akeyless 2.16.11 → 2.18.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (113) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +9 -8
  3. data/docs/AccountGeneralSettings.md +20 -0
  4. data/docs/CreateArtifactoryTarget.md +1 -1
  5. data/docs/CreateAuthMethodK8S.md +2 -2
  6. data/docs/CreateAuthMethodLDAP.md +3 -1
  7. data/docs/CreateAuthMethodLDAPOutput.md +3 -1
  8. data/docs/CreateKeyOutput.md +5 -1
  9. data/docs/CreateLdapTarget.md +2 -0
  10. data/docs/CreatePKICertIssuer.md +5 -5
  11. data/docs/CreateSSHCertIssuer.md +1 -1
  12. data/docs/CreateSalesforceTarget.md +7 -3
  13. data/docs/CreateSecret.md +11 -19
  14. data/docs/DSProducerDetails.md +2 -0
  15. data/docs/DataProtectionSection.md +18 -0
  16. data/docs/Decrypt.md +3 -1
  17. data/docs/DecryptFile.md +6 -0
  18. data/docs/DecryptPKCS1.md +5 -1
  19. data/docs/DeleteItem.md +2 -2
  20. data/docs/DescribeItem.md +4 -0
  21. data/docs/DescribeSubClaims.md +20 -0
  22. data/docs/DescribeSubClaimsOutput.md +18 -0
  23. data/docs/Encrypt.md +3 -1
  24. data/docs/EncryptFile.md +4 -0
  25. data/docs/EncryptPKCS1.md +5 -1
  26. data/docs/GatewayCreateK8SAuthConfig.md +10 -4
  27. data/docs/GatewayCreateProducerDockerhub.md +1 -1
  28. data/docs/GatewayGetK8SAuthConfigOutput.md +7 -1
  29. data/docs/GatewayRevokeTmpUsers.md +4 -2
  30. data/docs/GatewayUpdateK8SAuthConfig.md +10 -4
  31. data/docs/GatewayUpdateLdapAuthConfig.md +2 -2
  32. data/docs/GatewayUpdateProducerDockerhub.md +1 -1
  33. data/docs/GetAccountSettingsCommandOutput.md +2 -0
  34. data/docs/GetSecretValue.md +2 -2
  35. data/docs/Item.md +2 -0
  36. data/docs/K8SAuth.md +7 -1
  37. data/docs/KubernetesAccessRules.md +2 -0
  38. data/docs/LDAPAccessRules.md +2 -0
  39. data/docs/ListItems.md +2 -2
  40. data/docs/LogForwardingConfigPart.md +2 -0
  41. data/docs/RuleAssigner.md +20 -0
  42. data/docs/SignPKCS1.md +5 -1
  43. data/docs/TargetTypeDetailsInput.md +5 -1
  44. data/docs/UpdateAccountSettings.md +13 -1
  45. data/docs/UpdateAuthMethodK8S.md +2 -2
  46. data/docs/UpdateAuthMethodLDAP.md +3 -1
  47. data/docs/UpdateAuthMethodLDAPOutput.md +18 -0
  48. data/docs/UpdateItem.md +2 -2
  49. data/docs/UpdateLdapTarget.md +2 -0
  50. data/docs/UpdateSalesforceTarget.md +7 -3
  51. data/docs/UpdateSecretVal.md +11 -9
  52. data/docs/V2Api.md +46 -109
  53. data/docs/VerifyPKCS1.md +4 -0
  54. data/lib/akeyless/api/v2_api.rb +43 -107
  55. data/lib/akeyless/models/account_general_settings.rb +229 -0
  56. data/lib/akeyless/models/create_artifactory_target.rb +1 -1
  57. data/lib/akeyless/models/create_auth_method_k8_s.rb +2 -2
  58. data/lib/akeyless/models/create_auth_method_ldap.rb +14 -2
  59. data/lib/akeyless/models/create_auth_method_ldap_output.rb +13 -4
  60. data/lib/akeyless/models/create_key_output.rb +22 -4
  61. data/lib/akeyless/models/create_ldap_target.rb +13 -1
  62. data/lib/akeyless/models/create_pki_cert_issuer.rb +5 -5
  63. data/lib/akeyless/models/create_salesforce_target.rb +29 -19
  64. data/lib/akeyless/models/create_secret.rb +50 -90
  65. data/lib/akeyless/models/create_ssh_cert_issuer.rb +1 -1
  66. data/lib/akeyless/models/data_protection_section.rb +220 -0
  67. data/lib/akeyless/models/decrypt.rb +16 -1
  68. data/lib/akeyless/models/decrypt_file.rb +36 -1
  69. data/lib/akeyless/models/decrypt_pkcs1.rb +22 -2
  70. data/lib/akeyless/models/delete_item.rb +11 -11
  71. data/lib/akeyless/models/describe_item.rb +21 -1
  72. data/lib/akeyless/models/describe_sub_claims.rb +231 -0
  73. data/lib/akeyless/models/describe_sub_claims_output.rb +221 -0
  74. data/lib/akeyless/models/ds_producer_details.rb +10 -1
  75. data/lib/akeyless/models/encrypt.rb +16 -1
  76. data/lib/akeyless/models/encrypt_file.rb +21 -1
  77. data/lib/akeyless/models/encrypt_pkcs1.rb +22 -2
  78. data/lib/akeyless/models/gateway_create_k8_s_auth_config.rb +38 -4
  79. data/lib/akeyless/models/gateway_create_producer_dockerhub.rb +1 -1
  80. data/lib/akeyless/models/gateway_get_k8_s_auth_config_output.rb +32 -2
  81. data/lib/akeyless/models/gateway_revoke_tmp_users.rb +14 -2
  82. data/lib/akeyless/models/gateway_update_k8_s_auth_config.rb +38 -4
  83. data/lib/akeyless/models/gateway_update_ldap_auth_config.rb +2 -2
  84. data/lib/akeyless/models/gateway_update_producer_dockerhub.rb +1 -1
  85. data/lib/akeyless/models/get_account_settings_command_output.rb +10 -1
  86. data/lib/akeyless/models/get_secret_value.rb +7 -7
  87. data/lib/akeyless/models/item.rb +10 -1
  88. data/lib/akeyless/models/k8_s_auth.rb +32 -2
  89. data/lib/akeyless/models/kubernetes_access_rules.rb +11 -1
  90. data/lib/akeyless/models/ldap_access_rules.rb +11 -1
  91. data/lib/akeyless/models/list_items.rb +11 -11
  92. data/lib/akeyless/models/log_forwarding_config_part.rb +10 -1
  93. data/lib/akeyless/models/rule_assigner.rb +228 -0
  94. data/lib/akeyless/models/sign_pkcs1.rb +21 -6
  95. data/lib/akeyless/models/target_type_details_input.rb +23 -1
  96. data/lib/akeyless/models/update_account_settings.rb +64 -4
  97. data/lib/akeyless/models/update_auth_method_k8_s.rb +2 -4
  98. data/lib/akeyless/models/update_auth_method_ldap.rb +12 -2
  99. data/lib/akeyless/models/update_auth_method_ldap_output.rb +219 -0
  100. data/lib/akeyless/models/update_item.rb +11 -11
  101. data/lib/akeyless/models/update_ldap_target.rb +11 -1
  102. data/lib/akeyless/models/update_salesforce_target.rb +29 -19
  103. data/lib/akeyless/models/update_secret_val.rb +52 -42
  104. data/lib/akeyless/models/verify_pkcs1.rb +21 -1
  105. data/lib/akeyless/version.rb +1 -1
  106. data/lib/akeyless.rb +6 -4
  107. data/spec/models/account_general_settings_spec.rb +34 -0
  108. data/spec/models/data_protection_section_spec.rb +34 -0
  109. data/spec/models/describe_sub_claims_output_spec.rb +34 -0
  110. data/spec/models/describe_sub_claims_spec.rb +40 -0
  111. data/spec/models/rule_assigner_spec.rb +40 -0
  112. data/spec/models/update_auth_method_ldap_output_spec.rb +34 -0
  113. metadata +525 -501
@@ -5,15 +5,18 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_id** | **String** | The access ID of the Kubernetes auth method | |
8
+ | **cluster_api_type** | **String** | Cluster access type. options: [native_k8s, rancher] | [optional][default to 'native_k8s'] |
8
9
  | **config_encryption_key_name** | **String** | Config encryption key | [optional] |
9
- | **k8s_ca_cert** | **String** | The CA Cert (in PEM format) to use to call into the kubernetes API server | [optional] |
10
+ | **k8s_ca_cert** | **String** | The CA Certificate (base64 encoded) to use to call into the kubernetes API server | [optional] |
10
11
  | **k8s_host** | **String** | The URL of the kubernetes API server | |
11
12
  | **k8s_issuer** | **String** | The Kubernetes JWT issuer name. If not set, kubernetes/serviceaccount will use as an issuer. | [optional] |
12
13
  | **name** | **String** | K8S Auth config name | |
13
- | **signing_key** | **String** | The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth | |
14
+ | **rancher_api_key** | **String** | The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only) | [optional] |
15
+ | **rancher_cluster_id** | **String** | The cluster id as define in rancher (relevant for \"rancher\" only) | [optional] |
16
+ | **signing_key** | **String** | The private key (base64 encoded) associated with the public key defined in the Kubernetes auth | |
14
17
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
- | **token_exp** | **Integer** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional] |
16
- | **token_reviewer_jwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] |
18
+ | **token_exp** | **Integer** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional][default to 300] |
19
+ | **token_reviewer_jwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] |
17
20
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
18
21
 
19
22
  ## Example
@@ -23,11 +26,14 @@ require 'akeyless'
23
26
 
24
27
  instance = Akeyless::GatewayCreateK8SAuthConfig.new(
25
28
  access_id: null,
29
+ cluster_api_type: null,
26
30
  config_encryption_key_name: null,
27
31
  k8s_ca_cert: null,
28
32
  k8s_host: null,
29
33
  k8s_issuer: null,
30
34
  name: null,
35
+ rancher_api_key: null,
36
+ rancher_cluster_id: null,
31
37
  signing_key: null,
32
38
  token: null,
33
39
  token_exp: null,
@@ -6,7 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
8
8
  | **dockerhub_password** | **String** | DockerhubPassword is either the user's password access token to manage the repository | [optional] |
9
- | **dockerhub_token_scopes** | **String** | Access token scopes list (comma seperated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\" | [optional] |
9
+ | **dockerhub_token_scopes** | **String** | Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\" | [optional] |
10
10
  | **dockerhub_username** | **String** | DockerhubUsername is the name of the user in dockerhub | [optional] |
11
11
  | **name** | **String** | Producer name | |
12
12
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
@@ -7,15 +7,18 @@
7
7
  | **am_token_expiration** | **Integer** | AuthMethodTokenExpiration is time in seconds of expiration of the Akeyless Kube Auth Method token | [optional] |
8
8
  | **auth_method_access_id** | **String** | AuthMethodAccessId of the Kubernetes auth method | [optional] |
9
9
  | **auth_method_prv_key_pem** | **String** | AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method | [optional] |
10
+ | **cluster_api_type** | **String** | ClusterApiType defines types of API access to cluster | [optional] |
10
11
  | **disable_iss_validation** | **Boolean** | DisableISSValidation is optional parameter to disable ISS validation | [optional] |
11
12
  | **id** | **String** | | [optional] |
12
13
  | **k8s_ca_cert** | **String** | K8SCACert is the CA Cert to use to call into the kubernetes API | [optional] |
13
14
  | **k8s_host** | **String** | K8SHost is the url string for the kubernetes API | [optional] |
14
15
  | **k8s_issuer** | **String** | K8SIssuer is the claim that specifies who issued the Kubernetes token | [optional] |
15
16
  | **k8s_pub_keys_pem** | **Array<String>** | K8SPublicKeysPEM is the list of public key in PEM format | [optional] |
16
- | **k8s_token_reviewer_jwt** | **String** | K8STokenReviewerJW\"K8S Auth config %v successfully created\\n\", clictx.Color().Bold(c.K8SAuthConfigName)T is the bearer to use during the TokenReview API call | [optional] |
17
+ | **k8s_token_reviewer_jwt** | **String** | K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used during TokenReview API call | [optional] |
17
18
  | **name** | **String** | | [optional] |
18
19
  | **protection_key** | **String** | | [optional] |
20
+ | **rancher_api_key** | **String** | RancherApiKey the bear token for clusterApiTypeRancher | [optional] |
21
+ | **rancher_cluster_id** | **String** | RancherClusterId cluster id as define in rancher (in case of clusterApiTypeRancher) | [optional] |
19
22
  | **use_local_ca_jwt** | **Boolean** | UseLocalCAJwt is an optional parameter to set defaulting to using the local CA cert and service account jwt when running in a Kubernetes pod | [optional] |
20
23
 
21
24
  ## Example
@@ -27,6 +30,7 @@ instance = Akeyless::GatewayGetK8SAuthConfigOutput.new(
27
30
  am_token_expiration: null,
28
31
  auth_method_access_id: null,
29
32
  auth_method_prv_key_pem: null,
33
+ cluster_api_type: null,
30
34
  disable_iss_validation: null,
31
35
  id: null,
32
36
  k8s_ca_cert: null,
@@ -36,6 +40,8 @@ instance = Akeyless::GatewayGetK8SAuthConfigOutput.new(
36
40
  k8s_token_reviewer_jwt: null,
37
41
  name: null,
38
42
  protection_key: null,
43
+ rancher_api_key: null,
44
+ rancher_cluster_id: null,
39
45
  use_local_ca_jwt: null
40
46
  )
41
47
  ```
@@ -4,10 +4,11 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **host** | **String** | Host | [optional] |
7
+ | **host** | **String** | Deprecated: has no effect | [optional] |
8
8
  | **name** | **String** | Producer Name | |
9
+ | **revoke_all** | **Boolean** | Revoke All Temp Creds | [optional] |
9
10
  | **soft_delete** | **Boolean** | Soft Delete | [optional] |
10
- | **tmp_creds_id** | **String** | Tmp Creds ID | |
11
+ | **tmp_creds_id** | **String** | Tmp Creds ID | [default to 'demo_default_tmp_creds_id_for_sdk_bc'] |
11
12
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
12
13
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
13
14
 
@@ -19,6 +20,7 @@ require 'akeyless'
19
20
  instance = Akeyless::GatewayRevokeTmpUsers.new(
20
21
  host: null,
21
22
  name: null,
23
+ revoke_all: null,
22
24
  soft_delete: null,
23
25
  tmp_creds_id: null,
24
26
  token: null,
@@ -5,16 +5,19 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_id** | **String** | The access ID of the Kubernetes auth method | |
8
+ | **cluster_api_type** | **String** | Cluster access type. options: [native_k8s, rancher] | [optional][default to 'native_k8s'] |
8
9
  | **config_encryption_key_name** | **String** | Config encryption key | [optional] |
9
- | **k8s_ca_cert** | **String** | The CA Cert (in PEM format) to use to call into the kubernetes API server | [optional] |
10
+ | **k8s_ca_cert** | **String** | The CA Certificate (base64 encoded) to use to call into the kubernetes API server | [optional] |
10
11
  | **k8s_host** | **String** | The URL of the kubernetes API server | |
11
12
  | **k8s_issuer** | **String** | The Kubernetes JWT issuer name. If not set, kubernetes/serviceaccount will use as an issuer. | [optional] |
12
13
  | **name** | **String** | K8S Auth config name | |
13
14
  | **new_name** | **String** | K8S Auth config new name | |
14
- | **signing_key** | **String** | The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth | |
15
+ | **rancher_api_key** | **String** | The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only) | [optional] |
16
+ | **rancher_cluster_id** | **String** | The cluster id as define in rancher (relevant for \"rancher\" only) | [optional] |
17
+ | **signing_key** | **String** | The private key (base64 encoded) associated with the public key defined in the Kubernetes auth | |
15
18
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
16
- | **token_exp** | **Integer** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional] |
17
- | **token_reviewer_jwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] |
19
+ | **token_exp** | **Integer** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional][default to 300] |
20
+ | **token_reviewer_jwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] |
18
21
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
22
 
20
23
  ## Example
@@ -24,12 +27,15 @@ require 'akeyless'
24
27
 
25
28
  instance = Akeyless::GatewayUpdateK8SAuthConfig.new(
26
29
  access_id: null,
30
+ cluster_api_type: null,
27
31
  config_encryption_key_name: null,
28
32
  k8s_ca_cert: null,
29
33
  k8s_host: null,
30
34
  k8s_issuer: null,
31
35
  name: null,
32
36
  new_name: null,
37
+ rancher_api_key: null,
38
+ rancher_cluster_id: null,
33
39
  signing_key: null,
34
40
  token: null,
35
41
  token_exp: null,
@@ -10,11 +10,11 @@
10
10
  | **group_attr** | **String** | Group Attr | [optional] |
11
11
  | **group_dn** | **String** | Group Dn | [optional] |
12
12
  | **group_filter** | **String** | Group Filter | [optional] |
13
- | **ldap_ca_cert** | **String** | The CA Cert (in PEM format) to use to call into the ldap API server | [optional] |
13
+ | **ldap_ca_cert** | **String** | LDAP CA Certificate (base64 encoded) | [optional] |
14
14
  | **ldap_enable** | **String** | Enable Ldap | [optional] |
15
15
  | **ldap_url** | **String** | LDAP Server URL, e.g. ldap://planetexpress.com:389 | [optional] |
16
16
  | **ldap_anonymous_search** | **Boolean** | Ldap Anonymous Search | [optional] |
17
- | **signing_key_data** | **String** | The private key (in PEM format) associated with the public key defined in the Ldap auth | [optional] |
17
+ | **signing_key_data** | **String** | The private key (base64 encoded), associated with the public key defined in the Ldap auth | [optional] |
18
18
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
19
19
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
20
20
  | **user_attribute** | **String** | User Attribute | [optional] |
@@ -6,7 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
8
8
  | **dockerhub_password** | **String** | DockerhubPassword is either the user's password access token to manage the repository | [optional] |
9
- | **dockerhub_token_scopes** | **String** | Access token scopes list (comma seperated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\" | [optional] |
9
+ | **dockerhub_token_scopes** | **String** | Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\" | [optional] |
10
10
  | **dockerhub_username** | **String** | DockerhubUsername is the name of the user in dockerhub | [optional] |
11
11
  | **name** | **String** | Producer name | |
12
12
  | **new_name** | **String** | Producer name | [optional] |
@@ -8,6 +8,7 @@
8
8
  | **address** | [**CustomerFullAddress**](CustomerFullAddress.md) | | [optional] |
9
9
  | **company_name** | **String** | | [optional] |
10
10
  | **email** | **String** | | [optional] |
11
+ | **general_settings** | [**AccountGeneralSettings**](AccountGeneralSettings.md) | | [optional] |
11
12
  | **object_version_settings** | [**AccountObjectVersionSettingsOutput**](AccountObjectVersionSettingsOutput.md) | | [optional] |
12
13
  | **phone** | **String** | | [optional] |
13
14
  | **secret_management** | [**SmInfo**](SmInfo.md) | | [optional] |
@@ -24,6 +25,7 @@ instance = Akeyless::GetAccountSettingsCommandOutput.new(
24
25
  address: null,
25
26
  company_name: null,
26
27
  email: null,
28
+ general_settings: null,
27
29
  object_version_settings: null,
28
30
  phone: null,
29
31
  secret_management: null,
@@ -4,7 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **item_accessibility** | **String** | for personal password manager | [optional] |
7
+ | **accessibility** | **String** | for personal password manager | [optional] |
8
8
  | **names** | **Array<String>** | Secret name | |
9
9
  | **pretty_print** | **Boolean** | | [optional] |
10
10
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -17,7 +17,7 @@
17
17
  require 'akeyless'
18
18
 
19
19
  instance = Akeyless::GetSecretValue.new(
20
- item_accessibility: null,
20
+ accessibility: null,
21
21
  names: null,
22
22
  pretty_print: null,
23
23
  token: null,
data/docs/Item.md CHANGED
@@ -32,6 +32,7 @@
32
32
  | **protection_key_type** | **String** | | [optional] |
33
33
  | **public_value** | **String** | | [optional] |
34
34
  | **rotation_interval** | **Integer** | | [optional] |
35
+ | **shared_by** | [**RuleAssigner**](RuleAssigner.md) | | [optional] |
35
36
  | **target_versions** | [**Array<TargetItemVersion>**](TargetItemVersion.md) | | [optional] |
36
37
  | **with_customer_fragment** | **Boolean** | | [optional] |
37
38
 
@@ -69,6 +70,7 @@ instance = Akeyless::Item.new(
69
70
  protection_key_type: null,
70
71
  public_value: null,
71
72
  rotation_interval: null,
73
+ shared_by: null,
72
74
  target_versions: null,
73
75
  with_customer_fragment: null
74
76
  )
data/docs/K8SAuth.md CHANGED
@@ -7,15 +7,18 @@
7
7
  | **am_token_expiration** | **Integer** | AuthMethodTokenExpiration is time in seconds of expiration of the Akeyless Kube Auth Method token | [optional] |
8
8
  | **auth_method_access_id** | **String** | AuthMethodAccessId of the Kubernetes auth method | [optional] |
9
9
  | **auth_method_prv_key_pem** | **String** | AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method | [optional] |
10
+ | **cluster_api_type** | **String** | ClusterApiType defines types of API access to cluster | [optional] |
10
11
  | **disable_iss_validation** | **Boolean** | DisableISSValidation is optional parameter to disable ISS validation | [optional] |
11
12
  | **id** | **String** | | [optional] |
12
13
  | **k8s_ca_cert** | **String** | K8SCACert is the CA Cert to use to call into the kubernetes API | [optional] |
13
14
  | **k8s_host** | **String** | K8SHost is the url string for the kubernetes API | [optional] |
14
15
  | **k8s_issuer** | **String** | K8SIssuer is the claim that specifies who issued the Kubernetes token | [optional] |
15
16
  | **k8s_pub_keys_pem** | **Array<String>** | K8SPublicKeysPEM is the list of public key in PEM format | [optional] |
16
- | **k8s_token_reviewer_jwt** | **String** | K8STokenReviewerJW\"K8S Auth config %v successfully created\\n\", clictx.Color().Bold(c.K8SAuthConfigName)T is the bearer to use during the TokenReview API call | [optional] |
17
+ | **k8s_token_reviewer_jwt** | **String** | K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used during TokenReview API call | [optional] |
17
18
  | **name** | **String** | | [optional] |
18
19
  | **protection_key** | **String** | | [optional] |
20
+ | **rancher_api_key** | **String** | RancherApiKey the bear token for clusterApiTypeRancher | [optional] |
21
+ | **rancher_cluster_id** | **String** | RancherClusterId cluster id as define in rancher (in case of clusterApiTypeRancher) | [optional] |
19
22
  | **use_local_ca_jwt** | **Boolean** | UseLocalCAJwt is an optional parameter to set defaulting to using the local CA cert and service account jwt when running in a Kubernetes pod | [optional] |
20
23
 
21
24
  ## Example
@@ -27,6 +30,7 @@ instance = Akeyless::K8SAuth.new(
27
30
  am_token_expiration: null,
28
31
  auth_method_access_id: null,
29
32
  auth_method_prv_key_pem: null,
33
+ cluster_api_type: null,
30
34
  disable_iss_validation: null,
31
35
  id: null,
32
36
  k8s_ca_cert: null,
@@ -36,6 +40,8 @@ instance = Akeyless::K8SAuth.new(
36
40
  k8s_token_reviewer_jwt: null,
37
41
  name: null,
38
42
  protection_key: null,
43
+ rancher_api_key: null,
44
+ rancher_cluster_id: null,
39
45
  use_local_ca_jwt: null
40
46
  )
41
47
  ```
@@ -9,6 +9,7 @@
9
9
  | **bound_namespaces** | **Array<String>** | A list of namespaces that the authentication is restricted to. | [optional] |
10
10
  | **bound_pod_names** | **Array<String>** | A list of pods names that the authentication is restricted to. | [optional] |
11
11
  | **bound_service_account_names** | **Array<String>** | A list of service account names that the authentication is restricted to. | [optional] |
12
+ | **gen_key_pair** | **String** | Generate public/private key (the private key is required for the K8S Auth Config in the Akeyless Gateway) | [optional] |
12
13
  | **pub_key** | **String** | The public key value of the Kubernetes auth method configuration in the Akeyless Gateway. | [optional] |
13
14
 
14
15
  ## Example
@@ -22,6 +23,7 @@ instance = Akeyless::KubernetesAccessRules.new(
22
23
  bound_namespaces: null,
23
24
  bound_pod_names: null,
24
25
  bound_service_account_names: null,
26
+ gen_key_pair: null,
25
27
  pub_key: null
26
28
  )
27
29
  ```
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | | [optional] |
8
+ | **gen_key_pair** | **String** | Generate public/private key (the private key is required for the LDAP Auth Config in the Akeyless Gateway) | [optional] |
8
9
  | **key** | **String** | The public key value of LDAP. | [optional] |
9
10
  | **unique_identifier** | **String** | A unique identifier to distinguish different users | [optional] |
10
11
 
@@ -15,6 +16,7 @@ require 'akeyless'
15
16
 
16
17
  instance = Akeyless::LDAPAccessRules.new(
17
18
  alg: null,
19
+ gen_key_pair: null,
18
20
  key: null,
19
21
  unique_identifier: null
20
22
  )
data/docs/ListItems.md CHANGED
@@ -4,8 +4,8 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **accessibility** | **String** | for personal password manager | [optional] |
7
8
  | **filter** | **String** | Filter by item name or part of it | [optional] |
8
- | **item_accessibility** | **String** | for personal password manager | [optional] |
9
9
  | **minimal_view** | **Boolean** | | [optional] |
10
10
  | **pagination_token** | **String** | Next page reference | [optional] |
11
11
  | **path** | **String** | Path to folder | [optional] |
@@ -21,8 +21,8 @@
21
21
  require 'akeyless'
22
22
 
23
23
  instance = Akeyless::ListItems.new(
24
+ accessibility: null,
24
25
  filter: null,
25
- item_accessibility: null,
26
26
  minimal_view: null,
27
27
  pagination_token: null,
28
28
  path: null,
@@ -8,6 +8,7 @@
8
8
  | **azure_analytics_config** | [**AzureLogAnalyticsForwardingConfig**](AzureLogAnalyticsForwardingConfig.md) | | [optional] |
9
9
  | **datadog_config** | [**DatadogForwardingConfig**](DatadogForwardingConfig.md) | | [optional] |
10
10
  | **elasticsearch_config** | [**ElasticsearchLogForwardingConfig**](ElasticsearchLogForwardingConfig.md) | | [optional] |
11
+ | **json_output** | **Boolean** | | [optional] |
11
12
  | **logan_enable** | **Boolean** | | [optional] |
12
13
  | **logan_url** | **String** | | [optional] |
13
14
  | **logstash_config** | [**LogstashLogForwardingConfig**](LogstashLogForwardingConfig.md) | | [optional] |
@@ -27,6 +28,7 @@ instance = Akeyless::LogForwardingConfigPart.new(
27
28
  azure_analytics_config: null,
28
29
  datadog_config: null,
29
30
  elasticsearch_config: null,
31
+ json_output: null,
30
32
  logan_enable: null,
31
33
  logan_url: null,
32
34
  logstash_config: null,
@@ -0,0 +1,20 @@
1
+ # Akeyless::RuleAssigner
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **access_id** | **String** | | [optional] |
8
+ | **unique_id** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::RuleAssigner.new(
16
+ access_id: null,
17
+ unique_id: null
18
+ )
19
+ ```
20
+
data/docs/SignPKCS1.md CHANGED
@@ -4,7 +4,9 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **key_name** | **String** | The name of the RSA key to use in the signing process | |
7
+ | **display_id** | **String** | The display id of the key to use in the signing process | [optional] |
8
+ | **item_id** | **Integer** | The item id of the key to use in the signing process | [optional] |
9
+ | **key_name** | **String** | The name of the RSA key to use in the signing process | [optional] |
8
10
  | **message** | **String** | The message to be signed | |
9
11
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
10
12
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -15,6 +17,8 @@
15
17
  require 'akeyless'
16
18
 
17
19
  instance = Akeyless::SignPKCS1.new(
20
+ display_id: null,
21
+ item_id: null,
18
22
  key_name: null,
19
23
  message: null,
20
24
  token: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **app_private_key** | **Array<Integer>** | params needed for jwt auth AppPrivateKey is the rsa private key in PEM format | [optional] |
7
8
  | **artifactory_admin_apikey** | **String** | | [optional] |
8
9
  | **artifactory_admin_username** | **String** | | [optional] |
9
10
  | **artifactory_base_url** | **String** | | [optional] |
@@ -27,7 +28,7 @@
27
28
  | **chef_server_username** | **String** | | [optional] |
28
29
  | **chef_skip_ssl** | **Boolean** | | [optional] |
29
30
  | **client_id** | **String** | | [optional] |
30
- | **client_secret** | **String** | | [optional] |
31
+ | **client_secret** | **String** | params needed for password auth | [optional] |
31
32
  | **db_host_name** | **String** | | [optional] |
32
33
  | **db_name** | **String** | | [optional] |
33
34
  | **db_port** | **String** | | [optional] |
@@ -52,6 +53,7 @@
52
53
  | **gke_service_account_key** | **String** | | [optional] |
53
54
  | **gke_service_account_name** | **String** | | [optional] |
54
55
  | **host** | **String** | | [optional] |
56
+ | **implementation_type** | **String** | | [optional] |
55
57
  | **k8s_bearer_token** | **String** | | [optional] |
56
58
  | **k8s_cluster_ca_certificate** | **String** | | [optional] |
57
59
  | **k8s_cluster_endpoint** | **String** | | [optional] |
@@ -102,6 +104,7 @@
102
104
  require 'akeyless'
103
105
 
104
106
  instance = Akeyless::TargetTypeDetailsInput.new(
107
+ app_private_key: null,
105
108
  artifactory_admin_apikey: null,
106
109
  artifactory_admin_username: null,
107
110
  artifactory_base_url: null,
@@ -150,6 +153,7 @@ instance = Akeyless::TargetTypeDetailsInput.new(
150
153
  gke_service_account_key: null,
151
154
  gke_service_account_name: null,
152
155
  host: null,
156
+ implementation_type: null,
153
157
  k8s_bearer_token: null,
154
158
  k8s_cluster_ca_certificate: null,
155
159
  k8s_cluster_endpoint: null,
@@ -9,15 +9,21 @@
9
9
  | **company_name** | **String** | Company name | [optional] |
10
10
  | **country** | **String** | Country | [optional] |
11
11
  | **default_versioning** | **String** | Should create version by default | [optional] |
12
+ | **dp_enable_classic_key_protection** | **String** | Enable classic key protection [\"true\"/\"false\"] | [optional] |
12
13
  | **item_type** | **String** | VersionSettingsObjectType defines object types for account version settings | [optional] |
13
14
  | **jwt_ttl_default** | **Integer** | Default ttl | [optional] |
14
15
  | **jwt_ttl_max** | **Integer** | Maximum ttl | [optional] |
15
16
  | **jwt_ttl_min** | **Integer** | Minimum ttl | [optional] |
16
17
  | **max_versions** | **String** | Max versions | [optional] |
18
+ | **password_length** | **Integer** | For PasswordPolicy use | [optional] |
17
19
  | **phone** | **String** | Phone number | [optional] |
18
20
  | **postal_code** | **String** | Postal code | [optional] |
19
21
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
20
22
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
23
+ | **use_lower_letters** | **String** | For PasswordPolicy use | [optional] |
24
+ | **use_numbers** | **String** | For PasswordPolicy use | [optional] |
25
+ | **use_special_characters** | **String** | For PasswordPolicy use | [optional] |
26
+ | **use_capital_letters** | **String** | For PasswordPolicy use | [optional] |
21
27
 
22
28
  ## Example
23
29
 
@@ -30,15 +36,21 @@ instance = Akeyless::UpdateAccountSettings.new(
30
36
  company_name: null,
31
37
  country: null,
32
38
  default_versioning: null,
39
+ dp_enable_classic_key_protection: null,
33
40
  item_type: null,
34
41
  jwt_ttl_default: null,
35
42
  jwt_ttl_max: null,
36
43
  jwt_ttl_min: null,
37
44
  max_versions: null,
45
+ password_length: null,
38
46
  phone: null,
39
47
  postal_code: null,
40
48
  token: null,
41
- uid_token: null
49
+ uid_token: null,
50
+ use_lower_letters: null,
51
+ use_numbers: null,
52
+ use_special_characters: null,
53
+ use_capital_letters: null
42
54
  )
43
55
  ```
44
56
 
@@ -11,12 +11,12 @@
11
11
  | **bound_pod_names** | **Array<String>** | A list of pod names that the access is restricted to | [optional] |
12
12
  | **bound_sa_names** | **Array<String>** | A list of service account names that the access is restricted to | [optional] |
13
13
  | **force_sub_claims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] |
14
- | **gen_key** | **String** | If this flag is set to true, there is no need to manually provide a public key for the Kubernetes Auth Method, and instead, a key pair, will be generated as part of the command and the private part of the key will be returned (the private key is required for the K8S Auth Config in the Akeyless Gateway) | [optional][default to 'true'] |
14
+ | **gen_key** | **String** | Automatically generate key-pair for K8S configuration. If set to false, a public key needs to be provided | [optional] |
15
15
  | **gw_bound_ips** | **Array<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
16
16
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional] |
17
17
  | **name** | **String** | Auth Method name | |
18
18
  | **new_name** | **String** | Auth Method new name | [optional] |
19
- | **public_key** | **String** | Base64-encoded public key text for K8S authentication method is required [RSA2048] | [optional] |
19
+ | **public_key** | **String** | Base64-encoded or PEM formatted public key data for K8S authentication method is required [RSA2048] | [optional] |
20
20
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
21
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
22
22
 
@@ -7,11 +7,12 @@
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
8
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
9
9
  | **force_sub_claims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] |
10
+ | **gen_key** | **String** | Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided | [optional] |
10
11
  | **gw_bound_ips** | **Array<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
11
12
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional] |
12
13
  | **name** | **String** | Auth Method name | |
13
14
  | **new_name** | **String** | Auth Method new name | [optional] |
14
- | **public_key_data** | **String** | A public key generated for LDAP authentication method on Akeyless in base64 format [RSA2048] | [optional] |
15
+ | **public_key_data** | **String** | A public key generated for LDAP authentication method on Akeyless in base64 or PEM format [RSA2048] | [optional] |
15
16
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
16
17
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
17
18
  | **unique_identifier** | **String** | A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a \"sub claim\" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. | [optional] |
@@ -25,6 +26,7 @@ instance = Akeyless::UpdateAuthMethodLDAP.new(
25
26
  access_expires: null,
26
27
  bound_ips: null,
27
28
  force_sub_claims: null,
29
+ gen_key: null,
28
30
  gw_bound_ips: null,
29
31
  jwt_ttl: null,
30
32
  name: null,
@@ -0,0 +1,18 @@
1
+ # Akeyless::UpdateAuthMethodLDAPOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **prv_key** | **String** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::UpdateAuthMethodLDAPOutput.new(
15
+ prv_key: null
16
+ )
17
+ ```
18
+
data/docs/UpdateItem.md CHANGED
@@ -4,10 +4,10 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **accessibility** | **String** | for personal password manager | [optional] |
7
8
  | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
8
9
  | **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
9
10
  | **delete_protection** | **String** | | [optional] |
10
- | **item_accessibility** | **String** | for personal password manager | [optional] |
11
11
  | **name** | **String** | Current item name | |
12
12
  | **new_metadata** | **String** | New item metadata | [optional][default to 'default_metadata'] |
13
13
  | **new_name** | **String** | New item name | [optional] |
@@ -45,10 +45,10 @@
45
45
  require 'akeyless'
46
46
 
47
47
  instance = Akeyless::UpdateItem.new(
48
+ accessibility: null,
48
49
  add_tag: null,
49
50
  cert_file_data: null,
50
51
  delete_protection: null,
51
- item_accessibility: null,
52
52
  name: null,
53
53
  new_metadata: null,
54
54
  new_name: null,
@@ -13,6 +13,7 @@
13
13
  | **ldap_url** | **String** | | [optional] |
14
14
  | **name** | **String** | Target name | |
15
15
  | **new_name** | **String** | New target name | [optional] |
16
+ | **server_type** | **String** | Set Ldap server type, Options:[OpenLDAP, ActiveDirectory] | [optional] |
16
17
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
17
18
  | **token_expiration** | **String** | | [optional] |
18
19
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -33,6 +34,7 @@ instance = Akeyless::UpdateLdapTarget.new(
33
34
  ldap_url: null,
34
35
  name: null,
35
36
  new_name: null,
37
+ server_type: null,
36
38
  token: null,
37
39
  token_expiration: null,
38
40
  uid_token: null,
@@ -4,18 +4,20 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **app_private_key_data** | **String** | Base64 encoded PEM of the connected app private key (relevant for JWT auth only) | [optional] |
8
+ | **auth_flow** | **String** | type of the auth flow ('jwt' / 'user-password') | |
7
9
  | **ca_cert_data** | **String** | Base64 encoded PEM cert to use when uploading a new key to Salesforce | [optional] |
8
10
  | **ca_cert_name** | **String** | name of the certificate in Salesforce tenant to use when uploading new key | [optional] |
9
11
  | **client_id** | **String** | Client ID of the oauth2 app to use for connecting to Salesforce | |
10
- | **client_secret** | **String** | Client secret of the oauth2 app to use for connecting to Salesforce | |
12
+ | **client_secret** | **String** | Client secret of the oauth2 app to use for connecting to Salesforce (required for password flow) | [optional] |
11
13
  | **comment** | **String** | Comment about the target | [optional] |
12
14
  | **email** | **String** | The email of the user attached to the oauth2 app used for connecting to Salesforce | |
13
15
  | **keep_prev_version** | **String** | | [optional] |
14
16
  | **key** | **String** | The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used) | [optional] |
15
17
  | **name** | **String** | Target name | |
16
18
  | **new_name** | **String** | New target name | [optional] |
17
- | **password** | **String** | The password of the user attached to the oauth2 app used for connecting to Salesforce | |
18
- | **security_token** | **String** | The security token of the user attached to the oauth2 app used for connecting to Salesforce | |
19
+ | **password** | **String** | The password of the user attached to the oauth2 app used for connecting to Salesforce (required for user-password flow) | [optional] |
20
+ | **security_token** | **String** | The security token of the user attached to the oauth2 app used for connecting to Salesforce (required for user-password flow) | [optional] |
19
21
  | **tenant_url** | **String** | Url of the Salesforce tenant | |
20
22
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
23
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -27,6 +29,8 @@
27
29
  require 'akeyless'
28
30
 
29
31
  instance = Akeyless::UpdateSalesforceTarget.new(
32
+ app_private_key_data: null,
33
+ auth_flow: null,
30
34
  ca_cert_data: null,
31
35
  ca_cert_name: null,
32
36
  client_id: null,