akeyless 3.3.4 → 3.3.6
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +12 -1
- data/docs/CertificateTemplateInfo.md +32 -0
- data/docs/CreateClassicKey.md +16 -0
- data/docs/CreateDFCKey.md +16 -0
- data/docs/CreateKey.md +16 -0
- data/docs/DSProducerDetails.md +8 -2
- data/docs/DeriveKey.md +40 -0
- data/docs/DeriveKeyOutput.md +20 -0
- data/docs/EventAction.md +26 -0
- data/docs/GatewayCreateProducerCertificateAutomation.md +6 -4
- data/docs/GatewayUpdateProducerCertificateAutomation.md +6 -4
- data/docs/ItemGeneralInfo.md +2 -0
- data/docs/SignDataWithClassicKey.md +34 -0
- data/docs/SignOutput.md +18 -0
- data/docs/TargetTypeDetailsInput.md +8 -2
- data/docs/V2Api.md +252 -0
- data/docs/VerifyDataWithClassicKey.md +36 -0
- data/lib/akeyless/api/v2_api.rb +256 -0
- data/lib/akeyless/models/certificate_template_info.rb +282 -0
- data/lib/akeyless/models/create_classic_key.rb +81 -1
- data/lib/akeyless/models/create_dfc_key.rb +81 -1
- data/lib/akeyless/models/create_key.rb +81 -1
- data/lib/akeyless/models/derive_key.rb +362 -0
- data/lib/akeyless/models/derive_key_output.rb +228 -0
- data/lib/akeyless/models/ds_producer_details.rb +30 -1
- data/lib/akeyless/models/event_action.rb +272 -0
- data/lib/akeyless/models/gateway_create_producer_certificate_automation.rb +30 -18
- data/lib/akeyless/models/gateway_update_producer_certificate_automation.rb +30 -18
- data/lib/akeyless/models/item_general_info.rb +10 -1
- data/lib/akeyless/models/sign_data_with_classic_key.rb +326 -0
- data/lib/akeyless/models/sign_output.rb +219 -0
- data/lib/akeyless/models/target_type_details_input.rb +30 -1
- data/lib/akeyless/models/verify_data_with_classic_key.rb +336 -0
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +7 -0
- data/spec/models/certificate_template_info_spec.rb +76 -0
- data/spec/models/derive_key_output_spec.rb +40 -0
- data/spec/models/derive_key_spec.rb +100 -0
- data/spec/models/event_action_spec.rb +58 -0
- data/spec/models/sign_data_with_classic_key_spec.rb +82 -0
- data/spec/models/sign_output_spec.rb +34 -0
- data/spec/models/verify_data_with_classic_key_spec.rb +88 -0
- metadata +30 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 88435183182fc3482de93ad9a0f830797cc67e9e5aafab2909890be007eb81ca
|
4
|
+
data.tar.gz: 4e1f05ab93344023684491d185b1cc9c125d5a2dde0720a21a29a18062e6e9d6
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 1269021f5a1fce9f3c10242bd2f022049b7e5f5fc00e8eb7d7eb37f2c5b3098abd6d8e75be443d87c0de588ff248f527d70b0d06dc724fb48b1a2999f0c9d0b9
|
7
|
+
data.tar.gz: 311419f0df3fadbc54bcf2fcd80b182e62af1cf331824cc6b8390851d2d4698b42dc9c5f0db061f17d98ddb780f9d7e38db7481b12207d73bfc4f6b7674df89e
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 2.0
|
10
|
-
- Package version: 3.3.
|
10
|
+
- Package version: 3.3.6
|
11
11
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
12
12
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
13
13
|
|
@@ -127,6 +127,7 @@ Class | Method | HTTP request | Description
|
|
127
127
|
*Akeyless::V2Api* | [**delete_target**](docs/V2Api.md#delete_target) | **POST** /delete-target |
|
128
128
|
*Akeyless::V2Api* | [**delete_target_association**](docs/V2Api.md#delete_target_association) | **POST** /delete-assoc-target-item |
|
129
129
|
*Akeyless::V2Api* | [**delete_targets**](docs/V2Api.md#delete_targets) | **POST** /delete-targets |
|
130
|
+
*Akeyless::V2Api* | [**derive_key**](docs/V2Api.md#derive_key) | **POST** /derive-key |
|
130
131
|
*Akeyless::V2Api* | [**describe_assoc**](docs/V2Api.md#describe_assoc) | **POST** /describe-role-am-assoc |
|
131
132
|
*Akeyless::V2Api* | [**describe_item**](docs/V2Api.md#describe_item) | **POST** /describe-item |
|
132
133
|
*Akeyless::V2Api* | [**describe_permissions**](docs/V2Api.md#describe_permissions) | **POST** /describe-permissions |
|
@@ -140,6 +141,7 @@ Class | Method | HTTP request | Description
|
|
140
141
|
*Akeyless::V2Api* | [**esm_get**](docs/V2Api.md#esm_get) | **POST** /esm-get |
|
141
142
|
*Akeyless::V2Api* | [**esm_list**](docs/V2Api.md#esm_list) | **POST** /esm-list |
|
142
143
|
*Akeyless::V2Api* | [**esm_update**](docs/V2Api.md#esm_update) | **POST** /esm-update |
|
144
|
+
*Akeyless::V2Api* | [**event_action**](docs/V2Api.md#event_action) | **POST** /event-action |
|
143
145
|
*Akeyless::V2Api* | [**export_classic_key**](docs/V2Api.md#export_classic_key) | **POST** /export-classic-key |
|
144
146
|
*Akeyless::V2Api* | [**gateway_create_k8_s_auth_config**](docs/V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config |
|
145
147
|
*Akeyless::V2Api* | [**gateway_create_migration**](docs/V2Api.md#gateway_create_migration) | **POST** /gateway-create-migration |
|
@@ -268,6 +270,7 @@ Class | Method | HTTP request | Description
|
|
268
270
|
*Akeyless::V2Api* | [**set_item_state**](docs/V2Api.md#set_item_state) | **POST** /set-item-state |
|
269
271
|
*Akeyless::V2Api* | [**set_role_rule**](docs/V2Api.md#set_role_rule) | **POST** /set-role-rule |
|
270
272
|
*Akeyless::V2Api* | [**share_item**](docs/V2Api.md#share_item) | **POST** /share-item |
|
273
|
+
*Akeyless::V2Api* | [**sign_data_with_classic_key**](docs/V2Api.md#sign_data_with_classic_key) | **POST** /sign-data-with-classic-key |
|
271
274
|
*Akeyless::V2Api* | [**sign_gpg**](docs/V2Api.md#sign_gpg) | **POST** /sign-gpg |
|
272
275
|
*Akeyless::V2Api* | [**sign_jwt_with_classic_key**](docs/V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key |
|
273
276
|
*Akeyless::V2Api* | [**sign_pkcs1**](docs/V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 |
|
@@ -332,6 +335,7 @@ Class | Method | HTTP request | Description
|
|
332
335
|
*Akeyless::V2Api* | [**update_zero_ssl_target**](docs/V2Api.md#update_zero_ssl_target) | **POST** /update-zerossl-target |
|
333
336
|
*Akeyless::V2Api* | [**upload_rsa**](docs/V2Api.md#upload_rsa) | **POST** /upload-rsa |
|
334
337
|
*Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
|
338
|
+
*Akeyless::V2Api* | [**verify_data_with_classic_key**](docs/V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key |
|
335
339
|
*Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
|
336
340
|
*Akeyless::V2Api* | [**verify_jwt_with_classic_key**](docs/V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key |
|
337
341
|
*Akeyless::V2Api* | [**verify_pkcs1**](docs/V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 |
|
@@ -378,6 +382,7 @@ Class | Method | HTTP request | Description
|
|
378
382
|
- [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
|
379
383
|
- [Akeyless::CertificateInfo](docs/CertificateInfo.md)
|
380
384
|
- [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
|
385
|
+
- [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
|
381
386
|
- [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
|
382
387
|
- [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
|
383
388
|
- [Akeyless::ClassicKeyTargetInfo](docs/ClassicKeyTargetInfo.md)
|
@@ -513,6 +518,8 @@ Class | Method | HTTP request | Description
|
|
513
518
|
- [Akeyless::DeleteTarget](docs/DeleteTarget.md)
|
514
519
|
- [Akeyless::DeleteTargetAssociation](docs/DeleteTargetAssociation.md)
|
515
520
|
- [Akeyless::DeleteTargets](docs/DeleteTargets.md)
|
521
|
+
- [Akeyless::DeriveKey](docs/DeriveKey.md)
|
522
|
+
- [Akeyless::DeriveKeyOutput](docs/DeriveKeyOutput.md)
|
516
523
|
- [Akeyless::DescribeAssoc](docs/DescribeAssoc.md)
|
517
524
|
- [Akeyless::DescribeItem](docs/DescribeItem.md)
|
518
525
|
- [Akeyless::DescribePermissions](docs/DescribePermissions.md)
|
@@ -543,6 +550,7 @@ Class | Method | HTTP request | Description
|
|
543
550
|
- [Akeyless::EsmListSecretsOutput](docs/EsmListSecretsOutput.md)
|
544
551
|
- [Akeyless::EsmUpdate](docs/EsmUpdate.md)
|
545
552
|
- [Akeyless::EsmUpdateSecretOutput](docs/EsmUpdateSecretOutput.md)
|
553
|
+
- [Akeyless::EventAction](docs/EventAction.md)
|
546
554
|
- [Akeyless::ExportClassicKey](docs/ExportClassicKey.md)
|
547
555
|
- [Akeyless::ExportClassicKeyOutput](docs/ExportClassicKeyOutput.md)
|
548
556
|
- [Akeyless::Extension](docs/Extension.md)
|
@@ -856,10 +864,12 @@ Class | Method | HTTP request | Description
|
|
856
864
|
- [Akeyless::SetRoleRule](docs/SetRoleRule.md)
|
857
865
|
- [Akeyless::ShareItem](docs/ShareItem.md)
|
858
866
|
- [Akeyless::SharingPolicyInfo](docs/SharingPolicyInfo.md)
|
867
|
+
- [Akeyless::SignDataWithClassicKey](docs/SignDataWithClassicKey.md)
|
859
868
|
- [Akeyless::SignGPG](docs/SignGPG.md)
|
860
869
|
- [Akeyless::SignGPGOutput](docs/SignGPGOutput.md)
|
861
870
|
- [Akeyless::SignJWTOutput](docs/SignJWTOutput.md)
|
862
871
|
- [Akeyless::SignJWTWithClassicKey](docs/SignJWTWithClassicKey.md)
|
872
|
+
- [Akeyless::SignOutput](docs/SignOutput.md)
|
863
873
|
- [Akeyless::SignPKCS1](docs/SignPKCS1.md)
|
864
874
|
- [Akeyless::SignPKCS1Output](docs/SignPKCS1Output.md)
|
865
875
|
- [Akeyless::SignPKICertOutput](docs/SignPKICertOutput.md)
|
@@ -981,6 +991,7 @@ Class | Method | HTTP request | Description
|
|
981
991
|
- [Akeyless::ValidateToken](docs/ValidateToken.md)
|
982
992
|
- [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
|
983
993
|
- [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
|
994
|
+
- [Akeyless::VerifyDataWithClassicKey](docs/VerifyDataWithClassicKey.md)
|
984
995
|
- [Akeyless::VerifyGPG](docs/VerifyGPG.md)
|
985
996
|
- [Akeyless::VerifyJWTOutput](docs/VerifyJWTOutput.md)
|
986
997
|
- [Akeyless::VerifyJWTWithClassicKey](docs/VerifyJWTWithClassicKey.md)
|
@@ -0,0 +1,32 @@
|
|
1
|
+
# Akeyless::CertificateTemplateInfo
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **common_name** | **String** | | [optional] |
|
8
|
+
| **country** | **String** | | [optional] |
|
9
|
+
| **digest_algo** | **String** | | [optional] |
|
10
|
+
| **locality** | **String** | | [optional] |
|
11
|
+
| **organization** | **String** | | [optional] |
|
12
|
+
| **province** | **String** | | [optional] |
|
13
|
+
| **self_signed_enabled** | **Boolean** | | [optional] |
|
14
|
+
| **ttl** | **Integer** | | [optional] |
|
15
|
+
|
16
|
+
## Example
|
17
|
+
|
18
|
+
```ruby
|
19
|
+
require 'akeyless'
|
20
|
+
|
21
|
+
instance = Akeyless::CertificateTemplateInfo.new(
|
22
|
+
common_name: null,
|
23
|
+
country: null,
|
24
|
+
digest_algo: null,
|
25
|
+
locality: null,
|
26
|
+
organization: null,
|
27
|
+
province: null,
|
28
|
+
self_signed_enabled: null,
|
29
|
+
ttl: null
|
30
|
+
)
|
31
|
+
```
|
32
|
+
|
data/docs/CreateClassicKey.md
CHANGED
@@ -6,8 +6,16 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] | |
|
8
8
|
| **cert_file_data** | **String** | Certificate in a PEM format. | [optional] |
|
9
|
+
| **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
10
|
+
| **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
11
|
+
| **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
|
12
|
+
| **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
13
|
+
| **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
14
|
+
| **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
15
|
+
| **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
|
9
16
|
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
10
17
|
| **description** | **String** | Description of the object | [optional] |
|
18
|
+
| **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
|
11
19
|
| **gpg_alg** | **String** | gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519] | [optional] |
|
12
20
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
13
21
|
| **key_data** | **String** | Base64-encoded classic key value | [optional] |
|
@@ -26,8 +34,16 @@ require 'akeyless'
|
|
26
34
|
instance = Akeyless::CreateClassicKey.new(
|
27
35
|
alg: null,
|
28
36
|
cert_file_data: null,
|
37
|
+
certificate_common_name: null,
|
38
|
+
certificate_country: null,
|
39
|
+
certificate_digest_algo: null,
|
40
|
+
certificate_locality: null,
|
41
|
+
certificate_organization: null,
|
42
|
+
certificate_province: null,
|
43
|
+
certificate_ttl: null,
|
29
44
|
delete_protection: null,
|
30
45
|
description: null,
|
46
|
+
generate_self_signed_certificate: null,
|
31
47
|
gpg_alg: null,
|
32
48
|
json: null,
|
33
49
|
key_data: null,
|
data/docs/CreateDFCKey.md
CHANGED
@@ -5,9 +5,17 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **alg** | **String** | DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
|
8
|
+
| **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
9
|
+
| **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
10
|
+
| **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
|
11
|
+
| **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
12
|
+
| **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
13
|
+
| **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
14
|
+
| **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
|
8
15
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
9
16
|
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
10
17
|
| **description** | **String** | Description of the object | [optional] |
|
18
|
+
| **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
|
11
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
20
|
| **metadata** | **String** | Deprecated - use description | [optional] |
|
13
21
|
| **name** | **String** | DFCKey name | |
|
@@ -23,9 +31,17 @@ require 'akeyless'
|
|
23
31
|
|
24
32
|
instance = Akeyless::CreateDFCKey.new(
|
25
33
|
alg: null,
|
34
|
+
certificate_common_name: null,
|
35
|
+
certificate_country: null,
|
36
|
+
certificate_digest_algo: null,
|
37
|
+
certificate_locality: null,
|
38
|
+
certificate_organization: null,
|
39
|
+
certificate_province: null,
|
40
|
+
certificate_ttl: null,
|
26
41
|
customer_frg_id: null,
|
27
42
|
delete_protection: null,
|
28
43
|
description: null,
|
44
|
+
generate_self_signed_certificate: null,
|
29
45
|
json: null,
|
30
46
|
metadata: null,
|
31
47
|
name: null,
|
data/docs/CreateKey.md
CHANGED
@@ -5,9 +5,17 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **alg** | **String** | Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
|
8
|
+
| **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
9
|
+
| **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
10
|
+
| **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
|
11
|
+
| **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
12
|
+
| **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
13
|
+
| **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
|
14
|
+
| **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
|
8
15
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to create the key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
9
16
|
| **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
|
10
17
|
| **description** | **String** | Description of the object | [optional] |
|
18
|
+
| **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
|
11
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
20
|
| **metadata** | **String** | Deprecated - use description | [optional] |
|
13
21
|
| **name** | **String** | Key name | |
|
@@ -23,9 +31,17 @@ require 'akeyless'
|
|
23
31
|
|
24
32
|
instance = Akeyless::CreateKey.new(
|
25
33
|
alg: null,
|
34
|
+
certificate_common_name: null,
|
35
|
+
certificate_country: null,
|
36
|
+
certificate_digest_algo: null,
|
37
|
+
certificate_locality: null,
|
38
|
+
certificate_organization: null,
|
39
|
+
certificate_province: null,
|
40
|
+
certificate_ttl: null,
|
26
41
|
customer_frg_id: null,
|
27
42
|
delete_protection: null,
|
28
43
|
description: null,
|
44
|
+
generate_self_signed_certificate: null,
|
29
45
|
json: null,
|
30
46
|
metadata: null,
|
31
47
|
name: null,
|
data/docs/DSProducerDetails.md
CHANGED
@@ -204,8 +204,11 @@
|
|
204
204
|
| **venafi_sign_using_akeyless_pki** | **Boolean** | | [optional] |
|
205
205
|
| **venafi_signer_key_name** | **String** | | [optional] |
|
206
206
|
| **venafi_store_private_key** | **Boolean** | | [optional] |
|
207
|
-
| **
|
208
|
-
| **
|
207
|
+
| **venafi_tpp_access_token** | **String** | | [optional] |
|
208
|
+
| **venafi_tpp_client_id** | **String** | | [optional] |
|
209
|
+
| **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
210
|
+
| **venafi_tpp_refresh_token** | **String** | | [optional] |
|
211
|
+
| **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
209
212
|
| **venafi_use_tpp** | **Boolean** | | [optional] |
|
210
213
|
| **venafi_zone** | **String** | | [optional] |
|
211
214
|
| **warn_before_user_expiration_min** | **Integer** | | [optional] |
|
@@ -416,7 +419,10 @@ instance = Akeyless::DSProducerDetails.new(
|
|
416
419
|
venafi_sign_using_akeyless_pki: null,
|
417
420
|
venafi_signer_key_name: null,
|
418
421
|
venafi_store_private_key: null,
|
422
|
+
venafi_tpp_access_token: null,
|
423
|
+
venafi_tpp_client_id: null,
|
419
424
|
venafi_tpp_password: null,
|
425
|
+
venafi_tpp_refresh_token: null,
|
420
426
|
venafi_tpp_username: null,
|
421
427
|
venafi_use_tpp: null,
|
422
428
|
venafi_zone: null,
|
data/docs/DeriveKey.md
ADDED
@@ -0,0 +1,40 @@
|
|
1
|
+
# Akeyless::DeriveKey
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
|
8
|
+
| **alg** | **String** | Kdf algorithm | [default to 'pbkdf2'] |
|
9
|
+
| **hash_function** | **String** | HashFunction the hash function to use (relevant for pbkdf2) | [optional][default to 'sha256'] |
|
10
|
+
| **iter** | **Integer** | IterationCount the number of iterations | |
|
11
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
|
+
| **key_len** | **Integer** | KeyLength the byte length of the generated key | |
|
13
|
+
| **mem** | **Integer** | MemorySizeInKb the memory paramter in kb (relevant for argon2id) | [optional][default to 16384] |
|
14
|
+
| **name** | **String** | Static Secret full name | |
|
15
|
+
| **parallelism** | **Integer** | Parallelism the number of threads to use (relevant for argon2id) | [optional][default to 1] |
|
16
|
+
| **salt** | **String** | Salt Base64 encoded salt value. If not provided, the salt will be generated as part of the operation. The salt should be securely-generated random bytes, minimum 64 bits, 128 bits is recommended | [optional] |
|
17
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
18
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
19
|
+
|
20
|
+
## Example
|
21
|
+
|
22
|
+
```ruby
|
23
|
+
require 'akeyless'
|
24
|
+
|
25
|
+
instance = Akeyless::DeriveKey.new(
|
26
|
+
accessibility: null,
|
27
|
+
alg: null,
|
28
|
+
hash_function: null,
|
29
|
+
iter: null,
|
30
|
+
json: null,
|
31
|
+
key_len: null,
|
32
|
+
mem: null,
|
33
|
+
name: null,
|
34
|
+
parallelism: null,
|
35
|
+
salt: null,
|
36
|
+
token: null,
|
37
|
+
uid_token: null
|
38
|
+
)
|
39
|
+
```
|
40
|
+
|
@@ -0,0 +1,20 @@
|
|
1
|
+
# Akeyless::DeriveKeyOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **key** | **String** | | [optional] |
|
8
|
+
| **salt** | **String** | | [optional] |
|
9
|
+
|
10
|
+
## Example
|
11
|
+
|
12
|
+
```ruby
|
13
|
+
require 'akeyless'
|
14
|
+
|
15
|
+
instance = Akeyless::DeriveKeyOutput.new(
|
16
|
+
key: null,
|
17
|
+
salt: null
|
18
|
+
)
|
19
|
+
```
|
20
|
+
|
data/docs/EventAction.md
ADDED
@@ -0,0 +1,26 @@
|
|
1
|
+
# Akeyless::EventAction
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **action** | **String** | The Event Action [approve/deny] | |
|
8
|
+
| **event_id** | **Integer** | The Event ID | |
|
9
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
10
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
11
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
12
|
+
|
13
|
+
## Example
|
14
|
+
|
15
|
+
```ruby
|
16
|
+
require 'akeyless'
|
17
|
+
|
18
|
+
instance = Akeyless::EventAction.new(
|
19
|
+
action: null,
|
20
|
+
event_id: null,
|
21
|
+
json: null,
|
22
|
+
token: null,
|
23
|
+
uid_token: null
|
24
|
+
)
|
25
|
+
```
|
26
|
+
|
@@ -22,11 +22,12 @@
|
|
22
22
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
23
23
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
24
24
|
| **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
|
25
|
+
| **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
|
25
26
|
| **venafi_api_key** | **String** | Venafi API key | [optional] |
|
26
27
|
| **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
|
27
|
-
| **
|
28
|
+
| **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
|
29
|
+
| **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
|
28
30
|
| **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
|
29
|
-
| **venafi_username** | **String** | Venafi Username | [optional] |
|
30
31
|
| **venafi_zone** | **String** | Venafi Zone | [optional] |
|
31
32
|
|
32
33
|
## Example
|
@@ -53,11 +54,12 @@ instance = Akeyless::GatewayCreateProducerCertificateAutomation.new(
|
|
53
54
|
token: null,
|
54
55
|
uid_token: null,
|
55
56
|
user_ttl: null,
|
57
|
+
venafi_access_token: null,
|
56
58
|
venafi_api_key: null,
|
57
59
|
venafi_baseurl: null,
|
58
|
-
|
60
|
+
venafi_client_id: null,
|
61
|
+
venafi_refresh_token: null,
|
59
62
|
venafi_use_tpp: null,
|
60
|
-
venafi_username: null,
|
61
63
|
venafi_zone: null
|
62
64
|
)
|
63
65
|
```
|
@@ -23,11 +23,12 @@
|
|
23
23
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
24
24
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
25
25
|
| **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
|
26
|
+
| **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
|
26
27
|
| **venafi_api_key** | **String** | Venafi API key | [optional] |
|
27
28
|
| **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
|
28
|
-
| **
|
29
|
+
| **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
|
30
|
+
| **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
|
29
31
|
| **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
|
30
|
-
| **venafi_username** | **String** | Venafi Username | [optional] |
|
31
32
|
| **venafi_zone** | **String** | Venafi Zone | [optional] |
|
32
33
|
|
33
34
|
## Example
|
@@ -55,11 +56,12 @@ instance = Akeyless::GatewayUpdateProducerCertificateAutomation.new(
|
|
55
56
|
token: null,
|
56
57
|
uid_token: null,
|
57
58
|
user_ttl: null,
|
59
|
+
venafi_access_token: null,
|
58
60
|
venafi_api_key: null,
|
59
61
|
venafi_baseurl: null,
|
60
|
-
|
62
|
+
venafi_client_id: null,
|
63
|
+
venafi_refresh_token: null,
|
61
64
|
venafi_use_tpp: null,
|
62
|
-
venafi_username: null,
|
63
65
|
venafi_zone: null
|
64
66
|
)
|
65
67
|
```
|
data/docs/ItemGeneralInfo.md
CHANGED
@@ -6,6 +6,7 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **cert_issue_details** | [**CertificateIssueInfo**](CertificateIssueInfo.md) | | [optional] |
|
8
8
|
| **certificate_chain_info** | [**CertificateChainInfo**](CertificateChainInfo.md) | | [optional] |
|
9
|
+
| **certificates_template_info** | [**CertificateTemplateInfo**](CertificateTemplateInfo.md) | | [optional] |
|
9
10
|
| **classic_key_details** | [**ClassicKeyDetailsInfo**](ClassicKeyDetailsInfo.md) | | [optional] |
|
10
11
|
| **cluster_gw_url** | **String** | | [optional] |
|
11
12
|
| **display_metadata** | **String** | | [optional] |
|
@@ -25,6 +26,7 @@ require 'akeyless'
|
|
25
26
|
instance = Akeyless::ItemGeneralInfo.new(
|
26
27
|
cert_issue_details: null,
|
27
28
|
certificate_chain_info: null,
|
29
|
+
certificates_template_info: null,
|
28
30
|
classic_key_details: null,
|
29
31
|
cluster_gw_url: null,
|
30
32
|
display_metadata: null,
|
@@ -0,0 +1,34 @@
|
|
1
|
+
# Akeyless::SignDataWithClassicKey
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **data** | **String** | Data | |
|
8
|
+
| **display_id** | **String** | The name of the key to use in the sign data process | |
|
9
|
+
| **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
|
10
|
+
| **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
|
11
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
12
|
+
| **name** | **String** | ClassicKey name | |
|
13
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
15
|
+
| **version** | **Integer** | classic key version | |
|
16
|
+
|
17
|
+
## Example
|
18
|
+
|
19
|
+
```ruby
|
20
|
+
require 'akeyless'
|
21
|
+
|
22
|
+
instance = Akeyless::SignDataWithClassicKey.new(
|
23
|
+
data: null,
|
24
|
+
display_id: null,
|
25
|
+
hashed: null,
|
26
|
+
hashing_method: null,
|
27
|
+
json: null,
|
28
|
+
name: null,
|
29
|
+
token: null,
|
30
|
+
uid_token: null,
|
31
|
+
version: null
|
32
|
+
)
|
33
|
+
```
|
34
|
+
|
data/docs/SignOutput.md
ADDED
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::SignOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::SignOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -119,8 +119,11 @@
|
|
119
119
|
| **validation_email** | **String** | | [optional] |
|
120
120
|
| **venafi_api_key** | **String** | | [optional] |
|
121
121
|
| **venafi_base_url** | **String** | | [optional] |
|
122
|
-
| **
|
123
|
-
| **
|
122
|
+
| **venafi_tpp_access_token** | **String** | | [optional] |
|
123
|
+
| **venafi_tpp_client_id** | **String** | | [optional] |
|
124
|
+
| **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
125
|
+
| **venafi_tpp_refresh_token** | **String** | | [optional] |
|
126
|
+
| **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
|
124
127
|
| **venafi_use_tpp** | **Boolean** | | [optional] |
|
125
128
|
| **venafi_zone** | **String** | | [optional] |
|
126
129
|
|
@@ -245,7 +248,10 @@ instance = Akeyless::TargetTypeDetailsInput.new(
|
|
245
248
|
validation_email: null,
|
246
249
|
venafi_api_key: null,
|
247
250
|
venafi_base_url: null,
|
251
|
+
venafi_tpp_access_token: null,
|
252
|
+
venafi_tpp_client_id: null,
|
248
253
|
venafi_tpp_password: null,
|
254
|
+
venafi_tpp_refresh_token: null,
|
249
255
|
venafi_tpp_username: null,
|
250
256
|
venafi_use_tpp: null,
|
251
257
|
venafi_zone: null
|