akeyless 2.16.11 → 2.18.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (113) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +9 -8
  3. data/docs/AccountGeneralSettings.md +20 -0
  4. data/docs/CreateArtifactoryTarget.md +1 -1
  5. data/docs/CreateAuthMethodK8S.md +2 -2
  6. data/docs/CreateAuthMethodLDAP.md +3 -1
  7. data/docs/CreateAuthMethodLDAPOutput.md +3 -1
  8. data/docs/CreateKeyOutput.md +5 -1
  9. data/docs/CreateLdapTarget.md +2 -0
  10. data/docs/CreatePKICertIssuer.md +5 -5
  11. data/docs/CreateSSHCertIssuer.md +1 -1
  12. data/docs/CreateSalesforceTarget.md +7 -3
  13. data/docs/CreateSecret.md +11 -19
  14. data/docs/DSProducerDetails.md +2 -0
  15. data/docs/DataProtectionSection.md +18 -0
  16. data/docs/Decrypt.md +3 -1
  17. data/docs/DecryptFile.md +6 -0
  18. data/docs/DecryptPKCS1.md +5 -1
  19. data/docs/DeleteItem.md +2 -2
  20. data/docs/DescribeItem.md +4 -0
  21. data/docs/DescribeSubClaims.md +20 -0
  22. data/docs/DescribeSubClaimsOutput.md +18 -0
  23. data/docs/Encrypt.md +3 -1
  24. data/docs/EncryptFile.md +4 -0
  25. data/docs/EncryptPKCS1.md +5 -1
  26. data/docs/GatewayCreateK8SAuthConfig.md +10 -4
  27. data/docs/GatewayCreateProducerDockerhub.md +1 -1
  28. data/docs/GatewayGetK8SAuthConfigOutput.md +7 -1
  29. data/docs/GatewayRevokeTmpUsers.md +4 -2
  30. data/docs/GatewayUpdateK8SAuthConfig.md +10 -4
  31. data/docs/GatewayUpdateLdapAuthConfig.md +2 -2
  32. data/docs/GatewayUpdateProducerDockerhub.md +1 -1
  33. data/docs/GetAccountSettingsCommandOutput.md +2 -0
  34. data/docs/GetSecretValue.md +2 -2
  35. data/docs/Item.md +2 -0
  36. data/docs/K8SAuth.md +7 -1
  37. data/docs/KubernetesAccessRules.md +2 -0
  38. data/docs/LDAPAccessRules.md +2 -0
  39. data/docs/ListItems.md +2 -2
  40. data/docs/LogForwardingConfigPart.md +2 -0
  41. data/docs/RuleAssigner.md +20 -0
  42. data/docs/SignPKCS1.md +5 -1
  43. data/docs/TargetTypeDetailsInput.md +5 -1
  44. data/docs/UpdateAccountSettings.md +13 -1
  45. data/docs/UpdateAuthMethodK8S.md +2 -2
  46. data/docs/UpdateAuthMethodLDAP.md +3 -1
  47. data/docs/UpdateAuthMethodLDAPOutput.md +18 -0
  48. data/docs/UpdateItem.md +2 -2
  49. data/docs/UpdateLdapTarget.md +2 -0
  50. data/docs/UpdateSalesforceTarget.md +7 -3
  51. data/docs/UpdateSecretVal.md +11 -9
  52. data/docs/V2Api.md +46 -109
  53. data/docs/VerifyPKCS1.md +4 -0
  54. data/lib/akeyless/api/v2_api.rb +43 -107
  55. data/lib/akeyless/models/account_general_settings.rb +229 -0
  56. data/lib/akeyless/models/create_artifactory_target.rb +1 -1
  57. data/lib/akeyless/models/create_auth_method_k8_s.rb +2 -2
  58. data/lib/akeyless/models/create_auth_method_ldap.rb +14 -2
  59. data/lib/akeyless/models/create_auth_method_ldap_output.rb +13 -4
  60. data/lib/akeyless/models/create_key_output.rb +22 -4
  61. data/lib/akeyless/models/create_ldap_target.rb +13 -1
  62. data/lib/akeyless/models/create_pki_cert_issuer.rb +5 -5
  63. data/lib/akeyless/models/create_salesforce_target.rb +29 -19
  64. data/lib/akeyless/models/create_secret.rb +50 -90
  65. data/lib/akeyless/models/create_ssh_cert_issuer.rb +1 -1
  66. data/lib/akeyless/models/data_protection_section.rb +220 -0
  67. data/lib/akeyless/models/decrypt.rb +16 -1
  68. data/lib/akeyless/models/decrypt_file.rb +36 -1
  69. data/lib/akeyless/models/decrypt_pkcs1.rb +22 -2
  70. data/lib/akeyless/models/delete_item.rb +11 -11
  71. data/lib/akeyless/models/describe_item.rb +21 -1
  72. data/lib/akeyless/models/describe_sub_claims.rb +231 -0
  73. data/lib/akeyless/models/describe_sub_claims_output.rb +221 -0
  74. data/lib/akeyless/models/ds_producer_details.rb +10 -1
  75. data/lib/akeyless/models/encrypt.rb +16 -1
  76. data/lib/akeyless/models/encrypt_file.rb +21 -1
  77. data/lib/akeyless/models/encrypt_pkcs1.rb +22 -2
  78. data/lib/akeyless/models/gateway_create_k8_s_auth_config.rb +38 -4
  79. data/lib/akeyless/models/gateway_create_producer_dockerhub.rb +1 -1
  80. data/lib/akeyless/models/gateway_get_k8_s_auth_config_output.rb +32 -2
  81. data/lib/akeyless/models/gateway_revoke_tmp_users.rb +14 -2
  82. data/lib/akeyless/models/gateway_update_k8_s_auth_config.rb +38 -4
  83. data/lib/akeyless/models/gateway_update_ldap_auth_config.rb +2 -2
  84. data/lib/akeyless/models/gateway_update_producer_dockerhub.rb +1 -1
  85. data/lib/akeyless/models/get_account_settings_command_output.rb +10 -1
  86. data/lib/akeyless/models/get_secret_value.rb +7 -7
  87. data/lib/akeyless/models/item.rb +10 -1
  88. data/lib/akeyless/models/k8_s_auth.rb +32 -2
  89. data/lib/akeyless/models/kubernetes_access_rules.rb +11 -1
  90. data/lib/akeyless/models/ldap_access_rules.rb +11 -1
  91. data/lib/akeyless/models/list_items.rb +11 -11
  92. data/lib/akeyless/models/log_forwarding_config_part.rb +10 -1
  93. data/lib/akeyless/models/rule_assigner.rb +228 -0
  94. data/lib/akeyless/models/sign_pkcs1.rb +21 -6
  95. data/lib/akeyless/models/target_type_details_input.rb +23 -1
  96. data/lib/akeyless/models/update_account_settings.rb +64 -4
  97. data/lib/akeyless/models/update_auth_method_k8_s.rb +2 -4
  98. data/lib/akeyless/models/update_auth_method_ldap.rb +12 -2
  99. data/lib/akeyless/models/update_auth_method_ldap_output.rb +219 -0
  100. data/lib/akeyless/models/update_item.rb +11 -11
  101. data/lib/akeyless/models/update_ldap_target.rb +11 -1
  102. data/lib/akeyless/models/update_salesforce_target.rb +29 -19
  103. data/lib/akeyless/models/update_secret_val.rb +52 -42
  104. data/lib/akeyless/models/verify_pkcs1.rb +21 -1
  105. data/lib/akeyless/version.rb +1 -1
  106. data/lib/akeyless.rb +6 -4
  107. data/spec/models/account_general_settings_spec.rb +34 -0
  108. data/spec/models/data_protection_section_spec.rb +34 -0
  109. data/spec/models/describe_sub_claims_output_spec.rb +34 -0
  110. data/spec/models/describe_sub_claims_spec.rb +40 -0
  111. data/spec/models/rule_assigner_spec.rb +40 -0
  112. data/spec/models/update_auth_method_ldap_output_spec.rb +34 -0
  113. metadata +525 -501
@@ -15,7 +15,13 @@ require 'time'
15
15
 
16
16
  module Akeyless
17
17
  class EncryptPKCS1
18
- # The name of the RSA key to use in the encryption process
18
+ # The display id of the key to use in the encryption process
19
+ attr_accessor :display_id
20
+
21
+ # The item id of the key to use in the encryption process
22
+ attr_accessor :item_id
23
+
24
+ # The name of the key to use in the encryption process
19
25
  attr_accessor :key_name
20
26
 
21
27
  # Data to be encrypted
@@ -30,6 +36,8 @@ module Akeyless
30
36
  # Attribute mapping from ruby-style variable name to JSON key.
31
37
  def self.attribute_map
32
38
  {
39
+ :'display_id' => :'display-id',
40
+ :'item_id' => :'item-id',
33
41
  :'key_name' => :'key-name',
34
42
  :'plaintext' => :'plaintext',
35
43
  :'token' => :'token',
@@ -45,6 +53,8 @@ module Akeyless
45
53
  # Attribute type mapping.
46
54
  def self.openapi_types
47
55
  {
56
+ :'display_id' => :'String',
57
+ :'item_id' => :'Integer',
48
58
  :'key_name' => :'String',
49
59
  :'plaintext' => :'String',
50
60
  :'token' => :'String',
@@ -73,6 +83,14 @@ module Akeyless
73
83
  h[k.to_sym] = v
74
84
  }
75
85
 
86
+ if attributes.key?(:'display_id')
87
+ self.display_id = attributes[:'display_id']
88
+ end
89
+
90
+ if attributes.key?(:'item_id')
91
+ self.item_id = attributes[:'item_id']
92
+ end
93
+
76
94
  if attributes.key?(:'key_name')
77
95
  self.key_name = attributes[:'key_name']
78
96
  end
@@ -118,6 +136,8 @@ module Akeyless
118
136
  def ==(o)
119
137
  return true if self.equal?(o)
120
138
  self.class == o.class &&
139
+ display_id == o.display_id &&
140
+ item_id == o.item_id &&
121
141
  key_name == o.key_name &&
122
142
  plaintext == o.plaintext &&
123
143
  token == o.token &&
@@ -133,7 +153,7 @@ module Akeyless
133
153
  # Calculates hash code according to all attributes.
134
154
  # @return [Integer] Hash code
135
155
  def hash
136
- [key_name, plaintext, token, uid_token].hash
156
+ [display_id, item_id, key_name, plaintext, token, uid_token].hash
137
157
  end
138
158
 
139
159
  # Builds the object from hash
@@ -19,10 +19,13 @@ module Akeyless
19
19
  # The access ID of the Kubernetes auth method
20
20
  attr_accessor :access_id
21
21
 
22
+ # Cluster access type. options: [native_k8s, rancher]
23
+ attr_accessor :cluster_api_type
24
+
22
25
  # Config encryption key
23
26
  attr_accessor :config_encryption_key_name
24
27
 
25
- # The CA Cert (in PEM format) to use to call into the kubernetes API server
28
+ # The CA Certificate (base64 encoded) to use to call into the kubernetes API server
26
29
  attr_accessor :k8s_ca_cert
27
30
 
28
31
  # The URL of the kubernetes API server
@@ -34,7 +37,13 @@ module Akeyless
34
37
  # K8S Auth config name
35
38
  attr_accessor :name
36
39
 
37
- # The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth
40
+ # The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only)
41
+ attr_accessor :rancher_api_key
42
+
43
+ # The cluster id as define in rancher (relevant for \"rancher\" only)
44
+ attr_accessor :rancher_cluster_id
45
+
46
+ # The private key (base64 encoded) associated with the public key defined in the Kubernetes auth
38
47
  attr_accessor :signing_key
39
48
 
40
49
  # Authentication token (see `/auth` and `/configure`)
@@ -43,7 +52,7 @@ module Akeyless
43
52
  # Time in seconds of expiration of the Akeyless Kube Auth Method token
44
53
  attr_accessor :token_exp
45
54
 
46
- # A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
55
+ # A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
47
56
  attr_accessor :token_reviewer_jwt
48
57
 
49
58
  # The universal identity token, Required only for universal_identity authentication
@@ -53,11 +62,14 @@ module Akeyless
53
62
  def self.attribute_map
54
63
  {
55
64
  :'access_id' => :'access-id',
65
+ :'cluster_api_type' => :'cluster-api-type',
56
66
  :'config_encryption_key_name' => :'config-encryption-key-name',
57
67
  :'k8s_ca_cert' => :'k8s-ca-cert',
58
68
  :'k8s_host' => :'k8s-host',
59
69
  :'k8s_issuer' => :'k8s-issuer',
60
70
  :'name' => :'name',
71
+ :'rancher_api_key' => :'rancher-api-key',
72
+ :'rancher_cluster_id' => :'rancher-cluster-id',
61
73
  :'signing_key' => :'signing-key',
62
74
  :'token' => :'token',
63
75
  :'token_exp' => :'token-exp',
@@ -75,11 +87,14 @@ module Akeyless
75
87
  def self.openapi_types
76
88
  {
77
89
  :'access_id' => :'String',
90
+ :'cluster_api_type' => :'String',
78
91
  :'config_encryption_key_name' => :'String',
79
92
  :'k8s_ca_cert' => :'String',
80
93
  :'k8s_host' => :'String',
81
94
  :'k8s_issuer' => :'String',
82
95
  :'name' => :'String',
96
+ :'rancher_api_key' => :'String',
97
+ :'rancher_cluster_id' => :'String',
83
98
  :'signing_key' => :'String',
84
99
  :'token' => :'String',
85
100
  :'token_exp' => :'Integer',
@@ -113,6 +128,12 @@ module Akeyless
113
128
  self.access_id = attributes[:'access_id']
114
129
  end
115
130
 
131
+ if attributes.key?(:'cluster_api_type')
132
+ self.cluster_api_type = attributes[:'cluster_api_type']
133
+ else
134
+ self.cluster_api_type = 'native_k8s'
135
+ end
136
+
116
137
  if attributes.key?(:'config_encryption_key_name')
117
138
  self.config_encryption_key_name = attributes[:'config_encryption_key_name']
118
139
  end
@@ -133,6 +154,14 @@ module Akeyless
133
154
  self.name = attributes[:'name']
134
155
  end
135
156
 
157
+ if attributes.key?(:'rancher_api_key')
158
+ self.rancher_api_key = attributes[:'rancher_api_key']
159
+ end
160
+
161
+ if attributes.key?(:'rancher_cluster_id')
162
+ self.rancher_cluster_id = attributes[:'rancher_cluster_id']
163
+ end
164
+
136
165
  if attributes.key?(:'signing_key')
137
166
  self.signing_key = attributes[:'signing_key']
138
167
  end
@@ -143,6 +172,8 @@ module Akeyless
143
172
 
144
173
  if attributes.key?(:'token_exp')
145
174
  self.token_exp = attributes[:'token_exp']
175
+ else
176
+ self.token_exp = 300
146
177
  end
147
178
 
148
179
  if attributes.key?(:'token_reviewer_jwt')
@@ -193,11 +224,14 @@ module Akeyless
193
224
  return true if self.equal?(o)
194
225
  self.class == o.class &&
195
226
  access_id == o.access_id &&
227
+ cluster_api_type == o.cluster_api_type &&
196
228
  config_encryption_key_name == o.config_encryption_key_name &&
197
229
  k8s_ca_cert == o.k8s_ca_cert &&
198
230
  k8s_host == o.k8s_host &&
199
231
  k8s_issuer == o.k8s_issuer &&
200
232
  name == o.name &&
233
+ rancher_api_key == o.rancher_api_key &&
234
+ rancher_cluster_id == o.rancher_cluster_id &&
201
235
  signing_key == o.signing_key &&
202
236
  token == o.token &&
203
237
  token_exp == o.token_exp &&
@@ -214,7 +248,7 @@ module Akeyless
214
248
  # Calculates hash code according to all attributes.
215
249
  # @return [Integer] Hash code
216
250
  def hash
217
- [access_id, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
251
+ [access_id, cluster_api_type, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, rancher_api_key, rancher_cluster_id, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
218
252
  end
219
253
 
220
254
  # Builds the object from hash
@@ -22,7 +22,7 @@ module Akeyless
22
22
  # DockerhubPassword is either the user's password access token to manage the repository
23
23
  attr_accessor :dockerhub_password
24
24
 
25
- # Access token scopes list (comma seperated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
25
+ # Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
26
26
  attr_accessor :dockerhub_token_scopes
27
27
 
28
28
  # DockerhubUsername is the name of the user in dockerhub
@@ -24,6 +24,9 @@ module Akeyless
24
24
  # AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method
25
25
  attr_accessor :auth_method_prv_key_pem
26
26
 
27
+ # ClusterApiType defines types of API access to cluster
28
+ attr_accessor :cluster_api_type
29
+
27
30
  # DisableISSValidation is optional parameter to disable ISS validation
28
31
  attr_accessor :disable_iss_validation
29
32
 
@@ -41,13 +44,19 @@ module Akeyless
41
44
  # K8SPublicKeysPEM is the list of public key in PEM format
42
45
  attr_accessor :k8s_pub_keys_pem
43
46
 
44
- # K8STokenReviewerJW\"K8S Auth config %v successfully created\\n\", clictx.Color().Bold(c.K8SAuthConfigName)T is the bearer to use during the TokenReview API call
47
+ # K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used during TokenReview API call
45
48
  attr_accessor :k8s_token_reviewer_jwt
46
49
 
47
50
  attr_accessor :name
48
51
 
49
52
  attr_accessor :protection_key
50
53
 
54
+ # RancherApiKey the bear token for clusterApiTypeRancher
55
+ attr_accessor :rancher_api_key
56
+
57
+ # RancherClusterId cluster id as define in rancher (in case of clusterApiTypeRancher)
58
+ attr_accessor :rancher_cluster_id
59
+
51
60
  # UseLocalCAJwt is an optional parameter to set defaulting to using the local CA cert and service account jwt when running in a Kubernetes pod
52
61
  attr_accessor :use_local_ca_jwt
53
62
 
@@ -57,6 +66,7 @@ module Akeyless
57
66
  :'am_token_expiration' => :'am_token_expiration',
58
67
  :'auth_method_access_id' => :'auth_method_access_id',
59
68
  :'auth_method_prv_key_pem' => :'auth_method_prv_key_pem',
69
+ :'cluster_api_type' => :'cluster_api_type',
60
70
  :'disable_iss_validation' => :'disable_iss_validation',
61
71
  :'id' => :'id',
62
72
  :'k8s_ca_cert' => :'k8s_ca_cert',
@@ -66,6 +76,8 @@ module Akeyless
66
76
  :'k8s_token_reviewer_jwt' => :'k8s_token_reviewer_jwt',
67
77
  :'name' => :'name',
68
78
  :'protection_key' => :'protection_key',
79
+ :'rancher_api_key' => :'rancher_api_key',
80
+ :'rancher_cluster_id' => :'rancher_cluster_id',
69
81
  :'use_local_ca_jwt' => :'use_local_ca_jwt'
70
82
  }
71
83
  end
@@ -81,6 +93,7 @@ module Akeyless
81
93
  :'am_token_expiration' => :'Integer',
82
94
  :'auth_method_access_id' => :'String',
83
95
  :'auth_method_prv_key_pem' => :'String',
96
+ :'cluster_api_type' => :'String',
84
97
  :'disable_iss_validation' => :'Boolean',
85
98
  :'id' => :'String',
86
99
  :'k8s_ca_cert' => :'String',
@@ -90,6 +103,8 @@ module Akeyless
90
103
  :'k8s_token_reviewer_jwt' => :'String',
91
104
  :'name' => :'String',
92
105
  :'protection_key' => :'String',
106
+ :'rancher_api_key' => :'String',
107
+ :'rancher_cluster_id' => :'String',
93
108
  :'use_local_ca_jwt' => :'Boolean'
94
109
  }
95
110
  end
@@ -127,6 +142,10 @@ module Akeyless
127
142
  self.auth_method_prv_key_pem = attributes[:'auth_method_prv_key_pem']
128
143
  end
129
144
 
145
+ if attributes.key?(:'cluster_api_type')
146
+ self.cluster_api_type = attributes[:'cluster_api_type']
147
+ end
148
+
130
149
  if attributes.key?(:'disable_iss_validation')
131
150
  self.disable_iss_validation = attributes[:'disable_iss_validation']
132
151
  end
@@ -165,6 +184,14 @@ module Akeyless
165
184
  self.protection_key = attributes[:'protection_key']
166
185
  end
167
186
 
187
+ if attributes.key?(:'rancher_api_key')
188
+ self.rancher_api_key = attributes[:'rancher_api_key']
189
+ end
190
+
191
+ if attributes.key?(:'rancher_cluster_id')
192
+ self.rancher_cluster_id = attributes[:'rancher_cluster_id']
193
+ end
194
+
168
195
  if attributes.key?(:'use_local_ca_jwt')
169
196
  self.use_local_ca_jwt = attributes[:'use_local_ca_jwt']
170
197
  end
@@ -191,6 +218,7 @@ module Akeyless
191
218
  am_token_expiration == o.am_token_expiration &&
192
219
  auth_method_access_id == o.auth_method_access_id &&
193
220
  auth_method_prv_key_pem == o.auth_method_prv_key_pem &&
221
+ cluster_api_type == o.cluster_api_type &&
194
222
  disable_iss_validation == o.disable_iss_validation &&
195
223
  id == o.id &&
196
224
  k8s_ca_cert == o.k8s_ca_cert &&
@@ -200,6 +228,8 @@ module Akeyless
200
228
  k8s_token_reviewer_jwt == o.k8s_token_reviewer_jwt &&
201
229
  name == o.name &&
202
230
  protection_key == o.protection_key &&
231
+ rancher_api_key == o.rancher_api_key &&
232
+ rancher_cluster_id == o.rancher_cluster_id &&
203
233
  use_local_ca_jwt == o.use_local_ca_jwt
204
234
  end
205
235
 
@@ -212,7 +242,7 @@ module Akeyless
212
242
  # Calculates hash code according to all attributes.
213
243
  # @return [Integer] Hash code
214
244
  def hash
215
- [am_token_expiration, auth_method_access_id, auth_method_prv_key_pem, disable_iss_validation, id, k8s_ca_cert, k8s_host, k8s_issuer, k8s_pub_keys_pem, k8s_token_reviewer_jwt, name, protection_key, use_local_ca_jwt].hash
245
+ [am_token_expiration, auth_method_access_id, auth_method_prv_key_pem, cluster_api_type, disable_iss_validation, id, k8s_ca_cert, k8s_host, k8s_issuer, k8s_pub_keys_pem, k8s_token_reviewer_jwt, name, protection_key, rancher_api_key, rancher_cluster_id, use_local_ca_jwt].hash
216
246
  end
217
247
 
218
248
  # Builds the object from hash
@@ -16,12 +16,15 @@ require 'time'
16
16
  module Akeyless
17
17
  # gatewayRevokeTmpUsers is a command that revoke producer tmp user
18
18
  class GatewayRevokeTmpUsers
19
- # Host
19
+ # Deprecated: has no effect
20
20
  attr_accessor :host
21
21
 
22
22
  # Producer Name
23
23
  attr_accessor :name
24
24
 
25
+ # Revoke All Temp Creds
26
+ attr_accessor :revoke_all
27
+
25
28
  # Soft Delete
26
29
  attr_accessor :soft_delete
27
30
 
@@ -39,6 +42,7 @@ module Akeyless
39
42
  {
40
43
  :'host' => :'host',
41
44
  :'name' => :'name',
45
+ :'revoke_all' => :'revoke-all',
42
46
  :'soft_delete' => :'soft-delete',
43
47
  :'tmp_creds_id' => :'tmp-creds-id',
44
48
  :'token' => :'token',
@@ -56,6 +60,7 @@ module Akeyless
56
60
  {
57
61
  :'host' => :'String',
58
62
  :'name' => :'String',
63
+ :'revoke_all' => :'Boolean',
59
64
  :'soft_delete' => :'Boolean',
60
65
  :'tmp_creds_id' => :'String',
61
66
  :'token' => :'String',
@@ -92,12 +97,18 @@ module Akeyless
92
97
  self.name = attributes[:'name']
93
98
  end
94
99
 
100
+ if attributes.key?(:'revoke_all')
101
+ self.revoke_all = attributes[:'revoke_all']
102
+ end
103
+
95
104
  if attributes.key?(:'soft_delete')
96
105
  self.soft_delete = attributes[:'soft_delete']
97
106
  end
98
107
 
99
108
  if attributes.key?(:'tmp_creds_id')
100
109
  self.tmp_creds_id = attributes[:'tmp_creds_id']
110
+ else
111
+ self.tmp_creds_id = 'demo_default_tmp_creds_id_for_sdk_bc'
101
112
  end
102
113
 
103
114
  if attributes.key?(:'token')
@@ -139,6 +150,7 @@ module Akeyless
139
150
  self.class == o.class &&
140
151
  host == o.host &&
141
152
  name == o.name &&
153
+ revoke_all == o.revoke_all &&
142
154
  soft_delete == o.soft_delete &&
143
155
  tmp_creds_id == o.tmp_creds_id &&
144
156
  token == o.token &&
@@ -154,7 +166,7 @@ module Akeyless
154
166
  # Calculates hash code according to all attributes.
155
167
  # @return [Integer] Hash code
156
168
  def hash
157
- [host, name, soft_delete, tmp_creds_id, token, uid_token].hash
169
+ [host, name, revoke_all, soft_delete, tmp_creds_id, token, uid_token].hash
158
170
  end
159
171
 
160
172
  # Builds the object from hash
@@ -19,10 +19,13 @@ module Akeyless
19
19
  # The access ID of the Kubernetes auth method
20
20
  attr_accessor :access_id
21
21
 
22
+ # Cluster access type. options: [native_k8s, rancher]
23
+ attr_accessor :cluster_api_type
24
+
22
25
  # Config encryption key
23
26
  attr_accessor :config_encryption_key_name
24
27
 
25
- # The CA Cert (in PEM format) to use to call into the kubernetes API server
28
+ # The CA Certificate (base64 encoded) to use to call into the kubernetes API server
26
29
  attr_accessor :k8s_ca_cert
27
30
 
28
31
  # The URL of the kubernetes API server
@@ -37,7 +40,13 @@ module Akeyless
37
40
  # K8S Auth config new name
38
41
  attr_accessor :new_name
39
42
 
40
- # The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth
43
+ # The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only)
44
+ attr_accessor :rancher_api_key
45
+
46
+ # The cluster id as define in rancher (relevant for \"rancher\" only)
47
+ attr_accessor :rancher_cluster_id
48
+
49
+ # The private key (base64 encoded) associated with the public key defined in the Kubernetes auth
41
50
  attr_accessor :signing_key
42
51
 
43
52
  # Authentication token (see `/auth` and `/configure`)
@@ -46,7 +55,7 @@ module Akeyless
46
55
  # Time in seconds of expiration of the Akeyless Kube Auth Method token
47
56
  attr_accessor :token_exp
48
57
 
49
- # A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
58
+ # A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
50
59
  attr_accessor :token_reviewer_jwt
51
60
 
52
61
  # The universal identity token, Required only for universal_identity authentication
@@ -56,12 +65,15 @@ module Akeyless
56
65
  def self.attribute_map
57
66
  {
58
67
  :'access_id' => :'access-id',
68
+ :'cluster_api_type' => :'cluster-api-type',
59
69
  :'config_encryption_key_name' => :'config-encryption-key-name',
60
70
  :'k8s_ca_cert' => :'k8s-ca-cert',
61
71
  :'k8s_host' => :'k8s-host',
62
72
  :'k8s_issuer' => :'k8s-issuer',
63
73
  :'name' => :'name',
64
74
  :'new_name' => :'new-name',
75
+ :'rancher_api_key' => :'rancher-api-key',
76
+ :'rancher_cluster_id' => :'rancher-cluster-id',
65
77
  :'signing_key' => :'signing-key',
66
78
  :'token' => :'token',
67
79
  :'token_exp' => :'token-exp',
@@ -79,12 +91,15 @@ module Akeyless
79
91
  def self.openapi_types
80
92
  {
81
93
  :'access_id' => :'String',
94
+ :'cluster_api_type' => :'String',
82
95
  :'config_encryption_key_name' => :'String',
83
96
  :'k8s_ca_cert' => :'String',
84
97
  :'k8s_host' => :'String',
85
98
  :'k8s_issuer' => :'String',
86
99
  :'name' => :'String',
87
100
  :'new_name' => :'String',
101
+ :'rancher_api_key' => :'String',
102
+ :'rancher_cluster_id' => :'String',
88
103
  :'signing_key' => :'String',
89
104
  :'token' => :'String',
90
105
  :'token_exp' => :'Integer',
@@ -118,6 +133,12 @@ module Akeyless
118
133
  self.access_id = attributes[:'access_id']
119
134
  end
120
135
 
136
+ if attributes.key?(:'cluster_api_type')
137
+ self.cluster_api_type = attributes[:'cluster_api_type']
138
+ else
139
+ self.cluster_api_type = 'native_k8s'
140
+ end
141
+
121
142
  if attributes.key?(:'config_encryption_key_name')
122
143
  self.config_encryption_key_name = attributes[:'config_encryption_key_name']
123
144
  end
@@ -142,6 +163,14 @@ module Akeyless
142
163
  self.new_name = attributes[:'new_name']
143
164
  end
144
165
 
166
+ if attributes.key?(:'rancher_api_key')
167
+ self.rancher_api_key = attributes[:'rancher_api_key']
168
+ end
169
+
170
+ if attributes.key?(:'rancher_cluster_id')
171
+ self.rancher_cluster_id = attributes[:'rancher_cluster_id']
172
+ end
173
+
145
174
  if attributes.key?(:'signing_key')
146
175
  self.signing_key = attributes[:'signing_key']
147
176
  end
@@ -152,6 +181,8 @@ module Akeyless
152
181
 
153
182
  if attributes.key?(:'token_exp')
154
183
  self.token_exp = attributes[:'token_exp']
184
+ else
185
+ self.token_exp = 300
155
186
  end
156
187
 
157
188
  if attributes.key?(:'token_reviewer_jwt')
@@ -207,12 +238,15 @@ module Akeyless
207
238
  return true if self.equal?(o)
208
239
  self.class == o.class &&
209
240
  access_id == o.access_id &&
241
+ cluster_api_type == o.cluster_api_type &&
210
242
  config_encryption_key_name == o.config_encryption_key_name &&
211
243
  k8s_ca_cert == o.k8s_ca_cert &&
212
244
  k8s_host == o.k8s_host &&
213
245
  k8s_issuer == o.k8s_issuer &&
214
246
  name == o.name &&
215
247
  new_name == o.new_name &&
248
+ rancher_api_key == o.rancher_api_key &&
249
+ rancher_cluster_id == o.rancher_cluster_id &&
216
250
  signing_key == o.signing_key &&
217
251
  token == o.token &&
218
252
  token_exp == o.token_exp &&
@@ -229,7 +263,7 @@ module Akeyless
229
263
  # Calculates hash code according to all attributes.
230
264
  # @return [Integer] Hash code
231
265
  def hash
232
- [access_id, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, new_name, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
266
+ [access_id, cluster_api_type, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, new_name, rancher_api_key, rancher_cluster_id, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
233
267
  end
234
268
 
235
269
  # Builds the object from hash
@@ -34,7 +34,7 @@ module Akeyless
34
34
  # Group Filter
35
35
  attr_accessor :group_filter
36
36
 
37
- # The CA Cert (in PEM format) to use to call into the ldap API server
37
+ # LDAP CA Certificate (base64 encoded)
38
38
  attr_accessor :ldap_ca_cert
39
39
 
40
40
  # Enable Ldap
@@ -46,7 +46,7 @@ module Akeyless
46
46
  # Ldap Anonymous Search
47
47
  attr_accessor :ldap_anonymous_search
48
48
 
49
- # The private key (in PEM format) associated with the public key defined in the Ldap auth
49
+ # The private key (base64 encoded), associated with the public key defined in the Ldap auth
50
50
  attr_accessor :signing_key_data
51
51
 
52
52
  # Authentication token (see `/auth` and `/configure`)
@@ -22,7 +22,7 @@ module Akeyless
22
22
  # DockerhubPassword is either the user's password access token to manage the repository
23
23
  attr_accessor :dockerhub_password
24
24
 
25
- # Access token scopes list (comma seperated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
25
+ # Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
26
26
  attr_accessor :dockerhub_token_scopes
27
27
 
28
28
  # DockerhubUsername is the name of the user in dockerhub
@@ -23,6 +23,8 @@ module Akeyless
23
23
 
24
24
  attr_accessor :email
25
25
 
26
+ attr_accessor :general_settings
27
+
26
28
  attr_accessor :object_version_settings
27
29
 
28
30
  attr_accessor :phone
@@ -40,6 +42,7 @@ module Akeyless
40
42
  :'address' => :'address',
41
43
  :'company_name' => :'company_name',
42
44
  :'email' => :'email',
45
+ :'general_settings' => :'general_settings',
43
46
  :'object_version_settings' => :'object_version_settings',
44
47
  :'phone' => :'phone',
45
48
  :'secret_management' => :'secret_management',
@@ -60,6 +63,7 @@ module Akeyless
60
63
  :'address' => :'CustomerFullAddress',
61
64
  :'company_name' => :'String',
62
65
  :'email' => :'String',
66
+ :'general_settings' => :'AccountGeneralSettings',
63
67
  :'object_version_settings' => :'AccountObjectVersionSettingsOutput',
64
68
  :'phone' => :'String',
65
69
  :'secret_management' => :'SmInfo',
@@ -105,6 +109,10 @@ module Akeyless
105
109
  self.email = attributes[:'email']
106
110
  end
107
111
 
112
+ if attributes.key?(:'general_settings')
113
+ self.general_settings = attributes[:'general_settings']
114
+ end
115
+
108
116
  if attributes.key?(:'object_version_settings')
109
117
  self.object_version_settings = attributes[:'object_version_settings']
110
118
  end
@@ -148,6 +156,7 @@ module Akeyless
148
156
  address == o.address &&
149
157
  company_name == o.company_name &&
150
158
  email == o.email &&
159
+ general_settings == o.general_settings &&
151
160
  object_version_settings == o.object_version_settings &&
152
161
  phone == o.phone &&
153
162
  secret_management == o.secret_management &&
@@ -164,7 +173,7 @@ module Akeyless
164
173
  # Calculates hash code according to all attributes.
165
174
  # @return [Integer] Hash code
166
175
  def hash
167
- [account_id, address, company_name, email, object_version_settings, phone, secret_management, secure_remote_access, system_access_creds_settings].hash
176
+ [account_id, address, company_name, email, general_settings, object_version_settings, phone, secret_management, secure_remote_access, system_access_creds_settings].hash
168
177
  end
169
178
 
170
179
  # Builds the object from hash
@@ -16,7 +16,7 @@ require 'time'
16
16
  module Akeyless
17
17
  class GetSecretValue
18
18
  # for personal password manager
19
- attr_accessor :item_accessibility
19
+ attr_accessor :accessibility
20
20
 
21
21
  # Secret name
22
22
  attr_accessor :names
@@ -35,7 +35,7 @@ module Akeyless
35
35
  # Attribute mapping from ruby-style variable name to JSON key.
36
36
  def self.attribute_map
37
37
  {
38
- :'item_accessibility' => :'item-accessibility',
38
+ :'accessibility' => :'accessibility',
39
39
  :'names' => :'names',
40
40
  :'pretty_print' => :'pretty-print',
41
41
  :'token' => :'token',
@@ -52,7 +52,7 @@ module Akeyless
52
52
  # Attribute type mapping.
53
53
  def self.openapi_types
54
54
  {
55
- :'item_accessibility' => :'String',
55
+ :'accessibility' => :'String',
56
56
  :'names' => :'Array<String>',
57
57
  :'pretty_print' => :'Boolean',
58
58
  :'token' => :'String',
@@ -82,8 +82,8 @@ module Akeyless
82
82
  h[k.to_sym] = v
83
83
  }
84
84
 
85
- if attributes.key?(:'item_accessibility')
86
- self.item_accessibility = attributes[:'item_accessibility']
85
+ if attributes.key?(:'accessibility')
86
+ self.accessibility = attributes[:'accessibility']
87
87
  end
88
88
 
89
89
  if attributes.key?(:'names')
@@ -132,7 +132,7 @@ module Akeyless
132
132
  def ==(o)
133
133
  return true if self.equal?(o)
134
134
  self.class == o.class &&
135
- item_accessibility == o.item_accessibility &&
135
+ accessibility == o.accessibility &&
136
136
  names == o.names &&
137
137
  pretty_print == o.pretty_print &&
138
138
  token == o.token &&
@@ -149,7 +149,7 @@ module Akeyless
149
149
  # Calculates hash code according to all attributes.
150
150
  # @return [Integer] Hash code
151
151
  def hash
152
- [item_accessibility, names, pretty_print, token, uid_token, version].hash
152
+ [accessibility, names, pretty_print, token, uid_token, version].hash
153
153
  end
154
154
 
155
155
  # Builds the object from hash