// This is an automatically generated code sample. 
// To make this code sample work in your Oracle Cloud tenancy, 
// please replace the values for any parameters whose current values do not fit
// your use case (such as resource IDs, strings containing ‘EXAMPLE’ or ‘unique_id’, and 
// boolean, number, and enum parameters with values not fitting your use case).

import * as vault from "oci-vault";
import common = require("oci-common");

// Create a default authentication provider that uses the DEFAULT
// profile in the configuration file.
// Refer to <see href="https://docs.cloud.oracle.com/en-us/iaas/Content/API/Concepts/sdkconfig.htm#SDK_and_CLI_Configuration_File>the public documentation</see> on how to prepare a configuration file.

const provider: common.ConfigFileAuthenticationDetailsProvider = new common.ConfigFileAuthenticationDetailsProvider();

(async () => {
    try {
     // Create a service client
     const client = new vault.VaultsClient({ authenticationDetailsProvider: provider });

     // Create a request and dependent object(s).
	const  updateSecretDetails = {
		currentVersionNumber: 921,
		definedTags: {
			EXAMPLE_KEY_ysp1S :{
				EXAMPLE_KEY_nw10b :"EXAMPLE--Value"
				}
			},
		description: "EXAMPLE-description-Value",
		freeformTags: {
			EXAMPLE_KEY_SFLn4 :"EXAMPLE_VALUE_uqE15E5MSkP7f4azdFwd"
			},
		metadata: {
			EXAMPLE_KEY_00kvu :"EXAMPLE--Value"
			},
		secretContent: {
			contentType: "BASE64",			content: "EXAMPLE-content-Value",
			name: "EXAMPLE-name-Value",
			stage: vault.models.SecretContentDetails.Stage.Pending

			}
,
		rotationConfig: {
			rotationInterval: "EXAMPLE-rotationInterval-Value",
			targetSystemDetails: {
				targetSystemType: "ADB",				adbId: "ocid1.test.oc1..<unique_ID>EXAMPLE-adbId-Value"

				}
,
			isScheduledRotationEnabled: false,

			}
,
		secretRules: [{
				ruleType: "SECRET_EXPIRY_RULE",				secretVersionExpiryInterval: "EXAMPLE-secretVersionExpiryInterval-Value",
				timeOfAbsoluteExpiry: new Date("Wed Jan 03 06:37:11 UTC 2029"),
				isSecretContentRetrievalBlockedOnExpiry: false

				}
				],
		secretGenerationContext: {
			generationType: "SSH_KEY",			generationTemplate: vault.models.SshKeyGenerationContext.GenerationTemplate.Rsa2048,
			secretTemplate: "EXAMPLE-secretTemplate-Value"

			}
,
		enableAutoGeneration: false,

		}

	const updateSecretRequest: vault.requests.UpdateSecretRequest = { 
	secretId: "ocid1.test.oc1..<unique_ID>EXAMPLE-secretId-Value",
	updateSecretDetails: updateSecretDetails,
	ifMatch: "EXAMPLE-ifMatch-Value",
	opcRequestId: "7HUPRZNWAOLTCLH4ADKA<unique_ID>",

		}; 


     // Send request to the Client.
     const updateSecretResponse = await client.updateSecret(updateSecretRequest);
     }
     catch (error) {
         console.log("updateSecret Failed with error  " + error);
     }
})();