akeyless 3.3.4 → 3.3.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +12 -1
- data/docs/CertificateTemplateInfo.md +32 -0
- data/docs/CreateClassicKey.md +16 -0
- data/docs/CreateDFCKey.md +16 -0
- data/docs/CreateKey.md +16 -0
- data/docs/DSProducerDetails.md +8 -2
- data/docs/DeriveKey.md +40 -0
- data/docs/DeriveKeyOutput.md +20 -0
- data/docs/EventAction.md +26 -0
- data/docs/GatewayCreateProducerCertificateAutomation.md +6 -4
- data/docs/GatewayUpdateProducerCertificateAutomation.md +6 -4
- data/docs/ItemGeneralInfo.md +2 -0
- data/docs/SignDataWithClassicKey.md +34 -0
- data/docs/SignOutput.md +18 -0
- data/docs/TargetTypeDetailsInput.md +8 -2
- data/docs/V2Api.md +252 -0
- data/docs/VerifyDataWithClassicKey.md +36 -0
- data/lib/akeyless/api/v2_api.rb +256 -0
- data/lib/akeyless/models/certificate_template_info.rb +282 -0
- data/lib/akeyless/models/create_classic_key.rb +81 -1
- data/lib/akeyless/models/create_dfc_key.rb +81 -1
- data/lib/akeyless/models/create_key.rb +81 -1
- data/lib/akeyless/models/derive_key.rb +362 -0
- data/lib/akeyless/models/derive_key_output.rb +228 -0
- data/lib/akeyless/models/ds_producer_details.rb +30 -1
- data/lib/akeyless/models/event_action.rb +272 -0
- data/lib/akeyless/models/gateway_create_producer_certificate_automation.rb +30 -18
- data/lib/akeyless/models/gateway_update_producer_certificate_automation.rb +30 -18
- data/lib/akeyless/models/item_general_info.rb +10 -1
- data/lib/akeyless/models/sign_data_with_classic_key.rb +326 -0
- data/lib/akeyless/models/sign_output.rb +219 -0
- data/lib/akeyless/models/target_type_details_input.rb +30 -1
- data/lib/akeyless/models/verify_data_with_classic_key.rb +336 -0
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +7 -0
- data/spec/models/certificate_template_info_spec.rb +76 -0
- data/spec/models/derive_key_output_spec.rb +40 -0
- data/spec/models/derive_key_spec.rb +100 -0
- data/spec/models/event_action_spec.rb +58 -0
- data/spec/models/sign_data_with_classic_key_spec.rb +82 -0
- data/spec/models/sign_output_spec.rb +34 -0
- data/spec/models/verify_data_with_classic_key_spec.rb +88 -0
- metadata +30 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 88435183182fc3482de93ad9a0f830797cc67e9e5aafab2909890be007eb81ca
|
4
|
+
data.tar.gz: 4e1f05ab93344023684491d185b1cc9c125d5a2dde0720a21a29a18062e6e9d6
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1269021f5a1fce9f3c10242bd2f022049b7e5f5fc00e8eb7d7eb37f2c5b3098abd6d8e75be443d87c0de588ff248f527d70b0d06dc724fb48b1a2999f0c9d0b9
|
7
|
+
data.tar.gz: 311419f0df3fadbc54bcf2fcd80b182e62af1cf331824cc6b8390851d2d4698b42dc9c5f0db061f17d98ddb780f9d7e38db7481b12207d73bfc4f6b7674df89e
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 2.0
|
10
|
-
- Package version: 3.3.
|
10
|
+
- Package version: 3.3.6
|
11
11
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
12
12
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
13
13
|
|
@@ -127,6 +127,7 @@ Class | Method | HTTP request | Description
|
|
127
127
|
*Akeyless::V2Api* | [**delete_target**](docs/V2Api.md#delete_target) | **POST** /delete-target |
|
128
128
|
*Akeyless::V2Api* | [**delete_target_association**](docs/V2Api.md#delete_target_association) | **POST** /delete-assoc-target-item |
|
129
129
|
*Akeyless::V2Api* | [**delete_targets**](docs/V2Api.md#delete_targets) | **POST** /delete-targets |
|
130
|
+
*Akeyless::V2Api* | [**derive_key**](docs/V2Api.md#derive_key) | **POST** /derive-key |
|
130
131
|
*Akeyless::V2Api* | [**describe_assoc**](docs/V2Api.md#describe_assoc) | **POST** /describe-role-am-assoc |
|
131
132
|
*Akeyless::V2Api* | [**describe_item**](docs/V2Api.md#describe_item) | **POST** /describe-item |
|
132
133
|
*Akeyless::V2Api* | [**describe_permissions**](docs/V2Api.md#describe_permissions) | **POST** /describe-permissions |
|
@@ -140,6 +141,7 @@ Class | Method | HTTP request | Description
|
|
140
141
|
*Akeyless::V2Api* | [**esm_get**](docs/V2Api.md#esm_get) | **POST** /esm-get |
|
141
142
|
*Akeyless::V2Api* | [**esm_list**](docs/V2Api.md#esm_list) | **POST** /esm-list |
|
142
143
|
*Akeyless::V2Api* | [**esm_update**](docs/V2Api.md#esm_update) | **POST** /esm-update |
|
144
|
+
*Akeyless::V2Api* | [**event_action**](docs/V2Api.md#event_action) | **POST** /event-action |
|
143
145
|
*Akeyless::V2Api* | [**export_classic_key**](docs/V2Api.md#export_classic_key) | **POST** /export-classic-key |
|
144
146
|
*Akeyless::V2Api* | [**gateway_create_k8_s_auth_config**](docs/V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config |
|
145
147
|
*Akeyless::V2Api* | [**gateway_create_migration**](docs/V2Api.md#gateway_create_migration) | **POST** /gateway-create-migration |
|
@@ -268,6 +270,7 @@ Class | Method | HTTP request | Description
|
|
268
270
|
*Akeyless::V2Api* | [**set_item_state**](docs/V2Api.md#set_item_state) | **POST** /set-item-state |
|
269
271
|
*Akeyless::V2Api* | [**set_role_rule**](docs/V2Api.md#set_role_rule) | **POST** /set-role-rule |
|
270
272
|
*Akeyless::V2Api* | [**share_item**](docs/V2Api.md#share_item) | **POST** /share-item |
|
273
|
+
*Akeyless::V2Api* | [**sign_data_with_classic_key**](docs/V2Api.md#sign_data_with_classic_key) | **POST** /sign-data-with-classic-key |
|
271
274
|
*Akeyless::V2Api* | [**sign_gpg**](docs/V2Api.md#sign_gpg) | **POST** /sign-gpg |
|
272
275
|
*Akeyless::V2Api* | [**sign_jwt_with_classic_key**](docs/V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key |
|
273
276
|
*Akeyless::V2Api* | [**sign_pkcs1**](docs/V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 |
|
@@ -332,6 +335,7 @@ Class | Method | HTTP request | Description
|
|
332
335
|
*Akeyless::V2Api* | [**update_zero_ssl_target**](docs/V2Api.md#update_zero_ssl_target) | **POST** /update-zerossl-target |
|
333
336
|
*Akeyless::V2Api* | [**upload_rsa**](docs/V2Api.md#upload_rsa) | **POST** /upload-rsa |
|
334
337
|
*Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
|
338
|
+
*Akeyless::V2Api* | [**verify_data_with_classic_key**](docs/V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key |
|
335
339
|
*Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
|
336
340
|
*Akeyless::V2Api* | [**verify_jwt_with_classic_key**](docs/V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key |
|
337
341
|
*Akeyless::V2Api* | [**verify_pkcs1**](docs/V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 |
|
@@ -378,6 +382,7 @@ Class | Method | HTTP request | Description
|
|
378
382
|
- [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
|
379
383
|
- [Akeyless::CertificateInfo](docs/CertificateInfo.md)
|
380
384
|
- [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
|
385
|
+
- [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
|
381
386
|
- [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
|
382
387
|
- [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
|
383
388
|
- [Akeyless::ClassicKeyTargetInfo](docs/ClassicKeyTargetInfo.md)
|
@@ -513,6 +518,8 @@ Class | Method | HTTP request | Description
|
|
513
518
|
- [Akeyless::DeleteTarget](docs/DeleteTarget.md)
|
514
519
|
- [Akeyless::DeleteTargetAssociation](docs/DeleteTargetAssociation.md)
|
515
520
|
- [Akeyless::DeleteTargets](docs/DeleteTargets.md)
|
521
|
+
- [Akeyless::DeriveKey](docs/DeriveKey.md)
|
522
|
+
- [Akeyless::DeriveKeyOutput](docs/DeriveKeyOutput.md)
|
516
523
|
- [Akeyless::DescribeAssoc](docs/DescribeAssoc.md)
|
517
524
|
- [Akeyless::DescribeItem](docs/DescribeItem.md)
|
518
525
|
- [Akeyless::DescribePermissions](docs/DescribePermissions.md)
|
@@ -543,6 +550,7 @@ Class | Method | HTTP request | Description
|
|
543
550
|
- [Akeyless::EsmListSecretsOutput](docs/EsmListSecretsOutput.md)
|
544
551
|
- [Akeyless::EsmUpdate](docs/EsmUpdate.md)
|
545
552
|
- [Akeyless::EsmUpdateSecretOutput](docs/EsmUpdateSecretOutput.md)
|
553
|
+
- [Akeyless::EventAction](docs/EventAction.md)
|
546
554
|
- [Akeyless::ExportClassicKey](docs/ExportClassicKey.md)
|
547
555
|
- [Akeyless::ExportClassicKeyOutput](docs/ExportClassicKeyOutput.md)
|
548
556
|
- [Akeyless::Extension](docs/Extension.md)
|
@@ -856,10 +864,12 @@ Class | Method | HTTP request | Description
|
|
856
864
|
- [Akeyless::SetRoleRule](docs/SetRoleRule.md)
|
857
865
|
- [Akeyless::ShareItem](docs/ShareItem.md)
|
858
866
|
- [Akeyless::SharingPolicyInfo](docs/SharingPolicyInfo.md)
|
867
|
+
- [Akeyless::SignDataWithClassicKey](docs/SignDataWithClassicKey.md)
|
859
868
|
- [Akeyless::SignGPG](docs/SignGPG.md)
|
860
869
|
- [Akeyless::SignGPGOutput](docs/SignGPGOutput.md)
|
861
870
|
- [Akeyless::SignJWTOutput](docs/SignJWTOutput.md)
|
862
871
|
- [Akeyless::SignJWTWithClassicKey](docs/SignJWTWithClassicKey.md)
|
872
|
+
- [Akeyless::SignOutput](docs/SignOutput.md)
|
863
873
|
- [Akeyless::SignPKCS1](docs/SignPKCS1.md)
|
864
874
|
- [Akeyless::SignPKCS1Output](docs/SignPKCS1Output.md)
|
865
875
|
- [Akeyless::SignPKICertOutput](docs/SignPKICertOutput.md)
|
@@ -981,6 +991,7 @@ Class | Method | HTTP request | Description
|
|
981
991
|
- [Akeyless::ValidateToken](docs/ValidateToken.md)
|
982
992
|
- [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
|
983
993
|
- [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
|
994
|
+
- [Akeyless::VerifyDataWithClassicKey](docs/VerifyDataWithClassicKey.md)
|
984
995
|
- [Akeyless::VerifyGPG](docs/VerifyGPG.md)
|
985
996
|
- [Akeyless::VerifyJWTOutput](docs/VerifyJWTOutput.md)
|
986
997
|
- [Akeyless::VerifyJWTWithClassicKey](docs/VerifyJWTWithClassicKey.md)
|
@@ -0,0 +1,32 @@
|
|
1
|
+
# Akeyless::CertificateTemplateInfo
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **common_name** | **String** | | [optional] |
|
8
|
+
| **country** | **String** | | [optional] |
|
9
|
+
| **digest_algo** | **String** | | [optional] |
|
10
|
+
| **locality** | **String** | | [optional] |
|
11
|
+
| **organization** | **String** | | [optional] |
|
12
|
+
| **province** | **String** | | [optional] |
|
13
|
+
| **self_signed_enabled** | **Boolean** | | [optional] |
|
14
|
+
| **ttl** | **Integer** | | [optional] |
|
15
|
+
|
16
|
+
## Example
|
17
|
+
|
18
|
+
```ruby
|
19
|
+
require 'akeyless'
|
20
|
+
|
21
|
+
instance = Akeyless::CertificateTemplateInfo.new(
|
22
|
+
common_name: null,
|
23
|
+
country: null,
|
24
|
+
digest_algo: null,
|
25
|
+
locality: null,
|
26
|
+
organization: null,
|
27
|
+
province: null,
|
28
|
+
self_signed_enabled: null,
|
29
|
+
ttl: null
|
30
|
+
)
|
31
|
+
```
|
32
|
+
|
data/docs/CreateClassicKey.md
CHANGED
@@ -6,8 +6,16 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] | |
|
8
8
|
| **cert_file_data** | **String** | Certificate in a PEM format. | [optional] |
|
9
|
+
| **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
10
|
+
| **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
11
|
+
| **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
|
12
|
+
| **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
13
|
+
| **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
14
|
+
| **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
15
|
+
| **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
|
9
16
|
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
10
17
|
| **description** | **String** | Description of the object | [optional] |
|
18
|
+
| **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
|
11
19
|
| **gpg_alg** | **String** | gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519] | [optional] |
|
12
20
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
13
21
|
| **key_data** | **String** | Base64-encoded classic key value | [optional] |
|
@@ -26,8 +34,16 @@ require 'akeyless'
|
|
26
34
|
instance = Akeyless::CreateClassicKey.new(
|
27
35
|
alg: null,
|
28
36
|
cert_file_data: null,
|
37
|
+
certificate_common_name: null,
|
38
|
+
certificate_country: null,
|
39
|
+
certificate_digest_algo: null,
|
40
|
+
certificate_locality: null,
|
41
|
+
certificate_organization: null,
|
42
|
+
certificate_province: null,
|
43
|
+
certificate_ttl: null,
|
29
44
|
delete_protection: null,
|
30
45
|
description: null,
|
46
|
+
generate_self_signed_certificate: null,
|
31
47
|
gpg_alg: null,
|
32
48
|
json: null,
|
33
49
|
key_data: null,
|
data/docs/CreateDFCKey.md
CHANGED
@@ -5,9 +5,17 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **alg** | **String** | DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
|
8
|
+
| **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
9
|
+
| **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
10
|
+
| **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
|
11
|
+
| **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
12
|
+
| **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
13
|
+
| **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
14
|
+
| **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
|
8
15
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
9
16
|
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
10
17
|
| **description** | **String** | Description of the object | [optional] |
|
18
|
+
| **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
|
11
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
20
|
| **metadata** | **String** | Deprecated - use description | [optional] |
|
13
21
|
| **name** | **String** | DFCKey name | |
|
@@ -23,9 +31,17 @@ require 'akeyless'
|
|
23
31
|
|
24
32
|
instance = Akeyless::CreateDFCKey.new(
|
25
33
|
alg: null,
|
34
|
+
certificate_common_name: null,
|
35
|
+
certificate_country: null,
|
36
|
+
certificate_digest_algo: null,
|
37
|
+
certificate_locality: null,
|
38
|
+
certificate_organization: null,
|
39
|
+
certificate_province: null,
|
40
|
+
certificate_ttl: null,
|
26
41
|
customer_frg_id: null,
|
27
42
|
delete_protection: null,
|
28
43
|
description: null,
|
44
|
+
generate_self_signed_certificate: null,
|
29
45
|
json: null,
|
30
46
|
metadata: null,
|
31
47
|
name: null,
|
data/docs/CreateKey.md
CHANGED
@@ -5,9 +5,17 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **alg** | **String** | Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
|
8
|
+
| **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
9
|
+
| **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
10
|
+
| **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
|
11
|
+
| **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
12
|
+
| **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
13
|
+
| **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
14
|
+
| **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
|
8
15
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to create the key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
9
16
|
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
10
17
|
| **description** | **String** | Description of the object | [optional] |
|
18
|
+
| **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
|
11
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
20
|
| **metadata** | **String** | Deprecated - use description | [optional] |
|
13
21
|
| **name** | **String** | Key name | |
|
@@ -23,9 +31,17 @@ require 'akeyless'
|
|
23
31
|
|
24
32
|
instance = Akeyless::CreateKey.new(
|
25
33
|
alg: null,
|
34
|
+
certificate_common_name: null,
|
35
|
+
certificate_country: null,
|
36
|
+
certificate_digest_algo: null,
|
37
|
+
certificate_locality: null,
|
38
|
+
certificate_organization: null,
|
39
|
+
certificate_province: null,
|
40
|
+
certificate_ttl: null,
|
26
41
|
customer_frg_id: null,
|
27
42
|
delete_protection: null,
|
28
43
|
description: null,
|
44
|
+
generate_self_signed_certificate: null,
|
29
45
|
json: null,
|
30
46
|
metadata: null,
|
31
47
|
name: null,
|
data/docs/DSProducerDetails.md
CHANGED
@@ -204,8 +204,11 @@
|
|
204
204
|
| **venafi_sign_using_akeyless_pki** | **Boolean** | | [optional] |
|
205
205
|
| **venafi_signer_key_name** | **String** | | [optional] |
|
206
206
|
| **venafi_store_private_key** | **Boolean** | | [optional] |
|
207
|
-
| **
|
208
|
-
| **
|
207
|
+
| **venafi_tpp_access_token** | **String** | | [optional] |
|
208
|
+
| **venafi_tpp_client_id** | **String** | | [optional] |
|
209
|
+
| **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
210
|
+
| **venafi_tpp_refresh_token** | **String** | | [optional] |
|
211
|
+
| **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
209
212
|
| **venafi_use_tpp** | **Boolean** | | [optional] |
|
210
213
|
| **venafi_zone** | **String** | | [optional] |
|
211
214
|
| **warn_before_user_expiration_min** | **Integer** | | [optional] |
|
@@ -416,7 +419,10 @@ instance = Akeyless::DSProducerDetails.new(
|
|
416
419
|
venafi_sign_using_akeyless_pki: null,
|
417
420
|
venafi_signer_key_name: null,
|
418
421
|
venafi_store_private_key: null,
|
422
|
+
venafi_tpp_access_token: null,
|
423
|
+
venafi_tpp_client_id: null,
|
419
424
|
venafi_tpp_password: null,
|
425
|
+
venafi_tpp_refresh_token: null,
|
420
426
|
venafi_tpp_username: null,
|
421
427
|
venafi_use_tpp: null,
|
422
428
|
venafi_zone: null,
|
data/docs/DeriveKey.md
ADDED
@@ -0,0 +1,40 @@
|
|
1
|
+
# Akeyless::DeriveKey
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
|
8
|
+
| **alg** | **String** | Kdf algorithm | [default to 'pbkdf2'] |
|
9
|
+
| **hash_function** | **String** | HashFunction the hash function to use (relevant for pbkdf2) | [optional][default to 'sha256'] |
|
10
|
+
| **iter** | **Integer** | IterationCount the number of iterations | |
|
11
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
|
+
| **key_len** | **Integer** | KeyLength the byte length of the generated key | |
|
13
|
+
| **mem** | **Integer** | MemorySizeInKb the memory paramter in kb (relevant for argon2id) | [optional][default to 16384] |
|
14
|
+
| **name** | **String** | Static Secret full name | |
|
15
|
+
| **parallelism** | **Integer** | Parallelism the number of threads to use (relevant for argon2id) | [optional][default to 1] |
|
16
|
+
| **salt** | **String** | Salt Base64 encoded salt value. If not provided, the salt will be generated as part of the operation. The salt should be securely-generated random bytes, minimum 64 bits, 128 bits is recommended | [optional] |
|
17
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
18
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
19
|
+
|
20
|
+
## Example
|
21
|
+
|
22
|
+
```ruby
|
23
|
+
require 'akeyless'
|
24
|
+
|
25
|
+
instance = Akeyless::DeriveKey.new(
|
26
|
+
accessibility: null,
|
27
|
+
alg: null,
|
28
|
+
hash_function: null,
|
29
|
+
iter: null,
|
30
|
+
json: null,
|
31
|
+
key_len: null,
|
32
|
+
mem: null,
|
33
|
+
name: null,
|
34
|
+
parallelism: null,
|
35
|
+
salt: null,
|
36
|
+
token: null,
|
37
|
+
uid_token: null
|
38
|
+
)
|
39
|
+
```
|
40
|
+
|
@@ -0,0 +1,20 @@
|
|
1
|
+
# Akeyless::DeriveKeyOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **key** | **String** | | [optional] |
|
8
|
+
| **salt** | **String** | | [optional] |
|
9
|
+
|
10
|
+
## Example
|
11
|
+
|
12
|
+
```ruby
|
13
|
+
require 'akeyless'
|
14
|
+
|
15
|
+
instance = Akeyless::DeriveKeyOutput.new(
|
16
|
+
key: null,
|
17
|
+
salt: null
|
18
|
+
)
|
19
|
+
```
|
20
|
+
|
data/docs/EventAction.md
ADDED
@@ -0,0 +1,26 @@
|
|
1
|
+
# Akeyless::EventAction
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **action** | **String** | The Event Action [approve/deny] | |
|
8
|
+
| **event_id** | **Integer** | The Event ID | |
|
9
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
10
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
11
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
12
|
+
|
13
|
+
## Example
|
14
|
+
|
15
|
+
```ruby
|
16
|
+
require 'akeyless'
|
17
|
+
|
18
|
+
instance = Akeyless::EventAction.new(
|
19
|
+
action: null,
|
20
|
+
event_id: null,
|
21
|
+
json: null,
|
22
|
+
token: null,
|
23
|
+
uid_token: null
|
24
|
+
)
|
25
|
+
```
|
26
|
+
|
@@ -22,11 +22,12 @@
|
|
22
22
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
23
23
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
24
24
|
| **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
|
25
|
+
| **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
|
25
26
|
| **venafi_api_key** | **String** | Venafi API key | [optional] |
|
26
27
|
| **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
|
27
|
-
| **
|
28
|
+
| **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
|
29
|
+
| **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
|
28
30
|
| **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
|
29
|
-
| **venafi_username** | **String** | Venafi Username | [optional] |
|
30
31
|
| **venafi_zone** | **String** | Venafi Zone | [optional] |
|
31
32
|
|
32
33
|
## Example
|
@@ -53,11 +54,12 @@ instance = Akeyless::GatewayCreateProducerCertificateAutomation.new(
|
|
53
54
|
token: null,
|
54
55
|
uid_token: null,
|
55
56
|
user_ttl: null,
|
57
|
+
venafi_access_token: null,
|
56
58
|
venafi_api_key: null,
|
57
59
|
venafi_baseurl: null,
|
58
|
-
|
60
|
+
venafi_client_id: null,
|
61
|
+
venafi_refresh_token: null,
|
59
62
|
venafi_use_tpp: null,
|
60
|
-
venafi_username: null,
|
61
63
|
venafi_zone: null
|
62
64
|
)
|
63
65
|
```
|
@@ -23,11 +23,12 @@
|
|
23
23
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
24
24
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
25
25
|
| **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
|
26
|
+
| **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
|
26
27
|
| **venafi_api_key** | **String** | Venafi API key | [optional] |
|
27
28
|
| **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
|
28
|
-
| **
|
29
|
+
| **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
|
30
|
+
| **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
|
29
31
|
| **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
|
30
|
-
| **venafi_username** | **String** | Venafi Username | [optional] |
|
31
32
|
| **venafi_zone** | **String** | Venafi Zone | [optional] |
|
32
33
|
|
33
34
|
## Example
|
@@ -55,11 +56,12 @@ instance = Akeyless::GatewayUpdateProducerCertificateAutomation.new(
|
|
55
56
|
token: null,
|
56
57
|
uid_token: null,
|
57
58
|
user_ttl: null,
|
59
|
+
venafi_access_token: null,
|
58
60
|
venafi_api_key: null,
|
59
61
|
venafi_baseurl: null,
|
60
|
-
|
62
|
+
venafi_client_id: null,
|
63
|
+
venafi_refresh_token: null,
|
61
64
|
venafi_use_tpp: null,
|
62
|
-
venafi_username: null,
|
63
65
|
venafi_zone: null
|
64
66
|
)
|
65
67
|
```
|
data/docs/ItemGeneralInfo.md
CHANGED
@@ -6,6 +6,7 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **cert_issue_details** | [**CertificateIssueInfo**](CertificateIssueInfo.md) | | [optional] |
|
8
8
|
| **certificate_chain_info** | [**CertificateChainInfo**](CertificateChainInfo.md) | | [optional] |
|
9
|
+
| **certificates_template_info** | [**CertificateTemplateInfo**](CertificateTemplateInfo.md) | | [optional] |
|
9
10
|
| **classic_key_details** | [**ClassicKeyDetailsInfo**](ClassicKeyDetailsInfo.md) | | [optional] |
|
10
11
|
| **cluster_gw_url** | **String** | | [optional] |
|
11
12
|
| **display_metadata** | **String** | | [optional] |
|
@@ -25,6 +26,7 @@ require 'akeyless'
|
|
25
26
|
instance = Akeyless::ItemGeneralInfo.new(
|
26
27
|
cert_issue_details: null,
|
27
28
|
certificate_chain_info: null,
|
29
|
+
certificates_template_info: null,
|
28
30
|
classic_key_details: null,
|
29
31
|
cluster_gw_url: null,
|
30
32
|
display_metadata: null,
|
@@ -0,0 +1,34 @@
|
|
1
|
+
# Akeyless::SignDataWithClassicKey
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **data** | **String** | Data | |
|
8
|
+
| **display_id** | **String** | The name of the key to use in the sign data process | |
|
9
|
+
| **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
|
10
|
+
| **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
|
11
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
|
+
| **name** | **String** | ClassicKey name | |
|
13
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
15
|
+
| **version** | **Integer** | classic key version | |
|
16
|
+
|
17
|
+
## Example
|
18
|
+
|
19
|
+
```ruby
|
20
|
+
require 'akeyless'
|
21
|
+
|
22
|
+
instance = Akeyless::SignDataWithClassicKey.new(
|
23
|
+
data: null,
|
24
|
+
display_id: null,
|
25
|
+
hashed: null,
|
26
|
+
hashing_method: null,
|
27
|
+
json: null,
|
28
|
+
name: null,
|
29
|
+
token: null,
|
30
|
+
uid_token: null,
|
31
|
+
version: null
|
32
|
+
)
|
33
|
+
```
|
34
|
+
|
data/docs/SignOutput.md
ADDED
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::SignOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::SignOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -119,8 +119,11 @@
|
|
119
119
|
| **validation_email** | **String** | | [optional] |
|
120
120
|
| **venafi_api_key** | **String** | | [optional] |
|
121
121
|
| **venafi_base_url** | **String** | | [optional] |
|
122
|
-
| **
|
123
|
-
| **
|
122
|
+
| **venafi_tpp_access_token** | **String** | | [optional] |
|
123
|
+
| **venafi_tpp_client_id** | **String** | | [optional] |
|
124
|
+
| **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
125
|
+
| **venafi_tpp_refresh_token** | **String** | | [optional] |
|
126
|
+
| **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
124
127
|
| **venafi_use_tpp** | **Boolean** | | [optional] |
|
125
128
|
| **venafi_zone** | **String** | | [optional] |
|
126
129
|
|
@@ -245,7 +248,10 @@ instance = Akeyless::TargetTypeDetailsInput.new(
|
|
245
248
|
validation_email: null,
|
246
249
|
venafi_api_key: null,
|
247
250
|
venafi_base_url: null,
|
251
|
+
venafi_tpp_access_token: null,
|
252
|
+
venafi_tpp_client_id: null,
|
248
253
|
venafi_tpp_password: null,
|
254
|
+
venafi_tpp_refresh_token: null,
|
249
255
|
venafi_tpp_username: null,
|
250
256
|
venafi_use_tpp: null,
|
251
257
|
venafi_zone: null
|