akeyless 2.16.12 → 2.17.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +5 -5
- data/docs/CreateArtifactoryTarget.md +1 -1
- data/docs/CreateKeyOutput.md +5 -1
- data/docs/CreateLdapTarget.md +2 -0
- data/docs/CreateSalesforceTarget.md +7 -3
- data/docs/Decrypt.md +3 -1
- data/docs/DecryptFile.md +6 -0
- data/docs/DecryptPKCS1.md +5 -1
- data/docs/DescribeItem.md +4 -0
- data/docs/DescribeSubClaims.md +20 -0
- data/docs/DescribeSubClaimsOutput.md +18 -0
- data/docs/Encrypt.md +3 -1
- data/docs/EncryptFile.md +4 -0
- data/docs/EncryptPKCS1.md +5 -1
- data/docs/GatewayCreateK8SAuthConfig.md +7 -1
- data/docs/GatewayCreateProducerDockerhub.md +1 -1
- data/docs/GatewayGetK8SAuthConfigOutput.md +7 -1
- data/docs/GatewayUpdateK8SAuthConfig.md +7 -1
- data/docs/GatewayUpdateProducerDockerhub.md +1 -1
- data/docs/K8SAuth.md +7 -1
- data/docs/SignPKCS1.md +5 -1
- data/docs/TargetTypeDetailsInput.md +3 -1
- data/docs/UpdateLdapTarget.md +2 -0
- data/docs/UpdateSalesforceTarget.md +7 -3
- data/docs/V2Api.md +69 -69
- data/docs/VerifyPKCS1.md +4 -0
- data/lib/akeyless/api/v2_api.rb +65 -65
- data/lib/akeyless/models/create_artifactory_target.rb +1 -1
- data/lib/akeyless/models/create_key_output.rb +22 -4
- data/lib/akeyless/models/create_ldap_target.rb +13 -1
- data/lib/akeyless/models/create_salesforce_target.rb +29 -19
- data/lib/akeyless/models/decrypt.rb +16 -1
- data/lib/akeyless/models/decrypt_file.rb +36 -1
- data/lib/akeyless/models/decrypt_pkcs1.rb +22 -2
- data/lib/akeyless/models/describe_item.rb +21 -1
- data/lib/akeyless/models/describe_sub_claims.rb +231 -0
- data/lib/akeyless/models/describe_sub_claims_output.rb +221 -0
- data/lib/akeyless/models/encrypt.rb +16 -1
- data/lib/akeyless/models/encrypt_file.rb +21 -1
- data/lib/akeyless/models/encrypt_pkcs1.rb +22 -2
- data/lib/akeyless/models/gateway_create_k8_s_auth_config.rb +34 -2
- data/lib/akeyless/models/gateway_create_producer_dockerhub.rb +1 -1
- data/lib/akeyless/models/gateway_get_k8_s_auth_config_output.rb +32 -2
- data/lib/akeyless/models/gateway_update_k8_s_auth_config.rb +34 -2
- data/lib/akeyless/models/gateway_update_producer_dockerhub.rb +1 -1
- data/lib/akeyless/models/k8_s_auth.rb +32 -2
- data/lib/akeyless/models/sign_pkcs1.rb +21 -6
- data/lib/akeyless/models/target_type_details_input.rb +14 -1
- data/lib/akeyless/models/update_ldap_target.rb +11 -1
- data/lib/akeyless/models/update_salesforce_target.rb +29 -19
- data/lib/akeyless/models/verify_pkcs1.rb +21 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +2 -2
- data/spec/models/describe_sub_claims_output_spec.rb +34 -0
- data/spec/models/describe_sub_claims_spec.rb +40 -0
- metadata +10 -2
@@ -19,6 +19,9 @@ module Akeyless
|
|
19
19
|
# The access ID of the Kubernetes auth method
|
20
20
|
attr_accessor :access_id
|
21
21
|
|
22
|
+
# Cluster access type. options: [native_k8s, rancher]
|
23
|
+
attr_accessor :cluster_api_type
|
24
|
+
|
22
25
|
# Config encryption key
|
23
26
|
attr_accessor :config_encryption_key_name
|
24
27
|
|
@@ -37,6 +40,12 @@ module Akeyless
|
|
37
40
|
# K8S Auth config new name
|
38
41
|
attr_accessor :new_name
|
39
42
|
|
43
|
+
# The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only)
|
44
|
+
attr_accessor :rancher_api_key
|
45
|
+
|
46
|
+
# The cluster id as define in rancher (relevant for \"rancher\" only)
|
47
|
+
attr_accessor :rancher_cluster_id
|
48
|
+
|
40
49
|
# The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth
|
41
50
|
attr_accessor :signing_key
|
42
51
|
|
@@ -46,7 +55,7 @@ module Akeyless
|
|
46
55
|
# Time in seconds of expiration of the Akeyless Kube Auth Method token
|
47
56
|
attr_accessor :token_exp
|
48
57
|
|
49
|
-
# A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs. If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
|
58
|
+
# A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API.
|
50
59
|
attr_accessor :token_reviewer_jwt
|
51
60
|
|
52
61
|
# The universal identity token, Required only for universal_identity authentication
|
@@ -56,12 +65,15 @@ module Akeyless
|
|
56
65
|
def self.attribute_map
|
57
66
|
{
|
58
67
|
:'access_id' => :'access-id',
|
68
|
+
:'cluster_api_type' => :'cluster-api-type',
|
59
69
|
:'config_encryption_key_name' => :'config-encryption-key-name',
|
60
70
|
:'k8s_ca_cert' => :'k8s-ca-cert',
|
61
71
|
:'k8s_host' => :'k8s-host',
|
62
72
|
:'k8s_issuer' => :'k8s-issuer',
|
63
73
|
:'name' => :'name',
|
64
74
|
:'new_name' => :'new-name',
|
75
|
+
:'rancher_api_key' => :'rancher-api-key',
|
76
|
+
:'rancher_cluster_id' => :'rancher-cluster-id',
|
65
77
|
:'signing_key' => :'signing-key',
|
66
78
|
:'token' => :'token',
|
67
79
|
:'token_exp' => :'token-exp',
|
@@ -79,12 +91,15 @@ module Akeyless
|
|
79
91
|
def self.openapi_types
|
80
92
|
{
|
81
93
|
:'access_id' => :'String',
|
94
|
+
:'cluster_api_type' => :'String',
|
82
95
|
:'config_encryption_key_name' => :'String',
|
83
96
|
:'k8s_ca_cert' => :'String',
|
84
97
|
:'k8s_host' => :'String',
|
85
98
|
:'k8s_issuer' => :'String',
|
86
99
|
:'name' => :'String',
|
87
100
|
:'new_name' => :'String',
|
101
|
+
:'rancher_api_key' => :'String',
|
102
|
+
:'rancher_cluster_id' => :'String',
|
88
103
|
:'signing_key' => :'String',
|
89
104
|
:'token' => :'String',
|
90
105
|
:'token_exp' => :'Integer',
|
@@ -118,6 +133,12 @@ module Akeyless
|
|
118
133
|
self.access_id = attributes[:'access_id']
|
119
134
|
end
|
120
135
|
|
136
|
+
if attributes.key?(:'cluster_api_type')
|
137
|
+
self.cluster_api_type = attributes[:'cluster_api_type']
|
138
|
+
else
|
139
|
+
self.cluster_api_type = 'native_k8s'
|
140
|
+
end
|
141
|
+
|
121
142
|
if attributes.key?(:'config_encryption_key_name')
|
122
143
|
self.config_encryption_key_name = attributes[:'config_encryption_key_name']
|
123
144
|
end
|
@@ -142,6 +163,14 @@ module Akeyless
|
|
142
163
|
self.new_name = attributes[:'new_name']
|
143
164
|
end
|
144
165
|
|
166
|
+
if attributes.key?(:'rancher_api_key')
|
167
|
+
self.rancher_api_key = attributes[:'rancher_api_key']
|
168
|
+
end
|
169
|
+
|
170
|
+
if attributes.key?(:'rancher_cluster_id')
|
171
|
+
self.rancher_cluster_id = attributes[:'rancher_cluster_id']
|
172
|
+
end
|
173
|
+
|
145
174
|
if attributes.key?(:'signing_key')
|
146
175
|
self.signing_key = attributes[:'signing_key']
|
147
176
|
end
|
@@ -209,12 +238,15 @@ module Akeyless
|
|
209
238
|
return true if self.equal?(o)
|
210
239
|
self.class == o.class &&
|
211
240
|
access_id == o.access_id &&
|
241
|
+
cluster_api_type == o.cluster_api_type &&
|
212
242
|
config_encryption_key_name == o.config_encryption_key_name &&
|
213
243
|
k8s_ca_cert == o.k8s_ca_cert &&
|
214
244
|
k8s_host == o.k8s_host &&
|
215
245
|
k8s_issuer == o.k8s_issuer &&
|
216
246
|
name == o.name &&
|
217
247
|
new_name == o.new_name &&
|
248
|
+
rancher_api_key == o.rancher_api_key &&
|
249
|
+
rancher_cluster_id == o.rancher_cluster_id &&
|
218
250
|
signing_key == o.signing_key &&
|
219
251
|
token == o.token &&
|
220
252
|
token_exp == o.token_exp &&
|
@@ -231,7 +263,7 @@ module Akeyless
|
|
231
263
|
# Calculates hash code according to all attributes.
|
232
264
|
# @return [Integer] Hash code
|
233
265
|
def hash
|
234
|
-
[access_id, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, new_name, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
|
266
|
+
[access_id, cluster_api_type, config_encryption_key_name, k8s_ca_cert, k8s_host, k8s_issuer, name, new_name, rancher_api_key, rancher_cluster_id, signing_key, token, token_exp, token_reviewer_jwt, uid_token].hash
|
235
267
|
end
|
236
268
|
|
237
269
|
# Builds the object from hash
|
@@ -22,7 +22,7 @@ module Akeyless
|
|
22
22
|
# DockerhubPassword is either the user's password access token to manage the repository
|
23
23
|
attr_accessor :dockerhub_password
|
24
24
|
|
25
|
-
# Access token scopes list (comma
|
25
|
+
# Access token scopes list (comma-separated) to give the dynamic secret valid options are in \"repo:admin\", \"repo:write\", \"repo:read\", \"repo:public_read\"
|
26
26
|
attr_accessor :dockerhub_token_scopes
|
27
27
|
|
28
28
|
# DockerhubUsername is the name of the user in dockerhub
|
@@ -24,6 +24,9 @@ module Akeyless
|
|
24
24
|
# AuthMethodSigningKey is the private key (in base64 of the PEM format) associated with the public key defined in the Kubernetes auth method, that used to sign the internal token for the Akeyless Kubernetes Auth Method
|
25
25
|
attr_accessor :auth_method_prv_key_pem
|
26
26
|
|
27
|
+
# ClusterApiType defines types of API access to cluster
|
28
|
+
attr_accessor :cluster_api_type
|
29
|
+
|
27
30
|
# DisableISSValidation is optional parameter to disable ISS validation
|
28
31
|
attr_accessor :disable_iss_validation
|
29
32
|
|
@@ -41,13 +44,19 @@ module Akeyless
|
|
41
44
|
# K8SPublicKeysPEM is the list of public key in PEM format
|
42
45
|
attr_accessor :k8s_pub_keys_pem
|
43
46
|
|
44
|
-
#
|
47
|
+
# K8STokenReviewerJWT is the bearer for clusterApiTypeK8s, used during TokenReview API call
|
45
48
|
attr_accessor :k8s_token_reviewer_jwt
|
46
49
|
|
47
50
|
attr_accessor :name
|
48
51
|
|
49
52
|
attr_accessor :protection_key
|
50
53
|
|
54
|
+
# RancherApiKey the bear token for clusterApiTypeRancher
|
55
|
+
attr_accessor :rancher_api_key
|
56
|
+
|
57
|
+
# RancherClusterId cluster id as define in rancher (in case of clusterApiTypeRancher)
|
58
|
+
attr_accessor :rancher_cluster_id
|
59
|
+
|
51
60
|
# UseLocalCAJwt is an optional parameter to set defaulting to using the local CA cert and service account jwt when running in a Kubernetes pod
|
52
61
|
attr_accessor :use_local_ca_jwt
|
53
62
|
|
@@ -57,6 +66,7 @@ module Akeyless
|
|
57
66
|
:'am_token_expiration' => :'am_token_expiration',
|
58
67
|
:'auth_method_access_id' => :'auth_method_access_id',
|
59
68
|
:'auth_method_prv_key_pem' => :'auth_method_prv_key_pem',
|
69
|
+
:'cluster_api_type' => :'cluster_api_type',
|
60
70
|
:'disable_iss_validation' => :'disable_iss_validation',
|
61
71
|
:'id' => :'id',
|
62
72
|
:'k8s_ca_cert' => :'k8s_ca_cert',
|
@@ -66,6 +76,8 @@ module Akeyless
|
|
66
76
|
:'k8s_token_reviewer_jwt' => :'k8s_token_reviewer_jwt',
|
67
77
|
:'name' => :'name',
|
68
78
|
:'protection_key' => :'protection_key',
|
79
|
+
:'rancher_api_key' => :'rancher_api_key',
|
80
|
+
:'rancher_cluster_id' => :'rancher_cluster_id',
|
69
81
|
:'use_local_ca_jwt' => :'use_local_ca_jwt'
|
70
82
|
}
|
71
83
|
end
|
@@ -81,6 +93,7 @@ module Akeyless
|
|
81
93
|
:'am_token_expiration' => :'Integer',
|
82
94
|
:'auth_method_access_id' => :'String',
|
83
95
|
:'auth_method_prv_key_pem' => :'String',
|
96
|
+
:'cluster_api_type' => :'String',
|
84
97
|
:'disable_iss_validation' => :'Boolean',
|
85
98
|
:'id' => :'String',
|
86
99
|
:'k8s_ca_cert' => :'String',
|
@@ -90,6 +103,8 @@ module Akeyless
|
|
90
103
|
:'k8s_token_reviewer_jwt' => :'String',
|
91
104
|
:'name' => :'String',
|
92
105
|
:'protection_key' => :'String',
|
106
|
+
:'rancher_api_key' => :'String',
|
107
|
+
:'rancher_cluster_id' => :'String',
|
93
108
|
:'use_local_ca_jwt' => :'Boolean'
|
94
109
|
}
|
95
110
|
end
|
@@ -127,6 +142,10 @@ module Akeyless
|
|
127
142
|
self.auth_method_prv_key_pem = attributes[:'auth_method_prv_key_pem']
|
128
143
|
end
|
129
144
|
|
145
|
+
if attributes.key?(:'cluster_api_type')
|
146
|
+
self.cluster_api_type = attributes[:'cluster_api_type']
|
147
|
+
end
|
148
|
+
|
130
149
|
if attributes.key?(:'disable_iss_validation')
|
131
150
|
self.disable_iss_validation = attributes[:'disable_iss_validation']
|
132
151
|
end
|
@@ -165,6 +184,14 @@ module Akeyless
|
|
165
184
|
self.protection_key = attributes[:'protection_key']
|
166
185
|
end
|
167
186
|
|
187
|
+
if attributes.key?(:'rancher_api_key')
|
188
|
+
self.rancher_api_key = attributes[:'rancher_api_key']
|
189
|
+
end
|
190
|
+
|
191
|
+
if attributes.key?(:'rancher_cluster_id')
|
192
|
+
self.rancher_cluster_id = attributes[:'rancher_cluster_id']
|
193
|
+
end
|
194
|
+
|
168
195
|
if attributes.key?(:'use_local_ca_jwt')
|
169
196
|
self.use_local_ca_jwt = attributes[:'use_local_ca_jwt']
|
170
197
|
end
|
@@ -191,6 +218,7 @@ module Akeyless
|
|
191
218
|
am_token_expiration == o.am_token_expiration &&
|
192
219
|
auth_method_access_id == o.auth_method_access_id &&
|
193
220
|
auth_method_prv_key_pem == o.auth_method_prv_key_pem &&
|
221
|
+
cluster_api_type == o.cluster_api_type &&
|
194
222
|
disable_iss_validation == o.disable_iss_validation &&
|
195
223
|
id == o.id &&
|
196
224
|
k8s_ca_cert == o.k8s_ca_cert &&
|
@@ -200,6 +228,8 @@ module Akeyless
|
|
200
228
|
k8s_token_reviewer_jwt == o.k8s_token_reviewer_jwt &&
|
201
229
|
name == o.name &&
|
202
230
|
protection_key == o.protection_key &&
|
231
|
+
rancher_api_key == o.rancher_api_key &&
|
232
|
+
rancher_cluster_id == o.rancher_cluster_id &&
|
203
233
|
use_local_ca_jwt == o.use_local_ca_jwt
|
204
234
|
end
|
205
235
|
|
@@ -212,7 +242,7 @@ module Akeyless
|
|
212
242
|
# Calculates hash code according to all attributes.
|
213
243
|
# @return [Integer] Hash code
|
214
244
|
def hash
|
215
|
-
[am_token_expiration, auth_method_access_id, auth_method_prv_key_pem, disable_iss_validation, id, k8s_ca_cert, k8s_host, k8s_issuer, k8s_pub_keys_pem, k8s_token_reviewer_jwt, name, protection_key, use_local_ca_jwt].hash
|
245
|
+
[am_token_expiration, auth_method_access_id, auth_method_prv_key_pem, cluster_api_type, disable_iss_validation, id, k8s_ca_cert, k8s_host, k8s_issuer, k8s_pub_keys_pem, k8s_token_reviewer_jwt, name, protection_key, rancher_api_key, rancher_cluster_id, use_local_ca_jwt].hash
|
216
246
|
end
|
217
247
|
|
218
248
|
# Builds the object from hash
|
@@ -16,6 +16,12 @@ require 'time'
|
|
16
16
|
module Akeyless
|
17
17
|
# signPKCS1 is a command that calculates the signature of hashed data using RSASSA-PKCS1-V1_5-SIGN from RSA PKCS#1 v1.5.
|
18
18
|
class SignPKCS1
|
19
|
+
# The display id of the key to use in the signing process
|
20
|
+
attr_accessor :display_id
|
21
|
+
|
22
|
+
# The item id of the key to use in the signing process
|
23
|
+
attr_accessor :item_id
|
24
|
+
|
19
25
|
# The name of the RSA key to use in the signing process
|
20
26
|
attr_accessor :key_name
|
21
27
|
|
@@ -31,6 +37,8 @@ module Akeyless
|
|
31
37
|
# Attribute mapping from ruby-style variable name to JSON key.
|
32
38
|
def self.attribute_map
|
33
39
|
{
|
40
|
+
:'display_id' => :'display-id',
|
41
|
+
:'item_id' => :'item-id',
|
34
42
|
:'key_name' => :'key-name',
|
35
43
|
:'message' => :'message',
|
36
44
|
:'token' => :'token',
|
@@ -46,6 +54,8 @@ module Akeyless
|
|
46
54
|
# Attribute type mapping.
|
47
55
|
def self.openapi_types
|
48
56
|
{
|
57
|
+
:'display_id' => :'String',
|
58
|
+
:'item_id' => :'Integer',
|
49
59
|
:'key_name' => :'String',
|
50
60
|
:'message' => :'String',
|
51
61
|
:'token' => :'String',
|
@@ -74,6 +84,14 @@ module Akeyless
|
|
74
84
|
h[k.to_sym] = v
|
75
85
|
}
|
76
86
|
|
87
|
+
if attributes.key?(:'display_id')
|
88
|
+
self.display_id = attributes[:'display_id']
|
89
|
+
end
|
90
|
+
|
91
|
+
if attributes.key?(:'item_id')
|
92
|
+
self.item_id = attributes[:'item_id']
|
93
|
+
end
|
94
|
+
|
77
95
|
if attributes.key?(:'key_name')
|
78
96
|
self.key_name = attributes[:'key_name']
|
79
97
|
end
|
@@ -95,10 +113,6 @@ module Akeyless
|
|
95
113
|
# @return Array for valid properties with the reasons
|
96
114
|
def list_invalid_properties
|
97
115
|
invalid_properties = Array.new
|
98
|
-
if @key_name.nil?
|
99
|
-
invalid_properties.push('invalid value for "key_name", key_name cannot be nil.')
|
100
|
-
end
|
101
|
-
|
102
116
|
if @message.nil?
|
103
117
|
invalid_properties.push('invalid value for "message", message cannot be nil.')
|
104
118
|
end
|
@@ -109,7 +123,6 @@ module Akeyless
|
|
109
123
|
# Check to see if the all the properties in the model are valid
|
110
124
|
# @return true if the model is valid
|
111
125
|
def valid?
|
112
|
-
return false if @key_name.nil?
|
113
126
|
return false if @message.nil?
|
114
127
|
true
|
115
128
|
end
|
@@ -119,6 +132,8 @@ module Akeyless
|
|
119
132
|
def ==(o)
|
120
133
|
return true if self.equal?(o)
|
121
134
|
self.class == o.class &&
|
135
|
+
display_id == o.display_id &&
|
136
|
+
item_id == o.item_id &&
|
122
137
|
key_name == o.key_name &&
|
123
138
|
message == o.message &&
|
124
139
|
token == o.token &&
|
@@ -134,7 +149,7 @@ module Akeyless
|
|
134
149
|
# Calculates hash code according to all attributes.
|
135
150
|
# @return [Integer] Hash code
|
136
151
|
def hash
|
137
|
-
[key_name, message, token, uid_token].hash
|
152
|
+
[display_id, item_id, key_name, message, token, uid_token].hash
|
138
153
|
end
|
139
154
|
|
140
155
|
# Builds the object from hash
|
@@ -15,6 +15,9 @@ require 'time'
|
|
15
15
|
|
16
16
|
module Akeyless
|
17
17
|
class TargetTypeDetailsInput
|
18
|
+
# params needed for jwt auth AppPrivateKey is the rsa private key in PEM format
|
19
|
+
attr_accessor :app_private_key
|
20
|
+
|
18
21
|
attr_accessor :artifactory_admin_apikey
|
19
22
|
|
20
23
|
attr_accessor :artifactory_admin_username
|
@@ -63,6 +66,7 @@ module Akeyless
|
|
63
66
|
|
64
67
|
attr_accessor :client_id
|
65
68
|
|
69
|
+
# params needed for password auth
|
66
70
|
attr_accessor :client_secret
|
67
71
|
|
68
72
|
attr_accessor :db_host_name
|
@@ -211,6 +215,7 @@ module Akeyless
|
|
211
215
|
# Attribute mapping from ruby-style variable name to JSON key.
|
212
216
|
def self.attribute_map
|
213
217
|
{
|
218
|
+
:'app_private_key' => :'app_private_key',
|
214
219
|
:'artifactory_admin_apikey' => :'artifactory_admin_apikey',
|
215
220
|
:'artifactory_admin_username' => :'artifactory_admin_username',
|
216
221
|
:'artifactory_base_url' => :'artifactory_base_url',
|
@@ -314,6 +319,7 @@ module Akeyless
|
|
314
319
|
# Attribute type mapping.
|
315
320
|
def self.openapi_types
|
316
321
|
{
|
322
|
+
:'app_private_key' => :'Array<Integer>',
|
317
323
|
:'artifactory_admin_apikey' => :'String',
|
318
324
|
:'artifactory_admin_username' => :'String',
|
319
325
|
:'artifactory_base_url' => :'String',
|
@@ -430,6 +436,12 @@ module Akeyless
|
|
430
436
|
h[k.to_sym] = v
|
431
437
|
}
|
432
438
|
|
439
|
+
if attributes.key?(:'app_private_key')
|
440
|
+
if (value = attributes[:'app_private_key']).is_a?(Array)
|
441
|
+
self.app_private_key = value
|
442
|
+
end
|
443
|
+
end
|
444
|
+
|
433
445
|
if attributes.key?(:'artifactory_admin_apikey')
|
434
446
|
self.artifactory_admin_apikey = attributes[:'artifactory_admin_apikey']
|
435
447
|
end
|
@@ -819,6 +831,7 @@ module Akeyless
|
|
819
831
|
def ==(o)
|
820
832
|
return true if self.equal?(o)
|
821
833
|
self.class == o.class &&
|
834
|
+
app_private_key == o.app_private_key &&
|
822
835
|
artifactory_admin_apikey == o.artifactory_admin_apikey &&
|
823
836
|
artifactory_admin_username == o.artifactory_admin_username &&
|
824
837
|
artifactory_base_url == o.artifactory_base_url &&
|
@@ -922,7 +935,7 @@ module Akeyless
|
|
922
935
|
# Calculates hash code according to all attributes.
|
923
936
|
# @return [Integer] Hash code
|
924
937
|
def hash
|
925
|
-
[artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, auth_flow, aws_access_key_id, aws_region, aws_secret_access_key, aws_session_token, azure_client_id, azure_client_secret, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, ca_cert_data, ca_cert_name, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_id, client_secret, db_host_name, db_name, db_port, db_pwd, db_server_certificates, db_server_name, db_user_name, eks_access_key_id, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, gcp_service_account_email, gcp_service_account_key, github_app_id, github_app_private_key, github_base_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, host, implementation_type, k8s_bearer_token, k8s_cluster_ca_certificate, k8s_cluster_endpoint, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_token_expiration, ldap_url, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_uri_connection, mongodb_uri_options, mongodb_username, password, payload, port, private_key, private_key_password, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, security_token, sf_account, ssl_connection_certificate, ssl_connection_mode, tenant_url, url, use_gw_cloud_identity, user_name, username, venafi_api_key, venafi_base_url, venafi_tpp_password, venafi_tpp_username, venafi_use_tpp, venafi_zone].hash
|
938
|
+
[app_private_key, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, auth_flow, aws_access_key_id, aws_region, aws_secret_access_key, aws_session_token, azure_client_id, azure_client_secret, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, ca_cert_data, ca_cert_name, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_id, client_secret, db_host_name, db_name, db_port, db_pwd, db_server_certificates, db_server_name, db_user_name, eks_access_key_id, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, gcp_service_account_email, gcp_service_account_key, github_app_id, github_app_private_key, github_base_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, host, implementation_type, k8s_bearer_token, k8s_cluster_ca_certificate, k8s_cluster_endpoint, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_token_expiration, ldap_url, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_uri_connection, mongodb_uri_options, mongodb_username, password, payload, port, private_key, private_key_password, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, security_token, sf_account, ssl_connection_certificate, ssl_connection_mode, tenant_url, url, use_gw_cloud_identity, user_name, username, venafi_api_key, venafi_base_url, venafi_tpp_password, venafi_tpp_username, venafi_use_tpp, venafi_zone].hash
|
926
939
|
end
|
927
940
|
|
928
941
|
# Builds the object from hash
|
@@ -37,6 +37,9 @@ module Akeyless
|
|
37
37
|
# New target name
|
38
38
|
attr_accessor :new_name
|
39
39
|
|
40
|
+
# Set Ldap server type, Options:[OpenLDAP, ActiveDirectory]
|
41
|
+
attr_accessor :server_type
|
42
|
+
|
40
43
|
# Authentication token (see `/auth` and `/configure`)
|
41
44
|
attr_accessor :token
|
42
45
|
|
@@ -60,6 +63,7 @@ module Akeyless
|
|
60
63
|
:'ldap_url' => :'ldap-url',
|
61
64
|
:'name' => :'name',
|
62
65
|
:'new_name' => :'new-name',
|
66
|
+
:'server_type' => :'server-type',
|
63
67
|
:'token' => :'token',
|
64
68
|
:'token_expiration' => :'token-expiration',
|
65
69
|
:'uid_token' => :'uid-token',
|
@@ -84,6 +88,7 @@ module Akeyless
|
|
84
88
|
:'ldap_url' => :'String',
|
85
89
|
:'name' => :'String',
|
86
90
|
:'new_name' => :'String',
|
91
|
+
:'server_type' => :'String',
|
87
92
|
:'token' => :'String',
|
88
93
|
:'token_expiration' => :'String',
|
89
94
|
:'uid_token' => :'String',
|
@@ -148,6 +153,10 @@ module Akeyless
|
|
148
153
|
self.new_name = attributes[:'new_name']
|
149
154
|
end
|
150
155
|
|
156
|
+
if attributes.key?(:'server_type')
|
157
|
+
self.server_type = attributes[:'server_type']
|
158
|
+
end
|
159
|
+
|
151
160
|
if attributes.key?(:'token')
|
152
161
|
self.token = attributes[:'token']
|
153
162
|
end
|
@@ -197,6 +206,7 @@ module Akeyless
|
|
197
206
|
ldap_url == o.ldap_url &&
|
198
207
|
name == o.name &&
|
199
208
|
new_name == o.new_name &&
|
209
|
+
server_type == o.server_type &&
|
200
210
|
token == o.token &&
|
201
211
|
token_expiration == o.token_expiration &&
|
202
212
|
uid_token == o.uid_token &&
|
@@ -212,7 +222,7 @@ module Akeyless
|
|
212
222
|
# Calculates hash code according to all attributes.
|
213
223
|
# @return [Integer] Hash code
|
214
224
|
def hash
|
215
|
-
[bind_dn, bind_dn_password, comment, keep_prev_version, key, ldap_ca_cert, ldap_url, name, new_name, token, token_expiration, uid_token, update_version].hash
|
225
|
+
[bind_dn, bind_dn_password, comment, keep_prev_version, key, ldap_ca_cert, ldap_url, name, new_name, server_type, token, token_expiration, uid_token, update_version].hash
|
216
226
|
end
|
217
227
|
|
218
228
|
# Builds the object from hash
|
@@ -15,6 +15,12 @@ require 'time'
|
|
15
15
|
|
16
16
|
module Akeyless
|
17
17
|
class UpdateSalesforceTarget
|
18
|
+
# Base64 encoded PEM of the connected app private key (relevant for JWT auth only)
|
19
|
+
attr_accessor :app_private_key_data
|
20
|
+
|
21
|
+
# type of the auth flow ('jwt' / 'user-password')
|
22
|
+
attr_accessor :auth_flow
|
23
|
+
|
18
24
|
# Base64 encoded PEM cert to use when uploading a new key to Salesforce
|
19
25
|
attr_accessor :ca_cert_data
|
20
26
|
|
@@ -24,7 +30,7 @@ module Akeyless
|
|
24
30
|
# Client ID of the oauth2 app to use for connecting to Salesforce
|
25
31
|
attr_accessor :client_id
|
26
32
|
|
27
|
-
# Client secret of the oauth2 app to use for connecting to Salesforce
|
33
|
+
# Client secret of the oauth2 app to use for connecting to Salesforce (required for password flow)
|
28
34
|
attr_accessor :client_secret
|
29
35
|
|
30
36
|
# Comment about the target
|
@@ -44,10 +50,10 @@ module Akeyless
|
|
44
50
|
# New target name
|
45
51
|
attr_accessor :new_name
|
46
52
|
|
47
|
-
# The password of the user attached to the oauth2 app used for connecting to Salesforce
|
53
|
+
# The password of the user attached to the oauth2 app used for connecting to Salesforce (required for user-password flow)
|
48
54
|
attr_accessor :password
|
49
55
|
|
50
|
-
# The security token of the user attached to the oauth2 app used for connecting to Salesforce
|
56
|
+
# The security token of the user attached to the oauth2 app used for connecting to Salesforce (required for user-password flow)
|
51
57
|
attr_accessor :security_token
|
52
58
|
|
53
59
|
# Url of the Salesforce tenant
|
@@ -65,6 +71,8 @@ module Akeyless
|
|
65
71
|
# Attribute mapping from ruby-style variable name to JSON key.
|
66
72
|
def self.attribute_map
|
67
73
|
{
|
74
|
+
:'app_private_key_data' => :'app-private-key-data',
|
75
|
+
:'auth_flow' => :'auth-flow',
|
68
76
|
:'ca_cert_data' => :'ca-cert-data',
|
69
77
|
:'ca_cert_name' => :'ca-cert-name',
|
70
78
|
:'client_id' => :'client-id',
|
@@ -92,6 +100,8 @@ module Akeyless
|
|
92
100
|
# Attribute type mapping.
|
93
101
|
def self.openapi_types
|
94
102
|
{
|
103
|
+
:'app_private_key_data' => :'String',
|
104
|
+
:'auth_flow' => :'String',
|
95
105
|
:'ca_cert_data' => :'String',
|
96
106
|
:'ca_cert_name' => :'String',
|
97
107
|
:'client_id' => :'String',
|
@@ -132,6 +142,14 @@ module Akeyless
|
|
132
142
|
h[k.to_sym] = v
|
133
143
|
}
|
134
144
|
|
145
|
+
if attributes.key?(:'app_private_key_data')
|
146
|
+
self.app_private_key_data = attributes[:'app_private_key_data']
|
147
|
+
end
|
148
|
+
|
149
|
+
if attributes.key?(:'auth_flow')
|
150
|
+
self.auth_flow = attributes[:'auth_flow']
|
151
|
+
end
|
152
|
+
|
135
153
|
if attributes.key?(:'ca_cert_data')
|
136
154
|
self.ca_cert_data = attributes[:'ca_cert_data']
|
137
155
|
end
|
@@ -201,12 +219,12 @@ module Akeyless
|
|
201
219
|
# @return Array for valid properties with the reasons
|
202
220
|
def list_invalid_properties
|
203
221
|
invalid_properties = Array.new
|
204
|
-
if @
|
205
|
-
invalid_properties.push('invalid value for "
|
222
|
+
if @auth_flow.nil?
|
223
|
+
invalid_properties.push('invalid value for "auth_flow", auth_flow cannot be nil.')
|
206
224
|
end
|
207
225
|
|
208
|
-
if @
|
209
|
-
invalid_properties.push('invalid value for "
|
226
|
+
if @client_id.nil?
|
227
|
+
invalid_properties.push('invalid value for "client_id", client_id cannot be nil.')
|
210
228
|
end
|
211
229
|
|
212
230
|
if @email.nil?
|
@@ -217,14 +235,6 @@ module Akeyless
|
|
217
235
|
invalid_properties.push('invalid value for "name", name cannot be nil.')
|
218
236
|
end
|
219
237
|
|
220
|
-
if @password.nil?
|
221
|
-
invalid_properties.push('invalid value for "password", password cannot be nil.')
|
222
|
-
end
|
223
|
-
|
224
|
-
if @security_token.nil?
|
225
|
-
invalid_properties.push('invalid value for "security_token", security_token cannot be nil.')
|
226
|
-
end
|
227
|
-
|
228
238
|
if @tenant_url.nil?
|
229
239
|
invalid_properties.push('invalid value for "tenant_url", tenant_url cannot be nil.')
|
230
240
|
end
|
@@ -235,12 +245,10 @@ module Akeyless
|
|
235
245
|
# Check to see if the all the properties in the model are valid
|
236
246
|
# @return true if the model is valid
|
237
247
|
def valid?
|
248
|
+
return false if @auth_flow.nil?
|
238
249
|
return false if @client_id.nil?
|
239
|
-
return false if @client_secret.nil?
|
240
250
|
return false if @email.nil?
|
241
251
|
return false if @name.nil?
|
242
|
-
return false if @password.nil?
|
243
|
-
return false if @security_token.nil?
|
244
252
|
return false if @tenant_url.nil?
|
245
253
|
true
|
246
254
|
end
|
@@ -250,6 +258,8 @@ module Akeyless
|
|
250
258
|
def ==(o)
|
251
259
|
return true if self.equal?(o)
|
252
260
|
self.class == o.class &&
|
261
|
+
app_private_key_data == o.app_private_key_data &&
|
262
|
+
auth_flow == o.auth_flow &&
|
253
263
|
ca_cert_data == o.ca_cert_data &&
|
254
264
|
ca_cert_name == o.ca_cert_name &&
|
255
265
|
client_id == o.client_id &&
|
@@ -277,7 +287,7 @@ module Akeyless
|
|
277
287
|
# Calculates hash code according to all attributes.
|
278
288
|
# @return [Integer] Hash code
|
279
289
|
def hash
|
280
|
-
[ca_cert_data, ca_cert_name, client_id, client_secret, comment, email, keep_prev_version, key, name, new_name, password, security_token, tenant_url, token, uid_token, update_version].hash
|
290
|
+
[app_private_key_data, auth_flow, ca_cert_data, ca_cert_name, client_id, client_secret, comment, email, keep_prev_version, key, name, new_name, password, security_token, tenant_url, token, uid_token, update_version].hash
|
281
291
|
end
|
282
292
|
|
283
293
|
# Builds the object from hash
|
@@ -15,6 +15,12 @@ require 'time'
|
|
15
15
|
|
16
16
|
module Akeyless
|
17
17
|
class VerifyPKCS1
|
18
|
+
# The display id of the key to use in the verification process
|
19
|
+
attr_accessor :display_id
|
20
|
+
|
21
|
+
# The item id of the key to use in the verification process
|
22
|
+
attr_accessor :item_id
|
23
|
+
|
18
24
|
# The name of the RSA key to use in the verification process
|
19
25
|
attr_accessor :key_name
|
20
26
|
|
@@ -33,6 +39,8 @@ module Akeyless
|
|
33
39
|
# Attribute mapping from ruby-style variable name to JSON key.
|
34
40
|
def self.attribute_map
|
35
41
|
{
|
42
|
+
:'display_id' => :'display-id',
|
43
|
+
:'item_id' => :'item-id',
|
36
44
|
:'key_name' => :'key-name',
|
37
45
|
:'message' => :'message',
|
38
46
|
:'signature' => :'signature',
|
@@ -49,6 +57,8 @@ module Akeyless
|
|
49
57
|
# Attribute type mapping.
|
50
58
|
def self.openapi_types
|
51
59
|
{
|
60
|
+
:'display_id' => :'String',
|
61
|
+
:'item_id' => :'Integer',
|
52
62
|
:'key_name' => :'String',
|
53
63
|
:'message' => :'String',
|
54
64
|
:'signature' => :'String',
|
@@ -78,6 +88,14 @@ module Akeyless
|
|
78
88
|
h[k.to_sym] = v
|
79
89
|
}
|
80
90
|
|
91
|
+
if attributes.key?(:'display_id')
|
92
|
+
self.display_id = attributes[:'display_id']
|
93
|
+
end
|
94
|
+
|
95
|
+
if attributes.key?(:'item_id')
|
96
|
+
self.item_id = attributes[:'item_id']
|
97
|
+
end
|
98
|
+
|
81
99
|
if attributes.key?(:'key_name')
|
82
100
|
self.key_name = attributes[:'key_name']
|
83
101
|
end
|
@@ -132,6 +150,8 @@ module Akeyless
|
|
132
150
|
def ==(o)
|
133
151
|
return true if self.equal?(o)
|
134
152
|
self.class == o.class &&
|
153
|
+
display_id == o.display_id &&
|
154
|
+
item_id == o.item_id &&
|
135
155
|
key_name == o.key_name &&
|
136
156
|
message == o.message &&
|
137
157
|
signature == o.signature &&
|
@@ -148,7 +168,7 @@ module Akeyless
|
|
148
168
|
# Calculates hash code according to all attributes.
|
149
169
|
# @return [Integer] Hash code
|
150
170
|
def hash
|
151
|
-
[key_name, message, signature, token, uid_token].hash
|
171
|
+
[display_id, item_id, key_name, message, signature, token, uid_token].hash
|
152
172
|
end
|
153
173
|
|
154
174
|
# Builds the object from hash
|
data/lib/akeyless/version.rb
CHANGED
data/lib/akeyless.rb
CHANGED
@@ -159,6 +159,8 @@ require 'akeyless/models/delete_targets'
|
|
159
159
|
require 'akeyless/models/describe_item'
|
160
160
|
require 'akeyless/models/describe_permissions'
|
161
161
|
require 'akeyless/models/describe_permissions_output'
|
162
|
+
require 'akeyless/models/describe_sub_claims'
|
163
|
+
require 'akeyless/models/describe_sub_claims_output'
|
162
164
|
require 'akeyless/models/detokenize'
|
163
165
|
require 'akeyless/models/detokenize_output'
|
164
166
|
require 'akeyless/models/dynamic_secret_producer_info'
|
@@ -544,8 +546,6 @@ require 'akeyless/models/update_secret_val_output'
|
|
544
546
|
require 'akeyless/models/update_target'
|
545
547
|
require 'akeyless/models/update_target_details_output'
|
546
548
|
require 'akeyless/models/update_target_output'
|
547
|
-
require 'akeyless/models/update_tokenizer'
|
548
|
-
require 'akeyless/models/update_tokenizer_output'
|
549
549
|
require 'akeyless/models/update_web_target'
|
550
550
|
require 'akeyless/models/update_web_target_details'
|
551
551
|
require 'akeyless/models/update_web_target_output'
|