From 5e1ab8e0e704b960a5d437bc6631407df46ca03f Mon Sep 17 00:00:00 2001 From: HashiCorp Cloud Services Date: Wed, 15 Jan 2025 10:56:08 +0000 Subject: [PATCH] Update cloud-vault-secrets SDK --- ...service_create_app_rotating_secret_body.go | 51 +++++++++++++++++++ .../secret_service_create_integration_body.go | 51 +++++++++++++++++++ ...service_update_app_rotating_secret_body.go | 51 +++++++++++++++++++ .../secret_service_update_integration_body.go | 51 +++++++++++++++++++ .../models/secrets20231128_integration.go | 51 +++++++++++++++++++ ...231128_mssql_static_credentials_request.go | 50 ++++++++++++++++++ ...31128_mssql_static_credentials_response.go | 50 ++++++++++++++++++ ...ets20231128_mssql_user_password_details.go | 50 ++++++++++++++++++ .../models/secrets20231128_rotating_secret.go | 51 +++++++++++++++++++ 9 files changed, 456 insertions(+) create mode 100644 clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_request.go create mode 100644 clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_response.go create mode 100644 clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_user_password_details.go diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_app_rotating_secret_body.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_app_rotating_secret_body.go index d8c9f0dc..afb3920f 100644 --- a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_app_rotating_secret_body.go +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_app_rotating_secret_body.go @@ -36,6 +36,9 @@ type SecretServiceCreateAppRotatingSecretBody struct { // mongodb atlas user password details MongodbAtlasUserPasswordDetails *Secrets20231128MongoDBAtlasSecretDetails `json:"mongodb_atlas_user_password_details,omitempty"` + // mssql user password details + MssqlUserPasswordDetails *Secrets20231128MssqlUserPasswordDetails `json:"mssql_user_password_details,omitempty"` + // mysql user password details MysqlUserPasswordDetails *Secrets20231128MysqlUserPasswordDetails `json:"mysql_user_password_details,omitempty"` @@ -79,6 +82,10 @@ func (m *SecretServiceCreateAppRotatingSecretBody) Validate(formats strfmt.Regis res = append(res, err) } + if err := m.validateMssqlUserPasswordDetails(formats); err != nil { + res = append(res, err) + } + if err := m.validateMysqlUserPasswordDetails(formats); err != nil { res = append(res, err) } @@ -192,6 +199,25 @@ func (m *SecretServiceCreateAppRotatingSecretBody) validateMongodbAtlasUserPassw return nil } +func (m *SecretServiceCreateAppRotatingSecretBody) validateMssqlUserPasswordDetails(formats strfmt.Registry) error { + if swag.IsZero(m.MssqlUserPasswordDetails) { // not required + return nil + } + + if m.MssqlUserPasswordDetails != nil { + if err := m.MssqlUserPasswordDetails.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_user_password_details") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_user_password_details") + } + return err + } + } + + return nil +} + func (m *SecretServiceCreateAppRotatingSecretBody) validateMysqlUserPasswordDetails(formats strfmt.Registry) error { if swag.IsZero(m.MysqlUserPasswordDetails) { // not required return nil @@ -273,6 +299,10 @@ func (m *SecretServiceCreateAppRotatingSecretBody) ContextValidate(ctx context.C res = append(res, err) } + if err := m.contextValidateMssqlUserPasswordDetails(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMysqlUserPasswordDetails(ctx, formats); err != nil { res = append(res, err) } @@ -396,6 +426,27 @@ func (m *SecretServiceCreateAppRotatingSecretBody) contextValidateMongodbAtlasUs return nil } +func (m *SecretServiceCreateAppRotatingSecretBody) contextValidateMssqlUserPasswordDetails(ctx context.Context, formats strfmt.Registry) error { + + if m.MssqlUserPasswordDetails != nil { + + if swag.IsZero(m.MssqlUserPasswordDetails) { // not required + return nil + } + + if err := m.MssqlUserPasswordDetails.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_user_password_details") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_user_password_details") + } + return err + } + } + + return nil +} + func (m *SecretServiceCreateAppRotatingSecretBody) contextValidateMysqlUserPasswordDetails(ctx context.Context, formats strfmt.Registry) error { if m.MysqlUserPasswordDetails != nil { diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_integration_body.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_integration_body.go index 5810d84e..73902f77 100644 --- a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_integration_body.go +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_create_integration_body.go @@ -55,6 +55,9 @@ type SecretServiceCreateIntegrationBody struct { // mongo db atlas static credentials MongoDbAtlasStaticCredentials *Secrets20231128MongoDBAtlasStaticCredentialsRequest `json:"mongo_db_atlas_static_credentials,omitempty"` + // mssql static credentials + MssqlStaticCredentials *Secrets20231128MssqlStaticCredentialsRequest `json:"mssql_static_credentials,omitempty"` + // mysql static credentials MysqlStaticCredentials *Secrets20231128MysqlStaticCredentialsRequest `json:"mysql_static_credentials,omitempty"` @@ -119,6 +122,10 @@ func (m *SecretServiceCreateIntegrationBody) Validate(formats strfmt.Registry) e res = append(res, err) } + if err := m.validateMssqlStaticCredentials(formats); err != nil { + res = append(res, err) + } + if err := m.validateMysqlStaticCredentials(formats); err != nil { res = append(res, err) } @@ -353,6 +360,25 @@ func (m *SecretServiceCreateIntegrationBody) validateMongoDbAtlasStaticCredentia return nil } +func (m *SecretServiceCreateIntegrationBody) validateMssqlStaticCredentials(formats strfmt.Registry) error { + if swag.IsZero(m.MssqlStaticCredentials) { // not required + return nil + } + + if m.MssqlStaticCredentials != nil { + if err := m.MssqlStaticCredentials.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_static_credentials") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_static_credentials") + } + return err + } + } + + return nil +} + func (m *SecretServiceCreateIntegrationBody) validateMysqlStaticCredentials(formats strfmt.Registry) error { if swag.IsZero(m.MysqlStaticCredentials) { // not required return nil @@ -458,6 +484,10 @@ func (m *SecretServiceCreateIntegrationBody) ContextValidate(ctx context.Context res = append(res, err) } + if err := m.contextValidateMssqlStaticCredentials(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMysqlStaticCredentials(ctx, formats); err != nil { res = append(res, err) } @@ -711,6 +741,27 @@ func (m *SecretServiceCreateIntegrationBody) contextValidateMongoDbAtlasStaticCr return nil } +func (m *SecretServiceCreateIntegrationBody) contextValidateMssqlStaticCredentials(ctx context.Context, formats strfmt.Registry) error { + + if m.MssqlStaticCredentials != nil { + + if swag.IsZero(m.MssqlStaticCredentials) { // not required + return nil + } + + if err := m.MssqlStaticCredentials.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_static_credentials") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_static_credentials") + } + return err + } + } + + return nil +} + func (m *SecretServiceCreateIntegrationBody) contextValidateMysqlStaticCredentials(ctx context.Context, formats strfmt.Registry) error { if m.MysqlStaticCredentials != nil { diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_app_rotating_secret_body.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_app_rotating_secret_body.go index e6dda032..5d313bfd 100644 --- a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_app_rotating_secret_body.go +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_app_rotating_secret_body.go @@ -36,6 +36,9 @@ type SecretServiceUpdateAppRotatingSecretBody struct { // mongodb atlas user password details MongodbAtlasUserPasswordDetails *Secrets20231128MongoDBAtlasSecretDetails `json:"mongodb_atlas_user_password_details,omitempty"` + // mssql user password details + MssqlUserPasswordDetails *Secrets20231128MssqlUserPasswordDetails `json:"mssql_user_password_details,omitempty"` + // mysql user password details MysqlUserPasswordDetails *Secrets20231128MysqlUserPasswordDetails `json:"mysql_user_password_details,omitempty"` @@ -79,6 +82,10 @@ func (m *SecretServiceUpdateAppRotatingSecretBody) Validate(formats strfmt.Regis res = append(res, err) } + if err := m.validateMssqlUserPasswordDetails(formats); err != nil { + res = append(res, err) + } + if err := m.validateMysqlUserPasswordDetails(formats); err != nil { res = append(res, err) } @@ -192,6 +199,25 @@ func (m *SecretServiceUpdateAppRotatingSecretBody) validateMongodbAtlasUserPassw return nil } +func (m *SecretServiceUpdateAppRotatingSecretBody) validateMssqlUserPasswordDetails(formats strfmt.Registry) error { + if swag.IsZero(m.MssqlUserPasswordDetails) { // not required + return nil + } + + if m.MssqlUserPasswordDetails != nil { + if err := m.MssqlUserPasswordDetails.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_user_password_details") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_user_password_details") + } + return err + } + } + + return nil +} + func (m *SecretServiceUpdateAppRotatingSecretBody) validateMysqlUserPasswordDetails(formats strfmt.Registry) error { if swag.IsZero(m.MysqlUserPasswordDetails) { // not required return nil @@ -273,6 +299,10 @@ func (m *SecretServiceUpdateAppRotatingSecretBody) ContextValidate(ctx context.C res = append(res, err) } + if err := m.contextValidateMssqlUserPasswordDetails(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMysqlUserPasswordDetails(ctx, formats); err != nil { res = append(res, err) } @@ -396,6 +426,27 @@ func (m *SecretServiceUpdateAppRotatingSecretBody) contextValidateMongodbAtlasUs return nil } +func (m *SecretServiceUpdateAppRotatingSecretBody) contextValidateMssqlUserPasswordDetails(ctx context.Context, formats strfmt.Registry) error { + + if m.MssqlUserPasswordDetails != nil { + + if swag.IsZero(m.MssqlUserPasswordDetails) { // not required + return nil + } + + if err := m.MssqlUserPasswordDetails.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_user_password_details") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_user_password_details") + } + return err + } + } + + return nil +} + func (m *SecretServiceUpdateAppRotatingSecretBody) contextValidateMysqlUserPasswordDetails(ctx context.Context, formats strfmt.Registry) error { if m.MysqlUserPasswordDetails != nil { diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_integration_body.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_integration_body.go index a18e8a3f..89d05fc7 100644 --- a/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_integration_body.go +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secret_service_update_integration_body.go @@ -52,6 +52,9 @@ type SecretServiceUpdateIntegrationBody struct { // mongo db atlas static credentials MongoDbAtlasStaticCredentials *Secrets20231128MongoDBAtlasStaticCredentialsRequest `json:"mongo_db_atlas_static_credentials,omitempty"` + // mssql static credentials + MssqlStaticCredentials *Secrets20231128MssqlStaticCredentialsRequest `json:"mssql_static_credentials,omitempty"` + // mysql static credentials MysqlStaticCredentials *Secrets20231128MysqlStaticCredentialsRequest `json:"mysql_static_credentials,omitempty"` @@ -113,6 +116,10 @@ func (m *SecretServiceUpdateIntegrationBody) Validate(formats strfmt.Registry) e res = append(res, err) } + if err := m.validateMssqlStaticCredentials(formats); err != nil { + res = append(res, err) + } + if err := m.validateMysqlStaticCredentials(formats); err != nil { res = append(res, err) } @@ -347,6 +354,25 @@ func (m *SecretServiceUpdateIntegrationBody) validateMongoDbAtlasStaticCredentia return nil } +func (m *SecretServiceUpdateIntegrationBody) validateMssqlStaticCredentials(formats strfmt.Registry) error { + if swag.IsZero(m.MssqlStaticCredentials) { // not required + return nil + } + + if m.MssqlStaticCredentials != nil { + if err := m.MssqlStaticCredentials.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_static_credentials") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_static_credentials") + } + return err + } + } + + return nil +} + func (m *SecretServiceUpdateIntegrationBody) validateMysqlStaticCredentials(formats strfmt.Registry) error { if swag.IsZero(m.MysqlStaticCredentials) { // not required return nil @@ -452,6 +478,10 @@ func (m *SecretServiceUpdateIntegrationBody) ContextValidate(ctx context.Context res = append(res, err) } + if err := m.contextValidateMssqlStaticCredentials(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMysqlStaticCredentials(ctx, formats); err != nil { res = append(res, err) } @@ -705,6 +735,27 @@ func (m *SecretServiceUpdateIntegrationBody) contextValidateMongoDbAtlasStaticCr return nil } +func (m *SecretServiceUpdateIntegrationBody) contextValidateMssqlStaticCredentials(ctx context.Context, formats strfmt.Registry) error { + + if m.MssqlStaticCredentials != nil { + + if swag.IsZero(m.MssqlStaticCredentials) { // not required + return nil + } + + if err := m.MssqlStaticCredentials.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_static_credentials") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_static_credentials") + } + return err + } + } + + return nil +} + func (m *SecretServiceUpdateIntegrationBody) contextValidateMysqlStaticCredentials(ctx context.Context, formats strfmt.Registry) error { if m.MysqlStaticCredentials != nil { diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_integration.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_integration.go index f2a6ec7d..fa944d1d 100644 --- a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_integration.go +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_integration.go @@ -60,6 +60,9 @@ type Secrets20231128Integration struct { // mongo db atlas static credentials MongoDbAtlasStaticCredentials *Secrets20231128MongoDBAtlasStaticCredentialsResponse `json:"mongo_db_atlas_static_credentials,omitempty"` + // mssql static credentials + MssqlStaticCredentials *Secrets20231128MssqlStaticCredentialsResponse `json:"mssql_static_credentials,omitempty"` + // mysql static credentials MysqlStaticCredentials *Secrets20231128MysqlStaticCredentialsResponse `json:"mysql_static_credentials,omitempty"` @@ -140,6 +143,10 @@ func (m *Secrets20231128Integration) Validate(formats strfmt.Registry) error { res = append(res, err) } + if err := m.validateMssqlStaticCredentials(formats); err != nil { + res = append(res, err) + } + if err := m.validateMysqlStaticCredentials(formats); err != nil { res = append(res, err) } @@ -375,6 +382,25 @@ func (m *Secrets20231128Integration) validateMongoDbAtlasStaticCredentials(forma return nil } +func (m *Secrets20231128Integration) validateMssqlStaticCredentials(formats strfmt.Registry) error { + if swag.IsZero(m.MssqlStaticCredentials) { // not required + return nil + } + + if m.MssqlStaticCredentials != nil { + if err := m.MssqlStaticCredentials.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_static_credentials") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_static_credentials") + } + return err + } + } + + return nil +} + func (m *Secrets20231128Integration) validateMysqlStaticCredentials(formats strfmt.Registry) error { if swag.IsZero(m.MysqlStaticCredentials) { // not required return nil @@ -514,6 +540,10 @@ func (m *Secrets20231128Integration) ContextValidate(ctx context.Context, format res = append(res, err) } + if err := m.contextValidateMssqlStaticCredentials(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMysqlStaticCredentials(ctx, formats); err != nil { res = append(res, err) } @@ -750,6 +780,27 @@ func (m *Secrets20231128Integration) contextValidateMongoDbAtlasStaticCredential return nil } +func (m *Secrets20231128Integration) contextValidateMssqlStaticCredentials(ctx context.Context, formats strfmt.Registry) error { + + if m.MssqlStaticCredentials != nil { + + if swag.IsZero(m.MssqlStaticCredentials) { // not required + return nil + } + + if err := m.MssqlStaticCredentials.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_static_credentials") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_static_credentials") + } + return err + } + } + + return nil +} + func (m *Secrets20231128Integration) contextValidateMysqlStaticCredentials(ctx context.Context, formats strfmt.Registry) error { if m.MysqlStaticCredentials != nil { diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_request.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_request.go new file mode 100644 index 00000000..af5c133c --- /dev/null +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_request.go @@ -0,0 +1,50 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128MssqlStaticCredentialsRequest secrets 20231128 mssql static credentials request +// +// swagger:model secrets_20231128MssqlStaticCredentialsRequest +type Secrets20231128MssqlStaticCredentialsRequest struct { + + // connection string + ConnectionString string `json:"connection_string,omitempty"` +} + +// Validate validates this secrets 20231128 mssql static credentials request +func (m *Secrets20231128MssqlStaticCredentialsRequest) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 mssql static credentials request based on context it is used +func (m *Secrets20231128MssqlStaticCredentialsRequest) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128MssqlStaticCredentialsRequest) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128MssqlStaticCredentialsRequest) UnmarshalBinary(b []byte) error { + var res Secrets20231128MssqlStaticCredentialsRequest + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_response.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_response.go new file mode 100644 index 00000000..6d1a126c --- /dev/null +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_static_credentials_response.go @@ -0,0 +1,50 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128MssqlStaticCredentialsResponse secrets 20231128 mssql static credentials response +// +// swagger:model secrets_20231128MssqlStaticCredentialsResponse +type Secrets20231128MssqlStaticCredentialsResponse struct { + + // connection string + ConnectionString string `json:"connection_string,omitempty"` +} + +// Validate validates this secrets 20231128 mssql static credentials response +func (m *Secrets20231128MssqlStaticCredentialsResponse) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 mssql static credentials response based on context it is used +func (m *Secrets20231128MssqlStaticCredentialsResponse) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128MssqlStaticCredentialsResponse) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128MssqlStaticCredentialsResponse) UnmarshalBinary(b []byte) error { + var res Secrets20231128MssqlStaticCredentialsResponse + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_user_password_details.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_user_password_details.go new file mode 100644 index 00000000..594b21cb --- /dev/null +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_mssql_user_password_details.go @@ -0,0 +1,50 @@ +// Code generated by go-swagger; DO NOT EDIT. + +package models + +// This file was generated by the swagger tool. +// Editing this file might prove futile when you re-run the swagger generate command + +import ( + "context" + + "github.com/go-openapi/strfmt" + "github.com/go-openapi/swag" +) + +// Secrets20231128MssqlUserPasswordDetails secrets 20231128 mssql user password details +// +// swagger:model secrets_20231128MssqlUserPasswordDetails +type Secrets20231128MssqlUserPasswordDetails struct { + + // usernames + Usernames []string `json:"usernames"` +} + +// Validate validates this secrets 20231128 mssql user password details +func (m *Secrets20231128MssqlUserPasswordDetails) Validate(formats strfmt.Registry) error { + return nil +} + +// ContextValidate validates this secrets 20231128 mssql user password details based on context it is used +func (m *Secrets20231128MssqlUserPasswordDetails) ContextValidate(ctx context.Context, formats strfmt.Registry) error { + return nil +} + +// MarshalBinary interface implementation +func (m *Secrets20231128MssqlUserPasswordDetails) MarshalBinary() ([]byte, error) { + if m == nil { + return nil, nil + } + return swag.WriteJSON(m) +} + +// UnmarshalBinary interface implementation +func (m *Secrets20231128MssqlUserPasswordDetails) UnmarshalBinary(b []byte) error { + var res Secrets20231128MssqlUserPasswordDetails + if err := swag.ReadJSON(b, &res); err != nil { + return err + } + *m = res + return nil +} diff --git a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_rotating_secret.go b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_rotating_secret.go index 193027ee..c30218c3 100644 --- a/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_rotating_secret.go +++ b/clients/cloud-vault-secrets/stable/2023-11-28/models/secrets20231128_rotating_secret.go @@ -44,6 +44,9 @@ type Secrets20231128RotatingSecret struct { // mongodb atlas user password details MongodbAtlasUserPasswordDetails *Secrets20231128MongoDBAtlasSecretDetails `json:"mongodb_atlas_user_password_details,omitempty"` + // mssql user password details + MssqlUserPasswordDetails *Secrets20231128MssqlUserPasswordDetails `json:"mssql_user_password_details,omitempty"` + // mysql user password details MysqlUserPasswordDetails *Secrets20231128MysqlUserPasswordDetails `json:"mysql_user_password_details,omitempty"` @@ -101,6 +104,10 @@ func (m *Secrets20231128RotatingSecret) Validate(formats strfmt.Registry) error res = append(res, err) } + if err := m.validateMssqlUserPasswordDetails(formats); err != nil { + res = append(res, err) + } + if err := m.validateMysqlUserPasswordDetails(formats); err != nil { res = append(res, err) } @@ -230,6 +237,25 @@ func (m *Secrets20231128RotatingSecret) validateMongodbAtlasUserPasswordDetails( return nil } +func (m *Secrets20231128RotatingSecret) validateMssqlUserPasswordDetails(formats strfmt.Registry) error { + if swag.IsZero(m.MssqlUserPasswordDetails) { // not required + return nil + } + + if m.MssqlUserPasswordDetails != nil { + if err := m.MssqlUserPasswordDetails.Validate(formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_user_password_details") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_user_password_details") + } + return err + } + } + + return nil +} + func (m *Secrets20231128RotatingSecret) validateMysqlUserPasswordDetails(formats strfmt.Registry) error { if swag.IsZero(m.MysqlUserPasswordDetails) { // not required return nil @@ -323,6 +349,10 @@ func (m *Secrets20231128RotatingSecret) ContextValidate(ctx context.Context, for res = append(res, err) } + if err := m.contextValidateMssqlUserPasswordDetails(ctx, formats); err != nil { + res = append(res, err) + } + if err := m.contextValidateMysqlUserPasswordDetails(ctx, formats); err != nil { res = append(res, err) } @@ -446,6 +476,27 @@ func (m *Secrets20231128RotatingSecret) contextValidateMongodbAtlasUserPasswordD return nil } +func (m *Secrets20231128RotatingSecret) contextValidateMssqlUserPasswordDetails(ctx context.Context, formats strfmt.Registry) error { + + if m.MssqlUserPasswordDetails != nil { + + if swag.IsZero(m.MssqlUserPasswordDetails) { // not required + return nil + } + + if err := m.MssqlUserPasswordDetails.ContextValidate(ctx, formats); err != nil { + if ve, ok := err.(*errors.Validation); ok { + return ve.ValidateName("mssql_user_password_details") + } else if ce, ok := err.(*errors.CompositeError); ok { + return ce.ValidateName("mssql_user_password_details") + } + return err + } + } + + return nil +} + func (m *Secrets20231128RotatingSecret) contextValidateMysqlUserPasswordDetails(ctx context.Context, formats strfmt.Registry) error { if m.MysqlUserPasswordDetails != nil {