Skip to content

Commit cb50781

Browse files
committed
IAM credetials secrets with S2S authorization
Signed-off-by: Haim <[email protected]>
1 parent 24285e8 commit cb50781

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

secrets-manager/v2.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4155,14 +4155,14 @@ namespace SecretsManagerV2 {
41554155
created_at: string;
41564156
/** The date when a resource was modified. The date format follows `RFC 3339`. */
41574157
updated_at: string;
4158+
/** This parameter indicates whether the API key configuration is disabled. */
4159+
disabled?: boolean;
41584160
/** An IBM Cloud API key that can create and manage service IDs. The API key must be assigned the Editor
41594161
* platform role on the Access Groups Service and the Operator platform role on the IAM Identity Service. For more
41604162
* information, see the
41614163
* [docs](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-configure-iam-engine).
41624164
*/
41634165
api_key?: string;
4164-
/** This parameter indicates whether the API key configuration is disabled. */
4165-
disabled: boolean;
41664166
}
41674167
export namespace IAMCredentialsConfiguration {
41684168
export namespace Constants {
@@ -4212,6 +4212,8 @@ namespace SecretsManagerV2 {
42124212
created_at: string;
42134213
/** The date when a resource was modified. The date format follows `RFC 3339`. */
42144214
updated_at: string;
4215+
/** This parameter indicates whether the API key configuration is disabled. */
4216+
disabled?: boolean;
42154217
}
42164218
export namespace IAMCredentialsConfigurationMetadata {
42174219
export namespace Constants {

test/unit/secrets-manager.v2.test.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2960,9 +2960,9 @@ describe('SecretsManagerV2', () => {
29602960
const serviceUrl = secretsManagerServiceOptions.url;
29612961
const path = '/api/v2/configurations';
29622962
const mockPagerResponse1 =
2963-
'{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z"}],"limit":1}';
2963+
'{"next":{"href":"https://myhost.com/somePath?offset=1"},"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","disabled":true}],"limit":1}';
29642964
const mockPagerResponse2 =
2965-
'{"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z"}],"limit":1}';
2965+
'{"total_count":2,"configurations":[{"config_type":"iam_credentials_configuration","name":"my-secret-engine-config","secret_type":"arbitrary","created_by":"iam-ServiceId-e4a2f0a4-3c76-4bef-b1f2-fbeae11c0f21","created_at":"2022-04-12T23:20:50.520Z","updated_at":"2022-04-12T23:20:50.520Z","disabled":true}],"limit":1}';
29662966

29672967
beforeEach(() => {
29682968
unmock_createRequest();

0 commit comments

Comments
 (0)