From dccbc89f0b4a8730664b575556a6b2f89e67abff Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 14:24:14 -0400 Subject: [PATCH 1/7] Elide client initialization in generated docs --- generate/templates/api_doc.handlebars | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/generate/templates/api_doc.handlebars b/generate/templates/api_doc.handlebars index 23f6c675..3d29cd42 100644 --- a/generate/templates/api_doc.handlebars +++ b/generate/templates/api_doc.handlebars @@ -34,12 +34,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) {{! Oddly, vendorExtensions.x-go-example seems to only be available within allParams, and not within pathParams, queryParams, etc. }} {{~#each allParams}} @@ -61,7 +56,6 @@ func main() { {{~#each queryParams}}{{#neq baseName "list"}} {{paramName}}, {{~/neq}}{{/each}} - vault.WithToken("my-token"), {{~#each pathParams}}{{#endsWith baseName "_mount_path"}} vault.WithMountPath({{#with defaultValue}}{{{.}}}{{/with}}), {{~/endsWith}}{{/each}} From 66ffc08eb5fa5384f6a33339a3bc066edd8f643c Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 14:29:37 -0400 Subject: [PATCH 2/7] make regen --- docs/AuthApi.md | 1968 ++++----------------------- docs/IdentityApi.md | 864 ++---------- docs/SecretsApi.md | 3152 ++++++------------------------------------- docs/SystemApi.md | 1272 +++-------------- 4 files changed, 907 insertions(+), 6349 deletions(-) diff --git a/docs/AuthApi.md b/docs/AuthApi.md index 143f3ec1..ae665ad8 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -267,18 +267,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudDeleteAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -328,16 +322,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AliCloudListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -387,17 +375,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AliCloudLogin( context.Background(), schema.AliCloudLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -446,18 +428,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudReadAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -508,19 +484,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudWriteAuthRole( context.Background(), role, schema.AliCloudWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -571,18 +541,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBindSecretId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -632,18 +596,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBoundCidrList( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -693,18 +651,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePeriod( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -754,18 +706,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePolicies( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -815,18 +761,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteRole( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -876,18 +816,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -937,18 +871,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -998,18 +926,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1059,18 +981,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1120,18 +1036,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenMaxTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1181,18 +1091,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1242,18 +1146,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1304,19 +1202,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretId( context.Background(), roleName, schema.AppRoleDestroySecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1368,19 +1260,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretIdByAccessor( context.Background(), roleName, schema.AppRoleDestroySecretIdByAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1431,16 +1317,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AppRoleListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1489,18 +1369,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleListSecretIds( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1552,17 +1426,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AppRoleLogin( context.Background(), schema.AppRoleLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1612,19 +1480,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretId( context.Background(), roleName, schema.AppRoleLookUpSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1676,19 +1538,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretIdByAccessor( context.Background(), roleName, schema.AppRoleLookUpSecretIdByAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1739,18 +1595,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBindSecretId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1800,18 +1650,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBoundCidrList( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1861,18 +1705,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadLocalSecretIds( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1922,18 +1760,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPeriod( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1983,18 +1815,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPolicies( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2044,18 +1870,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRole( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2105,18 +1925,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRoleId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2166,18 +1980,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2227,18 +2035,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2288,18 +2090,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2349,18 +2145,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2410,18 +2200,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenMaxTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2471,18 +2255,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2532,18 +2310,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2593,16 +2365,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AppRoleTidySecretId( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2651,19 +2417,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBindSecretId( context.Background(), roleName, schema.AppRoleWriteBindSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2715,19 +2475,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBoundCidrList( context.Background(), roleName, schema.AppRoleWriteBoundCidrListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2779,19 +2533,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteCustomSecretId( context.Background(), roleName, schema.AppRoleWriteCustomSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2843,19 +2591,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePeriod( context.Background(), roleName, schema.AppRoleWritePeriodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2907,19 +2649,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePolicies( context.Background(), roleName, schema.AppRoleWritePoliciesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2971,19 +2707,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRole( context.Background(), roleName, schema.AppRoleWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3035,19 +2765,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRoleId( context.Background(), roleName, schema.AppRoleWriteRoleIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3099,19 +2823,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretId( context.Background(), roleName, schema.AppRoleWriteSecretIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3163,19 +2881,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdBoundCidrs( context.Background(), roleName, schema.AppRoleWriteSecretIdBoundCidrsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3227,19 +2939,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdNumUses( context.Background(), roleName, schema.AppRoleWriteSecretIdNumUsesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3291,19 +2997,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdTtl( context.Background(), roleName, schema.AppRoleWriteSecretIdTtlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3355,19 +3055,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenBoundCidrs( context.Background(), roleName, schema.AppRoleWriteTokenBoundCidrsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3419,19 +3113,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenMaxTtl( context.Background(), roleName, schema.AppRoleWriteTokenMaxTtlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3483,19 +3171,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenNumUses( context.Background(), roleName, schema.AppRoleWriteTokenNumUsesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3547,19 +3229,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenTtl( context.Background(), roleName, schema.AppRoleWriteTokenTtlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3611,19 +3287,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsConfigureCertificate( context.Background(), certName, schema.AwsConfigureCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3675,17 +3345,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsConfigureClient( context.Background(), schema.AwsConfigureClientRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3735,17 +3399,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsConfigureIdentityAccessListTidyOperation( context.Background(), schema.AwsConfigureIdentityAccessListTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3795,17 +3453,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsConfigureIdentityIntegration( context.Background(), schema.AwsConfigureIdentityIntegrationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3855,17 +3507,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsConfigureIdentityWhitelistTidyOperation( context.Background(), schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3915,17 +3561,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsConfigureRoleTagBlacklistTidyOperation( context.Background(), schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3975,17 +3615,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsConfigureRoleTagDenyListTidyOperation( context.Background(), schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4034,18 +3668,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsDeleteAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4095,18 +3723,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsDeleteCertificateConfiguration( context.Background(), certName, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4156,16 +3778,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsDeleteClientConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4213,18 +3829,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityAccessList( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4274,16 +3884,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsDeleteIdentityAccessListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4331,18 +3935,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityWhitelist( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4392,16 +3990,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsDeleteIdentityWhitelistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4449,18 +4041,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4510,16 +4096,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsDeleteRoleTagBlacklistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4567,18 +4147,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4628,16 +4202,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsDeleteRoleTagDenyListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4685,18 +4253,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsDeleteStsRole( context.Background(), accountId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4746,16 +4308,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4804,16 +4360,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListCertificateConfigurations( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4862,16 +4412,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListIdentityAccessList( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4920,16 +4464,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListIdentityWhitelist( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4978,16 +4516,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListRoleTagBlacklists( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5036,16 +4568,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListRoleTagDenyLists( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5094,16 +4620,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsListStsRoleRelationships( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5153,17 +4673,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsLogin( context.Background(), schema.AwsLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5212,18 +4726,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsReadAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5273,18 +4781,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsReadCertificateConfiguration( context.Background(), certName, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5334,16 +4836,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsReadClientConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5391,18 +4887,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityAccessList( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5452,16 +4942,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsReadIdentityAccessListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5509,16 +4993,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsReadIdentityIntegrationConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5566,18 +5044,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityWhitelist( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5627,16 +5099,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsReadIdentityWhitelistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5684,18 +5150,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5745,16 +5205,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsReadRoleTagBlacklistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5802,18 +5256,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5863,16 +5311,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsReadRoleTagDenyListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5920,18 +5362,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsReadStsRole( context.Background(), accountId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5981,16 +5417,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6039,17 +5469,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsTidyIdentityAccessList( context.Background(), schema.AwsTidyIdentityAccessListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6099,17 +5523,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsTidyIdentityWhitelist( context.Background(), schema.AwsTidyIdentityWhitelistRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6159,17 +5577,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsTidyRoleTagBlacklist( context.Background(), schema.AwsTidyRoleTagBlacklistRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6219,17 +5631,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AwsTidyRoleTagDenyList( context.Background(), schema.AwsTidyRoleTagDenyListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6279,19 +5685,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteAuthRole( context.Background(), role, schema.AwsWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6343,19 +5743,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteRoleTag( context.Background(), role, schema.AwsWriteRoleTagRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6406,18 +5800,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6467,18 +5855,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6529,19 +5911,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsWriteStsRole( context.Background(), accountId, schema.AwsWriteStsRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6593,17 +5969,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AzureConfigureAuth( context.Background(), schema.AzureConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6652,16 +6022,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AzureDeleteAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6709,18 +6073,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureDeleteAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6770,16 +6128,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AzureListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6829,17 +6181,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AzureLogin( context.Background(), schema.AzureLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6888,16 +6234,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AzureReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6945,18 +6285,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureReadAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7006,16 +6340,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.AzureRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7064,19 +6392,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureWriteAuthRole( context.Background(), name, schema.AzureWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7128,17 +6450,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CentrifyConfigure( context.Background(), schema.CentrifyConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7188,17 +6504,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CentrifyLogin( context.Background(), schema.CentrifyLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7247,16 +6557,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CentrifyReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7305,17 +6609,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CertConfigure( context.Background(), schema.CertConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7364,18 +6662,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCertificate( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7425,18 +6717,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCrl( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7486,16 +6772,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CertListCertificates( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7544,16 +6824,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CertListCrls( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7603,17 +6877,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CertLogin( context.Background(), schema.CertLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7662,18 +6930,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCertificate( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7723,16 +6985,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CertReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7780,18 +7036,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCrl( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7842,19 +7092,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCertificate( context.Background(), name, schema.CertWriteCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7906,19 +7150,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCrl( context.Background(), name, schema.CertWriteCrlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7970,17 +7208,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CloudFoundryConfigure( context.Background(), schema.CloudFoundryConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8029,16 +7261,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CloudFoundryDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8086,18 +7312,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8147,16 +7367,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CloudFoundryListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8206,17 +7420,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CloudFoundryLogin( context.Background(), schema.CloudFoundryLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8265,16 +7473,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.CloudFoundryReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8322,18 +7524,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8384,19 +7580,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryWriteRole( context.Background(), role, schema.CloudFoundryWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8448,17 +7638,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GithubConfigure( context.Background(), schema.GithubConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8507,18 +7691,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubDeleteTeamMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8568,18 +7746,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubDeleteUserMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8629,16 +7801,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GithubListTeams( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8687,16 +7853,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GithubListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8746,17 +7906,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GithubLogin( context.Background(), schema.GithubLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8805,16 +7959,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GithubReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8862,18 +8010,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubReadTeamMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8923,18 +8065,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubReadUserMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8985,19 +8121,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubWriteTeamMapping( context.Background(), key, schema.GithubWriteTeamMappingRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9049,19 +8179,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubWriteUserMapping( context.Background(), key, schema.GithubWriteUserMappingRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9113,17 +8237,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GoogleCloudConfigureAuth( context.Background(), schema.GoogleCloudConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9172,18 +8290,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9234,19 +8346,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditLabelsForRole( context.Background(), name, schema.GoogleCloudEditLabelsForRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9298,19 +8404,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditServiceAccountsForRole( context.Background(), name, schema.GoogleCloudEditServiceAccountsForRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9361,16 +8461,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GoogleCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9420,17 +8514,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GoogleCloudLogin( context.Background(), schema.GoogleCloudLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9479,16 +8567,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.GoogleCloudReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9536,18 +8618,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9598,19 +8674,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudWriteRole( context.Background(), name, schema.GoogleCloudWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9667,17 +8737,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.JwtConfigure( context.Background(), schema.JwtConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9726,18 +8790,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9789,16 +8847,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.JwtListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9848,17 +8900,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.JwtLogin( context.Background(), schema.JwtLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9907,12 +8953,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) clientNonce := "clientNonce_example" // string | code := "code_example" // string | @@ -9922,7 +8963,6 @@ func main() { clientNonce, code, state, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9974,17 +9014,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.JwtOidcCallbackFormPost( context.Background(), schema.JwtOidcCallbackFormPostRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10034,17 +9068,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.JwtOidcRequestAuthorizationUrl( context.Background(), schema.JwtOidcRequestAuthorizationUrlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10093,16 +9121,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.JwtReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10150,18 +9172,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10217,19 +9233,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtWriteRole( context.Background(), name, schema.JwtWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10281,17 +9291,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KerberosConfigure( context.Background(), schema.KerberosConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10341,17 +9345,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KerberosConfigureLdap( context.Background(), schema.KerberosConfigureLdapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10400,18 +9398,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10461,16 +9453,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KerberosListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10520,17 +9506,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KerberosLogin( context.Background(), schema.KerberosLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10579,16 +9559,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KerberosReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10636,18 +9610,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10697,16 +9665,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KerberosReadLdapConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10755,19 +9717,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosWriteGroup( context.Background(), name, schema.KerberosWriteGroupRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10819,17 +9775,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KubernetesConfigureAuth( context.Background(), schema.KubernetesConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10878,18 +9828,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesDeleteAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10939,16 +9883,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KubernetesListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10998,17 +9936,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KubernetesLogin( context.Background(), schema.KubernetesLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11057,16 +9989,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.KubernetesReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11114,18 +10040,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesReadAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11176,19 +10096,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesWriteAuthRole( context.Background(), name, schema.KubernetesWriteAuthRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11240,17 +10154,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.LdapConfigureAuth( context.Background(), schema.LdapConfigureAuthRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11299,18 +10207,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11360,18 +10262,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11421,16 +10317,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.LdapListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11479,16 +10369,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.LdapListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11538,19 +10422,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | DN (distinguished name) to be used for login. resp, err := client.Auth.LdapLogin( context.Background(), username, schema.LdapLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11601,16 +10479,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.LdapReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11658,18 +10530,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11719,18 +10585,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11781,19 +10641,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapWriteGroup( context.Background(), name, schema.LdapWriteGroupRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11845,19 +10699,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapWriteUser( context.Background(), name, schema.LdapWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11909,17 +10757,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OciConfigure( context.Background(), schema.OciConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -11968,16 +10810,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OciDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12025,18 +10861,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12086,16 +10916,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OciListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12145,19 +10969,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciLogin( context.Background(), role, schema.OciLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12208,16 +11026,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OciReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12265,18 +11077,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12327,19 +11133,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciWriteRole( context.Background(), role, schema.OciWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12391,17 +11191,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OktaConfigure( context.Background(), schema.OktaConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12450,18 +11244,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12511,18 +11299,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12572,16 +11354,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OktaListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12630,16 +11406,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OktaListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12689,19 +11459,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username to be used for login. resp, err := client.Auth.OktaLogin( context.Background(), username, schema.OktaLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12752,16 +11516,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.OktaReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12809,18 +11567,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12870,18 +11622,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12931,18 +11677,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) nonce := "nonce_example" // string | Nonce provided during a login request to retrieve the number verification challenge for the matching request. resp, err := client.Auth.OktaVerify( context.Background(), nonce, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -12993,19 +11733,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaWriteGroup( context.Background(), name, schema.OktaWriteGroupRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13057,19 +11791,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaWriteUser( context.Background(), name, schema.OktaWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13121,17 +11849,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.RadiusConfigure( context.Background(), schema.RadiusConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13180,18 +11902,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13241,16 +11957,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.RadiusListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13300,17 +12010,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.RadiusLogin( context.Background(), schema.RadiusLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13360,19 +12064,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlusername := "urlusername_example" // string | Username to be used for login. (URL parameter) resp, err := client.Auth.RadiusLoginWithUsername( context.Background(), urlusername, schema.RadiusLoginWithUsernameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13423,16 +12121,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.RadiusReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13480,18 +12172,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13542,19 +12228,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusWriteUser( context.Background(), name, schema.RadiusWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13606,17 +12286,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenCreate( context.Background(), schema.TokenCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13661,19 +12335,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenCreateAgainstRole( context.Background(), roleName, schema.TokenCreateAgainstRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13723,17 +12391,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenCreateOrphan( context.Background(), schema.TokenCreateOrphanRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13777,18 +12439,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenDeleteRole( context.Background(), roleName, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13836,16 +12492,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenListAccessors( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13889,16 +12539,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenListRoles( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13943,17 +12587,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenLookUp( context.Background(), schema.TokenLookUpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13998,17 +12636,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenLookUpAccessor( context.Background(), schema.TokenLookUpAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14052,16 +12684,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenLookUpSelf( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14102,18 +12728,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenReadRole( context.Background(), roleName, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14162,17 +12782,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRenew( context.Background(), schema.TokenRenewRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14217,17 +12831,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRenewAccessor( context.Background(), schema.TokenRenewAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14272,17 +12880,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRenewSelf( context.Background(), schema.TokenRenewSelfRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14327,17 +12929,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRevoke( context.Background(), schema.TokenRevokeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14382,17 +12978,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRevokeAccessor( context.Background(), schema.TokenRevokeAccessorRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14437,17 +13027,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRevokeOrphan( context.Background(), schema.TokenRevokeOrphanRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14491,16 +13075,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenRevokeSelf( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14541,16 +13119,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.TokenTidy( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14592,19 +13164,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenWriteRole( context.Background(), roleName, schema.TokenWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14653,18 +13219,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassDeleteUser( context.Background(), username, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14714,16 +13274,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Auth.UserpassListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14773,19 +13327,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username of the user. resp, err := client.Auth.UserpassLogin( context.Background(), username, schema.UserpassLoginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14836,18 +13384,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassReadUser( context.Background(), username, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14898,19 +13440,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassResetPassword( context.Background(), username, schema.UserpassResetPasswordRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -14962,19 +13498,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassUpdatePolicies( context.Background(), username, schema.UserpassUpdatePoliciesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15026,19 +13556,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassWriteUser( context.Background(), username, schema.UserpassWriteUserRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index 23ce5a4a..25359f17 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -130,17 +130,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.AliasCreate( context.Background(), schema.AliasCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -184,18 +178,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -243,16 +231,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.AliasListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -296,18 +278,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -356,19 +332,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasUpdateById( context.Background(), id, schema.AliasUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -418,17 +388,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityBatchDelete( context.Background(), schema.EntityBatchDeleteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -473,17 +437,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityCreate( context.Background(), schema.EntityCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -528,17 +486,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityCreateAlias( context.Background(), schema.EntityCreateAliasRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -582,18 +534,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityDeleteAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -641,18 +587,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -700,18 +640,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityDeleteByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -759,16 +693,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityListAliasesById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -812,16 +740,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -865,16 +787,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityListByName( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -919,17 +835,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityLookUp( context.Background(), schema.EntityLookUpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -974,17 +884,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.EntityMerge( context.Background(), schema.EntityMergeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1028,18 +932,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityReadAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1087,18 +985,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1146,18 +1038,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityReadByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1206,19 +1092,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityUpdateAliasById( context.Background(), id, schema.EntityUpdateAliasByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1268,19 +1148,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityUpdateById( context.Background(), id, schema.EntityUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1330,19 +1204,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityUpdateByName( context.Background(), name, schema.EntityUpdateByNameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1392,17 +1260,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.GroupCreate( context.Background(), schema.GroupCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1447,17 +1309,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.GroupCreateAlias( context.Background(), schema.GroupCreateAliasRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1501,18 +1357,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupDeleteAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1560,18 +1410,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1619,18 +1463,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupDeleteByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1678,16 +1516,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.GroupListAliasesById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1731,16 +1563,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.GroupListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1784,16 +1610,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.GroupListByName( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1838,17 +1658,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.GroupLookUp( context.Background(), schema.GroupLookUpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1892,18 +1706,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupReadAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1951,18 +1759,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2010,18 +1812,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupReadByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2070,19 +1866,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupUpdateAliasById( context.Background(), id, schema.GroupUpdateAliasByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2132,19 +1922,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupUpdateById( context.Background(), id, schema.GroupUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2194,19 +1978,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupUpdateByName( context.Background(), name, schema.GroupUpdateByNameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2256,17 +2034,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaAdminDestroyTotpSecret( context.Background(), schema.MfaAdminDestroyTotpSecretRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2311,17 +2083,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaAdminGenerateTotpSecret( context.Background(), schema.MfaAdminGenerateTotpSecretRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2366,17 +2132,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaCreateDuoMethod( context.Background(), schema.MfaCreateDuoMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2421,17 +2181,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaCreateOktaMethod( context.Background(), schema.MfaCreateOktaMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2476,17 +2230,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaCreatePingIdMethod( context.Background(), schema.MfaCreatePingIdMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2531,17 +2279,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaCreateTotpMethod( context.Background(), schema.MfaCreateTotpMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2585,18 +2327,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteDuoMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2644,18 +2380,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaDeleteLoginEnforcement( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2703,18 +2433,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteOktaMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2762,18 +2486,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeletePingIdMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2821,18 +2539,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteTotpMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2881,17 +2593,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaGenerateTotpSecret( context.Background(), schema.MfaGenerateTotpSecretRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2935,16 +2641,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaListDuoMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2988,16 +2688,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaListLoginEnforcements( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3041,16 +2735,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaListMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3094,16 +2782,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaListOktaMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3147,16 +2829,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaListPingIdMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3200,16 +2876,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.MfaListTotpMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3253,18 +2923,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadDuoMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3312,18 +2976,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaReadLoginEnforcement( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3371,18 +3029,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3430,18 +3082,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadOktaMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3489,18 +3135,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadPingIdMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3548,18 +3188,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadTotpMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3608,19 +3242,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateDuoMethod( context.Background(), methodId, schema.MfaUpdateDuoMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3670,19 +3298,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateOktaMethod( context.Background(), methodId, schema.MfaUpdateOktaMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3732,19 +3354,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdatePingIdMethod( context.Background(), methodId, schema.MfaUpdatePingIdMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3794,19 +3410,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateTotpMethod( context.Background(), methodId, schema.MfaUpdateTotpMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3856,19 +3466,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaWriteLoginEnforcement( context.Background(), name, schema.MfaWriteLoginEnforcementRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3918,17 +3522,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcConfigure( context.Background(), schema.OidcConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3972,18 +3570,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcDeleteAssignment( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4031,18 +3623,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcDeleteClient( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4090,18 +3676,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcDeleteKey( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4149,18 +3729,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcDeleteProvider( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4208,18 +3782,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcDeleteRole( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4267,18 +3835,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcDeleteScope( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4326,18 +3888,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcGenerateToken( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4386,17 +3942,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcIntrospect( context.Background(), schema.OidcIntrospectRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4440,16 +3990,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcListAssignments( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4493,16 +4037,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcListClients( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4546,16 +4084,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcListKeys( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4599,18 +4131,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) allowedClientId := "allowedClientId_example" // string | Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids. (defaults to "") resp, err := client.Identity.OidcListProviders( context.Background(), allowedClientId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4655,16 +4181,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcListRoles( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4708,16 +4228,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcListScopes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4761,12 +4275,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider clientId := "clientId_example" // string | The ID of the requesting client. @@ -4790,7 +4299,6 @@ func main() { responseType, scope, state, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4848,19 +4356,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderAuthorizeWithParameters( context.Background(), name, schema.OidcProviderAuthorizeWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4910,19 +4412,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderToken( context.Background(), name, schema.OidcProviderTokenRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4971,18 +4467,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderUserInfo( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5030,18 +4520,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcReadAssignment( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5089,18 +4573,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcReadClient( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5148,16 +4626,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5198,18 +4670,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcReadKey( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5257,16 +4723,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcReadOpenIdConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5307,18 +4767,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProvider( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5366,18 +4820,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderOpenIdConfiguration( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5425,18 +4873,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderPublicKeys( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5484,16 +4926,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.OidcReadPublicKeys( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5534,18 +4970,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcReadRole( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5593,18 +5023,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcReadScope( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5653,19 +5077,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcRotateKey( context.Background(), name, schema.OidcRotateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5715,19 +5133,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcWriteAssignment( context.Background(), name, schema.OidcWriteAssignmentRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5777,19 +5189,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcWriteClient( context.Background(), name, schema.OidcWriteClientRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5839,19 +5245,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcWriteKey( context.Background(), name, schema.OidcWriteKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5901,19 +5301,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcWriteProvider( context.Background(), name, schema.OidcWriteProviderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5963,19 +5357,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcWriteRole( context.Background(), name, schema.OidcWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6025,19 +5413,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcWriteScope( context.Background(), name, schema.OidcWriteScopeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6087,17 +5469,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.PersonaCreate( context.Background(), schema.PersonaCreateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6141,18 +5517,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6200,16 +5570,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Identity.PersonaListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6253,18 +5617,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6313,19 +5671,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaUpdateById( context.Background(), id, schema.PersonaUpdateByIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index 60ce089e..79cf4f19 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -416,17 +416,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AliCloudConfigure( context.Background(), schema.AliCloudConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -475,16 +469,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AliCloudDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -532,18 +520,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -593,18 +575,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -654,16 +630,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AliCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -712,16 +682,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AliCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -769,18 +733,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -831,19 +789,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudWriteRole( context.Background(), name, schema.AliCloudWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -895,17 +847,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AwsConfigureLease( context.Background(), schema.AwsConfigureLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -955,17 +901,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AwsConfigureRootIamCredentials( context.Background(), schema.AwsConfigureRootIamCredentialsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1014,18 +954,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1075,18 +1009,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsDeleteStaticRolesName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1136,12 +1064,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role @@ -1153,7 +1076,6 @@ func main() { roleArn, roleSessionName, ttl, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1207,19 +1129,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateCredentialsWithParameters( context.Background(), name, schema.AwsGenerateCredentialsWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1270,12 +1186,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role @@ -1287,7 +1198,6 @@ func main() { roleArn, roleSessionName, ttl, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1341,19 +1251,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateStsCredentialsWithParameters( context.Background(), name, schema.AwsGenerateStsCredentialsWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1404,16 +1308,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AwsListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1462,16 +1360,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AwsReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1519,18 +1411,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1580,16 +1466,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AwsReadRootIamCredentialsConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1637,18 +1517,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticCredsName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1698,18 +1572,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticRolesName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1759,16 +1627,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AwsRotateRootIamCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1817,19 +1679,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsWriteRole( context.Background(), name, schema.AwsWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1881,19 +1737,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsWriteStaticRolesName( context.Background(), name, schema.AwsWriteStaticRolesNameRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1945,17 +1795,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AzureConfigure( context.Background(), schema.AzureConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2004,16 +1848,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AzureDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2061,18 +1899,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2122,16 +1954,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AzureListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2180,16 +2006,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AzureReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2237,18 +2057,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2298,18 +2112,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the Vault role resp, err := client.Secrets.AzureRequestServicePrincipalCredentials( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2359,16 +2167,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.AzureRotateRoot( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2417,19 +2219,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureWriteRole( context.Background(), name, schema.AzureWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2481,17 +2277,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.ConsulConfigureAccess( context.Background(), schema.ConsulConfigureAccessRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2540,18 +2330,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2601,18 +2385,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Secrets.ConsulGenerateCredentials( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2662,16 +2440,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.ConsulListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2720,16 +2492,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.ConsulReadAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2777,18 +2543,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2839,19 +2599,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulWriteRole( context.Background(), name, schema.ConsulWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2902,18 +2656,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeDelete( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2963,18 +2711,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeList( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3023,18 +2765,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeRead( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3082,19 +2818,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeWrite( context.Background(), path, map[string]interface{}{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3144,19 +2874,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseConfigureConnection( context.Background(), name, schema.DatabaseConfigureConnectionRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3207,18 +2931,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseDeleteConnectionConfiguration( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3268,18 +2986,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3329,18 +3041,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3390,18 +3096,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3451,16 +3151,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.DatabaseListConnections( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3509,16 +3203,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.DatabaseListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3567,16 +3255,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.DatabaseListStaticRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3625,18 +3307,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseReadConnectionConfiguration( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3686,18 +3362,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3747,18 +3417,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3808,18 +3472,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the static role. resp, err := client.Secrets.DatabaseReadStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3869,18 +3527,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseResetConnection( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3930,18 +3582,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseRotateRootCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3991,18 +3637,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the static role resp, err := client.Secrets.DatabaseRotateStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4053,19 +3693,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteRole( context.Background(), name, schema.DatabaseWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4117,19 +3751,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteStaticRole( context.Background(), name, schema.DatabaseWriteStaticRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4181,17 +3809,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudConfigure( context.Background(), schema.GoogleCloudConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4240,18 +3862,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteImpersonatedAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4301,18 +3917,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudDeleteRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4362,18 +3972,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4423,18 +4027,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name of the impersonated account. resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4484,18 +4082,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken( context.Background(), roleset, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4546,19 +4138,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetKey( context.Background(), roleset, schema.GoogleCloudGenerateRolesetKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4609,18 +4195,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessToken( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4671,19 +4251,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountKey( context.Background(), name, schema.GoogleCloudGenerateStaticAccountKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4735,17 +4309,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudKmsConfigure( context.Background(), schema.GoogleCloudKmsConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4795,19 +4363,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsConfigureKey( context.Background(), key, schema.GoogleCloudKmsConfigureKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4859,19 +4421,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsDecrypt( context.Background(), key, schema.GoogleCloudKmsDecryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4922,16 +4478,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudKmsDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4979,18 +4529,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsDeleteKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5040,18 +4584,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. resp, err := client.Secrets.GoogleCloudKmsDeregisterKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5102,19 +4640,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsEncrypt( context.Background(), key, schema.GoogleCloudKmsEncryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5165,16 +4697,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudKmsListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5223,16 +4749,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudKmsReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5280,18 +4800,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5341,18 +4855,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKeyConfiguration( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5403,19 +4911,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsReencrypt( context.Background(), key, schema.GoogleCloudKmsReencryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5467,19 +4969,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. resp, err := client.Secrets.GoogleCloudKmsRegisterKey( context.Background(), key, schema.GoogleCloudKmsRegisterKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5530,18 +5026,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsRetrievePublicKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5591,18 +5081,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. resp, err := client.Secrets.GoogleCloudKmsRotateKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5653,19 +5137,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsSign( context.Background(), key, schema.GoogleCloudKmsSignRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5716,18 +5194,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5778,19 +5250,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsVerify( context.Background(), key, schema.GoogleCloudKmsVerifyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5842,19 +5308,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsWriteKey( context.Background(), key, schema.GoogleCloudKmsWriteKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5905,16 +5365,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5963,16 +5417,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudListRolesets( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6021,16 +5469,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudListStaticAccounts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6079,16 +5521,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6136,18 +5572,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadImpersonatedAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6197,18 +5627,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudReadRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6258,18 +5682,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadStaticAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6319,18 +5737,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6380,18 +5792,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRolesetKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6441,16 +5847,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.GoogleCloudRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6498,18 +5898,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the account. resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6560,19 +5954,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteImpersonatedAccount( context.Background(), name, schema.GoogleCloudWriteImpersonatedAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6624,19 +6012,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudWriteRoleset( context.Background(), name, schema.GoogleCloudWriteRolesetRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6688,19 +6070,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteStaticAccount( context.Background(), name, schema.GoogleCloudWriteStaticAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6751,16 +6127,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KubernetesCheckConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6809,17 +6179,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KubernetesConfigure( context.Background(), schema.KubernetesConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6868,16 +6232,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KubernetesDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6925,18 +6283,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6987,19 +6339,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Vault role resp, err := client.Secrets.KubernetesGenerateCredentials( context.Background(), name, schema.KubernetesGenerateCredentialsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7050,16 +6396,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KubernetesListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7108,16 +6448,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KubernetesReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7165,18 +6499,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7227,19 +6555,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesWriteRole( context.Background(), name, schema.KubernetesWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7290,18 +6612,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Delete( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7351,18 +6667,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1List( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7413,18 +6723,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Read( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7474,19 +6778,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Write( context.Background(), path, map[string]interface{}{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7538,17 +6836,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KvV2Configure( context.Background(), schema.KvV2ConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7597,18 +6889,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Delete( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7658,18 +6944,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteMetadataAndAllVersions( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7720,19 +7000,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteVersions( context.Background(), path, schema.KvV2DeleteVersionsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7784,19 +7058,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DestroyVersions( context.Background(), path, schema.KvV2DestroyVersionsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7847,18 +7115,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2List( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7909,18 +7171,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Read( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7970,16 +7226,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.KvV2ReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8027,18 +7277,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadMetadata( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8088,18 +7332,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadSubkeys( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8150,19 +7388,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2UndeleteVersions( context.Background(), path, schema.KvV2UndeleteVersionsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8214,19 +7446,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Write( context.Background(), path, schema.KvV2WriteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8278,19 +7504,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2WriteMetadata( context.Background(), path, schema.KvV2WriteMetadataRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8342,17 +7562,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapConfigure( context.Background(), schema.LdapConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8401,16 +7615,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8458,18 +7666,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapDeleteDynamicRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8519,18 +7721,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapDeleteStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8581,19 +7777,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckIn( context.Background(), name, schema.LdapLibraryCheckInRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8645,19 +7835,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set resp, err := client.Secrets.LdapLibraryCheckOut( context.Background(), name, schema.LdapLibraryCheckOutRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8708,18 +7892,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckStatus( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8770,19 +7948,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryConfigure( context.Background(), name, schema.LdapLibraryConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8833,18 +8005,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryDelete( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8895,19 +8061,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryForceCheckIn( context.Background(), name, schema.LdapLibraryForceCheckInRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8958,16 +8118,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapLibraryList( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9016,18 +8170,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryRead( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9077,16 +8225,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapListDynamicRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9135,16 +8277,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapListStaticRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9193,16 +8329,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9250,18 +8380,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapReadDynamicRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9311,18 +8435,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapReadStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9372,18 +8490,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the dynamic role. resp, err := client.Secrets.LdapRequestDynamicRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9433,18 +8545,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the static role. resp, err := client.Secrets.LdapRequestStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9494,16 +8600,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.LdapRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9551,18 +8651,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the static role resp, err := client.Secrets.LdapRotateStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9613,19 +8707,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapWriteDynamicRole( context.Background(), name, schema.LdapWriteDynamicRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9677,19 +8765,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapWriteStaticRole( context.Background(), name, schema.LdapWriteStaticRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9741,17 +8823,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.MongoDbAtlasConfigure( context.Background(), schema.MongoDbAtlasConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9800,18 +8876,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9861,18 +8931,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.MongoDbAtlasGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9922,16 +8986,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.MongoDbAtlasListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9980,16 +9038,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.MongoDbAtlasReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10037,18 +9089,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10099,19 +9145,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasWriteRole( context.Background(), name, schema.MongoDbAtlasWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10163,17 +9203,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadConfigureAccess( context.Background(), schema.NomadConfigureAccessRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10223,17 +9257,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadConfigureLease( context.Background(), schema.NomadConfigureLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10282,16 +9310,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadDeleteAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10339,16 +9361,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadDeleteLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10396,18 +9412,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10457,18 +9467,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10518,16 +9522,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10576,16 +9574,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadReadAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10633,16 +9625,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.NomadReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10690,18 +9676,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10752,19 +9732,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadWriteRole( context.Background(), name, schema.NomadWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10816,17 +9790,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureAcme( context.Background(), schema.PkiConfigureAcmeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10876,17 +9844,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureAutoTidy( context.Background(), schema.PkiConfigureAutoTidyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10936,17 +9898,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureCa( context.Background(), schema.PkiConfigureCaRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10996,17 +9952,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureCluster( context.Background(), schema.PkiConfigureClusterRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11056,17 +10006,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureCrl( context.Background(), schema.PkiConfigureCrlRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11116,17 +10060,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureIssuers( context.Background(), schema.PkiConfigureIssuersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11176,17 +10114,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureKeys( context.Background(), schema.PkiConfigureKeysRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11236,17 +10168,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiConfigureUrls( context.Background(), schema.PkiConfigureUrlsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11296,17 +10222,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiCrossSignIntermediate( context.Background(), schema.PkiCrossSignIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11355,18 +10275,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) keyId := "keyId_example" // string | EAB key identifier resp, err := client.Secrets.PkiDeleteEabKey( context.Background(), keyId, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11416,18 +10330,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiDeleteIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11477,18 +10385,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiDeleteKey( context.Background(), keyRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11538,18 +10440,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11599,16 +10495,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiDeleteRoot( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11656,16 +10546,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiGenerateEabKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11713,18 +10597,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiGenerateEabKeyForIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11774,12 +10652,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -11787,7 +10660,6 @@ func main() { context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11839,18 +10711,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiGenerateEabKeyForRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11901,17 +10767,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiGenerateExportedKey( context.Background(), schema.PkiGenerateExportedKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11961,19 +10821,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateIntermediate( context.Background(), exported, schema.PkiGenerateIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12025,17 +10879,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiGenerateInternalKey( context.Background(), schema.PkiGenerateInternalKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12085,17 +10933,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiGenerateKmsKey( context.Background(), schema.PkiGenerateKmsKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12145,19 +10987,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateRoot( context.Background(), exported, schema.PkiGenerateRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12209,17 +11045,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiImportKey( context.Background(), schema.PkiImportKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12269,19 +11099,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssueWithRole( context.Background(), role, schema.PkiIssueWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12333,12 +11157,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -12347,7 +11166,6 @@ func main() { issuerRef, role, schema.PkiIssuerIssueWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12400,18 +11218,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrl( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12461,18 +11273,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDelta( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12522,18 +11328,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12583,18 +11383,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12644,18 +11438,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12705,18 +11493,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12767,19 +11549,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerResignCrls( context.Background(), issuerRef, schema.PkiIssuerResignCrlsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12831,19 +11607,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignIntermediate( context.Background(), issuerRef, schema.PkiIssuerSignIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12895,19 +11665,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignRevocationList( context.Background(), issuerRef, schema.PkiIssuerSignRevocationListRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12959,19 +11723,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignSelfIssued( context.Background(), issuerRef, schema.PkiIssuerSignSelfIssuedRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13023,19 +11781,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignVerbatim( context.Background(), issuerRef, schema.PkiIssuerSignVerbatimRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13087,12 +11839,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -13101,7 +11848,6 @@ func main() { issuerRef, role, schema.PkiIssuerSignVerbatimWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13155,12 +11901,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -13169,7 +11910,6 @@ func main() { issuerRef, role, schema.PkiIssuerSignWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13223,19 +11963,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateIntermediate( context.Background(), exported, schema.PkiIssuersGenerateIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13287,19 +12021,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateRoot( context.Background(), exported, schema.PkiIssuersGenerateRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13351,17 +12079,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiIssuersImportBundle( context.Background(), schema.PkiIssuersImportBundleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13411,17 +12133,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiIssuersImportCert( context.Background(), schema.PkiIssuersImportCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13470,16 +12186,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiListCerts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13528,16 +12238,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiListEabKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13586,16 +12290,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiListIssuers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13644,16 +12342,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13702,16 +12394,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiListRevokedCerts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13760,16 +12446,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13818,16 +12498,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiQueryOcsp( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13875,18 +12549,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) req := "req_example" // string | base-64 encoded ocsp request resp, err := client.Secrets.PkiQueryOcspWithGetReq( context.Background(), req, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13936,16 +12604,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadAcmeConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13993,16 +12655,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadAcmeDirectory( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14050,16 +12706,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadAcmeNewNonce( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14107,16 +12757,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadAutoTidyConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14164,16 +12808,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCaChainPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14221,16 +12859,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCaDer( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14278,16 +12910,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCaPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14335,18 +12961,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCert( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14396,16 +13016,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCertCaChain( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14453,16 +13067,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCertCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14510,16 +13118,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCertDeltaCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14567,18 +13169,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawDer( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14628,18 +13224,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawPem( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14689,16 +13279,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadClusterConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14746,16 +13330,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCrlConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14803,16 +13381,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCrlDelta( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14860,16 +13432,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCrlDeltaPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14917,16 +13483,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCrlDer( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14974,16 +13534,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadCrlPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15031,18 +13585,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15092,18 +13640,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15153,18 +13695,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeDirectory( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15214,18 +13750,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeNewNonce( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15275,12 +13805,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -15288,7 +13813,6 @@ func main() { context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15340,12 +13864,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -15353,7 +13872,6 @@ func main() { context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15405,18 +13923,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerJson( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15466,18 +13978,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15527,16 +14033,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadIssuersConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15584,18 +14084,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiReadKey( context.Background(), keyRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15645,16 +14139,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadKeysConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15702,18 +14190,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15763,18 +14245,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeDirectory( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15824,18 +14300,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeNewNonce( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15885,16 +14355,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReadUrlsConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15943,17 +14407,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiReplaceRoot( context.Background(), schema.PkiReplaceRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16003,17 +14461,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiRevoke( context.Background(), schema.PkiRevokeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16062,18 +14514,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiRevokeIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16124,17 +14570,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiRevokeWithKey( context.Background(), schema.PkiRevokeWithKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16184,17 +14624,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiRootSignIntermediate( context.Background(), schema.PkiRootSignIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16244,17 +14678,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiRootSignSelfIssued( context.Background(), schema.PkiRootSignSelfIssuedRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16303,16 +14731,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiRotateCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16360,16 +14782,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiRotateDeltaCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16418,19 +14834,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiRotateRoot( context.Background(), exported, schema.PkiRotateRootRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16482,17 +14892,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiSetSignedIntermediate( context.Background(), schema.PkiSetSignedIntermediateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16542,17 +14946,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiSignVerbatim( context.Background(), schema.PkiSignVerbatimRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16602,19 +15000,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignVerbatimWithRole( context.Background(), role, schema.PkiSignVerbatimWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16666,19 +15058,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignWithRole( context.Background(), role, schema.PkiSignWithRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16730,17 +15116,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiTidy( context.Background(), schema.PkiTidyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16789,16 +15169,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiTidyCancel( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16846,16 +15220,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiTidyStatus( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16904,19 +15272,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) kid := "kid_example" // string | The key identifier provided by the CA resp, err := client.Secrets.PkiWriteAcmeAccountKid( context.Background(), kid, schema.PkiWriteAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16968,19 +15330,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value resp, err := client.Secrets.PkiWriteAcmeAuthorizationAuthId( context.Background(), authId, schema.PkiWriteAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17032,12 +15388,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -17046,7 +15397,6 @@ func main() { authId, challengeType, schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17100,17 +15450,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiWriteAcmeNewAccount( context.Background(), schema.PkiWriteAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17160,17 +15504,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiWriteAcmeNewOrder( context.Background(), schema.PkiWriteAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17220,19 +15558,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderId( context.Background(), orderId, schema.PkiWriteAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17284,19 +15616,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdCert( context.Background(), orderId, schema.PkiWriteAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17348,19 +15674,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdFinalize( context.Background(), orderId, schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17412,17 +15732,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiWriteAcmeOrders( context.Background(), schema.PkiWriteAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17472,17 +15786,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.PkiWriteAcmeRevokeCert( context.Background(), schema.PkiWriteAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17532,19 +15840,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiWriteIssuer( context.Background(), issuerRef, schema.PkiWriteIssuerRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17596,12 +15898,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA @@ -17610,7 +15907,6 @@ func main() { issuerRef, kid, schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17664,12 +15960,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -17678,7 +15969,6 @@ func main() { authId, issuerRef, schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17732,12 +16022,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -17748,7 +16033,6 @@ func main() { challengeType, issuerRef, schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17804,19 +16088,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewAccount( context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17868,19 +16146,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewOrder( context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17932,12 +16204,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -17946,7 +16213,6 @@ func main() { issuerRef, orderId, schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18000,12 +16266,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18014,7 +16275,6 @@ func main() { issuerRef, orderId, schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18068,12 +16328,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18082,7 +16337,6 @@ func main() { issuerRef, orderId, schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18136,19 +16390,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrders( context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18200,19 +16448,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeRevokeCert( context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18264,12 +16506,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA @@ -18280,7 +16517,6 @@ func main() { kid, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18336,12 +16572,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -18352,7 +16583,6 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18408,12 +16638,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -18426,7 +16651,6 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18484,12 +16708,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -18498,7 +16717,6 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18552,12 +16770,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -18566,7 +16779,6 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18620,12 +16832,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18636,7 +16843,6 @@ func main() { orderId, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18692,12 +16898,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18708,7 +16909,6 @@ func main() { orderId, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18764,12 +16964,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18780,7 +16975,6 @@ func main() { orderId, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18836,12 +17030,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -18850,7 +17039,6 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18904,12 +17092,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -18918,7 +17101,6 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18972,19 +17154,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiWriteKey( context.Background(), keyRef, schema.PkiWriteKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19036,19 +17212,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiWriteRole( context.Background(), name, schema.PkiWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19100,12 +17270,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) kid := "kid_example" // string | The key identifier provided by the CA role := "role_example" // string | The desired role for the acme request @@ -19114,7 +17279,6 @@ func main() { kid, role, schema.PkiWriteRolesRoleAcmeAccountKidRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19168,12 +17332,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value role := "role_example" // string | The desired role for the acme request @@ -19182,7 +17341,6 @@ func main() { authId, role, schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19236,12 +17394,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -19252,7 +17405,6 @@ func main() { challengeType, role, schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19308,19 +17460,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewAccount( context.Background(), role, schema.PkiWriteRolesRoleAcmeNewAccountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19372,19 +17518,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewOrder( context.Background(), role, schema.PkiWriteRolesRoleAcmeNewOrderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19436,12 +17576,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -19450,7 +17585,6 @@ func main() { orderId, role, schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19504,12 +17638,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -19518,7 +17647,6 @@ func main() { orderId, role, schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19572,12 +17700,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -19586,7 +17709,6 @@ func main() { orderId, role, schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19640,19 +17762,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrders( context.Background(), role, schema.PkiWriteRolesRoleAcmeOrdersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19704,19 +17820,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeRevokeCert( context.Background(), role, schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19768,17 +17878,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.RabbitMqConfigureConnection( context.Background(), schema.RabbitMqConfigureConnectionRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -19828,17 +17932,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.RabbitMqConfigureLease( context.Background(), schema.RabbitMqConfigureLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -19887,18 +17985,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -19948,16 +18040,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.RabbitMqListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20006,16 +18092,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.RabbitMqReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20063,18 +18143,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20124,18 +18198,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqRequestCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20186,19 +18254,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqWriteRole( context.Background(), name, schema.RabbitMqWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20250,17 +18312,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshConfigureCa( context.Background(), schema.SshConfigureCaRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20310,17 +18366,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshConfigureZeroAddress( context.Background(), schema.SshConfigureZeroAddressRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20369,16 +18419,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshDeleteCaConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20426,18 +18470,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20487,16 +18525,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshDeleteZeroAddressConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20545,19 +18577,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | [Required] Name of the role resp, err := client.Secrets.SshGenerateCredentials( context.Background(), role, schema.SshGenerateCredentialsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20609,19 +18635,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshIssueCertificate( context.Background(), role, schema.SshIssueCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20672,16 +18692,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20731,17 +18745,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshListRolesByIp( context.Background(), schema.SshListRolesByIpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20790,16 +18798,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshReadCaConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20847,16 +18849,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshReadPublicKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20904,18 +18900,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -20965,16 +18955,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshReadZeroAddressConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21023,19 +19007,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshSignCertificate( context.Background(), role, schema.SshSignCertificateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21086,16 +19064,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshTidyDynamicHostKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21144,17 +19116,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.SshVerifyOtp( context.Background(), schema.SshVerifyOtpRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21204,19 +19170,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshWriteRole( context.Background(), role, schema.SshWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21268,17 +19228,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TerraformCloudConfigure( context.Background(), schema.TerraformCloudConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21327,16 +19281,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TerraformCloudDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21384,18 +19332,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21445,18 +19387,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21506,16 +19442,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TerraformCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21564,16 +19494,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TerraformCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21621,18 +19545,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21682,18 +19600,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the team or organization role resp, err := client.Secrets.TerraformCloudRotateRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21744,19 +19656,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudWriteRole( context.Background(), name, schema.TerraformCloudWriteRoleRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -21808,19 +19714,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpCreateKey( context.Background(), name, schema.TotpCreateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -21871,18 +19771,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpDeleteKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -21932,18 +19826,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpGenerateCode( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -21993,16 +19881,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TotpListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22051,18 +19933,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpReadKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22113,19 +19989,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpValidateCode( context.Background(), name, schema.TotpValidateCodeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22176,18 +20046,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitBackUpKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22237,12 +20101,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. @@ -22250,7 +20109,6 @@ func main() { context.Background(), destination, source, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22302,12 +20160,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. @@ -22317,7 +20170,6 @@ func main() { destination, source, version, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22372,17 +20224,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitConfigureCache( context.Background(), schema.TransitConfigureCacheRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22432,19 +20278,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitConfigureKey( context.Background(), name, schema.TransitConfigureKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22496,17 +20336,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitConfigureKeys( context.Background(), schema.TransitConfigureKeysRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22556,19 +20390,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitCreateKey( context.Background(), name, schema.TransitCreateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22620,19 +20448,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDecrypt( context.Background(), name, schema.TransitDecryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22683,18 +20505,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDeleteKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22745,19 +20561,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitEncrypt( context.Background(), name, schema.TransitEncryptRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22808,12 +20618,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) @@ -22821,7 +20626,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22873,12 +20677,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) @@ -22888,7 +20687,6 @@ func main() { name, type_, version, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22943,19 +20741,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitGenerateCsrForKey( context.Background(), name, schema.TransitGenerateCsrForKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23007,12 +20799,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The backend key used for encrypting the data key plaintext := "plaintext_example" // string | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. @@ -23021,7 +20808,6 @@ func main() { name, plaintext, schema.TransitGenerateDataKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23075,19 +20861,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The key to use for the HMAC function resp, err := client.Secrets.TransitGenerateHmac( context.Background(), name, schema.TransitGenerateHmacRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23139,12 +20919,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The key to use for the HMAC function urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) @@ -23153,7 +20928,6 @@ func main() { name, urlalgorithm, schema.TransitGenerateHmacWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23207,17 +20981,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitGenerateRandom( context.Background(), schema.TransitGenerateRandomRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23267,19 +21035,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.Secrets.TransitGenerateRandomWithBytes( context.Background(), urlbytes, schema.TransitGenerateRandomWithBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23331,19 +21093,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.Secrets.TransitGenerateRandomWithSource( context.Background(), source, schema.TransitGenerateRandomWithSourceRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23395,12 +21151,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) @@ -23409,7 +21160,6 @@ func main() { source, urlbytes, schema.TransitGenerateRandomWithSourceAndBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23463,17 +21213,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitHash( context.Background(), schema.TransitHashRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23523,19 +21267,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitHashWithAlgorithm( context.Background(), urlalgorithm, schema.TransitHashWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23587,19 +21325,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKey( context.Background(), name, schema.TransitImportKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23651,19 +21383,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKeyVersion( context.Background(), name, schema.TransitImportKeyVersionRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23714,16 +21440,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23772,16 +21492,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitReadCacheConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23829,18 +21543,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitReadKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23890,16 +21598,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitReadKeysConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23947,16 +21649,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitReadWrappingKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24005,19 +21701,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | If set, this will be the name of the restored key. resp, err := client.Secrets.TransitRestoreAndRenameKey( context.Background(), name, schema.TransitRestoreAndRenameKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24069,17 +21759,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.Secrets.TransitRestoreKey( context.Background(), schema.TransitRestoreKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24129,19 +21813,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRewrap( context.Background(), name, schema.TransitRewrapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24193,19 +21871,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRotateKey( context.Background(), name, schema.TransitRotateKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24257,19 +21929,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitSetCertificateForKey( context.Background(), name, schema.TransitSetCertificateForKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24321,19 +21987,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The key to use resp, err := client.Secrets.TransitSign( context.Background(), name, schema.TransitSignRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24385,12 +22045,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) @@ -24399,7 +22054,6 @@ func main() { name, urlalgorithm, schema.TransitSignWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24453,19 +22107,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitTrimKey( context.Background(), name, schema.TransitTrimKeyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24517,19 +22165,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The key to use resp, err := client.Secrets.TransitVerify( context.Background(), name, schema.TransitVerifyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24581,12 +22223,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) @@ -24595,7 +22232,6 @@ func main() { name, urlalgorithm, schema.TransitVerifyWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { diff --git a/docs/SystemApi.md b/docs/SystemApi.md index 1da4f270..967ce348 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -181,19 +181,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingCalculateHash( context.Background(), path, schema.AuditingCalculateHashRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -242,18 +236,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingDisableDevice( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -301,18 +289,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingDisableRequestHeader( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -361,19 +343,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingEnableDevice( context.Background(), path, schema.AuditingEnableDeviceRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -423,19 +399,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingEnableRequestHeader( context.Background(), header, schema.AuditingEnableRequestHeaderRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -484,16 +454,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.AuditingListEnabledDevices( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -534,16 +498,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.AuditingListRequestHeaders( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -584,18 +542,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingReadRequestHeaderInformation( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -643,18 +595,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthDisableMethod( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -707,19 +653,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthEnableMethod( context.Background(), path, schema.AuthEnableMethodRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -768,16 +708,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.AuthListEnabledMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -818,18 +752,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthReadConfiguration( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -879,18 +807,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthReadTuningInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -941,19 +863,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthTuneConfigurationParameters( context.Background(), path, schema.AuthTuneConfigurationParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1006,16 +922,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.CollectHostInformation( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1060,16 +970,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.CollectInFlightRequestInformation( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1111,17 +1015,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.CorsConfigure( context.Background(), schema.CorsConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1165,16 +1063,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.CorsDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1215,16 +1107,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.CorsReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1266,17 +1152,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Decode( context.Background(), schema.DecodeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1321,17 +1201,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.EncryptionKeyConfigureRotation( context.Background(), schema.EncryptionKeyConfigureRotationRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1375,16 +1249,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.EncryptionKeyReadRotationConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1425,16 +1293,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.EncryptionKeyRotate( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1475,16 +1337,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.EncryptionKeyStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1526,17 +1382,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.GenerateHash( context.Background(), schema.GenerateHashRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1581,19 +1431,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.System.GenerateHashWithAlgorithm( context.Background(), urlalgorithm, schema.GenerateHashWithAlgorithmRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1643,17 +1487,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.GenerateRandom( context.Background(), schema.GenerateRandomRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1698,19 +1536,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.System.GenerateRandomWithBytes( context.Background(), urlbytes, schema.GenerateRandomWithBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1760,19 +1592,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.System.GenerateRandomWithSource( context.Background(), source, schema.GenerateRandomWithSourceRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1822,12 +1648,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) @@ -1836,7 +1657,6 @@ func main() { source, urlbytes, schema.GenerateRandomWithSourceAndBytesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1887,16 +1707,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.HaStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1940,17 +1754,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Initialize( context.Background(), schema.InitializeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1995,17 +1803,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalClientActivityConfigure( context.Background(), schema.InternalClientActivityConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2049,16 +1851,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalClientActivityExport( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2099,16 +1895,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalClientActivityReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2149,16 +1939,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalClientActivityReportCounts( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2199,16 +1983,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalClientActivityReportCountsThisMonth( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2249,16 +2027,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalCountEntities( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2299,16 +2071,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalCountRequests( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2349,16 +2115,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalCountTokens( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2399,12 +2159,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) context := "context_example" // string | Context string appended to every operationId genericMountPaths := true // bool | Use generic mount paths (defaults to false) @@ -2412,7 +2167,6 @@ func main() { context.Background(), context, genericMountPaths, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2458,17 +2212,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalGenerateOpenApiDocumentWithParameters( context.Background(), schema.InternalGenerateOpenApiDocumentWithParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2512,18 +2260,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) tag := "tag_example" // string | Name of subtree being observed resp, err := client.System.InternalInspectRouter( context.Background(), tag, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2571,16 +2313,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalUiListEnabledFeatureFlags( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2621,16 +2357,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalUiListEnabledVisibleMounts( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2671,16 +2401,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalUiListNamespaces( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2721,18 +2445,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path of the mount. resp, err := client.System.InternalUiReadMountInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2780,16 +2498,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.InternalUiReadResultantAcl( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2830,16 +2542,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeaderStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2880,16 +2586,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeasesCount( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2934,18 +2634,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesForceRevokeLeaseWithPrefix( context.Background(), prefix, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2993,16 +2687,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeasesList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3043,18 +2731,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) prefix := "prefix_example" // string | The path to list leases under. Example: \"aws/creds/deploy\" resp, err := client.System.LeasesLookUp( context.Background(), prefix, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3104,17 +2786,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeasesReadLease( context.Background(), schema.LeasesReadLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3159,17 +2835,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeasesRenewLease( context.Background(), schema.LeasesRenewLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3214,19 +2884,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRenewLeaseWithId( context.Background(), urlLeaseId, schema.LeasesRenewLeaseWithIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3276,17 +2940,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeasesRevokeLease( context.Background(), schema.LeasesRevokeLeaseRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3331,19 +2989,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRevokeLeaseWithId( context.Background(), urlLeaseId, schema.LeasesRevokeLeaseWithIdRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3393,19 +3045,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesRevokeLeaseWithPrefix( context.Background(), prefix, schema.LeasesRevokeLeaseWithPrefixRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3454,16 +3100,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LeasesTidy( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3504,16 +3144,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.ListExperimentalFeatures( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3554,16 +3188,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LockedUsersList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3604,12 +3232,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) aliasIdentifier := "aliasIdentifier_example" // string | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID mountAccessor := "mountAccessor_example" // string | MountAccessor is the identifier of the mount entry to which the user belongs @@ -3617,7 +3240,6 @@ func main() { context.Background(), aliasIdentifier, mountAccessor, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3667,16 +3289,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LoggersReadVerbosityLevel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3717,18 +3333,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersReadVerbosityLevelFor( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3776,16 +3386,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LoggersRevertVerbosityLevel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3826,18 +3430,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersRevertVerbosityLevelFor( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3886,17 +3484,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.LoggersUpdateVerbosityLevel( context.Background(), schema.LoggersUpdateVerbosityLevelRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3941,19 +3533,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersUpdateVerbosityLevelFor( context.Background(), name, schema.LoggersUpdateVerbosityLevelForRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4002,18 +3588,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) format := "format_example" // string | Format to export metrics into. Currently accepts only \"prometheus\". resp, err := client.System.Metrics( context.Background(), format, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4058,17 +3638,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.MfaValidate( context.Background(), schema.MfaValidateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4112,12 +3686,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) logFormat := "logFormat_example" // string | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". (defaults to "standard") logLevel := "logLevel_example" // string | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". @@ -4125,7 +3694,6 @@ func main() { context.Background(), logFormat, logLevel, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4170,18 +3738,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsDisableSecretsEngine( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4230,19 +3792,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsEnableSecretsEngine( context.Background(), path, schema.MountsEnableSecretsEngineRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4291,16 +3847,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.MountsListSecretsEngines( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4341,18 +3891,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadConfiguration( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4400,18 +3944,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadTuningInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4460,19 +3998,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsTuneConfigurationParameters( context.Background(), path, schema.MountsTuneConfigurationParametersRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4521,16 +4053,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PluginsCatalogListPlugins( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4571,18 +4097,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogListPluginsWithType( context.Background(), type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4631,18 +4151,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogReadPluginConfiguration( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4690,12 +4204,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4703,7 +4212,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4754,19 +4262,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRegisterPlugin( context.Background(), name, schema.PluginsCatalogRegisterPluginRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4816,12 +4318,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4830,7 +4327,6 @@ func main() { name, type_, schema.PluginsCatalogRegisterPluginWithTypeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4881,18 +4377,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRemovePlugin( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4940,12 +4430,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4953,7 +4438,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5006,17 +4490,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PluginsReloadBackends( context.Background(), schema.PluginsReloadBackendsRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5060,16 +4538,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PluginsRuntimesCatalogListPluginsRuntimes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5113,12 +4585,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -5126,7 +4593,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5177,12 +4643,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -5191,7 +4652,6 @@ func main() { name, type_, schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5242,12 +4702,7 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -5255,7 +4710,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5305,18 +4759,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesDeleteAclPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5364,18 +4812,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesDeletePasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5423,18 +4865,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesGeneratePasswordFromPasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5482,16 +4918,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PoliciesListAclPolicies( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5535,16 +4965,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PoliciesListPasswordPolicies( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5588,18 +5012,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesReadAclPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5647,18 +5065,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesReadPasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5707,19 +5119,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesWriteAclPolicy( context.Background(), name, schema.PoliciesWriteAclPolicyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5769,19 +5175,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesWritePasswordPolicy( context.Background(), name, schema.PoliciesWritePasswordPolicyRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5832,16 +5232,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofBlocking( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5884,16 +5278,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofCommandLine( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5936,16 +5324,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofCpuProfile( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5988,16 +5370,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofExecutionTrace( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6040,16 +5416,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofGoroutines( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6094,16 +5464,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofIndex( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6146,16 +5510,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofMemoryAllocations( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6198,16 +5556,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofMemoryAllocationsLive( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6250,16 +5602,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofMutexes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6302,16 +5648,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofSymbols( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6354,16 +5694,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.PprofThreadCreations( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6405,17 +5739,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.QueryTokenAccessorCapabilities( context.Background(), schema.QueryTokenAccessorCapabilitiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6460,17 +5788,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.QueryTokenCapabilities( context.Background(), schema.QueryTokenCapabilitiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6515,17 +5837,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.QueryTokenSelfCapabilities( context.Background(), schema.QueryTokenSelfCapabilitiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6570,17 +5886,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RateLimitQuotasConfigure( context.Background(), schema.RateLimitQuotasConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6624,18 +5934,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasDelete( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6683,16 +5987,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RateLimitQuotasList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6736,18 +6034,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasRead( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6795,16 +6087,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RateLimitQuotasReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6846,19 +6132,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasWrite( context.Background(), name, schema.RateLimitQuotasWriteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6907,18 +6187,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | resp, err := client.System.RawDelete( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6966,18 +6240,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | resp, err := client.System.RawList( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7026,18 +6294,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | resp, err := client.System.RawRead( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7086,19 +6348,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) path := "path_example" // string | resp, err := client.System.RawWrite( context.Background(), path, schema.RawWriteRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7147,16 +6403,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.ReadHealthStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7197,16 +6447,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.ReadInitializationStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7247,16 +6491,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.ReadReplicationStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7299,16 +6537,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.ReadSanitizedConfigurationState( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7350,17 +6582,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.ReadWrappingProperties( context.Background(), schema.ReadWrappingPropertiesRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7406,16 +6632,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyAttemptCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7459,17 +6679,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyAttemptInitialize( context.Background(), schema.RekeyAttemptInitializeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7513,16 +6727,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyAttemptReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7564,17 +6772,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyAttemptUpdate( context.Background(), schema.RekeyAttemptUpdateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7618,16 +6820,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyDeleteBackupKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7668,16 +6864,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyDeleteBackupRecoveryKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7718,16 +6908,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyReadBackupKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7768,16 +6952,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyReadBackupRecoveryKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7820,16 +6998,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyVerificationCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7870,16 +7042,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyVerificationReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7921,17 +7087,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RekeyVerificationUpdate( context.Background(), schema.RekeyVerificationUpdateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7975,18 +7135,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) subsystem := "subsystem_example" // string | resp, err := client.System.ReloadSubsystem( context.Background(), subsystem, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8035,17 +7189,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Remount( context.Background(), schema.RemountRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8089,18 +7237,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) migrationId := "migrationId_example" // string | The ID of the migration operation resp, err := client.System.RemountStatus( context.Background(), migrationId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8149,17 +7291,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Rewrap( context.Background(), schema.RewrapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8203,16 +7339,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RootTokenGenerationCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8256,17 +7386,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RootTokenGenerationInitialize( context.Background(), schema.RootTokenGenerationInitializeRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8310,16 +7434,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RootTokenGenerationReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8363,17 +7481,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.RootTokenGenerationUpdate( context.Background(), schema.RootTokenGenerationUpdateRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8417,16 +7529,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Seal( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8467,16 +7573,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.SealStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8519,16 +7619,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.StepDownLeader( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8570,19 +7664,13 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersConfigure( context.Background(), header, schema.UiHeadersConfigureRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8631,18 +7719,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersDeleteConfiguration( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8690,16 +7772,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.UiHeadersList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8743,18 +7819,12 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersReadConfiguration( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8803,17 +7873,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Unseal( context.Background(), schema.UnsealRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8858,17 +7922,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Unwrap( context.Background(), schema.UnwrapRequest{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8912,16 +7970,10 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.VersionHistory( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8965,17 +8017,11 @@ import ( ) func main() { - client, err := vault.New( - vault.WithAddress("http://127.0.0.1:8200"), - ) - if err != nil { - log.Fatal(err) - } + client := // a suitably configured *vault.Client (see top-level README.md) resp, err := client.System.Wrap( context.Background(), map[string]interface{}{ /* populate request parameters */ }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) From fd708c0cf893329c5934c2b7d948651ebb0821a3 Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 15:11:25 -0400 Subject: [PATCH 3/7] comment out the auth instead --- docs/AuthApi.md | 2868 +++++++++++++-- docs/IdentityApi.md | 1246 ++++++- docs/SecretsApi.md | 4660 ++++++++++++++++++++++--- docs/SystemApi.md | 1800 ++++++++-- generate/templates/api_doc.handlebars | 13 +- 5 files changed, 9298 insertions(+), 1289 deletions(-) diff --git a/docs/AuthApi.md b/docs/AuthApi.md index ae665ad8..ffcf0c1f 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -267,12 +267,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudDeleteAuthRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -322,10 +330,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AliCloudListAuthRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -375,11 +391,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AliCloudLogin( context.Background(), - schema.AliCloudLoginRequest{ /* populate request parameters */ }, + schema.AliCloudLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -428,12 +454,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudReadAuthRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -484,13 +518,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudWriteAuthRole( context.Background(), role, - schema.AliCloudWriteAuthRoleRequest{ /* populate request parameters */ }, + schema.AliCloudWriteAuthRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -541,12 +585,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBindSecretId( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -596,12 +648,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBoundCidrList( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -651,12 +711,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePeriod( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -706,12 +774,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePolicies( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -761,12 +837,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteRole( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -816,12 +900,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdBoundCidrs( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -871,12 +963,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdNumUses( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -926,12 +1026,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdTtl( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -981,12 +1089,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenBoundCidrs( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1036,12 +1152,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenMaxTtl( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1091,12 +1215,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenNumUses( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1146,12 +1278,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenTtl( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1202,13 +1342,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretId( context.Background(), roleName, - schema.AppRoleDestroySecretIdRequest{ /* populate request parameters */ }, + schema.AppRoleDestroySecretIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1260,13 +1410,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretIdByAccessor( context.Background(), roleName, - schema.AppRoleDestroySecretIdByAccessorRequest{ /* populate request parameters */ }, + schema.AppRoleDestroySecretIdByAccessorRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1317,10 +1477,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AppRoleListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1369,12 +1537,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleListSecretIds( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1426,11 +1602,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AppRoleLogin( context.Background(), - schema.AppRoleLoginRequest{ /* populate request parameters */ }, + schema.AppRoleLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1480,13 +1666,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretId( context.Background(), roleName, - schema.AppRoleLookUpSecretIdRequest{ /* populate request parameters */ }, + schema.AppRoleLookUpSecretIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1538,13 +1734,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretIdByAccessor( context.Background(), roleName, - schema.AppRoleLookUpSecretIdByAccessorRequest{ /* populate request parameters */ }, + schema.AppRoleLookUpSecretIdByAccessorRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1595,12 +1801,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBindSecretId( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1650,12 +1864,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBoundCidrList( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1705,12 +1927,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadLocalSecretIds( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1760,12 +1990,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPeriod( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1815,12 +2053,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPolicies( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1870,12 +2116,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRole( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1925,12 +2179,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRoleId( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1980,12 +2242,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdBoundCidrs( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2035,12 +2305,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdNumUses( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2090,12 +2368,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdTtl( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2145,12 +2431,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenBoundCidrs( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2200,12 +2494,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenMaxTtl( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2255,12 +2557,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenNumUses( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2310,12 +2620,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenTtl( context.Background(), roleName, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2365,10 +2683,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AppRoleTidySecretId( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2417,13 +2743,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBindSecretId( context.Background(), roleName, - schema.AppRoleWriteBindSecretIdRequest{ /* populate request parameters */ }, + schema.AppRoleWriteBindSecretIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2475,13 +2811,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBoundCidrList( context.Background(), roleName, - schema.AppRoleWriteBoundCidrListRequest{ /* populate request parameters */ }, + schema.AppRoleWriteBoundCidrListRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2533,13 +2879,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteCustomSecretId( context.Background(), roleName, - schema.AppRoleWriteCustomSecretIdRequest{ /* populate request parameters */ }, + schema.AppRoleWriteCustomSecretIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2591,13 +2947,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePeriod( context.Background(), roleName, - schema.AppRoleWritePeriodRequest{ /* populate request parameters */ }, + schema.AppRoleWritePeriodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2649,13 +3015,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePolicies( context.Background(), roleName, - schema.AppRoleWritePoliciesRequest{ /* populate request parameters */ }, + schema.AppRoleWritePoliciesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2707,13 +3083,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRole( context.Background(), roleName, - schema.AppRoleWriteRoleRequest{ /* populate request parameters */ }, + schema.AppRoleWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2765,13 +3151,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRoleId( context.Background(), roleName, - schema.AppRoleWriteRoleIdRequest{ /* populate request parameters */ }, + schema.AppRoleWriteRoleIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2823,13 +3219,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretId( context.Background(), roleName, - schema.AppRoleWriteSecretIdRequest{ /* populate request parameters */ }, + schema.AppRoleWriteSecretIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2881,13 +3287,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdBoundCidrs( context.Background(), roleName, - schema.AppRoleWriteSecretIdBoundCidrsRequest{ /* populate request parameters */ }, + schema.AppRoleWriteSecretIdBoundCidrsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2939,13 +3355,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdNumUses( context.Background(), roleName, - schema.AppRoleWriteSecretIdNumUsesRequest{ /* populate request parameters */ }, + schema.AppRoleWriteSecretIdNumUsesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2997,13 +3423,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdTtl( context.Background(), roleName, - schema.AppRoleWriteSecretIdTtlRequest{ /* populate request parameters */ }, + schema.AppRoleWriteSecretIdTtlRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3055,13 +3491,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenBoundCidrs( context.Background(), roleName, - schema.AppRoleWriteTokenBoundCidrsRequest{ /* populate request parameters */ }, + schema.AppRoleWriteTokenBoundCidrsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3113,13 +3559,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) - + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) + roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenMaxTtl( context.Background(), roleName, - schema.AppRoleWriteTokenMaxTtlRequest{ /* populate request parameters */ }, + schema.AppRoleWriteTokenMaxTtlRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3171,13 +3627,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenNumUses( context.Background(), roleName, - schema.AppRoleWriteTokenNumUsesRequest{ /* populate request parameters */ }, + schema.AppRoleWriteTokenNumUsesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3229,13 +3695,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenTtl( context.Background(), roleName, - schema.AppRoleWriteTokenTtlRequest{ /* populate request parameters */ }, + schema.AppRoleWriteTokenTtlRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3287,13 +3763,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsConfigureCertificate( context.Background(), certName, - schema.AwsConfigureCertificateRequest{ /* populate request parameters */ }, + schema.AwsConfigureCertificateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3345,11 +3831,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureClient( context.Background(), - schema.AwsConfigureClientRequest{ /* populate request parameters */ }, + schema.AwsConfigureClientRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3399,11 +3895,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureIdentityAccessListTidyOperation( context.Background(), - schema.AwsConfigureIdentityAccessListTidyOperationRequest{ /* populate request parameters */ }, + schema.AwsConfigureIdentityAccessListTidyOperationRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3453,11 +3959,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureIdentityIntegration( context.Background(), - schema.AwsConfigureIdentityIntegrationRequest{ /* populate request parameters */ }, + schema.AwsConfigureIdentityIntegrationRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3507,11 +4023,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureIdentityWhitelistTidyOperation( context.Background(), - schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ /* populate request parameters */ }, + schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3561,11 +4087,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureRoleTagBlacklistTidyOperation( context.Background(), - schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ /* populate request parameters */ }, + schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3615,11 +4151,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureRoleTagDenyListTidyOperation( context.Background(), - schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ /* populate request parameters */ }, + schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3668,12 +4214,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsDeleteAuthRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3723,12 +4277,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsDeleteCertificateConfiguration( context.Background(), certName, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3778,10 +4340,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteClientConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3829,12 +4399,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityAccessList( context.Background(), instanceId, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3884,10 +4462,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteIdentityAccessListTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3935,12 +4521,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityWhitelist( context.Background(), instanceId, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3990,10 +4584,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteIdentityWhitelistTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4041,12 +4643,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagBlacklist( context.Background(), roleTag, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4096,10 +4706,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteRoleTagBlacklistTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4147,12 +4765,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagDenyList( context.Background(), roleTag, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4202,10 +4828,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteRoleTagDenyListTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4253,12 +4887,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsDeleteStsRole( context.Background(), accountId, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4308,10 +4950,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListAuthRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4360,10 +5010,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListCertificateConfigurations( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4412,10 +5070,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListIdentityAccessList( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4464,10 +5130,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListIdentityWhitelist( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4516,10 +5190,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListRoleTagBlacklists( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4568,10 +5250,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListRoleTagDenyLists( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4620,10 +5310,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListStsRoleRelationships( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4673,11 +5371,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsLogin( context.Background(), - schema.AwsLoginRequest{ /* populate request parameters */ }, + schema.AwsLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4726,12 +5434,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsReadAuthRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4781,12 +5497,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsReadCertificateConfiguration( context.Background(), certName, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4836,10 +5560,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadClientConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4887,12 +5619,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityAccessList( context.Background(), instanceId, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4942,10 +5682,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadIdentityAccessListTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4993,10 +5741,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadIdentityIntegrationConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5044,12 +5800,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityWhitelist( context.Background(), instanceId, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5099,10 +5863,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadIdentityWhitelistTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5150,12 +5922,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagBlacklist( context.Background(), roleTag, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5205,10 +5985,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadRoleTagBlacklistTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5256,12 +6044,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagDenyList( context.Background(), roleTag, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5311,10 +6107,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadRoleTagDenyListTidySettings( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5362,12 +6166,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsReadStsRole( context.Background(), accountId, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5417,10 +6229,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsRotateRootCredentials( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5469,11 +6289,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyIdentityAccessList( context.Background(), - schema.AwsTidyIdentityAccessListRequest{ /* populate request parameters */ }, + schema.AwsTidyIdentityAccessListRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5523,11 +6353,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyIdentityWhitelist( context.Background(), - schema.AwsTidyIdentityWhitelistRequest{ /* populate request parameters */ }, + schema.AwsTidyIdentityWhitelistRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5577,11 +6417,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyRoleTagBlacklist( context.Background(), - schema.AwsTidyRoleTagBlacklistRequest{ /* populate request parameters */ }, + schema.AwsTidyRoleTagBlacklistRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5631,11 +6481,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyRoleTagDenyList( context.Background(), - schema.AwsTidyRoleTagDenyListRequest{ /* populate request parameters */ }, + schema.AwsTidyRoleTagDenyListRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5685,13 +6545,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteAuthRole( context.Background(), role, - schema.AwsWriteAuthRoleRequest{ /* populate request parameters */ }, + schema.AwsWriteAuthRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5743,13 +6613,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteRoleTag( context.Background(), role, - schema.AwsWriteRoleTagRequest{ /* populate request parameters */ }, + schema.AwsWriteRoleTagRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5800,12 +6680,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagBlacklist( context.Background(), roleTag, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5855,12 +6743,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagDenyList( context.Background(), roleTag, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5911,13 +6807,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsWriteStsRole( context.Background(), accountId, - schema.AwsWriteStsRoleRequest{ /* populate request parameters */ }, + schema.AwsWriteStsRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5969,11 +6875,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureConfigureAuth( context.Background(), - schema.AzureConfigureAuthRequest{ /* populate request parameters */ }, + schema.AzureConfigureAuthRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6022,10 +6938,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureDeleteAuthConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6073,12 +6997,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureDeleteAuthRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6128,10 +7060,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureListAuthRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6181,11 +7121,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureLogin( context.Background(), - schema.AzureLoginRequest{ /* populate request parameters */ }, + schema.AzureLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6234,10 +7184,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureReadAuthConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6285,12 +7243,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureReadAuthRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6340,10 +7306,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureRotateRootCredentials( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6392,13 +7366,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureWriteAuthRole( context.Background(), name, - schema.AzureWriteAuthRoleRequest{ /* populate request parameters */ }, + schema.AzureWriteAuthRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6450,11 +7434,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CentrifyConfigure( context.Background(), - schema.CentrifyConfigureRequest{ /* populate request parameters */ }, + schema.CentrifyConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -6504,11 +7498,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CentrifyLogin( context.Background(), - schema.CentrifyLoginRequest{ /* populate request parameters */ }, + schema.CentrifyLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -6557,10 +7561,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CentrifyReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -6609,11 +7621,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertConfigure( context.Background(), - schema.CertConfigureRequest{ /* populate request parameters */ }, + schema.CertConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6662,12 +7684,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCertificate( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6717,12 +7747,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCrl( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6772,10 +7810,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertListCertificates( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6824,10 +7870,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertListCrls( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6877,11 +7931,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertLogin( context.Background(), - schema.CertLoginRequest{ /* populate request parameters */ }, + schema.CertLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6930,12 +7994,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCertificate( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -6985,10 +8057,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7036,12 +8116,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCrl( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7092,13 +8180,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCertificate( context.Background(), name, - schema.CertWriteCertificateRequest{ /* populate request parameters */ }, + schema.CertWriteCertificateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7150,13 +8248,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCrl( context.Background(), name, - schema.CertWriteCrlRequest{ /* populate request parameters */ }, + schema.CertWriteCrlRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7208,11 +8316,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryConfigure( context.Background(), - schema.CloudFoundryConfigureRequest{ /* populate request parameters */ }, + schema.CloudFoundryConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7261,10 +8379,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7312,12 +8438,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryDeleteRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7367,10 +8501,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7420,11 +8562,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryLogin( context.Background(), - schema.CloudFoundryLoginRequest{ /* populate request parameters */ }, + schema.CloudFoundryLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7473,10 +8625,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7524,12 +8684,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryReadRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7580,13 +8748,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryWriteRole( context.Background(), role, - schema.CloudFoundryWriteRoleRequest{ /* populate request parameters */ }, + schema.CloudFoundryWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -7638,11 +8816,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubConfigure( context.Background(), - schema.GithubConfigureRequest{ /* populate request parameters */ }, + schema.GithubConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -7691,12 +8879,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubDeleteTeamMapping( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -7746,12 +8942,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubDeleteUserMapping( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -7801,10 +9005,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubListTeams( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -7853,10 +9065,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubListUsers( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -7906,11 +9126,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubLogin( context.Background(), - schema.GithubLoginRequest{ /* populate request parameters */ }, + schema.GithubLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -7959,10 +9189,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8010,12 +9248,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubReadTeamMapping( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8065,12 +9311,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubReadUserMapping( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8121,13 +9375,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubWriteTeamMapping( context.Background(), key, - schema.GithubWriteTeamMappingRequest{ /* populate request parameters */ }, + schema.GithubWriteTeamMappingRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8179,13 +9443,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubWriteUserMapping( context.Background(), key, - schema.GithubWriteUserMappingRequest{ /* populate request parameters */ }, + schema.GithubWriteUserMappingRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8237,11 +9511,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudConfigureAuth( context.Background(), - schema.GoogleCloudConfigureAuthRequest{ /* populate request parameters */ }, + schema.GoogleCloudConfigureAuthRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8290,12 +9574,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8346,13 +9638,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditLabelsForRole( context.Background(), name, - schema.GoogleCloudEditLabelsForRoleRequest{ /* populate request parameters */ }, + schema.GoogleCloudEditLabelsForRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8404,13 +9706,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditServiceAccountsForRole( context.Background(), name, - schema.GoogleCloudEditServiceAccountsForRoleRequest{ /* populate request parameters */ }, + schema.GoogleCloudEditServiceAccountsForRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8461,10 +9773,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8514,11 +9834,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudLogin( context.Background(), - schema.GoogleCloudLoginRequest{ /* populate request parameters */ }, + schema.GoogleCloudLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8567,10 +9897,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudReadAuthConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8618,12 +9956,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) - + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) + name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8674,13 +10020,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudWriteRole( context.Background(), name, - schema.GoogleCloudWriteRoleRequest{ /* populate request parameters */ }, + schema.GoogleCloudWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -8737,11 +10093,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtConfigure( context.Background(), - schema.JwtConfigureRequest{ /* populate request parameters */ }, + schema.JwtConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -8790,12 +10156,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -8847,10 +10221,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -8900,11 +10282,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtLogin( context.Background(), - schema.JwtLoginRequest{ /* populate request parameters */ }, + schema.JwtLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -8953,7 +10345,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) clientNonce := "clientNonce_example" // string | code := "code_example" // string | @@ -8963,6 +10362,7 @@ func main() { clientNonce, code, state, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9014,11 +10414,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtOidcCallbackFormPost( context.Background(), - schema.JwtOidcCallbackFormPostRequest{ /* populate request parameters */ }, + schema.JwtOidcCallbackFormPostRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9068,11 +10478,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtOidcRequestAuthorizationUrl( context.Background(), - schema.JwtOidcRequestAuthorizationUrlRequest{ /* populate request parameters */ }, + schema.JwtOidcRequestAuthorizationUrlRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9121,10 +10541,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9172,12 +10600,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9233,13 +10669,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtWriteRole( context.Background(), name, - schema.JwtWriteRoleRequest{ /* populate request parameters */ }, + schema.JwtWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -9291,11 +10737,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosConfigure( context.Background(), - schema.KerberosConfigureRequest{ /* populate request parameters */ }, + schema.KerberosConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9345,11 +10801,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosConfigureLdap( context.Background(), - schema.KerberosConfigureLdapRequest{ /* populate request parameters */ }, + schema.KerberosConfigureLdapRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9398,12 +10864,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosDeleteGroup( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9453,10 +10927,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosListGroups( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9506,11 +10988,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosLogin( context.Background(), - schema.KerberosLoginRequest{ /* populate request parameters */ }, + schema.KerberosLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9559,10 +11051,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9610,12 +11110,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosReadGroup( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9665,10 +11173,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosReadLdapConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9717,13 +11233,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosWriteGroup( context.Background(), name, - schema.KerberosWriteGroupRequest{ /* populate request parameters */ }, + schema.KerberosWriteGroupRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -9775,11 +11301,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesConfigureAuth( context.Background(), - schema.KubernetesConfigureAuthRequest{ /* populate request parameters */ }, + schema.KubernetesConfigureAuthRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -9828,12 +11364,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesDeleteAuthRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -9883,10 +11427,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesListAuthRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -9936,11 +11488,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesLogin( context.Background(), - schema.KubernetesLoginRequest{ /* populate request parameters */ }, + schema.KubernetesLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -9989,10 +11551,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesReadAuthConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10040,12 +11610,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesReadAuthRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10096,13 +11674,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesWriteAuthRole( context.Background(), name, - schema.KubernetesWriteAuthRoleRequest{ /* populate request parameters */ }, + schema.KubernetesWriteAuthRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -10154,11 +11742,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapConfigureAuth( context.Background(), - schema.LdapConfigureAuthRequest{ /* populate request parameters */ }, + schema.LdapConfigureAuthRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10207,12 +11805,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapDeleteGroup( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10262,12 +11868,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapDeleteUser( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10317,10 +11931,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapListGroups( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10369,10 +11991,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapListUsers( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10422,13 +12052,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | DN (distinguished name) to be used for login. resp, err := client.Auth.LdapLogin( context.Background(), username, - schema.LdapLoginRequest{ /* populate request parameters */ }, + schema.LdapLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10479,10 +12119,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapReadAuthConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10530,12 +12178,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapReadGroup( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10585,12 +12241,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapReadUser( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10641,13 +12305,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapWriteGroup( context.Background(), name, - schema.LdapWriteGroupRequest{ /* populate request parameters */ }, + schema.LdapWriteGroupRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10699,13 +12373,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapWriteUser( context.Background(), name, - schema.LdapWriteUserRequest{ /* populate request parameters */ }, + schema.LdapWriteUserRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10757,11 +12441,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciConfigure( context.Background(), - schema.OciConfigureRequest{ /* populate request parameters */ }, + schema.OciConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -10810,10 +12504,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -10861,12 +12563,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciDeleteRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -10916,10 +12626,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -10969,13 +12687,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciLogin( context.Background(), role, - schema.OciLoginRequest{ /* populate request parameters */ }, + schema.OciLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -11026,10 +12754,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -11077,12 +12813,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciReadRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -11133,13 +12877,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciWriteRole( context.Background(), role, - schema.OciWriteRoleRequest{ /* populate request parameters */ }, + schema.OciWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -11191,11 +12945,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaConfigure( context.Background(), - schema.OktaConfigureRequest{ /* populate request parameters */ }, + schema.OktaConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11244,12 +13008,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaDeleteGroup( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11299,12 +13071,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaDeleteUser( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11354,10 +13134,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaListGroups( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11406,10 +13194,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaListUsers( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11459,13 +13255,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username to be used for login. resp, err := client.Auth.OktaLogin( context.Background(), username, - schema.OktaLoginRequest{ /* populate request parameters */ }, + schema.OktaLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11516,10 +13322,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11567,12 +13381,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaReadGroup( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11622,12 +13444,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaReadUser( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11677,12 +13507,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) nonce := "nonce_example" // string | Nonce provided during a login request to retrieve the number verification challenge for the matching request. resp, err := client.Auth.OktaVerify( context.Background(), nonce, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11733,13 +13571,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaWriteGroup( context.Background(), name, - schema.OktaWriteGroupRequest{ /* populate request parameters */ }, + schema.OktaWriteGroupRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11791,13 +13639,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaWriteUser( context.Background(), name, - schema.OktaWriteUserRequest{ /* populate request parameters */ }, + schema.OktaWriteUserRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -11849,11 +13707,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusConfigure( context.Background(), - schema.RadiusConfigureRequest{ /* populate request parameters */ }, + schema.RadiusConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -11902,12 +13770,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusDeleteUser( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -11957,10 +13833,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusListUsers( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -12010,11 +13894,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusLogin( context.Background(), - schema.RadiusLoginRequest{ /* populate request parameters */ }, + schema.RadiusLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -12064,13 +13958,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlusername := "urlusername_example" // string | Username to be used for login. (URL parameter) resp, err := client.Auth.RadiusLoginWithUsername( context.Background(), urlusername, - schema.RadiusLoginWithUsernameRequest{ /* populate request parameters */ }, + schema.RadiusLoginWithUsernameRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -12121,10 +14025,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -12172,12 +14084,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusReadUser( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -12228,13 +14148,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusWriteUser( context.Background(), name, - schema.RadiusWriteUserRequest{ /* populate request parameters */ }, + schema.RadiusWriteUserRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -12286,11 +14216,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenCreate( context.Background(), - schema.TokenCreateRequest{ /* populate request parameters */ }, + schema.TokenCreateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12335,13 +14275,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenCreateAgainstRole( context.Background(), roleName, - schema.TokenCreateAgainstRoleRequest{ /* populate request parameters */ }, + schema.TokenCreateAgainstRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12391,11 +14341,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenCreateOrphan( context.Background(), - schema.TokenCreateOrphanRequest{ /* populate request parameters */ }, + schema.TokenCreateOrphanRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12439,12 +14399,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenDeleteRole( context.Background(), roleName, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12492,10 +14460,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenListAccessors( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12539,10 +14515,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenListRoles( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12587,11 +14571,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenLookUp( context.Background(), - schema.TokenLookUpRequest{ /* populate request parameters */ }, + schema.TokenLookUpRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12636,11 +14630,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenLookUpAccessor( context.Background(), - schema.TokenLookUpAccessorRequest{ /* populate request parameters */ }, + schema.TokenLookUpAccessorRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12684,10 +14688,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenLookUpSelf( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12728,12 +14740,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenReadRole( context.Background(), roleName, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12782,11 +14802,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRenew( context.Background(), - schema.TokenRenewRequest{ /* populate request parameters */ }, + schema.TokenRenewRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12831,11 +14861,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRenewAccessor( context.Background(), - schema.TokenRenewAccessorRequest{ /* populate request parameters */ }, + schema.TokenRenewAccessorRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12880,11 +14920,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRenewSelf( context.Background(), - schema.TokenRenewSelfRequest{ /* populate request parameters */ }, + schema.TokenRenewSelfRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12929,11 +14979,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevoke( context.Background(), - schema.TokenRevokeRequest{ /* populate request parameters */ }, + schema.TokenRevokeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -12978,11 +15038,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevokeAccessor( context.Background(), - schema.TokenRevokeAccessorRequest{ /* populate request parameters */ }, + schema.TokenRevokeAccessorRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13027,11 +15097,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevokeOrphan( context.Background(), - schema.TokenRevokeOrphanRequest{ /* populate request parameters */ }, + schema.TokenRevokeOrphanRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13075,10 +15155,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevokeSelf( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13119,10 +15207,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenTidy( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13164,13 +15260,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenWriteRole( context.Background(), roleName, - schema.TokenWriteRoleRequest{ /* populate request parameters */ }, + schema.TokenWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -13219,12 +15325,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassDeleteUser( context.Background(), username, + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -13274,10 +15388,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.UserpassListUsers( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -13327,13 +15449,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username of the user. resp, err := client.Auth.UserpassLogin( context.Background(), username, - schema.UserpassLoginRequest{ /* populate request parameters */ }, + schema.UserpassLoginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -13384,12 +15516,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassReadUser( context.Background(), username, + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -13440,13 +15580,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassResetPassword( context.Background(), username, - schema.UserpassResetPasswordRequest{ /* populate request parameters */ }, + schema.UserpassResetPasswordRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -13498,13 +15648,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassUpdatePolicies( context.Background(), username, - schema.UserpassUpdatePoliciesRequest{ /* populate request parameters */ }, + schema.UserpassUpdatePoliciesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -13556,13 +15716,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassWriteUser( context.Background(), username, - schema.UserpassWriteUserRequest{ /* populate request parameters */ }, + schema.UserpassWriteUserRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index 25359f17..4c508f23 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -130,11 +130,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.AliasCreate( context.Background(), - schema.AliasCreateRequest{ /* populate request parameters */ }, + schema.AliasCreateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -178,12 +188,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasDeleteById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -231,10 +249,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.AliasListById( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -278,12 +304,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasReadById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -332,13 +366,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasUpdateById( context.Background(), id, - schema.AliasUpdateByIdRequest{ /* populate request parameters */ }, + schema.AliasUpdateByIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -388,11 +432,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityBatchDelete( context.Background(), - schema.EntityBatchDeleteRequest{ /* populate request parameters */ }, + schema.EntityBatchDeleteRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -437,11 +491,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityCreate( context.Background(), - schema.EntityCreateRequest{ /* populate request parameters */ }, + schema.EntityCreateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -486,11 +550,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityCreateAlias( context.Background(), - schema.EntityCreateAliasRequest{ /* populate request parameters */ }, + schema.EntityCreateAliasRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -534,12 +608,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityDeleteAliasById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -587,12 +669,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityDeleteById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -640,12 +730,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityDeleteByName( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -693,10 +791,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityListAliasesById( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -740,10 +846,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityListById( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -787,10 +901,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityListByName( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -835,11 +957,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityLookUp( context.Background(), - schema.EntityLookUpRequest{ /* populate request parameters */ }, + schema.EntityLookUpRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -884,11 +1016,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityMerge( context.Background(), - schema.EntityMergeRequest{ /* populate request parameters */ }, + schema.EntityMergeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -932,12 +1074,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityReadAliasById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -985,12 +1135,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityReadById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1038,12 +1196,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityReadByName( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1092,13 +1258,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityUpdateAliasById( context.Background(), id, - schema.EntityUpdateAliasByIdRequest{ /* populate request parameters */ }, + schema.EntityUpdateAliasByIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1148,13 +1324,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityUpdateById( context.Background(), id, - schema.EntityUpdateByIdRequest{ /* populate request parameters */ }, + schema.EntityUpdateByIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1204,13 +1390,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityUpdateByName( context.Background(), name, - schema.EntityUpdateByNameRequest{ /* populate request parameters */ }, + schema.EntityUpdateByNameRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1260,11 +1456,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupCreate( context.Background(), - schema.GroupCreateRequest{ /* populate request parameters */ }, + schema.GroupCreateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1309,11 +1515,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupCreateAlias( context.Background(), - schema.GroupCreateAliasRequest{ /* populate request parameters */ }, + schema.GroupCreateAliasRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1357,12 +1573,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupDeleteAliasById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1410,12 +1634,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupDeleteById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1463,12 +1695,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupDeleteByName( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1516,10 +1756,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupListAliasesById( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1563,10 +1811,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupListById( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1610,10 +1866,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupListByName( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1658,11 +1922,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupLookUp( context.Background(), - schema.GroupLookUpRequest{ /* populate request parameters */ }, + schema.GroupLookUpRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1706,12 +1980,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupReadAliasById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1759,12 +2041,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupReadById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1812,12 +2102,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupReadByName( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1866,13 +2164,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupUpdateAliasById( context.Background(), id, - schema.GroupUpdateAliasByIdRequest{ /* populate request parameters */ }, + schema.GroupUpdateAliasByIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1922,13 +2230,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupUpdateById( context.Background(), id, - schema.GroupUpdateByIdRequest{ /* populate request parameters */ }, + schema.GroupUpdateByIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1978,13 +2296,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupUpdateByName( context.Background(), name, - schema.GroupUpdateByNameRequest{ /* populate request parameters */ }, + schema.GroupUpdateByNameRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2034,11 +2362,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaAdminDestroyTotpSecret( context.Background(), - schema.MfaAdminDestroyTotpSecretRequest{ /* populate request parameters */ }, + schema.MfaAdminDestroyTotpSecretRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2083,11 +2421,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaAdminGenerateTotpSecret( context.Background(), - schema.MfaAdminGenerateTotpSecretRequest{ /* populate request parameters */ }, + schema.MfaAdminGenerateTotpSecretRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2132,11 +2480,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreateDuoMethod( context.Background(), - schema.MfaCreateDuoMethodRequest{ /* populate request parameters */ }, + schema.MfaCreateDuoMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2181,11 +2539,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreateOktaMethod( context.Background(), - schema.MfaCreateOktaMethodRequest{ /* populate request parameters */ }, + schema.MfaCreateOktaMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2230,11 +2598,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreatePingIdMethod( context.Background(), - schema.MfaCreatePingIdMethodRequest{ /* populate request parameters */ }, + schema.MfaCreatePingIdMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2279,11 +2657,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreateTotpMethod( context.Background(), - schema.MfaCreateTotpMethodRequest{ /* populate request parameters */ }, + schema.MfaCreateTotpMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2327,12 +2715,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteDuoMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2380,12 +2776,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaDeleteLoginEnforcement( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2433,12 +2837,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteOktaMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2486,12 +2898,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeletePingIdMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2539,12 +2959,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteTotpMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2593,11 +3021,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaGenerateTotpSecret( context.Background(), - schema.MfaGenerateTotpSecretRequest{ /* populate request parameters */ }, + schema.MfaGenerateTotpSecretRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2641,10 +3079,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListDuoMethods( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2688,10 +3134,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListLoginEnforcements( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2735,10 +3189,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListMethods( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2782,10 +3244,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListOktaMethods( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2829,10 +3299,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListPingIdMethods( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2876,10 +3354,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListTotpMethods( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2923,12 +3409,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadDuoMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2975,13 +3469,21 @@ import ( "github.com/hashicorp/vault-client-go" ) -func main() { - client := // a suitably configured *vault.Client (see top-level README.md) +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaReadLoginEnforcement( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3029,12 +3531,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3082,12 +3592,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadOktaMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3135,12 +3653,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadPingIdMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3188,12 +3714,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadTotpMethod( context.Background(), methodId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3242,13 +3776,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateDuoMethod( context.Background(), methodId, - schema.MfaUpdateDuoMethodRequest{ /* populate request parameters */ }, + schema.MfaUpdateDuoMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3298,13 +3842,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateOktaMethod( context.Background(), methodId, - schema.MfaUpdateOktaMethodRequest{ /* populate request parameters */ }, + schema.MfaUpdateOktaMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3354,13 +3908,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdatePingIdMethod( context.Background(), methodId, - schema.MfaUpdatePingIdMethodRequest{ /* populate request parameters */ }, + schema.MfaUpdatePingIdMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3410,13 +3974,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateTotpMethod( context.Background(), methodId, - schema.MfaUpdateTotpMethodRequest{ /* populate request parameters */ }, + schema.MfaUpdateTotpMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3466,13 +4040,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaWriteLoginEnforcement( context.Background(), name, - schema.MfaWriteLoginEnforcementRequest{ /* populate request parameters */ }, + schema.MfaWriteLoginEnforcementRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3522,11 +4106,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcConfigure( context.Background(), - schema.OidcConfigureRequest{ /* populate request parameters */ }, + schema.OidcConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3570,12 +4164,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcDeleteAssignment( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3623,12 +4225,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcDeleteClient( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3676,12 +4286,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcDeleteKey( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3729,12 +4347,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcDeleteProvider( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3782,12 +4408,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcDeleteRole( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3835,12 +4469,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcDeleteScope( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3888,12 +4530,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcGenerateToken( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3942,11 +4592,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcIntrospect( context.Background(), - schema.OidcIntrospectRequest{ /* populate request parameters */ }, + schema.OidcIntrospectRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3990,10 +4650,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListAssignments( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4037,10 +4705,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListClients( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4084,10 +4760,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListKeys( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4131,12 +4815,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) allowedClientId := "allowedClientId_example" // string | Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids. (defaults to "") resp, err := client.Identity.OidcListProviders( context.Background(), allowedClientId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4181,10 +4873,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListRoles( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4228,10 +4928,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListScopes( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4275,7 +4983,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider clientId := "clientId_example" // string | The ID of the requesting client. @@ -4299,6 +5014,7 @@ func main() { responseType, scope, state, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4356,13 +5072,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderAuthorizeWithParameters( context.Background(), name, - schema.OidcProviderAuthorizeWithParametersRequest{ /* populate request parameters */ }, + schema.OidcProviderAuthorizeWithParametersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4412,13 +5138,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderToken( context.Background(), name, - schema.OidcProviderTokenRequest{ /* populate request parameters */ }, + schema.OidcProviderTokenRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4467,12 +5203,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderUserInfo( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4520,12 +5264,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcReadAssignment( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4573,12 +5325,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcReadClient( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4626,10 +5386,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcReadConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4670,12 +5438,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcReadKey( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4723,10 +5499,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcReadOpenIdConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4767,12 +5551,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProvider( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4820,12 +5612,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderOpenIdConfiguration( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4873,12 +5673,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderPublicKeys( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4926,10 +5734,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcReadPublicKeys( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4970,12 +5786,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcReadRole( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5023,12 +5847,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcReadScope( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5077,13 +5909,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcRotateKey( context.Background(), name, - schema.OidcRotateKeyRequest{ /* populate request parameters */ }, + schema.OidcRotateKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5133,13 +5975,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcWriteAssignment( context.Background(), name, - schema.OidcWriteAssignmentRequest{ /* populate request parameters */ }, + schema.OidcWriteAssignmentRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5189,13 +6041,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcWriteClient( context.Background(), name, - schema.OidcWriteClientRequest{ /* populate request parameters */ }, + schema.OidcWriteClientRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5245,13 +6107,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcWriteKey( context.Background(), name, - schema.OidcWriteKeyRequest{ /* populate request parameters */ }, + schema.OidcWriteKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5301,13 +6173,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcWriteProvider( context.Background(), name, - schema.OidcWriteProviderRequest{ /* populate request parameters */ }, + schema.OidcWriteProviderRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5357,13 +6239,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcWriteRole( context.Background(), name, - schema.OidcWriteRoleRequest{ /* populate request parameters */ }, + schema.OidcWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5413,13 +6305,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcWriteScope( context.Background(), name, - schema.OidcWriteScopeRequest{ /* populate request parameters */ }, + schema.OidcWriteScopeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5469,11 +6371,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.PersonaCreate( context.Background(), - schema.PersonaCreateRequest{ /* populate request parameters */ }, + schema.PersonaCreateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5517,12 +6429,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaDeleteById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5570,10 +6490,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.PersonaListById( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5617,12 +6545,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaReadById( context.Background(), id, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5671,13 +6607,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaUpdateById( context.Background(), id, - schema.PersonaUpdateByIdRequest{ /* populate request parameters */ }, + schema.PersonaUpdateByIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index 79cf4f19..217e0641 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -416,11 +416,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudConfigure( context.Background(), - schema.AliCloudConfigureRequest{ /* populate request parameters */ }, + schema.AliCloudConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -469,10 +479,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -520,12 +538,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -575,12 +601,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudGenerateCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -630,10 +664,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -682,10 +724,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -733,12 +783,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -789,13 +847,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudWriteRole( context.Background(), name, - schema.AliCloudWriteRoleRequest{ /* populate request parameters */ }, + schema.AliCloudWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -847,11 +915,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsConfigureLease( context.Background(), - schema.AwsConfigureLeaseRequest{ /* populate request parameters */ }, + schema.AwsConfigureLeaseRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -901,11 +979,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsConfigureRootIamCredentials( context.Background(), - schema.AwsConfigureRootIamCredentialsRequest{ /* populate request parameters */ }, + schema.AwsConfigureRootIamCredentialsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -954,12 +1042,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1009,12 +1105,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsDeleteStaticRolesName( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1064,7 +1168,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role @@ -1076,6 +1187,7 @@ func main() { roleArn, roleSessionName, ttl, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1129,13 +1241,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateCredentialsWithParameters( context.Background(), name, - schema.AwsGenerateCredentialsWithParametersRequest{ /* populate request parameters */ }, + schema.AwsGenerateCredentialsWithParametersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1186,7 +1308,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role @@ -1198,6 +1327,7 @@ func main() { roleArn, roleSessionName, ttl, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1251,13 +1381,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateStsCredentialsWithParameters( context.Background(), name, - schema.AwsGenerateStsCredentialsWithParametersRequest{ /* populate request parameters */ }, + schema.AwsGenerateStsCredentialsWithParametersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1308,10 +1448,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1360,10 +1508,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsReadLeaseConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1411,12 +1567,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1466,10 +1630,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsReadRootIamCredentialsConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1517,12 +1689,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticCredsName( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1572,12 +1752,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticRolesName( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1627,10 +1815,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsRotateRootIamCredentials( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1679,13 +1875,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsWriteRole( context.Background(), name, - schema.AwsWriteRoleRequest{ /* populate request parameters */ }, + schema.AwsWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1737,13 +1943,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsWriteStaticRolesName( context.Background(), name, - schema.AwsWriteStaticRolesNameRequest{ /* populate request parameters */ }, + schema.AwsWriteStaticRolesNameRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1795,11 +2011,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureConfigure( context.Background(), - schema.AzureConfigureRequest{ /* populate request parameters */ }, + schema.AzureConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -1848,10 +2074,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -1899,12 +2133,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -1954,10 +2196,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2006,10 +2256,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2057,12 +2315,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2112,12 +2378,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the Vault role resp, err := client.Secrets.AzureRequestServicePrincipalCredentials( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2167,10 +2441,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureRotateRoot( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2219,13 +2501,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureWriteRole( context.Background(), name, - schema.AzureWriteRoleRequest{ /* populate request parameters */ }, + schema.AzureWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2277,11 +2569,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.ConsulConfigureAccess( context.Background(), - schema.ConsulConfigureAccessRequest{ /* populate request parameters */ }, + schema.ConsulConfigureAccessRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2330,12 +2632,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2385,12 +2695,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Secrets.ConsulGenerateCredentials( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2440,10 +2758,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.ConsulListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2492,10 +2818,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.ConsulReadAccessConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2543,12 +2877,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2599,13 +2941,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulWriteRole( context.Background(), name, - schema.ConsulWriteRoleRequest{ /* populate request parameters */ }, + schema.ConsulWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2656,12 +3008,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeDelete( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2711,12 +3071,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeList( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2765,12 +3133,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeRead( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2818,13 +3194,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeWrite( context.Background(), path, - map[string]interface{}{ /* populate request parameters */ }, + map[string]interface{}{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2874,13 +3260,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseConfigureConnection( context.Background(), name, - schema.DatabaseConfigureConnectionRequest{ /* populate request parameters */ }, + schema.DatabaseConfigureConnectionRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -2931,12 +3327,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseDeleteConnectionConfiguration( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -2986,12 +3390,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3041,12 +3453,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteStaticRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3096,12 +3516,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseGenerateCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3151,10 +3579,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.DatabaseListConnections( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3203,10 +3639,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) - + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.DatabaseListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3255,10 +3699,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.DatabaseListStaticRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3307,12 +3759,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseReadConnectionConfiguration( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3362,12 +3822,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3417,12 +3885,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadStaticRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3472,12 +3948,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role. resp, err := client.Secrets.DatabaseReadStaticRoleCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3527,12 +4011,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseResetConnection( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3582,12 +4074,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseRotateRootCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3637,12 +4137,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role resp, err := client.Secrets.DatabaseRotateStaticRoleCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3693,13 +4201,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteRole( context.Background(), name, - schema.DatabaseWriteRoleRequest{ /* populate request parameters */ }, + schema.DatabaseWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3751,13 +4269,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteStaticRole( context.Background(), name, - schema.DatabaseWriteStaticRoleRequest{ /* populate request parameters */ }, + schema.DatabaseWriteStaticRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3809,11 +4337,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudConfigure( context.Background(), - schema.GoogleCloudConfigureRequest{ /* populate request parameters */ }, + schema.GoogleCloudConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -3862,12 +4400,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteImpersonatedAccount( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -3917,12 +4463,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudDeleteRoleset( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -3972,12 +4526,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4027,12 +4589,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the impersonated account. resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4082,12 +4652,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken( context.Background(), roleset, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4138,13 +4716,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetKey( context.Background(), roleset, - schema.GoogleCloudGenerateRolesetKeyRequest{ /* populate request parameters */ }, + schema.GoogleCloudGenerateRolesetKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4195,12 +4783,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessToken( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4251,13 +4847,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountKey( context.Background(), name, - schema.GoogleCloudGenerateStaticAccountKeyRequest{ /* populate request parameters */ }, + schema.GoogleCloudGenerateStaticAccountKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4309,11 +4915,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsConfigure( context.Background(), - schema.GoogleCloudKmsConfigureRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4363,13 +4979,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsConfigureKey( context.Background(), key, - schema.GoogleCloudKmsConfigureKeyRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsConfigureKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4421,13 +5047,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsDecrypt( context.Background(), key, - schema.GoogleCloudKmsDecryptRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsDecryptRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4478,10 +5114,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4529,12 +5173,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsDeleteKey( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4584,12 +5236,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. resp, err := client.Secrets.GoogleCloudKmsDeregisterKey( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4640,13 +5300,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsEncrypt( context.Background(), key, - schema.GoogleCloudKmsEncryptRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsEncryptRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4697,10 +5367,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsListKeys( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4749,10 +5427,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4800,12 +5486,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKey( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4855,12 +5549,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKeyConfiguration( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4911,13 +5613,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsReencrypt( context.Background(), key, - schema.GoogleCloudKmsReencryptRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsReencryptRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4969,13 +5681,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. resp, err := client.Secrets.GoogleCloudKmsRegisterKey( context.Background(), key, - schema.GoogleCloudKmsRegisterKeyRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsRegisterKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5026,12 +5748,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsRetrievePublicKey( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5081,12 +5811,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. resp, err := client.Secrets.GoogleCloudKmsRotateKey( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5137,13 +5875,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsSign( context.Background(), key, - schema.GoogleCloudKmsSignRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsSignRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5194,12 +5942,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions( context.Background(), key, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5250,13 +6006,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsVerify( context.Background(), key, - schema.GoogleCloudKmsVerifyRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsVerifyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5308,13 +6074,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsWriteKey( context.Background(), key, - schema.GoogleCloudKmsWriteKeyRequest{ /* populate request parameters */ }, + schema.GoogleCloudKmsWriteKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5365,10 +6141,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5417,10 +6201,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudListRolesets( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5469,10 +6261,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudListStaticAccounts( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5521,10 +6321,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5572,12 +6380,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadImpersonatedAccount( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5627,12 +6443,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudReadRoleset( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5682,12 +6506,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadStaticAccount( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5737,12 +6569,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRoleset( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5792,12 +6632,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRolesetKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5847,10 +6695,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudRotateRootCredentials( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5898,12 +6754,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the account. resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -5954,13 +6818,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteImpersonatedAccount( context.Background(), name, - schema.GoogleCloudWriteImpersonatedAccountRequest{ /* populate request parameters */ }, + schema.GoogleCloudWriteImpersonatedAccountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6012,13 +6886,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudWriteRoleset( context.Background(), name, - schema.GoogleCloudWriteRolesetRequest{ /* populate request parameters */ }, + schema.GoogleCloudWriteRolesetRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6070,13 +6954,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteStaticAccount( context.Background(), name, - schema.GoogleCloudWriteStaticAccountRequest{ /* populate request parameters */ }, + schema.GoogleCloudWriteStaticAccountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6127,10 +7021,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesCheckConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6179,11 +7081,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesConfigure( context.Background(), - schema.KubernetesConfigureRequest{ /* populate request parameters */ }, + schema.KubernetesConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6232,10 +7144,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6283,12 +7203,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6339,13 +7267,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Vault role resp, err := client.Secrets.KubernetesGenerateCredentials( context.Background(), name, - schema.KubernetesGenerateCredentialsRequest{ /* populate request parameters */ }, + schema.KubernetesGenerateCredentialsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6396,10 +7334,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6448,10 +7394,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6499,12 +7453,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6555,13 +7517,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesWriteRole( context.Background(), name, - schema.KubernetesWriteRoleRequest{ /* populate request parameters */ }, + schema.KubernetesWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -6612,12 +7584,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Delete( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -6667,12 +7647,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1List( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -6723,12 +7711,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Read( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -6778,13 +7774,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Write( context.Background(), path, - map[string]interface{}{ /* populate request parameters */ }, + map[string]interface{}{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -6836,11 +7842,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KvV2Configure( context.Background(), - schema.KvV2ConfigureRequest{ /* populate request parameters */ }, + schema.KvV2ConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -6889,12 +7905,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Delete( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -6944,12 +7968,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteMetadataAndAllVersions( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7000,13 +8032,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteVersions( context.Background(), path, - schema.KvV2DeleteVersionsRequest{ /* populate request parameters */ }, + schema.KvV2DeleteVersionsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7058,13 +8100,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DestroyVersions( context.Background(), path, - schema.KvV2DestroyVersionsRequest{ /* populate request parameters */ }, + schema.KvV2DestroyVersionsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7115,12 +8167,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2List( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7171,12 +8231,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Read( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7226,10 +8294,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KvV2ReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7277,12 +8353,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadMetadata( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7332,12 +8416,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadSubkeys( context.Background(), path, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7388,13 +8480,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2UndeleteVersions( context.Background(), path, - schema.KvV2UndeleteVersionsRequest{ /* populate request parameters */ }, + schema.KvV2UndeleteVersionsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7446,13 +8548,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Write( context.Background(), path, - schema.KvV2WriteRequest{ /* populate request parameters */ }, + schema.KvV2WriteRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7504,13 +8616,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2WriteMetadata( context.Background(), path, - schema.KvV2WriteMetadataRequest{ /* populate request parameters */ }, + schema.KvV2WriteMetadataRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7562,11 +8684,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapConfigure( context.Background(), - schema.LdapConfigureRequest{ /* populate request parameters */ }, + schema.LdapConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7615,10 +8747,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7666,12 +8806,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapDeleteDynamicRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7721,12 +8869,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapDeleteStaticRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7777,13 +8933,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckIn( context.Background(), name, - schema.LdapLibraryCheckInRequest{ /* populate request parameters */ }, + schema.LdapLibraryCheckInRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7835,13 +9001,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set resp, err := client.Secrets.LdapLibraryCheckOut( context.Background(), name, - schema.LdapLibraryCheckOutRequest{ /* populate request parameters */ }, + schema.LdapLibraryCheckOutRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7892,12 +9068,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckStatus( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -7948,13 +9132,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryConfigure( context.Background(), name, - schema.LdapLibraryConfigureRequest{ /* populate request parameters */ }, + schema.LdapLibraryConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8005,12 +9199,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryDelete( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8061,13 +9263,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryForceCheckIn( context.Background(), name, - schema.LdapLibraryForceCheckInRequest{ /* populate request parameters */ }, + schema.LdapLibraryForceCheckInRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8118,10 +9330,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapLibraryList( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8170,12 +9390,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryRead( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8225,10 +9453,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapListDynamicRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8277,10 +9513,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapListStaticRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8329,10 +9573,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8380,12 +9632,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapReadDynamicRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8435,12 +9695,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapReadStaticRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8490,12 +9758,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the dynamic role. resp, err := client.Secrets.LdapRequestDynamicRoleCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8545,12 +9821,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role. resp, err := client.Secrets.LdapRequestStaticRoleCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8600,10 +9884,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapRotateRootCredentials( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8651,12 +9943,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role resp, err := client.Secrets.LdapRotateStaticRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8707,13 +10007,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapWriteDynamicRole( context.Background(), name, - schema.LdapWriteDynamicRoleRequest{ /* populate request parameters */ }, + schema.LdapWriteDynamicRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8765,13 +10075,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapWriteStaticRole( context.Background(), name, - schema.LdapWriteStaticRoleRequest{ /* populate request parameters */ }, + schema.LdapWriteStaticRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8823,11 +10143,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) - + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.Secrets.MongoDbAtlasConfigure( context.Background(), - schema.MongoDbAtlasConfigureRequest{ /* populate request parameters */ }, + schema.MongoDbAtlasConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -8876,12 +10206,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -8931,12 +10269,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.MongoDbAtlasGenerateCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -8986,10 +10332,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.MongoDbAtlasListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9038,10 +10392,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.MongoDbAtlasReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9089,12 +10451,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9145,13 +10515,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasWriteRole( context.Background(), name, - schema.MongoDbAtlasWriteRoleRequest{ /* populate request parameters */ }, + schema.MongoDbAtlasWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -9203,11 +10583,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadConfigureAccess( context.Background(), - schema.NomadConfigureAccessRequest{ /* populate request parameters */ }, + schema.NomadConfigureAccessRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9257,11 +10647,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadConfigureLease( context.Background(), - schema.NomadConfigureLeaseRequest{ /* populate request parameters */ }, + schema.NomadConfigureLeaseRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9310,10 +10710,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadDeleteAccessConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9361,10 +10769,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadDeleteLeaseConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9412,12 +10828,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9467,12 +10891,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadGenerateCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9522,10 +10954,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9574,10 +11014,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadReadAccessConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9625,10 +11073,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadReadLeaseConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9676,12 +11132,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9732,13 +11196,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadWriteRole( context.Background(), name, - schema.NomadWriteRoleRequest{ /* populate request parameters */ }, + schema.NomadWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -9790,11 +11264,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureAcme( context.Background(), - schema.PkiConfigureAcmeRequest{ /* populate request parameters */ }, + schema.PkiConfigureAcmeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -9844,11 +11328,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureAutoTidy( context.Background(), - schema.PkiConfigureAutoTidyRequest{ /* populate request parameters */ }, + schema.PkiConfigureAutoTidyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -9898,11 +11392,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureCa( context.Background(), - schema.PkiConfigureCaRequest{ /* populate request parameters */ }, + schema.PkiConfigureCaRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -9952,11 +11456,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureCluster( context.Background(), - schema.PkiConfigureClusterRequest{ /* populate request parameters */ }, + schema.PkiConfigureClusterRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10006,11 +11520,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureCrl( context.Background(), - schema.PkiConfigureCrlRequest{ /* populate request parameters */ }, + schema.PkiConfigureCrlRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10060,11 +11584,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureIssuers( context.Background(), - schema.PkiConfigureIssuersRequest{ /* populate request parameters */ }, + schema.PkiConfigureIssuersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10114,11 +11648,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureKeys( context.Background(), - schema.PkiConfigureKeysRequest{ /* populate request parameters */ }, + schema.PkiConfigureKeysRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10168,11 +11712,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureUrls( context.Background(), - schema.PkiConfigureUrlsRequest{ /* populate request parameters */ }, + schema.PkiConfigureUrlsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10222,11 +11776,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiCrossSignIntermediate( context.Background(), - schema.PkiCrossSignIntermediateRequest{ /* populate request parameters */ }, + schema.PkiCrossSignIntermediateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10275,12 +11839,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) keyId := "keyId_example" // string | EAB key identifier resp, err := client.Secrets.PkiDeleteEabKey( context.Background(), keyId, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10330,12 +11902,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiDeleteIssuer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10385,12 +11965,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiDeleteKey( context.Background(), keyRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10440,12 +12028,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10495,10 +12091,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiDeleteRoot( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10546,10 +12150,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateEabKey( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10597,12 +12209,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiGenerateEabKeyForIssuer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10652,7 +12272,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -10660,6 +12287,7 @@ func main() { context.Background(), issuerRef, role, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10711,12 +12339,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiGenerateEabKeyForRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10767,11 +12403,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateExportedKey( context.Background(), - schema.PkiGenerateExportedKeyRequest{ /* populate request parameters */ }, + schema.PkiGenerateExportedKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10821,13 +12467,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateIntermediate( context.Background(), exported, - schema.PkiGenerateIntermediateRequest{ /* populate request parameters */ }, + schema.PkiGenerateIntermediateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10879,11 +12535,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateInternalKey( context.Background(), - schema.PkiGenerateInternalKeyRequest{ /* populate request parameters */ }, + schema.PkiGenerateInternalKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10933,11 +12599,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateKmsKey( context.Background(), - schema.PkiGenerateKmsKeyRequest{ /* populate request parameters */ }, + schema.PkiGenerateKmsKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -10987,13 +12663,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateRoot( context.Background(), exported, - schema.PkiGenerateRootRequest{ /* populate request parameters */ }, + schema.PkiGenerateRootRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11045,11 +12731,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiImportKey( context.Background(), - schema.PkiImportKeyRequest{ /* populate request parameters */ }, + schema.PkiImportKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11099,13 +12795,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssueWithRole( context.Background(), role, - schema.PkiIssueWithRoleRequest{ /* populate request parameters */ }, + schema.PkiIssueWithRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11157,7 +12863,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -11165,7 +12878,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiIssuerIssueWithRoleRequest{ /* populate request parameters */ }, + schema.PkiIssuerIssueWithRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11218,12 +12934,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrl( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11273,12 +12997,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDelta( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11328,12 +13060,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaDer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11383,12 +13123,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaPem( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11438,12 +13186,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11493,12 +13249,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlPem( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11549,13 +13313,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerResignCrls( context.Background(), issuerRef, - schema.PkiIssuerResignCrlsRequest{ /* populate request parameters */ }, + schema.PkiIssuerResignCrlsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11607,13 +13381,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignIntermediate( context.Background(), issuerRef, - schema.PkiIssuerSignIntermediateRequest{ /* populate request parameters */ }, + schema.PkiIssuerSignIntermediateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11665,13 +13449,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignRevocationList( context.Background(), issuerRef, - schema.PkiIssuerSignRevocationListRequest{ /* populate request parameters */ }, + schema.PkiIssuerSignRevocationListRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11723,13 +13517,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignSelfIssued( context.Background(), issuerRef, - schema.PkiIssuerSignSelfIssuedRequest{ /* populate request parameters */ }, + schema.PkiIssuerSignSelfIssuedRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11781,13 +13585,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignVerbatim( context.Background(), issuerRef, - schema.PkiIssuerSignVerbatimRequest{ /* populate request parameters */ }, + schema.PkiIssuerSignVerbatimRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11839,7 +13653,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -11847,7 +13668,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiIssuerSignVerbatimWithRoleRequest{ /* populate request parameters */ }, + schema.PkiIssuerSignVerbatimWithRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11901,7 +13725,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -11909,7 +13740,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiIssuerSignWithRoleRequest{ /* populate request parameters */ }, + schema.PkiIssuerSignWithRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11963,13 +13797,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateIntermediate( context.Background(), exported, - schema.PkiIssuersGenerateIntermediateRequest{ /* populate request parameters */ }, + schema.PkiIssuersGenerateIntermediateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12021,13 +13865,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateRoot( context.Background(), exported, - schema.PkiIssuersGenerateRootRequest{ /* populate request parameters */ }, + schema.PkiIssuersGenerateRootRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12079,11 +13933,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiIssuersImportBundle( context.Background(), - schema.PkiIssuersImportBundleRequest{ /* populate request parameters */ }, + schema.PkiIssuersImportBundleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12133,11 +13997,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiIssuersImportCert( context.Background(), - schema.PkiIssuersImportCertRequest{ /* populate request parameters */ }, + schema.PkiIssuersImportCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12186,10 +14060,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListCerts( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12238,10 +14120,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListEabKeys( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12290,10 +14180,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListIssuers( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12342,10 +14240,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListKeys( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12394,10 +14300,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListRevokedCerts( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12446,10 +14360,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12498,10 +14420,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiQueryOcsp( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12549,12 +14479,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) req := "req_example" // string | base-64 encoded ocsp request resp, err := client.Secrets.PkiQueryOcspWithGetReq( context.Background(), req, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12604,10 +14542,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAcmeConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12655,10 +14601,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAcmeDirectory( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12706,10 +14660,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAcmeNewNonce( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12757,10 +14719,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAutoTidyConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12808,10 +14778,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCaChainPem( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12859,10 +14837,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCaDer( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12910,10 +14896,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCaPem( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12961,12 +14955,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCert( context.Background(), serial, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13016,10 +15018,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCertCaChain( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13067,10 +15077,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCertCrl( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13118,10 +15136,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCertDeltaCrl( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13169,12 +15195,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawDer( context.Background(), serial, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13224,12 +15258,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawPem( context.Background(), serial, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13279,10 +15321,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadClusterConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13330,10 +15380,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13381,10 +15439,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlDelta( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13432,10 +15498,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlDeltaPem( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13483,10 +15557,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlDer( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13533,11 +15615,19 @@ import ( "github.com/hashicorp/vault-client-go" ) -func main() { - client := // a suitably configured *vault.Client (see top-level README.md) +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlPem( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13585,12 +15675,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13640,12 +15738,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerDer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13695,12 +15801,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeDirectory( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13750,12 +15864,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeNewNonce( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13805,7 +15927,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -13813,6 +15942,7 @@ func main() { context.Background(), issuerRef, role, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13864,7 +15994,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -13872,6 +16009,7 @@ func main() { context.Background(), issuerRef, role, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13923,12 +16061,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerJson( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13978,12 +16124,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerPem( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14033,10 +16187,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadIssuersConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14084,12 +16246,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiReadKey( context.Background(), keyRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14139,10 +16309,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadKeysConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14190,12 +16368,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14245,12 +16431,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeDirectory( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14300,12 +16494,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeNewNonce( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14355,10 +16557,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadUrlsConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14407,11 +16617,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReplaceRoot( context.Background(), - schema.PkiReplaceRootRequest{ /* populate request parameters */ }, + schema.PkiReplaceRootRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14461,11 +16681,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRevoke( context.Background(), - schema.PkiRevokeRequest{ /* populate request parameters */ }, + schema.PkiRevokeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14514,12 +16744,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiRevokeIssuer( context.Background(), issuerRef, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14570,11 +16808,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRevokeWithKey( context.Background(), - schema.PkiRevokeWithKeyRequest{ /* populate request parameters */ }, + schema.PkiRevokeWithKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14624,11 +16872,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRootSignIntermediate( context.Background(), - schema.PkiRootSignIntermediateRequest{ /* populate request parameters */ }, + schema.PkiRootSignIntermediateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14678,11 +16936,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRootSignSelfIssued( context.Background(), - schema.PkiRootSignSelfIssuedRequest{ /* populate request parameters */ }, + schema.PkiRootSignSelfIssuedRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14731,10 +16999,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRotateCrl( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14782,10 +17058,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRotateDeltaCrl( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14834,13 +17118,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiRotateRoot( context.Background(), exported, - schema.PkiRotateRootRequest{ /* populate request parameters */ }, + schema.PkiRotateRootRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14892,11 +17186,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiSetSignedIntermediate( context.Background(), - schema.PkiSetSignedIntermediateRequest{ /* populate request parameters */ }, + schema.PkiSetSignedIntermediateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14946,11 +17250,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiSignVerbatim( context.Background(), - schema.PkiSignVerbatimRequest{ /* populate request parameters */ }, + schema.PkiSignVerbatimRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15000,13 +17314,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignVerbatimWithRole( context.Background(), role, - schema.PkiSignVerbatimWithRoleRequest{ /* populate request parameters */ }, + schema.PkiSignVerbatimWithRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15058,13 +17382,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignWithRole( context.Background(), role, - schema.PkiSignWithRoleRequest{ /* populate request parameters */ }, + schema.PkiSignWithRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15116,11 +17450,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiTidy( context.Background(), - schema.PkiTidyRequest{ /* populate request parameters */ }, + schema.PkiTidyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15169,10 +17513,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiTidyCancel( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15220,10 +17572,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiTidyStatus( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15272,13 +17632,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) kid := "kid_example" // string | The key identifier provided by the CA resp, err := client.Secrets.PkiWriteAcmeAccountKid( context.Background(), kid, - schema.PkiWriteAcmeAccountKidRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeAccountKidRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15330,13 +17700,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value resp, err := client.Secrets.PkiWriteAcmeAuthorizationAuthId( context.Background(), authId, - schema.PkiWriteAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15388,7 +17768,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -15396,7 +17783,10 @@ func main() { context.Background(), authId, challengeType, - schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15450,11 +17840,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeNewAccount( context.Background(), - schema.PkiWriteAcmeNewAccountRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeNewAccountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15504,11 +17904,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeNewOrder( context.Background(), - schema.PkiWriteAcmeNewOrderRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeNewOrderRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15558,13 +17968,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderId( context.Background(), orderId, - schema.PkiWriteAcmeOrderOrderIdRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeOrderOrderIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15616,13 +18036,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdCert( context.Background(), orderId, - schema.PkiWriteAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15674,13 +18104,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdFinalize( context.Background(), orderId, - schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15732,11 +18172,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeOrders( context.Background(), - schema.PkiWriteAcmeOrdersRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeOrdersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15786,11 +18236,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeRevokeCert( context.Background(), - schema.PkiWriteAcmeRevokeCertRequest{ /* populate request parameters */ }, + schema.PkiWriteAcmeRevokeCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15840,13 +18300,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiWriteIssuer( context.Background(), issuerRef, - schema.PkiWriteIssuerRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15898,7 +18368,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA @@ -15906,7 +18383,10 @@ func main() { context.Background(), issuerRef, kid, - schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15960,7 +18440,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -15968,7 +18455,10 @@ func main() { context.Background(), authId, issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16022,7 +18512,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -16032,7 +18529,10 @@ func main() { authId, challengeType, issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16088,13 +18588,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewAccount( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16146,13 +18656,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewOrder( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16204,7 +18724,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -16212,7 +18739,10 @@ func main() { context.Background(), issuerRef, orderId, - schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16266,7 +18796,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -16274,7 +18811,10 @@ func main() { context.Background(), issuerRef, orderId, - schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16328,7 +18868,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -16336,7 +18883,10 @@ func main() { context.Background(), issuerRef, orderId, - schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16390,13 +18940,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrders( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16448,13 +19008,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeRevokeCert( context.Background(), issuerRef, - schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16506,7 +19076,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA @@ -16516,7 +19093,10 @@ func main() { issuerRef, kid, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16572,7 +19152,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -16582,7 +19169,10 @@ func main() { authId, issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16638,7 +19228,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -16650,7 +19247,10 @@ func main() { challengeType, issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16708,7 +19308,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -16716,7 +19323,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16770,7 +19380,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -16778,7 +19395,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16832,7 +19452,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -16842,7 +19469,10 @@ func main() { issuerRef, orderId, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16898,7 +19528,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -16908,7 +19545,10 @@ func main() { issuerRef, orderId, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16964,7 +19604,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -16974,7 +19621,10 @@ func main() { issuerRef, orderId, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17030,7 +19680,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -17038,7 +19695,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17092,7 +19752,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -17100,7 +19767,10 @@ func main() { context.Background(), issuerRef, role, - schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ /* populate request parameters */ }, + schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17154,13 +19824,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiWriteKey( context.Background(), keyRef, - schema.PkiWriteKeyRequest{ /* populate request parameters */ }, + schema.PkiWriteKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17212,13 +19892,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiWriteRole( context.Background(), name, - schema.PkiWriteRoleRequest{ /* populate request parameters */ }, + schema.PkiWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17270,7 +19960,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) kid := "kid_example" // string | The key identifier provided by the CA role := "role_example" // string | The desired role for the acme request @@ -17278,7 +19975,10 @@ func main() { context.Background(), kid, role, - schema.PkiWriteRolesRoleAcmeAccountKidRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeAccountKidRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17332,7 +20032,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value role := "role_example" // string | The desired role for the acme request @@ -17340,7 +20047,10 @@ func main() { context.Background(), authId, role, - schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17394,7 +20104,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -17404,7 +20121,10 @@ func main() { authId, challengeType, role, - schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17460,13 +20180,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewAccount( context.Background(), role, - schema.PkiWriteRolesRoleAcmeNewAccountRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeNewAccountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17518,13 +20248,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewOrder( context.Background(), role, - schema.PkiWriteRolesRoleAcmeNewOrderRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeNewOrderRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17576,7 +20316,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -17584,7 +20331,10 @@ func main() { context.Background(), orderId, role, - schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17638,7 +20388,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -17646,7 +20403,10 @@ func main() { context.Background(), orderId, role, - schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17700,7 +20460,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -17708,7 +20475,10 @@ func main() { context.Background(), orderId, role, - schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17762,13 +20532,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrders( context.Background(), role, - schema.PkiWriteRolesRoleAcmeOrdersRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeOrdersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17820,13 +20600,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeRevokeCert( context.Background(), role, - schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ /* populate request parameters */ }, + schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17878,11 +20668,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqConfigureConnection( context.Background(), - schema.RabbitMqConfigureConnectionRequest{ /* populate request parameters */ }, + schema.RabbitMqConfigureConnectionRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -17932,11 +20732,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqConfigureLease( context.Background(), - schema.RabbitMqConfigureLeaseRequest{ /* populate request parameters */ }, + schema.RabbitMqConfigureLeaseRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -17985,12 +20795,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -18040,10 +20858,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -18092,10 +20918,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqReadLeaseConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -18143,12 +20977,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -18198,12 +21040,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqRequestCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -18254,13 +21104,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqWriteRole( context.Background(), name, - schema.RabbitMqWriteRoleRequest{ /* populate request parameters */ }, + schema.RabbitMqWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -18312,11 +21172,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshConfigureCa( context.Background(), - schema.SshConfigureCaRequest{ /* populate request parameters */ }, + schema.SshConfigureCaRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18366,11 +21236,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshConfigureZeroAddress( context.Background(), - schema.SshConfigureZeroAddressRequest{ /* populate request parameters */ }, + schema.SshConfigureZeroAddressRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18419,10 +21299,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshDeleteCaConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18470,12 +21358,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshDeleteRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18525,10 +21421,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshDeleteZeroAddressConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18577,13 +21481,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required] Name of the role resp, err := client.Secrets.SshGenerateCredentials( context.Background(), role, - schema.SshGenerateCredentialsRequest{ /* populate request parameters */ }, + schema.SshGenerateCredentialsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18635,13 +21549,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshIssueCertificate( context.Background(), role, - schema.SshIssueCertificateRequest{ /* populate request parameters */ }, + schema.SshIssueCertificateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18692,10 +21616,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18745,11 +21677,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshListRolesByIp( context.Background(), - schema.SshListRolesByIpRequest{ /* populate request parameters */ }, + schema.SshListRolesByIpRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18798,10 +21740,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshReadCaConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18849,10 +21799,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshReadPublicKey( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18900,12 +21858,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshReadRole( context.Background(), role, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -18955,10 +21921,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshReadZeroAddressConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -19007,13 +21981,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshSignCertificate( context.Background(), role, - schema.SshSignCertificateRequest{ /* populate request parameters */ }, + schema.SshSignCertificateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -19064,10 +22048,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshTidyDynamicHostKeys( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -19116,11 +22108,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshVerifyOtp( context.Background(), - schema.SshVerifyOtpRequest{ /* populate request parameters */ }, + schema.SshVerifyOtpRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -19170,13 +22172,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshWriteRole( context.Background(), role, - schema.SshWriteRoleRequest{ /* populate request parameters */ }, + schema.SshWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -19228,11 +22240,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudConfigure( context.Background(), - schema.TerraformCloudConfigureRequest{ /* populate request parameters */ }, + schema.TerraformCloudConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19281,10 +22303,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19331,13 +22361,21 @@ import ( "github.com/hashicorp/vault-client-go" ) -func main() { - client := // a suitably configured *vault.Client (see top-level README.md) +func main() { + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudDeleteRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19387,12 +22425,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudGenerateCredentials( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19442,10 +22488,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudListRoles( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19494,10 +22548,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudReadConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19545,12 +22607,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudReadRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19600,12 +22670,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the team or organization role resp, err := client.Secrets.TerraformCloudRotateRole( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19656,13 +22734,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudWriteRole( context.Background(), name, - schema.TerraformCloudWriteRoleRequest{ /* populate request parameters */ }, + schema.TerraformCloudWriteRoleRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -19714,13 +22802,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpCreateKey( context.Background(), name, - schema.TotpCreateKeyRequest{ /* populate request parameters */ }, + schema.TotpCreateKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -19771,12 +22869,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpDeleteKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -19826,12 +22932,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpGenerateCode( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -19881,10 +22995,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TotpListKeys( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -19933,12 +23055,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpReadKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -19989,13 +23119,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpValidateCode( context.Background(), name, - schema.TotpValidateCodeRequest{ /* populate request parameters */ }, + schema.TotpValidateCodeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -20046,12 +23186,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitBackUpKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20101,7 +23249,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. @@ -20109,6 +23264,7 @@ func main() { context.Background(), destination, source, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20160,7 +23316,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. @@ -20170,6 +23333,7 @@ func main() { destination, source, version, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20224,11 +23388,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitConfigureCache( context.Background(), - schema.TransitConfigureCacheRequest{ /* populate request parameters */ }, + schema.TransitConfigureCacheRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20278,13 +23452,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitConfigureKey( context.Background(), name, - schema.TransitConfigureKeyRequest{ /* populate request parameters */ }, + schema.TransitConfigureKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20336,11 +23520,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitConfigureKeys( context.Background(), - schema.TransitConfigureKeysRequest{ /* populate request parameters */ }, + schema.TransitConfigureKeysRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20390,13 +23584,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitCreateKey( context.Background(), name, - schema.TransitCreateKeyRequest{ /* populate request parameters */ }, + schema.TransitCreateKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20448,13 +23652,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDecrypt( context.Background(), name, - schema.TransitDecryptRequest{ /* populate request parameters */ }, + schema.TransitDecryptRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20505,12 +23719,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDeleteKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20561,13 +23783,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitEncrypt( context.Background(), name, - schema.TransitEncryptRequest{ /* populate request parameters */ }, + schema.TransitEncryptRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20618,7 +23850,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) @@ -20626,6 +23865,7 @@ func main() { context.Background(), name, type_, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20677,7 +23917,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) @@ -20687,6 +23934,7 @@ func main() { name, type_, version, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20741,13 +23989,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitGenerateCsrForKey( context.Background(), name, - schema.TransitGenerateCsrForKeyRequest{ /* populate request parameters */ }, + schema.TransitGenerateCsrForKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20799,7 +24057,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The backend key used for encrypting the data key plaintext := "plaintext_example" // string | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. @@ -20807,7 +24072,10 @@ func main() { context.Background(), name, plaintext, - schema.TransitGenerateDataKeyRequest{ /* populate request parameters */ }, + schema.TransitGenerateDataKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20861,13 +24129,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use for the HMAC function resp, err := client.Secrets.TransitGenerateHmac( context.Background(), name, - schema.TransitGenerateHmacRequest{ /* populate request parameters */ }, + schema.TransitGenerateHmacRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20919,7 +24197,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use for the HMAC function urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) @@ -20927,7 +24212,10 @@ func main() { context.Background(), name, urlalgorithm, - schema.TransitGenerateHmacWithAlgorithmRequest{ /* populate request parameters */ }, + schema.TransitGenerateHmacWithAlgorithmRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -20981,11 +24269,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitGenerateRandom( context.Background(), - schema.TransitGenerateRandomRequest{ /* populate request parameters */ }, + schema.TransitGenerateRandomRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21035,13 +24333,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.Secrets.TransitGenerateRandomWithBytes( context.Background(), urlbytes, - schema.TransitGenerateRandomWithBytesRequest{ /* populate request parameters */ }, + schema.TransitGenerateRandomWithBytesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21093,13 +24401,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.Secrets.TransitGenerateRandomWithSource( context.Background(), source, - schema.TransitGenerateRandomWithSourceRequest{ /* populate request parameters */ }, + schema.TransitGenerateRandomWithSourceRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21151,7 +24469,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) @@ -21159,7 +24484,10 @@ func main() { context.Background(), source, urlbytes, - schema.TransitGenerateRandomWithSourceAndBytesRequest{ /* populate request parameters */ }, + schema.TransitGenerateRandomWithSourceAndBytesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21213,11 +24541,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitHash( context.Background(), - schema.TransitHashRequest{ /* populate request parameters */ }, + schema.TransitHashRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21267,13 +24605,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitHashWithAlgorithm( context.Background(), urlalgorithm, - schema.TransitHashWithAlgorithmRequest{ /* populate request parameters */ }, + schema.TransitHashWithAlgorithmRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21325,13 +24673,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKey( context.Background(), name, - schema.TransitImportKeyRequest{ /* populate request parameters */ }, + schema.TransitImportKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21383,13 +24741,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKeyVersion( context.Background(), name, - schema.TransitImportKeyVersionRequest{ /* populate request parameters */ }, + schema.TransitImportKeyVersionRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21440,10 +24808,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitListKeys( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21492,10 +24868,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitReadCacheConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21543,12 +24927,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitReadKey( context.Background(), name, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21598,10 +24990,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitReadKeysConfiguration( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21649,10 +25049,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitReadWrappingKey( context.Background(), + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21701,13 +25109,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | If set, this will be the name of the restored key. resp, err := client.Secrets.TransitRestoreAndRenameKey( context.Background(), name, - schema.TransitRestoreAndRenameKeyRequest{ /* populate request parameters */ }, + schema.TransitRestoreAndRenameKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21759,11 +25177,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitRestoreKey( context.Background(), - schema.TransitRestoreKeyRequest{ /* populate request parameters */ }, + schema.TransitRestoreKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21813,13 +25241,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRewrap( context.Background(), name, - schema.TransitRewrapRequest{ /* populate request parameters */ }, + schema.TransitRewrapRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21871,13 +25309,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRotateKey( context.Background(), name, - schema.TransitRotateKeyRequest{ /* populate request parameters */ }, + schema.TransitRotateKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21929,13 +25377,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitSetCertificateForKey( context.Background(), name, - schema.TransitSetCertificateForKeyRequest{ /* populate request parameters */ }, + schema.TransitSetCertificateForKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -21987,13 +25445,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use resp, err := client.Secrets.TransitSign( context.Background(), name, - schema.TransitSignRequest{ /* populate request parameters */ }, + schema.TransitSignRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22045,7 +25513,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) @@ -22053,7 +25528,10 @@ func main() { context.Background(), name, urlalgorithm, - schema.TransitSignWithAlgorithmRequest{ /* populate request parameters */ }, + schema.TransitSignWithAlgorithmRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22107,13 +25585,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitTrimKey( context.Background(), name, - schema.TransitTrimKeyRequest{ /* populate request parameters */ }, + schema.TransitTrimKeyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22165,13 +25653,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use resp, err := client.Secrets.TransitVerify( context.Background(), name, - schema.TransitVerifyRequest{ /* populate request parameters */ }, + schema.TransitVerifyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -22223,7 +25721,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) @@ -22231,7 +25736,10 @@ func main() { context.Background(), name, urlalgorithm, - schema.TransitVerifyWithAlgorithmRequest{ /* populate request parameters */ }, + schema.TransitVerifyWithAlgorithmRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { diff --git a/docs/SystemApi.md b/docs/SystemApi.md index 967ce348..ad410670 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -181,13 +181,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingCalculateHash( context.Background(), path, - schema.AuditingCalculateHashRequest{ /* populate request parameters */ }, + schema.AuditingCalculateHashRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -236,12 +246,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingDisableDevice( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -289,12 +307,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingDisableRequestHeader( context.Background(), header, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -343,13 +369,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingEnableDevice( context.Background(), path, - schema.AuditingEnableDeviceRequest{ /* populate request parameters */ }, + schema.AuditingEnableDeviceRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -399,13 +435,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingEnableRequestHeader( context.Background(), header, - schema.AuditingEnableRequestHeaderRequest{ /* populate request parameters */ }, + schema.AuditingEnableRequestHeaderRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -454,10 +500,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.AuditingListEnabledDevices( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -498,10 +552,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.AuditingListRequestHeaders( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -542,12 +604,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingReadRequestHeaderInformation( context.Background(), header, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -595,12 +665,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthDisableMethod( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -653,13 +731,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthEnableMethod( context.Background(), path, - schema.AuthEnableMethodRequest{ /* populate request parameters */ }, + schema.AuthEnableMethodRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -708,10 +796,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.AuthListEnabledMethods( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -752,12 +848,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthReadConfiguration( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -807,12 +911,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthReadTuningInformation( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -863,13 +975,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthTuneConfigurationParameters( context.Background(), path, - schema.AuthTuneConfigurationParametersRequest{ /* populate request parameters */ }, + schema.AuthTuneConfigurationParametersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -922,10 +1044,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CollectHostInformation( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -970,10 +1100,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CollectInFlightRequestInformation( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1015,11 +1153,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CorsConfigure( context.Background(), - schema.CorsConfigureRequest{ /* populate request parameters */ }, + schema.CorsConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1063,10 +1211,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CorsDeleteConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1107,10 +1263,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CorsReadConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1152,11 +1316,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Decode( context.Background(), - schema.DecodeRequest{ /* populate request parameters */ }, + schema.DecodeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1201,11 +1375,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyConfigureRotation( context.Background(), - schema.EncryptionKeyConfigureRotationRequest{ /* populate request parameters */ }, + schema.EncryptionKeyConfigureRotationRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1249,10 +1433,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyReadRotationConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1293,10 +1485,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyRotate( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1337,10 +1537,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1382,11 +1590,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.GenerateHash( context.Background(), - schema.GenerateHashRequest{ /* populate request parameters */ }, + schema.GenerateHashRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1431,13 +1649,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.System.GenerateHashWithAlgorithm( context.Background(), urlalgorithm, - schema.GenerateHashWithAlgorithmRequest{ /* populate request parameters */ }, + schema.GenerateHashWithAlgorithmRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1487,11 +1715,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.GenerateRandom( context.Background(), - schema.GenerateRandomRequest{ /* populate request parameters */ }, + schema.GenerateRandomRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1536,13 +1774,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.System.GenerateRandomWithBytes( context.Background(), urlbytes, - schema.GenerateRandomWithBytesRequest{ /* populate request parameters */ }, + schema.GenerateRandomWithBytesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1592,13 +1840,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.System.GenerateRandomWithSource( context.Background(), source, - schema.GenerateRandomWithSourceRequest{ /* populate request parameters */ }, + schema.GenerateRandomWithSourceRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1648,7 +1906,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) @@ -1656,7 +1921,10 @@ func main() { context.Background(), source, urlbytes, - schema.GenerateRandomWithSourceAndBytesRequest{ /* populate request parameters */ }, + schema.GenerateRandomWithSourceAndBytesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1707,10 +1975,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.HaStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1754,11 +2030,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Initialize( context.Background(), - schema.InitializeRequest{ /* populate request parameters */ }, + schema.InitializeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1803,11 +2089,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityConfigure( context.Background(), - schema.InternalClientActivityConfigureRequest{ /* populate request parameters */ }, + schema.InternalClientActivityConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1851,10 +2147,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityExport( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1895,10 +2199,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityReadConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1939,10 +2251,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityReportCounts( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1983,10 +2303,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityReportCountsThisMonth( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2027,10 +2355,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalCountEntities( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2071,10 +2407,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalCountRequests( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2115,10 +2459,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalCountTokens( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2159,7 +2511,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) context := "context_example" // string | Context string appended to every operationId genericMountPaths := true // bool | Use generic mount paths (defaults to false) @@ -2167,6 +2526,7 @@ func main() { context.Background(), context, genericMountPaths, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2212,11 +2572,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalGenerateOpenApiDocumentWithParameters( context.Background(), - schema.InternalGenerateOpenApiDocumentWithParametersRequest{ /* populate request parameters */ }, + schema.InternalGenerateOpenApiDocumentWithParametersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2260,12 +2630,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) tag := "tag_example" // string | Name of subtree being observed resp, err := client.System.InternalInspectRouter( context.Background(), tag, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2313,10 +2691,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiListEnabledFeatureFlags( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2357,10 +2743,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiListEnabledVisibleMounts( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2401,10 +2795,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiListNamespaces( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2445,12 +2847,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path of the mount. resp, err := client.System.InternalUiReadMountInformation( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2498,10 +2908,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiReadResultantAcl( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2542,10 +2960,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeaderStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2586,10 +3012,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesCount( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2634,12 +3068,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesForceRevokeLeaseWithPrefix( context.Background(), prefix, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2687,10 +3129,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) - + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) + resp, err := client.System.LeasesList( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2731,12 +3181,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) prefix := "prefix_example" // string | The path to list leases under. Example: \"aws/creds/deploy\" resp, err := client.System.LeasesLookUp( context.Background(), prefix, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2786,11 +3244,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesReadLease( context.Background(), - schema.LeasesReadLeaseRequest{ /* populate request parameters */ }, + schema.LeasesReadLeaseRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2835,11 +3303,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesRenewLease( context.Background(), - schema.LeasesRenewLeaseRequest{ /* populate request parameters */ }, + schema.LeasesRenewLeaseRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2884,13 +3362,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRenewLeaseWithId( context.Background(), urlLeaseId, - schema.LeasesRenewLeaseWithIdRequest{ /* populate request parameters */ }, + schema.LeasesRenewLeaseWithIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2940,11 +3428,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesRevokeLease( context.Background(), - schema.LeasesRevokeLeaseRequest{ /* populate request parameters */ }, + schema.LeasesRevokeLeaseRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2989,13 +3487,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRevokeLeaseWithId( context.Background(), urlLeaseId, - schema.LeasesRevokeLeaseWithIdRequest{ /* populate request parameters */ }, + schema.LeasesRevokeLeaseWithIdRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3045,13 +3553,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesRevokeLeaseWithPrefix( context.Background(), prefix, - schema.LeasesRevokeLeaseWithPrefixRequest{ /* populate request parameters */ }, + schema.LeasesRevokeLeaseWithPrefixRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3100,10 +3618,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesTidy( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3144,10 +3670,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ListExperimentalFeatures( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3188,10 +3722,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LockedUsersList( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3232,7 +3774,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) aliasIdentifier := "aliasIdentifier_example" // string | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID mountAccessor := "mountAccessor_example" // string | MountAccessor is the identifier of the mount entry to which the user belongs @@ -3240,6 +3789,7 @@ func main() { context.Background(), aliasIdentifier, mountAccessor, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3289,10 +3839,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LoggersReadVerbosityLevel( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3333,12 +3891,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersReadVerbosityLevelFor( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3386,10 +3952,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LoggersRevertVerbosityLevel( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3430,12 +4004,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersRevertVerbosityLevelFor( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3484,11 +4066,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LoggersUpdateVerbosityLevel( context.Background(), - schema.LoggersUpdateVerbosityLevelRequest{ /* populate request parameters */ }, + schema.LoggersUpdateVerbosityLevelRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3533,13 +4125,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersUpdateVerbosityLevelFor( context.Background(), name, - schema.LoggersUpdateVerbosityLevelForRequest{ /* populate request parameters */ }, + schema.LoggersUpdateVerbosityLevelForRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3588,12 +4190,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) format := "format_example" // string | Format to export metrics into. Currently accepts only \"prometheus\". resp, err := client.System.Metrics( context.Background(), format, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3638,11 +4248,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.MfaValidate( context.Background(), - schema.MfaValidateRequest{ /* populate request parameters */ }, + schema.MfaValidateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3686,7 +4306,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) logFormat := "logFormat_example" // string | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". (defaults to "standard") logLevel := "logLevel_example" // string | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". @@ -3694,6 +4321,7 @@ func main() { context.Background(), logFormat, logLevel, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3738,12 +4366,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsDisableSecretsEngine( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3792,13 +4428,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsEnableSecretsEngine( context.Background(), path, - schema.MountsEnableSecretsEngineRequest{ /* populate request parameters */ }, + schema.MountsEnableSecretsEngineRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3847,10 +4493,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.MountsListSecretsEngines( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3891,12 +4545,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadConfiguration( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3944,12 +4606,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadTuningInformation( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3998,13 +4668,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsTuneConfigurationParameters( context.Background(), path, - schema.MountsTuneConfigurationParametersRequest{ /* populate request parameters */ }, + schema.MountsTuneConfigurationParametersRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4053,10 +4733,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PluginsCatalogListPlugins( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4097,12 +4785,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogListPluginsWithType( context.Background(), type_, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4151,12 +4847,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogReadPluginConfiguration( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4204,7 +4908,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4212,6 +4923,7 @@ func main() { context.Background(), name, type_, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4262,13 +4974,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRegisterPlugin( context.Background(), name, - schema.PluginsCatalogRegisterPluginRequest{ /* populate request parameters */ }, + schema.PluginsCatalogRegisterPluginRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4318,7 +5040,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4326,7 +5055,10 @@ func main() { context.Background(), name, type_, - schema.PluginsCatalogRegisterPluginWithTypeRequest{ /* populate request parameters */ }, + schema.PluginsCatalogRegisterPluginWithTypeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4377,12 +5109,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRemovePlugin( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4430,7 +5170,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4438,6 +5185,7 @@ func main() { context.Background(), name, type_, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4490,11 +5238,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PluginsReloadBackends( context.Background(), - schema.PluginsReloadBackendsRequest{ /* populate request parameters */ }, + schema.PluginsReloadBackendsRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4538,10 +5296,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PluginsRuntimesCatalogListPluginsRuntimes( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4585,7 +5351,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -4593,6 +5366,7 @@ func main() { context.Background(), name, type_, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4643,7 +5417,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -4651,7 +5432,10 @@ func main() { context.Background(), name, type_, - schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ /* populate request parameters */ }, + schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4702,7 +5486,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -4710,6 +5501,7 @@ func main() { context.Background(), name, type_, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4759,12 +5551,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesDeleteAclPolicy( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4812,12 +5612,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesDeletePasswordPolicy( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4865,12 +5673,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesGeneratePasswordFromPasswordPolicy( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4918,10 +5734,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PoliciesListAclPolicies( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4965,10 +5789,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PoliciesListPasswordPolicies( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5012,12 +5844,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesReadAclPolicy( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5065,12 +5905,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesReadPasswordPolicy( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5119,13 +5967,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesWriteAclPolicy( context.Background(), name, - schema.PoliciesWriteAclPolicyRequest{ /* populate request parameters */ }, + schema.PoliciesWriteAclPolicyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5175,13 +6033,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesWritePasswordPolicy( context.Background(), name, - schema.PoliciesWritePasswordPolicyRequest{ /* populate request parameters */ }, + schema.PoliciesWritePasswordPolicyRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5232,10 +6100,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofBlocking( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5278,10 +6154,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofCommandLine( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5324,10 +6208,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofCpuProfile( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5370,10 +6262,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofExecutionTrace( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5416,10 +6316,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofGoroutines( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5464,10 +6372,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofIndex( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5510,10 +6426,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofMemoryAllocations( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5556,10 +6480,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofMemoryAllocationsLive( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5602,10 +6534,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofMutexes( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5648,10 +6588,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofSymbols( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5694,10 +6642,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofThreadCreations( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5739,11 +6695,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.QueryTokenAccessorCapabilities( context.Background(), - schema.QueryTokenAccessorCapabilitiesRequest{ /* populate request parameters */ }, + schema.QueryTokenAccessorCapabilitiesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5788,11 +6754,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.QueryTokenCapabilities( context.Background(), - schema.QueryTokenCapabilitiesRequest{ /* populate request parameters */ }, + schema.QueryTokenCapabilitiesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5837,11 +6813,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.QueryTokenSelfCapabilities( context.Background(), - schema.QueryTokenSelfCapabilitiesRequest{ /* populate request parameters */ }, + schema.QueryTokenSelfCapabilitiesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5886,11 +6872,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RateLimitQuotasConfigure( context.Background(), - schema.RateLimitQuotasConfigureRequest{ /* populate request parameters */ }, + schema.RateLimitQuotasConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5934,12 +6930,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasDelete( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5987,10 +6991,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RateLimitQuotasList( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6034,12 +7046,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasRead( context.Background(), name, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6087,10 +7107,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RateLimitQuotasReadConfiguration( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6132,13 +7160,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasWrite( context.Background(), name, - schema.RateLimitQuotasWriteRequest{ /* populate request parameters */ }, + schema.RateLimitQuotasWriteRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6187,12 +7225,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawDelete( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6240,12 +7286,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawList( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6294,12 +7348,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawRead( context.Background(), path, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6348,13 +7410,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawWrite( context.Background(), path, - schema.RawWriteRequest{ /* populate request parameters */ }, + schema.RawWriteRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6403,10 +7475,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadHealthStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6447,10 +7527,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadInitializationStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6491,10 +7579,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadReplicationStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6537,10 +7633,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadSanitizedConfigurationState( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6582,11 +7686,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadWrappingProperties( context.Background(), - schema.ReadWrappingPropertiesRequest{ /* populate request parameters */ }, + schema.ReadWrappingPropertiesRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6632,10 +7746,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptCancel( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6679,11 +7801,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptInitialize( context.Background(), - schema.RekeyAttemptInitializeRequest{ /* populate request parameters */ }, + schema.RekeyAttemptInitializeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6727,10 +7859,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptReadProgress( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6772,11 +7912,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptUpdate( context.Background(), - schema.RekeyAttemptUpdateRequest{ /* populate request parameters */ }, + schema.RekeyAttemptUpdateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6820,10 +7970,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyDeleteBackupKey( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6864,10 +8022,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyDeleteBackupRecoveryKey( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6908,10 +8074,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyReadBackupKey( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6952,10 +8126,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyReadBackupRecoveryKey( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6998,10 +8180,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyVerificationCancel( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7042,10 +8232,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyVerificationReadProgress( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7087,11 +8285,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyVerificationUpdate( context.Background(), - schema.RekeyVerificationUpdateRequest{ /* populate request parameters */ }, + schema.RekeyVerificationUpdateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7135,12 +8343,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) subsystem := "subsystem_example" // string | resp, err := client.System.ReloadSubsystem( context.Background(), subsystem, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7189,11 +8405,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Remount( context.Background(), - schema.RemountRequest{ /* populate request parameters */ }, + schema.RemountRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7237,12 +8463,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) migrationId := "migrationId_example" // string | The ID of the migration operation resp, err := client.System.RemountStatus( context.Background(), migrationId, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7291,11 +8525,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Rewrap( context.Background(), - schema.RewrapRequest{ /* populate request parameters */ }, + schema.RewrapRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7339,10 +8583,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationCancel( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7386,11 +8638,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationInitialize( context.Background(), - schema.RootTokenGenerationInitializeRequest{ /* populate request parameters */ }, + schema.RootTokenGenerationInitializeRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7434,10 +8696,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationReadProgress( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7481,11 +8751,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationUpdate( context.Background(), - schema.RootTokenGenerationUpdateRequest{ /* populate request parameters */ }, + schema.RootTokenGenerationUpdateRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7529,10 +8809,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Seal( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7573,10 +8861,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.SealStatus( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7619,10 +8915,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.StepDownLeader( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7664,13 +8968,23 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersConfigure( context.Background(), header, - schema.UiHeadersConfigureRequest{ /* populate request parameters */ }, + schema.UiHeadersConfigureRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7719,12 +9033,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersDeleteConfiguration( context.Background(), header, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7772,10 +9094,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.UiHeadersList( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7819,12 +9149,20 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersReadConfiguration( context.Background(), header, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7873,11 +9211,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Unseal( context.Background(), - schema.UnsealRequest{ /* populate request parameters */ }, + schema.UnsealRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7922,11 +9270,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Unwrap( context.Background(), - schema.UnwrapRequest{ /* populate request parameters */ }, + schema.UnwrapRequest{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7970,10 +9328,18 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.VersionHistory( context.Background(), + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8017,11 +9383,21 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Wrap( context.Background(), - map[string]interface{}{ /* populate request parameters */ }, + map[string]interface{}{ + // populate request parameters + }, + vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) diff --git a/generate/templates/api_doc.handlebars b/generate/templates/api_doc.handlebars index 3d29cd42..80f94df8 100644 --- a/generate/templates/api_doc.handlebars +++ b/generate/templates/api_doc.handlebars @@ -34,7 +34,14 @@ import ( ) func main() { - client := // a suitably configured *vault.Client (see top-level README.md) + client, err := vault.New( + vault.WithAddress("http://127.0.0.1:8200"), + ) + if err != nil { + log.Fatal(err) + } + + // TODO: authenticate if necessary (see the top-level README.md) {{! Oddly, vendorExtensions.x-go-example seems to only be available within allParams, and not within pathParams, queryParams, etc. }} {{~#each allParams}} @@ -51,7 +58,9 @@ func main() { {{paramName}}, {{~/not}}{{/each}} {{~#each bodyParams}} - {{#if isModel}}schema.{{/if}}{{dataType}}{ /* populate request parameters */ }, + {{#if isModel}}schema.{{/if}}{{dataType}}{ + // populate request parameters + }, {{~/each}} {{~#each queryParams}}{{#neq baseName "list"}} {{paramName}}, From c375ace2619b814bc36b415a61b7402658c1436c Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 15:12:59 -0400 Subject: [PATCH 4/7] regen --- docs/AuthApi.md | 246 --------------------------- docs/IdentityApi.md | 108 ------------ docs/SecretsApi.md | 394 -------------------------------------------- docs/SystemApi.md | 159 ------------------ 4 files changed, 907 deletions(-) diff --git a/docs/AuthApi.md b/docs/AuthApi.md index ffcf0c1f..02dacad4 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -280,7 +280,6 @@ func main() { resp, err := client.Auth.AliCloudDeleteAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -341,7 +340,6 @@ func main() { resp, err := client.Auth.AliCloudListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -405,7 +403,6 @@ func main() { schema.AliCloudLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -467,7 +464,6 @@ func main() { resp, err := client.Auth.AliCloudReadAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -534,7 +530,6 @@ func main() { schema.AliCloudWriteAuthRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -598,7 +593,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteBindSecretId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -661,7 +655,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteBoundCidrList( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -724,7 +717,6 @@ func main() { resp, err := client.Auth.AppRoleDeletePeriod( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -787,7 +779,6 @@ func main() { resp, err := client.Auth.AppRoleDeletePolicies( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -850,7 +841,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteRole( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -913,7 +903,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteSecretIdBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -976,7 +965,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteSecretIdNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1039,7 +1027,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteSecretIdTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1102,7 +1089,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteTokenBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1165,7 +1151,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteTokenMaxTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1228,7 +1213,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteTokenNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1291,7 +1275,6 @@ func main() { resp, err := client.Auth.AppRoleDeleteTokenTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1358,7 +1341,6 @@ func main() { schema.AppRoleDestroySecretIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1426,7 +1408,6 @@ func main() { schema.AppRoleDestroySecretIdByAccessorRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1488,7 +1469,6 @@ func main() { resp, err := client.Auth.AppRoleListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1550,7 +1530,6 @@ func main() { resp, err := client.Auth.AppRoleListSecretIds( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1616,7 +1595,6 @@ func main() { schema.AppRoleLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1682,7 +1660,6 @@ func main() { schema.AppRoleLookUpSecretIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1750,7 +1727,6 @@ func main() { schema.AppRoleLookUpSecretIdByAccessorRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1814,7 +1790,6 @@ func main() { resp, err := client.Auth.AppRoleReadBindSecretId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1877,7 +1852,6 @@ func main() { resp, err := client.Auth.AppRoleReadBoundCidrList( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -1940,7 +1914,6 @@ func main() { resp, err := client.Auth.AppRoleReadLocalSecretIds( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2003,7 +1976,6 @@ func main() { resp, err := client.Auth.AppRoleReadPeriod( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2066,7 +2038,6 @@ func main() { resp, err := client.Auth.AppRoleReadPolicies( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2129,7 +2100,6 @@ func main() { resp, err := client.Auth.AppRoleReadRole( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2192,7 +2162,6 @@ func main() { resp, err := client.Auth.AppRoleReadRoleId( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2255,7 +2224,6 @@ func main() { resp, err := client.Auth.AppRoleReadSecretIdBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2318,7 +2286,6 @@ func main() { resp, err := client.Auth.AppRoleReadSecretIdNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2381,7 +2348,6 @@ func main() { resp, err := client.Auth.AppRoleReadSecretIdTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2444,7 +2410,6 @@ func main() { resp, err := client.Auth.AppRoleReadTokenBoundCidrs( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2507,7 +2472,6 @@ func main() { resp, err := client.Auth.AppRoleReadTokenMaxTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2570,7 +2534,6 @@ func main() { resp, err := client.Auth.AppRoleReadTokenNumUses( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2633,7 +2596,6 @@ func main() { resp, err := client.Auth.AppRoleReadTokenTtl( context.Background(), roleName, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2694,7 +2656,6 @@ func main() { resp, err := client.Auth.AppRoleTidySecretId( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2759,7 +2720,6 @@ func main() { schema.AppRoleWriteBindSecretIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2827,7 +2787,6 @@ func main() { schema.AppRoleWriteBoundCidrListRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2895,7 +2854,6 @@ func main() { schema.AppRoleWriteCustomSecretIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -2963,7 +2921,6 @@ func main() { schema.AppRoleWritePeriodRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3031,7 +2988,6 @@ func main() { schema.AppRoleWritePoliciesRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3099,7 +3055,6 @@ func main() { schema.AppRoleWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3167,7 +3122,6 @@ func main() { schema.AppRoleWriteRoleIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3235,7 +3189,6 @@ func main() { schema.AppRoleWriteSecretIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3303,7 +3256,6 @@ func main() { schema.AppRoleWriteSecretIdBoundCidrsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3371,7 +3323,6 @@ func main() { schema.AppRoleWriteSecretIdNumUsesRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3439,7 +3390,6 @@ func main() { schema.AppRoleWriteSecretIdTtlRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3507,7 +3457,6 @@ func main() { schema.AppRoleWriteTokenBoundCidrsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3575,7 +3524,6 @@ func main() { schema.AppRoleWriteTokenMaxTtlRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3643,7 +3591,6 @@ func main() { schema.AppRoleWriteTokenNumUsesRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3711,7 +3658,6 @@ func main() { schema.AppRoleWriteTokenTtlRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("approle"), ) if err != nil { @@ -3779,7 +3725,6 @@ func main() { schema.AwsConfigureCertificateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3845,7 +3790,6 @@ func main() { schema.AwsConfigureClientRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3909,7 +3853,6 @@ func main() { schema.AwsConfigureIdentityAccessListTidyOperationRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -3973,7 +3916,6 @@ func main() { schema.AwsConfigureIdentityIntegrationRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4037,7 +3979,6 @@ func main() { schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4101,7 +4042,6 @@ func main() { schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4165,7 +4105,6 @@ func main() { schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4227,7 +4166,6 @@ func main() { resp, err := client.Auth.AwsDeleteAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4290,7 +4228,6 @@ func main() { resp, err := client.Auth.AwsDeleteCertificateConfiguration( context.Background(), certName, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4351,7 +4288,6 @@ func main() { resp, err := client.Auth.AwsDeleteClientConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4412,7 +4348,6 @@ func main() { resp, err := client.Auth.AwsDeleteIdentityAccessList( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4473,7 +4408,6 @@ func main() { resp, err := client.Auth.AwsDeleteIdentityAccessListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4534,7 +4468,6 @@ func main() { resp, err := client.Auth.AwsDeleteIdentityWhitelist( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4595,7 +4528,6 @@ func main() { resp, err := client.Auth.AwsDeleteIdentityWhitelistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4656,7 +4588,6 @@ func main() { resp, err := client.Auth.AwsDeleteRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4717,7 +4648,6 @@ func main() { resp, err := client.Auth.AwsDeleteRoleTagBlacklistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4778,7 +4708,6 @@ func main() { resp, err := client.Auth.AwsDeleteRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4839,7 +4768,6 @@ func main() { resp, err := client.Auth.AwsDeleteRoleTagDenyListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4900,7 +4828,6 @@ func main() { resp, err := client.Auth.AwsDeleteStsRole( context.Background(), accountId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -4961,7 +4888,6 @@ func main() { resp, err := client.Auth.AwsListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5021,7 +4947,6 @@ func main() { resp, err := client.Auth.AwsListCertificateConfigurations( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5081,7 +5006,6 @@ func main() { resp, err := client.Auth.AwsListIdentityAccessList( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5141,7 +5065,6 @@ func main() { resp, err := client.Auth.AwsListIdentityWhitelist( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5201,7 +5124,6 @@ func main() { resp, err := client.Auth.AwsListRoleTagBlacklists( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5261,7 +5183,6 @@ func main() { resp, err := client.Auth.AwsListRoleTagDenyLists( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5321,7 +5242,6 @@ func main() { resp, err := client.Auth.AwsListStsRoleRelationships( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5385,7 +5305,6 @@ func main() { schema.AwsLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5447,7 +5366,6 @@ func main() { resp, err := client.Auth.AwsReadAuthRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5510,7 +5428,6 @@ func main() { resp, err := client.Auth.AwsReadCertificateConfiguration( context.Background(), certName, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5571,7 +5488,6 @@ func main() { resp, err := client.Auth.AwsReadClientConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5632,7 +5548,6 @@ func main() { resp, err := client.Auth.AwsReadIdentityAccessList( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5693,7 +5608,6 @@ func main() { resp, err := client.Auth.AwsReadIdentityAccessListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5752,7 +5666,6 @@ func main() { resp, err := client.Auth.AwsReadIdentityIntegrationConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5813,7 +5726,6 @@ func main() { resp, err := client.Auth.AwsReadIdentityWhitelist( context.Background(), instanceId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5874,7 +5786,6 @@ func main() { resp, err := client.Auth.AwsReadIdentityWhitelistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5935,7 +5846,6 @@ func main() { resp, err := client.Auth.AwsReadRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -5996,7 +5906,6 @@ func main() { resp, err := client.Auth.AwsReadRoleTagBlacklistTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6057,7 +5966,6 @@ func main() { resp, err := client.Auth.AwsReadRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6118,7 +6026,6 @@ func main() { resp, err := client.Auth.AwsReadRoleTagDenyListTidySettings( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6179,7 +6086,6 @@ func main() { resp, err := client.Auth.AwsReadStsRole( context.Background(), accountId, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6240,7 +6146,6 @@ func main() { resp, err := client.Auth.AwsRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6303,7 +6208,6 @@ func main() { schema.AwsTidyIdentityAccessListRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6367,7 +6271,6 @@ func main() { schema.AwsTidyIdentityWhitelistRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6431,7 +6334,6 @@ func main() { schema.AwsTidyRoleTagBlacklistRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6495,7 +6397,6 @@ func main() { schema.AwsTidyRoleTagDenyListRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6561,7 +6462,6 @@ func main() { schema.AwsWriteAuthRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6629,7 +6529,6 @@ func main() { schema.AwsWriteRoleTagRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6693,7 +6592,6 @@ func main() { resp, err := client.Auth.AwsWriteRoleTagBlacklist( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6756,7 +6654,6 @@ func main() { resp, err := client.Auth.AwsWriteRoleTagDenyList( context.Background(), roleTag, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6823,7 +6720,6 @@ func main() { schema.AwsWriteStsRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -6889,7 +6785,6 @@ func main() { schema.AzureConfigureAuthRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -6949,7 +6844,6 @@ func main() { resp, err := client.Auth.AzureDeleteAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7010,7 +6904,6 @@ func main() { resp, err := client.Auth.AzureDeleteAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7071,7 +6964,6 @@ func main() { resp, err := client.Auth.AzureListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7135,7 +7027,6 @@ func main() { schema.AzureLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7195,7 +7086,6 @@ func main() { resp, err := client.Auth.AzureReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7256,7 +7146,6 @@ func main() { resp, err := client.Auth.AzureReadAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7317,7 +7206,6 @@ func main() { resp, err := client.Auth.AzureRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7382,7 +7270,6 @@ func main() { schema.AzureWriteAuthRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -7448,7 +7335,6 @@ func main() { schema.CentrifyConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7512,7 +7398,6 @@ func main() { schema.CentrifyLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7572,7 +7457,6 @@ func main() { resp, err := client.Auth.CentrifyReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("centrify"), ) if err != nil { @@ -7635,7 +7519,6 @@ func main() { schema.CertConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7697,7 +7580,6 @@ func main() { resp, err := client.Auth.CertDeleteCertificate( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7760,7 +7642,6 @@ func main() { resp, err := client.Auth.CertDeleteCrl( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7821,7 +7702,6 @@ func main() { resp, err := client.Auth.CertListCertificates( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7881,7 +7761,6 @@ func main() { resp, err := client.Auth.CertListCrls( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -7945,7 +7824,6 @@ func main() { schema.CertLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -8007,7 +7885,6 @@ func main() { resp, err := client.Auth.CertReadCertificate( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -8068,7 +7945,6 @@ func main() { resp, err := client.Auth.CertReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -8129,7 +8005,6 @@ func main() { resp, err := client.Auth.CertReadCrl( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -8196,7 +8071,6 @@ func main() { schema.CertWriteCertificateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -8264,7 +8138,6 @@ func main() { schema.CertWriteCrlRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cert"), ) if err != nil { @@ -8330,7 +8203,6 @@ func main() { schema.CloudFoundryConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8390,7 +8262,6 @@ func main() { resp, err := client.Auth.CloudFoundryDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8451,7 +8322,6 @@ func main() { resp, err := client.Auth.CloudFoundryDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8512,7 +8382,6 @@ func main() { resp, err := client.Auth.CloudFoundryListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8576,7 +8445,6 @@ func main() { schema.CloudFoundryLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8636,7 +8504,6 @@ func main() { resp, err := client.Auth.CloudFoundryReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8697,7 +8564,6 @@ func main() { resp, err := client.Auth.CloudFoundryReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8764,7 +8630,6 @@ func main() { schema.CloudFoundryWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("cf"), ) if err != nil { @@ -8830,7 +8695,6 @@ func main() { schema.GithubConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8892,7 +8756,6 @@ func main() { resp, err := client.Auth.GithubDeleteTeamMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -8955,7 +8818,6 @@ func main() { resp, err := client.Auth.GithubDeleteUserMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9016,7 +8878,6 @@ func main() { resp, err := client.Auth.GithubListTeams( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9076,7 +8937,6 @@ func main() { resp, err := client.Auth.GithubListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9140,7 +9000,6 @@ func main() { schema.GithubLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9200,7 +9059,6 @@ func main() { resp, err := client.Auth.GithubReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9261,7 +9119,6 @@ func main() { resp, err := client.Auth.GithubReadTeamMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9324,7 +9181,6 @@ func main() { resp, err := client.Auth.GithubReadUserMapping( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9391,7 +9247,6 @@ func main() { schema.GithubWriteTeamMappingRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9459,7 +9314,6 @@ func main() { schema.GithubWriteUserMappingRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("github"), ) if err != nil { @@ -9525,7 +9379,6 @@ func main() { schema.GoogleCloudConfigureAuthRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9587,7 +9440,6 @@ func main() { resp, err := client.Auth.GoogleCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9654,7 +9506,6 @@ func main() { schema.GoogleCloudEditLabelsForRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9722,7 +9573,6 @@ func main() { schema.GoogleCloudEditServiceAccountsForRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9784,7 +9634,6 @@ func main() { resp, err := client.Auth.GoogleCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9848,7 +9697,6 @@ func main() { schema.GoogleCloudLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9908,7 +9756,6 @@ func main() { resp, err := client.Auth.GoogleCloudReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -9969,7 +9816,6 @@ func main() { resp, err := client.Auth.GoogleCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -10036,7 +9882,6 @@ func main() { schema.GoogleCloudWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -10107,7 +9952,6 @@ func main() { schema.JwtConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10169,7 +10013,6 @@ func main() { resp, err := client.Auth.JwtDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10232,7 +10075,6 @@ func main() { resp, err := client.Auth.JwtListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10296,7 +10138,6 @@ func main() { schema.JwtLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10362,7 +10203,6 @@ func main() { clientNonce, code, state, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10428,7 +10268,6 @@ func main() { schema.JwtOidcCallbackFormPostRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10492,7 +10331,6 @@ func main() { schema.JwtOidcRequestAuthorizationUrlRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10552,7 +10390,6 @@ func main() { resp, err := client.Auth.JwtReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10613,7 +10450,6 @@ func main() { resp, err := client.Auth.JwtReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10685,7 +10521,6 @@ func main() { schema.JwtWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("jwt"), ) if err != nil { @@ -10751,7 +10586,6 @@ func main() { schema.KerberosConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10815,7 +10649,6 @@ func main() { schema.KerberosConfigureLdapRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10877,7 +10710,6 @@ func main() { resp, err := client.Auth.KerberosDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -10938,7 +10770,6 @@ func main() { resp, err := client.Auth.KerberosListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -11002,7 +10833,6 @@ func main() { schema.KerberosLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -11062,7 +10892,6 @@ func main() { resp, err := client.Auth.KerberosReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -11123,7 +10952,6 @@ func main() { resp, err := client.Auth.KerberosReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -11184,7 +11012,6 @@ func main() { resp, err := client.Auth.KerberosReadLdapConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -11249,7 +11076,6 @@ func main() { schema.KerberosWriteGroupRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kerberos"), ) if err != nil { @@ -11315,7 +11141,6 @@ func main() { schema.KubernetesConfigureAuthRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11377,7 +11202,6 @@ func main() { resp, err := client.Auth.KubernetesDeleteAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11438,7 +11262,6 @@ func main() { resp, err := client.Auth.KubernetesListAuthRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11502,7 +11325,6 @@ func main() { schema.KubernetesLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11562,7 +11384,6 @@ func main() { resp, err := client.Auth.KubernetesReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11623,7 +11444,6 @@ func main() { resp, err := client.Auth.KubernetesReadAuthRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11690,7 +11510,6 @@ func main() { schema.KubernetesWriteAuthRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11756,7 +11575,6 @@ func main() { schema.LdapConfigureAuthRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11818,7 +11636,6 @@ func main() { resp, err := client.Auth.LdapDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11881,7 +11698,6 @@ func main() { resp, err := client.Auth.LdapDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -11942,7 +11758,6 @@ func main() { resp, err := client.Auth.LdapListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12002,7 +11817,6 @@ func main() { resp, err := client.Auth.LdapListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12068,7 +11882,6 @@ func main() { schema.LdapLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12130,7 +11943,6 @@ func main() { resp, err := client.Auth.LdapReadAuthConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12191,7 +12003,6 @@ func main() { resp, err := client.Auth.LdapReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12254,7 +12065,6 @@ func main() { resp, err := client.Auth.LdapReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12321,7 +12131,6 @@ func main() { schema.LdapWriteGroupRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12389,7 +12198,6 @@ func main() { schema.LdapWriteUserRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -12455,7 +12263,6 @@ func main() { schema.OciConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12515,7 +12322,6 @@ func main() { resp, err := client.Auth.OciDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12576,7 +12382,6 @@ func main() { resp, err := client.Auth.OciDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12637,7 +12442,6 @@ func main() { resp, err := client.Auth.OciListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12703,7 +12507,6 @@ func main() { schema.OciLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12765,7 +12568,6 @@ func main() { resp, err := client.Auth.OciReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12826,7 +12628,6 @@ func main() { resp, err := client.Auth.OciReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12893,7 +12694,6 @@ func main() { schema.OciWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("oci"), ) if err != nil { @@ -12959,7 +12759,6 @@ func main() { schema.OktaConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13021,7 +12820,6 @@ func main() { resp, err := client.Auth.OktaDeleteGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13084,7 +12882,6 @@ func main() { resp, err := client.Auth.OktaDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13145,7 +12942,6 @@ func main() { resp, err := client.Auth.OktaListGroups( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13205,7 +13001,6 @@ func main() { resp, err := client.Auth.OktaListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13271,7 +13066,6 @@ func main() { schema.OktaLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13333,7 +13127,6 @@ func main() { resp, err := client.Auth.OktaReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13394,7 +13187,6 @@ func main() { resp, err := client.Auth.OktaReadGroup( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13457,7 +13249,6 @@ func main() { resp, err := client.Auth.OktaReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13520,7 +13311,6 @@ func main() { resp, err := client.Auth.OktaVerify( context.Background(), nonce, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13587,7 +13377,6 @@ func main() { schema.OktaWriteGroupRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13655,7 +13444,6 @@ func main() { schema.OktaWriteUserRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("okta"), ) if err != nil { @@ -13721,7 +13509,6 @@ func main() { schema.RadiusConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13783,7 +13570,6 @@ func main() { resp, err := client.Auth.RadiusDeleteUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13844,7 +13630,6 @@ func main() { resp, err := client.Auth.RadiusListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13908,7 +13693,6 @@ func main() { schema.RadiusLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -13974,7 +13758,6 @@ func main() { schema.RadiusLoginWithUsernameRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -14036,7 +13819,6 @@ func main() { resp, err := client.Auth.RadiusReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -14097,7 +13879,6 @@ func main() { resp, err := client.Auth.RadiusReadUser( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -14164,7 +13945,6 @@ func main() { schema.RadiusWriteUserRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("radius"), ) if err != nil { @@ -14230,7 +14010,6 @@ func main() { schema.TokenCreateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14291,7 +14070,6 @@ func main() { schema.TokenCreateAgainstRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14355,7 +14133,6 @@ func main() { schema.TokenCreateOrphanRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14412,7 +14189,6 @@ func main() { resp, err := client.Auth.TokenDeleteRole( context.Background(), roleName, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14471,7 +14247,6 @@ func main() { resp, err := client.Auth.TokenListAccessors( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14526,7 +14301,6 @@ func main() { resp, err := client.Auth.TokenListRoles( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14585,7 +14359,6 @@ func main() { schema.TokenLookUpRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14644,7 +14417,6 @@ func main() { schema.TokenLookUpAccessorRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14699,7 +14471,6 @@ func main() { resp, err := client.Auth.TokenLookUpSelf( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14753,7 +14524,6 @@ func main() { resp, err := client.Auth.TokenReadRole( context.Background(), roleName, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14816,7 +14586,6 @@ func main() { schema.TokenRenewRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14875,7 +14644,6 @@ func main() { schema.TokenRenewAccessorRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14934,7 +14702,6 @@ func main() { schema.TokenRenewSelfRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -14993,7 +14760,6 @@ func main() { schema.TokenRevokeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -15052,7 +14818,6 @@ func main() { schema.TokenRevokeAccessorRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -15111,7 +14876,6 @@ func main() { schema.TokenRevokeOrphanRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -15166,7 +14930,6 @@ func main() { resp, err := client.Auth.TokenRevokeSelf( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -15218,7 +14981,6 @@ func main() { resp, err := client.Auth.TokenTidy( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -15276,7 +15038,6 @@ func main() { schema.TokenWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -15338,7 +15099,6 @@ func main() { resp, err := client.Auth.UserpassDeleteUser( context.Background(), username, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15399,7 +15159,6 @@ func main() { resp, err := client.Auth.UserpassListUsers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15465,7 +15224,6 @@ func main() { schema.UserpassLoginRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15529,7 +15287,6 @@ func main() { resp, err := client.Auth.UserpassReadUser( context.Background(), username, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15596,7 +15353,6 @@ func main() { schema.UserpassResetPasswordRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15664,7 +15420,6 @@ func main() { schema.UserpassUpdatePoliciesRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { @@ -15732,7 +15487,6 @@ func main() { schema.UserpassWriteUserRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("userpass"), ) if err != nil { diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index 4c508f23..7d561994 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -144,7 +144,6 @@ func main() { schema.AliasCreateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -201,7 +200,6 @@ func main() { resp, err := client.Identity.AliasDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -260,7 +258,6 @@ func main() { resp, err := client.Identity.AliasListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -317,7 +314,6 @@ func main() { resp, err := client.Identity.AliasReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -382,7 +378,6 @@ func main() { schema.AliasUpdateByIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -446,7 +441,6 @@ func main() { schema.EntityBatchDeleteRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -505,7 +499,6 @@ func main() { schema.EntityCreateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -564,7 +557,6 @@ func main() { schema.EntityCreateAliasRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -621,7 +613,6 @@ func main() { resp, err := client.Identity.EntityDeleteAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -682,7 +673,6 @@ func main() { resp, err := client.Identity.EntityDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -743,7 +733,6 @@ func main() { resp, err := client.Identity.EntityDeleteByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -802,7 +791,6 @@ func main() { resp, err := client.Identity.EntityListAliasesById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -857,7 +845,6 @@ func main() { resp, err := client.Identity.EntityListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -912,7 +899,6 @@ func main() { resp, err := client.Identity.EntityListByName( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -971,7 +957,6 @@ func main() { schema.EntityLookUpRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1030,7 +1015,6 @@ func main() { schema.EntityMergeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1087,7 +1071,6 @@ func main() { resp, err := client.Identity.EntityReadAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1148,7 +1131,6 @@ func main() { resp, err := client.Identity.EntityReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1209,7 +1191,6 @@ func main() { resp, err := client.Identity.EntityReadByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1274,7 +1255,6 @@ func main() { schema.EntityUpdateAliasByIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1340,7 +1320,6 @@ func main() { schema.EntityUpdateByIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1406,7 +1385,6 @@ func main() { schema.EntityUpdateByNameRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1470,7 +1448,6 @@ func main() { schema.GroupCreateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1529,7 +1506,6 @@ func main() { schema.GroupCreateAliasRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1586,7 +1562,6 @@ func main() { resp, err := client.Identity.GroupDeleteAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1647,7 +1622,6 @@ func main() { resp, err := client.Identity.GroupDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1708,7 +1682,6 @@ func main() { resp, err := client.Identity.GroupDeleteByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1767,7 +1740,6 @@ func main() { resp, err := client.Identity.GroupListAliasesById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1822,7 +1794,6 @@ func main() { resp, err := client.Identity.GroupListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1877,7 +1848,6 @@ func main() { resp, err := client.Identity.GroupListByName( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1936,7 +1906,6 @@ func main() { schema.GroupLookUpRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1993,7 +1962,6 @@ func main() { resp, err := client.Identity.GroupReadAliasById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2054,7 +2022,6 @@ func main() { resp, err := client.Identity.GroupReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2115,7 +2082,6 @@ func main() { resp, err := client.Identity.GroupReadByName( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2180,7 +2146,6 @@ func main() { schema.GroupUpdateAliasByIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2246,7 +2211,6 @@ func main() { schema.GroupUpdateByIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2312,7 +2276,6 @@ func main() { schema.GroupUpdateByNameRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2376,7 +2339,6 @@ func main() { schema.MfaAdminDestroyTotpSecretRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2435,7 +2397,6 @@ func main() { schema.MfaAdminGenerateTotpSecretRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2494,7 +2455,6 @@ func main() { schema.MfaCreateDuoMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2553,7 +2513,6 @@ func main() { schema.MfaCreateOktaMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2612,7 +2571,6 @@ func main() { schema.MfaCreatePingIdMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2671,7 +2629,6 @@ func main() { schema.MfaCreateTotpMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2728,7 +2685,6 @@ func main() { resp, err := client.Identity.MfaDeleteDuoMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2789,7 +2745,6 @@ func main() { resp, err := client.Identity.MfaDeleteLoginEnforcement( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2850,7 +2805,6 @@ func main() { resp, err := client.Identity.MfaDeleteOktaMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2911,7 +2865,6 @@ func main() { resp, err := client.Identity.MfaDeletePingIdMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2972,7 +2925,6 @@ func main() { resp, err := client.Identity.MfaDeleteTotpMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3035,7 +2987,6 @@ func main() { schema.MfaGenerateTotpSecretRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3090,7 +3041,6 @@ func main() { resp, err := client.Identity.MfaListDuoMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3145,7 +3095,6 @@ func main() { resp, err := client.Identity.MfaListLoginEnforcements( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3200,7 +3149,6 @@ func main() { resp, err := client.Identity.MfaListMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3255,7 +3203,6 @@ func main() { resp, err := client.Identity.MfaListOktaMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3310,7 +3257,6 @@ func main() { resp, err := client.Identity.MfaListPingIdMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3365,7 +3311,6 @@ func main() { resp, err := client.Identity.MfaListTotpMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3422,7 +3367,6 @@ func main() { resp, err := client.Identity.MfaReadDuoMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3483,7 +3427,6 @@ func main() { resp, err := client.Identity.MfaReadLoginEnforcement( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3544,7 +3487,6 @@ func main() { resp, err := client.Identity.MfaReadMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3605,7 +3547,6 @@ func main() { resp, err := client.Identity.MfaReadOktaMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3666,7 +3607,6 @@ func main() { resp, err := client.Identity.MfaReadPingIdMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3727,7 +3667,6 @@ func main() { resp, err := client.Identity.MfaReadTotpMethod( context.Background(), methodId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3792,7 +3731,6 @@ func main() { schema.MfaUpdateDuoMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3858,7 +3796,6 @@ func main() { schema.MfaUpdateOktaMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3924,7 +3861,6 @@ func main() { schema.MfaUpdatePingIdMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3990,7 +3926,6 @@ func main() { schema.MfaUpdateTotpMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4056,7 +3991,6 @@ func main() { schema.MfaWriteLoginEnforcementRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4120,7 +4054,6 @@ func main() { schema.OidcConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4177,7 +4110,6 @@ func main() { resp, err := client.Identity.OidcDeleteAssignment( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4238,7 +4170,6 @@ func main() { resp, err := client.Identity.OidcDeleteClient( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4299,7 +4230,6 @@ func main() { resp, err := client.Identity.OidcDeleteKey( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4360,7 +4290,6 @@ func main() { resp, err := client.Identity.OidcDeleteProvider( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4421,7 +4350,6 @@ func main() { resp, err := client.Identity.OidcDeleteRole( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4482,7 +4410,6 @@ func main() { resp, err := client.Identity.OidcDeleteScope( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4543,7 +4470,6 @@ func main() { resp, err := client.Identity.OidcGenerateToken( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4606,7 +4532,6 @@ func main() { schema.OidcIntrospectRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4661,7 +4586,6 @@ func main() { resp, err := client.Identity.OidcListAssignments( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4716,7 +4640,6 @@ func main() { resp, err := client.Identity.OidcListClients( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4771,7 +4694,6 @@ func main() { resp, err := client.Identity.OidcListKeys( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4828,7 +4750,6 @@ func main() { resp, err := client.Identity.OidcListProviders( context.Background(), allowedClientId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4884,7 +4805,6 @@ func main() { resp, err := client.Identity.OidcListRoles( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4939,7 +4859,6 @@ func main() { resp, err := client.Identity.OidcListScopes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5014,7 +4933,6 @@ func main() { responseType, scope, state, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5088,7 +5006,6 @@ func main() { schema.OidcProviderAuthorizeWithParametersRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5154,7 +5071,6 @@ func main() { schema.OidcProviderTokenRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5216,7 +5132,6 @@ func main() { resp, err := client.Identity.OidcProviderUserInfo( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5277,7 +5192,6 @@ func main() { resp, err := client.Identity.OidcReadAssignment( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5338,7 +5252,6 @@ func main() { resp, err := client.Identity.OidcReadClient( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5397,7 +5310,6 @@ func main() { resp, err := client.Identity.OidcReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5451,7 +5363,6 @@ func main() { resp, err := client.Identity.OidcReadKey( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5510,7 +5421,6 @@ func main() { resp, err := client.Identity.OidcReadOpenIdConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5564,7 +5474,6 @@ func main() { resp, err := client.Identity.OidcReadProvider( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5625,7 +5534,6 @@ func main() { resp, err := client.Identity.OidcReadProviderOpenIdConfiguration( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5686,7 +5594,6 @@ func main() { resp, err := client.Identity.OidcReadProviderPublicKeys( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5745,7 +5652,6 @@ func main() { resp, err := client.Identity.OidcReadPublicKeys( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5799,7 +5705,6 @@ func main() { resp, err := client.Identity.OidcReadRole( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5860,7 +5765,6 @@ func main() { resp, err := client.Identity.OidcReadScope( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5925,7 +5829,6 @@ func main() { schema.OidcRotateKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5991,7 +5894,6 @@ func main() { schema.OidcWriteAssignmentRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6057,7 +5959,6 @@ func main() { schema.OidcWriteClientRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6123,7 +6024,6 @@ func main() { schema.OidcWriteKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6189,7 +6089,6 @@ func main() { schema.OidcWriteProviderRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6255,7 +6154,6 @@ func main() { schema.OidcWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6321,7 +6219,6 @@ func main() { schema.OidcWriteScopeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6385,7 +6282,6 @@ func main() { schema.PersonaCreateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6442,7 +6338,6 @@ func main() { resp, err := client.Identity.PersonaDeleteById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6501,7 +6396,6 @@ func main() { resp, err := client.Identity.PersonaListById( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6558,7 +6452,6 @@ func main() { resp, err := client.Identity.PersonaReadById( context.Background(), id, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6623,7 +6516,6 @@ func main() { schema.PersonaUpdateByIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index 217e0641..ed34222d 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -430,7 +430,6 @@ func main() { schema.AliCloudConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -490,7 +489,6 @@ func main() { resp, err := client.Secrets.AliCloudDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -551,7 +549,6 @@ func main() { resp, err := client.Secrets.AliCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -614,7 +611,6 @@ func main() { resp, err := client.Secrets.AliCloudGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -675,7 +671,6 @@ func main() { resp, err := client.Secrets.AliCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -735,7 +730,6 @@ func main() { resp, err := client.Secrets.AliCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -796,7 +790,6 @@ func main() { resp, err := client.Secrets.AliCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -863,7 +856,6 @@ func main() { schema.AliCloudWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("alicloud"), ) if err != nil { @@ -929,7 +921,6 @@ func main() { schema.AwsConfigureLeaseRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -993,7 +984,6 @@ func main() { schema.AwsConfigureRootIamCredentialsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1055,7 +1045,6 @@ func main() { resp, err := client.Secrets.AwsDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1118,7 +1107,6 @@ func main() { resp, err := client.Secrets.AwsDeleteStaticRolesName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1187,7 +1175,6 @@ func main() { roleArn, roleSessionName, ttl, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1257,7 +1244,6 @@ func main() { schema.AwsGenerateCredentialsWithParametersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1327,7 +1313,6 @@ func main() { roleArn, roleSessionName, ttl, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1397,7 +1382,6 @@ func main() { schema.AwsGenerateStsCredentialsWithParametersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1459,7 +1443,6 @@ func main() { resp, err := client.Secrets.AwsListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1519,7 +1502,6 @@ func main() { resp, err := client.Secrets.AwsReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1580,7 +1562,6 @@ func main() { resp, err := client.Secrets.AwsReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1641,7 +1622,6 @@ func main() { resp, err := client.Secrets.AwsReadRootIamCredentialsConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1702,7 +1682,6 @@ func main() { resp, err := client.Secrets.AwsReadStaticCredsName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1765,7 +1744,6 @@ func main() { resp, err := client.Secrets.AwsReadStaticRolesName( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1826,7 +1804,6 @@ func main() { resp, err := client.Secrets.AwsRotateRootIamCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1891,7 +1868,6 @@ func main() { schema.AwsWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -1959,7 +1935,6 @@ func main() { schema.AwsWriteStaticRolesNameRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("aws"), ) if err != nil { @@ -2025,7 +2000,6 @@ func main() { schema.AzureConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2085,7 +2059,6 @@ func main() { resp, err := client.Secrets.AzureDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2146,7 +2119,6 @@ func main() { resp, err := client.Secrets.AzureDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2207,7 +2179,6 @@ func main() { resp, err := client.Secrets.AzureListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2267,7 +2238,6 @@ func main() { resp, err := client.Secrets.AzureReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2328,7 +2298,6 @@ func main() { resp, err := client.Secrets.AzureReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2391,7 +2360,6 @@ func main() { resp, err := client.Secrets.AzureRequestServicePrincipalCredentials( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2452,7 +2420,6 @@ func main() { resp, err := client.Secrets.AzureRotateRoot( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2517,7 +2484,6 @@ func main() { schema.AzureWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("azure"), ) if err != nil { @@ -2583,7 +2549,6 @@ func main() { schema.ConsulConfigureAccessRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2645,7 +2610,6 @@ func main() { resp, err := client.Secrets.ConsulDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2708,7 +2672,6 @@ func main() { resp, err := client.Secrets.ConsulGenerateCredentials( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2769,7 +2732,6 @@ func main() { resp, err := client.Secrets.ConsulListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2829,7 +2791,6 @@ func main() { resp, err := client.Secrets.ConsulReadAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2890,7 +2851,6 @@ func main() { resp, err := client.Secrets.ConsulReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -2957,7 +2917,6 @@ func main() { schema.ConsulWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("consul"), ) if err != nil { @@ -3021,7 +2980,6 @@ func main() { resp, err := client.Secrets.CubbyholeDelete( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3084,7 +3042,6 @@ func main() { resp, err := client.Secrets.CubbyholeList( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3146,7 +3103,6 @@ func main() { resp, err := client.Secrets.CubbyholeRead( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3210,7 +3166,6 @@ func main() { map[string]interface{}{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3276,7 +3231,6 @@ func main() { schema.DatabaseConfigureConnectionRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3340,7 +3294,6 @@ func main() { resp, err := client.Secrets.DatabaseDeleteConnectionConfiguration( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3403,7 +3356,6 @@ func main() { resp, err := client.Secrets.DatabaseDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3466,7 +3418,6 @@ func main() { resp, err := client.Secrets.DatabaseDeleteStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3529,7 +3480,6 @@ func main() { resp, err := client.Secrets.DatabaseGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3590,7 +3540,6 @@ func main() { resp, err := client.Secrets.DatabaseListConnections( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3650,7 +3599,6 @@ func main() { resp, err := client.Secrets.DatabaseListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3710,7 +3658,6 @@ func main() { resp, err := client.Secrets.DatabaseListStaticRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3772,7 +3719,6 @@ func main() { resp, err := client.Secrets.DatabaseReadConnectionConfiguration( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3835,7 +3781,6 @@ func main() { resp, err := client.Secrets.DatabaseReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3898,7 +3843,6 @@ func main() { resp, err := client.Secrets.DatabaseReadStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -3961,7 +3905,6 @@ func main() { resp, err := client.Secrets.DatabaseReadStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4024,7 +3967,6 @@ func main() { resp, err := client.Secrets.DatabaseResetConnection( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4087,7 +4029,6 @@ func main() { resp, err := client.Secrets.DatabaseRotateRootCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4150,7 +4091,6 @@ func main() { resp, err := client.Secrets.DatabaseRotateStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4217,7 +4157,6 @@ func main() { schema.DatabaseWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4285,7 +4224,6 @@ func main() { schema.DatabaseWriteStaticRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("database"), ) if err != nil { @@ -4351,7 +4289,6 @@ func main() { schema.GoogleCloudConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4413,7 +4350,6 @@ func main() { resp, err := client.Secrets.GoogleCloudDeleteImpersonatedAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4476,7 +4412,6 @@ func main() { resp, err := client.Secrets.GoogleCloudDeleteRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4539,7 +4474,6 @@ func main() { resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4602,7 +4536,6 @@ func main() { resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4665,7 +4598,6 @@ func main() { resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken( context.Background(), roleset, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4732,7 +4664,6 @@ func main() { schema.GoogleCloudGenerateRolesetKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4796,7 +4727,6 @@ func main() { resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessToken( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4863,7 +4793,6 @@ func main() { schema.GoogleCloudGenerateStaticAccountKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -4929,7 +4858,6 @@ func main() { schema.GoogleCloudKmsConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4995,7 +4923,6 @@ func main() { schema.GoogleCloudKmsConfigureKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5063,7 +4990,6 @@ func main() { schema.GoogleCloudKmsDecryptRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5125,7 +5051,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5186,7 +5111,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsDeleteKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5249,7 +5173,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsDeregisterKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5316,7 +5239,6 @@ func main() { schema.GoogleCloudKmsEncryptRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5378,7 +5300,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5438,7 +5359,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5499,7 +5419,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsReadKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5562,7 +5481,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsReadKeyConfiguration( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5629,7 +5547,6 @@ func main() { schema.GoogleCloudKmsReencryptRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5697,7 +5614,6 @@ func main() { schema.GoogleCloudKmsRegisterKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5761,7 +5677,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsRetrievePublicKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5824,7 +5739,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsRotateKey( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5891,7 +5805,6 @@ func main() { schema.GoogleCloudKmsSignRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5955,7 +5868,6 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions( context.Background(), key, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -6022,7 +5934,6 @@ func main() { schema.GoogleCloudKmsVerifyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -6090,7 +6001,6 @@ func main() { schema.GoogleCloudKmsWriteKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcpkms"), ) if err != nil { @@ -6152,7 +6062,6 @@ func main() { resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6212,7 +6121,6 @@ func main() { resp, err := client.Secrets.GoogleCloudListRolesets( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6272,7 +6180,6 @@ func main() { resp, err := client.Secrets.GoogleCloudListStaticAccounts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6332,7 +6239,6 @@ func main() { resp, err := client.Secrets.GoogleCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6393,7 +6299,6 @@ func main() { resp, err := client.Secrets.GoogleCloudReadImpersonatedAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6456,7 +6361,6 @@ func main() { resp, err := client.Secrets.GoogleCloudReadRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6519,7 +6423,6 @@ func main() { resp, err := client.Secrets.GoogleCloudReadStaticAccount( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6582,7 +6485,6 @@ func main() { resp, err := client.Secrets.GoogleCloudRotateRoleset( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6645,7 +6547,6 @@ func main() { resp, err := client.Secrets.GoogleCloudRotateRolesetKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6706,7 +6607,6 @@ func main() { resp, err := client.Secrets.GoogleCloudRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6767,7 +6667,6 @@ func main() { resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6834,7 +6733,6 @@ func main() { schema.GoogleCloudWriteImpersonatedAccountRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6902,7 +6800,6 @@ func main() { schema.GoogleCloudWriteRolesetRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -6970,7 +6867,6 @@ func main() { schema.GoogleCloudWriteStaticAccountRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("gcp"), ) if err != nil { @@ -7032,7 +6928,6 @@ func main() { resp, err := client.Secrets.KubernetesCheckConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7095,7 +6990,6 @@ func main() { schema.KubernetesConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7155,7 +7049,6 @@ func main() { resp, err := client.Secrets.KubernetesDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7216,7 +7109,6 @@ func main() { resp, err := client.Secrets.KubernetesDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7283,7 +7175,6 @@ func main() { schema.KubernetesGenerateCredentialsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7345,7 +7236,6 @@ func main() { resp, err := client.Secrets.KubernetesListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7405,7 +7295,6 @@ func main() { resp, err := client.Secrets.KubernetesReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7466,7 +7355,6 @@ func main() { resp, err := client.Secrets.KubernetesReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7533,7 +7421,6 @@ func main() { schema.KubernetesWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7597,7 +7484,6 @@ func main() { resp, err := client.Secrets.KvV1Delete( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7660,7 +7546,6 @@ func main() { resp, err := client.Secrets.KvV1List( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7724,7 +7609,6 @@ func main() { resp, err := client.Secrets.KvV1Read( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7790,7 +7674,6 @@ func main() { map[string]interface{}{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7856,7 +7739,6 @@ func main() { schema.KvV2ConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7918,7 +7800,6 @@ func main() { resp, err := client.Secrets.KvV2Delete( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7981,7 +7862,6 @@ func main() { resp, err := client.Secrets.KvV2DeleteMetadataAndAllVersions( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8048,7 +7928,6 @@ func main() { schema.KvV2DeleteVersionsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8116,7 +7995,6 @@ func main() { schema.KvV2DestroyVersionsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8180,7 +8058,6 @@ func main() { resp, err := client.Secrets.KvV2List( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8244,7 +8121,6 @@ func main() { resp, err := client.Secrets.KvV2Read( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8305,7 +8181,6 @@ func main() { resp, err := client.Secrets.KvV2ReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8366,7 +8241,6 @@ func main() { resp, err := client.Secrets.KvV2ReadMetadata( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8429,7 +8303,6 @@ func main() { resp, err := client.Secrets.KvV2ReadSubkeys( context.Background(), path, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8496,7 +8369,6 @@ func main() { schema.KvV2UndeleteVersionsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8564,7 +8436,6 @@ func main() { schema.KvV2WriteRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8632,7 +8503,6 @@ func main() { schema.KvV2WriteMetadataRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8698,7 +8568,6 @@ func main() { schema.LdapConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8758,7 +8627,6 @@ func main() { resp, err := client.Secrets.LdapDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8819,7 +8687,6 @@ func main() { resp, err := client.Secrets.LdapDeleteDynamicRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8882,7 +8749,6 @@ func main() { resp, err := client.Secrets.LdapDeleteStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -8949,7 +8815,6 @@ func main() { schema.LdapLibraryCheckInRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9017,7 +8882,6 @@ func main() { schema.LdapLibraryCheckOutRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9081,7 +8945,6 @@ func main() { resp, err := client.Secrets.LdapLibraryCheckStatus( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9148,7 +9011,6 @@ func main() { schema.LdapLibraryConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9212,7 +9074,6 @@ func main() { resp, err := client.Secrets.LdapLibraryDelete( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9279,7 +9140,6 @@ func main() { schema.LdapLibraryForceCheckInRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9341,7 +9201,6 @@ func main() { resp, err := client.Secrets.LdapLibraryList( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9403,7 +9262,6 @@ func main() { resp, err := client.Secrets.LdapLibraryRead( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9464,7 +9322,6 @@ func main() { resp, err := client.Secrets.LdapListDynamicRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9524,7 +9381,6 @@ func main() { resp, err := client.Secrets.LdapListStaticRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9584,7 +9440,6 @@ func main() { resp, err := client.Secrets.LdapReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9645,7 +9500,6 @@ func main() { resp, err := client.Secrets.LdapReadDynamicRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9708,7 +9562,6 @@ func main() { resp, err := client.Secrets.LdapReadStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9771,7 +9624,6 @@ func main() { resp, err := client.Secrets.LdapRequestDynamicRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9834,7 +9686,6 @@ func main() { resp, err := client.Secrets.LdapRequestStaticRoleCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9895,7 +9746,6 @@ func main() { resp, err := client.Secrets.LdapRotateRootCredentials( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -9956,7 +9806,6 @@ func main() { resp, err := client.Secrets.LdapRotateStaticRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10023,7 +9872,6 @@ func main() { schema.LdapWriteDynamicRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10091,7 +9939,6 @@ func main() { schema.LdapWriteStaticRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ldap"), ) if err != nil { @@ -10157,7 +10004,6 @@ func main() { schema.MongoDbAtlasConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10219,7 +10065,6 @@ func main() { resp, err := client.Secrets.MongoDbAtlasDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10282,7 +10127,6 @@ func main() { resp, err := client.Secrets.MongoDbAtlasGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10343,7 +10187,6 @@ func main() { resp, err := client.Secrets.MongoDbAtlasListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10403,7 +10246,6 @@ func main() { resp, err := client.Secrets.MongoDbAtlasReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10464,7 +10306,6 @@ func main() { resp, err := client.Secrets.MongoDbAtlasReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10531,7 +10372,6 @@ func main() { schema.MongoDbAtlasWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10597,7 +10437,6 @@ func main() { schema.NomadConfigureAccessRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10661,7 +10500,6 @@ func main() { schema.NomadConfigureLeaseRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10721,7 +10559,6 @@ func main() { resp, err := client.Secrets.NomadDeleteAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10780,7 +10617,6 @@ func main() { resp, err := client.Secrets.NomadDeleteLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10841,7 +10677,6 @@ func main() { resp, err := client.Secrets.NomadDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10904,7 +10739,6 @@ func main() { resp, err := client.Secrets.NomadGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -10965,7 +10799,6 @@ func main() { resp, err := client.Secrets.NomadListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -11025,7 +10858,6 @@ func main() { resp, err := client.Secrets.NomadReadAccessConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -11084,7 +10916,6 @@ func main() { resp, err := client.Secrets.NomadReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -11145,7 +10976,6 @@ func main() { resp, err := client.Secrets.NomadReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -11212,7 +11042,6 @@ func main() { schema.NomadWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("nomad"), ) if err != nil { @@ -11278,7 +11107,6 @@ func main() { schema.PkiConfigureAcmeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11342,7 +11170,6 @@ func main() { schema.PkiConfigureAutoTidyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11406,7 +11233,6 @@ func main() { schema.PkiConfigureCaRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11470,7 +11296,6 @@ func main() { schema.PkiConfigureClusterRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11534,7 +11359,6 @@ func main() { schema.PkiConfigureCrlRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11598,7 +11422,6 @@ func main() { schema.PkiConfigureIssuersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11662,7 +11485,6 @@ func main() { schema.PkiConfigureKeysRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11726,7 +11548,6 @@ func main() { schema.PkiConfigureUrlsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11790,7 +11611,6 @@ func main() { schema.PkiCrossSignIntermediateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11852,7 +11672,6 @@ func main() { resp, err := client.Secrets.PkiDeleteEabKey( context.Background(), keyId, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11915,7 +11734,6 @@ func main() { resp, err := client.Secrets.PkiDeleteIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -11978,7 +11796,6 @@ func main() { resp, err := client.Secrets.PkiDeleteKey( context.Background(), keyRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12041,7 +11858,6 @@ func main() { resp, err := client.Secrets.PkiDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12102,7 +11918,6 @@ func main() { resp, err := client.Secrets.PkiDeleteRoot( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12161,7 +11976,6 @@ func main() { resp, err := client.Secrets.PkiGenerateEabKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12222,7 +12036,6 @@ func main() { resp, err := client.Secrets.PkiGenerateEabKeyForIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12287,7 +12100,6 @@ func main() { context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12352,7 +12164,6 @@ func main() { resp, err := client.Secrets.PkiGenerateEabKeyForRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12417,7 +12228,6 @@ func main() { schema.PkiGenerateExportedKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12483,7 +12293,6 @@ func main() { schema.PkiGenerateIntermediateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12549,7 +12358,6 @@ func main() { schema.PkiGenerateInternalKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12613,7 +12421,6 @@ func main() { schema.PkiGenerateKmsKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12679,7 +12486,6 @@ func main() { schema.PkiGenerateRootRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12745,7 +12551,6 @@ func main() { schema.PkiImportKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12811,7 +12616,6 @@ func main() { schema.PkiIssueWithRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12881,7 +12685,6 @@ func main() { schema.PkiIssuerIssueWithRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -12947,7 +12750,6 @@ func main() { resp, err := client.Secrets.PkiIssuerReadCrl( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13010,7 +12812,6 @@ func main() { resp, err := client.Secrets.PkiIssuerReadCrlDelta( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13073,7 +12874,6 @@ func main() { resp, err := client.Secrets.PkiIssuerReadCrlDeltaDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13136,7 +12936,6 @@ func main() { resp, err := client.Secrets.PkiIssuerReadCrlDeltaPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13199,7 +12998,6 @@ func main() { resp, err := client.Secrets.PkiIssuerReadCrlDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13262,7 +13060,6 @@ func main() { resp, err := client.Secrets.PkiIssuerReadCrlPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13329,7 +13126,6 @@ func main() { schema.PkiIssuerResignCrlsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13397,7 +13193,6 @@ func main() { schema.PkiIssuerSignIntermediateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13465,7 +13260,6 @@ func main() { schema.PkiIssuerSignRevocationListRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13533,7 +13327,6 @@ func main() { schema.PkiIssuerSignSelfIssuedRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13601,7 +13394,6 @@ func main() { schema.PkiIssuerSignVerbatimRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13671,7 +13463,6 @@ func main() { schema.PkiIssuerSignVerbatimWithRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13743,7 +13534,6 @@ func main() { schema.PkiIssuerSignWithRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13813,7 +13603,6 @@ func main() { schema.PkiIssuersGenerateIntermediateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13881,7 +13670,6 @@ func main() { schema.PkiIssuersGenerateRootRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -13947,7 +13735,6 @@ func main() { schema.PkiIssuersImportBundleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14011,7 +13798,6 @@ func main() { schema.PkiIssuersImportCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14071,7 +13857,6 @@ func main() { resp, err := client.Secrets.PkiListCerts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14131,7 +13916,6 @@ func main() { resp, err := client.Secrets.PkiListEabKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14191,7 +13975,6 @@ func main() { resp, err := client.Secrets.PkiListIssuers( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14251,7 +14034,6 @@ func main() { resp, err := client.Secrets.PkiListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14311,7 +14093,6 @@ func main() { resp, err := client.Secrets.PkiListRevokedCerts( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14371,7 +14152,6 @@ func main() { resp, err := client.Secrets.PkiListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14431,7 +14211,6 @@ func main() { resp, err := client.Secrets.PkiQueryOcsp( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14492,7 +14271,6 @@ func main() { resp, err := client.Secrets.PkiQueryOcspWithGetReq( context.Background(), req, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14553,7 +14331,6 @@ func main() { resp, err := client.Secrets.PkiReadAcmeConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14612,7 +14389,6 @@ func main() { resp, err := client.Secrets.PkiReadAcmeDirectory( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14671,7 +14447,6 @@ func main() { resp, err := client.Secrets.PkiReadAcmeNewNonce( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14730,7 +14505,6 @@ func main() { resp, err := client.Secrets.PkiReadAutoTidyConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14789,7 +14563,6 @@ func main() { resp, err := client.Secrets.PkiReadCaChainPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14848,7 +14621,6 @@ func main() { resp, err := client.Secrets.PkiReadCaDer( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14907,7 +14679,6 @@ func main() { resp, err := client.Secrets.PkiReadCaPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -14968,7 +14739,6 @@ func main() { resp, err := client.Secrets.PkiReadCert( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15029,7 +14799,6 @@ func main() { resp, err := client.Secrets.PkiReadCertCaChain( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15088,7 +14857,6 @@ func main() { resp, err := client.Secrets.PkiReadCertCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15147,7 +14915,6 @@ func main() { resp, err := client.Secrets.PkiReadCertDeltaCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15208,7 +14975,6 @@ func main() { resp, err := client.Secrets.PkiReadCertRawDer( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15271,7 +15037,6 @@ func main() { resp, err := client.Secrets.PkiReadCertRawPem( context.Background(), serial, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15332,7 +15097,6 @@ func main() { resp, err := client.Secrets.PkiReadClusterConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15391,7 +15155,6 @@ func main() { resp, err := client.Secrets.PkiReadCrlConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15450,7 +15213,6 @@ func main() { resp, err := client.Secrets.PkiReadCrlDelta( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15509,7 +15271,6 @@ func main() { resp, err := client.Secrets.PkiReadCrlDeltaPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15568,7 +15329,6 @@ func main() { resp, err := client.Secrets.PkiReadCrlDer( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15627,7 +15387,6 @@ func main() { resp, err := client.Secrets.PkiReadCrlPem( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15688,7 +15447,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15751,7 +15509,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuerDer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15814,7 +15571,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeDirectory( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15877,7 +15633,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeNewNonce( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -15942,7 +15697,6 @@ func main() { context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16009,7 +15763,6 @@ func main() { context.Background(), issuerRef, role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16074,7 +15827,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuerJson( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16137,7 +15889,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuerPem( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16198,7 +15949,6 @@ func main() { resp, err := client.Secrets.PkiReadIssuersConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16259,7 +16009,6 @@ func main() { resp, err := client.Secrets.PkiReadKey( context.Background(), keyRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16320,7 +16069,6 @@ func main() { resp, err := client.Secrets.PkiReadKeysConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16381,7 +16129,6 @@ func main() { resp, err := client.Secrets.PkiReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16444,7 +16191,6 @@ func main() { resp, err := client.Secrets.PkiReadRolesRoleAcmeDirectory( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16507,7 +16253,6 @@ func main() { resp, err := client.Secrets.PkiReadRolesRoleAcmeNewNonce( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16568,7 +16313,6 @@ func main() { resp, err := client.Secrets.PkiReadUrlsConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16631,7 +16375,6 @@ func main() { schema.PkiReplaceRootRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16695,7 +16438,6 @@ func main() { schema.PkiRevokeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16757,7 +16499,6 @@ func main() { resp, err := client.Secrets.PkiRevokeIssuer( context.Background(), issuerRef, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16822,7 +16563,6 @@ func main() { schema.PkiRevokeWithKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16886,7 +16626,6 @@ func main() { schema.PkiRootSignIntermediateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -16950,7 +16689,6 @@ func main() { schema.PkiRootSignSelfIssuedRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17010,7 +16748,6 @@ func main() { resp, err := client.Secrets.PkiRotateCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17069,7 +16806,6 @@ func main() { resp, err := client.Secrets.PkiRotateDeltaCrl( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17134,7 +16870,6 @@ func main() { schema.PkiRotateRootRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17200,7 +16935,6 @@ func main() { schema.PkiSetSignedIntermediateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17264,7 +16998,6 @@ func main() { schema.PkiSignVerbatimRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17330,7 +17063,6 @@ func main() { schema.PkiSignVerbatimWithRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17398,7 +17130,6 @@ func main() { schema.PkiSignWithRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17464,7 +17195,6 @@ func main() { schema.PkiTidyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17524,7 +17254,6 @@ func main() { resp, err := client.Secrets.PkiTidyCancel( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17583,7 +17312,6 @@ func main() { resp, err := client.Secrets.PkiTidyStatus( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17648,7 +17376,6 @@ func main() { schema.PkiWriteAcmeAccountKidRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17716,7 +17443,6 @@ func main() { schema.PkiWriteAcmeAuthorizationAuthIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17786,7 +17512,6 @@ func main() { schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17854,7 +17579,6 @@ func main() { schema.PkiWriteAcmeNewAccountRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17918,7 +17642,6 @@ func main() { schema.PkiWriteAcmeNewOrderRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -17984,7 +17707,6 @@ func main() { schema.PkiWriteAcmeOrderOrderIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18052,7 +17774,6 @@ func main() { schema.PkiWriteAcmeOrderOrderIdCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18120,7 +17841,6 @@ func main() { schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18186,7 +17906,6 @@ func main() { schema.PkiWriteAcmeOrdersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18250,7 +17969,6 @@ func main() { schema.PkiWriteAcmeRevokeCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18316,7 +18034,6 @@ func main() { schema.PkiWriteIssuerRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18386,7 +18103,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18458,7 +18174,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18532,7 +18247,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18604,7 +18318,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18672,7 +18385,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18742,7 +18454,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18814,7 +18525,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18886,7 +18596,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -18956,7 +18665,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19024,7 +18732,6 @@ func main() { schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19096,7 +18803,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19172,7 +18878,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19250,7 +18955,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19326,7 +19030,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19398,7 +19101,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19472,7 +19174,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19548,7 +19249,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19624,7 +19324,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19698,7 +19397,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19770,7 +19468,6 @@ func main() { schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19840,7 +19537,6 @@ func main() { schema.PkiWriteKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19908,7 +19604,6 @@ func main() { schema.PkiWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -19978,7 +19673,6 @@ func main() { schema.PkiWriteRolesRoleAcmeAccountKidRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20050,7 +19744,6 @@ func main() { schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20124,7 +19817,6 @@ func main() { schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20196,7 +19888,6 @@ func main() { schema.PkiWriteRolesRoleAcmeNewAccountRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20264,7 +19955,6 @@ func main() { schema.PkiWriteRolesRoleAcmeNewOrderRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20334,7 +20024,6 @@ func main() { schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20406,7 +20095,6 @@ func main() { schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20478,7 +20166,6 @@ func main() { schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20548,7 +20235,6 @@ func main() { schema.PkiWriteRolesRoleAcmeOrdersRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20616,7 +20302,6 @@ func main() { schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("pki"), ) if err != nil { @@ -20682,7 +20367,6 @@ func main() { schema.RabbitMqConfigureConnectionRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20746,7 +20430,6 @@ func main() { schema.RabbitMqConfigureLeaseRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20808,7 +20491,6 @@ func main() { resp, err := client.Secrets.RabbitMqDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20869,7 +20551,6 @@ func main() { resp, err := client.Secrets.RabbitMqListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20929,7 +20610,6 @@ func main() { resp, err := client.Secrets.RabbitMqReadLeaseConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20990,7 +20670,6 @@ func main() { resp, err := client.Secrets.RabbitMqReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -21053,7 +20732,6 @@ func main() { resp, err := client.Secrets.RabbitMqRequestCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -21120,7 +20798,6 @@ func main() { schema.RabbitMqWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -21186,7 +20863,6 @@ func main() { schema.SshConfigureCaRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21250,7 +20926,6 @@ func main() { schema.SshConfigureZeroAddressRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21310,7 +20985,6 @@ func main() { resp, err := client.Secrets.SshDeleteCaConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21371,7 +21045,6 @@ func main() { resp, err := client.Secrets.SshDeleteRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21432,7 +21105,6 @@ func main() { resp, err := client.Secrets.SshDeleteZeroAddressConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21497,7 +21169,6 @@ func main() { schema.SshGenerateCredentialsRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21565,7 +21236,6 @@ func main() { schema.SshIssueCertificateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21627,7 +21297,6 @@ func main() { resp, err := client.Secrets.SshListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21691,7 +21360,6 @@ func main() { schema.SshListRolesByIpRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21751,7 +21419,6 @@ func main() { resp, err := client.Secrets.SshReadCaConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21810,7 +21477,6 @@ func main() { resp, err := client.Secrets.SshReadPublicKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21871,7 +21537,6 @@ func main() { resp, err := client.Secrets.SshReadRole( context.Background(), role, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21932,7 +21597,6 @@ func main() { resp, err := client.Secrets.SshReadZeroAddressConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -21997,7 +21661,6 @@ func main() { schema.SshSignCertificateRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -22059,7 +21722,6 @@ func main() { resp, err := client.Secrets.SshTidyDynamicHostKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -22122,7 +21784,6 @@ func main() { schema.SshVerifyOtpRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -22188,7 +21849,6 @@ func main() { schema.SshWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("ssh"), ) if err != nil { @@ -22254,7 +21914,6 @@ func main() { schema.TerraformCloudConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22314,7 +21973,6 @@ func main() { resp, err := client.Secrets.TerraformCloudDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22375,7 +22033,6 @@ func main() { resp, err := client.Secrets.TerraformCloudDeleteRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22438,7 +22095,6 @@ func main() { resp, err := client.Secrets.TerraformCloudGenerateCredentials( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22499,7 +22155,6 @@ func main() { resp, err := client.Secrets.TerraformCloudListRoles( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22559,7 +22214,6 @@ func main() { resp, err := client.Secrets.TerraformCloudReadConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22620,7 +22274,6 @@ func main() { resp, err := client.Secrets.TerraformCloudReadRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22683,7 +22336,6 @@ func main() { resp, err := client.Secrets.TerraformCloudRotateRole( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22750,7 +22402,6 @@ func main() { schema.TerraformCloudWriteRoleRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("terraform"), ) if err != nil { @@ -22818,7 +22469,6 @@ func main() { schema.TotpCreateKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22882,7 +22532,6 @@ func main() { resp, err := client.Secrets.TotpDeleteKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -22945,7 +22594,6 @@ func main() { resp, err := client.Secrets.TotpGenerateCode( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -23006,7 +22654,6 @@ func main() { resp, err := client.Secrets.TotpListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -23068,7 +22715,6 @@ func main() { resp, err := client.Secrets.TotpReadKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -23135,7 +22781,6 @@ func main() { schema.TotpValidateCodeRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("totp"), ) if err != nil { @@ -23199,7 +22844,6 @@ func main() { resp, err := client.Secrets.TransitBackUpKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23264,7 +22908,6 @@ func main() { context.Background(), destination, source, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23333,7 +22976,6 @@ func main() { destination, source, version, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23402,7 +23044,6 @@ func main() { schema.TransitConfigureCacheRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23468,7 +23109,6 @@ func main() { schema.TransitConfigureKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23534,7 +23174,6 @@ func main() { schema.TransitConfigureKeysRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23600,7 +23239,6 @@ func main() { schema.TransitCreateKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23668,7 +23306,6 @@ func main() { schema.TransitDecryptRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23732,7 +23369,6 @@ func main() { resp, err := client.Secrets.TransitDeleteKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23799,7 +23435,6 @@ func main() { schema.TransitEncryptRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23865,7 +23500,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -23934,7 +23568,6 @@ func main() { name, type_, version, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24005,7 +23638,6 @@ func main() { schema.TransitGenerateCsrForKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24075,7 +23707,6 @@ func main() { schema.TransitGenerateDataKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24145,7 +23776,6 @@ func main() { schema.TransitGenerateHmacRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24215,7 +23845,6 @@ func main() { schema.TransitGenerateHmacWithAlgorithmRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24283,7 +23912,6 @@ func main() { schema.TransitGenerateRandomRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24349,7 +23977,6 @@ func main() { schema.TransitGenerateRandomWithBytesRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24417,7 +24044,6 @@ func main() { schema.TransitGenerateRandomWithSourceRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24487,7 +24113,6 @@ func main() { schema.TransitGenerateRandomWithSourceAndBytesRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24555,7 +24180,6 @@ func main() { schema.TransitHashRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24621,7 +24245,6 @@ func main() { schema.TransitHashWithAlgorithmRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24689,7 +24312,6 @@ func main() { schema.TransitImportKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24757,7 +24379,6 @@ func main() { schema.TransitImportKeyVersionRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24819,7 +24440,6 @@ func main() { resp, err := client.Secrets.TransitListKeys( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24879,7 +24499,6 @@ func main() { resp, err := client.Secrets.TransitReadCacheConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -24940,7 +24559,6 @@ func main() { resp, err := client.Secrets.TransitReadKey( context.Background(), name, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25001,7 +24619,6 @@ func main() { resp, err := client.Secrets.TransitReadKeysConfiguration( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25060,7 +24677,6 @@ func main() { resp, err := client.Secrets.TransitReadWrappingKey( context.Background(), - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25125,7 +24741,6 @@ func main() { schema.TransitRestoreAndRenameKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25191,7 +24806,6 @@ func main() { schema.TransitRestoreKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25257,7 +24871,6 @@ func main() { schema.TransitRewrapRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25325,7 +24938,6 @@ func main() { schema.TransitRotateKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25393,7 +25005,6 @@ func main() { schema.TransitSetCertificateForKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25461,7 +25072,6 @@ func main() { schema.TransitSignRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25531,7 +25141,6 @@ func main() { schema.TransitSignWithAlgorithmRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25601,7 +25210,6 @@ func main() { schema.TransitTrimKeyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25669,7 +25277,6 @@ func main() { schema.TransitVerifyRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { @@ -25739,7 +25346,6 @@ func main() { schema.TransitVerifyWithAlgorithmRequest{ // populate request parameters }, - vault.WithToken("my-token"), vault.WithMountPath("transit"), ) if err != nil { diff --git a/docs/SystemApi.md b/docs/SystemApi.md index ad410670..bfc9a53a 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -197,7 +197,6 @@ func main() { schema.AuditingCalculateHashRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -259,7 +258,6 @@ func main() { resp, err := client.System.AuditingDisableDevice( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -320,7 +318,6 @@ func main() { resp, err := client.System.AuditingDisableRequestHeader( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -385,7 +382,6 @@ func main() { schema.AuditingEnableDeviceRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -451,7 +447,6 @@ func main() { schema.AuditingEnableRequestHeaderRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -511,7 +506,6 @@ func main() { resp, err := client.System.AuditingListEnabledDevices( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -563,7 +557,6 @@ func main() { resp, err := client.System.AuditingListRequestHeaders( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -617,7 +610,6 @@ func main() { resp, err := client.System.AuditingReadRequestHeaderInformation( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -678,7 +670,6 @@ func main() { resp, err := client.System.AuthDisableMethod( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -747,7 +738,6 @@ func main() { schema.AuthEnableMethodRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -807,7 +797,6 @@ func main() { resp, err := client.System.AuthListEnabledMethods( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -861,7 +850,6 @@ func main() { resp, err := client.System.AuthReadConfiguration( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -924,7 +912,6 @@ func main() { resp, err := client.System.AuthReadTuningInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -991,7 +978,6 @@ func main() { schema.AuthTuneConfigurationParametersRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1055,7 +1041,6 @@ func main() { resp, err := client.System.CollectHostInformation( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1111,7 +1096,6 @@ func main() { resp, err := client.System.CollectInFlightRequestInformation( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1167,7 +1151,6 @@ func main() { schema.CorsConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1222,7 +1205,6 @@ func main() { resp, err := client.System.CorsDeleteConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1274,7 +1256,6 @@ func main() { resp, err := client.System.CorsReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1330,7 +1311,6 @@ func main() { schema.DecodeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1389,7 +1369,6 @@ func main() { schema.EncryptionKeyConfigureRotationRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1444,7 +1423,6 @@ func main() { resp, err := client.System.EncryptionKeyReadRotationConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1496,7 +1474,6 @@ func main() { resp, err := client.System.EncryptionKeyRotate( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1548,7 +1525,6 @@ func main() { resp, err := client.System.EncryptionKeyStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1604,7 +1580,6 @@ func main() { schema.GenerateHashRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1665,7 +1640,6 @@ func main() { schema.GenerateHashWithAlgorithmRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1729,7 +1703,6 @@ func main() { schema.GenerateRandomRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1790,7 +1763,6 @@ func main() { schema.GenerateRandomWithBytesRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1856,7 +1828,6 @@ func main() { schema.GenerateRandomWithSourceRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1924,7 +1895,6 @@ func main() { schema.GenerateRandomWithSourceAndBytesRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -1986,7 +1956,6 @@ func main() { resp, err := client.System.HaStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2044,7 +2013,6 @@ func main() { schema.InitializeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2103,7 +2071,6 @@ func main() { schema.InternalClientActivityConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2158,7 +2125,6 @@ func main() { resp, err := client.System.InternalClientActivityExport( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2210,7 +2176,6 @@ func main() { resp, err := client.System.InternalClientActivityReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2262,7 +2227,6 @@ func main() { resp, err := client.System.InternalClientActivityReportCounts( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2314,7 +2278,6 @@ func main() { resp, err := client.System.InternalClientActivityReportCountsThisMonth( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2366,7 +2329,6 @@ func main() { resp, err := client.System.InternalCountEntities( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2418,7 +2380,6 @@ func main() { resp, err := client.System.InternalCountRequests( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2470,7 +2431,6 @@ func main() { resp, err := client.System.InternalCountTokens( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2526,7 +2486,6 @@ func main() { context.Background(), context, genericMountPaths, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2586,7 +2545,6 @@ func main() { schema.InternalGenerateOpenApiDocumentWithParametersRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2643,7 +2601,6 @@ func main() { resp, err := client.System.InternalInspectRouter( context.Background(), tag, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2702,7 +2659,6 @@ func main() { resp, err := client.System.InternalUiListEnabledFeatureFlags( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2754,7 +2710,6 @@ func main() { resp, err := client.System.InternalUiListEnabledVisibleMounts( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2806,7 +2761,6 @@ func main() { resp, err := client.System.InternalUiListNamespaces( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2860,7 +2814,6 @@ func main() { resp, err := client.System.InternalUiReadMountInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2919,7 +2872,6 @@ func main() { resp, err := client.System.InternalUiReadResultantAcl( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -2971,7 +2923,6 @@ func main() { resp, err := client.System.LeaderStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3023,7 +2974,6 @@ func main() { resp, err := client.System.LeasesCount( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3081,7 +3031,6 @@ func main() { resp, err := client.System.LeasesForceRevokeLeaseWithPrefix( context.Background(), prefix, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3140,7 +3089,6 @@ func main() { resp, err := client.System.LeasesList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3194,7 +3142,6 @@ func main() { resp, err := client.System.LeasesLookUp( context.Background(), prefix, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3258,7 +3205,6 @@ func main() { schema.LeasesReadLeaseRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3317,7 +3263,6 @@ func main() { schema.LeasesRenewLeaseRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3378,7 +3323,6 @@ func main() { schema.LeasesRenewLeaseWithIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3442,7 +3386,6 @@ func main() { schema.LeasesRevokeLeaseRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3503,7 +3446,6 @@ func main() { schema.LeasesRevokeLeaseWithIdRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3569,7 +3511,6 @@ func main() { schema.LeasesRevokeLeaseWithPrefixRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3629,7 +3570,6 @@ func main() { resp, err := client.System.LeasesTidy( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3681,7 +3621,6 @@ func main() { resp, err := client.System.ListExperimentalFeatures( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3733,7 +3672,6 @@ func main() { resp, err := client.System.LockedUsersList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3789,7 +3727,6 @@ func main() { context.Background(), aliasIdentifier, mountAccessor, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3850,7 +3787,6 @@ func main() { resp, err := client.System.LoggersReadVerbosityLevel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3904,7 +3840,6 @@ func main() { resp, err := client.System.LoggersReadVerbosityLevelFor( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -3963,7 +3898,6 @@ func main() { resp, err := client.System.LoggersRevertVerbosityLevel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4017,7 +3951,6 @@ func main() { resp, err := client.System.LoggersRevertVerbosityLevelFor( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4080,7 +4013,6 @@ func main() { schema.LoggersUpdateVerbosityLevelRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4141,7 +4073,6 @@ func main() { schema.LoggersUpdateVerbosityLevelForRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4203,7 +4134,6 @@ func main() { resp, err := client.System.Metrics( context.Background(), format, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4262,7 +4192,6 @@ func main() { schema.MfaValidateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4321,7 +4250,6 @@ func main() { context.Background(), logFormat, logLevel, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4379,7 +4307,6 @@ func main() { resp, err := client.System.MountsDisableSecretsEngine( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4444,7 +4371,6 @@ func main() { schema.MountsEnableSecretsEngineRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4504,7 +4430,6 @@ func main() { resp, err := client.System.MountsListSecretsEngines( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4558,7 +4483,6 @@ func main() { resp, err := client.System.MountsReadConfiguration( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4619,7 +4543,6 @@ func main() { resp, err := client.System.MountsReadTuningInformation( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4684,7 +4607,6 @@ func main() { schema.MountsTuneConfigurationParametersRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4744,7 +4666,6 @@ func main() { resp, err := client.System.PluginsCatalogListPlugins( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4798,7 +4719,6 @@ func main() { resp, err := client.System.PluginsCatalogListPluginsWithType( context.Background(), type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4860,7 +4780,6 @@ func main() { resp, err := client.System.PluginsCatalogReadPluginConfiguration( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4923,7 +4842,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -4990,7 +4908,6 @@ func main() { schema.PluginsCatalogRegisterPluginRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5058,7 +4975,6 @@ func main() { schema.PluginsCatalogRegisterPluginWithTypeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5122,7 +5038,6 @@ func main() { resp, err := client.System.PluginsCatalogRemovePlugin( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5185,7 +5100,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5252,7 +5166,6 @@ func main() { schema.PluginsReloadBackendsRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5307,7 +5220,6 @@ func main() { resp, err := client.System.PluginsRuntimesCatalogListPluginsRuntimes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5366,7 +5278,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5435,7 +5346,6 @@ func main() { schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5501,7 +5411,6 @@ func main() { context.Background(), name, type_, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5564,7 +5473,6 @@ func main() { resp, err := client.System.PoliciesDeleteAclPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5625,7 +5533,6 @@ func main() { resp, err := client.System.PoliciesDeletePasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5686,7 +5593,6 @@ func main() { resp, err := client.System.PoliciesGeneratePasswordFromPasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5745,7 +5651,6 @@ func main() { resp, err := client.System.PoliciesListAclPolicies( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5800,7 +5705,6 @@ func main() { resp, err := client.System.PoliciesListPasswordPolicies( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5857,7 +5761,6 @@ func main() { resp, err := client.System.PoliciesReadAclPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5918,7 +5821,6 @@ func main() { resp, err := client.System.PoliciesReadPasswordPolicy( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -5983,7 +5885,6 @@ func main() { schema.PoliciesWriteAclPolicyRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6049,7 +5950,6 @@ func main() { schema.PoliciesWritePasswordPolicyRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6111,7 +6011,6 @@ func main() { resp, err := client.System.PprofBlocking( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6165,7 +6064,6 @@ func main() { resp, err := client.System.PprofCommandLine( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6219,7 +6117,6 @@ func main() { resp, err := client.System.PprofCpuProfile( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6273,7 +6170,6 @@ func main() { resp, err := client.System.PprofExecutionTrace( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6327,7 +6223,6 @@ func main() { resp, err := client.System.PprofGoroutines( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6383,7 +6278,6 @@ func main() { resp, err := client.System.PprofIndex( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6437,7 +6331,6 @@ func main() { resp, err := client.System.PprofMemoryAllocations( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6491,7 +6384,6 @@ func main() { resp, err := client.System.PprofMemoryAllocationsLive( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6545,7 +6437,6 @@ func main() { resp, err := client.System.PprofMutexes( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6599,7 +6490,6 @@ func main() { resp, err := client.System.PprofSymbols( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6653,7 +6543,6 @@ func main() { resp, err := client.System.PprofThreadCreations( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6709,7 +6598,6 @@ func main() { schema.QueryTokenAccessorCapabilitiesRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6768,7 +6656,6 @@ func main() { schema.QueryTokenCapabilitiesRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6827,7 +6714,6 @@ func main() { schema.QueryTokenSelfCapabilitiesRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6886,7 +6772,6 @@ func main() { schema.RateLimitQuotasConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -6943,7 +6828,6 @@ func main() { resp, err := client.System.RateLimitQuotasDelete( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7002,7 +6886,6 @@ func main() { resp, err := client.System.RateLimitQuotasList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7059,7 +6942,6 @@ func main() { resp, err := client.System.RateLimitQuotasRead( context.Background(), name, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7118,7 +7000,6 @@ func main() { resp, err := client.System.RateLimitQuotasReadConfiguration( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7176,7 +7057,6 @@ func main() { schema.RateLimitQuotasWriteRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7238,7 +7118,6 @@ func main() { resp, err := client.System.RawDelete( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7299,7 +7178,6 @@ func main() { resp, err := client.System.RawList( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7361,7 +7239,6 @@ func main() { resp, err := client.System.RawRead( context.Background(), path, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7426,7 +7303,6 @@ func main() { schema.RawWriteRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7486,7 +7362,6 @@ func main() { resp, err := client.System.ReadHealthStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7538,7 +7413,6 @@ func main() { resp, err := client.System.ReadInitializationStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7590,7 +7464,6 @@ func main() { resp, err := client.System.ReadReplicationStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7644,7 +7517,6 @@ func main() { resp, err := client.System.ReadSanitizedConfigurationState( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7700,7 +7572,6 @@ func main() { schema.ReadWrappingPropertiesRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7757,7 +7628,6 @@ func main() { resp, err := client.System.RekeyAttemptCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7815,7 +7685,6 @@ func main() { schema.RekeyAttemptInitializeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7870,7 +7739,6 @@ func main() { resp, err := client.System.RekeyAttemptReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7926,7 +7794,6 @@ func main() { schema.RekeyAttemptUpdateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -7981,7 +7848,6 @@ func main() { resp, err := client.System.RekeyDeleteBackupKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8033,7 +7899,6 @@ func main() { resp, err := client.System.RekeyDeleteBackupRecoveryKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8085,7 +7950,6 @@ func main() { resp, err := client.System.RekeyReadBackupKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8137,7 +8001,6 @@ func main() { resp, err := client.System.RekeyReadBackupRecoveryKey( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8191,7 +8054,6 @@ func main() { resp, err := client.System.RekeyVerificationCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8243,7 +8105,6 @@ func main() { resp, err := client.System.RekeyVerificationReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8299,7 +8160,6 @@ func main() { schema.RekeyVerificationUpdateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8356,7 +8216,6 @@ func main() { resp, err := client.System.ReloadSubsystem( context.Background(), subsystem, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8419,7 +8278,6 @@ func main() { schema.RemountRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8476,7 +8334,6 @@ func main() { resp, err := client.System.RemountStatus( context.Background(), migrationId, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8539,7 +8396,6 @@ func main() { schema.RewrapRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8594,7 +8450,6 @@ func main() { resp, err := client.System.RootTokenGenerationCancel( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8652,7 +8507,6 @@ func main() { schema.RootTokenGenerationInitializeRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8707,7 +8561,6 @@ func main() { resp, err := client.System.RootTokenGenerationReadProgress( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8765,7 +8618,6 @@ func main() { schema.RootTokenGenerationUpdateRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8820,7 +8672,6 @@ func main() { resp, err := client.System.Seal( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8872,7 +8723,6 @@ func main() { resp, err := client.System.SealStatus( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8926,7 +8776,6 @@ func main() { resp, err := client.System.StepDownLeader( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -8984,7 +8833,6 @@ func main() { schema.UiHeadersConfigureRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9046,7 +8894,6 @@ func main() { resp, err := client.System.UiHeadersDeleteConfiguration( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9105,7 +8952,6 @@ func main() { resp, err := client.System.UiHeadersList( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9162,7 +9008,6 @@ func main() { resp, err := client.System.UiHeadersReadConfiguration( context.Background(), header, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9225,7 +9070,6 @@ func main() { schema.UnsealRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9284,7 +9128,6 @@ func main() { schema.UnwrapRequest{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9339,7 +9182,6 @@ func main() { resp, err := client.System.VersionHistory( context.Background(), - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) @@ -9397,7 +9239,6 @@ func main() { map[string]interface{}{ // populate request parameters }, - vault.WithToken("my-token"), ) if err != nil { log.Fatal(err) From 1825dd67270f0bd7eee5d2ec5bd7a961c0d4ef8f Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 15:19:23 -0400 Subject: [PATCH 5/7] tabs --- generate/templates/api_doc.handlebars | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/generate/templates/api_doc.handlebars b/generate/templates/api_doc.handlebars index 80f94df8..f9db7916 100644 --- a/generate/templates/api_doc.handlebars +++ b/generate/templates/api_doc.handlebars @@ -59,8 +59,8 @@ func main() { {{~/not}}{{/each}} {{~#each bodyParams}} {{#if isModel}}schema.{{/if}}{{dataType}}{ - // populate request parameters - }, + // populate request parameters + }, {{~/each}} {{~#each queryParams}}{{#neq baseName "list"}} {{paramName}}, From c42161232bda35be2c9c1814a1fd82712e388fcb Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 15:19:54 -0400 Subject: [PATCH 6/7] regen --- docs/AuthApi.md | 404 ++++++++++++------------- docs/IdentityApi.md | 164 +++++----- docs/SecretsApi.md | 712 ++++++++++++++++++++++---------------------- docs/SystemApi.md | 208 ++++++------- 4 files changed, 744 insertions(+), 744 deletions(-) diff --git a/docs/AuthApi.md b/docs/AuthApi.md index 02dacad4..cb6c2bed 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -401,8 +401,8 @@ func main() { resp, err := client.Auth.AliCloudLogin( context.Background(), schema.AliCloudLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -528,8 +528,8 @@ func main() { context.Background(), role, schema.AliCloudWriteAuthRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -1339,8 +1339,8 @@ func main() { context.Background(), roleName, schema.AppRoleDestroySecretIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1406,8 +1406,8 @@ func main() { context.Background(), roleName, schema.AppRoleDestroySecretIdByAccessorRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1593,8 +1593,8 @@ func main() { resp, err := client.Auth.AppRoleLogin( context.Background(), schema.AppRoleLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1658,8 +1658,8 @@ func main() { context.Background(), roleName, schema.AppRoleLookUpSecretIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -1725,8 +1725,8 @@ func main() { context.Background(), roleName, schema.AppRoleLookUpSecretIdByAccessorRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2718,8 +2718,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteBindSecretIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2785,8 +2785,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteBoundCidrListRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2852,8 +2852,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteCustomSecretIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2919,8 +2919,8 @@ func main() { context.Background(), roleName, schema.AppRoleWritePeriodRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -2986,8 +2986,8 @@ func main() { context.Background(), roleName, schema.AppRoleWritePoliciesRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3053,8 +3053,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3120,8 +3120,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteRoleIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3187,8 +3187,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteSecretIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3254,8 +3254,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteSecretIdBoundCidrsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3321,8 +3321,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteSecretIdNumUsesRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3388,8 +3388,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteSecretIdTtlRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3455,8 +3455,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteTokenBoundCidrsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3522,8 +3522,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteTokenMaxTtlRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3589,8 +3589,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteTokenNumUsesRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3656,8 +3656,8 @@ func main() { context.Background(), roleName, schema.AppRoleWriteTokenTtlRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("approle"), ) if err != nil { @@ -3723,8 +3723,8 @@ func main() { context.Background(), certName, schema.AwsConfigureCertificateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3788,8 +3788,8 @@ func main() { resp, err := client.Auth.AwsConfigureClient( context.Background(), schema.AwsConfigureClientRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3851,8 +3851,8 @@ func main() { resp, err := client.Auth.AwsConfigureIdentityAccessListTidyOperation( context.Background(), schema.AwsConfigureIdentityAccessListTidyOperationRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3914,8 +3914,8 @@ func main() { resp, err := client.Auth.AwsConfigureIdentityIntegration( context.Background(), schema.AwsConfigureIdentityIntegrationRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -3977,8 +3977,8 @@ func main() { resp, err := client.Auth.AwsConfigureIdentityWhitelistTidyOperation( context.Background(), schema.AwsConfigureIdentityWhitelistTidyOperationRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -4040,8 +4040,8 @@ func main() { resp, err := client.Auth.AwsConfigureRoleTagBlacklistTidyOperation( context.Background(), schema.AwsConfigureRoleTagBlacklistTidyOperationRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -4103,8 +4103,8 @@ func main() { resp, err := client.Auth.AwsConfigureRoleTagDenyListTidyOperation( context.Background(), schema.AwsConfigureRoleTagDenyListTidyOperationRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -5303,8 +5303,8 @@ func main() { resp, err := client.Auth.AwsLogin( context.Background(), schema.AwsLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6206,8 +6206,8 @@ func main() { resp, err := client.Auth.AwsTidyIdentityAccessList( context.Background(), schema.AwsTidyIdentityAccessListRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6269,8 +6269,8 @@ func main() { resp, err := client.Auth.AwsTidyIdentityWhitelist( context.Background(), schema.AwsTidyIdentityWhitelistRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6332,8 +6332,8 @@ func main() { resp, err := client.Auth.AwsTidyRoleTagBlacklist( context.Background(), schema.AwsTidyRoleTagBlacklistRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6395,8 +6395,8 @@ func main() { resp, err := client.Auth.AwsTidyRoleTagDenyList( context.Background(), schema.AwsTidyRoleTagDenyListRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6460,8 +6460,8 @@ func main() { context.Background(), role, schema.AwsWriteAuthRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6527,8 +6527,8 @@ func main() { context.Background(), role, schema.AwsWriteRoleTagRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6718,8 +6718,8 @@ func main() { context.Background(), accountId, schema.AwsWriteStsRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -6783,8 +6783,8 @@ func main() { resp, err := client.Auth.AzureConfigureAuth( context.Background(), schema.AzureConfigureAuthRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -7025,8 +7025,8 @@ func main() { resp, err := client.Auth.AzureLogin( context.Background(), schema.AzureLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -7268,8 +7268,8 @@ func main() { context.Background(), name, schema.AzureWriteAuthRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -7333,8 +7333,8 @@ func main() { resp, err := client.Auth.CentrifyConfigure( context.Background(), schema.CentrifyConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("centrify"), ) if err != nil { @@ -7396,8 +7396,8 @@ func main() { resp, err := client.Auth.CentrifyLogin( context.Background(), schema.CentrifyLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("centrify"), ) if err != nil { @@ -7517,8 +7517,8 @@ func main() { resp, err := client.Auth.CertConfigure( context.Background(), schema.CertConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -7822,8 +7822,8 @@ func main() { resp, err := client.Auth.CertLogin( context.Background(), schema.CertLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -8069,8 +8069,8 @@ func main() { context.Background(), name, schema.CertWriteCertificateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -8136,8 +8136,8 @@ func main() { context.Background(), name, schema.CertWriteCrlRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cert"), ) if err != nil { @@ -8201,8 +8201,8 @@ func main() { resp, err := client.Auth.CloudFoundryConfigure( context.Background(), schema.CloudFoundryConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cf"), ) if err != nil { @@ -8443,8 +8443,8 @@ func main() { resp, err := client.Auth.CloudFoundryLogin( context.Background(), schema.CloudFoundryLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cf"), ) if err != nil { @@ -8628,8 +8628,8 @@ func main() { context.Background(), role, schema.CloudFoundryWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("cf"), ) if err != nil { @@ -8693,8 +8693,8 @@ func main() { resp, err := client.Auth.GithubConfigure( context.Background(), schema.GithubConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -8998,8 +8998,8 @@ func main() { resp, err := client.Auth.GithubLogin( context.Background(), schema.GithubLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -9245,8 +9245,8 @@ func main() { context.Background(), key, schema.GithubWriteTeamMappingRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -9312,8 +9312,8 @@ func main() { context.Background(), key, schema.GithubWriteUserMappingRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("github"), ) if err != nil { @@ -9377,8 +9377,8 @@ func main() { resp, err := client.Auth.GoogleCloudConfigureAuth( context.Background(), schema.GoogleCloudConfigureAuthRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9504,8 +9504,8 @@ func main() { context.Background(), name, schema.GoogleCloudEditLabelsForRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9571,8 +9571,8 @@ func main() { context.Background(), name, schema.GoogleCloudEditServiceAccountsForRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9695,8 +9695,8 @@ func main() { resp, err := client.Auth.GoogleCloudLogin( context.Background(), schema.GoogleCloudLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9880,8 +9880,8 @@ func main() { context.Background(), name, schema.GoogleCloudWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -9950,8 +9950,8 @@ func main() { resp, err := client.Auth.JwtConfigure( context.Background(), schema.JwtConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10136,8 +10136,8 @@ func main() { resp, err := client.Auth.JwtLogin( context.Background(), schema.JwtLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10266,8 +10266,8 @@ func main() { resp, err := client.Auth.JwtOidcCallbackFormPost( context.Background(), schema.JwtOidcCallbackFormPostRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10329,8 +10329,8 @@ func main() { resp, err := client.Auth.JwtOidcRequestAuthorizationUrl( context.Background(), schema.JwtOidcRequestAuthorizationUrlRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10519,8 +10519,8 @@ func main() { context.Background(), name, schema.JwtWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("jwt"), ) if err != nil { @@ -10584,8 +10584,8 @@ func main() { resp, err := client.Auth.KerberosConfigure( context.Background(), schema.KerberosConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -10647,8 +10647,8 @@ func main() { resp, err := client.Auth.KerberosConfigureLdap( context.Background(), schema.KerberosConfigureLdapRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -10831,8 +10831,8 @@ func main() { resp, err := client.Auth.KerberosLogin( context.Background(), schema.KerberosLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -11074,8 +11074,8 @@ func main() { context.Background(), name, schema.KerberosWriteGroupRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kerberos"), ) if err != nil { @@ -11139,8 +11139,8 @@ func main() { resp, err := client.Auth.KubernetesConfigureAuth( context.Background(), schema.KubernetesConfigureAuthRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11323,8 +11323,8 @@ func main() { resp, err := client.Auth.KubernetesLogin( context.Background(), schema.KubernetesLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11508,8 +11508,8 @@ func main() { context.Background(), name, schema.KubernetesWriteAuthRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -11573,8 +11573,8 @@ func main() { resp, err := client.Auth.LdapConfigureAuth( context.Background(), schema.LdapConfigureAuthRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -11880,8 +11880,8 @@ func main() { context.Background(), username, schema.LdapLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -12129,8 +12129,8 @@ func main() { context.Background(), name, schema.LdapWriteGroupRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -12196,8 +12196,8 @@ func main() { context.Background(), name, schema.LdapWriteUserRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -12261,8 +12261,8 @@ func main() { resp, err := client.Auth.OciConfigure( context.Background(), schema.OciConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("oci"), ) if err != nil { @@ -12505,8 +12505,8 @@ func main() { context.Background(), role, schema.OciLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("oci"), ) if err != nil { @@ -12692,8 +12692,8 @@ func main() { context.Background(), role, schema.OciWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("oci"), ) if err != nil { @@ -12757,8 +12757,8 @@ func main() { resp, err := client.Auth.OktaConfigure( context.Background(), schema.OktaConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -13064,8 +13064,8 @@ func main() { context.Background(), username, schema.OktaLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -13375,8 +13375,8 @@ func main() { context.Background(), name, schema.OktaWriteGroupRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -13442,8 +13442,8 @@ func main() { context.Background(), name, schema.OktaWriteUserRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("okta"), ) if err != nil { @@ -13507,8 +13507,8 @@ func main() { resp, err := client.Auth.RadiusConfigure( context.Background(), schema.RadiusConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13691,8 +13691,8 @@ func main() { resp, err := client.Auth.RadiusLogin( context.Background(), schema.RadiusLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13756,8 +13756,8 @@ func main() { context.Background(), urlusername, schema.RadiusLoginWithUsernameRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -13943,8 +13943,8 @@ func main() { context.Background(), name, schema.RadiusWriteUserRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("radius"), ) if err != nil { @@ -14008,8 +14008,8 @@ func main() { resp, err := client.Auth.TokenCreate( context.Background(), schema.TokenCreateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14068,8 +14068,8 @@ func main() { context.Background(), roleName, schema.TokenCreateAgainstRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14131,8 +14131,8 @@ func main() { resp, err := client.Auth.TokenCreateOrphan( context.Background(), schema.TokenCreateOrphanRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14357,8 +14357,8 @@ func main() { resp, err := client.Auth.TokenLookUp( context.Background(), schema.TokenLookUpRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14415,8 +14415,8 @@ func main() { resp, err := client.Auth.TokenLookUpAccessor( context.Background(), schema.TokenLookUpAccessorRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14584,8 +14584,8 @@ func main() { resp, err := client.Auth.TokenRenew( context.Background(), schema.TokenRenewRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14642,8 +14642,8 @@ func main() { resp, err := client.Auth.TokenRenewAccessor( context.Background(), schema.TokenRenewAccessorRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14700,8 +14700,8 @@ func main() { resp, err := client.Auth.TokenRenewSelf( context.Background(), schema.TokenRenewSelfRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14758,8 +14758,8 @@ func main() { resp, err := client.Auth.TokenRevoke( context.Background(), schema.TokenRevokeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14816,8 +14816,8 @@ func main() { resp, err := client.Auth.TokenRevokeAccessor( context.Background(), schema.TokenRevokeAccessorRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -14874,8 +14874,8 @@ func main() { resp, err := client.Auth.TokenRevokeOrphan( context.Background(), schema.TokenRevokeOrphanRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -15036,8 +15036,8 @@ func main() { context.Background(), roleName, schema.TokenWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -15222,8 +15222,8 @@ func main() { context.Background(), username, schema.UserpassLoginRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { @@ -15351,8 +15351,8 @@ func main() { context.Background(), username, schema.UserpassResetPasswordRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { @@ -15418,8 +15418,8 @@ func main() { context.Background(), username, schema.UserpassUpdatePoliciesRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { @@ -15485,8 +15485,8 @@ func main() { context.Background(), username, schema.UserpassWriteUserRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("userpass"), ) if err != nil { diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index 7d561994..eca5308c 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -142,8 +142,8 @@ func main() { resp, err := client.Identity.AliasCreate( context.Background(), schema.AliasCreateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -376,8 +376,8 @@ func main() { context.Background(), id, schema.AliasUpdateByIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -439,8 +439,8 @@ func main() { resp, err := client.Identity.EntityBatchDelete( context.Background(), schema.EntityBatchDeleteRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -497,8 +497,8 @@ func main() { resp, err := client.Identity.EntityCreate( context.Background(), schema.EntityCreateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -555,8 +555,8 @@ func main() { resp, err := client.Identity.EntityCreateAlias( context.Background(), schema.EntityCreateAliasRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -955,8 +955,8 @@ func main() { resp, err := client.Identity.EntityLookUp( context.Background(), schema.EntityLookUpRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1013,8 +1013,8 @@ func main() { resp, err := client.Identity.EntityMerge( context.Background(), schema.EntityMergeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1253,8 +1253,8 @@ func main() { context.Background(), id, schema.EntityUpdateAliasByIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1318,8 +1318,8 @@ func main() { context.Background(), id, schema.EntityUpdateByIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1383,8 +1383,8 @@ func main() { context.Background(), name, schema.EntityUpdateByNameRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1446,8 +1446,8 @@ func main() { resp, err := client.Identity.GroupCreate( context.Background(), schema.GroupCreateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1504,8 +1504,8 @@ func main() { resp, err := client.Identity.GroupCreateAlias( context.Background(), schema.GroupCreateAliasRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1904,8 +1904,8 @@ func main() { resp, err := client.Identity.GroupLookUp( context.Background(), schema.GroupLookUpRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2144,8 +2144,8 @@ func main() { context.Background(), id, schema.GroupUpdateAliasByIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2209,8 +2209,8 @@ func main() { context.Background(), id, schema.GroupUpdateByIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2274,8 +2274,8 @@ func main() { context.Background(), name, schema.GroupUpdateByNameRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2337,8 +2337,8 @@ func main() { resp, err := client.Identity.MfaAdminDestroyTotpSecret( context.Background(), schema.MfaAdminDestroyTotpSecretRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2395,8 +2395,8 @@ func main() { resp, err := client.Identity.MfaAdminGenerateTotpSecret( context.Background(), schema.MfaAdminGenerateTotpSecretRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2453,8 +2453,8 @@ func main() { resp, err := client.Identity.MfaCreateDuoMethod( context.Background(), schema.MfaCreateDuoMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2511,8 +2511,8 @@ func main() { resp, err := client.Identity.MfaCreateOktaMethod( context.Background(), schema.MfaCreateOktaMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2569,8 +2569,8 @@ func main() { resp, err := client.Identity.MfaCreatePingIdMethod( context.Background(), schema.MfaCreatePingIdMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2627,8 +2627,8 @@ func main() { resp, err := client.Identity.MfaCreateTotpMethod( context.Background(), schema.MfaCreateTotpMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2985,8 +2985,8 @@ func main() { resp, err := client.Identity.MfaGenerateTotpSecret( context.Background(), schema.MfaGenerateTotpSecretRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3729,8 +3729,8 @@ func main() { context.Background(), methodId, schema.MfaUpdateDuoMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3794,8 +3794,8 @@ func main() { context.Background(), methodId, schema.MfaUpdateOktaMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3859,8 +3859,8 @@ func main() { context.Background(), methodId, schema.MfaUpdatePingIdMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3924,8 +3924,8 @@ func main() { context.Background(), methodId, schema.MfaUpdateTotpMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3989,8 +3989,8 @@ func main() { context.Background(), name, schema.MfaWriteLoginEnforcementRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4052,8 +4052,8 @@ func main() { resp, err := client.Identity.OidcConfigure( context.Background(), schema.OidcConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4530,8 +4530,8 @@ func main() { resp, err := client.Identity.OidcIntrospect( context.Background(), schema.OidcIntrospectRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5004,8 +5004,8 @@ func main() { context.Background(), name, schema.OidcProviderAuthorizeWithParametersRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5069,8 +5069,8 @@ func main() { context.Background(), name, schema.OidcProviderTokenRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5827,8 +5827,8 @@ func main() { context.Background(), name, schema.OidcRotateKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5892,8 +5892,8 @@ func main() { context.Background(), name, schema.OidcWriteAssignmentRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5957,8 +5957,8 @@ func main() { context.Background(), name, schema.OidcWriteClientRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6022,8 +6022,8 @@ func main() { context.Background(), name, schema.OidcWriteKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6087,8 +6087,8 @@ func main() { context.Background(), name, schema.OidcWriteProviderRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6152,8 +6152,8 @@ func main() { context.Background(), name, schema.OidcWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6217,8 +6217,8 @@ func main() { context.Background(), name, schema.OidcWriteScopeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6280,8 +6280,8 @@ func main() { resp, err := client.Identity.PersonaCreate( context.Background(), schema.PersonaCreateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6514,8 +6514,8 @@ func main() { context.Background(), id, schema.PersonaUpdateByIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index ed34222d..e5e45c65 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -428,8 +428,8 @@ func main() { resp, err := client.Secrets.AliCloudConfigure( context.Background(), schema.AliCloudConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -854,8 +854,8 @@ func main() { context.Background(), name, schema.AliCloudWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("alicloud"), ) if err != nil { @@ -919,8 +919,8 @@ func main() { resp, err := client.Secrets.AwsConfigureLease( context.Background(), schema.AwsConfigureLeaseRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -982,8 +982,8 @@ func main() { resp, err := client.Secrets.AwsConfigureRootIamCredentials( context.Background(), schema.AwsConfigureRootIamCredentialsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1242,8 +1242,8 @@ func main() { context.Background(), name, schema.AwsGenerateCredentialsWithParametersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1380,8 +1380,8 @@ func main() { context.Background(), name, schema.AwsGenerateStsCredentialsWithParametersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1866,8 +1866,8 @@ func main() { context.Background(), name, schema.AwsWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1933,8 +1933,8 @@ func main() { context.Background(), name, schema.AwsWriteStaticRolesNameRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("aws"), ) if err != nil { @@ -1998,8 +1998,8 @@ func main() { resp, err := client.Secrets.AzureConfigure( context.Background(), schema.AzureConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -2482,8 +2482,8 @@ func main() { context.Background(), name, schema.AzureWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("azure"), ) if err != nil { @@ -2547,8 +2547,8 @@ func main() { resp, err := client.Secrets.ConsulConfigureAccess( context.Background(), schema.ConsulConfigureAccessRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("consul"), ) if err != nil { @@ -2915,8 +2915,8 @@ func main() { context.Background(), name, schema.ConsulWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("consul"), ) if err != nil { @@ -3164,8 +3164,8 @@ func main() { context.Background(), path, map[string]interface{}{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3229,8 +3229,8 @@ func main() { context.Background(), name, schema.DatabaseConfigureConnectionRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("database"), ) if err != nil { @@ -4155,8 +4155,8 @@ func main() { context.Background(), name, schema.DatabaseWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("database"), ) if err != nil { @@ -4222,8 +4222,8 @@ func main() { context.Background(), name, schema.DatabaseWriteStaticRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("database"), ) if err != nil { @@ -4287,8 +4287,8 @@ func main() { resp, err := client.Secrets.GoogleCloudConfigure( context.Background(), schema.GoogleCloudConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -4662,8 +4662,8 @@ func main() { context.Background(), roleset, schema.GoogleCloudGenerateRolesetKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -4791,8 +4791,8 @@ func main() { context.Background(), name, schema.GoogleCloudGenerateStaticAccountKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -4856,8 +4856,8 @@ func main() { resp, err := client.Secrets.GoogleCloudKmsConfigure( context.Background(), schema.GoogleCloudKmsConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4921,8 +4921,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsConfigureKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -4988,8 +4988,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsDecryptRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5237,8 +5237,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsEncryptRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5545,8 +5545,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsReencryptRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5612,8 +5612,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsRegisterKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5803,8 +5803,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsSignRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5932,8 +5932,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsVerifyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -5999,8 +5999,8 @@ func main() { context.Background(), key, schema.GoogleCloudKmsWriteKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcpkms"), ) if err != nil { @@ -6731,8 +6731,8 @@ func main() { context.Background(), name, schema.GoogleCloudWriteImpersonatedAccountRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -6798,8 +6798,8 @@ func main() { context.Background(), name, schema.GoogleCloudWriteRolesetRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -6865,8 +6865,8 @@ func main() { context.Background(), name, schema.GoogleCloudWriteStaticAccountRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("gcp"), ) if err != nil { @@ -6988,8 +6988,8 @@ func main() { resp, err := client.Secrets.KubernetesConfigure( context.Background(), schema.KubernetesConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7173,8 +7173,8 @@ func main() { context.Background(), name, schema.KubernetesGenerateCredentialsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7419,8 +7419,8 @@ func main() { context.Background(), name, schema.KubernetesWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kubernetes"), ) if err != nil { @@ -7672,8 +7672,8 @@ func main() { context.Background(), path, map[string]interface{}{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v1"), ) if err != nil { @@ -7737,8 +7737,8 @@ func main() { resp, err := client.Secrets.KvV2Configure( context.Background(), schema.KvV2ConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7926,8 +7926,8 @@ func main() { context.Background(), path, schema.KvV2DeleteVersionsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -7993,8 +7993,8 @@ func main() { context.Background(), path, schema.KvV2DestroyVersionsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8367,8 +8367,8 @@ func main() { context.Background(), path, schema.KvV2UndeleteVersionsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8434,8 +8434,8 @@ func main() { context.Background(), path, schema.KvV2WriteRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8501,8 +8501,8 @@ func main() { context.Background(), path, schema.KvV2WriteMetadataRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("kv-v2"), ) if err != nil { @@ -8566,8 +8566,8 @@ func main() { resp, err := client.Secrets.LdapConfigure( context.Background(), schema.LdapConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8813,8 +8813,8 @@ func main() { context.Background(), name, schema.LdapLibraryCheckInRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -8880,8 +8880,8 @@ func main() { context.Background(), name, schema.LdapLibraryCheckOutRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -9009,8 +9009,8 @@ func main() { context.Background(), name, schema.LdapLibraryConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -9138,8 +9138,8 @@ func main() { context.Background(), name, schema.LdapLibraryForceCheckInRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -9870,8 +9870,8 @@ func main() { context.Background(), name, schema.LdapWriteDynamicRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -9937,8 +9937,8 @@ func main() { context.Background(), name, schema.LdapWriteStaticRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ldap"), ) if err != nil { @@ -10002,8 +10002,8 @@ func main() { resp, err := client.Secrets.MongoDbAtlasConfigure( context.Background(), schema.MongoDbAtlasConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10370,8 +10370,8 @@ func main() { context.Background(), name, schema.MongoDbAtlasWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("mongodbatlas"), ) if err != nil { @@ -10435,8 +10435,8 @@ func main() { resp, err := client.Secrets.NomadConfigureAccess( context.Background(), schema.NomadConfigureAccessRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("nomad"), ) if err != nil { @@ -10498,8 +10498,8 @@ func main() { resp, err := client.Secrets.NomadConfigureLease( context.Background(), schema.NomadConfigureLeaseRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("nomad"), ) if err != nil { @@ -11040,8 +11040,8 @@ func main() { context.Background(), name, schema.NomadWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("nomad"), ) if err != nil { @@ -11105,8 +11105,8 @@ func main() { resp, err := client.Secrets.PkiConfigureAcme( context.Background(), schema.PkiConfigureAcmeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11168,8 +11168,8 @@ func main() { resp, err := client.Secrets.PkiConfigureAutoTidy( context.Background(), schema.PkiConfigureAutoTidyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11231,8 +11231,8 @@ func main() { resp, err := client.Secrets.PkiConfigureCa( context.Background(), schema.PkiConfigureCaRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11294,8 +11294,8 @@ func main() { resp, err := client.Secrets.PkiConfigureCluster( context.Background(), schema.PkiConfigureClusterRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11357,8 +11357,8 @@ func main() { resp, err := client.Secrets.PkiConfigureCrl( context.Background(), schema.PkiConfigureCrlRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11420,8 +11420,8 @@ func main() { resp, err := client.Secrets.PkiConfigureIssuers( context.Background(), schema.PkiConfigureIssuersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11483,8 +11483,8 @@ func main() { resp, err := client.Secrets.PkiConfigureKeys( context.Background(), schema.PkiConfigureKeysRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11546,8 +11546,8 @@ func main() { resp, err := client.Secrets.PkiConfigureUrls( context.Background(), schema.PkiConfigureUrlsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -11609,8 +11609,8 @@ func main() { resp, err := client.Secrets.PkiCrossSignIntermediate( context.Background(), schema.PkiCrossSignIntermediateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12226,8 +12226,8 @@ func main() { resp, err := client.Secrets.PkiGenerateExportedKey( context.Background(), schema.PkiGenerateExportedKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12291,8 +12291,8 @@ func main() { context.Background(), exported, schema.PkiGenerateIntermediateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12356,8 +12356,8 @@ func main() { resp, err := client.Secrets.PkiGenerateInternalKey( context.Background(), schema.PkiGenerateInternalKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12419,8 +12419,8 @@ func main() { resp, err := client.Secrets.PkiGenerateKmsKey( context.Background(), schema.PkiGenerateKmsKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12484,8 +12484,8 @@ func main() { context.Background(), exported, schema.PkiGenerateRootRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12549,8 +12549,8 @@ func main() { resp, err := client.Secrets.PkiImportKey( context.Background(), schema.PkiImportKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12614,8 +12614,8 @@ func main() { context.Background(), role, schema.PkiIssueWithRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -12683,8 +12683,8 @@ func main() { issuerRef, role, schema.PkiIssuerIssueWithRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13124,8 +13124,8 @@ func main() { context.Background(), issuerRef, schema.PkiIssuerResignCrlsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13191,8 +13191,8 @@ func main() { context.Background(), issuerRef, schema.PkiIssuerSignIntermediateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13258,8 +13258,8 @@ func main() { context.Background(), issuerRef, schema.PkiIssuerSignRevocationListRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13325,8 +13325,8 @@ func main() { context.Background(), issuerRef, schema.PkiIssuerSignSelfIssuedRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13392,8 +13392,8 @@ func main() { context.Background(), issuerRef, schema.PkiIssuerSignVerbatimRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13461,8 +13461,8 @@ func main() { issuerRef, role, schema.PkiIssuerSignVerbatimWithRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13532,8 +13532,8 @@ func main() { issuerRef, role, schema.PkiIssuerSignWithRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13601,8 +13601,8 @@ func main() { context.Background(), exported, schema.PkiIssuersGenerateIntermediateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13668,8 +13668,8 @@ func main() { context.Background(), exported, schema.PkiIssuersGenerateRootRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13733,8 +13733,8 @@ func main() { resp, err := client.Secrets.PkiIssuersImportBundle( context.Background(), schema.PkiIssuersImportBundleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -13796,8 +13796,8 @@ func main() { resp, err := client.Secrets.PkiIssuersImportCert( context.Background(), schema.PkiIssuersImportCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16373,8 +16373,8 @@ func main() { resp, err := client.Secrets.PkiReplaceRoot( context.Background(), schema.PkiReplaceRootRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16436,8 +16436,8 @@ func main() { resp, err := client.Secrets.PkiRevoke( context.Background(), schema.PkiRevokeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16561,8 +16561,8 @@ func main() { resp, err := client.Secrets.PkiRevokeWithKey( context.Background(), schema.PkiRevokeWithKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16624,8 +16624,8 @@ func main() { resp, err := client.Secrets.PkiRootSignIntermediate( context.Background(), schema.PkiRootSignIntermediateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16687,8 +16687,8 @@ func main() { resp, err := client.Secrets.PkiRootSignSelfIssued( context.Background(), schema.PkiRootSignSelfIssuedRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16868,8 +16868,8 @@ func main() { context.Background(), exported, schema.PkiRotateRootRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16933,8 +16933,8 @@ func main() { resp, err := client.Secrets.PkiSetSignedIntermediate( context.Background(), schema.PkiSetSignedIntermediateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -16996,8 +16996,8 @@ func main() { resp, err := client.Secrets.PkiSignVerbatim( context.Background(), schema.PkiSignVerbatimRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17061,8 +17061,8 @@ func main() { context.Background(), role, schema.PkiSignVerbatimWithRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17128,8 +17128,8 @@ func main() { context.Background(), role, schema.PkiSignWithRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17193,8 +17193,8 @@ func main() { resp, err := client.Secrets.PkiTidy( context.Background(), schema.PkiTidyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17374,8 +17374,8 @@ func main() { context.Background(), kid, schema.PkiWriteAcmeAccountKidRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17441,8 +17441,8 @@ func main() { context.Background(), authId, schema.PkiWriteAcmeAuthorizationAuthIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17510,8 +17510,8 @@ func main() { authId, challengeType, schema.PkiWriteAcmeChallengeAuthIdChallengeTypeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17577,8 +17577,8 @@ func main() { resp, err := client.Secrets.PkiWriteAcmeNewAccount( context.Background(), schema.PkiWriteAcmeNewAccountRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17640,8 +17640,8 @@ func main() { resp, err := client.Secrets.PkiWriteAcmeNewOrder( context.Background(), schema.PkiWriteAcmeNewOrderRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17705,8 +17705,8 @@ func main() { context.Background(), orderId, schema.PkiWriteAcmeOrderOrderIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17772,8 +17772,8 @@ func main() { context.Background(), orderId, schema.PkiWriteAcmeOrderOrderIdCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17839,8 +17839,8 @@ func main() { context.Background(), orderId, schema.PkiWriteAcmeOrderOrderIdFinalizeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17904,8 +17904,8 @@ func main() { resp, err := client.Secrets.PkiWriteAcmeOrders( context.Background(), schema.PkiWriteAcmeOrdersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -17967,8 +17967,8 @@ func main() { resp, err := client.Secrets.PkiWriteAcmeRevokeCert( context.Background(), schema.PkiWriteAcmeRevokeCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18032,8 +18032,8 @@ func main() { context.Background(), issuerRef, schema.PkiWriteIssuerRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18101,8 +18101,8 @@ func main() { issuerRef, kid, schema.PkiWriteIssuerIssuerRefAcmeAccountKidRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18172,8 +18172,8 @@ func main() { authId, issuerRef, schema.PkiWriteIssuerIssuerRefAcmeAuthorizationAuthIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18245,8 +18245,8 @@ func main() { challengeType, issuerRef, schema.PkiWriteIssuerIssuerRefAcmeChallengeAuthIdChallengeTypeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18316,8 +18316,8 @@ func main() { context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeNewAccountRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18383,8 +18383,8 @@ func main() { context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeNewOrderRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18452,8 +18452,8 @@ func main() { issuerRef, orderId, schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18523,8 +18523,8 @@ func main() { issuerRef, orderId, schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18594,8 +18594,8 @@ func main() { issuerRef, orderId, schema.PkiWriteIssuerIssuerRefAcmeOrderOrderIdFinalizeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18663,8 +18663,8 @@ func main() { context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeOrdersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18730,8 +18730,8 @@ func main() { context.Background(), issuerRef, schema.PkiWriteIssuerIssuerRefAcmeRevokeCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18801,8 +18801,8 @@ func main() { kid, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAccountKidRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18876,8 +18876,8 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeAuthorizationAuthIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -18953,8 +18953,8 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19028,8 +19028,8 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewAccountRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19099,8 +19099,8 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeNewOrderRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19172,8 +19172,8 @@ func main() { orderId, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19247,8 +19247,8 @@ func main() { orderId, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19322,8 +19322,8 @@ func main() { orderId, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrderOrderIdFinalizeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19395,8 +19395,8 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeOrdersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19466,8 +19466,8 @@ func main() { issuerRef, role, schema.PkiWriteIssuerIssuerRefRolesRoleAcmeRevokeCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19535,8 +19535,8 @@ func main() { context.Background(), keyRef, schema.PkiWriteKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19602,8 +19602,8 @@ func main() { context.Background(), name, schema.PkiWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19671,8 +19671,8 @@ func main() { kid, role, schema.PkiWriteRolesRoleAcmeAccountKidRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19742,8 +19742,8 @@ func main() { authId, role, schema.PkiWriteRolesRoleAcmeAuthorizationAuthIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19815,8 +19815,8 @@ func main() { challengeType, role, schema.PkiWriteRolesRoleAcmeChallengeAuthIdChallengeTypeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19886,8 +19886,8 @@ func main() { context.Background(), role, schema.PkiWriteRolesRoleAcmeNewAccountRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -19953,8 +19953,8 @@ func main() { context.Background(), role, schema.PkiWriteRolesRoleAcmeNewOrderRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -20022,8 +20022,8 @@ func main() { orderId, role, schema.PkiWriteRolesRoleAcmeOrderOrderIdRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -20093,8 +20093,8 @@ func main() { orderId, role, schema.PkiWriteRolesRoleAcmeOrderOrderIdCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -20164,8 +20164,8 @@ func main() { orderId, role, schema.PkiWriteRolesRoleAcmeOrderOrderIdFinalizeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -20233,8 +20233,8 @@ func main() { context.Background(), role, schema.PkiWriteRolesRoleAcmeOrdersRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -20300,8 +20300,8 @@ func main() { context.Background(), role, schema.PkiWriteRolesRoleAcmeRevokeCertRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("pki"), ) if err != nil { @@ -20365,8 +20365,8 @@ func main() { resp, err := client.Secrets.RabbitMqConfigureConnection( context.Background(), schema.RabbitMqConfigureConnectionRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20428,8 +20428,8 @@ func main() { resp, err := client.Secrets.RabbitMqConfigureLease( context.Background(), schema.RabbitMqConfigureLeaseRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20796,8 +20796,8 @@ func main() { context.Background(), name, schema.RabbitMqWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("rabbitmq"), ) if err != nil { @@ -20861,8 +20861,8 @@ func main() { resp, err := client.Secrets.SshConfigureCa( context.Background(), schema.SshConfigureCaRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -20924,8 +20924,8 @@ func main() { resp, err := client.Secrets.SshConfigureZeroAddress( context.Background(), schema.SshConfigureZeroAddressRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21167,8 +21167,8 @@ func main() { context.Background(), role, schema.SshGenerateCredentialsRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21234,8 +21234,8 @@ func main() { context.Background(), role, schema.SshIssueCertificateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21358,8 +21358,8 @@ func main() { resp, err := client.Secrets.SshListRolesByIp( context.Background(), schema.SshListRolesByIpRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21659,8 +21659,8 @@ func main() { context.Background(), role, schema.SshSignCertificateRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21782,8 +21782,8 @@ func main() { resp, err := client.Secrets.SshVerifyOtp( context.Background(), schema.SshVerifyOtpRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21847,8 +21847,8 @@ func main() { context.Background(), role, schema.SshWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("ssh"), ) if err != nil { @@ -21912,8 +21912,8 @@ func main() { resp, err := client.Secrets.TerraformCloudConfigure( context.Background(), schema.TerraformCloudConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("terraform"), ) if err != nil { @@ -22400,8 +22400,8 @@ func main() { context.Background(), name, schema.TerraformCloudWriteRoleRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("terraform"), ) if err != nil { @@ -22467,8 +22467,8 @@ func main() { context.Background(), name, schema.TotpCreateKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("totp"), ) if err != nil { @@ -22779,8 +22779,8 @@ func main() { context.Background(), name, schema.TotpValidateCodeRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("totp"), ) if err != nil { @@ -23042,8 +23042,8 @@ func main() { resp, err := client.Secrets.TransitConfigureCache( context.Background(), schema.TransitConfigureCacheRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23107,8 +23107,8 @@ func main() { context.Background(), name, schema.TransitConfigureKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23172,8 +23172,8 @@ func main() { resp, err := client.Secrets.TransitConfigureKeys( context.Background(), schema.TransitConfigureKeysRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23237,8 +23237,8 @@ func main() { context.Background(), name, schema.TransitCreateKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23304,8 +23304,8 @@ func main() { context.Background(), name, schema.TransitDecryptRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23433,8 +23433,8 @@ func main() { context.Background(), name, schema.TransitEncryptRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23636,8 +23636,8 @@ func main() { context.Background(), name, schema.TransitGenerateCsrForKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23705,8 +23705,8 @@ func main() { name, plaintext, schema.TransitGenerateDataKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23774,8 +23774,8 @@ func main() { context.Background(), name, schema.TransitGenerateHmacRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23843,8 +23843,8 @@ func main() { name, urlalgorithm, schema.TransitGenerateHmacWithAlgorithmRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23910,8 +23910,8 @@ func main() { resp, err := client.Secrets.TransitGenerateRandom( context.Background(), schema.TransitGenerateRandomRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -23975,8 +23975,8 @@ func main() { context.Background(), urlbytes, schema.TransitGenerateRandomWithBytesRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24042,8 +24042,8 @@ func main() { context.Background(), source, schema.TransitGenerateRandomWithSourceRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24111,8 +24111,8 @@ func main() { source, urlbytes, schema.TransitGenerateRandomWithSourceAndBytesRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24178,8 +24178,8 @@ func main() { resp, err := client.Secrets.TransitHash( context.Background(), schema.TransitHashRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24243,8 +24243,8 @@ func main() { context.Background(), urlalgorithm, schema.TransitHashWithAlgorithmRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24310,8 +24310,8 @@ func main() { context.Background(), name, schema.TransitImportKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24377,8 +24377,8 @@ func main() { context.Background(), name, schema.TransitImportKeyVersionRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24739,8 +24739,8 @@ func main() { context.Background(), name, schema.TransitRestoreAndRenameKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24804,8 +24804,8 @@ func main() { resp, err := client.Secrets.TransitRestoreKey( context.Background(), schema.TransitRestoreKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24869,8 +24869,8 @@ func main() { context.Background(), name, schema.TransitRewrapRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -24936,8 +24936,8 @@ func main() { context.Background(), name, schema.TransitRotateKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -25003,8 +25003,8 @@ func main() { context.Background(), name, schema.TransitSetCertificateForKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -25070,8 +25070,8 @@ func main() { context.Background(), name, schema.TransitSignRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -25139,8 +25139,8 @@ func main() { name, urlalgorithm, schema.TransitSignWithAlgorithmRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -25208,8 +25208,8 @@ func main() { context.Background(), name, schema.TransitTrimKeyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -25275,8 +25275,8 @@ func main() { context.Background(), name, schema.TransitVerifyRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { @@ -25344,8 +25344,8 @@ func main() { name, urlalgorithm, schema.TransitVerifyWithAlgorithmRequest{ - // populate request parameters - }, + // populate request parameters + }, vault.WithMountPath("transit"), ) if err != nil { diff --git a/docs/SystemApi.md b/docs/SystemApi.md index bfc9a53a..abd3d842 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -195,8 +195,8 @@ func main() { context.Background(), path, schema.AuditingCalculateHashRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -380,8 +380,8 @@ func main() { context.Background(), path, schema.AuditingEnableDeviceRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -445,8 +445,8 @@ func main() { context.Background(), header, schema.AuditingEnableRequestHeaderRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -736,8 +736,8 @@ func main() { context.Background(), path, schema.AuthEnableMethodRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -976,8 +976,8 @@ func main() { context.Background(), path, schema.AuthTuneConfigurationParametersRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1149,8 +1149,8 @@ func main() { resp, err := client.System.CorsConfigure( context.Background(), schema.CorsConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1309,8 +1309,8 @@ func main() { resp, err := client.System.Decode( context.Background(), schema.DecodeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1367,8 +1367,8 @@ func main() { resp, err := client.System.EncryptionKeyConfigureRotation( context.Background(), schema.EncryptionKeyConfigureRotationRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1578,8 +1578,8 @@ func main() { resp, err := client.System.GenerateHash( context.Background(), schema.GenerateHashRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1638,8 +1638,8 @@ func main() { context.Background(), urlalgorithm, schema.GenerateHashWithAlgorithmRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1701,8 +1701,8 @@ func main() { resp, err := client.System.GenerateRandom( context.Background(), schema.GenerateRandomRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1761,8 +1761,8 @@ func main() { context.Background(), urlbytes, schema.GenerateRandomWithBytesRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1826,8 +1826,8 @@ func main() { context.Background(), source, schema.GenerateRandomWithSourceRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -1893,8 +1893,8 @@ func main() { source, urlbytes, schema.GenerateRandomWithSourceAndBytesRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2011,8 +2011,8 @@ func main() { resp, err := client.System.Initialize( context.Background(), schema.InitializeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2069,8 +2069,8 @@ func main() { resp, err := client.System.InternalClientActivityConfigure( context.Background(), schema.InternalClientActivityConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -2543,8 +2543,8 @@ func main() { resp, err := client.System.InternalGenerateOpenApiDocumentWithParameters( context.Background(), schema.InternalGenerateOpenApiDocumentWithParametersRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3203,8 +3203,8 @@ func main() { resp, err := client.System.LeasesReadLease( context.Background(), schema.LeasesReadLeaseRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3261,8 +3261,8 @@ func main() { resp, err := client.System.LeasesRenewLease( context.Background(), schema.LeasesRenewLeaseRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3321,8 +3321,8 @@ func main() { context.Background(), urlLeaseId, schema.LeasesRenewLeaseWithIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3384,8 +3384,8 @@ func main() { resp, err := client.System.LeasesRevokeLease( context.Background(), schema.LeasesRevokeLeaseRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3444,8 +3444,8 @@ func main() { context.Background(), urlLeaseId, schema.LeasesRevokeLeaseWithIdRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -3509,8 +3509,8 @@ func main() { context.Background(), prefix, schema.LeasesRevokeLeaseWithPrefixRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4011,8 +4011,8 @@ func main() { resp, err := client.System.LoggersUpdateVerbosityLevel( context.Background(), schema.LoggersUpdateVerbosityLevelRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4071,8 +4071,8 @@ func main() { context.Background(), name, schema.LoggersUpdateVerbosityLevelForRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4190,8 +4190,8 @@ func main() { resp, err := client.System.MfaValidate( context.Background(), schema.MfaValidateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4369,8 +4369,8 @@ func main() { context.Background(), path, schema.MountsEnableSecretsEngineRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4605,8 +4605,8 @@ func main() { context.Background(), path, schema.MountsTuneConfigurationParametersRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4906,8 +4906,8 @@ func main() { context.Background(), name, schema.PluginsCatalogRegisterPluginRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -4973,8 +4973,8 @@ func main() { name, type_, schema.PluginsCatalogRegisterPluginWithTypeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5164,8 +5164,8 @@ func main() { resp, err := client.System.PluginsReloadBackends( context.Background(), schema.PluginsReloadBackendsRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5344,8 +5344,8 @@ func main() { name, type_, schema.PluginsRuntimesCatalogRegisterPluginRuntimeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5883,8 +5883,8 @@ func main() { context.Background(), name, schema.PoliciesWriteAclPolicyRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -5948,8 +5948,8 @@ func main() { context.Background(), name, schema.PoliciesWritePasswordPolicyRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6596,8 +6596,8 @@ func main() { resp, err := client.System.QueryTokenAccessorCapabilities( context.Background(), schema.QueryTokenAccessorCapabilitiesRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6654,8 +6654,8 @@ func main() { resp, err := client.System.QueryTokenCapabilities( context.Background(), schema.QueryTokenCapabilitiesRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6712,8 +6712,8 @@ func main() { resp, err := client.System.QueryTokenSelfCapabilities( context.Background(), schema.QueryTokenSelfCapabilitiesRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -6770,8 +6770,8 @@ func main() { resp, err := client.System.RateLimitQuotasConfigure( context.Background(), schema.RateLimitQuotasConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7055,8 +7055,8 @@ func main() { context.Background(), name, schema.RateLimitQuotasWriteRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7301,8 +7301,8 @@ func main() { context.Background(), path, schema.RawWriteRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7570,8 +7570,8 @@ func main() { resp, err := client.System.ReadWrappingProperties( context.Background(), schema.ReadWrappingPropertiesRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7683,8 +7683,8 @@ func main() { resp, err := client.System.RekeyAttemptInitialize( context.Background(), schema.RekeyAttemptInitializeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -7792,8 +7792,8 @@ func main() { resp, err := client.System.RekeyAttemptUpdate( context.Background(), schema.RekeyAttemptUpdateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8158,8 +8158,8 @@ func main() { resp, err := client.System.RekeyVerificationUpdate( context.Background(), schema.RekeyVerificationUpdateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8276,8 +8276,8 @@ func main() { resp, err := client.System.Remount( context.Background(), schema.RemountRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8394,8 +8394,8 @@ func main() { resp, err := client.System.Rewrap( context.Background(), schema.RewrapRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8505,8 +8505,8 @@ func main() { resp, err := client.System.RootTokenGenerationInitialize( context.Background(), schema.RootTokenGenerationInitializeRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8616,8 +8616,8 @@ func main() { resp, err := client.System.RootTokenGenerationUpdate( context.Background(), schema.RootTokenGenerationUpdateRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -8831,8 +8831,8 @@ func main() { context.Background(), header, schema.UiHeadersConfigureRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -9068,8 +9068,8 @@ func main() { resp, err := client.System.Unseal( context.Background(), schema.UnsealRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -9126,8 +9126,8 @@ func main() { resp, err := client.System.Unwrap( context.Background(), schema.UnwrapRequest{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) @@ -9237,8 +9237,8 @@ func main() { resp, err := client.System.Wrap( context.Background(), map[string]interface{}{ - // populate request parameters - }, + // populate request parameters + }, ) if err != nil { log.Fatal(err) From 97728691a64cad19b7642f8c9d9d23367df2c13c Mon Sep 17 00:00:00 2001 From: Anton Averchenkov Date: Wed, 13 Sep 2023 15:21:42 -0400 Subject: [PATCH 7/7] more tabs --- docs/AuthApi.md | 492 ++++++++-------- docs/IdentityApi.md | 216 +++---- docs/SecretsApi.md | 788 +++++++++++++------------- docs/SystemApi.md | 318 +++++------ generate/templates/api_doc.handlebars | 2 +- 5 files changed, 908 insertions(+), 908 deletions(-) diff --git a/docs/AuthApi.md b/docs/AuthApi.md index cb6c2bed..c315ff26 100644 --- a/docs/AuthApi.md +++ b/docs/AuthApi.md @@ -274,7 +274,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudDeleteAuthRole( @@ -336,7 +336,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AliCloudListAuthRoles( context.Background(), @@ -396,7 +396,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AliCloudLogin( context.Background(), @@ -458,7 +458,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudReadAuthRole( @@ -521,7 +521,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role as it should appear in Vault. resp, err := client.Auth.AliCloudWriteAuthRole( @@ -587,7 +587,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBindSecretId( @@ -649,7 +649,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteBoundCidrList( @@ -711,7 +711,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePeriod( @@ -773,7 +773,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeletePolicies( @@ -835,7 +835,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteRole( @@ -897,7 +897,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdBoundCidrs( @@ -959,7 +959,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdNumUses( @@ -1021,7 +1021,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteSecretIdTtl( @@ -1083,7 +1083,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenBoundCidrs( @@ -1145,7 +1145,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenMaxTtl( @@ -1207,7 +1207,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenNumUses( @@ -1269,7 +1269,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDeleteTokenTtl( @@ -1332,7 +1332,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretId( @@ -1399,7 +1399,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleDestroySecretIdByAccessor( @@ -1465,7 +1465,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AppRoleListRoles( context.Background(), @@ -1524,7 +1524,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleListSecretIds( @@ -1588,7 +1588,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AppRoleLogin( context.Background(), @@ -1651,7 +1651,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretId( @@ -1718,7 +1718,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleLookUpSecretIdByAccessor( @@ -1784,7 +1784,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBindSecretId( @@ -1846,7 +1846,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadBoundCidrList( @@ -1908,7 +1908,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadLocalSecretIds( @@ -1970,7 +1970,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPeriod( @@ -2032,7 +2032,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadPolicies( @@ -2094,7 +2094,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRole( @@ -2156,7 +2156,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadRoleId( @@ -2218,7 +2218,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdBoundCidrs( @@ -2280,7 +2280,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdNumUses( @@ -2342,7 +2342,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadSecretIdTtl( @@ -2404,7 +2404,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenBoundCidrs( @@ -2466,7 +2466,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenMaxTtl( @@ -2528,7 +2528,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenNumUses( @@ -2590,7 +2590,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleReadTokenTtl( @@ -2652,7 +2652,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AppRoleTidySecretId( context.Background(), @@ -2711,7 +2711,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBindSecretId( @@ -2778,7 +2778,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteBoundCidrList( @@ -2845,7 +2845,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteCustomSecretId( @@ -2912,7 +2912,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePeriod( @@ -2979,7 +2979,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWritePolicies( @@ -3046,7 +3046,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRole( @@ -3113,7 +3113,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteRoleId( @@ -3180,7 +3180,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretId( @@ -3247,7 +3247,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdBoundCidrs( @@ -3314,7 +3314,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdNumUses( @@ -3381,7 +3381,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteSecretIdTtl( @@ -3448,7 +3448,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenBoundCidrs( @@ -3515,7 +3515,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenMaxTtl( @@ -3582,7 +3582,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenNumUses( @@ -3649,7 +3649,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role. Must be less than 4096 bytes. resp, err := client.Auth.AppRoleWriteTokenTtl( @@ -3716,7 +3716,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsConfigureCertificate( @@ -3783,7 +3783,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureClient( context.Background(), @@ -3846,7 +3846,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureIdentityAccessListTidyOperation( context.Background(), @@ -3909,7 +3909,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureIdentityIntegration( context.Background(), @@ -3972,7 +3972,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureIdentityWhitelistTidyOperation( context.Background(), @@ -4035,7 +4035,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureRoleTagBlacklistTidyOperation( context.Background(), @@ -4098,7 +4098,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsConfigureRoleTagDenyListTidyOperation( context.Background(), @@ -4160,7 +4160,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsDeleteAuthRole( @@ -4222,7 +4222,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsDeleteCertificateConfiguration( @@ -4284,7 +4284,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteClientConfiguration( context.Background(), @@ -4342,7 +4342,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityAccessList( @@ -4404,7 +4404,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteIdentityAccessListTidySettings( context.Background(), @@ -4462,7 +4462,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsDeleteIdentityWhitelist( @@ -4524,7 +4524,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteIdentityWhitelistTidySettings( context.Background(), @@ -4582,7 +4582,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagBlacklist( @@ -4644,7 +4644,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteRoleTagBlacklistTidySettings( context.Background(), @@ -4702,7 +4702,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsDeleteRoleTagDenyList( @@ -4764,7 +4764,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsDeleteRoleTagDenyListTidySettings( context.Background(), @@ -4822,7 +4822,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsDeleteStsRole( @@ -4884,7 +4884,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListAuthRoles( context.Background(), @@ -4943,7 +4943,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListCertificateConfigurations( context.Background(), @@ -5002,7 +5002,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListIdentityAccessList( context.Background(), @@ -5061,7 +5061,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListIdentityWhitelist( context.Background(), @@ -5120,7 +5120,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListRoleTagBlacklists( context.Background(), @@ -5179,7 +5179,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListRoleTagDenyLists( context.Background(), @@ -5238,7 +5238,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsListStsRoleRelationships( context.Background(), @@ -5298,7 +5298,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsLogin( context.Background(), @@ -5360,7 +5360,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsReadAuthRole( @@ -5422,7 +5422,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) certName := "certName_example" // string | Name of the certificate. resp, err := client.Auth.AwsReadCertificateConfiguration( @@ -5484,7 +5484,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadClientConfiguration( context.Background(), @@ -5542,7 +5542,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityAccessList( @@ -5604,7 +5604,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadIdentityAccessListTidySettings( context.Background(), @@ -5662,7 +5662,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadIdentityIntegrationConfiguration( context.Background(), @@ -5720,7 +5720,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) instanceId := "instanceId_example" // string | EC2 instance ID. A successful login operation from an EC2 instance gets cached in this accesslist, keyed off of instance ID. resp, err := client.Auth.AwsReadIdentityWhitelist( @@ -5782,7 +5782,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadIdentityWhitelistTidySettings( context.Background(), @@ -5840,7 +5840,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagBlacklist( @@ -5902,7 +5902,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadRoleTagBlacklistTidySettings( context.Background(), @@ -5960,7 +5960,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsReadRoleTagDenyList( @@ -6022,7 +6022,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsReadRoleTagDenyListTidySettings( context.Background(), @@ -6080,7 +6080,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsReadStsRole( @@ -6142,7 +6142,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsRotateRootCredentials( context.Background(), @@ -6201,7 +6201,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyIdentityAccessList( context.Background(), @@ -6264,7 +6264,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyIdentityWhitelist( context.Background(), @@ -6327,7 +6327,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyRoleTagBlacklist( context.Background(), @@ -6390,7 +6390,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AwsTidyRoleTagDenyList( context.Background(), @@ -6453,7 +6453,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteAuthRole( @@ -6520,7 +6520,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.AwsWriteRoleTag( @@ -6586,7 +6586,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagBlacklist( @@ -6648,7 +6648,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleTag := "roleTag_example" // string | Role tag to be deny listed. The tag can be supplied as-is. In order to avoid any encoding problems, it can be base64 encoded. resp, err := client.Auth.AwsWriteRoleTagDenyList( @@ -6711,7 +6711,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) accountId := "accountId_example" // string | AWS account ID to be associated with STS role. If set, Vault will use assumed credentials to verify any login attempts from EC2 instances in this account. resp, err := client.Auth.AwsWriteStsRole( @@ -6778,7 +6778,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureConfigureAuth( context.Background(), @@ -6840,7 +6840,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureDeleteAuthConfiguration( context.Background(), @@ -6898,7 +6898,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureDeleteAuthRole( @@ -6960,7 +6960,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureListAuthRoles( context.Background(), @@ -7020,7 +7020,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureLogin( context.Background(), @@ -7082,7 +7082,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureReadAuthConfiguration( context.Background(), @@ -7140,7 +7140,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureReadAuthRole( @@ -7202,7 +7202,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.AzureRotateRootCredentials( context.Background(), @@ -7261,7 +7261,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.AzureWriteAuthRole( @@ -7328,7 +7328,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CentrifyConfigure( context.Background(), @@ -7391,7 +7391,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CentrifyLogin( context.Background(), @@ -7453,7 +7453,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CentrifyReadConfiguration( context.Background(), @@ -7512,7 +7512,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertConfigure( context.Background(), @@ -7574,7 +7574,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCertificate( @@ -7636,7 +7636,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertDeleteCrl( @@ -7698,7 +7698,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertListCertificates( context.Background(), @@ -7757,7 +7757,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertListCrls( context.Background(), @@ -7817,7 +7817,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertLogin( context.Background(), @@ -7879,7 +7879,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCertificate( @@ -7941,7 +7941,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CertReadConfiguration( context.Background(), @@ -7999,7 +7999,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertReadCrl( @@ -8062,7 +8062,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCertificate( @@ -8129,7 +8129,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the certificate resp, err := client.Auth.CertWriteCrl( @@ -8196,7 +8196,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryConfigure( context.Background(), @@ -8258,7 +8258,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryDeleteConfiguration( context.Background(), @@ -8316,7 +8316,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryDeleteRole( @@ -8378,7 +8378,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryListRoles( context.Background(), @@ -8438,7 +8438,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryLogin( context.Background(), @@ -8500,7 +8500,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.CloudFoundryReadConfiguration( context.Background(), @@ -8558,7 +8558,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryReadRole( @@ -8621,7 +8621,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The name of the role. resp, err := client.Auth.CloudFoundryWriteRole( @@ -8688,7 +8688,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubConfigure( context.Background(), @@ -8750,7 +8750,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubDeleteTeamMapping( @@ -8812,7 +8812,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubDeleteUserMapping( @@ -8874,7 +8874,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubListTeams( context.Background(), @@ -8933,7 +8933,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubListUsers( context.Background(), @@ -8993,7 +8993,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubLogin( context.Background(), @@ -9055,7 +9055,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GithubReadConfiguration( context.Background(), @@ -9113,7 +9113,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubReadTeamMapping( @@ -9175,7 +9175,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubReadUserMapping( @@ -9238,7 +9238,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the teams mapping resp, err := client.Auth.GithubWriteTeamMapping( @@ -9305,7 +9305,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Key for the users mapping resp, err := client.Auth.GithubWriteUserMapping( @@ -9372,7 +9372,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudConfigureAuth( context.Background(), @@ -9434,7 +9434,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudDeleteRole( @@ -9497,7 +9497,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditLabelsForRole( @@ -9564,7 +9564,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudEditServiceAccountsForRole( @@ -9630,7 +9630,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudListRoles( context.Background(), @@ -9690,7 +9690,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudLogin( context.Background(), @@ -9752,7 +9752,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.GoogleCloudReadAuthConfiguration( context.Background(), @@ -9810,7 +9810,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudReadRole( @@ -9873,7 +9873,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.GoogleCloudWriteRole( @@ -9945,7 +9945,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtConfigure( context.Background(), @@ -10007,7 +10007,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtDeleteRole( @@ -10071,7 +10071,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtListRoles( context.Background(), @@ -10131,7 +10131,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtLogin( context.Background(), @@ -10193,7 +10193,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) clientNonce := "clientNonce_example" // string | code := "code_example" // string | @@ -10261,7 +10261,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtOidcCallbackFormPost( context.Background(), @@ -10324,7 +10324,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtOidcRequestAuthorizationUrl( context.Background(), @@ -10386,7 +10386,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.JwtReadConfiguration( context.Background(), @@ -10444,7 +10444,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtReadRole( @@ -10512,7 +10512,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.JwtWriteRole( @@ -10579,7 +10579,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosConfigure( context.Background(), @@ -10642,7 +10642,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosConfigureLdap( context.Background(), @@ -10704,7 +10704,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosDeleteGroup( @@ -10766,7 +10766,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosListGroups( context.Background(), @@ -10826,7 +10826,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosLogin( context.Background(), @@ -10888,7 +10888,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosReadConfiguration( context.Background(), @@ -10946,7 +10946,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosReadGroup( @@ -11008,7 +11008,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KerberosReadLdapConfiguration( context.Background(), @@ -11067,7 +11067,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.KerberosWriteGroup( @@ -11134,7 +11134,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesConfigureAuth( context.Background(), @@ -11196,7 +11196,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesDeleteAuthRole( @@ -11258,7 +11258,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesListAuthRoles( context.Background(), @@ -11318,7 +11318,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesLogin( context.Background(), @@ -11380,7 +11380,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.KubernetesReadAuthConfiguration( context.Background(), @@ -11438,7 +11438,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesReadAuthRole( @@ -11501,7 +11501,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Auth.KubernetesWriteAuthRole( @@ -11568,7 +11568,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapConfigureAuth( context.Background(), @@ -11630,7 +11630,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapDeleteGroup( @@ -11692,7 +11692,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapDeleteUser( @@ -11754,7 +11754,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapListGroups( context.Background(), @@ -11813,7 +11813,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapListUsers( context.Background(), @@ -11873,7 +11873,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | DN (distinguished name) to be used for login. resp, err := client.Auth.LdapLogin( @@ -11939,7 +11939,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.LdapReadAuthConfiguration( context.Background(), @@ -11997,7 +11997,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapReadGroup( @@ -12059,7 +12059,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapReadUser( @@ -12122,7 +12122,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP group. resp, err := client.Auth.LdapWriteGroup( @@ -12189,7 +12189,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the LDAP user. resp, err := client.Auth.LdapWriteUser( @@ -12256,7 +12256,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciConfigure( context.Background(), @@ -12318,7 +12318,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciDeleteConfiguration( context.Background(), @@ -12376,7 +12376,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciDeleteRole( @@ -12438,7 +12438,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciListRoles( context.Background(), @@ -12498,7 +12498,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciLogin( @@ -12564,7 +12564,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OciReadConfiguration( context.Background(), @@ -12622,7 +12622,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciReadRole( @@ -12685,7 +12685,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Auth.OciWriteRole( @@ -12752,7 +12752,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaConfigure( context.Background(), @@ -12814,7 +12814,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaDeleteGroup( @@ -12876,7 +12876,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaDeleteUser( @@ -12938,7 +12938,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaListGroups( context.Background(), @@ -12997,7 +12997,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaListUsers( context.Background(), @@ -13057,7 +13057,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username to be used for login. resp, err := client.Auth.OktaLogin( @@ -13123,7 +13123,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.OktaReadConfiguration( context.Background(), @@ -13181,7 +13181,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaReadGroup( @@ -13243,7 +13243,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaReadUser( @@ -13305,7 +13305,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) nonce := "nonce_example" // string | Nonce provided during a login request to retrieve the number verification challenge for the matching request. resp, err := client.Auth.OktaVerify( @@ -13368,7 +13368,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Okta group. resp, err := client.Auth.OktaWriteGroup( @@ -13435,7 +13435,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the user. resp, err := client.Auth.OktaWriteUser( @@ -13502,7 +13502,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusConfigure( context.Background(), @@ -13564,7 +13564,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusDeleteUser( @@ -13626,7 +13626,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusListUsers( context.Background(), @@ -13686,7 +13686,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusLogin( context.Background(), @@ -13749,7 +13749,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlusername := "urlusername_example" // string | Username to be used for login. (URL parameter) resp, err := client.Auth.RadiusLoginWithUsername( @@ -13815,7 +13815,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.RadiusReadConfiguration( context.Background(), @@ -13873,7 +13873,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusReadUser( @@ -13936,7 +13936,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the RADIUS user. resp, err := client.Auth.RadiusWriteUser( @@ -14003,7 +14003,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenCreate( context.Background(), @@ -14061,7 +14061,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenCreateAgainstRole( @@ -14126,7 +14126,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenCreateOrphan( context.Background(), @@ -14183,7 +14183,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenDeleteRole( @@ -14243,7 +14243,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenListAccessors( context.Background(), @@ -14297,7 +14297,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenListRoles( context.Background(), @@ -14352,7 +14352,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenLookUp( context.Background(), @@ -14410,7 +14410,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenLookUpAccessor( context.Background(), @@ -14467,7 +14467,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenLookUpSelf( context.Background(), @@ -14518,7 +14518,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenReadRole( @@ -14579,7 +14579,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRenew( context.Background(), @@ -14637,7 +14637,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRenewAccessor( context.Background(), @@ -14695,7 +14695,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRenewSelf( context.Background(), @@ -14753,7 +14753,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevoke( context.Background(), @@ -14811,7 +14811,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevokeAccessor( context.Background(), @@ -14869,7 +14869,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevokeOrphan( context.Background(), @@ -14926,7 +14926,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenRevokeSelf( context.Background(), @@ -14977,7 +14977,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.TokenTidy( context.Background(), @@ -15029,7 +15029,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleName := "roleName_example" // string | Name of the role resp, err := client.Auth.TokenWriteRole( @@ -15093,7 +15093,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassDeleteUser( @@ -15155,7 +15155,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Auth.UserpassListUsers( context.Background(), @@ -15215,7 +15215,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username of the user. resp, err := client.Auth.UserpassLogin( @@ -15281,7 +15281,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassReadUser( @@ -15344,7 +15344,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassResetPassword( @@ -15411,7 +15411,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassUpdatePolicies( @@ -15478,7 +15478,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) username := "username_example" // string | Username for this user. resp, err := client.Auth.UserpassWriteUser( diff --git a/docs/IdentityApi.md b/docs/IdentityApi.md index eca5308c..5acbf123 100644 --- a/docs/IdentityApi.md +++ b/docs/IdentityApi.md @@ -137,7 +137,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.AliasCreate( context.Background(), @@ -194,7 +194,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasDeleteById( @@ -254,7 +254,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.AliasListById( context.Background(), @@ -308,7 +308,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasReadById( @@ -369,7 +369,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.AliasUpdateById( @@ -434,7 +434,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityBatchDelete( context.Background(), @@ -492,7 +492,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityCreate( context.Background(), @@ -550,7 +550,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityCreateAlias( context.Background(), @@ -607,7 +607,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityDeleteAliasById( @@ -667,7 +667,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityDeleteById( @@ -727,7 +727,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityDeleteByName( @@ -787,7 +787,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityListAliasesById( context.Background(), @@ -841,7 +841,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityListById( context.Background(), @@ -895,7 +895,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityListByName( context.Background(), @@ -950,7 +950,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityLookUp( context.Background(), @@ -1008,7 +1008,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.EntityMerge( context.Background(), @@ -1065,7 +1065,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityReadAliasById( @@ -1125,7 +1125,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityReadById( @@ -1185,7 +1185,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityReadByName( @@ -1246,7 +1246,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the alias resp, err := client.Identity.EntityUpdateAliasById( @@ -1311,7 +1311,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the entity. If set, updates the corresponding existing entity. resp, err := client.Identity.EntityUpdateById( @@ -1376,7 +1376,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the entity resp, err := client.Identity.EntityUpdateByName( @@ -1441,7 +1441,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupCreate( context.Background(), @@ -1499,7 +1499,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupCreateAlias( context.Background(), @@ -1556,7 +1556,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupDeleteAliasById( @@ -1616,7 +1616,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupDeleteById( @@ -1676,7 +1676,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupDeleteByName( @@ -1736,7 +1736,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupListAliasesById( context.Background(), @@ -1790,7 +1790,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupListById( context.Background(), @@ -1844,7 +1844,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupListByName( context.Background(), @@ -1899,7 +1899,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.GroupLookUp( context.Background(), @@ -1956,7 +1956,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupReadAliasById( @@ -2016,7 +2016,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupReadById( @@ -2076,7 +2076,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupReadByName( @@ -2137,7 +2137,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group alias. resp, err := client.Identity.GroupUpdateAliasById( @@ -2202,7 +2202,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the group. If set, updates the corresponding existing group. resp, err := client.Identity.GroupUpdateById( @@ -2267,7 +2267,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the group. resp, err := client.Identity.GroupUpdateByName( @@ -2332,7 +2332,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaAdminDestroyTotpSecret( context.Background(), @@ -2390,7 +2390,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaAdminGenerateTotpSecret( context.Background(), @@ -2448,7 +2448,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreateDuoMethod( context.Background(), @@ -2506,7 +2506,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreateOktaMethod( context.Background(), @@ -2564,7 +2564,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreatePingIdMethod( context.Background(), @@ -2622,7 +2622,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaCreateTotpMethod( context.Background(), @@ -2679,7 +2679,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteDuoMethod( @@ -2739,7 +2739,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaDeleteLoginEnforcement( @@ -2799,7 +2799,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteOktaMethod( @@ -2859,7 +2859,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeletePingIdMethod( @@ -2919,7 +2919,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaDeleteTotpMethod( @@ -2980,7 +2980,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaGenerateTotpSecret( context.Background(), @@ -3037,7 +3037,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListDuoMethods( context.Background(), @@ -3091,7 +3091,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListLoginEnforcements( context.Background(), @@ -3145,7 +3145,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListMethods( context.Background(), @@ -3199,7 +3199,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListOktaMethods( context.Background(), @@ -3253,7 +3253,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListPingIdMethods( context.Background(), @@ -3307,7 +3307,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.MfaListTotpMethods( context.Background(), @@ -3361,7 +3361,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadDuoMethod( @@ -3421,7 +3421,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaReadLoginEnforcement( @@ -3481,7 +3481,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadMethod( @@ -3541,7 +3541,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadOktaMethod( @@ -3601,7 +3601,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadPingIdMethod( @@ -3661,7 +3661,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaReadTotpMethod( @@ -3722,7 +3722,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateDuoMethod( @@ -3787,7 +3787,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateOktaMethod( @@ -3852,7 +3852,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdatePingIdMethod( @@ -3917,7 +3917,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) methodId := "methodId_example" // string | The unique identifier for this MFA method. resp, err := client.Identity.MfaUpdateTotpMethod( @@ -3982,7 +3982,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name for this login enforcement configuration resp, err := client.Identity.MfaWriteLoginEnforcement( @@ -4047,7 +4047,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcConfigure( context.Background(), @@ -4104,7 +4104,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcDeleteAssignment( @@ -4164,7 +4164,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcDeleteClient( @@ -4224,7 +4224,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcDeleteKey( @@ -4284,7 +4284,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcDeleteProvider( @@ -4344,7 +4344,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcDeleteRole( @@ -4404,7 +4404,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcDeleteScope( @@ -4464,7 +4464,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcGenerateToken( @@ -4525,7 +4525,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcIntrospect( context.Background(), @@ -4582,7 +4582,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListAssignments( context.Background(), @@ -4636,7 +4636,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListClients( context.Background(), @@ -4690,7 +4690,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListKeys( context.Background(), @@ -4744,7 +4744,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) allowedClientId := "allowedClientId_example" // string | Filters the list of OIDC providers to those that allow the given client ID in their set of allowed_client_ids. (defaults to "") resp, err := client.Identity.OidcListProviders( @@ -4801,7 +4801,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListRoles( context.Background(), @@ -4855,7 +4855,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcListScopes( context.Background(), @@ -4909,7 +4909,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider clientId := "clientId_example" // string | The ID of the requesting client. @@ -4997,7 +4997,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderAuthorizeWithParameters( @@ -5062,7 +5062,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderToken( @@ -5126,7 +5126,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcProviderUserInfo( @@ -5186,7 +5186,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcReadAssignment( @@ -5246,7 +5246,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcReadClient( @@ -5306,7 +5306,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcReadConfiguration( context.Background(), @@ -5357,7 +5357,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcReadKey( @@ -5417,7 +5417,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcReadOpenIdConfiguration( context.Background(), @@ -5468,7 +5468,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProvider( @@ -5528,7 +5528,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderOpenIdConfiguration( @@ -5588,7 +5588,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcReadProviderPublicKeys( @@ -5648,7 +5648,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.OidcReadPublicKeys( context.Background(), @@ -5699,7 +5699,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcReadRole( @@ -5759,7 +5759,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcReadScope( @@ -5820,7 +5820,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcRotateKey( @@ -5885,7 +5885,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the assignment resp, err := client.Identity.OidcWriteAssignment( @@ -5950,7 +5950,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the client. resp, err := client.Identity.OidcWriteClient( @@ -6015,7 +6015,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Identity.OidcWriteKey( @@ -6080,7 +6080,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the provider resp, err := client.Identity.OidcWriteProvider( @@ -6145,7 +6145,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Identity.OidcWriteRole( @@ -6210,7 +6210,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the scope resp, err := client.Identity.OidcWriteScope( @@ -6275,7 +6275,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.PersonaCreate( context.Background(), @@ -6332,7 +6332,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaDeleteById( @@ -6392,7 +6392,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Identity.PersonaListById( context.Background(), @@ -6446,7 +6446,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaReadById( @@ -6507,7 +6507,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) id := "id_example" // string | ID of the persona resp, err := client.Identity.PersonaUpdateById( diff --git a/docs/SecretsApi.md b/docs/SecretsApi.md index e5e45c65..733099f7 100644 --- a/docs/SecretsApi.md +++ b/docs/SecretsApi.md @@ -423,7 +423,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudConfigure( context.Background(), @@ -485,7 +485,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudDeleteConfiguration( context.Background(), @@ -543,7 +543,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudDeleteRole( @@ -605,7 +605,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudGenerateCredentials( @@ -667,7 +667,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudListRoles( context.Background(), @@ -726,7 +726,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AliCloudReadConfiguration( context.Background(), @@ -784,7 +784,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudReadRole( @@ -847,7 +847,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the role. resp, err := client.Secrets.AliCloudWriteRole( @@ -914,7 +914,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsConfigureLease( context.Background(), @@ -977,7 +977,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsConfigureRootIamCredentials( context.Background(), @@ -1039,7 +1039,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsDeleteRole( @@ -1101,7 +1101,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsDeleteStaticRolesName( @@ -1163,7 +1163,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role @@ -1235,7 +1235,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateCredentialsWithParameters( @@ -1301,7 +1301,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role roleArn := "roleArn_example" // string | ARN of role to assume when credential_type is assumed_role @@ -1373,7 +1373,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsGenerateStsCredentialsWithParameters( @@ -1439,7 +1439,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsListRoles( context.Background(), @@ -1498,7 +1498,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsReadLeaseConfiguration( context.Background(), @@ -1556,7 +1556,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsReadRole( @@ -1618,7 +1618,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsReadRootIamCredentialsConfiguration( context.Background(), @@ -1676,7 +1676,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticCredsName( @@ -1738,7 +1738,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsReadStaticRolesName( @@ -1800,7 +1800,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AwsRotateRootIamCredentials( context.Background(), @@ -1859,7 +1859,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.AwsWriteRole( @@ -1926,7 +1926,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of this role. resp, err := client.Secrets.AwsWriteStaticRolesName( @@ -1993,7 +1993,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureConfigure( context.Background(), @@ -2055,7 +2055,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureDeleteConfiguration( context.Background(), @@ -2113,7 +2113,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureDeleteRole( @@ -2175,7 +2175,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureListRoles( context.Background(), @@ -2234,7 +2234,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureReadConfiguration( context.Background(), @@ -2292,7 +2292,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureReadRole( @@ -2354,7 +2354,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the Vault role resp, err := client.Secrets.AzureRequestServicePrincipalCredentials( @@ -2416,7 +2416,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.AzureRotateRoot( context.Background(), @@ -2475,7 +2475,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.AzureWriteRole( @@ -2542,7 +2542,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.ConsulConfigureAccess( context.Background(), @@ -2604,7 +2604,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulDeleteRole( @@ -2666,7 +2666,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | Name of the role. resp, err := client.Secrets.ConsulGenerateCredentials( @@ -2728,7 +2728,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.ConsulListRoles( context.Background(), @@ -2787,7 +2787,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.ConsulReadAccessConfiguration( context.Background(), @@ -2845,7 +2845,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulReadRole( @@ -2908,7 +2908,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.ConsulWriteRole( @@ -2974,7 +2974,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeDelete( @@ -3036,7 +3036,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeList( @@ -3097,7 +3097,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeRead( @@ -3157,7 +3157,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Specifies the path of the secret. resp, err := client.Secrets.CubbyholeWrite( @@ -3222,7 +3222,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseConfigureConnection( @@ -3288,7 +3288,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseDeleteConnectionConfiguration( @@ -3350,7 +3350,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteRole( @@ -3412,7 +3412,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseDeleteStaticRole( @@ -3474,7 +3474,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseGenerateCredentials( @@ -3536,7 +3536,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.DatabaseListConnections( context.Background(), @@ -3595,7 +3595,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.DatabaseListRoles( context.Background(), @@ -3654,7 +3654,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.DatabaseListStaticRoles( context.Background(), @@ -3713,7 +3713,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseReadConnectionConfiguration( @@ -3775,7 +3775,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadRole( @@ -3837,7 +3837,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseReadStaticRole( @@ -3899,7 +3899,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role. resp, err := client.Secrets.DatabaseReadStaticRoleCredentials( @@ -3961,7 +3961,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseResetConnection( @@ -4023,7 +4023,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of this database connection resp, err := client.Secrets.DatabaseRotateRootCredentials( @@ -4085,7 +4085,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role resp, err := client.Secrets.DatabaseRotateStaticRoleCredentials( @@ -4148,7 +4148,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteRole( @@ -4215,7 +4215,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.DatabaseWriteStaticRole( @@ -4282,7 +4282,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudConfigure( context.Background(), @@ -4344,7 +4344,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteImpersonatedAccount( @@ -4406,7 +4406,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudDeleteRoleset( @@ -4468,7 +4468,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudDeleteStaticAccount( @@ -4530,7 +4530,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the impersonated account. resp, err := client.Secrets.GoogleCloudGenerateImpersonatedAccountAccessToken( @@ -4592,7 +4592,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetAccessToken( @@ -4655,7 +4655,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) roleset := "roleset_example" // string | Required. Name of the role set. resp, err := client.Secrets.GoogleCloudGenerateRolesetKey( @@ -4721,7 +4721,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountAccessToken( @@ -4784,7 +4784,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the static account. resp, err := client.Secrets.GoogleCloudGenerateStaticAccountKey( @@ -4851,7 +4851,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsConfigure( context.Background(), @@ -4914,7 +4914,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsConfigureKey( @@ -4981,7 +4981,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for decryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsDecrypt( @@ -5047,7 +5047,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsDeleteConfiguration( context.Background(), @@ -5105,7 +5105,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsDeleteKey( @@ -5167,7 +5167,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to deregister in Vault. If the key exists in Google Cloud KMS, it will be left untouched. resp, err := client.Secrets.GoogleCloudKmsDeregisterKey( @@ -5230,7 +5230,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for encryption. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsEncrypt( @@ -5296,7 +5296,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsListKeys( context.Background(), @@ -5355,7 +5355,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudKmsReadConfiguration( context.Background(), @@ -5413,7 +5413,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKey( @@ -5475,7 +5475,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsReadKeyConfiguration( @@ -5538,7 +5538,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to use for encryption. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsReencrypt( @@ -5605,7 +5605,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to register in Vault. This will be the named used to refer to the underlying crypto key when encrypting or decrypting data. resp, err := client.Secrets.GoogleCloudKmsRegisterKey( @@ -5671,7 +5671,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key for which to get the public key. This key must already exist in Vault and Google Cloud KMS. resp, err := client.Secrets.GoogleCloudKmsRetrievePublicKey( @@ -5733,7 +5733,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key to rotate. This key must already be registered with Vault and point to a valid Google Cloud KMS crypto key. resp, err := client.Secrets.GoogleCloudKmsRotateKey( @@ -5796,7 +5796,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for signing. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsSign( @@ -5862,7 +5862,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsTrimKeyVersions( @@ -5925,7 +5925,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault to use for verification. This key must already exist in Vault and must map back to a Google Cloud KMS key. resp, err := client.Secrets.GoogleCloudKmsVerify( @@ -5992,7 +5992,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) key := "key_example" // string | Name of the key in Vault. resp, err := client.Secrets.GoogleCloudKmsWriteKey( @@ -6058,7 +6058,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudListImpersonatedAccounts( context.Background(), @@ -6117,7 +6117,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudListRolesets( context.Background(), @@ -6176,7 +6176,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudListStaticAccounts( context.Background(), @@ -6235,7 +6235,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudReadConfiguration( context.Background(), @@ -6293,7 +6293,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadImpersonatedAccount( @@ -6355,7 +6355,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudReadRoleset( @@ -6417,7 +6417,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudReadStaticAccount( @@ -6479,7 +6479,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRoleset( @@ -6541,7 +6541,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.GoogleCloudRotateRolesetKey( @@ -6603,7 +6603,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.GoogleCloudRotateRootCredentials( context.Background(), @@ -6661,7 +6661,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the account. resp, err := client.Secrets.GoogleCloudRotateStaticAccountKey( @@ -6724,7 +6724,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this impersonated account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteImpersonatedAccount( @@ -6791,7 +6791,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name of the role. resp, err := client.Secrets.GoogleCloudWriteRoleset( @@ -6858,7 +6858,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Required. Name to refer to this static account in Vault. Cannot be updated. resp, err := client.Secrets.GoogleCloudWriteStaticAccount( @@ -6924,7 +6924,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesCheckConfiguration( context.Background(), @@ -6983,7 +6983,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesConfigure( context.Background(), @@ -7045,7 +7045,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesDeleteConfiguration( context.Background(), @@ -7103,7 +7103,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesDeleteRole( @@ -7166,7 +7166,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Vault role resp, err := client.Secrets.KubernetesGenerateCredentials( @@ -7232,7 +7232,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesListRoles( context.Background(), @@ -7291,7 +7291,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KubernetesReadConfiguration( context.Background(), @@ -7349,7 +7349,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesReadRole( @@ -7412,7 +7412,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.KubernetesWriteRole( @@ -7478,7 +7478,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Delete( @@ -7540,7 +7540,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1List( @@ -7603,7 +7603,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Read( @@ -7665,7 +7665,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV1Write( @@ -7732,7 +7732,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KvV2Configure( context.Background(), @@ -7794,7 +7794,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Delete( @@ -7856,7 +7856,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteMetadataAndAllVersions( @@ -7919,7 +7919,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DeleteVersions( @@ -7986,7 +7986,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2DestroyVersions( @@ -8052,7 +8052,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2List( @@ -8115,7 +8115,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Read( @@ -8177,7 +8177,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.KvV2ReadConfiguration( context.Background(), @@ -8235,7 +8235,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadMetadata( @@ -8297,7 +8297,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2ReadSubkeys( @@ -8360,7 +8360,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2UndeleteVersions( @@ -8427,7 +8427,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2Write( @@ -8494,7 +8494,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Location of the secret. resp, err := client.Secrets.KvV2WriteMetadata( @@ -8561,7 +8561,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapConfigure( context.Background(), @@ -8623,7 +8623,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapDeleteConfiguration( context.Background(), @@ -8681,7 +8681,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapDeleteDynamicRole( @@ -8743,7 +8743,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapDeleteStaticRole( @@ -8806,7 +8806,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckIn( @@ -8873,7 +8873,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set resp, err := client.Secrets.LdapLibraryCheckOut( @@ -8939,7 +8939,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryCheckStatus( @@ -9002,7 +9002,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryConfigure( @@ -9068,7 +9068,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryDelete( @@ -9131,7 +9131,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryForceCheckIn( @@ -9197,7 +9197,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapLibraryList( context.Background(), @@ -9256,7 +9256,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the set. resp, err := client.Secrets.LdapLibraryRead( @@ -9318,7 +9318,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapListDynamicRoles( context.Background(), @@ -9377,7 +9377,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapListStaticRoles( context.Background(), @@ -9436,7 +9436,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapReadConfiguration( context.Background(), @@ -9494,7 +9494,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapReadDynamicRole( @@ -9556,7 +9556,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapReadStaticRole( @@ -9618,7 +9618,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the dynamic role. resp, err := client.Secrets.LdapRequestDynamicRoleCredentials( @@ -9680,7 +9680,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role. resp, err := client.Secrets.LdapRequestStaticRoleCredentials( @@ -9742,7 +9742,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.LdapRotateRootCredentials( context.Background(), @@ -9800,7 +9800,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the static role resp, err := client.Secrets.LdapRotateStaticRole( @@ -9863,7 +9863,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role (lowercase) resp, err := client.Secrets.LdapWriteDynamicRole( @@ -9930,7 +9930,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.LdapWriteStaticRole( @@ -9997,7 +9997,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.MongoDbAtlasConfigure( context.Background(), @@ -10059,7 +10059,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasDeleteRole( @@ -10121,7 +10121,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.MongoDbAtlasGenerateCredentials( @@ -10183,7 +10183,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.MongoDbAtlasListRoles( context.Background(), @@ -10242,7 +10242,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.MongoDbAtlasReadConfiguration( context.Background(), @@ -10300,7 +10300,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasReadRole( @@ -10363,7 +10363,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the Roles resp, err := client.Secrets.MongoDbAtlasWriteRole( @@ -10430,7 +10430,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadConfigureAccess( context.Background(), @@ -10493,7 +10493,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadConfigureLease( context.Background(), @@ -10555,7 +10555,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadDeleteAccessConfiguration( context.Background(), @@ -10613,7 +10613,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadDeleteLeaseConfiguration( context.Background(), @@ -10671,7 +10671,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadDeleteRole( @@ -10733,7 +10733,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadGenerateCredentials( @@ -10795,7 +10795,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadListRoles( context.Background(), @@ -10854,7 +10854,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadReadAccessConfiguration( context.Background(), @@ -10912,7 +10912,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.NomadReadLeaseConfiguration( context.Background(), @@ -10970,7 +10970,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadReadRole( @@ -11033,7 +11033,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.NomadWriteRole( @@ -11100,7 +11100,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureAcme( context.Background(), @@ -11163,7 +11163,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureAutoTidy( context.Background(), @@ -11226,7 +11226,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureCa( context.Background(), @@ -11289,7 +11289,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureCluster( context.Background(), @@ -11352,7 +11352,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureCrl( context.Background(), @@ -11415,7 +11415,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureIssuers( context.Background(), @@ -11478,7 +11478,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureKeys( context.Background(), @@ -11541,7 +11541,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiConfigureUrls( context.Background(), @@ -11604,7 +11604,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiCrossSignIntermediate( context.Background(), @@ -11666,7 +11666,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) keyId := "keyId_example" // string | EAB key identifier resp, err := client.Secrets.PkiDeleteEabKey( @@ -11728,7 +11728,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiDeleteIssuer( @@ -11790,7 +11790,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiDeleteKey( @@ -11852,7 +11852,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiDeleteRole( @@ -11914,7 +11914,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiDeleteRoot( context.Background(), @@ -11972,7 +11972,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateEabKey( context.Background(), @@ -12030,7 +12030,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiGenerateEabKeyForIssuer( @@ -12092,7 +12092,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -12158,7 +12158,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiGenerateEabKeyForRole( @@ -12221,7 +12221,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateExportedKey( context.Background(), @@ -12284,7 +12284,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateIntermediate( @@ -12351,7 +12351,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateInternalKey( context.Background(), @@ -12414,7 +12414,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiGenerateKmsKey( context.Background(), @@ -12477,7 +12477,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiGenerateRoot( @@ -12544,7 +12544,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiImportKey( context.Background(), @@ -12607,7 +12607,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiIssueWithRole( @@ -12674,7 +12674,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -12744,7 +12744,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrl( @@ -12806,7 +12806,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDelta( @@ -12868,7 +12868,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaDer( @@ -12930,7 +12930,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDeltaPem( @@ -12992,7 +12992,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlDer( @@ -13054,7 +13054,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerReadCrlPem( @@ -13117,7 +13117,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerResignCrls( @@ -13184,7 +13184,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignIntermediate( @@ -13251,7 +13251,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignRevocationList( @@ -13318,7 +13318,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignSelfIssued( @@ -13385,7 +13385,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiIssuerSignVerbatim( @@ -13452,7 +13452,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -13523,7 +13523,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") role := "role_example" // string | The desired role with configuration for this request @@ -13594,7 +13594,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateIntermediate( @@ -13661,7 +13661,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiIssuersGenerateRoot( @@ -13728,7 +13728,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiIssuersImportBundle( context.Background(), @@ -13791,7 +13791,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiIssuersImportCert( context.Background(), @@ -13853,7 +13853,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListCerts( context.Background(), @@ -13912,7 +13912,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListEabKeys( context.Background(), @@ -13971,7 +13971,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListIssuers( context.Background(), @@ -14030,7 +14030,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListKeys( context.Background(), @@ -14089,7 +14089,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListRevokedCerts( context.Background(), @@ -14148,7 +14148,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiListRoles( context.Background(), @@ -14207,7 +14207,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiQueryOcsp( context.Background(), @@ -14265,7 +14265,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) req := "req_example" // string | base-64 encoded ocsp request resp, err := client.Secrets.PkiQueryOcspWithGetReq( @@ -14327,7 +14327,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAcmeConfiguration( context.Background(), @@ -14385,7 +14385,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAcmeDirectory( context.Background(), @@ -14443,7 +14443,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAcmeNewNonce( context.Background(), @@ -14501,7 +14501,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadAutoTidyConfiguration( context.Background(), @@ -14559,7 +14559,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCaChainPem( context.Background(), @@ -14617,7 +14617,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCaDer( context.Background(), @@ -14675,7 +14675,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCaPem( context.Background(), @@ -14733,7 +14733,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCert( @@ -14795,7 +14795,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCertCaChain( context.Background(), @@ -14853,7 +14853,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCertCrl( context.Background(), @@ -14911,7 +14911,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCertDeltaCrl( context.Background(), @@ -14969,7 +14969,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawDer( @@ -15031,7 +15031,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) serial := "serial_example" // string | Certificate serial number, in colon- or hyphen-separated octal resp, err := client.Secrets.PkiReadCertRawPem( @@ -15093,7 +15093,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadClusterConfiguration( context.Background(), @@ -15151,7 +15151,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlConfiguration( context.Background(), @@ -15209,7 +15209,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlDelta( context.Background(), @@ -15267,7 +15267,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlDeltaPem( context.Background(), @@ -15325,7 +15325,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlDer( context.Background(), @@ -15383,7 +15383,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadCrlPem( context.Background(), @@ -15441,7 +15441,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuer( @@ -15503,7 +15503,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerDer( @@ -15565,7 +15565,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeDirectory( @@ -15627,7 +15627,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiReadIssuerIssuerRefAcmeNewNonce( @@ -15689,7 +15689,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -15755,7 +15755,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -15821,7 +15821,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerJson( @@ -15883,7 +15883,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiReadIssuerPem( @@ -15945,7 +15945,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadIssuersConfiguration( context.Background(), @@ -16003,7 +16003,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiReadKey( @@ -16065,7 +16065,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadKeysConfiguration( context.Background(), @@ -16123,7 +16123,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiReadRole( @@ -16185,7 +16185,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeDirectory( @@ -16247,7 +16247,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiReadRolesRoleAcmeNewNonce( @@ -16309,7 +16309,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReadUrlsConfiguration( context.Background(), @@ -16368,7 +16368,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiReplaceRoot( context.Background(), @@ -16431,7 +16431,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRevoke( context.Background(), @@ -16493,7 +16493,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiRevokeIssuer( @@ -16556,7 +16556,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRevokeWithKey( context.Background(), @@ -16619,7 +16619,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRootSignIntermediate( context.Background(), @@ -16682,7 +16682,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRootSignSelfIssued( context.Background(), @@ -16744,7 +16744,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRotateCrl( context.Background(), @@ -16802,7 +16802,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiRotateDeltaCrl( context.Background(), @@ -16861,7 +16861,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) exported := "exported_example" // string | Must be \"internal\", \"exported\" or \"kms\". If set to \"exported\", the generated private key will be returned. This is your *only* chance to retrieve the private key! resp, err := client.Secrets.PkiRotateRoot( @@ -16928,7 +16928,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiSetSignedIntermediate( context.Background(), @@ -16991,7 +16991,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiSignVerbatim( context.Background(), @@ -17054,7 +17054,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignVerbatimWithRole( @@ -17121,7 +17121,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request resp, err := client.Secrets.PkiSignWithRole( @@ -17188,7 +17188,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiTidy( context.Background(), @@ -17250,7 +17250,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiTidyCancel( context.Background(), @@ -17308,7 +17308,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiTidyStatus( context.Background(), @@ -17367,7 +17367,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) kid := "kid_example" // string | The key identifier provided by the CA resp, err := client.Secrets.PkiWriteAcmeAccountKid( @@ -17434,7 +17434,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value resp, err := client.Secrets.PkiWriteAcmeAuthorizationAuthId( @@ -17501,7 +17501,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -17572,7 +17572,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeNewAccount( context.Background(), @@ -17635,7 +17635,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeNewOrder( context.Background(), @@ -17698,7 +17698,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderId( @@ -17765,7 +17765,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdCert( @@ -17832,7 +17832,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch resp, err := client.Secrets.PkiWriteAcmeOrderOrderIdFinalize( @@ -17899,7 +17899,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeOrders( context.Background(), @@ -17962,7 +17962,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.PkiWriteAcmeRevokeCert( context.Background(), @@ -18025,7 +18025,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to a existing issuer; either \"default\" for the configured default issuer, an identifier or the name assigned to the issuer. (defaults to "default") resp, err := client.Secrets.PkiWriteIssuer( @@ -18092,7 +18092,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA @@ -18163,7 +18163,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -18234,7 +18234,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -18309,7 +18309,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewAccount( @@ -18376,7 +18376,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeNewOrder( @@ -18443,7 +18443,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18514,7 +18514,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18585,7 +18585,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -18656,7 +18656,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeOrders( @@ -18723,7 +18723,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id resp, err := client.Secrets.PkiWriteIssuerIssuerRefAcmeRevokeCert( @@ -18790,7 +18790,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id kid := "kid_example" // string | The key identifier provided by the CA @@ -18865,7 +18865,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id @@ -18940,7 +18940,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -19019,7 +19019,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -19090,7 +19090,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -19161,7 +19161,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -19236,7 +19236,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -19311,7 +19311,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id orderId := "orderId_example" // string | The ACME order identifier to fetch @@ -19386,7 +19386,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -19457,7 +19457,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) issuerRef := "issuerRef_example" // string | Reference to an existing issuer name or issuer id role := "role_example" // string | The desired role for the acme request @@ -19528,7 +19528,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) keyRef := "keyRef_example" // string | Reference to key; either \"default\" for the configured default key, an identifier of a key, or the name assigned to the key. (defaults to "default") resp, err := client.Secrets.PkiWriteKey( @@ -19595,7 +19595,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.PkiWriteRole( @@ -19662,7 +19662,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) kid := "kid_example" // string | The key identifier provided by the CA role := "role_example" // string | The desired role for the acme request @@ -19733,7 +19733,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value role := "role_example" // string | The desired role for the acme request @@ -19804,7 +19804,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) authId := "authId_example" // string | ACME authorization identifier value challengeType := "challengeType_example" // string | ACME challenge type @@ -19879,7 +19879,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewAccount( @@ -19946,7 +19946,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeNewOrder( @@ -20013,7 +20013,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -20084,7 +20084,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -20155,7 +20155,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) orderId := "orderId_example" // string | The ACME order identifier to fetch role := "role_example" // string | The desired role for the acme request @@ -20226,7 +20226,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeOrders( @@ -20293,7 +20293,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role for the acme request resp, err := client.Secrets.PkiWriteRolesRoleAcmeRevokeCert( @@ -20360,7 +20360,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqConfigureConnection( context.Background(), @@ -20423,7 +20423,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqConfigureLease( context.Background(), @@ -20485,7 +20485,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqDeleteRole( @@ -20547,7 +20547,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqListRoles( context.Background(), @@ -20606,7 +20606,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.RabbitMqReadLeaseConfiguration( context.Background(), @@ -20664,7 +20664,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqReadRole( @@ -20726,7 +20726,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqRequestCredentials( @@ -20789,7 +20789,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role. resp, err := client.Secrets.RabbitMqWriteRole( @@ -20856,7 +20856,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshConfigureCa( context.Background(), @@ -20919,7 +20919,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshConfigureZeroAddress( context.Background(), @@ -20981,7 +20981,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshDeleteCaConfiguration( context.Background(), @@ -21039,7 +21039,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshDeleteRole( @@ -21101,7 +21101,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshDeleteZeroAddressConfiguration( context.Background(), @@ -21160,7 +21160,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required] Name of the role resp, err := client.Secrets.SshGenerateCredentials( @@ -21227,7 +21227,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshIssueCertificate( @@ -21293,7 +21293,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshListRoles( context.Background(), @@ -21353,7 +21353,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshListRolesByIp( context.Background(), @@ -21415,7 +21415,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshReadCaConfiguration( context.Background(), @@ -21473,7 +21473,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshReadPublicKey( context.Background(), @@ -21531,7 +21531,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshReadRole( @@ -21593,7 +21593,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshReadZeroAddressConfiguration( context.Background(), @@ -21652,7 +21652,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | The desired role with configuration for this request. resp, err := client.Secrets.SshSignCertificate( @@ -21718,7 +21718,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshTidyDynamicHostKeys( context.Background(), @@ -21777,7 +21777,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.SshVerifyOtp( context.Background(), @@ -21840,7 +21840,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) role := "role_example" // string | [Required for all types] Name of the role being created. resp, err := client.Secrets.SshWriteRole( @@ -21907,7 +21907,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudConfigure( context.Background(), @@ -21969,7 +21969,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudDeleteConfiguration( context.Background(), @@ -22027,7 +22027,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudDeleteRole( @@ -22089,7 +22089,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudGenerateCredentials( @@ -22151,7 +22151,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudListRoles( context.Background(), @@ -22210,7 +22210,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TerraformCloudReadConfiguration( context.Background(), @@ -22268,7 +22268,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudReadRole( @@ -22330,7 +22330,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the team or organization role resp, err := client.Secrets.TerraformCloudRotateRole( @@ -22393,7 +22393,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the role resp, err := client.Secrets.TerraformCloudWriteRole( @@ -22460,7 +22460,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpCreateKey( @@ -22526,7 +22526,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpDeleteKey( @@ -22588,7 +22588,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpGenerateCode( @@ -22650,7 +22650,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TotpListKeys( context.Background(), @@ -22709,7 +22709,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpReadKey( @@ -22772,7 +22772,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key. resp, err := client.Secrets.TotpValidateCode( @@ -22838,7 +22838,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitBackUpKey( @@ -22900,7 +22900,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. @@ -22966,7 +22966,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) destination := "destination_example" // string | Destination key to export to; usually the public wrapping key of another Transit instance. source := "source_example" // string | Source key to export; could be any present key within Transit. @@ -23037,7 +23037,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitConfigureCache( context.Background(), @@ -23100,7 +23100,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitConfigureKey( @@ -23167,7 +23167,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitConfigureKeys( context.Background(), @@ -23230,7 +23230,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitCreateKey( @@ -23297,7 +23297,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDecrypt( @@ -23363,7 +23363,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitDeleteKey( @@ -23426,7 +23426,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitEncrypt( @@ -23492,7 +23492,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) @@ -23558,7 +23558,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key type_ := "type__example" // string | Type of key to export (encryption-key, signing-key, hmac-key, public-key) @@ -23629,7 +23629,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitGenerateCsrForKey( @@ -23696,7 +23696,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The backend key used for encrypting the data key plaintext := "plaintext_example" // string | \"plaintext\" will return the key in both plaintext and ciphertext; \"wrapped\" will return the ciphertext only. @@ -23767,7 +23767,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use for the HMAC function resp, err := client.Secrets.TransitGenerateHmac( @@ -23834,7 +23834,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use for the HMAC function urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) @@ -23905,7 +23905,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitGenerateRandom( context.Background(), @@ -23968,7 +23968,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.Secrets.TransitGenerateRandomWithBytes( @@ -24035,7 +24035,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.Secrets.TransitGenerateRandomWithSource( @@ -24102,7 +24102,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) @@ -24173,7 +24173,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitHash( context.Background(), @@ -24236,7 +24236,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.Secrets.TransitHashWithAlgorithm( @@ -24303,7 +24303,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKey( @@ -24370,7 +24370,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the key resp, err := client.Secrets.TransitImportKeyVersion( @@ -24436,7 +24436,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitListKeys( context.Background(), @@ -24495,7 +24495,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitReadCacheConfiguration( context.Background(), @@ -24553,7 +24553,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitReadKey( @@ -24615,7 +24615,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitReadKeysConfiguration( context.Background(), @@ -24673,7 +24673,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitReadWrappingKey( context.Background(), @@ -24732,7 +24732,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | If set, this will be the name of the restored key. resp, err := client.Secrets.TransitRestoreAndRenameKey( @@ -24799,7 +24799,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.Secrets.TransitRestoreKey( context.Background(), @@ -24862,7 +24862,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRewrap( @@ -24929,7 +24929,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitRotateKey( @@ -24996,7 +24996,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitSetCertificateForKey( @@ -25063,7 +25063,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use resp, err := client.Secrets.TransitSign( @@ -25130,7 +25130,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) @@ -25201,7 +25201,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the key resp, err := client.Secrets.TransitTrimKey( @@ -25268,7 +25268,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use resp, err := client.Secrets.TransitVerify( @@ -25335,7 +25335,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The key to use urlalgorithm := "urlalgorithm_example" // string | Hash algorithm to use (POST URL parameter) diff --git a/docs/SystemApi.md b/docs/SystemApi.md index abd3d842..98f009a1 100644 --- a/docs/SystemApi.md +++ b/docs/SystemApi.md @@ -188,7 +188,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingCalculateHash( @@ -252,7 +252,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingDisableDevice( @@ -312,7 +312,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingDisableRequestHeader( @@ -373,7 +373,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The name of the backend. Cannot be delimited. Example: \"mysql\" resp, err := client.System.AuditingEnableDevice( @@ -438,7 +438,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingEnableRequestHeader( @@ -502,7 +502,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.AuditingListEnabledDevices( context.Background(), @@ -553,7 +553,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.AuditingListRequestHeaders( context.Background(), @@ -604,7 +604,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | resp, err := client.System.AuditingReadRequestHeaderInformation( @@ -664,7 +664,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthDisableMethod( @@ -729,7 +729,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthEnableMethod( @@ -793,7 +793,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.AuthListEnabledMethods( context.Background(), @@ -844,7 +844,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Cannot be delimited. Example: \"user\" resp, err := client.System.AuthReadConfiguration( @@ -906,7 +906,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthReadTuningInformation( @@ -969,7 +969,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | Tune the configuration parameters for an auth path. resp, err := client.System.AuthTuneConfigurationParameters( @@ -1037,7 +1037,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CollectHostInformation( context.Background(), @@ -1092,7 +1092,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CollectInFlightRequestInformation( context.Background(), @@ -1144,7 +1144,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CorsConfigure( context.Background(), @@ -1201,7 +1201,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CorsDeleteConfiguration( context.Background(), @@ -1252,7 +1252,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.CorsReadConfiguration( context.Background(), @@ -1304,7 +1304,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Decode( context.Background(), @@ -1362,7 +1362,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyConfigureRotation( context.Background(), @@ -1419,7 +1419,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyReadRotationConfiguration( context.Background(), @@ -1470,7 +1470,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyRotate( context.Background(), @@ -1521,7 +1521,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.EncryptionKeyStatus( context.Background(), @@ -1573,7 +1573,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.GenerateHash( context.Background(), @@ -1631,7 +1631,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlalgorithm := "urlalgorithm_example" // string | Algorithm to use (POST URL parameter) resp, err := client.System.GenerateHashWithAlgorithm( @@ -1696,7 +1696,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.GenerateRandom( context.Background(), @@ -1754,7 +1754,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) resp, err := client.System.GenerateRandomWithBytes( @@ -1819,7 +1819,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") resp, err := client.System.GenerateRandomWithSource( @@ -1884,7 +1884,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) source := "source_example" // string | Which system to source random data from, ether \"platform\", \"seal\", or \"all\". (defaults to "platform") urlbytes := "urlbytes_example" // string | The number of bytes to generate (POST URL parameter) @@ -1952,7 +1952,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.HaStatus( context.Background(), @@ -2006,7 +2006,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Initialize( context.Background(), @@ -2064,7 +2064,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityConfigure( context.Background(), @@ -2121,7 +2121,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityExport( context.Background(), @@ -2172,7 +2172,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityReadConfiguration( context.Background(), @@ -2223,7 +2223,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityReportCounts( context.Background(), @@ -2274,7 +2274,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalClientActivityReportCountsThisMonth( context.Background(), @@ -2325,7 +2325,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalCountEntities( context.Background(), @@ -2376,7 +2376,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalCountRequests( context.Background(), @@ -2427,7 +2427,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalCountTokens( context.Background(), @@ -2478,7 +2478,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) context := "context_example" // string | Context string appended to every operationId genericMountPaths := true // bool | Use generic mount paths (defaults to false) @@ -2538,7 +2538,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalGenerateOpenApiDocumentWithParameters( context.Background(), @@ -2595,7 +2595,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) tag := "tag_example" // string | Name of subtree being observed resp, err := client.System.InternalInspectRouter( @@ -2655,7 +2655,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiListEnabledFeatureFlags( context.Background(), @@ -2706,7 +2706,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiListEnabledVisibleMounts( context.Background(), @@ -2757,7 +2757,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiListNamespaces( context.Background(), @@ -2808,7 +2808,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path of the mount. resp, err := client.System.InternalUiReadMountInformation( @@ -2868,7 +2868,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.InternalUiReadResultantAcl( context.Background(), @@ -2919,7 +2919,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeaderStatus( context.Background(), @@ -2970,7 +2970,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesCount( context.Background(), @@ -3025,7 +3025,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesForceRevokeLeaseWithPrefix( @@ -3085,7 +3085,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesList( context.Background(), @@ -3136,7 +3136,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) prefix := "prefix_example" // string | The path to list leases under. Example: \"aws/creds/deploy\" resp, err := client.System.LeasesLookUp( @@ -3198,7 +3198,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesReadLease( context.Background(), @@ -3256,7 +3256,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesRenewLease( context.Background(), @@ -3314,7 +3314,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRenewLeaseWithId( @@ -3379,7 +3379,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesRevokeLease( context.Background(), @@ -3437,7 +3437,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) urlLeaseId := "urlLeaseId_example" // string | The lease identifier to renew. This is included with a lease. resp, err := client.System.LeasesRevokeLeaseWithId( @@ -3502,7 +3502,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) prefix := "prefix_example" // string | The path to revoke keys under. Example: \"prod/aws/ops\" resp, err := client.System.LeasesRevokeLeaseWithPrefix( @@ -3566,7 +3566,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LeasesTidy( context.Background(), @@ -3617,7 +3617,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ListExperimentalFeatures( context.Background(), @@ -3668,7 +3668,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LockedUsersList( context.Background(), @@ -3719,7 +3719,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) aliasIdentifier := "aliasIdentifier_example" // string | It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID mountAccessor := "mountAccessor_example" // string | MountAccessor is the identifier of the mount entry to which the user belongs @@ -3783,7 +3783,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LoggersReadVerbosityLevel( context.Background(), @@ -3834,7 +3834,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersReadVerbosityLevelFor( @@ -3894,7 +3894,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LoggersRevertVerbosityLevel( context.Background(), @@ -3945,7 +3945,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersRevertVerbosityLevelFor( @@ -4006,7 +4006,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.LoggersUpdateVerbosityLevel( context.Background(), @@ -4064,7 +4064,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the logger to be modified. resp, err := client.System.LoggersUpdateVerbosityLevelFor( @@ -4128,7 +4128,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) format := "format_example" // string | Format to export metrics into. Currently accepts only \"prometheus\". resp, err := client.System.Metrics( @@ -4185,7 +4185,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.MfaValidate( context.Background(), @@ -4242,7 +4242,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) logFormat := "logFormat_example" // string | Output format of logs. Supported values are \"standard\" and \"json\". The default is \"standard\". (defaults to "standard") logLevel := "logLevel_example" // string | Log level to view system logs at. Currently supported values are \"trace\", \"debug\", \"info\", \"warn\", \"error\". @@ -4301,7 +4301,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsDisableSecretsEngine( @@ -4362,7 +4362,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsEnableSecretsEngine( @@ -4426,7 +4426,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.MountsListSecretsEngines( context.Background(), @@ -4477,7 +4477,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadConfiguration( @@ -4537,7 +4537,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsReadTuningInformation( @@ -4598,7 +4598,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | The path to mount to. Example: \"aws/east\" resp, err := client.System.MountsTuneConfigurationParameters( @@ -4662,7 +4662,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PluginsCatalogListPlugins( context.Background(), @@ -4713,7 +4713,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database resp, err := client.System.PluginsCatalogListPluginsWithType( @@ -4774,7 +4774,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogReadPluginConfiguration( @@ -4834,7 +4834,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -4899,7 +4899,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRegisterPlugin( @@ -4964,7 +4964,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -5032,7 +5032,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin resp, err := client.System.PluginsCatalogRemovePlugin( @@ -5092,7 +5092,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin type_ := "type__example" // string | The type of the plugin, may be auth, secret, or database @@ -5159,7 +5159,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PluginsReloadBackends( context.Background(), @@ -5216,7 +5216,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PluginsRuntimesCatalogListPluginsRuntimes( context.Background(), @@ -5270,7 +5270,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -5335,7 +5335,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -5403,7 +5403,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the plugin runtime type_ := "type__example" // string | The type of the plugin runtime @@ -5467,7 +5467,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesDeleteAclPolicy( @@ -5527,7 +5527,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesDeletePasswordPolicy( @@ -5587,7 +5587,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesGeneratePasswordFromPasswordPolicy( @@ -5647,7 +5647,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PoliciesListAclPolicies( context.Background(), @@ -5701,7 +5701,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PoliciesListPasswordPolicies( context.Background(), @@ -5755,7 +5755,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesReadAclPolicy( @@ -5815,7 +5815,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesReadPasswordPolicy( @@ -5876,7 +5876,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the policy. Example: \"ops\" resp, err := client.System.PoliciesWriteAclPolicy( @@ -5941,7 +5941,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | The name of the password policy. resp, err := client.System.PoliciesWritePasswordPolicy( @@ -6007,7 +6007,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofBlocking( context.Background(), @@ -6060,7 +6060,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofCommandLine( context.Background(), @@ -6113,7 +6113,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofCpuProfile( context.Background(), @@ -6166,7 +6166,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofExecutionTrace( context.Background(), @@ -6219,7 +6219,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofGoroutines( context.Background(), @@ -6274,7 +6274,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofIndex( context.Background(), @@ -6327,7 +6327,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofMemoryAllocations( context.Background(), @@ -6380,7 +6380,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofMemoryAllocationsLive( context.Background(), @@ -6433,7 +6433,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofMutexes( context.Background(), @@ -6486,7 +6486,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofSymbols( context.Background(), @@ -6539,7 +6539,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.PprofThreadCreations( context.Background(), @@ -6591,7 +6591,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.QueryTokenAccessorCapabilities( context.Background(), @@ -6649,7 +6649,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.QueryTokenCapabilities( context.Background(), @@ -6707,7 +6707,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.QueryTokenSelfCapabilities( context.Background(), @@ -6765,7 +6765,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RateLimitQuotasConfigure( context.Background(), @@ -6822,7 +6822,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasDelete( @@ -6882,7 +6882,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RateLimitQuotasList( context.Background(), @@ -6936,7 +6936,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasRead( @@ -6996,7 +6996,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RateLimitQuotasReadConfiguration( context.Background(), @@ -7048,7 +7048,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) name := "name_example" // string | Name of the quota rule. resp, err := client.System.RateLimitQuotasWrite( @@ -7112,7 +7112,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawDelete( @@ -7172,7 +7172,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawList( @@ -7233,7 +7233,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawRead( @@ -7294,7 +7294,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) path := "path_example" // string | resp, err := client.System.RawWrite( @@ -7358,7 +7358,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadHealthStatus( context.Background(), @@ -7409,7 +7409,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadInitializationStatus( context.Background(), @@ -7460,7 +7460,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadReplicationStatus( context.Background(), @@ -7513,7 +7513,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadSanitizedConfigurationState( context.Background(), @@ -7565,7 +7565,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.ReadWrappingProperties( context.Background(), @@ -7624,7 +7624,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptCancel( context.Background(), @@ -7678,7 +7678,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptInitialize( context.Background(), @@ -7735,7 +7735,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptReadProgress( context.Background(), @@ -7787,7 +7787,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyAttemptUpdate( context.Background(), @@ -7844,7 +7844,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyDeleteBackupKey( context.Background(), @@ -7895,7 +7895,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyDeleteBackupRecoveryKey( context.Background(), @@ -7946,7 +7946,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyReadBackupKey( context.Background(), @@ -7997,7 +7997,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyReadBackupRecoveryKey( context.Background(), @@ -8050,7 +8050,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyVerificationCancel( context.Background(), @@ -8101,7 +8101,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyVerificationReadProgress( context.Background(), @@ -8153,7 +8153,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RekeyVerificationUpdate( context.Background(), @@ -8210,7 +8210,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) subsystem := "subsystem_example" // string | resp, err := client.System.ReloadSubsystem( @@ -8271,7 +8271,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Remount( context.Background(), @@ -8328,7 +8328,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) migrationId := "migrationId_example" // string | The ID of the migration operation resp, err := client.System.RemountStatus( @@ -8389,7 +8389,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Rewrap( context.Background(), @@ -8446,7 +8446,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationCancel( context.Background(), @@ -8500,7 +8500,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationInitialize( context.Background(), @@ -8557,7 +8557,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationReadProgress( context.Background(), @@ -8611,7 +8611,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.RootTokenGenerationUpdate( context.Background(), @@ -8668,7 +8668,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Seal( context.Background(), @@ -8719,7 +8719,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.SealStatus( context.Background(), @@ -8772,7 +8772,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.StepDownLeader( context.Background(), @@ -8824,7 +8824,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersConfigure( @@ -8888,7 +8888,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersDeleteConfiguration( @@ -8948,7 +8948,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.UiHeadersList( context.Background(), @@ -9002,7 +9002,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) header := "header_example" // string | The name of the header. resp, err := client.System.UiHeadersReadConfiguration( @@ -9063,7 +9063,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Unseal( context.Background(), @@ -9121,7 +9121,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Unwrap( context.Background(), @@ -9178,7 +9178,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.VersionHistory( context.Background(), @@ -9232,7 +9232,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) resp, err := client.System.Wrap( context.Background(), diff --git a/generate/templates/api_doc.handlebars b/generate/templates/api_doc.handlebars index f9db7916..2d6f41fe 100644 --- a/generate/templates/api_doc.handlebars +++ b/generate/templates/api_doc.handlebars @@ -41,7 +41,7 @@ func main() { log.Fatal(err) } - // TODO: authenticate if necessary (see the top-level README.md) + // TODO: authenticate if necessary (see the top-level README.md) {{! Oddly, vendorExtensions.x-go-example seems to only be available within allParams, and not within pathParams, queryParams, etc. }} {{~#each allParams}}