akeyless 2.16.11 → 2.18.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +9 -8
- data/docs/AccountGeneralSettings.md +20 -0
- data/docs/CreateArtifactoryTarget.md +1 -1
- data/docs/CreateAuthMethodK8S.md +2 -2
- data/docs/CreateAuthMethodLDAP.md +3 -1
- data/docs/CreateAuthMethodLDAPOutput.md +3 -1
- data/docs/CreateKeyOutput.md +5 -1
- data/docs/CreateLdapTarget.md +2 -0
- data/docs/CreatePKICertIssuer.md +5 -5
- data/docs/CreateSSHCertIssuer.md +1 -1
- data/docs/CreateSalesforceTarget.md +7 -3
- data/docs/CreateSecret.md +11 -19
- data/docs/DSProducerDetails.md +2 -0
- data/docs/DataProtectionSection.md +18 -0
- data/docs/Decrypt.md +3 -1
- data/docs/DecryptFile.md +6 -0
- data/docs/DecryptPKCS1.md +5 -1
- data/docs/DeleteItem.md +2 -2
- data/docs/DescribeItem.md +4 -0
- data/docs/DescribeSubClaims.md +20 -0
- data/docs/DescribeSubClaimsOutput.md +18 -0
- data/docs/Encrypt.md +3 -1
- data/docs/EncryptFile.md +4 -0
- data/docs/EncryptPKCS1.md +5 -1
- data/docs/GatewayCreateK8SAuthConfig.md +10 -4
- data/docs/GatewayCreateProducerDockerhub.md +1 -1
- data/docs/GatewayGetK8SAuthConfigOutput.md +7 -1
- data/docs/GatewayRevokeTmpUsers.md +4 -2
- data/docs/GatewayUpdateK8SAuthConfig.md +10 -4
- data/docs/GatewayUpdateLdapAuthConfig.md +2 -2
- data/docs/GatewayUpdateProducerDockerhub.md +1 -1
- data/docs/GetAccountSettingsCommandOutput.md +2 -0
- data/docs/GetSecretValue.md +2 -2
- data/docs/Item.md +2 -0
- data/docs/K8SAuth.md +7 -1
- data/docs/KubernetesAccessRules.md +2 -0
- data/docs/LDAPAccessRules.md +2 -0
- data/docs/ListItems.md +2 -2
- data/docs/LogForwardingConfigPart.md +2 -0
- data/docs/RuleAssigner.md +20 -0
- data/docs/SignPKCS1.md +5 -1
- data/docs/TargetTypeDetailsInput.md +5 -1
- data/docs/UpdateAccountSettings.md +13 -1
- data/docs/UpdateAuthMethodK8S.md +2 -2
- data/docs/UpdateAuthMethodLDAP.md +3 -1
- data/docs/UpdateAuthMethodLDAPOutput.md +18 -0
- data/docs/UpdateItem.md +2 -2
- data/docs/UpdateLdapTarget.md +2 -0
- data/docs/UpdateSalesforceTarget.md +7 -3
- data/docs/UpdateSecretVal.md +11 -9
- data/docs/V2Api.md +46 -109
- data/docs/VerifyPKCS1.md +4 -0
- data/lib/akeyless/api/v2_api.rb +43 -107
- data/lib/akeyless/models/account_general_settings.rb +229 -0
- data/lib/akeyless/models/create_artifactory_target.rb +1 -1
- data/lib/akeyless/models/create_auth_method_k8_s.rb +2 -2
- data/lib/akeyless/models/create_auth_method_ldap.rb +14 -2
- data/lib/akeyless/models/create_auth_method_ldap_output.rb +13 -4
- data/lib/akeyless/models/create_key_output.rb +22 -4
- data/lib/akeyless/models/create_ldap_target.rb +13 -1
- data/lib/akeyless/models/create_pki_cert_issuer.rb +5 -5
- data/lib/akeyless/models/create_salesforce_target.rb +29 -19
- data/lib/akeyless/models/create_secret.rb +50 -90
- data/lib/akeyless/models/create_ssh_cert_issuer.rb +1 -1
- data/lib/akeyless/models/data_protection_section.rb +220 -0
- data/lib/akeyless/models/decrypt.rb +16 -1
- data/lib/akeyless/models/decrypt_file.rb +36 -1
- data/lib/akeyless/models/decrypt_pkcs1.rb +22 -2
- data/lib/akeyless/models/delete_item.rb +11 -11
- data/lib/akeyless/models/describe_item.rb +21 -1
- data/lib/akeyless/models/describe_sub_claims.rb +231 -0
- data/lib/akeyless/models/describe_sub_claims_output.rb +221 -0
- data/lib/akeyless/models/ds_producer_details.rb +10 -1
- data/lib/akeyless/models/encrypt.rb +16 -1
- data/lib/akeyless/models/encrypt_file.rb +21 -1
- data/lib/akeyless/models/encrypt_pkcs1.rb +22 -2
- data/lib/akeyless/models/gateway_create_k8_s_auth_config.rb +38 -4
- data/lib/akeyless/models/gateway_create_producer_dockerhub.rb +1 -1
- data/lib/akeyless/models/gateway_get_k8_s_auth_config_output.rb +32 -2
- data/lib/akeyless/models/gateway_revoke_tmp_users.rb +14 -2
- data/lib/akeyless/models/gateway_update_k8_s_auth_config.rb +38 -4
- data/lib/akeyless/models/gateway_update_ldap_auth_config.rb +2 -2
- data/lib/akeyless/models/gateway_update_producer_dockerhub.rb +1 -1
- data/lib/akeyless/models/get_account_settings_command_output.rb +10 -1
- data/lib/akeyless/models/get_secret_value.rb +7 -7
- data/lib/akeyless/models/item.rb +10 -1
- data/lib/akeyless/models/k8_s_auth.rb +32 -2
- data/lib/akeyless/models/kubernetes_access_rules.rb +11 -1
- data/lib/akeyless/models/ldap_access_rules.rb +11 -1
- data/lib/akeyless/models/list_items.rb +11 -11
- data/lib/akeyless/models/log_forwarding_config_part.rb +10 -1
- data/lib/akeyless/models/rule_assigner.rb +228 -0
- data/lib/akeyless/models/sign_pkcs1.rb +21 -6
- data/lib/akeyless/models/target_type_details_input.rb +23 -1
- data/lib/akeyless/models/update_account_settings.rb +64 -4
- data/lib/akeyless/models/update_auth_method_k8_s.rb +2 -4
- data/lib/akeyless/models/update_auth_method_ldap.rb +12 -2
- data/lib/akeyless/models/update_auth_method_ldap_output.rb +219 -0
- data/lib/akeyless/models/update_item.rb +11 -11
- data/lib/akeyless/models/update_ldap_target.rb +11 -1
- data/lib/akeyless/models/update_salesforce_target.rb +29 -19
- data/lib/akeyless/models/update_secret_val.rb +52 -42
- data/lib/akeyless/models/verify_pkcs1.rb +21 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +6 -4
- data/spec/models/account_general_settings_spec.rb +34 -0
- data/spec/models/data_protection_section_spec.rb +34 -0
- data/spec/models/describe_sub_claims_output_spec.rb +34 -0
- data/spec/models/describe_sub_claims_spec.rb +40 -0
- data/spec/models/rule_assigner_spec.rb +40 -0
- data/spec/models/update_auth_method_ldap_output_spec.rb +34 -0
- metadata +525 -501
@@ -15,7 +15,13 @@ require 'time'
|
|
15
15
|
|
16
16
|
module Akeyless
|
17
17
|
class EncryptPKCS1
|
18
|
-
# The
|
18
|
+
# The display id of the key to use in the encryption process
|
19
|
+
attr_accessor :display_id
|
20
|
+
|
21
|
+
# The item id of the key to use in the encryption process
|
22
|
+
attr_accessor :item_id
|
23
|
+
|
24
|
+
# The name of the key to use in the encryption process
|
19
25
|
attr_accessor :key_name
|
20
26
|
|
21
27
|
# Data to be encrypted
|
@@ -30,6 +36,8 @@ module Akeyless
|
|
30
36
|
# Attribute mapping from ruby-style variable name to JSON key.
|
31
37
|
def self.attribute_map
|
32
38
|
{
|
39
|
+
:'display_id' => :'display-id',
|
40
|
+
:'item_id' => :'item-id',
|
33
41
|
:'key_name' => :'key-name',
|
34
42
|
:'plaintext' => :'plaintext',
|
35
43
|
:'token' => :'token',
|
@@ -45,6 +53,8 @@ module Akeyless
|
|
45
53
|
# Attribute type mapping.
|
46
54
|
def self.openapi_types
|
47
55
|
{
|
56
|
+
:'display_id' => :'String',
|
57
|
+
:'item_id' => :'Integer',
|
48
58
|
:'key_name' => :'String',
|
49
59
|
:'plaintext' => :'String',
|
50
60
|
:'token' => :'String',
|
@@ -73,6 +83,14 @@ module Akeyless
|
|
73
83
|
h[k.to_sym] = v
|
74
84
|
}
|
75
85
|
|
86
|
+
if attributes.key?(:'display_id')
|
87
|
+
self.display_id = attributes[:'display_id']
|
88
|
+
end
|
89
|
+
|
90
|
+
if attributes.key?(:'item_id')
|
91
|
+
self.item_id = attributes[:'item_id']
|
92
|
+
end
|
93
|
+
|
76
94
|
if attributes.key?(:'key_name')
|
77
95
|
self.key_name = attributes[:'key_name']
|
78
96
|
end
|
@@ -118,6 +136,8 @@ module Akeyless
|
|
118
136
|
def ==(o)
|
119
137
|
return true if self.equal?(o)
|
120
138
|
self.class == o.class &&
|
139
|
+
display_id == o.display_id &&
|
140
|
+
item_id == o.item_id &&
|
121
141
|
key_name == o.key_name &&
|
122
142
|
plaintext == o.plaintext &&
|
123
143
|
token == o.token &&
|
@@ -133,7 +153,7 @@ module Akeyless
|
|
133
153
|
# Calculates hash code according to all attributes.
|
134
154
|
# @return [Integer] Hash code
|
135
155
|
def hash
|
136
|
-
[key_name, plaintext, token, uid_token].hash
|
156
|
+
[display_id, item_id, key_name, plaintext, token, uid_token].hash
|
137
157
|
end
|
138
158
|
|
139
159
|
# Builds the object from hash
|
@@ -19,10 +19,13 @@ module Akeyless
|
|
19
19
|
# The access ID of the Kubernetes auth method
|
20
20
|
attr_accessor :access_id
|
21
21
|
|
22
|
+
# Cluster access type. options: [native_k8s, rancher]
|
23
|
+
attr_accessor :cluster_api_type
|
24
|
+
|
22
25
|
# Config encryption key
|
23
26
|
attr_accessor :config_encryption_key_name
|
24
27
|
|
25
|
-
# The CA
|
28
|
+
# The CA Certificate (base64 encoded) to use to call into the kubernetes API server
|
26
29
|
attr_accessor :k8s_ca_cert
|
27
30
|
|
28
31
|
# The URL of the kubernetes API server
|
@@ -34,7 +37,13 @@ module Akeyless
|
|
34
37
|
# K8S Auth config name
|
35
38
|
attr_accessor :name
|
36
39
|
|
37
|
-
# The
|
40
|
+
# The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only)
|
41
|
+
attr_accessor :rancher_api_key
|
42
|
+
|
43
|
+
# The cluster id as define in rancher (relevant for \"rancher\" only)
|
44
|
+
attr_accessor :rancher_cluster_id
|
45
|
+
|
46
|
+
# The private key (base64 encoded) associated with the public key defined in the Kubernetes auth
|
38
47
|
attr_accessor :signing_key
|
39
48
|
|
40
49
|
# Authentication token (see `/auth` and `/configure`)
|
@@ -43,7 +52,7 @@ module Akeyless
|
|
43
52
|
# Time in seconds of expiration of the Akeyless Kube Auth Method token
|
44
53
|
attr_accessor :token_exp
|
45
54
|
|
46
|
-
# A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
|
55
|
+
# A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
|
47
56
|
attr_accessor :token_reviewer_jwt
|
48
57
|
|
49
58
|
# The universal identity token, Required only for universal_identity authentication
|
@@ -53,11 +62,14 @@ module Akeyless
|
|
53
62
|
def self.attribute_map
|
54
63
|
{
|
55
64
|
:'access_id' => :'access-id',
|
65
|
+
:'cluster_api_type' => :'cluster-api-type',
|
56
66
|
:'config_encryption_key_name' => :'config-encryption-key-name',
|
57
67
|
:'k8s_ca_cert' => :'k8s-ca-cert',
|
58
68
|
:'k8s_host' => :'k8s-host',
|
59
69
|
:'k8s_issuer' => :'k8s-issuer',
|
60
70
|
:'name' => :'name',
|
71
|
+
:'rancher_api_key' => :'rancher-api-key',
|
72
|
+
:'rancher_cluster_id' => :'rancher-cluster-id',
|
61
73
|
:'signing_key' => :'signing-key',
|
62
74
|
:'token' => :'token',
|
63
75
|
:'token_exp' => :'token-exp',
|
@@ -75,11 +87,14 @@ module Akeyless
|
|
75
87
|
def self.openapi_types
|
76
88
|
{
|
77
89
|
:'access_id' => :'String',
|
90
|
+
:'cluster_api_type' => :'String',
|
78
91
|
:'config_encryption_key_name' => :'String',
|
79
92
|
:'k8s_ca_cert' => :'String',
|
80
93
|
:'k8s_host' => :'String',
|
81
94
|
:'k8s_issuer' => :'String',
|
82
95
|
:'name' => :'String',
|
96
|
+
:'rancher_api_key' => :'String',
|
97
|
+
:'rancher_cluster_id' => :'String',
|
83
98
|
:'signing_key' => :'String',
|
84
99
|
:'token' => :'String',
|
85
100
|
:'token_exp' => :'Integer',
|
@@ -113,6 +128,12 @@ module Akeyless
|
|
113
128
|
self.access_id = attributes[:'access_id']
|
114
129
|
end
|
115
130
|
|
131
|
+
if attributes.key?(:'cluster_api_type')
|
132
|
+
self.cluster_api_type = attributes[:'cluster_api_type']
|
133
|
+
else
|
134
|
+
self.cluster_api_type = 'native_k8s'
|
135
|
+
end
|
136
|
+
|
116
137
|
if attributes.key?(:'config_encryption_key_name')
|
117
138
|
self.config_encryption_key_name = attributes[:'config_encryption_key_name']
|
118
139
|
end
|
@@ -133,6 +154,14 @@ module Akeyless
|
|
133
154
|
self.name = attributes[:'name']
|
134
155
|
end
|
135
156
|
|
157
|
+
if attributes.key?(:'rancher_api_key')
|
158
|
+
self.rancher_api_key = attributes[:'rancher_api_key']
|
159
|
+
end
|
160
|
+
|
161
|
+
if attributes.key?(:'rancher_cluster_id')
|
162
|
+
self.rancher_cluster_id = attributes[:'rancher_cluster_id']
|
163
|
+
end
|
164
|
+
|
136
165
|
if attributes.key?(:'signing_key')
|
137
166
|
self.signing_key = attributes[:'signing_key']
|
138
167
|
end
|
@@ -143,6 +172,8 @@ module Akeyless
|
|
143
172
|
|
144
173
|
if attributes.key?(:'token_exp')
|
145
174
|
self.token_exp = attributes[:'token_exp']
|
175
|
+
else
|
176
|
+
self.token_exp = 300
|
146
177
|
end
|
147
178
|
|
148
179
|
if attributes.key?(:'token_reviewer_jwt')
|
@@ -193,11 +224,14 @@ module Akeyless
|
|
193
224
|
return true if self.equal?(o)
|
194
225
|
self.class == o.class &&
|
195
226
|
access_id == o.access_id &&
|
227
|
+
cluster_api_type == o.cluster_api_type &&
|
196
228
|
config_encryption_key_name == o.config_encryption_key_name &&
|
197
229
|
k8s_ca_cert == o.k8s_ca_cert &&
|
198
230
|
k8s_host == o.k8s_host &&
|
199
231
|
k8s_issuer == o.k8s_issuer &&
|
200
232
|
name == o.name &&
|
233
|
+
rancher_api_key == o.rancher_api_key &&
|
234
|
+
rancher_cluster_id == o.rancher_cluster_id &&
|
201
235
|
signing_key == o.signing_key &&
|
202
236
|
token == o.token &&
|
203
237
|
token_exp == o.token_exp &&
|
@@ -214,7 +248,7 @@ module Akeyless
|
|
214
248
|
# Calculates hash code according to all attributes.
|
215
249
|
# @return [Integer] Hash code
|
216
250
|
def hash
|
217
|
-
[access_id, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
|
251
|
+
[access_id, cluster_api_type, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, rancher_api_key, rancher_cluster_id, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
|
218
252
|
end
|
219
253
|
|
220
254
|
# Builds the object from hash
|
@@ -22,7 +22,7 @@ module Akeyless
|
|
22
22
|
# DockerhubPassword is either the user's password access token to manage the repository
|
23
23
|
attr_accessor :dockerhub_password
|
24
24
|
|
25
|
-
# Access token scopes list (comma
|
25
|
+
# Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
|
26
26
|
attr_accessor :dockerhub_token_scopes
|
27
27
|
|
28
28
|
# DockerhubUsername is the name of the user in dockerhub
|
@@ -24,6 +24,9 @@ module Akeyless
|
|
24
24
|
# AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method
|
25
25
|
attr_accessor :auth_method_prv_key_pem
|
26
26
|
|
27
|
+
# ClusterApiType defines types of API access to cluster
|
28
|
+
attr_accessor :cluster_api_type
|
29
|
+
|
27
30
|
# DisableISSValidation is optional parameter to disable ISS validation
|
28
31
|
attr_accessor :disable_iss_validation
|
29
32
|
|
@@ -41,13 +44,19 @@ module Akeyless
|
|
41
44
|
# K8SPublicKeysPEM is the list of public key in PEM format
|
42
45
|
attr_accessor :k8s_pub_keys_pem
|
43
46
|
|
44
|
-
#
|
47
|
+
# K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used during TokenReview API call
|
45
48
|
attr_accessor :k8s_token_reviewer_jwt
|
46
49
|
|
47
50
|
attr_accessor :name
|
48
51
|
|
49
52
|
attr_accessor :protection_key
|
50
53
|
|
54
|
+
# RancherApiKey the bear token for clusterApiTypeRancher
|
55
|
+
attr_accessor :rancher_api_key
|
56
|
+
|
57
|
+
# RancherClusterId cluster id as define in rancher (in case of clusterApiTypeRancher)
|
58
|
+
attr_accessor :rancher_cluster_id
|
59
|
+
|
51
60
|
# UseLocalCAJwt is an optional parameter to set defaulting to using the local CA cert and service account jwt when running in a Kubernetes pod
|
52
61
|
attr_accessor :use_local_ca_jwt
|
53
62
|
|
@@ -57,6 +66,7 @@ module Akeyless
|
|
57
66
|
:'am_token_expiration' => :'am_token_expiration',
|
58
67
|
:'auth_method_access_id' => :'auth_method_access_id',
|
59
68
|
:'auth_method_prv_key_pem' => :'auth_method_prv_key_pem',
|
69
|
+
:'cluster_api_type' => :'cluster_api_type',
|
60
70
|
:'disable_iss_validation' => :'disable_iss_validation',
|
61
71
|
:'id' => :'id',
|
62
72
|
:'k8s_ca_cert' => :'k8s_ca_cert',
|
@@ -66,6 +76,8 @@ module Akeyless
|
|
66
76
|
:'k8s_token_reviewer_jwt' => :'k8s_token_reviewer_jwt',
|
67
77
|
:'name' => :'name',
|
68
78
|
:'protection_key' => :'protection_key',
|
79
|
+
:'rancher_api_key' => :'rancher_api_key',
|
80
|
+
:'rancher_cluster_id' => :'rancher_cluster_id',
|
69
81
|
:'use_local_ca_jwt' => :'use_local_ca_jwt'
|
70
82
|
}
|
71
83
|
end
|
@@ -81,6 +93,7 @@ module Akeyless
|
|
81
93
|
:'am_token_expiration' => :'Integer',
|
82
94
|
:'auth_method_access_id' => :'String',
|
83
95
|
:'auth_method_prv_key_pem' => :'String',
|
96
|
+
:'cluster_api_type' => :'String',
|
84
97
|
:'disable_iss_validation' => :'Boolean',
|
85
98
|
:'id' => :'String',
|
86
99
|
:'k8s_ca_cert' => :'String',
|
@@ -90,6 +103,8 @@ module Akeyless
|
|
90
103
|
:'k8s_token_reviewer_jwt' => :'String',
|
91
104
|
:'name' => :'String',
|
92
105
|
:'protection_key' => :'String',
|
106
|
+
:'rancher_api_key' => :'String',
|
107
|
+
:'rancher_cluster_id' => :'String',
|
93
108
|
:'use_local_ca_jwt' => :'Boolean'
|
94
109
|
}
|
95
110
|
end
|
@@ -127,6 +142,10 @@ module Akeyless
|
|
127
142
|
self.auth_method_prv_key_pem = attributes[:'auth_method_prv_key_pem']
|
128
143
|
end
|
129
144
|
|
145
|
+
if attributes.key?(:'cluster_api_type')
|
146
|
+
self.cluster_api_type = attributes[:'cluster_api_type']
|
147
|
+
end
|
148
|
+
|
130
149
|
if attributes.key?(:'disable_iss_validation')
|
131
150
|
self.disable_iss_validation = attributes[:'disable_iss_validation']
|
132
151
|
end
|
@@ -165,6 +184,14 @@ module Akeyless
|
|
165
184
|
self.protection_key = attributes[:'protection_key']
|
166
185
|
end
|
167
186
|
|
187
|
+
if attributes.key?(:'rancher_api_key')
|
188
|
+
self.rancher_api_key = attributes[:'rancher_api_key']
|
189
|
+
end
|
190
|
+
|
191
|
+
if attributes.key?(:'rancher_cluster_id')
|
192
|
+
self.rancher_cluster_id = attributes[:'rancher_cluster_id']
|
193
|
+
end
|
194
|
+
|
168
195
|
if attributes.key?(:'use_local_ca_jwt')
|
169
196
|
self.use_local_ca_jwt = attributes[:'use_local_ca_jwt']
|
170
197
|
end
|
@@ -191,6 +218,7 @@ module Akeyless
|
|
191
218
|
am_token_expiration == o.am_token_expiration &&
|
192
219
|
auth_method_access_id == o.auth_method_access_id &&
|
193
220
|
auth_method_prv_key_pem == o.auth_method_prv_key_pem &&
|
221
|
+
cluster_api_type == o.cluster_api_type &&
|
194
222
|
disable_iss_validation == o.disable_iss_validation &&
|
195
223
|
id == o.id &&
|
196
224
|
k8s_ca_cert == o.k8s_ca_cert &&
|
@@ -200,6 +228,8 @@ module Akeyless
|
|
200
228
|
k8s_token_reviewer_jwt == o.k8s_token_reviewer_jwt &&
|
201
229
|
name == o.name &&
|
202
230
|
protection_key == o.protection_key &&
|
231
|
+
rancher_api_key == o.rancher_api_key &&
|
232
|
+
rancher_cluster_id == o.rancher_cluster_id &&
|
203
233
|
use_local_ca_jwt == o.use_local_ca_jwt
|
204
234
|
end
|
205
235
|
|
@@ -212,7 +242,7 @@ module Akeyless
|
|
212
242
|
# Calculates hash code according to all attributes.
|
213
243
|
# @return [Integer] Hash code
|
214
244
|
def hash
|
215
|
-
[am_token_expiration, auth_method_access_id, auth_method_prv_key_pem, disable_iss_validation, id, k8s_ca_cert, k8s_host, k8s_issuer, k8s_pub_keys_pem, k8s_token_reviewer_jwt, name, protection_key, use_local_ca_jwt].hash
|
245
|
+
[am_token_expiration, auth_method_access_id, auth_method_prv_key_pem, cluster_api_type, disable_iss_validation, id, k8s_ca_cert, k8s_host, k8s_issuer, k8s_pub_keys_pem, k8s_token_reviewer_jwt, name, protection_key, rancher_api_key, rancher_cluster_id, use_local_ca_jwt].hash
|
216
246
|
end
|
217
247
|
|
218
248
|
# Builds the object from hash
|
@@ -16,12 +16,15 @@ require 'time'
|
|
16
16
|
module Akeyless
|
17
17
|
# gatewayRevokeTmpUsers is a command that revoke producer tmp user
|
18
18
|
class GatewayRevokeTmpUsers
|
19
|
-
#
|
19
|
+
# Deprecated: has no effect
|
20
20
|
attr_accessor :host
|
21
21
|
|
22
22
|
# Producer Name
|
23
23
|
attr_accessor :name
|
24
24
|
|
25
|
+
# Revoke All Temp Creds
|
26
|
+
attr_accessor :revoke_all
|
27
|
+
|
25
28
|
# Soft Delete
|
26
29
|
attr_accessor :soft_delete
|
27
30
|
|
@@ -39,6 +42,7 @@ module Akeyless
|
|
39
42
|
{
|
40
43
|
:'host' => :'host',
|
41
44
|
:'name' => :'name',
|
45
|
+
:'revoke_all' => :'revoke-all',
|
42
46
|
:'soft_delete' => :'soft-delete',
|
43
47
|
:'tmp_creds_id' => :'tmp-creds-id',
|
44
48
|
:'token' => :'token',
|
@@ -56,6 +60,7 @@ module Akeyless
|
|
56
60
|
{
|
57
61
|
:'host' => :'String',
|
58
62
|
:'name' => :'String',
|
63
|
+
:'revoke_all' => :'Boolean',
|
59
64
|
:'soft_delete' => :'Boolean',
|
60
65
|
:'tmp_creds_id' => :'String',
|
61
66
|
:'token' => :'String',
|
@@ -92,12 +97,18 @@ module Akeyless
|
|
92
97
|
self.name = attributes[:'name']
|
93
98
|
end
|
94
99
|
|
100
|
+
if attributes.key?(:'revoke_all')
|
101
|
+
self.revoke_all = attributes[:'revoke_all']
|
102
|
+
end
|
103
|
+
|
95
104
|
if attributes.key?(:'soft_delete')
|
96
105
|
self.soft_delete = attributes[:'soft_delete']
|
97
106
|
end
|
98
107
|
|
99
108
|
if attributes.key?(:'tmp_creds_id')
|
100
109
|
self.tmp_creds_id = attributes[:'tmp_creds_id']
|
110
|
+
else
|
111
|
+
self.tmp_creds_id = 'demo_default_tmp_creds_id_for_sdk_bc'
|
101
112
|
end
|
102
113
|
|
103
114
|
if attributes.key?(:'token')
|
@@ -139,6 +150,7 @@ module Akeyless
|
|
139
150
|
self.class == o.class &&
|
140
151
|
host == o.host &&
|
141
152
|
name == o.name &&
|
153
|
+
revoke_all == o.revoke_all &&
|
142
154
|
soft_delete == o.soft_delete &&
|
143
155
|
tmp_creds_id == o.tmp_creds_id &&
|
144
156
|
token == o.token &&
|
@@ -154,7 +166,7 @@ module Akeyless
|
|
154
166
|
# Calculates hash code according to all attributes.
|
155
167
|
# @return [Integer] Hash code
|
156
168
|
def hash
|
157
|
-
[host, name, soft_delete, tmp_creds_id, token, uid_token].hash
|
169
|
+
[host, name, revoke_all, soft_delete, tmp_creds_id, token, uid_token].hash
|
158
170
|
end
|
159
171
|
|
160
172
|
# Builds the object from hash
|
@@ -19,10 +19,13 @@ module Akeyless
|
|
19
19
|
# The access ID of the Kubernetes auth method
|
20
20
|
attr_accessor :access_id
|
21
21
|
|
22
|
+
# Cluster access type. options: [native_k8s, rancher]
|
23
|
+
attr_accessor :cluster_api_type
|
24
|
+
|
22
25
|
# Config encryption key
|
23
26
|
attr_accessor :config_encryption_key_name
|
24
27
|
|
25
|
-
# The CA
|
28
|
+
# The CA Certificate (base64 encoded) to use to call into the kubernetes API server
|
26
29
|
attr_accessor :k8s_ca_cert
|
27
30
|
|
28
31
|
# The URL of the kubernetes API server
|
@@ -37,7 +40,13 @@ module Akeyless
|
|
37
40
|
# K8S Auth config new name
|
38
41
|
attr_accessor :new_name
|
39
42
|
|
40
|
-
# The
|
43
|
+
# The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only)
|
44
|
+
attr_accessor :rancher_api_key
|
45
|
+
|
46
|
+
# The cluster id as define in rancher (relevant for \"rancher\" only)
|
47
|
+
attr_accessor :rancher_cluster_id
|
48
|
+
|
49
|
+
# The private key (base64 encoded) associated with the public key defined in the Kubernetes auth
|
41
50
|
attr_accessor :signing_key
|
42
51
|
|
43
52
|
# Authentication token (see `/auth` and `/configure`)
|
@@ -46,7 +55,7 @@ module Akeyless
|
|
46
55
|
# Time in seconds of expiration of the Akeyless Kube Auth Method token
|
47
56
|
attr_accessor :token_exp
|
48
57
|
|
49
|
-
# A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
|
58
|
+
# A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
|
50
59
|
attr_accessor :token_reviewer_jwt
|
51
60
|
|
52
61
|
# The universal identity token, Required only for universal_identity authentication
|
@@ -56,12 +65,15 @@ module Akeyless
|
|
56
65
|
def self.attribute_map
|
57
66
|
{
|
58
67
|
:'access_id' => :'access-id',
|
68
|
+
:'cluster_api_type' => :'cluster-api-type',
|
59
69
|
:'config_encryption_key_name' => :'config-encryption-key-name',
|
60
70
|
:'k8s_ca_cert' => :'k8s-ca-cert',
|
61
71
|
:'k8s_host' => :'k8s-host',
|
62
72
|
:'k8s_issuer' => :'k8s-issuer',
|
63
73
|
:'name' => :'name',
|
64
74
|
:'new_name' => :'new-name',
|
75
|
+
:'rancher_api_key' => :'rancher-api-key',
|
76
|
+
:'rancher_cluster_id' => :'rancher-cluster-id',
|
65
77
|
:'signing_key' => :'signing-key',
|
66
78
|
:'token' => :'token',
|
67
79
|
:'token_exp' => :'token-exp',
|
@@ -79,12 +91,15 @@ module Akeyless
|
|
79
91
|
def self.openapi_types
|
80
92
|
{
|
81
93
|
:'access_id' => :'String',
|
94
|
+
:'cluster_api_type' => :'String',
|
82
95
|
:'config_encryption_key_name' => :'String',
|
83
96
|
:'k8s_ca_cert' => :'String',
|
84
97
|
:'k8s_host' => :'String',
|
85
98
|
:'k8s_issuer' => :'String',
|
86
99
|
:'name' => :'String',
|
87
100
|
:'new_name' => :'String',
|
101
|
+
:'rancher_api_key' => :'String',
|
102
|
+
:'rancher_cluster_id' => :'String',
|
88
103
|
:'signing_key' => :'String',
|
89
104
|
:'token' => :'String',
|
90
105
|
:'token_exp' => :'Integer',
|
@@ -118,6 +133,12 @@ module Akeyless
|
|
118
133
|
self.access_id = attributes[:'access_id']
|
119
134
|
end
|
120
135
|
|
136
|
+
if attributes.key?(:'cluster_api_type')
|
137
|
+
self.cluster_api_type = attributes[:'cluster_api_type']
|
138
|
+
else
|
139
|
+
self.cluster_api_type = 'native_k8s'
|
140
|
+
end
|
141
|
+
|
121
142
|
if attributes.key?(:'config_encryption_key_name')
|
122
143
|
self.config_encryption_key_name = attributes[:'config_encryption_key_name']
|
123
144
|
end
|
@@ -142,6 +163,14 @@ module Akeyless
|
|
142
163
|
self.new_name = attributes[:'new_name']
|
143
164
|
end
|
144
165
|
|
166
|
+
if attributes.key?(:'rancher_api_key')
|
167
|
+
self.rancher_api_key = attributes[:'rancher_api_key']
|
168
|
+
end
|
169
|
+
|
170
|
+
if attributes.key?(:'rancher_cluster_id')
|
171
|
+
self.rancher_cluster_id = attributes[:'rancher_cluster_id']
|
172
|
+
end
|
173
|
+
|
145
174
|
if attributes.key?(:'signing_key')
|
146
175
|
self.signing_key = attributes[:'signing_key']
|
147
176
|
end
|
@@ -152,6 +181,8 @@ module Akeyless
|
|
152
181
|
|
153
182
|
if attributes.key?(:'token_exp')
|
154
183
|
self.token_exp = attributes[:'token_exp']
|
184
|
+
else
|
185
|
+
self.token_exp = 300
|
155
186
|
end
|
156
187
|
|
157
188
|
if attributes.key?(:'token_reviewer_jwt')
|
@@ -207,12 +238,15 @@ module Akeyless
|
|
207
238
|
return true if self.equal?(o)
|
208
239
|
self.class == o.class &&
|
209
240
|
access_id == o.access_id &&
|
241
|
+
cluster_api_type == o.cluster_api_type &&
|
210
242
|
config_encryption_key_name == o.config_encryption_key_name &&
|
211
243
|
k8s_ca_cert == o.k8s_ca_cert &&
|
212
244
|
k8s_host == o.k8s_host &&
|
213
245
|
k8s_issuer == o.k8s_issuer &&
|
214
246
|
name == o.name &&
|
215
247
|
new_name == o.new_name &&
|
248
|
+
rancher_api_key == o.rancher_api_key &&
|
249
|
+
rancher_cluster_id == o.rancher_cluster_id &&
|
216
250
|
signing_key == o.signing_key &&
|
217
251
|
token == o.token &&
|
218
252
|
token_exp == o.token_exp &&
|
@@ -229,7 +263,7 @@ module Akeyless
|
|
229
263
|
# Calculates hash code according to all attributes.
|
230
264
|
# @return [Integer] Hash code
|
231
265
|
def hash
|
232
|
-
[access_id, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, new_name, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
|
266
|
+
[access_id, cluster_api_type, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, new_name, rancher_api_key, rancher_cluster_id, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
|
233
267
|
end
|
234
268
|
|
235
269
|
# Builds the object from hash
|
@@ -34,7 +34,7 @@ module Akeyless
|
|
34
34
|
# Group Filter
|
35
35
|
attr_accessor :group_filter
|
36
36
|
|
37
|
-
#
|
37
|
+
# LDAP CA Certificate (base64 encoded)
|
38
38
|
attr_accessor :ldap_ca_cert
|
39
39
|
|
40
40
|
# Enable Ldap
|
@@ -46,7 +46,7 @@ module Akeyless
|
|
46
46
|
# Ldap Anonymous Search
|
47
47
|
attr_accessor :ldap_anonymous_search
|
48
48
|
|
49
|
-
# The private key (
|
49
|
+
# The private key (base64 encoded), associated with the public key defined in the Ldap auth
|
50
50
|
attr_accessor :signing_key_data
|
51
51
|
|
52
52
|
# Authentication token (see `/auth` and `/configure`)
|
@@ -22,7 +22,7 @@ module Akeyless
|
|
22
22
|
# DockerhubPassword is either the user's password access token to manage the repository
|
23
23
|
attr_accessor :dockerhub_password
|
24
24
|
|
25
|
-
# Access token scopes list (comma
|
25
|
+
# Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
|
26
26
|
attr_accessor :dockerhub_token_scopes
|
27
27
|
|
28
28
|
# DockerhubUsername is the name of the user in dockerhub
|
@@ -23,6 +23,8 @@ module Akeyless
|
|
23
23
|
|
24
24
|
attr_accessor :email
|
25
25
|
|
26
|
+
attr_accessor :general_settings
|
27
|
+
|
26
28
|
attr_accessor :object_version_settings
|
27
29
|
|
28
30
|
attr_accessor :phone
|
@@ -40,6 +42,7 @@ module Akeyless
|
|
40
42
|
:'address' => :'address',
|
41
43
|
:'company_name' => :'company_name',
|
42
44
|
:'email' => :'email',
|
45
|
+
:'general_settings' => :'general_settings',
|
43
46
|
:'object_version_settings' => :'object_version_settings',
|
44
47
|
:'phone' => :'phone',
|
45
48
|
:'secret_management' => :'secret_management',
|
@@ -60,6 +63,7 @@ module Akeyless
|
|
60
63
|
:'address' => :'CustomerFullAddress',
|
61
64
|
:'company_name' => :'String',
|
62
65
|
:'email' => :'String',
|
66
|
+
:'general_settings' => :'AccountGeneralSettings',
|
63
67
|
:'object_version_settings' => :'AccountObjectVersionSettingsOutput',
|
64
68
|
:'phone' => :'String',
|
65
69
|
:'secret_management' => :'SmInfo',
|
@@ -105,6 +109,10 @@ module Akeyless
|
|
105
109
|
self.email = attributes[:'email']
|
106
110
|
end
|
107
111
|
|
112
|
+
if attributes.key?(:'general_settings')
|
113
|
+
self.general_settings = attributes[:'general_settings']
|
114
|
+
end
|
115
|
+
|
108
116
|
if attributes.key?(:'object_version_settings')
|
109
117
|
self.object_version_settings = attributes[:'object_version_settings']
|
110
118
|
end
|
@@ -148,6 +156,7 @@ module Akeyless
|
|
148
156
|
address == o.address &&
|
149
157
|
company_name == o.company_name &&
|
150
158
|
email == o.email &&
|
159
|
+
general_settings == o.general_settings &&
|
151
160
|
object_version_settings == o.object_version_settings &&
|
152
161
|
phone == o.phone &&
|
153
162
|
secret_management == o.secret_management &&
|
@@ -164,7 +173,7 @@ module Akeyless
|
|
164
173
|
# Calculates hash code according to all attributes.
|
165
174
|
# @return [Integer] Hash code
|
166
175
|
def hash
|
167
|
-
[account_id, address, company_name, email, object_version_settings, phone, secret_management, secure_remote_access, system_access_creds_settings].hash
|
176
|
+
[account_id, address, company_name, email, general_settings, object_version_settings, phone, secret_management, secure_remote_access, system_access_creds_settings].hash
|
168
177
|
end
|
169
178
|
|
170
179
|
# Builds the object from hash
|
@@ -16,7 +16,7 @@ require 'time'
|
|
16
16
|
module Akeyless
|
17
17
|
class GetSecretValue
|
18
18
|
# for personal password manager
|
19
|
-
attr_accessor :
|
19
|
+
attr_accessor :accessibility
|
20
20
|
|
21
21
|
# Secret name
|
22
22
|
attr_accessor :names
|
@@ -35,7 +35,7 @@ module Akeyless
|
|
35
35
|
# Attribute mapping from ruby-style variable name to JSON key.
|
36
36
|
def self.attribute_map
|
37
37
|
{
|
38
|
-
:'
|
38
|
+
:'accessibility' => :'accessibility',
|
39
39
|
:'names' => :'names',
|
40
40
|
:'pretty_print' => :'pretty-print',
|
41
41
|
:'token' => :'token',
|
@@ -52,7 +52,7 @@ module Akeyless
|
|
52
52
|
# Attribute type mapping.
|
53
53
|
def self.openapi_types
|
54
54
|
{
|
55
|
-
:'
|
55
|
+
:'accessibility' => :'String',
|
56
56
|
:'names' => :'Array<String>',
|
57
57
|
:'pretty_print' => :'Boolean',
|
58
58
|
:'token' => :'String',
|
@@ -82,8 +82,8 @@ module Akeyless
|
|
82
82
|
h[k.to_sym] = v
|
83
83
|
}
|
84
84
|
|
85
|
-
if attributes.key?(:'
|
86
|
-
self.
|
85
|
+
if attributes.key?(:'accessibility')
|
86
|
+
self.accessibility = attributes[:'accessibility']
|
87
87
|
end
|
88
88
|
|
89
89
|
if attributes.key?(:'names')
|
@@ -132,7 +132,7 @@ module Akeyless
|
|
132
132
|
def ==(o)
|
133
133
|
return true if self.equal?(o)
|
134
134
|
self.class == o.class &&
|
135
|
-
|
135
|
+
accessibility == o.accessibility &&
|
136
136
|
names == o.names &&
|
137
137
|
pretty_print == o.pretty_print &&
|
138
138
|
token == o.token &&
|
@@ -149,7 +149,7 @@ module Akeyless
|
|
149
149
|
# Calculates hash code according to all attributes.
|
150
150
|
# @return [Integer] Hash code
|
151
151
|
def hash
|
152
|
-
[
|
152
|
+
[accessibility, names, pretty_print, token, uid_token, version].hash
|
153
153
|
end
|
154
154
|
|
155
155
|
# Builds the object from hash
|