValidate(ctx context.Context, format return nil } -func (m *Secrets20231128Integration) contextValidateAwsFederatedWorkloadIdentity(ctx context.Context, formats strfmt.Registry) error { +func (m *Secrets20231128Integration) contextValidateAwsAccessKeys(ctx context.Context, formats strfmt.Registry) error { - if m.AwsFederatedWorkloadIdentity != nil { + if m.AwsAccessKeys != nil { - if swag.IsZero(m.AwsFederatedWorkloadIdentity) { // not required + if swag.IsZero(m.AwsAccessKeys) { // not required return nil } - if err := m.AwsFederatedWorkloadIdentity.ContextValidate(ctx, formats); err != nil { + if err := m.AwsAccessKeys.ContextValidate(ctx, formats); err != nil { if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("aws_federated_workload_identity") + return ve.ValidateName("aws_access_keys") } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("aws_federated_workload_identity") + return ce.ValidateName("aws_access_keys") } return err } @@ -344,19 +374,19 @@ func (m *Secrets20231128Integration) contextValidateAwsFederatedWorkloadIdentity return nil } -func (m *Secrets20231128Integration) contextValidateAwsStaticCredentials(ctx context.Context, formats strfmt.Registry) error { +func (m *Secrets20231128Integration) contextValidateAwsFederatedWorkloadIdentity(ctx context.Context, formats strfmt.Registry) error { - if m.AwsStaticCredentials != nil { + if m.AwsFederatedWorkloadIdentity != nil { - if swag.IsZero(m.AwsStaticCredentials) { // not required + if swag.IsZero(m.AwsFederatedWorkloadIdentity) { // not required return nil } - if err := m.AwsStaticCredentials.ContextValidate(ctx, formats); err != nil { + if err := m.AwsFederatedWorkloadIdentity.ContextValidate(ctx, formats); err != nil { if ve, ok := err.(*errors.Validation); ok { - return ve.ValidateName("aws_static_credentials") + return ve.ValidateName("aws_federated_workload_identity") } else if ce, ok := err.(*errors.CompositeError); ok { - return ce.ValidateName("aws_static_credentials") + return ce.ValidateName("aws_federated_workload_identity") } return err } @@ -411,6 +441,27 @@ func (m *Secrets20231128Integration) contextValidateGcpFederatedWorkloadIdentity return nil } +func (m *Secrets20231128Integration) contextValidateGcpServiceAccountKey(ctx context.Context, formats strfmt.Registry) error { + + if m.GcpServiceAccountKey != nil { + + if swag.IsZero(m.GcpServiceAccountKey) { // not required + return nil + } + + if err := m.GcpServiceAccountKey.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("gcp_service_account_key") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("gcp_service_account_key") + } + return err + } + } + + return nil +} + func (m *Secrets20231128Integration) contextValidateMongoDbAtlasStaticCredentials(ctx context.Context, formats strfmt.Registry) error { if m.MongoDbAtlasStaticCredentials != nil { diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_mongo_d_b_atlas_integration.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_mongo_d_b_atlas_integration.go index 88e33269..fc18c6bd 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_mongo_d_b_atlas_integration.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_mongo_d_b_atlas_integration.go @@ -30,9 +30,6 @@ type Secrets20231128MongoDBAtlasIntegration struct { // created by id CreatedByID string `json:"created_by_id,omitempty"` - // gateway pool id - GatewayPoolID string `json:"gateway_pool_id,omitempty"` - // integration name IntegrationName string `json:"integration_name,omitempty"` diff --git a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_twilio_integration.go b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_twilio_integration.go index db71ceeb..7452bf73 100644 --- a/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_twilio_integration.go +++ b/clients/cloud-vault-secrets/preview/2023-11-28/models/secrets20231128_twilio_integration.go @@ -30,9 +30,6 @@ type Secrets20231128TwilioIntegration struct { // created by id CreatedByID string `json:"created_by_id,omitempty"` - // gateway pool id - GatewayPoolID string `json:"gateway_pool_id,omitempty"` - // integration name IntegrationName string `json:"integration_name,omitempty"`