akeyless 2.17.0 → 2.18.0

Sign up to get free protection for your applications and to get access to all the features.
Files changed (45) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +3 -4
  3. data/docs/AccountGeneralSettings.md +3 -1
  4. data/docs/CreateAuthMethodK8S.md +2 -2
  5. data/docs/CreateAuthMethodLDAP.md +3 -1
  6. data/docs/CreateAuthMethodLDAPOutput.md +3 -1
  7. data/docs/CreatePKICertIssuer.md +5 -5
  8. data/docs/CreateSSHCertIssuer.md +1 -1
  9. data/docs/GatewayCreateK8SAuthConfig.md +2 -2
  10. data/docs/GatewayRevokeTmpUsers.md +4 -2
  11. data/docs/GatewayUpdateK8SAuthConfig.md +2 -2
  12. data/docs/GatewayUpdateLdapAuthConfig.md +2 -2
  13. data/docs/Item.md +2 -0
  14. data/docs/KubernetesAccessRules.md +2 -0
  15. data/docs/LDAPAccessRules.md +2 -0
  16. data/docs/RuleAssigner.md +20 -0
  17. data/docs/UpdateAccountSettings.md +11 -1
  18. data/docs/UpdateAuthMethodK8S.md +2 -2
  19. data/docs/UpdateAuthMethodLDAP.md +3 -1
  20. data/docs/UpdateAuthMethodLDAPOutput.md +18 -0
  21. data/docs/V2Api.md +4 -67
  22. data/lib/akeyless/api/v2_api.rb +3 -67
  23. data/lib/akeyless/models/account_general_settings.rb +13 -4
  24. data/lib/akeyless/models/create_auth_method_k8_s.rb +2 -2
  25. data/lib/akeyless/models/create_auth_method_ldap.rb +14 -2
  26. data/lib/akeyless/models/create_auth_method_ldap_output.rb +13 -4
  27. data/lib/akeyless/models/create_pki_cert_issuer.rb +5 -5
  28. data/lib/akeyless/models/create_ssh_cert_issuer.rb +1 -1
  29. data/lib/akeyless/models/gateway_create_k8_s_auth_config.rb +2 -2
  30. data/lib/akeyless/models/gateway_revoke_tmp_users.rb +14 -2
  31. data/lib/akeyless/models/gateway_update_k8_s_auth_config.rb +2 -2
  32. data/lib/akeyless/models/gateway_update_ldap_auth_config.rb +2 -2
  33. data/lib/akeyless/models/item.rb +10 -1
  34. data/lib/akeyless/models/kubernetes_access_rules.rb +11 -1
  35. data/lib/akeyless/models/ldap_access_rules.rb +11 -1
  36. data/lib/akeyless/models/rule_assigner.rb +228 -0
  37. data/lib/akeyless/models/update_account_settings.rb +54 -4
  38. data/lib/akeyless/models/update_auth_method_k8_s.rb +2 -4
  39. data/lib/akeyless/models/update_auth_method_ldap.rb +12 -2
  40. data/lib/akeyless/models/update_auth_method_ldap_output.rb +219 -0
  41. data/lib/akeyless/version.rb +1 -1
  42. data/lib/akeyless.rb +2 -2
  43. data/spec/models/rule_assigner_spec.rb +40 -0
  44. data/spec/models/update_auth_method_ldap_output_spec.rb +34 -0
  45. metadata +512 -504
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 7796d50ae58eae0b0ee56b2daa259e884c21237d9a1c6ff5ca06cbe2cbabe8c6
4
- data.tar.gz: 146f7c0ce4631981c6a10f19f6bd1aeb1135896dd5dc6560ad1d903e483cca82
3
+ metadata.gz: 256570f25ae7fd5412f270acc5ce72a8fc7e5510e65319166366de2cb4eeb470
4
+ data.tar.gz: '0339c97c8a1115d8e7c4483bfdbc76c5b6b450d02f0648b7e87b8994469d6dd6'
5
5
  SHA512:
6
- metadata.gz: 266182396e2d2e64eb0c3edcb0050bad50a8e32400c2e759fdcfc51bf31aa807f2249b45278afde24de9671e89e2424e8783147249e07e83fdaa60900d3d252b
7
- data.tar.gz: e93b6e9368a4f6439fc109f1307bfe45a0675b5a8df5b3eee37d3ef2f3dfbb89f3d32a720f11e541eabd60a7d2ea59c0981b2586d5337518f2518167a608c340
6
+ metadata.gz: 7d87c2a2c1e5a2e0d75fbdd3260cea74d78d99b4535023af18d8fa7769ff281debd6bf67e130ce22ac92dc9b7fe0bf5bf0a6aa438da4fa8281e38002996e933f
7
+ data.tar.gz: 96f4266b8435555eccad1e1d51b27726fed515ed2c6a4eed720710e7997b45b75d7190ad214102eb67e55ab3096830e29b62013bcdd3aaa2884b038c4810a544
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 2.17.0
10
+ - Package version: 2.18.0
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -120,7 +120,6 @@ Class | Method | HTTP request | Description
120
120
  *Akeyless::V2Api* | [**describe_sub_claims**](docs/V2Api.md#describe_sub_claims) | **POST** /describe-sub-claims |
121
121
  *Akeyless::V2Api* | [**detokenize**](docs/V2Api.md#detokenize) | **POST** /detokenize |
122
122
  *Akeyless::V2Api* | [**encrypt**](docs/V2Api.md#encrypt) | **POST** /encrypt |
123
- *Akeyless::V2Api* | [**encrypt_pkcs1**](docs/V2Api.md#encrypt_pkcs1) | **POST** /encrypt-pkcs1 |
124
123
  *Akeyless::V2Api* | [**encrypt_with_classic_key**](docs/V2Api.md#encrypt_with_classic_key) | **POST** /encrypt-with-classic-key |
125
124
  *Akeyless::V2Api* | [**gateway_create_k8_s_auth_config**](docs/V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config |
126
125
  *Akeyless::V2Api* | [**gateway_create_migration**](docs/V2Api.md#gateway_create_migration) | **POST** /gateway-create-migration |
@@ -451,8 +450,6 @@ Class | Method | HTTP request | Description
451
450
  - [Akeyless::EncryptFile](docs/EncryptFile.md)
452
451
  - [Akeyless::EncryptFileOutput](docs/EncryptFileOutput.md)
453
452
  - [Akeyless::EncryptOutput](docs/EncryptOutput.md)
454
- - [Akeyless::EncryptPKCS1](docs/EncryptPKCS1.md)
455
- - [Akeyless::EncryptPKCS1Output](docs/EncryptPKCS1Output.md)
456
453
  - [Akeyless::EncryptWithClassicKey](docs/EncryptWithClassicKey.md)
457
454
  - [Akeyless::EncryptWithClassicKeyOutput](docs/EncryptWithClassicKeyOutput.md)
458
455
  - [Akeyless::ExternalKMSKeyId](docs/ExternalKMSKeyId.md)
@@ -716,6 +713,7 @@ Class | Method | HTTP request | Description
716
713
  - [Akeyless::RotatedSecretOutput](docs/RotatedSecretOutput.md)
717
714
  - [Akeyless::Rotator](docs/Rotator.md)
718
715
  - [Akeyless::RotatorsConfigPart](docs/RotatorsConfigPart.md)
716
+ - [Akeyless::RuleAssigner](docs/RuleAssigner.md)
719
717
  - [Akeyless::Rules](docs/Rules.md)
720
718
  - [Akeyless::SAMLAccessRules](docs/SAMLAccessRules.md)
721
719
  - [Akeyless::SAMLAttribute](docs/SAMLAttribute.md)
@@ -775,6 +773,7 @@ Class | Method | HTTP request | Description
775
773
  - [Akeyless::UpdateAuthMethodK8S](docs/UpdateAuthMethodK8S.md)
776
774
  - [Akeyless::UpdateAuthMethodK8SOutput](docs/UpdateAuthMethodK8SOutput.md)
777
775
  - [Akeyless::UpdateAuthMethodLDAP](docs/UpdateAuthMethodLDAP.md)
776
+ - [Akeyless::UpdateAuthMethodLDAPOutput](docs/UpdateAuthMethodLDAPOutput.md)
778
777
  - [Akeyless::UpdateAuthMethodOAuth2](docs/UpdateAuthMethodOAuth2.md)
779
778
  - [Akeyless::UpdateAuthMethodOIDC](docs/UpdateAuthMethodOIDC.md)
780
779
  - [Akeyless::UpdateAuthMethodOutput](docs/UpdateAuthMethodOutput.md)
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **data_protection_section** | [**DataProtectionSection**](DataProtectionSection.md) | | [optional] |
8
+ | **password_policy** | [**PasswordPolicyInfo**](PasswordPolicyInfo.md) | | [optional] |
8
9
 
9
10
  ## Example
10
11
 
@@ -12,7 +13,8 @@
12
13
  require 'akeyless'
13
14
 
14
15
  instance = Akeyless::AccountGeneralSettings.new(
15
- data_protection_section: null
16
+ data_protection_section: null,
17
+ password_policy: null
16
18
  )
17
19
  ```
18
20
 
@@ -11,11 +11,11 @@
11
11
  | **bound_pod_names** | **Array<String>** | A list of pod names that the access is restricted to | [optional] |
12
12
  | **bound_sa_names** | **Array<String>** | A list of service account names that the access is restricted to | [optional] |
13
13
  | **force_sub_claims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] |
14
- | **gen_key** | **String** | If this flag is set to true, there is no need to manually provide a public key for the Kubernetes Auth Method, and instead, a key pair, will be generated as part of the command and the private part of the key will be returned (the private key is required for the K8S Auth Config in the Akeyless Gateway) | [optional][default to 'true'] |
14
+ | **gen_key** | **String** | Automatically generate key-pair for K8S configuration. If set to false, a public key needs to be provided | [optional][default to 'true'] |
15
15
  | **gw_bound_ips** | **Array<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
16
16
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional] |
17
17
  | **name** | **String** | Auth Method name | |
18
- | **public_key** | **String** | Base64-encoded public key text for K8S authentication method is required [RSA2048] | [optional] |
18
+ | **public_key** | **String** | Base64-encoded or PEM formatted public key data for K8S authentication method is required [RSA2048] | [optional] |
19
19
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
20
20
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
21
21
 
@@ -7,10 +7,11 @@
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
8
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
9
9
  | **force_sub_claims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] |
10
+ | **gen_key** | **String** | Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided | [optional][default to 'true'] |
10
11
  | **gw_bound_ips** | **Array<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
11
12
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional] |
12
13
  | **name** | **String** | Auth Method name | |
13
- | **public_key_data** | **String** | A public key generated for LDAP authentication method on Akeyless in base64 format [RSA2048] | [optional] |
14
+ | **public_key_data** | **String** | A public key generated for LDAP authentication method on Akeyless in base64 or PEM format [RSA2048] | [optional] |
14
15
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
16
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
17
  | **unique_identifier** | **String** | A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a \"sub claim\" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. | [optional] |
@@ -24,6 +25,7 @@ instance = Akeyless::CreateAuthMethodLDAP.new(
24
25
  access_expires: null,
25
26
  bound_ips: null,
26
27
  force_sub_claims: null,
28
+ gen_key: null,
27
29
  gw_bound_ips: null,
28
30
  jwt_ttl: null,
29
31
  name: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_id** | **String** | | [optional] |
8
+ | **prv_key** | **String** | | [optional] |
8
9
 
9
10
  ## Example
10
11
 
@@ -12,7 +13,8 @@
12
13
  require 'akeyless'
13
14
 
14
15
  instance = Akeyless::CreateAuthMethodLDAPOutput.new(
15
- access_id: null
16
+ access_id: null,
17
+ prv_key: null
16
18
  )
17
19
  ```
18
20
 
@@ -10,21 +10,21 @@
10
10
  | **allowed_uri_sans** | **String** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] |
11
11
  | **client_flag** | **Boolean** | If set, certificates will be flagged for client auth use | [optional] |
12
12
  | **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
13
- | **country** | **String** | A comma-separated list of the country that will be set in the issued certificate | [optional] |
13
+ | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
14
14
  | **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
15
15
  | **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
16
- | **locality** | **String** | A comma-separated list of the locality that will be set in the issued certificate | [optional] |
16
+ | **locality** | **String** | A comma-separated list of localities that will be set in the issued certificate | [optional] |
17
17
  | **metadata** | **String** | A metadata about the issuer | [optional] |
18
18
  | **name** | **String** | PKI certificate issuer name | |
19
19
  | **not_enforce_hostnames** | **Boolean** | If set, any names are allowed for CN and SANs in the certificate and not only a valid host name | [optional] |
20
20
  | **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
21
21
  | **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
22
22
  | **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
23
- | **postal_code** | **String** | A comma-separated list of the postal code that will be set in the issued certificate | [optional] |
24
- | **province** | **String** | A comma-separated list of the province that will be set in the issued certificate | [optional] |
23
+ | **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
24
+ | **province** | **String** | A comma-separated list of provinces that will be set in the issued certificate | [optional] |
25
25
  | **server_flag** | **Boolean** | If set, certificates will be flagged for server auth use | [optional] |
26
26
  | **signer_key_name** | **String** | A key to sign the certificate with | |
27
- | **street_address** | **String** | A comma-separated list of the street address that will be set in the issued certificate | [optional] |
27
+ | **street_address** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] |
28
28
  | **tag** | **Array<String>** | List of the tags attached to this key | [optional] |
29
29
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
30
30
  | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
@@ -19,7 +19,7 @@
19
19
  | **signer_key_name** | **String** | A key to sign the certificate with | |
20
20
  | **tag** | **Array<String>** | List of the tags attached to this key | [optional] |
21
21
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
22
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
22
+ | **ttl** | **Integer** | The requested Time To Live for the certificate, in seconds | |
23
23
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
24
24
 
25
25
  ## Example
@@ -7,13 +7,13 @@
7
7
  | **access_id** | **String** | The access ID of the Kubernetes auth method | |
8
8
  | **cluster_api_type** | **String** | Cluster access type. options: [native_k8s, rancher] | [optional][default to 'native_k8s'] |
9
9
  | **config_encryption_key_name** | **String** | Config encryption key | [optional] |
10
- | **k8s_ca_cert** | **String** | The CA Cert (in PEM format) to use to call into the kubernetes API server | [optional] |
10
+ | **k8s_ca_cert** | **String** | The CA Certificate (base64 encoded) to use to call into the kubernetes API server | [optional] |
11
11
  | **k8s_host** | **String** | The URL of the kubernetes API server | |
12
12
  | **k8s_issuer** | **String** | The Kubernetes JWT issuer name. If not set, kubernetes/serviceaccount will use as an issuer. | [optional] |
13
13
  | **name** | **String** | K8S Auth config name | |
14
14
  | **rancher_api_key** | **String** | The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only) | [optional] |
15
15
  | **rancher_cluster_id** | **String** | The cluster id as define in rancher (relevant for \"rancher\" only) | [optional] |
16
- | **signing_key** | **String** | The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth | |
16
+ | **signing_key** | **String** | The private key (base64 encoded) associated with the public key defined in the Kubernetes auth | |
17
17
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
18
18
  | **token_exp** | **Integer** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional][default to 300] |
19
19
  | **token_reviewer_jwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] |
@@ -4,10 +4,11 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **host** | **String** | Host | [optional] |
7
+ | **host** | **String** | Deprecated: has no effect | [optional] |
8
8
  | **name** | **String** | Producer Name | |
9
+ | **revoke_all** | **Boolean** | Revoke All Temp Creds | [optional] |
9
10
  | **soft_delete** | **Boolean** | Soft Delete | [optional] |
10
- | **tmp_creds_id** | **String** | Tmp Creds ID | |
11
+ | **tmp_creds_id** | **String** | Tmp Creds ID | [default to 'demo_default_tmp_creds_id_for_sdk_bc'] |
11
12
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
12
13
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
13
14
 
@@ -19,6 +20,7 @@ require 'akeyless'
19
20
  instance = Akeyless::GatewayRevokeTmpUsers.new(
20
21
  host: null,
21
22
  name: null,
23
+ revoke_all: null,
22
24
  soft_delete: null,
23
25
  tmp_creds_id: null,
24
26
  token: null,
@@ -7,14 +7,14 @@
7
7
  | **access_id** | **String** | The access ID of the Kubernetes auth method | |
8
8
  | **cluster_api_type** | **String** | Cluster access type. options: [native_k8s, rancher] | [optional][default to 'native_k8s'] |
9
9
  | **config_encryption_key_name** | **String** | Config encryption key | [optional] |
10
- | **k8s_ca_cert** | **String** | The CA Cert (in PEM format) to use to call into the kubernetes API server | [optional] |
10
+ | **k8s_ca_cert** | **String** | The CA Certificate (base64 encoded) to use to call into the kubernetes API server | [optional] |
11
11
  | **k8s_host** | **String** | The URL of the kubernetes API server | |
12
12
  | **k8s_issuer** | **String** | The Kubernetes JWT issuer name. If not set, kubernetes/serviceaccount will use as an issuer. | [optional] |
13
13
  | **name** | **String** | K8S Auth config name | |
14
14
  | **new_name** | **String** | K8S Auth config new name | |
15
15
  | **rancher_api_key** | **String** | The api key used to access the TokenReview API to validate other JWTs (relevant for \"rancher\" only) | [optional] |
16
16
  | **rancher_cluster_id** | **String** | The cluster id as define in rancher (relevant for \"rancher\" only) | [optional] |
17
- | **signing_key** | **String** | The private key (in base64 encoded of the PEM format) associated with the public key defined in the Kubernetes auth | |
17
+ | **signing_key** | **String** | The private key (base64 encoded) associated with the public key defined in the Kubernetes auth | |
18
18
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
19
19
  | **token_exp** | **Integer** | Time in seconds of expiration of the Akeyless Kube Auth Method token | [optional][default to 300] |
20
20
  | **token_reviewer_jwt** | **String** | A Kubernetes service account JWT used to access the TokenReview API to validate other JWTs (relevant for \"native_k8s\" only). If not set, the JWT submitted in the authentication process will be used to access the Kubernetes TokenReview API. | [optional] |
@@ -10,11 +10,11 @@
10
10
  | **group_attr** | **String** | Group Attr | [optional] |
11
11
  | **group_dn** | **String** | Group Dn | [optional] |
12
12
  | **group_filter** | **String** | Group Filter | [optional] |
13
- | **ldap_ca_cert** | **String** | The CA Cert (in PEM format) to use to call into the ldap API server | [optional] |
13
+ | **ldap_ca_cert** | **String** | LDAP CA Certificate (base64 encoded) | [optional] |
14
14
  | **ldap_enable** | **String** | Enable Ldap | [optional] |
15
15
  | **ldap_url** | **String** | LDAP Server URL, e.g. ldap://planetexpress.com:389 | [optional] |
16
16
  | **ldap_anonymous_search** | **Boolean** | Ldap Anonymous Search | [optional] |
17
- | **signing_key_data** | **String** | The private key (in PEM format) associated with the public key defined in the Ldap auth | [optional] |
17
+ | **signing_key_data** | **String** | The private key (base64 encoded), associated with the public key defined in the Ldap auth | [optional] |
18
18
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
19
19
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
20
20
  | **user_attribute** | **String** | User Attribute | [optional] |
data/docs/Item.md CHANGED
@@ -32,6 +32,7 @@
32
32
  | **protection_key_type** | **String** | | [optional] |
33
33
  | **public_value** | **String** | | [optional] |
34
34
  | **rotation_interval** | **Integer** | | [optional] |
35
+ | **shared_by** | [**RuleAssigner**](RuleAssigner.md) | | [optional] |
35
36
  | **target_versions** | [**Array<TargetItemVersion>**](TargetItemVersion.md) | | [optional] |
36
37
  | **with_customer_fragment** | **Boolean** | | [optional] |
37
38
 
@@ -69,6 +70,7 @@ instance = Akeyless::Item.new(
69
70
  protection_key_type: null,
70
71
  public_value: null,
71
72
  rotation_interval: null,
73
+ shared_by: null,
72
74
  target_versions: null,
73
75
  with_customer_fragment: null
74
76
  )
@@ -9,6 +9,7 @@
9
9
  | **bound_namespaces** | **Array<String>** | A list of namespaces that the authentication is restricted to. | [optional] |
10
10
  | **bound_pod_names** | **Array<String>** | A list of pods names that the authentication is restricted to. | [optional] |
11
11
  | **bound_service_account_names** | **Array<String>** | A list of service account names that the authentication is restricted to. | [optional] |
12
+ | **gen_key_pair** | **String** | Generate public/private key (the private key is required for the K8S Auth Config in the Akeyless Gateway) | [optional] |
12
13
  | **pub_key** | **String** | The public key value of the Kubernetes auth method configuration in the Akeyless Gateway. | [optional] |
13
14
 
14
15
  ## Example
@@ -22,6 +23,7 @@ instance = Akeyless::KubernetesAccessRules.new(
22
23
  bound_namespaces: null,
23
24
  bound_pod_names: null,
24
25
  bound_service_account_names: null,
26
+ gen_key_pair: null,
25
27
  pub_key: null
26
28
  )
27
29
  ```
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | | [optional] |
8
+ | **gen_key_pair** | **String** | Generate public/private key (the private key is required for the LDAP Auth Config in the Akeyless Gateway) | [optional] |
8
9
  | **key** | **String** | The public key value of LDAP. | [optional] |
9
10
  | **unique_identifier** | **String** | A unique identifier to distinguish different users | [optional] |
10
11
 
@@ -15,6 +16,7 @@ require 'akeyless'
15
16
 
16
17
  instance = Akeyless::LDAPAccessRules.new(
17
18
  alg: null,
19
+ gen_key_pair: null,
18
20
  key: null,
19
21
  unique_identifier: null
20
22
  )
@@ -0,0 +1,20 @@
1
+ # Akeyless::RuleAssigner
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **access_id** | **String** | | [optional] |
8
+ | **unique_id** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::RuleAssigner.new(
16
+ access_id: null,
17
+ unique_id: null
18
+ )
19
+ ```
20
+
@@ -15,10 +15,15 @@
15
15
  | **jwt_ttl_max** | **Integer** | Maximum ttl | [optional] |
16
16
  | **jwt_ttl_min** | **Integer** | Minimum ttl | [optional] |
17
17
  | **max_versions** | **String** | Max versions | [optional] |
18
+ | **password_length** | **Integer** | For PasswordPolicy use | [optional] |
18
19
  | **phone** | **String** | Phone number | [optional] |
19
20
  | **postal_code** | **String** | Postal code | [optional] |
20
21
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
22
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
23
+ | **use_lower_letters** | **String** | For PasswordPolicy use | [optional] |
24
+ | **use_numbers** | **String** | For PasswordPolicy use | [optional] |
25
+ | **use_special_characters** | **String** | For PasswordPolicy use | [optional] |
26
+ | **use_capital_letters** | **String** | For PasswordPolicy use | [optional] |
22
27
 
23
28
  ## Example
24
29
 
@@ -37,10 +42,15 @@ instance = Akeyless::UpdateAccountSettings.new(
37
42
  jwt_ttl_max: null,
38
43
  jwt_ttl_min: null,
39
44
  max_versions: null,
45
+ password_length: null,
40
46
  phone: null,
41
47
  postal_code: null,
42
48
  token: null,
43
- uid_token: null
49
+ uid_token: null,
50
+ use_lower_letters: null,
51
+ use_numbers: null,
52
+ use_special_characters: null,
53
+ use_capital_letters: null
44
54
  )
45
55
  ```
46
56
 
@@ -11,12 +11,12 @@
11
11
  | **bound_pod_names** | **Array<String>** | A list of pod names that the access is restricted to | [optional] |
12
12
  | **bound_sa_names** | **Array<String>** | A list of service account names that the access is restricted to | [optional] |
13
13
  | **force_sub_claims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] |
14
- | **gen_key** | **String** | If this flag is set to true, there is no need to manually provide a public key for the Kubernetes Auth Method, and instead, a key pair, will be generated as part of the command and the private part of the key will be returned (the private key is required for the K8S Auth Config in the Akeyless Gateway) | [optional][default to 'true'] |
14
+ | **gen_key** | **String** | Automatically generate key-pair for K8S configuration. If set to false, a public key needs to be provided | [optional] |
15
15
  | **gw_bound_ips** | **Array<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
16
16
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional] |
17
17
  | **name** | **String** | Auth Method name | |
18
18
  | **new_name** | **String** | Auth Method new name | [optional] |
19
- | **public_key** | **String** | Base64-encoded public key text for K8S authentication method is required [RSA2048] | [optional] |
19
+ | **public_key** | **String** | Base64-encoded or PEM formatted public key data for K8S authentication method is required [RSA2048] | [optional] |
20
20
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
21
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
22
22
 
@@ -7,11 +7,12 @@
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
8
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
9
9
  | **force_sub_claims** | **Boolean** | if true: enforce role-association must include sub claims | [optional] |
10
+ | **gen_key** | **String** | Automatically generate key-pair for LDAP configuration. If set to false, a public key needs to be provided | [optional] |
10
11
  | **gw_bound_ips** | **Array<String>** | A CIDR whitelist with the GW IPs that the access is restricted to | [optional] |
11
12
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional] |
12
13
  | **name** | **String** | Auth Method name | |
13
14
  | **new_name** | **String** | Auth Method new name | [optional] |
14
- | **public_key_data** | **String** | A public key generated for LDAP authentication method on Akeyless in base64 format [RSA2048] | [optional] |
15
+ | **public_key_data** | **String** | A public key generated for LDAP authentication method on Akeyless in base64 or PEM format [RSA2048] | [optional] |
15
16
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
16
17
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
17
18
  | **unique_identifier** | **String** | A unique identifier (ID) value should be configured for OAuth2, LDAP and SAML authentication method types and is usually a value such as the email, username, or upn for example. Whenever a user logs in with a token, these authentication types issue a \"sub claim\" that contains details uniquely identifying that user. This sub claim includes a key containing the ID value that you configured, and is used to distinguish between different users from within the same organization. | [optional] |
@@ -25,6 +26,7 @@ instance = Akeyless::UpdateAuthMethodLDAP.new(
25
26
  access_expires: null,
26
27
  bound_ips: null,
27
28
  force_sub_claims: null,
29
+ gen_key: null,
28
30
  gw_bound_ips: null,
29
31
  jwt_ttl: null,
30
32
  name: null,
@@ -0,0 +1,18 @@
1
+ # Akeyless::UpdateAuthMethodLDAPOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **prv_key** | **String** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::UpdateAuthMethodLDAPOutput.new(
15
+ prv_key: null
16
+ )
17
+ ```
18
+
data/docs/V2Api.md CHANGED
@@ -65,7 +65,6 @@ All URIs are relative to *https://api.akeyless.io*
65
65
  | [**describe_sub_claims**](V2Api.md#describe_sub_claims) | **POST** /describe-sub-claims | |
66
66
  | [**detokenize**](V2Api.md#detokenize) | **POST** /detokenize | |
67
67
  | [**encrypt**](V2Api.md#encrypt) | **POST** /encrypt | |
68
- | [**encrypt_pkcs1**](V2Api.md#encrypt_pkcs1) | **POST** /encrypt-pkcs1 | |
69
68
  | [**encrypt_with_classic_key**](V2Api.md#encrypt_with_classic_key) | **POST** /encrypt-with-classic-key | |
70
69
  | [**gateway_create_k8_s_auth_config**](V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config | |
71
70
  | [**gateway_create_migration**](V2Api.md#gateway_create_migration) | **POST** /gateway-create-migration | |
@@ -4022,68 +4021,6 @@ No authorization required
4022
4021
  - **Accept**: application/json
4023
4022
 
4024
4023
 
4025
- ## encrypt_pkcs1
4026
-
4027
- > <EncryptPKCS1Output> encrypt_pkcs1(body)
4028
-
4029
-
4030
-
4031
- ### Examples
4032
-
4033
- ```ruby
4034
- require 'time'
4035
- require 'akeyless'
4036
-
4037
- api_instance = Akeyless::V2Api.new
4038
- body = Akeyless::EncryptPKCS1.new({key_name: 'key_name_example', plaintext: 'plaintext_example'}) # EncryptPKCS1 |
4039
-
4040
- begin
4041
-
4042
- result = api_instance.encrypt_pkcs1(body)
4043
- p result
4044
- rescue Akeyless::ApiError => e
4045
- puts "Error when calling V2Api->encrypt_pkcs1: #{e}"
4046
- end
4047
- ```
4048
-
4049
- #### Using the encrypt_pkcs1_with_http_info variant
4050
-
4051
- This returns an Array which contains the response data, status code and headers.
4052
-
4053
- > <Array(<EncryptPKCS1Output>, Integer, Hash)> encrypt_pkcs1_with_http_info(body)
4054
-
4055
- ```ruby
4056
- begin
4057
-
4058
- data, status_code, headers = api_instance.encrypt_pkcs1_with_http_info(body)
4059
- p status_code # => 2xx
4060
- p headers # => { ... }
4061
- p data # => <EncryptPKCS1Output>
4062
- rescue Akeyless::ApiError => e
4063
- puts "Error when calling V2Api->encrypt_pkcs1_with_http_info: #{e}"
4064
- end
4065
- ```
4066
-
4067
- ### Parameters
4068
-
4069
- | Name | Type | Description | Notes |
4070
- | ---- | ---- | ----------- | ----- |
4071
- | **body** | [**EncryptPKCS1**](EncryptPKCS1.md) | | |
4072
-
4073
- ### Return type
4074
-
4075
- [**EncryptPKCS1Output**](EncryptPKCS1Output.md)
4076
-
4077
- ### Authorization
4078
-
4079
- No authorization required
4080
-
4081
- ### HTTP request headers
4082
-
4083
- - **Content-Type**: application/json
4084
- - **Accept**: application/json
4085
-
4086
-
4087
4024
  ## encrypt_with_classic_key
4088
4025
 
4089
4026
  > <EncryptOutput> encrypt_with_classic_key(body)
@@ -12294,7 +12231,7 @@ No authorization required
12294
12231
 
12295
12232
  ## update_auth_method_ldap
12296
12233
 
12297
- > Object update_auth_method_ldap(body)
12234
+ > <UpdateAuthMethodLDAPOutput> update_auth_method_ldap(body)
12298
12235
 
12299
12236
 
12300
12237
 
@@ -12320,7 +12257,7 @@ end
12320
12257
 
12321
12258
  This returns an Array which contains the response data, status code and headers.
12322
12259
 
12323
- > <Array(Object, Integer, Hash)> update_auth_method_ldap_with_http_info(body)
12260
+ > <Array(<UpdateAuthMethodLDAPOutput>, Integer, Hash)> update_auth_method_ldap_with_http_info(body)
12324
12261
 
12325
12262
  ```ruby
12326
12263
  begin
@@ -12328,7 +12265,7 @@ begin
12328
12265
  data, status_code, headers = api_instance.update_auth_method_ldap_with_http_info(body)
12329
12266
  p status_code # => 2xx
12330
12267
  p headers # => { ... }
12331
- p data # => Object
12268
+ p data # => <UpdateAuthMethodLDAPOutput>
12332
12269
  rescue Akeyless::ApiError => e
12333
12270
  puts "Error when calling V2Api->update_auth_method_ldap_with_http_info: #{e}"
12334
12271
  end
@@ -12342,7 +12279,7 @@ end
12342
12279
 
12343
12280
  ### Return type
12344
12281
 
12345
- **Object**
12282
+ [**UpdateAuthMethodLDAPOutput**](UpdateAuthMethodLDAPOutput.md)
12346
12283
 
12347
12284
  ### Authorization
12348
12285
 
@@ -3923,70 +3923,6 @@ module Akeyless
3923
3923
  return data, status_code, headers
3924
3924
  end
3925
3925
 
3926
- # @param body [EncryptPKCS1]
3927
- # @param [Hash] opts the optional parameters
3928
- # @return [EncryptPKCS1Output]
3929
- def encrypt_pkcs1(body, opts = {})
3930
- data, _status_code, _headers = encrypt_pkcs1_with_http_info(body, opts)
3931
- data
3932
- end
3933
-
3934
- # @param body [EncryptPKCS1]
3935
- # @param [Hash] opts the optional parameters
3936
- # @return [Array<(EncryptPKCS1Output, Integer, Hash)>] EncryptPKCS1Output data, response status code and response headers
3937
- def encrypt_pkcs1_with_http_info(body, opts = {})
3938
- if @api_client.config.debugging
3939
- @api_client.config.logger.debug 'Calling API: V2Api.encrypt_pkcs1 ...'
3940
- end
3941
- # verify the required parameter 'body' is set
3942
- if @api_client.config.client_side_validation && body.nil?
3943
- fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.encrypt_pkcs1"
3944
- end
3945
- # resource path
3946
- local_var_path = '/encrypt-pkcs1'
3947
-
3948
- # query parameters
3949
- query_params = opts[:query_params] || {}
3950
-
3951
- # header parameters
3952
- header_params = opts[:header_params] || {}
3953
- # HTTP header 'Accept' (if needed)
3954
- header_params['Accept'] = @api_client.select_header_accept(['application/json'])
3955
- # HTTP header 'Content-Type'
3956
- content_type = @api_client.select_header_content_type(['application/json'])
3957
- if !content_type.nil?
3958
- header_params['Content-Type'] = content_type
3959
- end
3960
-
3961
- # form parameters
3962
- form_params = opts[:form_params] || {}
3963
-
3964
- # http body (model)
3965
- post_body = opts[:debug_body] || @api_client.object_to_http_body(body)
3966
-
3967
- # return_type
3968
- return_type = opts[:debug_return_type] || 'EncryptPKCS1Output'
3969
-
3970
- # auth_names
3971
- auth_names = opts[:debug_auth_names] || []
3972
-
3973
- new_options = opts.merge(
3974
- :operation => :"V2Api.encrypt_pkcs1",
3975
- :header_params => header_params,
3976
- :query_params => query_params,
3977
- :form_params => form_params,
3978
- :body => post_body,
3979
- :auth_names => auth_names,
3980
- :return_type => return_type
3981
- )
3982
-
3983
- data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options)
3984
- if @api_client.config.debugging
3985
- @api_client.config.logger.debug "API called: V2Api#encrypt_pkcs1\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
3986
- end
3987
- return data, status_code, headers
3988
- end
3989
-
3990
3926
  # @param body [EncryptWithClassicKey]
3991
3927
  # @param [Hash] opts the optional parameters
3992
3928
  # @return [EncryptOutput]
@@ -12351,7 +12287,7 @@ module Akeyless
12351
12287
 
12352
12288
  # @param body [UpdateAuthMethodLDAP]
12353
12289
  # @param [Hash] opts the optional parameters
12354
- # @return [Object]
12290
+ # @return [UpdateAuthMethodLDAPOutput]
12355
12291
  def update_auth_method_ldap(body, opts = {})
12356
12292
  data, _status_code, _headers = update_auth_method_ldap_with_http_info(body, opts)
12357
12293
  data
@@ -12359,7 +12295,7 @@ module Akeyless
12359
12295
 
12360
12296
  # @param body [UpdateAuthMethodLDAP]
12361
12297
  # @param [Hash] opts the optional parameters
12362
- # @return [Array<(Object, Integer, Hash)>] Object data, response status code and response headers
12298
+ # @return [Array<(UpdateAuthMethodLDAPOutput, Integer, Hash)>] UpdateAuthMethodLDAPOutput data, response status code and response headers
12363
12299
  def update_auth_method_ldap_with_http_info(body, opts = {})
12364
12300
  if @api_client.config.debugging
12365
12301
  @api_client.config.logger.debug 'Calling API: V2Api.update_auth_method_ldap ...'
@@ -12391,7 +12327,7 @@ module Akeyless
12391
12327
  post_body = opts[:debug_body] || @api_client.object_to_http_body(body)
12392
12328
 
12393
12329
  # return_type
12394
- return_type = opts[:debug_return_type] || 'Object'
12330
+ return_type = opts[:debug_return_type] || 'UpdateAuthMethodLDAPOutput'
12395
12331
 
12396
12332
  # auth_names
12397
12333
  auth_names = opts[:debug_auth_names] || []