diff --git a/CHANGELOG.md b/CHANGELOG.md index 0eeb2d311..19c7912db 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -144,6 +144,8 @@ - **Dependencies:** Bump STACKIT SDK core module from `v0.24.1` to `v0.25.0` - [v1.7.2](services/kms/CHANGELOG.md#v172) - **Dependencies:** Bump STACKIT SDK core module from `v0.25.0` to `v0.26.0` + - [v1.8.0](services/kms/CHANGELOG.md#v180) + - **Feature:** Added `_UNKNOWN_DEFAULT_OPEN_API` fallback value to all enums to handle unknown API values gracefully. - `lbapplication`: - [v0.5.7](services/lbapplication/CHANGELOG.md#v057) - **Dependencies:** Bump STACKIT SDK core module from `v0.24.0` to `v0.24.1` diff --git a/services/kms/CHANGELOG.md b/services/kms/CHANGELOG.md index 9f0e9b9e5..e56d0ddab 100644 --- a/services/kms/CHANGELOG.md +++ b/services/kms/CHANGELOG.md @@ -1,3 +1,6 @@ +## v1.8.0 +- **Feature:** Added `_UNKNOWN_DEFAULT_OPEN_API` fallback value to all enums to handle unknown API values gracefully. + ## v1.7.2 - **Dependencies:** Bump STACKIT SDK core module from `v0.25.0` to `v0.26.0` diff --git a/services/kms/VERSION b/services/kms/VERSION index 75e47606b..4e2cea3bb 100644 --- a/services/kms/VERSION +++ b/services/kms/VERSION @@ -1 +1 @@ -v1.7.2 \ No newline at end of file +v1.8.0 \ No newline at end of file diff --git a/services/kms/oas_commit b/services/kms/oas_commit index 3417bbd13..6fdb25c73 100644 --- a/services/kms/oas_commit +++ b/services/kms/oas_commit @@ -1 +1 @@ -9918ffafed202332f2a1a5698aafa60eed59886f +c8e6adbf2c24050dca06a64b301b3a43ba28be6e diff --git a/services/kms/v1api/model_access_scope.go b/services/kms/v1api/model_access_scope.go index 99bb545bf..f4198a1c8 100644 --- a/services/kms/v1api/model_access_scope.go +++ b/services/kms/v1api/model_access_scope.go @@ -20,14 +20,16 @@ type AccessScope string // List of access_scope const ( - ACCESSSCOPE_PUBLIC AccessScope = "PUBLIC" - ACCESSSCOPE_SNA AccessScope = "SNA" + ACCESSSCOPE_PUBLIC AccessScope = "PUBLIC" + ACCESSSCOPE_SNA AccessScope = "SNA" + ACCESSSCOPE_UNKNOWN_DEFAULT_OPEN_API AccessScope = "unknown_default_open_api" ) // All allowed values of AccessScope enum var AllowedAccessScopeEnumValues = []AccessScope{ "PUBLIC", "SNA", + "unknown_default_open_api", } func (v *AccessScope) UnmarshalJSON(src []byte) error { @@ -44,7 +46,8 @@ func (v *AccessScope) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid AccessScope", value) + *v = ACCESSSCOPE_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewAccessScopeFromValue returns a pointer to a valid AccessScope diff --git a/services/kms/v1api/model_algorithm.go b/services/kms/v1api/model_algorithm.go index 873c8616e..459eb46ae 100644 --- a/services/kms/v1api/model_algorithm.go +++ b/services/kms/v1api/model_algorithm.go @@ -20,17 +20,18 @@ type Algorithm string // List of algorithm const ( - ALGORITHM_AES_256_GCM Algorithm = "aes_256_gcm" - ALGORITHM_RSA_2048_OAEP_SHA256 Algorithm = "rsa_2048_oaep_sha256" - ALGORITHM_RSA_3072_OAEP_SHA256 Algorithm = "rsa_3072_oaep_sha256" - ALGORITHM_RSA_4096_OAEP_SHA256 Algorithm = "rsa_4096_oaep_sha256" - ALGORITHM_RSA_4096_OAEP_SHA512 Algorithm = "rsa_4096_oaep_sha512" - ALGORITHM_HMAC_SHA256 Algorithm = "hmac_sha256" - ALGORITHM_HMAC_SHA384 Algorithm = "hmac_sha384" - ALGORITHM_HMAC_SHA512 Algorithm = "hmac_sha512" - ALGORITHM_ECDSA_P256_SHA256 Algorithm = "ecdsa_p256_sha256" - ALGORITHM_ECDSA_P384_SHA384 Algorithm = "ecdsa_p384_sha384" - ALGORITHM_ECDSA_P521_SHA512 Algorithm = "ecdsa_p521_sha512" + ALGORITHM_AES_256_GCM Algorithm = "aes_256_gcm" + ALGORITHM_RSA_2048_OAEP_SHA256 Algorithm = "rsa_2048_oaep_sha256" + ALGORITHM_RSA_3072_OAEP_SHA256 Algorithm = "rsa_3072_oaep_sha256" + ALGORITHM_RSA_4096_OAEP_SHA256 Algorithm = "rsa_4096_oaep_sha256" + ALGORITHM_RSA_4096_OAEP_SHA512 Algorithm = "rsa_4096_oaep_sha512" + ALGORITHM_HMAC_SHA256 Algorithm = "hmac_sha256" + ALGORITHM_HMAC_SHA384 Algorithm = "hmac_sha384" + ALGORITHM_HMAC_SHA512 Algorithm = "hmac_sha512" + ALGORITHM_ECDSA_P256_SHA256 Algorithm = "ecdsa_p256_sha256" + ALGORITHM_ECDSA_P384_SHA384 Algorithm = "ecdsa_p384_sha384" + ALGORITHM_ECDSA_P521_SHA512 Algorithm = "ecdsa_p521_sha512" + ALGORITHM_UNKNOWN_DEFAULT_OPEN_API Algorithm = "unknown_default_open_api" ) // All allowed values of Algorithm enum @@ -46,6 +47,7 @@ var AllowedAlgorithmEnumValues = []Algorithm{ "ecdsa_p256_sha256", "ecdsa_p384_sha384", "ecdsa_p521_sha512", + "unknown_default_open_api", } func (v *Algorithm) UnmarshalJSON(src []byte) error { @@ -62,7 +64,8 @@ func (v *Algorithm) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Algorithm", value) + *v = ALGORITHM_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewAlgorithmFromValue returns a pointer to a valid Algorithm diff --git a/services/kms/v1api/model_protection.go b/services/kms/v1api/model_protection.go index 0bbfa8c0d..f0729cc31 100644 --- a/services/kms/v1api/model_protection.go +++ b/services/kms/v1api/model_protection.go @@ -20,12 +20,14 @@ type Protection string // List of protection const ( - PROTECTION_SOFTWARE Protection = "software" + PROTECTION_SOFTWARE Protection = "software" + PROTECTION_UNKNOWN_DEFAULT_OPEN_API Protection = "unknown_default_open_api" ) // All allowed values of Protection enum var AllowedProtectionEnumValues = []Protection{ "software", + "unknown_default_open_api", } func (v *Protection) UnmarshalJSON(src []byte) error { @@ -42,7 +44,8 @@ func (v *Protection) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Protection", value) + *v = PROTECTION_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewProtectionFromValue returns a pointer to a valid Protection diff --git a/services/kms/v1api/model_purpose.go b/services/kms/v1api/model_purpose.go index 476d79171..cac3a9e94 100644 --- a/services/kms/v1api/model_purpose.go +++ b/services/kms/v1api/model_purpose.go @@ -24,6 +24,7 @@ const ( PURPOSE_ASYMMETRIC_ENCRYPT_DECRYPT Purpose = "asymmetric_encrypt_decrypt" PURPOSE_MESSAGE_AUTHENTICATION_CODE Purpose = "message_authentication_code" PURPOSE_ASYMMETRIC_SIGN_VERIFY Purpose = "asymmetric_sign_verify" + PURPOSE_UNKNOWN_DEFAULT_OPEN_API Purpose = "unknown_default_open_api" ) // All allowed values of Purpose enum @@ -32,6 +33,7 @@ var AllowedPurposeEnumValues = []Purpose{ "asymmetric_encrypt_decrypt", "message_authentication_code", "asymmetric_sign_verify", + "unknown_default_open_api", } func (v *Purpose) UnmarshalJSON(src []byte) error { @@ -48,7 +50,8 @@ func (v *Purpose) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Purpose", value) + *v = PURPOSE_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewPurposeFromValue returns a pointer to a valid Purpose diff --git a/services/kms/v1api/model_wrapping_algorithm.go b/services/kms/v1api/model_wrapping_algorithm.go index 05181d825..5de6a69ae 100644 --- a/services/kms/v1api/model_wrapping_algorithm.go +++ b/services/kms/v1api/model_wrapping_algorithm.go @@ -28,6 +28,7 @@ const ( WRAPPINGALGORITHM_RSA_3072_OAEP_SHA256_AES_256_KEY_WRAP WrappingAlgorithm = "rsa_3072_oaep_sha256_aes_256_key_wrap" WRAPPINGALGORITHM_RSA_4096_OAEP_SHA256_AES_256_KEY_WRAP WrappingAlgorithm = "rsa_4096_oaep_sha256_aes_256_key_wrap" WRAPPINGALGORITHM_RSA_4096_OAEP_SHA512_AES_256_KEY_WRAP WrappingAlgorithm = "rsa_4096_oaep_sha512_aes_256_key_wrap" + WRAPPINGALGORITHM_UNKNOWN_DEFAULT_OPEN_API WrappingAlgorithm = "unknown_default_open_api" ) // All allowed values of WrappingAlgorithm enum @@ -40,6 +41,7 @@ var AllowedWrappingAlgorithmEnumValues = []WrappingAlgorithm{ "rsa_3072_oaep_sha256_aes_256_key_wrap", "rsa_4096_oaep_sha256_aes_256_key_wrap", "rsa_4096_oaep_sha512_aes_256_key_wrap", + "unknown_default_open_api", } func (v *WrappingAlgorithm) UnmarshalJSON(src []byte) error { @@ -56,7 +58,8 @@ func (v *WrappingAlgorithm) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid WrappingAlgorithm", value) + *v = WRAPPINGALGORITHM_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewWrappingAlgorithmFromValue returns a pointer to a valid WrappingAlgorithm diff --git a/services/kms/v1api/model_wrapping_purpose.go b/services/kms/v1api/model_wrapping_purpose.go index e33ea0b1f..0e7549632 100644 --- a/services/kms/v1api/model_wrapping_purpose.go +++ b/services/kms/v1api/model_wrapping_purpose.go @@ -20,14 +20,16 @@ type WrappingPurpose string // List of wrappingPurpose const ( - WRAPPINGPURPOSE_WRAP_SYMMETRIC_KEY WrappingPurpose = "wrap_symmetric_key" - WRAPPINGPURPOSE_WRAP_ASYMMETRIC_KEY WrappingPurpose = "wrap_asymmetric_key" + WRAPPINGPURPOSE_WRAP_SYMMETRIC_KEY WrappingPurpose = "wrap_symmetric_key" + WRAPPINGPURPOSE_WRAP_ASYMMETRIC_KEY WrappingPurpose = "wrap_asymmetric_key" + WRAPPINGPURPOSE_UNKNOWN_DEFAULT_OPEN_API WrappingPurpose = "unknown_default_open_api" ) // All allowed values of WrappingPurpose enum var AllowedWrappingPurposeEnumValues = []WrappingPurpose{ "wrap_symmetric_key", "wrap_asymmetric_key", + "unknown_default_open_api", } func (v *WrappingPurpose) UnmarshalJSON(src []byte) error { @@ -44,7 +46,8 @@ func (v *WrappingPurpose) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid WrappingPurpose", value) + *v = WRAPPINGPURPOSE_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewWrappingPurposeFromValue returns a pointer to a valid WrappingPurpose diff --git a/services/kms/v1betaapi/model_access_scope.go b/services/kms/v1betaapi/model_access_scope.go index 984364f50..bdbe076c2 100644 --- a/services/kms/v1betaapi/model_access_scope.go +++ b/services/kms/v1betaapi/model_access_scope.go @@ -20,14 +20,16 @@ type AccessScope string // List of access_scope const ( - ACCESSSCOPE_PUBLIC AccessScope = "PUBLIC" - ACCESSSCOPE_SNA AccessScope = "SNA" + ACCESSSCOPE_PUBLIC AccessScope = "PUBLIC" + ACCESSSCOPE_SNA AccessScope = "SNA" + ACCESSSCOPE_UNKNOWN_DEFAULT_OPEN_API AccessScope = "unknown_default_open_api" ) // All allowed values of AccessScope enum var AllowedAccessScopeEnumValues = []AccessScope{ "PUBLIC", "SNA", + "unknown_default_open_api", } func (v *AccessScope) UnmarshalJSON(src []byte) error { @@ -44,7 +46,8 @@ func (v *AccessScope) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid AccessScope", value) + *v = ACCESSSCOPE_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewAccessScopeFromValue returns a pointer to a valid AccessScope diff --git a/services/kms/v1betaapi/model_algorithm.go b/services/kms/v1betaapi/model_algorithm.go index f4a011eef..35e988882 100644 --- a/services/kms/v1betaapi/model_algorithm.go +++ b/services/kms/v1betaapi/model_algorithm.go @@ -20,17 +20,18 @@ type Algorithm string // List of algorithm const ( - ALGORITHM_AES_256_GCM Algorithm = "aes_256_gcm" - ALGORITHM_RSA_2048_OAEP_SHA256 Algorithm = "rsa_2048_oaep_sha256" - ALGORITHM_RSA_3072_OAEP_SHA256 Algorithm = "rsa_3072_oaep_sha256" - ALGORITHM_RSA_4096_OAEP_SHA256 Algorithm = "rsa_4096_oaep_sha256" - ALGORITHM_RSA_4096_OAEP_SHA512 Algorithm = "rsa_4096_oaep_sha512" - ALGORITHM_HMAC_SHA256 Algorithm = "hmac_sha256" - ALGORITHM_HMAC_SHA384 Algorithm = "hmac_sha384" - ALGORITHM_HMAC_SHA512 Algorithm = "hmac_sha512" - ALGORITHM_ECDSA_P256_SHA256 Algorithm = "ecdsa_p256_sha256" - ALGORITHM_ECDSA_P384_SHA384 Algorithm = "ecdsa_p384_sha384" - ALGORITHM_ECDSA_P521_SHA512 Algorithm = "ecdsa_p521_sha512" + ALGORITHM_AES_256_GCM Algorithm = "aes_256_gcm" + ALGORITHM_RSA_2048_OAEP_SHA256 Algorithm = "rsa_2048_oaep_sha256" + ALGORITHM_RSA_3072_OAEP_SHA256 Algorithm = "rsa_3072_oaep_sha256" + ALGORITHM_RSA_4096_OAEP_SHA256 Algorithm = "rsa_4096_oaep_sha256" + ALGORITHM_RSA_4096_OAEP_SHA512 Algorithm = "rsa_4096_oaep_sha512" + ALGORITHM_HMAC_SHA256 Algorithm = "hmac_sha256" + ALGORITHM_HMAC_SHA384 Algorithm = "hmac_sha384" + ALGORITHM_HMAC_SHA512 Algorithm = "hmac_sha512" + ALGORITHM_ECDSA_P256_SHA256 Algorithm = "ecdsa_p256_sha256" + ALGORITHM_ECDSA_P384_SHA384 Algorithm = "ecdsa_p384_sha384" + ALGORITHM_ECDSA_P521_SHA512 Algorithm = "ecdsa_p521_sha512" + ALGORITHM_UNKNOWN_DEFAULT_OPEN_API Algorithm = "unknown_default_open_api" ) // All allowed values of Algorithm enum @@ -46,6 +47,7 @@ var AllowedAlgorithmEnumValues = []Algorithm{ "ecdsa_p256_sha256", "ecdsa_p384_sha384", "ecdsa_p521_sha512", + "unknown_default_open_api", } func (v *Algorithm) UnmarshalJSON(src []byte) error { @@ -62,7 +64,8 @@ func (v *Algorithm) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Algorithm", value) + *v = ALGORITHM_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewAlgorithmFromValue returns a pointer to a valid Algorithm diff --git a/services/kms/v1betaapi/model_backend.go b/services/kms/v1betaapi/model_backend.go index 34831e809..53734f4d3 100644 --- a/services/kms/v1betaapi/model_backend.go +++ b/services/kms/v1betaapi/model_backend.go @@ -20,12 +20,14 @@ type Backend string // List of backend const ( - BACKEND_SOFTWARE Backend = "software" + BACKEND_SOFTWARE Backend = "software" + BACKEND_UNKNOWN_DEFAULT_OPEN_API Backend = "unknown_default_open_api" ) // All allowed values of Backend enum var AllowedBackendEnumValues = []Backend{ "software", + "unknown_default_open_api", } func (v *Backend) UnmarshalJSON(src []byte) error { @@ -42,7 +44,8 @@ func (v *Backend) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Backend", value) + *v = BACKEND_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewBackendFromValue returns a pointer to a valid Backend diff --git a/services/kms/v1betaapi/model_protection.go b/services/kms/v1betaapi/model_protection.go index 497acc7ee..716e59246 100644 --- a/services/kms/v1betaapi/model_protection.go +++ b/services/kms/v1betaapi/model_protection.go @@ -20,12 +20,14 @@ type Protection string // List of protection const ( - PROTECTION_SOFTWARE Protection = "software" + PROTECTION_SOFTWARE Protection = "software" + PROTECTION_UNKNOWN_DEFAULT_OPEN_API Protection = "unknown_default_open_api" ) // All allowed values of Protection enum var AllowedProtectionEnumValues = []Protection{ "software", + "unknown_default_open_api", } func (v *Protection) UnmarshalJSON(src []byte) error { @@ -42,7 +44,8 @@ func (v *Protection) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Protection", value) + *v = PROTECTION_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewProtectionFromValue returns a pointer to a valid Protection diff --git a/services/kms/v1betaapi/model_purpose.go b/services/kms/v1betaapi/model_purpose.go index 91c2ad5db..57dbed86f 100644 --- a/services/kms/v1betaapi/model_purpose.go +++ b/services/kms/v1betaapi/model_purpose.go @@ -24,6 +24,7 @@ const ( PURPOSE_ASYMMETRIC_ENCRYPT_DECRYPT Purpose = "asymmetric_encrypt_decrypt" PURPOSE_MESSAGE_AUTHENTICATION_CODE Purpose = "message_authentication_code" PURPOSE_ASYMMETRIC_SIGN_VERIFY Purpose = "asymmetric_sign_verify" + PURPOSE_UNKNOWN_DEFAULT_OPEN_API Purpose = "unknown_default_open_api" ) // All allowed values of Purpose enum @@ -32,6 +33,7 @@ var AllowedPurposeEnumValues = []Purpose{ "asymmetric_encrypt_decrypt", "message_authentication_code", "asymmetric_sign_verify", + "unknown_default_open_api", } func (v *Purpose) UnmarshalJSON(src []byte) error { @@ -48,7 +50,8 @@ func (v *Purpose) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid Purpose", value) + *v = PURPOSE_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewPurposeFromValue returns a pointer to a valid Purpose diff --git a/services/kms/v1betaapi/model_wrapping_algorithm.go b/services/kms/v1betaapi/model_wrapping_algorithm.go index 59f7f48df..c642f282c 100644 --- a/services/kms/v1betaapi/model_wrapping_algorithm.go +++ b/services/kms/v1betaapi/model_wrapping_algorithm.go @@ -28,6 +28,7 @@ const ( WRAPPINGALGORITHM_RSA_3072_OAEP_SHA256_AES_256_KEY_WRAP WrappingAlgorithm = "rsa_3072_oaep_sha256_aes_256_key_wrap" WRAPPINGALGORITHM_RSA_4096_OAEP_SHA256_AES_256_KEY_WRAP WrappingAlgorithm = "rsa_4096_oaep_sha256_aes_256_key_wrap" WRAPPINGALGORITHM_RSA_4096_OAEP_SHA512_AES_256_KEY_WRAP WrappingAlgorithm = "rsa_4096_oaep_sha512_aes_256_key_wrap" + WRAPPINGALGORITHM_UNKNOWN_DEFAULT_OPEN_API WrappingAlgorithm = "unknown_default_open_api" ) // All allowed values of WrappingAlgorithm enum @@ -40,6 +41,7 @@ var AllowedWrappingAlgorithmEnumValues = []WrappingAlgorithm{ "rsa_3072_oaep_sha256_aes_256_key_wrap", "rsa_4096_oaep_sha256_aes_256_key_wrap", "rsa_4096_oaep_sha512_aes_256_key_wrap", + "unknown_default_open_api", } func (v *WrappingAlgorithm) UnmarshalJSON(src []byte) error { @@ -56,7 +58,8 @@ func (v *WrappingAlgorithm) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid WrappingAlgorithm", value) + *v = WRAPPINGALGORITHM_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewWrappingAlgorithmFromValue returns a pointer to a valid WrappingAlgorithm diff --git a/services/kms/v1betaapi/model_wrapping_purpose.go b/services/kms/v1betaapi/model_wrapping_purpose.go index 3b2501ec4..a5f973b03 100644 --- a/services/kms/v1betaapi/model_wrapping_purpose.go +++ b/services/kms/v1betaapi/model_wrapping_purpose.go @@ -20,14 +20,16 @@ type WrappingPurpose string // List of wrappingPurpose const ( - WRAPPINGPURPOSE_WRAP_SYMMETRIC_KEY WrappingPurpose = "wrap_symmetric_key" - WRAPPINGPURPOSE_WRAP_ASYMMETRIC_KEY WrappingPurpose = "wrap_asymmetric_key" + WRAPPINGPURPOSE_WRAP_SYMMETRIC_KEY WrappingPurpose = "wrap_symmetric_key" + WRAPPINGPURPOSE_WRAP_ASYMMETRIC_KEY WrappingPurpose = "wrap_asymmetric_key" + WRAPPINGPURPOSE_UNKNOWN_DEFAULT_OPEN_API WrappingPurpose = "unknown_default_open_api" ) // All allowed values of WrappingPurpose enum var AllowedWrappingPurposeEnumValues = []WrappingPurpose{ "wrap_symmetric_key", "wrap_asymmetric_key", + "unknown_default_open_api", } func (v *WrappingPurpose) UnmarshalJSON(src []byte) error { @@ -44,7 +46,8 @@ func (v *WrappingPurpose) UnmarshalJSON(src []byte) error { } } - return fmt.Errorf("%+v is not a valid WrappingPurpose", value) + *v = WRAPPINGPURPOSE_UNKNOWN_DEFAULT_OPEN_API + return nil } // NewWrappingPurposeFromValue returns a pointer to a valid WrappingPurpose