akeyless 3.3.4 → 3.3.6

Sign up to get free protection for your applications and to get access to all the features.
Files changed (44) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +12 -1
  3. data/docs/CertificateTemplateInfo.md +32 -0
  4. data/docs/CreateClassicKey.md +16 -0
  5. data/docs/CreateDFCKey.md +16 -0
  6. data/docs/CreateKey.md +16 -0
  7. data/docs/DSProducerDetails.md +8 -2
  8. data/docs/DeriveKey.md +40 -0
  9. data/docs/DeriveKeyOutput.md +20 -0
  10. data/docs/EventAction.md +26 -0
  11. data/docs/GatewayCreateProducerCertificateAutomation.md +6 -4
  12. data/docs/GatewayUpdateProducerCertificateAutomation.md +6 -4
  13. data/docs/ItemGeneralInfo.md +2 -0
  14. data/docs/SignDataWithClassicKey.md +34 -0
  15. data/docs/SignOutput.md +18 -0
  16. data/docs/TargetTypeDetailsInput.md +8 -2
  17. data/docs/V2Api.md +252 -0
  18. data/docs/VerifyDataWithClassicKey.md +36 -0
  19. data/lib/akeyless/api/v2_api.rb +256 -0
  20. data/lib/akeyless/models/certificate_template_info.rb +282 -0
  21. data/lib/akeyless/models/create_classic_key.rb +81 -1
  22. data/lib/akeyless/models/create_dfc_key.rb +81 -1
  23. data/lib/akeyless/models/create_key.rb +81 -1
  24. data/lib/akeyless/models/derive_key.rb +362 -0
  25. data/lib/akeyless/models/derive_key_output.rb +228 -0
  26. data/lib/akeyless/models/ds_producer_details.rb +30 -1
  27. data/lib/akeyless/models/event_action.rb +272 -0
  28. data/lib/akeyless/models/gateway_create_producer_certificate_automation.rb +30 -18
  29. data/lib/akeyless/models/gateway_update_producer_certificate_automation.rb +30 -18
  30. data/lib/akeyless/models/item_general_info.rb +10 -1
  31. data/lib/akeyless/models/sign_data_with_classic_key.rb +326 -0
  32. data/lib/akeyless/models/sign_output.rb +219 -0
  33. data/lib/akeyless/models/target_type_details_input.rb +30 -1
  34. data/lib/akeyless/models/verify_data_with_classic_key.rb +336 -0
  35. data/lib/akeyless/version.rb +1 -1
  36. data/lib/akeyless.rb +7 -0
  37. data/spec/models/certificate_template_info_spec.rb +76 -0
  38. data/spec/models/derive_key_output_spec.rb +40 -0
  39. data/spec/models/derive_key_spec.rb +100 -0
  40. data/spec/models/event_action_spec.rb +58 -0
  41. data/spec/models/sign_data_with_classic_key_spec.rb +82 -0
  42. data/spec/models/sign_output_spec.rb +34 -0
  43. data/spec/models/verify_data_with_classic_key_spec.rb +88 -0
  44. metadata +30 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 920f52397018c1336358e7d6b44c77930f6a419d13eee2d76df9e3f635de3774
4
- data.tar.gz: 42ff2f4429c05dcf67ff23d6ace11fd519fca5e862ce0e50fa6466bcdceaa2a7
3
+ metadata.gz: 88435183182fc3482de93ad9a0f830797cc67e9e5aafab2909890be007eb81ca
4
+ data.tar.gz: 4e1f05ab93344023684491d185b1cc9c125d5a2dde0720a21a29a18062e6e9d6
5
5
  SHA512:
6
- metadata.gz: d24d6583e081dc686afc1dc3eb30555e6b5e2a598062e4b9858e5ad4666eec024d572544b248852bc7bbdf89c1e7b53fe10a49656f71202a941e8c85073c3921
7
- data.tar.gz: 559ffc70203fe20538e7112291aaee93911d96572157ba6f53881d49721c6a69d206ea182d76dbf9b86e161f39bd6afbe00a48deea7b7f0d99cd2a3207407490
6
+ metadata.gz: 1269021f5a1fce9f3c10242bd2f022049b7e5f5fc00e8eb7d7eb37f2c5b3098abd6d8e75be443d87c0de588ff248f527d70b0d06dc724fb48b1a2999f0c9d0b9
7
+ data.tar.gz: 311419f0df3fadbc54bcf2fcd80b182e62af1cf331824cc6b8390851d2d4698b42dc9c5f0db061f17d98ddb780f9d7e38db7481b12207d73bfc4f6b7674df89e
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.4
10
+ - Package version: 3.3.6
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -127,6 +127,7 @@ Class | Method | HTTP request | Description
127
127
  *Akeyless::V2Api* | [**delete_target**](docs/V2Api.md#delete_target) | **POST** /delete-target |
128
128
  *Akeyless::V2Api* | [**delete_target_association**](docs/V2Api.md#delete_target_association) | **POST** /delete-assoc-target-item |
129
129
  *Akeyless::V2Api* | [**delete_targets**](docs/V2Api.md#delete_targets) | **POST** /delete-targets |
130
+ *Akeyless::V2Api* | [**derive_key**](docs/V2Api.md#derive_key) | **POST** /derive-key |
130
131
  *Akeyless::V2Api* | [**describe_assoc**](docs/V2Api.md#describe_assoc) | **POST** /describe-role-am-assoc |
131
132
  *Akeyless::V2Api* | [**describe_item**](docs/V2Api.md#describe_item) | **POST** /describe-item |
132
133
  *Akeyless::V2Api* | [**describe_permissions**](docs/V2Api.md#describe_permissions) | **POST** /describe-permissions |
@@ -140,6 +141,7 @@ Class | Method | HTTP request | Description
140
141
  *Akeyless::V2Api* | [**esm_get**](docs/V2Api.md#esm_get) | **POST** /esm-get |
141
142
  *Akeyless::V2Api* | [**esm_list**](docs/V2Api.md#esm_list) | **POST** /esm-list |
142
143
  *Akeyless::V2Api* | [**esm_update**](docs/V2Api.md#esm_update) | **POST** /esm-update |
144
+ *Akeyless::V2Api* | [**event_action**](docs/V2Api.md#event_action) | **POST** /event-action |
143
145
  *Akeyless::V2Api* | [**export_classic_key**](docs/V2Api.md#export_classic_key) | **POST** /export-classic-key |
144
146
  *Akeyless::V2Api* | [**gateway_create_k8_s_auth_config**](docs/V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config |
145
147
  *Akeyless::V2Api* | [**gateway_create_migration**](docs/V2Api.md#gateway_create_migration) | **POST** /gateway-create-migration |
@@ -268,6 +270,7 @@ Class | Method | HTTP request | Description
268
270
  *Akeyless::V2Api* | [**set_item_state**](docs/V2Api.md#set_item_state) | **POST** /set-item-state |
269
271
  *Akeyless::V2Api* | [**set_role_rule**](docs/V2Api.md#set_role_rule) | **POST** /set-role-rule |
270
272
  *Akeyless::V2Api* | [**share_item**](docs/V2Api.md#share_item) | **POST** /share-item |
273
+ *Akeyless::V2Api* | [**sign_data_with_classic_key**](docs/V2Api.md#sign_data_with_classic_key) | **POST** /sign-data-with-classic-key |
271
274
  *Akeyless::V2Api* | [**sign_gpg**](docs/V2Api.md#sign_gpg) | **POST** /sign-gpg |
272
275
  *Akeyless::V2Api* | [**sign_jwt_with_classic_key**](docs/V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key |
273
276
  *Akeyless::V2Api* | [**sign_pkcs1**](docs/V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 |
@@ -332,6 +335,7 @@ Class | Method | HTTP request | Description
332
335
  *Akeyless::V2Api* | [**update_zero_ssl_target**](docs/V2Api.md#update_zero_ssl_target) | **POST** /update-zerossl-target |
333
336
  *Akeyless::V2Api* | [**upload_rsa**](docs/V2Api.md#upload_rsa) | **POST** /upload-rsa |
334
337
  *Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
338
+ *Akeyless::V2Api* | [**verify_data_with_classic_key**](docs/V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key |
335
339
  *Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
336
340
  *Akeyless::V2Api* | [**verify_jwt_with_classic_key**](docs/V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key |
337
341
  *Akeyless::V2Api* | [**verify_pkcs1**](docs/V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 |
@@ -378,6 +382,7 @@ Class | Method | HTTP request | Description
378
382
  - [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
379
383
  - [Akeyless::CertificateInfo](docs/CertificateInfo.md)
380
384
  - [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
385
+ - [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
381
386
  - [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
382
387
  - [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
383
388
  - [Akeyless::ClassicKeyTargetInfo](docs/ClassicKeyTargetInfo.md)
@@ -513,6 +518,8 @@ Class | Method | HTTP request | Description
513
518
  - [Akeyless::DeleteTarget](docs/DeleteTarget.md)
514
519
  - [Akeyless::DeleteTargetAssociation](docs/DeleteTargetAssociation.md)
515
520
  - [Akeyless::DeleteTargets](docs/DeleteTargets.md)
521
+ - [Akeyless::DeriveKey](docs/DeriveKey.md)
522
+ - [Akeyless::DeriveKeyOutput](docs/DeriveKeyOutput.md)
516
523
  - [Akeyless::DescribeAssoc](docs/DescribeAssoc.md)
517
524
  - [Akeyless::DescribeItem](docs/DescribeItem.md)
518
525
  - [Akeyless::DescribePermissions](docs/DescribePermissions.md)
@@ -543,6 +550,7 @@ Class | Method | HTTP request | Description
543
550
  - [Akeyless::EsmListSecretsOutput](docs/EsmListSecretsOutput.md)
544
551
  - [Akeyless::EsmUpdate](docs/EsmUpdate.md)
545
552
  - [Akeyless::EsmUpdateSecretOutput](docs/EsmUpdateSecretOutput.md)
553
+ - [Akeyless::EventAction](docs/EventAction.md)
546
554
  - [Akeyless::ExportClassicKey](docs/ExportClassicKey.md)
547
555
  - [Akeyless::ExportClassicKeyOutput](docs/ExportClassicKeyOutput.md)
548
556
  - [Akeyless::Extension](docs/Extension.md)
@@ -856,10 +864,12 @@ Class | Method | HTTP request | Description
856
864
  - [Akeyless::SetRoleRule](docs/SetRoleRule.md)
857
865
  - [Akeyless::ShareItem](docs/ShareItem.md)
858
866
  - [Akeyless::SharingPolicyInfo](docs/SharingPolicyInfo.md)
867
+ - [Akeyless::SignDataWithClassicKey](docs/SignDataWithClassicKey.md)
859
868
  - [Akeyless::SignGPG](docs/SignGPG.md)
860
869
  - [Akeyless::SignGPGOutput](docs/SignGPGOutput.md)
861
870
  - [Akeyless::SignJWTOutput](docs/SignJWTOutput.md)
862
871
  - [Akeyless::SignJWTWithClassicKey](docs/SignJWTWithClassicKey.md)
872
+ - [Akeyless::SignOutput](docs/SignOutput.md)
863
873
  - [Akeyless::SignPKCS1](docs/SignPKCS1.md)
864
874
  - [Akeyless::SignPKCS1Output](docs/SignPKCS1Output.md)
865
875
  - [Akeyless::SignPKICertOutput](docs/SignPKICertOutput.md)
@@ -981,6 +991,7 @@ Class | Method | HTTP request | Description
981
991
  - [Akeyless::ValidateToken](docs/ValidateToken.md)
982
992
  - [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
983
993
  - [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
994
+ - [Akeyless::VerifyDataWithClassicKey](docs/VerifyDataWithClassicKey.md)
984
995
  - [Akeyless::VerifyGPG](docs/VerifyGPG.md)
985
996
  - [Akeyless::VerifyJWTOutput](docs/VerifyJWTOutput.md)
986
997
  - [Akeyless::VerifyJWTWithClassicKey](docs/VerifyJWTWithClassicKey.md)
@@ -0,0 +1,32 @@
1
+ # Akeyless::CertificateTemplateInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **common_name** | **String** | | [optional] |
8
+ | **country** | **String** | | [optional] |
9
+ | **digest_algo** | **String** | | [optional] |
10
+ | **locality** | **String** | | [optional] |
11
+ | **organization** | **String** | | [optional] |
12
+ | **province** | **String** | | [optional] |
13
+ | **self_signed_enabled** | **Boolean** | | [optional] |
14
+ | **ttl** | **Integer** | | [optional] |
15
+
16
+ ## Example
17
+
18
+ ```ruby
19
+ require 'akeyless'
20
+
21
+ instance = Akeyless::CertificateTemplateInfo.new(
22
+ common_name: null,
23
+ country: null,
24
+ digest_algo: null,
25
+ locality: null,
26
+ organization: null,
27
+ province: null,
28
+ self_signed_enabled: null,
29
+ ttl: null
30
+ )
31
+ ```
32
+
@@ -6,8 +6,16 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] | |
8
8
  | **cert_file_data** | **String** | Certificate in a PEM format. | [optional] |
9
+ | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
10
+ | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
11
+ | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
12
+ | **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
13
+ | **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
14
+ | **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
15
+ | **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
9
16
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
17
  | **description** | **String** | Description of the object | [optional] |
18
+ | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
11
19
  | **gpg_alg** | **String** | gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519] | [optional] |
12
20
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
13
21
  | **key_data** | **String** | Base64-encoded classic key value | [optional] |
@@ -26,8 +34,16 @@ require 'akeyless'
26
34
  instance = Akeyless::CreateClassicKey.new(
27
35
  alg: null,
28
36
  cert_file_data: null,
37
+ certificate_common_name: null,
38
+ certificate_country: null,
39
+ certificate_digest_algo: null,
40
+ certificate_locality: null,
41
+ certificate_organization: null,
42
+ certificate_province: null,
43
+ certificate_ttl: null,
29
44
  delete_protection: null,
30
45
  description: null,
46
+ generate_self_signed_certificate: null,
31
47
  gpg_alg: null,
32
48
  json: null,
33
49
  key_data: null,
data/docs/CreateDFCKey.md CHANGED
@@ -5,9 +5,17 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
8
+ | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
9
+ | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
10
+ | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
11
+ | **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
12
+ | **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
13
+ | **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
14
+ | **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
8
15
  | **customer_frg_id** | **String** | The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment) | [optional] |
9
16
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
17
  | **description** | **String** | Description of the object | [optional] |
18
+ | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
11
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
20
  | **metadata** | **String** | Deprecated - use description | [optional] |
13
21
  | **name** | **String** | DFCKey name | |
@@ -23,9 +31,17 @@ require 'akeyless'
23
31
 
24
32
  instance = Akeyless::CreateDFCKey.new(
25
33
  alg: null,
34
+ certificate_common_name: null,
35
+ certificate_country: null,
36
+ certificate_digest_algo: null,
37
+ certificate_locality: null,
38
+ certificate_organization: null,
39
+ certificate_province: null,
40
+ certificate_ttl: null,
26
41
  customer_frg_id: null,
27
42
  delete_protection: null,
28
43
  description: null,
44
+ generate_self_signed_certificate: null,
29
45
  json: null,
30
46
  metadata: null,
31
47
  name: null,
data/docs/CreateKey.md CHANGED
@@ -5,9 +5,17 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
8
+ | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
9
+ | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
10
+ | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
11
+ | **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
12
+ | **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
13
+ | **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
14
+ | **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
8
15
  | **customer_frg_id** | **String** | The customer fragment ID that will be used to create the key (if empty, the key will be created independently of a customer fragment) | [optional] |
9
16
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
17
  | **description** | **String** | Description of the object | [optional] |
18
+ | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
11
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
20
  | **metadata** | **String** | Deprecated - use description | [optional] |
13
21
  | **name** | **String** | Key name | |
@@ -23,9 +31,17 @@ require 'akeyless'
23
31
 
24
32
  instance = Akeyless::CreateKey.new(
25
33
  alg: null,
34
+ certificate_common_name: null,
35
+ certificate_country: null,
36
+ certificate_digest_algo: null,
37
+ certificate_locality: null,
38
+ certificate_organization: null,
39
+ certificate_province: null,
40
+ certificate_ttl: null,
26
41
  customer_frg_id: null,
27
42
  delete_protection: null,
28
43
  description: null,
44
+ generate_self_signed_certificate: null,
29
45
  json: null,
30
46
  metadata: null,
31
47
  name: null,
@@ -204,8 +204,11 @@
204
204
  | **venafi_sign_using_akeyless_pki** | **Boolean** | | [optional] |
205
205
  | **venafi_signer_key_name** | **String** | | [optional] |
206
206
  | **venafi_store_private_key** | **Boolean** | | [optional] |
207
- | **venafi_tpp_password** | **String** | | [optional] |
208
- | **venafi_tpp_username** | **String** | | [optional] |
207
+ | **venafi_tpp_access_token** | **String** | | [optional] |
208
+ | **venafi_tpp_client_id** | **String** | | [optional] |
209
+ | **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
210
+ | **venafi_tpp_refresh_token** | **String** | | [optional] |
211
+ | **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
209
212
  | **venafi_use_tpp** | **Boolean** | | [optional] |
210
213
  | **venafi_zone** | **String** | | [optional] |
211
214
  | **warn_before_user_expiration_min** | **Integer** | | [optional] |
@@ -416,7 +419,10 @@ instance = Akeyless::DSProducerDetails.new(
416
419
  venafi_sign_using_akeyless_pki: null,
417
420
  venafi_signer_key_name: null,
418
421
  venafi_store_private_key: null,
422
+ venafi_tpp_access_token: null,
423
+ venafi_tpp_client_id: null,
419
424
  venafi_tpp_password: null,
425
+ venafi_tpp_refresh_token: null,
420
426
  venafi_tpp_username: null,
421
427
  venafi_use_tpp: null,
422
428
  venafi_zone: null,
data/docs/DeriveKey.md ADDED
@@ -0,0 +1,40 @@
1
+ # Akeyless::DeriveKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
+ | **alg** | **String** | Kdf algorithm | [default to 'pbkdf2'] |
9
+ | **hash_function** | **String** | HashFunction the hash function to use (relevant for pbkdf2) | [optional][default to 'sha256'] |
10
+ | **iter** | **Integer** | IterationCount the number of iterations | |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **key_len** | **Integer** | KeyLength the byte length of the generated key | |
13
+ | **mem** | **Integer** | MemorySizeInKb the memory paramter in kb (relevant for argon2id) | [optional][default to 16384] |
14
+ | **name** | **String** | Static Secret full name | |
15
+ | **parallelism** | **Integer** | Parallelism the number of threads to use (relevant for argon2id) | [optional][default to 1] |
16
+ | **salt** | **String** | Salt Base64 encoded salt value. If not provided, the salt will be generated as part of the operation. The salt should be securely-generated random bytes, minimum 64 bits, 128 bits is recommended | [optional] |
17
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
18
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
+
20
+ ## Example
21
+
22
+ ```ruby
23
+ require 'akeyless'
24
+
25
+ instance = Akeyless::DeriveKey.new(
26
+ accessibility: null,
27
+ alg: null,
28
+ hash_function: null,
29
+ iter: null,
30
+ json: null,
31
+ key_len: null,
32
+ mem: null,
33
+ name: null,
34
+ parallelism: null,
35
+ salt: null,
36
+ token: null,
37
+ uid_token: null
38
+ )
39
+ ```
40
+
@@ -0,0 +1,20 @@
1
+ # Akeyless::DeriveKeyOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **key** | **String** | | [optional] |
8
+ | **salt** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::DeriveKeyOutput.new(
16
+ key: null,
17
+ salt: null
18
+ )
19
+ ```
20
+
@@ -0,0 +1,26 @@
1
+ # Akeyless::EventAction
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **action** | **String** | The Event Action [approve/deny] | |
8
+ | **event_id** | **Integer** | The Event ID | |
9
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
11
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::EventAction.new(
19
+ action: null,
20
+ event_id: null,
21
+ json: null,
22
+ token: null,
23
+ uid_token: null
24
+ )
25
+ ```
26
+
@@ -22,11 +22,12 @@
22
22
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
23
23
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
24
24
  | **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
25
+ | **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
25
26
  | **venafi_api_key** | **String** | Venafi API key | [optional] |
26
27
  | **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
27
- | **venafi_password** | **String** | Venafi Password | [optional] |
28
+ | **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
29
+ | **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
28
30
  | **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
29
- | **venafi_username** | **String** | Venafi Username | [optional] |
30
31
  | **venafi_zone** | **String** | Venafi Zone | [optional] |
31
32
 
32
33
  ## Example
@@ -53,11 +54,12 @@ instance = Akeyless::GatewayCreateProducerCertificateAutomation.new(
53
54
  token: null,
54
55
  uid_token: null,
55
56
  user_ttl: null,
57
+ venafi_access_token: null,
56
58
  venafi_api_key: null,
57
59
  venafi_baseurl: null,
58
- venafi_password: null,
60
+ venafi_client_id: null,
61
+ venafi_refresh_token: null,
59
62
  venafi_use_tpp: null,
60
- venafi_username: null,
61
63
  venafi_zone: null
62
64
  )
63
65
  ```
@@ -23,11 +23,12 @@
23
23
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
24
24
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
25
25
  | **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
26
+ | **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
26
27
  | **venafi_api_key** | **String** | Venafi API key | [optional] |
27
28
  | **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
28
- | **venafi_password** | **String** | Venafi Password | [optional] |
29
+ | **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
30
+ | **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
29
31
  | **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
30
- | **venafi_username** | **String** | Venafi Username | [optional] |
31
32
  | **venafi_zone** | **String** | Venafi Zone | [optional] |
32
33
 
33
34
  ## Example
@@ -55,11 +56,12 @@ instance = Akeyless::GatewayUpdateProducerCertificateAutomation.new(
55
56
  token: null,
56
57
  uid_token: null,
57
58
  user_ttl: null,
59
+ venafi_access_token: null,
58
60
  venafi_api_key: null,
59
61
  venafi_baseurl: null,
60
- venafi_password: null,
62
+ venafi_client_id: null,
63
+ venafi_refresh_token: null,
61
64
  venafi_use_tpp: null,
62
- venafi_username: null,
63
65
  venafi_zone: null
64
66
  )
65
67
  ```
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **cert_issue_details** | [**CertificateIssueInfo**](CertificateIssueInfo.md) | | [optional] |
8
8
  | **certificate_chain_info** | [**CertificateChainInfo**](CertificateChainInfo.md) | | [optional] |
9
+ | **certificates_template_info** | [**CertificateTemplateInfo**](CertificateTemplateInfo.md) | | [optional] |
9
10
  | **classic_key_details** | [**ClassicKeyDetailsInfo**](ClassicKeyDetailsInfo.md) | | [optional] |
10
11
  | **cluster_gw_url** | **String** | | [optional] |
11
12
  | **display_metadata** | **String** | | [optional] |
@@ -25,6 +26,7 @@ require 'akeyless'
25
26
  instance = Akeyless::ItemGeneralInfo.new(
26
27
  cert_issue_details: null,
27
28
  certificate_chain_info: null,
29
+ certificates_template_info: null,
28
30
  classic_key_details: null,
29
31
  cluster_gw_url: null,
30
32
  display_metadata: null,
@@ -0,0 +1,34 @@
1
+ # Akeyless::SignDataWithClassicKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **data** | **String** | Data | |
8
+ | **display_id** | **String** | The name of the key to use in the sign data process | |
9
+ | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
10
+ | **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **name** | **String** | ClassicKey name | |
13
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
14
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
15
+ | **version** | **Integer** | classic key version | |
16
+
17
+ ## Example
18
+
19
+ ```ruby
20
+ require 'akeyless'
21
+
22
+ instance = Akeyless::SignDataWithClassicKey.new(
23
+ data: null,
24
+ display_id: null,
25
+ hashed: null,
26
+ hashing_method: null,
27
+ json: null,
28
+ name: null,
29
+ token: null,
30
+ uid_token: null,
31
+ version: null
32
+ )
33
+ ```
34
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::SignOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **result** | **String** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::SignOutput.new(
15
+ result: null
16
+ )
17
+ ```
18
+
@@ -119,8 +119,11 @@
119
119
  | **validation_email** | **String** | | [optional] |
120
120
  | **venafi_api_key** | **String** | | [optional] |
121
121
  | **venafi_base_url** | **String** | | [optional] |
122
- | **venafi_tpp_password** | **String** | | [optional] |
123
- | **venafi_tpp_username** | **String** | | [optional] |
122
+ | **venafi_tpp_access_token** | **String** | | [optional] |
123
+ | **venafi_tpp_client_id** | **String** | | [optional] |
124
+ | **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
125
+ | **venafi_tpp_refresh_token** | **String** | | [optional] |
126
+ | **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
124
127
  | **venafi_use_tpp** | **Boolean** | | [optional] |
125
128
  | **venafi_zone** | **String** | | [optional] |
126
129
 
@@ -245,7 +248,10 @@ instance = Akeyless::TargetTypeDetailsInput.new(
245
248
  validation_email: null,
246
249
  venafi_api_key: null,
247
250
  venafi_base_url: null,
251
+ venafi_tpp_access_token: null,
252
+ venafi_tpp_client_id: null,
248
253
  venafi_tpp_password: null,
254
+ venafi_tpp_refresh_token: null,
249
255
  venafi_tpp_username: null,
250
256
  venafi_use_tpp: null,
251
257
  venafi_zone: null