diff --git a/docs/AuthApi.md b/docs/AuthApi.md index 143f3ec1..c315ff26 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -274,11 +274,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudDeleteAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -335,9 +336,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AliCloudListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -394,10 +396,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AliCloudLogin( context.Background(), - schema.AliCloudLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AliCloudLoginRequest{ + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -453,11 +458,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudReadAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -515,12 +521,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudWriteAuthRole( context.Background(), role, - schema.AliCloudWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AliCloudWriteAuthRoleRequest{ + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -578,11 +587,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBindSecretId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -639,11 +649,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBoundCidrList( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -700,11 +711,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePeriod( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -761,11 +773,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePolicies( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -822,11 +835,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteRole( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -883,11 +897,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -944,11 +959,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1005,11 +1021,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1066,11 +1083,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1127,11 +1145,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenMaxTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1188,11 +1207,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1249,11 +1269,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1311,12 +1332,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretId( context.Background(), roleName, - schema.AppRoleDestroySecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleDestroySecretIdRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1375,12 +1399,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretIdByAccessor( context.Background(), roleName, - schema.AppRoleDestroySecretIdByAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleDestroySecretIdByAccessorRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1438,9 +1465,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AppRoleListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1496,11 +1524,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleListSecretIds( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1559,10 +1588,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AppRoleLogin( context.Background(), - schema.AppRoleLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleLoginRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1619,12 +1651,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretId( context.Background(), roleName, - schema.AppRoleLookUpSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleLookUpSecretIdRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1683,12 +1718,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretIdByAccessor( context.Background(), roleName, - schema.AppRoleLookUpSecretIdByAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleLookUpSecretIdByAccessorRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1746,11 +1784,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBindSecretId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1807,11 +1846,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBoundCidrList( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1868,11 +1908,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadLocalSecretIds( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1929,11 +1970,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPeriod( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1990,11 +2032,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPolicies( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2051,11 +2094,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRole( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2112,11 +2156,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRoleId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2173,11 +2218,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2234,11 +2280,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2295,11 +2342,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2356,11 +2404,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2417,11 +2466,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenMaxTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2478,11 +2528,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2539,11 +2590,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2600,9 +2652,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AppRoleTidySecretId( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2658,12 +2711,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBindSecretId( context.Background(), roleName, - schema.AppRoleWriteBindSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteBindSecretIdRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2722,12 +2778,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBoundCidrList( context.Background(), roleName, - schema.AppRoleWriteBoundCidrListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteBoundCidrListRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2786,12 +2845,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteCustomSecretId( context.Background(), roleName, - schema.AppRoleWriteCustomSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteCustomSecretIdRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2850,12 +2912,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePeriod( context.Background(), roleName, - schema.AppRoleWritePeriodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWritePeriodRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2914,12 +2979,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePolicies( context.Background(), roleName, - schema.AppRoleWritePoliciesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWritePoliciesRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2978,12 +3046,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRole( context.Background(), roleName, - schema.AppRoleWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3042,12 +3113,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRoleId( context.Background(), roleName, - schema.AppRoleWriteRoleIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteRoleIdRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3106,12 +3180,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretId( context.Background(), roleName, - schema.AppRoleWriteSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteSecretIdRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3170,12 +3247,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdBoundCidrs( context.Background(), roleName, - schema.AppRoleWriteSecretIdBoundCidrsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteSecretIdBoundCidrsRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3234,12 +3314,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdNumUses( context.Background(), roleName, - schema.AppRoleWriteSecretIdNumUsesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteSecretIdNumUsesRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3298,12 +3381,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdTtl( context.Background(), roleName, - schema.AppRoleWriteSecretIdTtlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteSecretIdTtlRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3362,12 +3448,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenBoundCidrs( context.Background(), roleName, - schema.AppRoleWriteTokenBoundCidrsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteTokenBoundCidrsRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3426,12 +3515,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenMaxTtl( context.Background(), roleName, - schema.AppRoleWriteTokenMaxTtlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteTokenMaxTtlRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3490,12 +3582,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenNumUses( context.Background(), roleName, - schema.AppRoleWriteTokenNumUsesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteTokenNumUsesRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3554,12 +3649,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenTtl( context.Background(), roleName, - schema.AppRoleWriteTokenTtlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AppRoleWriteTokenTtlRequest{ + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3618,12 +3716,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsConfigureCertificate( context.Background(), certName, - schema.AwsConfigureCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureCertificateRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3682,10 +3783,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsConfigureClient( context.Background(), - schema.AwsConfigureClientRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureClientRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3742,10 +3846,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsConfigureIdentityAccessListTidyOperation( context.Background(), - schema.AwsConfigureIdentityAccessListTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureIdentityAccessListTidyOperationRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3802,10 +3909,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsConfigureIdentityIntegration( context.Background(), - schema.AwsConfigureIdentityIntegrationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureIdentityIntegrationRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3862,10 +3972,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsConfigureIdentityWhitelistTidyOperation( context.Background(), - schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3922,10 +4035,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsConfigureRoleTagBlacklistTidyOperation( context.Background(), - schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3982,10 +4098,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsConfigureRoleTagDenyListTidyOperation( context.Background(), - schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -4041,11 +4160,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsDeleteAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4102,11 +4222,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsDeleteCertificateConfiguration( context.Background(), certName, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4163,9 +4284,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsDeleteClientConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4220,11 +4342,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityAccessList( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4281,9 +4404,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsDeleteIdentityAccessListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4338,11 +4462,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityWhitelist( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4399,9 +4524,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsDeleteIdentityWhitelistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4456,11 +4582,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4517,9 +4644,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsDeleteRoleTagBlacklistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4574,11 +4702,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4635,9 +4764,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsDeleteRoleTagDenyListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4692,11 +4822,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsDeleteStsRole( context.Background(), accountId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4753,9 +4884,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4811,9 +4943,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListCertificateConfigurations( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4869,9 +5002,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListIdentityAccessList( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4927,9 +5061,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListIdentityWhitelist( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4985,9 +5120,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListRoleTagBlacklists( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5043,9 +5179,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListRoleTagDenyLists( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5101,9 +5238,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsListStsRoleRelationships( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5160,10 +5298,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsLogin( context.Background(), - schema.AwsLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsLoginRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -5219,11 +5360,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsReadAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5280,11 +5422,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsReadCertificateConfiguration( context.Background(), certName, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5341,9 +5484,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsReadClientConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5398,11 +5542,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityAccessList( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5459,9 +5604,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsReadIdentityAccessListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5516,9 +5662,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsReadIdentityIntegrationConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5573,11 +5720,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityWhitelist( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5634,9 +5782,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsReadIdentityWhitelistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5691,11 +5840,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5752,9 +5902,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsReadRoleTagBlacklistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5809,11 +5960,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5870,9 +6022,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsReadRoleTagDenyListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5927,11 +6080,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsReadStsRole( context.Background(), accountId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5988,9 +6142,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6046,10 +6201,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsTidyIdentityAccessList( context.Background(), - schema.AwsTidyIdentityAccessListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsTidyIdentityAccessListRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6106,10 +6264,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsTidyIdentityWhitelist( context.Background(), - schema.AwsTidyIdentityWhitelistRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsTidyIdentityWhitelistRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6166,10 +6327,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsTidyRoleTagBlacklist( context.Background(), - schema.AwsTidyRoleTagBlacklistRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsTidyRoleTagBlacklistRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6226,10 +6390,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AwsTidyRoleTagDenyList( context.Background(), - schema.AwsTidyRoleTagDenyListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsTidyRoleTagDenyListRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6286,12 +6453,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteAuthRole( context.Background(), role, - schema.AwsWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsWriteAuthRoleRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6350,12 +6520,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteRoleTag( context.Background(), role, - schema.AwsWriteRoleTagRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsWriteRoleTagRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6413,11 +6586,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6474,11 +6648,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6536,12 +6711,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsWriteStsRole( context.Background(), accountId, - schema.AwsWriteStsRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsWriteStsRoleRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6600,10 +6778,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AzureConfigureAuth( context.Background(), - schema.AzureConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AzureConfigureAuthRequest{ + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -6659,9 +6840,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AzureDeleteAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6716,11 +6898,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureDeleteAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6777,9 +6960,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AzureListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6836,10 +7020,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AzureLogin( context.Background(), - schema.AzureLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AzureLoginRequest{ + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -6895,9 +7082,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AzureReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6952,11 +7140,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureReadAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7013,9 +7202,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.AzureRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7071,12 +7261,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureWriteAuthRole( context.Background(), name, - schema.AzureWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AzureWriteAuthRoleRequest{ + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -7135,10 +7328,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CentrifyConfigure( context.Background(), - schema.CentrifyConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CentrifyConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("centrify"), ) if err != nil { @@ -7195,10 +7391,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CentrifyLogin( context.Background(), - schema.CentrifyLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CentrifyLoginRequest{ + // populate request parameters + }, vault.WithMountPath("centrify"), ) if err != nil { @@ -7254,9 +7453,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CentrifyReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7312,10 +7512,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CertConfigure( context.Background(), - schema.CertConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CertConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -7371,11 +7574,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCertificate( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7432,11 +7636,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCrl( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7493,9 +7698,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CertListCertificates( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7551,9 +7757,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CertListCrls( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7610,10 +7817,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CertLogin( context.Background(), - schema.CertLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CertLoginRequest{ + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -7669,11 +7879,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCertificate( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7730,9 +7941,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CertReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7787,11 +7999,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCrl( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7849,12 +8062,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCertificate( context.Background(), name, - schema.CertWriteCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CertWriteCertificateRequest{ + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -7913,12 +8129,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCrl( context.Background(), name, - schema.CertWriteCrlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CertWriteCrlRequest{ + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -7977,10 +8196,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CloudFoundryConfigure( context.Background(), - schema.CloudFoundryConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CloudFoundryConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("cf"), ) if err != nil { @@ -8036,9 +8258,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CloudFoundryDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8093,11 +8316,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8154,9 +8378,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CloudFoundryListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8213,10 +8438,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CloudFoundryLogin( context.Background(), - schema.CloudFoundryLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CloudFoundryLoginRequest{ + // populate request parameters + }, vault.WithMountPath("cf"), ) if err != nil { @@ -8272,9 +8500,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.CloudFoundryReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8329,11 +8558,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8391,12 +8621,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryWriteRole( context.Background(), role, - schema.CloudFoundryWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CloudFoundryWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("cf"), ) if err != nil { @@ -8455,10 +8688,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GithubConfigure( context.Background(), - schema.GithubConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GithubConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -8514,11 +8750,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubDeleteTeamMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8575,11 +8812,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubDeleteUserMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8636,9 +8874,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GithubListTeams( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8694,9 +8933,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GithubListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8753,10 +8993,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GithubLogin( context.Background(), - schema.GithubLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GithubLoginRequest{ + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -8812,9 +9055,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GithubReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8869,11 +9113,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubReadTeamMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8930,11 +9175,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubReadUserMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8992,12 +9238,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubWriteTeamMapping( context.Background(), key, - schema.GithubWriteTeamMappingRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GithubWriteTeamMappingRequest{ + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -9056,12 +9305,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubWriteUserMapping( context.Background(), key, - schema.GithubWriteUserMappingRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GithubWriteUserMappingRequest{ + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -9120,10 +9372,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GoogleCloudConfigureAuth( context.Background(), - schema.GoogleCloudConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudConfigureAuthRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9179,11 +9434,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9241,12 +9497,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditLabelsForRole( context.Background(), name, - schema.GoogleCloudEditLabelsForRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudEditLabelsForRoleRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9305,12 +9564,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditServiceAccountsForRole( context.Background(), name, - schema.GoogleCloudEditServiceAccountsForRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudEditServiceAccountsForRoleRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9368,9 +9630,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GoogleCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9427,10 +9690,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GoogleCloudLogin( context.Background(), - schema.GoogleCloudLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudLoginRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9486,9 +9752,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.GoogleCloudReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9543,11 +9810,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9605,12 +9873,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudWriteRole( context.Background(), name, - schema.GoogleCloudWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9674,10 +9945,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.JwtConfigure( context.Background(), - schema.JwtConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.JwtConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -9733,11 +10007,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9796,9 +10071,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.JwtListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9855,10 +10131,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.JwtLogin( context.Background(), - schema.JwtLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.JwtLoginRequest{ + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -9914,6 +10193,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + clientNonce := "clientNonce_example" // string | code := "code_example" // string | state := "state_example" // string | @@ -9922,7 +10203,6 @@ func main() { clientNonce, code, state, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9981,10 +10261,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.JwtOidcCallbackFormPost( context.Background(), - schema.JwtOidcCallbackFormPostRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.JwtOidcCallbackFormPostRequest{ + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10041,10 +10324,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.JwtOidcRequestAuthorizationUrl( context.Background(), - schema.JwtOidcRequestAuthorizationUrlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.JwtOidcRequestAuthorizationUrlRequest{ + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10100,9 +10386,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.JwtReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10157,11 +10444,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10224,12 +10512,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtWriteRole( context.Background(), name, - schema.JwtWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.JwtWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10288,10 +10579,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KerberosConfigure( context.Background(), - schema.KerberosConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KerberosConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -10348,10 +10642,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KerberosConfigureLdap( context.Background(), - schema.KerberosConfigureLdapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KerberosConfigureLdapRequest{ + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -10407,11 +10704,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10468,9 +10766,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KerberosListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10527,10 +10826,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KerberosLogin( context.Background(), - schema.KerberosLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KerberosLoginRequest{ + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -10586,9 +10888,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KerberosReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10643,11 +10946,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10704,9 +11008,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KerberosReadLdapConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10762,12 +11067,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosWriteGroup( context.Background(), name, - schema.KerberosWriteGroupRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KerberosWriteGroupRequest{ + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -10826,10 +11134,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KubernetesConfigureAuth( context.Background(), - schema.KubernetesConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KubernetesConfigureAuthRequest{ + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10885,11 +11196,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesDeleteAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10946,9 +11258,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KubernetesListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11005,10 +11318,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KubernetesLogin( context.Background(), - schema.KubernetesLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KubernetesLoginRequest{ + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11064,9 +11380,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.KubernetesReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11121,11 +11438,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesReadAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11183,12 +11501,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesWriteAuthRole( context.Background(), name, - schema.KubernetesWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KubernetesWriteAuthRoleRequest{ + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11247,10 +11568,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.LdapConfigureAuth( context.Background(), - schema.LdapConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapConfigureAuthRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -11306,11 +11630,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11367,11 +11692,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11428,9 +11754,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.LdapListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11486,9 +11813,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.LdapListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11545,12 +11873,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | DN (distinguished name) to be used for login. resp, err := client.Auth.LdapLogin( context.Background(), username, - schema.LdapLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapLoginRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -11608,9 +11939,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.LdapReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11665,11 +11997,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11726,11 +12059,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11788,12 +12122,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapWriteGroup( context.Background(), name, - schema.LdapWriteGroupRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapWriteGroupRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -11852,12 +12189,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapWriteUser( context.Background(), name, - schema.LdapWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapWriteUserRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -11916,10 +12256,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OciConfigure( context.Background(), - schema.OciConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OciConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("oci"), ) if err != nil { @@ -11975,9 +12318,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OciDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12032,11 +12376,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.OciDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12093,9 +12438,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OciListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12152,12 +12498,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.OciLogin( context.Background(), role, - schema.OciLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OciLoginRequest{ + // populate request parameters + }, vault.WithMountPath("oci"), ) if err != nil { @@ -12215,9 +12564,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OciReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12272,11 +12622,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.OciReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12334,12 +12685,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Auth.OciWriteRole( context.Background(), role, - schema.OciWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OciWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("oci"), ) if err != nil { @@ -12398,10 +12752,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OktaConfigure( context.Background(), - schema.OktaConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OktaConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -12457,11 +12814,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12518,11 +12876,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12579,9 +12938,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OktaListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12637,9 +12997,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OktaListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12696,12 +13057,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username to be used for login. resp, err := client.Auth.OktaLogin( context.Background(), username, - schema.OktaLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OktaLoginRequest{ + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -12759,9 +13123,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.OktaReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12816,11 +13181,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12877,11 +13243,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12938,11 +13305,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + nonce := "nonce_example" // string | Nonce provided during a login request to retrieve the number verification challenge for the matching request. resp, err := client.Auth.OktaVerify( context.Background(), nonce, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13000,12 +13368,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaWriteGroup( context.Background(), name, - schema.OktaWriteGroupRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OktaWriteGroupRequest{ + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -13064,12 +13435,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaWriteUser( context.Background(), name, - schema.OktaWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OktaWriteUserRequest{ + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -13128,10 +13502,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.RadiusConfigure( context.Background(), - schema.RadiusConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RadiusConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13187,11 +13564,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13248,9 +13626,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.RadiusListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13307,10 +13686,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.RadiusLogin( context.Background(), - schema.RadiusLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RadiusLoginRequest{ + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13367,12 +13749,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlusername := "urlusername_example" // string | Username to be used for login. (URL parameter) resp, err := client.Auth.RadiusLoginWithUsername( context.Background(), urlusername, - schema.RadiusLoginWithUsernameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RadiusLoginWithUsernameRequest{ + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13430,9 +13815,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.RadiusReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13487,11 +13873,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13549,12 +13936,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusWriteUser( context.Background(), name, - schema.RadiusWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RadiusWriteUserRequest{ + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13613,10 +14003,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenCreate( context.Background(), - schema.TokenCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenCreateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -13668,12 +14061,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenCreateAgainstRole( context.Background(), roleName, - schema.TokenCreateAgainstRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenCreateAgainstRoleRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -13730,10 +14126,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenCreateOrphan( context.Background(), - schema.TokenCreateOrphanRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenCreateOrphanRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -13784,11 +14183,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenDeleteRole( context.Background(), roleName, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13843,9 +14243,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenListAccessors( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13896,9 +14297,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenListRoles( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13950,10 +14352,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenLookUp( context.Background(), - schema.TokenLookUpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenLookUpRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14005,10 +14410,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenLookUpAccessor( context.Background(), - schema.TokenLookUpAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenLookUpAccessorRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14059,9 +14467,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenLookUpSelf( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14109,11 +14518,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenReadRole( context.Background(), roleName, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14169,10 +14579,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRenew( context.Background(), - schema.TokenRenewRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenRenewRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14224,10 +14637,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRenewAccessor( context.Background(), - schema.TokenRenewAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenRenewAccessorRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14279,10 +14695,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRenewSelf( context.Background(), - schema.TokenRenewSelfRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenRenewSelfRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14334,10 +14753,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRevoke( context.Background(), - schema.TokenRevokeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenRevokeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14389,10 +14811,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRevokeAccessor( context.Background(), - schema.TokenRevokeAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenRevokeAccessorRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14444,10 +14869,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRevokeOrphan( context.Background(), - schema.TokenRevokeOrphanRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenRevokeOrphanRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14498,9 +14926,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenRevokeSelf( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14548,9 +14977,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.TokenTidy( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14599,12 +15029,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenWriteRole( context.Background(), roleName, - schema.TokenWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TokenWriteRoleRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14660,11 +15093,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassDeleteUser( context.Background(), username, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14721,9 +15155,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Auth.UserpassListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14780,12 +15215,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username of the user. resp, err := client.Auth.UserpassLogin( context.Background(), username, - schema.UserpassLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UserpassLoginRequest{ + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { @@ -14843,11 +15281,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassReadUser( context.Background(), username, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14905,12 +15344,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassResetPassword( context.Background(), username, - schema.UserpassResetPasswordRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UserpassResetPasswordRequest{ + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { @@ -14969,12 +15411,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassUpdatePolicies( context.Background(), username, - schema.UserpassUpdatePoliciesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UserpassUpdatePoliciesRequest{ + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { @@ -15033,12 +15478,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassWriteUser( context.Background(), username, - schema.UserpassWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UserpassWriteUserRequest{ + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index 23ce5a4a..5acbf123 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -137,10 +137,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.AliasCreate( context.Background(), - schema.AliasCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AliasCreateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -191,11 +194,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -250,9 +254,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.AliasListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -303,11 +308,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -363,12 +369,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasUpdateById( context.Background(), id, - schema.AliasUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AliasUpdateByIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -425,10 +434,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityBatchDelete( context.Background(), - schema.EntityBatchDeleteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityBatchDeleteRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -480,10 +492,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityCreate( context.Background(), - schema.EntityCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityCreateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -535,10 +550,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityCreateAlias( context.Background(), - schema.EntityCreateAliasRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityCreateAliasRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -589,11 +607,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityDeleteAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -648,11 +667,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -707,11 +727,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityDeleteByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -766,9 +787,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityListAliasesById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -819,9 +841,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -872,9 +895,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityListByName( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -926,10 +950,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityLookUp( context.Background(), - schema.EntityLookUpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityLookUpRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -981,10 +1008,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.EntityMerge( context.Background(), - schema.EntityMergeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityMergeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1035,11 +1065,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityReadAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1094,11 +1125,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1153,11 +1185,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityReadByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1213,12 +1246,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityUpdateAliasById( context.Background(), id, - schema.EntityUpdateAliasByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityUpdateAliasByIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1275,12 +1311,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityUpdateById( context.Background(), id, - schema.EntityUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityUpdateByIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1337,12 +1376,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityUpdateByName( context.Background(), name, - schema.EntityUpdateByNameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EntityUpdateByNameRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1399,10 +1441,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.GroupCreate( context.Background(), - schema.GroupCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GroupCreateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1454,10 +1499,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.GroupCreateAlias( context.Background(), - schema.GroupCreateAliasRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GroupCreateAliasRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1508,11 +1556,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupDeleteAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1567,11 +1616,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1626,11 +1676,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupDeleteByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1685,9 +1736,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.GroupListAliasesById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1738,9 +1790,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.GroupListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1791,9 +1844,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.GroupListByName( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1845,10 +1899,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.GroupLookUp( context.Background(), - schema.GroupLookUpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GroupLookUpRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1899,11 +1956,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupReadAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1958,11 +2016,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2017,11 +2076,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupReadByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2077,12 +2137,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupUpdateAliasById( context.Background(), id, - schema.GroupUpdateAliasByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GroupUpdateAliasByIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2139,12 +2202,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupUpdateById( context.Background(), id, - schema.GroupUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GroupUpdateByIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2201,12 +2267,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupUpdateByName( context.Background(), name, - schema.GroupUpdateByNameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GroupUpdateByNameRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2263,10 +2332,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaAdminDestroyTotpSecret( context.Background(), - schema.MfaAdminDestroyTotpSecretRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaAdminDestroyTotpSecretRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2318,10 +2390,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaAdminGenerateTotpSecret( context.Background(), - schema.MfaAdminGenerateTotpSecretRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaAdminGenerateTotpSecretRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2373,10 +2448,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaCreateDuoMethod( context.Background(), - schema.MfaCreateDuoMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaCreateDuoMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2428,10 +2506,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaCreateOktaMethod( context.Background(), - schema.MfaCreateOktaMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaCreateOktaMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2483,10 +2564,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaCreatePingIdMethod( context.Background(), - schema.MfaCreatePingIdMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaCreatePingIdMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2538,10 +2622,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaCreateTotpMethod( context.Background(), - schema.MfaCreateTotpMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaCreateTotpMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2592,11 +2679,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteDuoMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2651,11 +2739,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaDeleteLoginEnforcement( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2710,11 +2799,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteOktaMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2769,11 +2859,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeletePingIdMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2828,11 +2919,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteTotpMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2888,10 +2980,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaGenerateTotpSecret( context.Background(), - schema.MfaGenerateTotpSecretRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaGenerateTotpSecretRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2942,9 +3037,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaListDuoMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2995,9 +3091,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaListLoginEnforcements( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3048,9 +3145,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaListMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3101,9 +3199,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaListOktaMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3154,9 +3253,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaListPingIdMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3207,9 +3307,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.MfaListTotpMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3260,11 +3361,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadDuoMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3319,11 +3421,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaReadLoginEnforcement( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3378,11 +3481,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3437,11 +3541,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadOktaMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3496,11 +3601,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadPingIdMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3555,11 +3661,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadTotpMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3615,12 +3722,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateDuoMethod( context.Background(), methodId, - schema.MfaUpdateDuoMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaUpdateDuoMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3677,12 +3787,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateOktaMethod( context.Background(), methodId, - schema.MfaUpdateOktaMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaUpdateOktaMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3739,12 +3852,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdatePingIdMethod( context.Background(), methodId, - schema.MfaUpdatePingIdMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaUpdatePingIdMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3801,12 +3917,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateTotpMethod( context.Background(), methodId, - schema.MfaUpdateTotpMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaUpdateTotpMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3863,12 +3982,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaWriteLoginEnforcement( context.Background(), name, - schema.MfaWriteLoginEnforcementRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaWriteLoginEnforcementRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3925,10 +4047,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcConfigure( context.Background(), - schema.OidcConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcConfigureRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3979,11 +4104,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcDeleteAssignment( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4038,11 +4164,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcDeleteClient( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4097,11 +4224,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Identity.OidcDeleteKey( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4156,11 +4284,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcDeleteProvider( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4215,11 +4344,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Identity.OidcDeleteRole( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4274,11 +4404,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcDeleteScope( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4333,11 +4464,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Identity.OidcGenerateToken( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4393,10 +4525,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcIntrospect( context.Background(), - schema.OidcIntrospectRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcIntrospectRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4447,9 +4582,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcListAssignments( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4500,9 +4636,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcListClients( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4553,9 +4690,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcListKeys( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4606,11 +4744,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + allowedClientId := "allowedClientId_example" // string | Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids. (defaults to "") resp, err := client.Identity.OidcListProviders( context.Background(), allowedClientId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4662,9 +4801,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcListRoles( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4715,9 +4855,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcListScopes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4768,6 +4909,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider clientId := "clientId_example" // string | The ID of the requesting client. codeChallenge := "codeChallenge_example" // string | The code challenge derived from the code verifier. @@ -4790,7 +4933,6 @@ func main() { responseType, scope, state, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4855,12 +4997,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderAuthorizeWithParameters( context.Background(), name, - schema.OidcProviderAuthorizeWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcProviderAuthorizeWithParametersRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4917,12 +5062,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderToken( context.Background(), name, - schema.OidcProviderTokenRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcProviderTokenRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4978,11 +5126,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderUserInfo( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5037,11 +5186,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcReadAssignment( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5096,11 +5246,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcReadClient( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5155,9 +5306,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5205,11 +5357,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Identity.OidcReadKey( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5264,9 +5417,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcReadOpenIdConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5314,11 +5468,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProvider( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5373,11 +5528,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderOpenIdConfiguration( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5432,11 +5588,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderPublicKeys( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5491,9 +5648,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.OidcReadPublicKeys( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5541,11 +5699,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Identity.OidcReadRole( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5600,11 +5759,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcReadScope( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5660,12 +5820,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Identity.OidcRotateKey( context.Background(), name, - schema.OidcRotateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcRotateKeyRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5722,12 +5885,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcWriteAssignment( context.Background(), name, - schema.OidcWriteAssignmentRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcWriteAssignmentRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5784,12 +5950,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcWriteClient( context.Background(), name, - schema.OidcWriteClientRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcWriteClientRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5846,12 +6015,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Identity.OidcWriteKey( context.Background(), name, - schema.OidcWriteKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcWriteKeyRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5908,12 +6080,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcWriteProvider( context.Background(), name, - schema.OidcWriteProviderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcWriteProviderRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5970,12 +6145,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Identity.OidcWriteRole( context.Background(), name, - schema.OidcWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcWriteRoleRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6032,12 +6210,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcWriteScope( context.Background(), name, - schema.OidcWriteScopeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.OidcWriteScopeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6094,10 +6275,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.PersonaCreate( context.Background(), - schema.PersonaCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PersonaCreateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6148,11 +6332,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6207,9 +6392,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Identity.PersonaListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6260,11 +6446,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6320,12 +6507,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaUpdateById( context.Background(), id, - schema.PersonaUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PersonaUpdateByIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index 60ce089e..733099f7 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -423,10 +423,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AliCloudConfigure( context.Background(), - schema.AliCloudConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AliCloudConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -482,9 +485,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AliCloudDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -539,11 +543,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -600,11 +605,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -661,9 +667,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AliCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -719,9 +726,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AliCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -776,11 +784,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -838,12 +847,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudWriteRole( context.Background(), name, - schema.AliCloudWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AliCloudWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -902,10 +914,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AwsConfigureLease( context.Background(), - schema.AwsConfigureLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureLeaseRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -962,10 +977,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AwsConfigureRootIamCredentials( context.Background(), - schema.AwsConfigureRootIamCredentialsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsConfigureRootIamCredentialsRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1021,11 +1039,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1082,11 +1101,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsDeleteStaticRolesName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1143,6 +1163,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role roleSessionName := "roleSessionName_example" // string | Session name to use when assuming role. Max chars: 64 @@ -1153,7 +1175,6 @@ func main() { roleArn, roleSessionName, ttl, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1214,12 +1235,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateCredentialsWithParameters( context.Background(), name, - schema.AwsGenerateCredentialsWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsGenerateCredentialsWithParametersRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1277,6 +1301,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role roleSessionName := "roleSessionName_example" // string | Session name to use when assuming role. Max chars: 64 @@ -1287,7 +1313,6 @@ func main() { roleArn, roleSessionName, ttl, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1348,12 +1373,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateStsCredentialsWithParameters( context.Background(), name, - schema.AwsGenerateStsCredentialsWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsGenerateStsCredentialsWithParametersRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1411,9 +1439,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AwsListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1469,9 +1498,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AwsReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1526,11 +1556,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1587,9 +1618,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AwsReadRootIamCredentialsConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1644,11 +1676,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticCredsName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1705,11 +1738,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticRolesName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1766,9 +1800,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AwsRotateRootIamCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1824,12 +1859,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsWriteRole( context.Background(), name, - schema.AwsWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1888,12 +1926,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsWriteStaticRolesName( context.Background(), name, - schema.AwsWriteStaticRolesNameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AwsWriteStaticRolesNameRequest{ + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1952,10 +1993,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AzureConfigure( context.Background(), - schema.AzureConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AzureConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -2011,9 +2055,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AzureDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2068,11 +2113,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2129,9 +2175,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AzureListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2187,9 +2234,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AzureReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2244,11 +2292,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2305,11 +2354,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the Vault role resp, err := client.Secrets.AzureRequestServicePrincipalCredentials( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2366,9 +2416,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.AzureRotateRoot( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2424,12 +2475,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureWriteRole( context.Background(), name, - schema.AzureWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AzureWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -2488,10 +2542,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.ConsulConfigureAccess( context.Background(), - schema.ConsulConfigureAccessRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.ConsulConfigureAccessRequest{ + // populate request parameters + }, vault.WithMountPath("consul"), ) if err != nil { @@ -2547,11 +2604,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2608,11 +2666,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | Name of the role. resp, err := client.Secrets.ConsulGenerateCredentials( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2669,9 +2728,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.ConsulListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2727,9 +2787,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.ConsulReadAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2784,11 +2845,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2846,12 +2908,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulWriteRole( context.Background(), name, - schema.ConsulWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.ConsulWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("consul"), ) if err != nil { @@ -2909,11 +2974,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeDelete( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2970,11 +3036,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeList( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3030,11 +3097,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeRead( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3089,12 +3157,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeWrite( context.Background(), path, - map[string]interface{}{ /* populate request parameters */ }, - vault.WithToken("my-token"), + map[string]interface{}{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3151,12 +3222,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseConfigureConnection( context.Background(), name, - schema.DatabaseConfigureConnectionRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.DatabaseConfigureConnectionRequest{ + // populate request parameters + }, vault.WithMountPath("database"), ) if err != nil { @@ -3214,11 +3288,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseDeleteConnectionConfiguration( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3275,11 +3350,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3336,11 +3412,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3397,11 +3474,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3458,9 +3536,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.DatabaseListConnections( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3516,9 +3595,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.DatabaseListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3574,9 +3654,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.DatabaseListStaticRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3632,11 +3713,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseReadConnectionConfiguration( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3693,11 +3775,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3754,11 +3837,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3815,11 +3899,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the static role. resp, err := client.Secrets.DatabaseReadStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3876,11 +3961,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseResetConnection( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3937,11 +4023,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseRotateRootCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3998,11 +4085,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the static role resp, err := client.Secrets.DatabaseRotateStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4060,12 +4148,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteRole( context.Background(), name, - schema.DatabaseWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.DatabaseWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("database"), ) if err != nil { @@ -4124,12 +4215,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteStaticRole( context.Background(), name, - schema.DatabaseWriteStaticRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.DatabaseWriteStaticRoleRequest{ + // populate request parameters + }, vault.WithMountPath("database"), ) if err != nil { @@ -4188,10 +4282,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudConfigure( context.Background(), - schema.GoogleCloudConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -4247,11 +4344,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteImpersonatedAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4308,11 +4406,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudDeleteRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4369,11 +4468,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4430,11 +4530,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name of the impersonated account. resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4491,11 +4592,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken( context.Background(), roleset, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4553,12 +4655,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetKey( context.Background(), roleset, - schema.GoogleCloudGenerateRolesetKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudGenerateRolesetKeyRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -4616,11 +4721,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessToken( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4678,12 +4784,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountKey( context.Background(), name, - schema.GoogleCloudGenerateStaticAccountKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudGenerateStaticAccountKeyRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -4742,10 +4851,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudKmsConfigure( context.Background(), - schema.GoogleCloudKmsConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4802,12 +4914,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsConfigureKey( context.Background(), key, - schema.GoogleCloudKmsConfigureKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsConfigureKeyRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4866,12 +4981,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsDecrypt( context.Background(), key, - schema.GoogleCloudKmsDecryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsDecryptRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4929,9 +5047,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudKmsDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4986,11 +5105,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsDeleteKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5047,11 +5167,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. resp, err := client.Secrets.GoogleCloudKmsDeregisterKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5109,12 +5230,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsEncrypt( context.Background(), key, - schema.GoogleCloudKmsEncryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsEncryptRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5172,9 +5296,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudKmsListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5230,9 +5355,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudKmsReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5287,11 +5413,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5348,11 +5475,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKeyConfiguration( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5410,12 +5538,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsReencrypt( context.Background(), key, - schema.GoogleCloudKmsReencryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsReencryptRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5474,12 +5605,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. resp, err := client.Secrets.GoogleCloudKmsRegisterKey( context.Background(), key, - schema.GoogleCloudKmsRegisterKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsRegisterKeyRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5537,11 +5671,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsRetrievePublicKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5598,11 +5733,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. resp, err := client.Secrets.GoogleCloudKmsRotateKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5660,12 +5796,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsSign( context.Background(), key, - schema.GoogleCloudKmsSignRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsSignRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5723,11 +5862,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5785,12 +5925,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsVerify( context.Background(), key, - schema.GoogleCloudKmsVerifyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsVerifyRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5849,12 +5992,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsWriteKey( context.Background(), key, - schema.GoogleCloudKmsWriteKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudKmsWriteKeyRequest{ + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5912,9 +6058,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5970,9 +6117,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudListRolesets( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6028,9 +6176,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudListStaticAccounts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6086,9 +6235,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6143,11 +6293,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadImpersonatedAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6204,11 +6355,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudReadRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6265,11 +6417,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadStaticAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6326,11 +6479,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6387,11 +6541,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRolesetKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6448,9 +6603,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.GoogleCloudRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6505,11 +6661,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the account. resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6567,12 +6724,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteImpersonatedAccount( context.Background(), name, - schema.GoogleCloudWriteImpersonatedAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudWriteImpersonatedAccountRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -6631,12 +6791,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudWriteRoleset( context.Background(), name, - schema.GoogleCloudWriteRolesetRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudWriteRolesetRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -6695,12 +6858,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteStaticAccount( context.Background(), name, - schema.GoogleCloudWriteStaticAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GoogleCloudWriteStaticAccountRequest{ + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -6758,9 +6924,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KubernetesCheckConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6816,10 +6983,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KubernetesConfigure( context.Background(), - schema.KubernetesConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KubernetesConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6875,9 +7045,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KubernetesDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6932,11 +7103,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6994,12 +7166,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Vault role resp, err := client.Secrets.KubernetesGenerateCredentials( context.Background(), name, - schema.KubernetesGenerateCredentialsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KubernetesGenerateCredentialsRequest{ + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7057,9 +7232,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KubernetesListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7115,9 +7291,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KubernetesReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7172,11 +7349,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7234,12 +7412,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesWriteRole( context.Background(), name, - schema.KubernetesWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KubernetesWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7297,11 +7478,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Delete( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7358,11 +7540,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1List( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7420,11 +7603,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Read( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7481,12 +7665,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Write( context.Background(), path, - map[string]interface{}{ /* populate request parameters */ }, - vault.WithToken("my-token"), + map[string]interface{}{ + // populate request parameters + }, vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7545,10 +7732,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KvV2Configure( context.Background(), - schema.KvV2ConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KvV2ConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7604,11 +7794,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Delete( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7665,11 +7856,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteMetadataAndAllVersions( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7727,12 +7919,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteVersions( context.Background(), path, - schema.KvV2DeleteVersionsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KvV2DeleteVersionsRequest{ + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7791,12 +7986,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DestroyVersions( context.Background(), path, - schema.KvV2DestroyVersionsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KvV2DestroyVersionsRequest{ + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7854,11 +8052,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2List( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7916,11 +8115,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Read( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7977,9 +8177,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.KvV2ReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8034,11 +8235,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadMetadata( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8095,11 +8297,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadSubkeys( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8157,12 +8360,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2UndeleteVersions( context.Background(), path, - schema.KvV2UndeleteVersionsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KvV2UndeleteVersionsRequest{ + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8221,12 +8427,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Write( context.Background(), path, - schema.KvV2WriteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KvV2WriteRequest{ + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8285,12 +8494,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2WriteMetadata( context.Background(), path, - schema.KvV2WriteMetadataRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.KvV2WriteMetadataRequest{ + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8349,10 +8561,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapConfigure( context.Background(), - schema.LdapConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8408,9 +8623,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8465,11 +8681,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapDeleteDynamicRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8526,11 +8743,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapDeleteStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8588,12 +8806,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckIn( context.Background(), name, - schema.LdapLibraryCheckInRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapLibraryCheckInRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8652,12 +8873,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set resp, err := client.Secrets.LdapLibraryCheckOut( context.Background(), name, - schema.LdapLibraryCheckOutRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapLibraryCheckOutRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8715,11 +8939,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckStatus( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8777,12 +9002,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryConfigure( context.Background(), name, - schema.LdapLibraryConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapLibraryConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8840,11 +9068,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryDelete( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8902,12 +9131,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryForceCheckIn( context.Background(), name, - schema.LdapLibraryForceCheckInRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapLibraryForceCheckInRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8965,9 +9197,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapLibraryList( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9023,11 +9256,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryRead( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9084,9 +9318,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapListDynamicRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9142,9 +9377,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapListStaticRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9200,9 +9436,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9257,11 +9494,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapReadDynamicRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9318,11 +9556,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapReadStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9379,11 +9618,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the dynamic role. resp, err := client.Secrets.LdapRequestDynamicRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9440,11 +9680,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the static role. resp, err := client.Secrets.LdapRequestStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9501,9 +9742,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.LdapRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9558,11 +9800,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the static role resp, err := client.Secrets.LdapRotateStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9620,12 +9863,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapWriteDynamicRole( context.Background(), name, - schema.LdapWriteDynamicRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapWriteDynamicRoleRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -9684,12 +9930,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapWriteStaticRole( context.Background(), name, - schema.LdapWriteStaticRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LdapWriteStaticRoleRequest{ + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -9748,10 +9997,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.MongoDbAtlasConfigure( context.Background(), - schema.MongoDbAtlasConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MongoDbAtlasConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9807,11 +10059,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9868,11 +10121,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.MongoDbAtlasGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9929,9 +10183,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.MongoDbAtlasListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9987,9 +10242,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.MongoDbAtlasReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10044,11 +10300,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10106,12 +10363,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasWriteRole( context.Background(), name, - schema.MongoDbAtlasWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MongoDbAtlasWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10170,10 +10430,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadConfigureAccess( context.Background(), - schema.NomadConfigureAccessRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.NomadConfigureAccessRequest{ + // populate request parameters + }, vault.WithMountPath("nomad"), ) if err != nil { @@ -10230,10 +10493,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadConfigureLease( context.Background(), - schema.NomadConfigureLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.NomadConfigureLeaseRequest{ + // populate request parameters + }, vault.WithMountPath("nomad"), ) if err != nil { @@ -10289,9 +10555,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadDeleteAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10346,9 +10613,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadDeleteLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10403,11 +10671,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10464,11 +10733,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10525,9 +10795,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10583,9 +10854,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadReadAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10640,9 +10912,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.NomadReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10697,11 +10970,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10759,12 +11033,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadWriteRole( context.Background(), name, - schema.NomadWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.NomadWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("nomad"), ) if err != nil { @@ -10823,10 +11100,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureAcme( context.Background(), - schema.PkiConfigureAcmeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureAcmeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -10883,10 +11163,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureAutoTidy( context.Background(), - schema.PkiConfigureAutoTidyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureAutoTidyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -10943,10 +11226,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureCa( context.Background(), - schema.PkiConfigureCaRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureCaRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11003,10 +11289,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureCluster( context.Background(), - schema.PkiConfigureClusterRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureClusterRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11063,10 +11352,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureCrl( context.Background(), - schema.PkiConfigureCrlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureCrlRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11123,10 +11415,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureIssuers( context.Background(), - schema.PkiConfigureIssuersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureIssuersRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11183,10 +11478,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureKeys( context.Background(), - schema.PkiConfigureKeysRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureKeysRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11243,10 +11541,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiConfigureUrls( context.Background(), - schema.PkiConfigureUrlsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiConfigureUrlsRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11303,10 +11604,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiCrossSignIntermediate( context.Background(), - schema.PkiCrossSignIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiCrossSignIntermediateRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11362,11 +11666,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + keyId := "keyId_example" // string | EAB key identifier resp, err := client.Secrets.PkiDeleteEabKey( context.Background(), keyId, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11423,11 +11728,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiDeleteIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11484,11 +11790,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiDeleteKey( context.Background(), keyRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11545,11 +11852,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11606,9 +11914,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiDeleteRoot( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11663,9 +11972,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiGenerateEabKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11720,11 +12030,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiGenerateEabKeyForIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11781,13 +12092,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiGenerateEabKeyForIssuerAndRole( context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11846,11 +12158,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiGenerateEabKeyForRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11908,10 +12221,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiGenerateExportedKey( context.Background(), - schema.PkiGenerateExportedKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiGenerateExportedKeyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11968,12 +12284,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateIntermediate( context.Background(), exported, - schema.PkiGenerateIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiGenerateIntermediateRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12032,10 +12351,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiGenerateInternalKey( context.Background(), - schema.PkiGenerateInternalKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiGenerateInternalKeyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12092,10 +12414,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiGenerateKmsKey( context.Background(), - schema.PkiGenerateKmsKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiGenerateKmsKeyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12152,12 +12477,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateRoot( context.Background(), exported, - schema.PkiGenerateRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiGenerateRootRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12216,10 +12544,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiImportKey( context.Background(), - schema.PkiImportKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiImportKeyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12276,12 +12607,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssueWithRole( context.Background(), role, - schema.PkiIssueWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssueWithRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12340,14 +12674,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssuerIssueWithRole( context.Background(), issuerRef, role, - schema.PkiIssuerIssueWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerIssueWithRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12407,11 +12744,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrl( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12468,11 +12806,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDelta( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12529,11 +12868,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12590,11 +12930,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12651,11 +12992,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12712,11 +13054,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12774,12 +13117,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerResignCrls( context.Background(), issuerRef, - schema.PkiIssuerResignCrlsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerResignCrlsRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12838,12 +13184,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignIntermediate( context.Background(), issuerRef, - schema.PkiIssuerSignIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerSignIntermediateRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12902,12 +13251,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignRevocationList( context.Background(), issuerRef, - schema.PkiIssuerSignRevocationListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerSignRevocationListRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12966,12 +13318,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignSelfIssued( context.Background(), issuerRef, - schema.PkiIssuerSignSelfIssuedRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerSignSelfIssuedRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13030,12 +13385,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignVerbatim( context.Background(), issuerRef, - schema.PkiIssuerSignVerbatimRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerSignVerbatimRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13094,14 +13452,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssuerSignVerbatimWithRole( context.Background(), issuerRef, role, - schema.PkiIssuerSignVerbatimWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerSignVerbatimWithRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13162,14 +13523,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssuerSignWithRole( context.Background(), issuerRef, role, - schema.PkiIssuerSignWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuerSignWithRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13230,12 +13594,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateIntermediate( context.Background(), exported, - schema.PkiIssuersGenerateIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuersGenerateIntermediateRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13294,12 +13661,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateRoot( context.Background(), exported, - schema.PkiIssuersGenerateRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuersGenerateRootRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13358,10 +13728,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiIssuersImportBundle( context.Background(), - schema.PkiIssuersImportBundleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuersImportBundleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13418,10 +13791,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiIssuersImportCert( context.Background(), - schema.PkiIssuersImportCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiIssuersImportCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13477,9 +13853,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiListCerts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13535,9 +13912,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiListEabKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13593,9 +13971,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiListIssuers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13651,9 +14030,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13709,9 +14089,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiListRevokedCerts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13767,9 +14148,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13825,9 +14207,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiQueryOcsp( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13882,11 +14265,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + req := "req_example" // string | base-64 encoded ocsp request resp, err := client.Secrets.PkiQueryOcspWithGetReq( context.Background(), req, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13943,9 +14327,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadAcmeConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14000,9 +14385,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadAcmeDirectory( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14057,9 +14443,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadAcmeNewNonce( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14114,9 +14501,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadAutoTidyConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14171,9 +14559,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCaChainPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14228,9 +14617,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCaDer( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14285,9 +14675,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCaPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14342,11 +14733,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCert( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14403,9 +14795,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCertCaChain( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14460,9 +14853,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCertCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14517,9 +14911,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCertDeltaCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14574,11 +14969,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawDer( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14635,11 +15031,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawPem( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14696,9 +15093,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadClusterConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14753,9 +15151,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCrlConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14810,9 +15209,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCrlDelta( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14867,9 +15267,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCrlDeltaPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14924,9 +15325,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCrlDer( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14981,9 +15383,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadCrlPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15038,11 +15441,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15099,11 +15503,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15160,11 +15565,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeDirectory( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15221,11 +15627,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeNewNonce( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15282,13 +15689,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadIssuerIssuerRefRolesRoleAcmeDirectory( context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15347,13 +15755,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadIssuerIssuerRefRolesRoleAcmeNewNonce( context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15412,11 +15821,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerJson( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15473,11 +15883,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15534,9 +15945,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadIssuersConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15591,11 +16003,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiReadKey( context.Background(), keyRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15652,9 +16065,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadKeysConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15709,11 +16123,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15770,11 +16185,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeDirectory( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15831,11 +16247,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeNewNonce( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15892,9 +16309,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReadUrlsConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15950,10 +16368,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiReplaceRoot( context.Background(), - schema.PkiReplaceRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiReplaceRootRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16010,10 +16431,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiRevoke( context.Background(), - schema.PkiRevokeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiRevokeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16069,11 +16493,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiRevokeIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16131,10 +16556,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiRevokeWithKey( context.Background(), - schema.PkiRevokeWithKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiRevokeWithKeyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16191,10 +16619,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiRootSignIntermediate( context.Background(), - schema.PkiRootSignIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiRootSignIntermediateRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16251,10 +16682,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiRootSignSelfIssued( context.Background(), - schema.PkiRootSignSelfIssuedRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiRootSignSelfIssuedRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16310,9 +16744,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiRotateCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16367,9 +16802,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiRotateDeltaCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16425,12 +16861,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiRotateRoot( context.Background(), exported, - schema.PkiRotateRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiRotateRootRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16489,10 +16928,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiSetSignedIntermediate( context.Background(), - schema.PkiSetSignedIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiSetSignedIntermediateRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16549,10 +16991,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiSignVerbatim( context.Background(), - schema.PkiSignVerbatimRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiSignVerbatimRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16609,12 +17054,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignVerbatimWithRole( context.Background(), role, - schema.PkiSignVerbatimWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiSignVerbatimWithRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16673,12 +17121,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignWithRole( context.Background(), role, - schema.PkiSignWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiSignWithRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16737,10 +17188,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiTidy( context.Background(), - schema.PkiTidyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiTidyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16796,9 +17250,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiTidyCancel( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16853,9 +17308,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiTidyStatus( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16911,12 +17367,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + kid := "kid_example" // string | The key identifier provided by the CA resp, err := client.Secrets.PkiWriteAcmeAccountKid( context.Background(), kid, - schema.PkiWriteAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeAccountKidRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16975,12 +17434,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value resp, err := client.Secrets.PkiWriteAcmeAuthorizationAuthId( context.Background(), authId, - schema.PkiWriteAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17039,14 +17501,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type resp, err := client.Secrets.PkiWriteAcmeChallengeAuthIdChallengeType( context.Background(), authId, challengeType, - schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17107,10 +17572,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiWriteAcmeNewAccount( context.Background(), - schema.PkiWriteAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeNewAccountRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17167,10 +17635,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiWriteAcmeNewOrder( context.Background(), - schema.PkiWriteAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeNewOrderRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17227,12 +17698,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderId( context.Background(), orderId, - schema.PkiWriteAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeOrderOrderIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17291,12 +17765,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdCert( context.Background(), orderId, - schema.PkiWriteAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17355,12 +17832,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdFinalize( context.Background(), orderId, - schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17419,10 +17899,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiWriteAcmeOrders( context.Background(), - schema.PkiWriteAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeOrdersRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17479,10 +17962,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.PkiWriteAcmeRevokeCert( context.Background(), - schema.PkiWriteAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteAcmeRevokeCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17539,12 +18025,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiWriteIssuer( context.Background(), issuerRef, - schema.PkiWriteIssuerRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17603,14 +18092,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeAccountKid( context.Background(), issuerRef, kid, - schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17671,14 +18163,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthId( context.Background(), authId, issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17739,6 +18234,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -17747,8 +18244,9 @@ func main() { authId, challengeType, issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17811,12 +18309,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewAccount( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17875,12 +18376,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewOrder( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17939,14 +18443,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrderOrderId( context.Background(), issuerRef, orderId, - schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18007,14 +18514,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCert( context.Background(), issuerRef, orderId, - schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18075,14 +18585,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalize( context.Background(), issuerRef, orderId, - schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18143,12 +18656,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrders( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18207,12 +18723,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeRevokeCert( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18271,6 +18790,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA role := "role_example" // string | The desired role for the acme request @@ -18279,8 +18800,9 @@ func main() { issuerRef, kid, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18343,6 +18865,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -18351,8 +18875,9 @@ func main() { authId, issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18415,6 +18940,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -18425,8 +18952,9 @@ func main() { challengeType, issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18491,14 +19019,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccount( context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18559,14 +19090,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrder( context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18627,6 +19161,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -18635,8 +19171,9 @@ func main() { issuerRef, orderId, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18699,6 +19236,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -18707,8 +19246,9 @@ func main() { issuerRef, orderId, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18771,6 +19311,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -18779,8 +19321,9 @@ func main() { issuerRef, orderId, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18843,14 +19386,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteIssuerIssuerRefRolesRoleAcmeOrders( context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18911,14 +19457,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCert( context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18979,12 +19528,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiWriteKey( context.Background(), keyRef, - schema.PkiWriteKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteKeyRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19043,12 +19595,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiWriteRole( context.Background(), name, - schema.PkiWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19107,14 +19662,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + kid := "kid_example" // string | The key identifier provided by the CA role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeAccountKid( context.Background(), kid, role, - schema.PkiWriteRolesRoleAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeAccountKidRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19175,14 +19733,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeAuthorizationAuthId( context.Background(), authId, role, - schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19243,6 +19804,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type role := "role_example" // string | The desired role for the acme request @@ -19251,8 +19814,9 @@ func main() { authId, challengeType, role, - schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19315,12 +19879,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewAccount( context.Background(), role, - schema.PkiWriteRolesRoleAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeNewAccountRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19379,12 +19946,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewOrder( context.Background(), role, - schema.PkiWriteRolesRoleAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeNewOrderRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19443,14 +20013,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrderOrderId( context.Background(), orderId, role, - schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19511,14 +20084,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrderOrderIdCert( context.Background(), orderId, role, - schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19579,14 +20155,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrderOrderIdFinalize( context.Background(), orderId, role, - schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19647,12 +20226,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrders( context.Background(), role, - schema.PkiWriteRolesRoleAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeOrdersRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19711,12 +20293,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeRevokeCert( context.Background(), role, - schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19775,10 +20360,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.RabbitMqConfigureConnection( context.Background(), - schema.RabbitMqConfigureConnectionRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RabbitMqConfigureConnectionRequest{ + // populate request parameters + }, vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -19835,10 +20423,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.RabbitMqConfigureLease( context.Background(), - schema.RabbitMqConfigureLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RabbitMqConfigureLeaseRequest{ + // populate request parameters + }, vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -19894,11 +20485,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -19955,9 +20547,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.RabbitMqListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20013,9 +20606,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.RabbitMqReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20070,11 +20664,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20131,11 +20726,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqRequestCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20193,12 +20789,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqWriteRole( context.Background(), name, - schema.RabbitMqWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RabbitMqWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20257,10 +20856,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshConfigureCa( context.Background(), - schema.SshConfigureCaRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshConfigureCaRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -20317,10 +20919,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshConfigureZeroAddress( context.Background(), - schema.SshConfigureZeroAddressRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshConfigureZeroAddressRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -20376,9 +20981,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshDeleteCaConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20433,11 +21039,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20494,9 +21101,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshDeleteZeroAddressConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20552,12 +21160,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | [Required] Name of the role resp, err := client.Secrets.SshGenerateCredentials( context.Background(), role, - schema.SshGenerateCredentialsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshGenerateCredentialsRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -20616,12 +21227,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshIssueCertificate( context.Background(), role, - schema.SshIssueCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshIssueCertificateRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -20679,9 +21293,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20738,10 +21353,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshListRolesByIp( context.Background(), - schema.SshListRolesByIpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshListRolesByIpRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -20797,9 +21415,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshReadCaConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20854,9 +21473,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshReadPublicKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20911,11 +21531,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20972,9 +21593,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshReadZeroAddressConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21030,12 +21652,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshSignCertificate( context.Background(), role, - schema.SshSignCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshSignCertificateRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21093,9 +21718,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshTidyDynamicHostKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21151,10 +21777,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.SshVerifyOtp( context.Background(), - schema.SshVerifyOtpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshVerifyOtpRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21211,12 +21840,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshWriteRole( context.Background(), role, - schema.SshWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.SshWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21275,10 +21907,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TerraformCloudConfigure( context.Background(), - schema.TerraformCloudConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TerraformCloudConfigureRequest{ + // populate request parameters + }, vault.WithMountPath("terraform"), ) if err != nil { @@ -21334,9 +21969,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TerraformCloudDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21391,11 +22027,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21452,11 +22089,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21513,9 +22151,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TerraformCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21571,9 +22210,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TerraformCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21628,11 +22268,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21689,11 +22330,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the team or organization role resp, err := client.Secrets.TerraformCloudRotateRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21751,12 +22393,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudWriteRole( context.Background(), name, - schema.TerraformCloudWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TerraformCloudWriteRoleRequest{ + // populate request parameters + }, vault.WithMountPath("terraform"), ) if err != nil { @@ -21815,12 +22460,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpCreateKey( context.Background(), name, - schema.TotpCreateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TotpCreateKeyRequest{ + // populate request parameters + }, vault.WithMountPath("totp"), ) if err != nil { @@ -21878,11 +22526,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpDeleteKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -21939,11 +22588,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpGenerateCode( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22000,9 +22650,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TotpListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22058,11 +22709,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpReadKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22120,12 +22772,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpValidateCode( context.Background(), name, - schema.TotpValidateCodeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TotpValidateCodeRequest{ + // populate request parameters + }, vault.WithMountPath("totp"), ) if err != nil { @@ -22183,11 +22838,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitBackUpKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22244,13 +22900,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. resp, err := client.Secrets.TransitByokKey( context.Background(), destination, source, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22309,6 +22966,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. version := "version_example" // string | Optional version of the key to export, else all key versions are exported. @@ -22317,7 +22976,6 @@ func main() { destination, source, version, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22379,10 +23037,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitConfigureCache( context.Background(), - schema.TransitConfigureCacheRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitConfigureCacheRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -22439,12 +23100,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitConfigureKey( context.Background(), name, - schema.TransitConfigureKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitConfigureKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -22503,10 +23167,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitConfigureKeys( context.Background(), - schema.TransitConfigureKeysRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitConfigureKeysRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -22563,12 +23230,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitCreateKey( context.Background(), name, - schema.TransitCreateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitCreateKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -22627,12 +23297,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDecrypt( context.Background(), name, - schema.TransitDecryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitDecryptRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -22690,11 +23363,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDeleteKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22752,12 +23426,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitEncrypt( context.Background(), name, - schema.TransitEncryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitEncryptRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -22815,13 +23492,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) resp, err := client.Secrets.TransitExportKey( context.Background(), name, type_, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22880,6 +23558,8 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) version := "version_example" // string | Version of the key @@ -22888,7 +23568,6 @@ func main() { name, type_, version, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22950,12 +23629,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitGenerateCsrForKey( context.Background(), name, - schema.TransitGenerateCsrForKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateCsrForKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23014,14 +23696,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The backend key used for encrypting the data key plaintext := "plaintext_example" // string | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. resp, err := client.Secrets.TransitGenerateDataKey( context.Background(), name, plaintext, - schema.TransitGenerateDataKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateDataKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23082,12 +23767,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The key to use for the HMAC function resp, err := client.Secrets.TransitGenerateHmac( context.Background(), name, - schema.TransitGenerateHmacRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateHmacRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23146,14 +23834,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The key to use for the HMAC function urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitGenerateHmacWithAlgorithm( context.Background(), name, urlalgorithm, - schema.TransitGenerateHmacWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateHmacWithAlgorithmRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23214,10 +23905,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitGenerateRandom( context.Background(), - schema.TransitGenerateRandomRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateRandomRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23274,12 +23968,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.Secrets.TransitGenerateRandomWithBytes( context.Background(), urlbytes, - schema.TransitGenerateRandomWithBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateRandomWithBytesRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23338,12 +24035,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.Secrets.TransitGenerateRandomWithSource( context.Background(), source, - schema.TransitGenerateRandomWithSourceRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateRandomWithSourceRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23402,14 +24102,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.Secrets.TransitGenerateRandomWithSourceAndBytes( context.Background(), source, urlbytes, - schema.TransitGenerateRandomWithSourceAndBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitGenerateRandomWithSourceAndBytesRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23470,10 +24173,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitHash( context.Background(), - schema.TransitHashRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitHashRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23530,12 +24236,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitHashWithAlgorithm( context.Background(), urlalgorithm, - schema.TransitHashWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitHashWithAlgorithmRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23594,12 +24303,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKey( context.Background(), name, - schema.TransitImportKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitImportKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23658,12 +24370,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKeyVersion( context.Background(), name, - schema.TransitImportKeyVersionRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitImportKeyVersionRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23721,9 +24436,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23779,9 +24495,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitReadCacheConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23836,11 +24553,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitReadKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23897,9 +24615,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitReadKeysConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23954,9 +24673,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitReadWrappingKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24012,12 +24732,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | If set, this will be the name of the restored key. resp, err := client.Secrets.TransitRestoreAndRenameKey( context.Background(), name, - schema.TransitRestoreAndRenameKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitRestoreAndRenameKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24076,10 +24799,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.TransitRestoreKey( context.Background(), - schema.TransitRestoreKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitRestoreKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24136,12 +24862,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRewrap( context.Background(), name, - schema.TransitRewrapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitRewrapRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24200,12 +24929,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRotateKey( context.Background(), name, - schema.TransitRotateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitRotateKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24264,12 +24996,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitSetCertificateForKey( context.Background(), name, - schema.TransitSetCertificateForKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitSetCertificateForKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24328,12 +25063,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The key to use resp, err := client.Secrets.TransitSign( context.Background(), name, - schema.TransitSignRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitSignRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24392,14 +25130,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitSignWithAlgorithm( context.Background(), name, urlalgorithm, - schema.TransitSignWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitSignWithAlgorithmRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24460,12 +25201,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitTrimKey( context.Background(), name, - schema.TransitTrimKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitTrimKeyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24524,12 +25268,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The key to use resp, err := client.Secrets.TransitVerify( context.Background(), name, - schema.TransitVerifyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitVerifyRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24588,14 +25335,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitVerifyWithAlgorithm( context.Background(), name, urlalgorithm, - schema.TransitVerifyWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.TransitVerifyWithAlgorithmRequest{ + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { diff --git a/docs/SystemApi.md b/docs/SystemApi.md index 1da4f270..98f009a1 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -188,12 +188,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingCalculateHash( context.Background(), path, - schema.AuditingCalculateHashRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AuditingCalculateHashRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -249,11 +252,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingDisableDevice( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -308,11 +312,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + header := "header_example" // string | resp, err := client.System.AuditingDisableRequestHeader( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -368,12 +373,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingEnableDevice( context.Background(), path, - schema.AuditingEnableDeviceRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AuditingEnableDeviceRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -430,12 +438,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + header := "header_example" // string | resp, err := client.System.AuditingEnableRequestHeader( context.Background(), header, - schema.AuditingEnableRequestHeaderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AuditingEnableRequestHeaderRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -491,9 +502,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.AuditingListEnabledDevices( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -541,9 +553,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.AuditingListRequestHeaders( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -591,11 +604,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + header := "header_example" // string | resp, err := client.System.AuditingReadRequestHeaderInformation( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -650,11 +664,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthDisableMethod( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -714,12 +729,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthEnableMethod( context.Background(), path, - schema.AuthEnableMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AuthEnableMethodRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -775,9 +793,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.AuthListEnabledMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -825,11 +844,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthReadConfiguration( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -886,11 +906,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthReadTuningInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -948,12 +969,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthTuneConfigurationParameters( context.Background(), path, - schema.AuthTuneConfigurationParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.AuthTuneConfigurationParametersRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1013,9 +1037,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.CollectHostInformation( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1067,9 +1092,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.CollectInFlightRequestInformation( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1118,10 +1144,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.CorsConfigure( context.Background(), - schema.CorsConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.CorsConfigureRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1172,9 +1201,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.CorsDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1222,9 +1252,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.CorsReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1273,10 +1304,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Decode( context.Background(), - schema.DecodeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.DecodeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1328,10 +1362,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.EncryptionKeyConfigureRotation( context.Background(), - schema.EncryptionKeyConfigureRotationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.EncryptionKeyConfigureRotationRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1382,9 +1419,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.EncryptionKeyReadRotationConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1432,9 +1470,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.EncryptionKeyRotate( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1482,9 +1521,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.EncryptionKeyStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1533,10 +1573,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.GenerateHash( context.Background(), - schema.GenerateHashRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GenerateHashRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1588,12 +1631,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.System.GenerateHashWithAlgorithm( context.Background(), urlalgorithm, - schema.GenerateHashWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GenerateHashWithAlgorithmRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1650,10 +1696,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.GenerateRandom( context.Background(), - schema.GenerateRandomRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GenerateRandomRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1705,12 +1754,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.System.GenerateRandomWithBytes( context.Background(), urlbytes, - schema.GenerateRandomWithBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GenerateRandomWithBytesRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1767,12 +1819,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.System.GenerateRandomWithSource( context.Background(), source, - schema.GenerateRandomWithSourceRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GenerateRandomWithSourceRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1829,14 +1884,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.System.GenerateRandomWithSourceAndBytes( context.Background(), source, urlbytes, - schema.GenerateRandomWithSourceAndBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.GenerateRandomWithSourceAndBytesRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1894,9 +1952,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.HaStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1947,10 +2006,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Initialize( context.Background(), - schema.InitializeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.InitializeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2002,10 +2064,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalClientActivityConfigure( context.Background(), - schema.InternalClientActivityConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.InternalClientActivityConfigureRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2056,9 +2121,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalClientActivityExport( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2106,9 +2172,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalClientActivityReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2156,9 +2223,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalClientActivityReportCounts( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2206,9 +2274,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalClientActivityReportCountsThisMonth( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2256,9 +2325,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalCountEntities( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2306,9 +2376,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalCountRequests( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2356,9 +2427,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalCountTokens( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2406,13 +2478,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + context := "context_example" // string | Context string appended to every operationId genericMountPaths := true // bool | Use generic mount paths (defaults to false) resp, err := client.System.InternalGenerateOpenApiDocument( context.Background(), context, genericMountPaths, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2465,10 +2538,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalGenerateOpenApiDocumentWithParameters( context.Background(), - schema.InternalGenerateOpenApiDocumentWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.InternalGenerateOpenApiDocumentWithParametersRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2519,11 +2595,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + tag := "tag_example" // string | Name of subtree being observed resp, err := client.System.InternalInspectRouter( context.Background(), tag, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2578,9 +2655,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalUiListEnabledFeatureFlags( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2628,9 +2706,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalUiListEnabledVisibleMounts( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2678,9 +2757,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalUiListNamespaces( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2728,11 +2808,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path of the mount. resp, err := client.System.InternalUiReadMountInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2787,9 +2868,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.InternalUiReadResultantAcl( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2837,9 +2919,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeaderStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2887,9 +2970,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesCount( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2941,11 +3025,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesForceRevokeLeaseWithPrefix( context.Background(), prefix, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3000,9 +3085,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3050,11 +3136,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + prefix := "prefix_example" // string | The path to list leases under. Example: \"aws/creds/deploy\" resp, err := client.System.LeasesLookUp( context.Background(), prefix, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3111,10 +3198,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesReadLease( context.Background(), - schema.LeasesReadLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LeasesReadLeaseRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3166,10 +3256,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesRenewLease( context.Background(), - schema.LeasesRenewLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LeasesRenewLeaseRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3221,12 +3314,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRenewLeaseWithId( context.Background(), urlLeaseId, - schema.LeasesRenewLeaseWithIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LeasesRenewLeaseWithIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3283,10 +3379,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesRevokeLease( context.Background(), - schema.LeasesRevokeLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LeasesRevokeLeaseRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3338,12 +3437,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRevokeLeaseWithId( context.Background(), urlLeaseId, - schema.LeasesRevokeLeaseWithIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LeasesRevokeLeaseWithIdRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3400,12 +3502,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesRevokeLeaseWithPrefix( context.Background(), prefix, - schema.LeasesRevokeLeaseWithPrefixRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LeasesRevokeLeaseWithPrefixRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3461,9 +3566,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesTidy( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3511,9 +3617,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.ListExperimentalFeatures( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3561,9 +3668,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LockedUsersList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3611,13 +3719,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + aliasIdentifier := "aliasIdentifier_example" // string | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID mountAccessor := "mountAccessor_example" // string | MountAccessor is the identifier of the mount entry to which the user belongs resp, err := client.System.LockedUsersUnlock( context.Background(), aliasIdentifier, mountAccessor, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3674,9 +3783,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LoggersReadVerbosityLevel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3724,11 +3834,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersReadVerbosityLevelFor( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3783,9 +3894,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LoggersRevertVerbosityLevel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3833,11 +3945,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersRevertVerbosityLevelFor( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3893,10 +4006,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LoggersUpdateVerbosityLevel( context.Background(), - schema.LoggersUpdateVerbosityLevelRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LoggersUpdateVerbosityLevelRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3948,12 +4064,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersUpdateVerbosityLevelFor( context.Background(), name, - schema.LoggersUpdateVerbosityLevelForRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.LoggersUpdateVerbosityLevelForRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4009,11 +4128,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + format := "format_example" // string | Format to export metrics into. Currently accepts only \"prometheus\". resp, err := client.System.Metrics( context.Background(), format, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4065,10 +4185,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.MfaValidate( context.Background(), - schema.MfaValidateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MfaValidateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4119,13 +4242,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + logFormat := "logFormat_example" // string | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". (defaults to "standard") logLevel := "logLevel_example" // string | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". resp, err := client.System.Monitor( context.Background(), logFormat, logLevel, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4177,11 +4301,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsDisableSecretsEngine( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4237,12 +4362,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsEnableSecretsEngine( context.Background(), path, - schema.MountsEnableSecretsEngineRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MountsEnableSecretsEngineRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4298,9 +4426,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.MountsListSecretsEngines( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4348,11 +4477,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadConfiguration( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4407,11 +4537,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadTuningInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4467,12 +4598,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsTuneConfigurationParameters( context.Background(), path, - schema.MountsTuneConfigurationParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.MountsTuneConfigurationParametersRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4528,9 +4662,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PluginsCatalogListPlugins( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4578,11 +4713,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogListPluginsWithType( context.Background(), type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4638,11 +4774,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogReadPluginConfiguration( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4697,13 +4834,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogReadPluginConfigurationWithType( context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4761,12 +4899,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRegisterPlugin( context.Background(), name, - schema.PluginsCatalogRegisterPluginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PluginsCatalogRegisterPluginRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4823,14 +4964,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogRegisterPluginWithType( context.Background(), name, type_, - schema.PluginsCatalogRegisterPluginWithTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PluginsCatalogRegisterPluginWithTypeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4888,11 +5032,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRemovePlugin( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4947,13 +5092,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogRemovePluginWithType( context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5013,10 +5159,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PluginsReloadBackends( context.Background(), - schema.PluginsReloadBackendsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PluginsReloadBackendsRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5067,9 +5216,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PluginsRuntimesCatalogListPluginsRuntimes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5120,13 +5270,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime resp, err := client.System.PluginsRuntimesCatalogReadPluginRuntimeConfiguration( context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5184,14 +5335,17 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime resp, err := client.System.PluginsRuntimesCatalogRegisterPluginRuntime( context.Background(), name, type_, - schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5249,13 +5403,14 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime resp, err := client.System.PluginsRuntimesCatalogRemovePluginRuntime( context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5312,11 +5467,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesDeleteAclPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5371,11 +5527,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesDeletePasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5430,11 +5587,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesGeneratePasswordFromPasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5489,9 +5647,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PoliciesListAclPolicies( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5542,9 +5701,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PoliciesListPasswordPolicies( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5595,11 +5755,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesReadAclPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5654,11 +5815,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesReadPasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5714,12 +5876,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesWriteAclPolicy( context.Background(), name, - schema.PoliciesWriteAclPolicyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PoliciesWriteAclPolicyRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5776,12 +5941,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesWritePasswordPolicy( context.Background(), name, - schema.PoliciesWritePasswordPolicyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.PoliciesWritePasswordPolicyRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5839,9 +6007,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofBlocking( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5891,9 +6060,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofCommandLine( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5943,9 +6113,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofCpuProfile( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5995,9 +6166,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofExecutionTrace( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6047,9 +6219,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofGoroutines( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6101,9 +6274,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofIndex( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6153,9 +6327,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofMemoryAllocations( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6205,9 +6380,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofMemoryAllocationsLive( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6257,9 +6433,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofMutexes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6309,9 +6486,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofSymbols( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6361,9 +6539,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.PprofThreadCreations( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6412,10 +6591,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.QueryTokenAccessorCapabilities( context.Background(), - schema.QueryTokenAccessorCapabilitiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.QueryTokenAccessorCapabilitiesRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6467,10 +6649,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.QueryTokenCapabilities( context.Background(), - schema.QueryTokenCapabilitiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.QueryTokenCapabilitiesRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6522,10 +6707,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.QueryTokenSelfCapabilities( context.Background(), - schema.QueryTokenSelfCapabilitiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.QueryTokenSelfCapabilitiesRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6577,10 +6765,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RateLimitQuotasConfigure( context.Background(), - schema.RateLimitQuotasConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RateLimitQuotasConfigureRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6631,11 +6822,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasDelete( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6690,9 +6882,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RateLimitQuotasList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6743,11 +6936,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasRead( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6802,9 +6996,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RateLimitQuotasReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6853,12 +7048,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasWrite( context.Background(), name, - schema.RateLimitQuotasWriteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RateLimitQuotasWriteRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6914,11 +7112,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | resp, err := client.System.RawDelete( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6973,11 +7172,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | resp, err := client.System.RawList( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7033,11 +7233,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | resp, err := client.System.RawRead( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7093,12 +7294,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + path := "path_example" // string | resp, err := client.System.RawWrite( context.Background(), path, - schema.RawWriteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RawWriteRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7154,9 +7358,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.ReadHealthStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7204,9 +7409,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.ReadInitializationStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7254,9 +7460,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.ReadReplicationStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7306,9 +7513,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.ReadSanitizedConfigurationState( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7357,10 +7565,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.ReadWrappingProperties( context.Background(), - schema.ReadWrappingPropertiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.ReadWrappingPropertiesRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7413,9 +7624,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyAttemptCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7466,10 +7678,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyAttemptInitialize( context.Background(), - schema.RekeyAttemptInitializeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RekeyAttemptInitializeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7520,9 +7735,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyAttemptReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7571,10 +7787,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyAttemptUpdate( context.Background(), - schema.RekeyAttemptUpdateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RekeyAttemptUpdateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7625,9 +7844,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyDeleteBackupKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7675,9 +7895,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyDeleteBackupRecoveryKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7725,9 +7946,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyReadBackupKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7775,9 +7997,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyReadBackupRecoveryKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7827,9 +8050,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyVerificationCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7877,9 +8101,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyVerificationReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7928,10 +8153,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RekeyVerificationUpdate( context.Background(), - schema.RekeyVerificationUpdateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RekeyVerificationUpdateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7982,11 +8210,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + subsystem := "subsystem_example" // string | resp, err := client.System.ReloadSubsystem( context.Background(), subsystem, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8042,10 +8271,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Remount( context.Background(), - schema.RemountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RemountRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8096,11 +8328,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + migrationId := "migrationId_example" // string | The ID of the migration operation resp, err := client.System.RemountStatus( context.Background(), migrationId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8156,10 +8389,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Rewrap( context.Background(), - schema.RewrapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RewrapRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8210,9 +8446,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RootTokenGenerationCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8263,10 +8500,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RootTokenGenerationInitialize( context.Background(), - schema.RootTokenGenerationInitializeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RootTokenGenerationInitializeRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8317,9 +8557,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RootTokenGenerationReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8370,10 +8611,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.RootTokenGenerationUpdate( context.Background(), - schema.RootTokenGenerationUpdateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.RootTokenGenerationUpdateRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8424,9 +8668,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Seal( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8474,9 +8719,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.SealStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8526,9 +8772,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.StepDownLeader( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8577,12 +8824,15 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersConfigure( context.Background(), header, - schema.UiHeadersConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UiHeadersConfigureRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8638,11 +8888,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersDeleteConfiguration( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8697,9 +8948,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.UiHeadersList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8750,11 +9002,12 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersReadConfiguration( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8810,10 +9063,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Unseal( context.Background(), - schema.UnsealRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UnsealRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8865,10 +9121,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Unwrap( context.Background(), - schema.UnwrapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), + schema.UnwrapRequest{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8919,9 +9178,10 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.VersionHistory( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8972,10 +9232,13 @@ func main() { log.Fatal(err) } + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.Wrap( context.Background(), - map[string]interface{}{ /* populate request parameters */ }, - vault.WithToken("my-token"), + map[string]interface{}{ + // populate request parameters + }, ) if err != nil { log.Fatal(err) diff --git a/generate/templates/api_doc.handlebars b/generate/templates/api_doc.handlebars index 23f6c675..2d6f41fe 100644 --- a/generate/templates/api_doc.handlebars +++ b/generate/templates/api_doc.handlebars @@ -40,6 +40,8 @@ func main() { if err != nil { log.Fatal(err) } + + // TODO: authenticate if necessary (see the top-level README.md) {{! Oddly, vendorExtensions.x-go-example seems to only be available within allParams, and not within pathParams, queryParams, etc. }} {{~#each allParams}} @@ -56,12 +58,13 @@ func main() { {{paramName}}, {{~/not}}{{/each}} {{~#each bodyParams}} - {{#if isModel}}schema.{{/if}}{{dataType}}{ /* populate request parameters */ }, + {{#if isModel}}schema.{{/if}}{{dataType}}{ + // populate request parameters + }, {{~/each}} {{~#each queryParams}}{{#neq baseName "list"}} {{paramName}}, {{~/neq}}{{/each}} - vault.WithToken("my-token"), {{~#each pathParams}}{{#endsWith baseName "_mount_path"}} vault.WithMountPath({{#with defaultValue}}{{{.}}}{{/with}}), {{~/endsWith}}{{/each}}