akeyless 3.3.4 → 3.3.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +12 -1
  3. data/docs/CertificateTemplateInfo.md +32 -0
  4. data/docs/CreateClassicKey.md +16 -0
  5. data/docs/CreateDFCKey.md +16 -0
  6. data/docs/CreateKey.md +16 -0
  7. data/docs/DSProducerDetails.md +8 -2
  8. data/docs/DeriveKey.md +40 -0
  9. data/docs/DeriveKeyOutput.md +20 -0
  10. data/docs/EventAction.md +26 -0
  11. data/docs/GatewayCreateProducerCertificateAutomation.md +6 -4
  12. data/docs/GatewayUpdateProducerCertificateAutomation.md +6 -4
  13. data/docs/ItemGeneralInfo.md +2 -0
  14. data/docs/SignDataWithClassicKey.md +34 -0
  15. data/docs/SignOutput.md +18 -0
  16. data/docs/TargetTypeDetailsInput.md +8 -2
  17. data/docs/V2Api.md +252 -0
  18. data/docs/VerifyDataWithClassicKey.md +36 -0
  19. data/lib/akeyless/api/v2_api.rb +256 -0
  20. data/lib/akeyless/models/certificate_template_info.rb +282 -0
  21. data/lib/akeyless/models/create_classic_key.rb +81 -1
  22. data/lib/akeyless/models/create_dfc_key.rb +81 -1
  23. data/lib/akeyless/models/create_key.rb +81 -1
  24. data/lib/akeyless/models/derive_key.rb +362 -0
  25. data/lib/akeyless/models/derive_key_output.rb +228 -0
  26. data/lib/akeyless/models/ds_producer_details.rb +30 -1
  27. data/lib/akeyless/models/event_action.rb +272 -0
  28. data/lib/akeyless/models/gateway_create_producer_certificate_automation.rb +30 -18
  29. data/lib/akeyless/models/gateway_update_producer_certificate_automation.rb +30 -18
  30. data/lib/akeyless/models/item_general_info.rb +10 -1
  31. data/lib/akeyless/models/sign_data_with_classic_key.rb +326 -0
  32. data/lib/akeyless/models/sign_output.rb +219 -0
  33. data/lib/akeyless/models/target_type_details_input.rb +30 -1
  34. data/lib/akeyless/models/verify_data_with_classic_key.rb +336 -0
  35. data/lib/akeyless/version.rb +1 -1
  36. data/lib/akeyless.rb +7 -0
  37. data/spec/models/certificate_template_info_spec.rb +76 -0
  38. data/spec/models/derive_key_output_spec.rb +40 -0
  39. data/spec/models/derive_key_spec.rb +100 -0
  40. data/spec/models/event_action_spec.rb +58 -0
  41. data/spec/models/sign_data_with_classic_key_spec.rb +82 -0
  42. data/spec/models/sign_output_spec.rb +34 -0
  43. data/spec/models/verify_data_with_classic_key_spec.rb +88 -0
  44. metadata +30 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 920f52397018c1336358e7d6b44c77930f6a419d13eee2d76df9e3f635de3774
4
- data.tar.gz: 42ff2f4429c05dcf67ff23d6ace11fd519fca5e862ce0e50fa6466bcdceaa2a7
3
+ metadata.gz: 88435183182fc3482de93ad9a0f830797cc67e9e5aafab2909890be007eb81ca
4
+ data.tar.gz: 4e1f05ab93344023684491d185b1cc9c125d5a2dde0720a21a29a18062e6e9d6
5
5
  SHA512:
6
- metadata.gz: d24d6583e081dc686afc1dc3eb30555e6b5e2a598062e4b9858e5ad4666eec024d572544b248852bc7bbdf89c1e7b53fe10a49656f71202a941e8c85073c3921
7
- data.tar.gz: 559ffc70203fe20538e7112291aaee93911d96572157ba6f53881d49721c6a69d206ea182d76dbf9b86e161f39bd6afbe00a48deea7b7f0d99cd2a3207407490
6
+ metadata.gz: 1269021f5a1fce9f3c10242bd2f022049b7e5f5fc00e8eb7d7eb37f2c5b3098abd6d8e75be443d87c0de588ff248f527d70b0d06dc724fb48b1a2999f0c9d0b9
7
+ data.tar.gz: 311419f0df3fadbc54bcf2fcd80b182e62af1cf331824cc6b8390851d2d4698b42dc9c5f0db061f17d98ddb780f9d7e38db7481b12207d73bfc4f6b7674df89e
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.4
10
+ - Package version: 3.3.6
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -127,6 +127,7 @@ Class | Method | HTTP request | Description
127
127
  *Akeyless::V2Api* | [**delete_target**](docs/V2Api.md#delete_target) | **POST** /delete-target |
128
128
  *Akeyless::V2Api* | [**delete_target_association**](docs/V2Api.md#delete_target_association) | **POST** /delete-assoc-target-item |
129
129
  *Akeyless::V2Api* | [**delete_targets**](docs/V2Api.md#delete_targets) | **POST** /delete-targets |
130
+ *Akeyless::V2Api* | [**derive_key**](docs/V2Api.md#derive_key) | **POST** /derive-key |
130
131
  *Akeyless::V2Api* | [**describe_assoc**](docs/V2Api.md#describe_assoc) | **POST** /describe-role-am-assoc |
131
132
  *Akeyless::V2Api* | [**describe_item**](docs/V2Api.md#describe_item) | **POST** /describe-item |
132
133
  *Akeyless::V2Api* | [**describe_permissions**](docs/V2Api.md#describe_permissions) | **POST** /describe-permissions |
@@ -140,6 +141,7 @@ Class | Method | HTTP request | Description
140
141
  *Akeyless::V2Api* | [**esm_get**](docs/V2Api.md#esm_get) | **POST** /esm-get |
141
142
  *Akeyless::V2Api* | [**esm_list**](docs/V2Api.md#esm_list) | **POST** /esm-list |
142
143
  *Akeyless::V2Api* | [**esm_update**](docs/V2Api.md#esm_update) | **POST** /esm-update |
144
+ *Akeyless::V2Api* | [**event_action**](docs/V2Api.md#event_action) | **POST** /event-action |
143
145
  *Akeyless::V2Api* | [**export_classic_key**](docs/V2Api.md#export_classic_key) | **POST** /export-classic-key |
144
146
  *Akeyless::V2Api* | [**gateway_create_k8_s_auth_config**](docs/V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config |
145
147
  *Akeyless::V2Api* | [**gateway_create_migration**](docs/V2Api.md#gateway_create_migration) | **POST** /gateway-create-migration |
@@ -268,6 +270,7 @@ Class | Method | HTTP request | Description
268
270
  *Akeyless::V2Api* | [**set_item_state**](docs/V2Api.md#set_item_state) | **POST** /set-item-state |
269
271
  *Akeyless::V2Api* | [**set_role_rule**](docs/V2Api.md#set_role_rule) | **POST** /set-role-rule |
270
272
  *Akeyless::V2Api* | [**share_item**](docs/V2Api.md#share_item) | **POST** /share-item |
273
+ *Akeyless::V2Api* | [**sign_data_with_classic_key**](docs/V2Api.md#sign_data_with_classic_key) | **POST** /sign-data-with-classic-key |
271
274
  *Akeyless::V2Api* | [**sign_gpg**](docs/V2Api.md#sign_gpg) | **POST** /sign-gpg |
272
275
  *Akeyless::V2Api* | [**sign_jwt_with_classic_key**](docs/V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key |
273
276
  *Akeyless::V2Api* | [**sign_pkcs1**](docs/V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 |
@@ -332,6 +335,7 @@ Class | Method | HTTP request | Description
332
335
  *Akeyless::V2Api* | [**update_zero_ssl_target**](docs/V2Api.md#update_zero_ssl_target) | **POST** /update-zerossl-target |
333
336
  *Akeyless::V2Api* | [**upload_rsa**](docs/V2Api.md#upload_rsa) | **POST** /upload-rsa |
334
337
  *Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
338
+ *Akeyless::V2Api* | [**verify_data_with_classic_key**](docs/V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key |
335
339
  *Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
336
340
  *Akeyless::V2Api* | [**verify_jwt_with_classic_key**](docs/V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key |
337
341
  *Akeyless::V2Api* | [**verify_pkcs1**](docs/V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 |
@@ -378,6 +382,7 @@ Class | Method | HTTP request | Description
378
382
  - [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
379
383
  - [Akeyless::CertificateInfo](docs/CertificateInfo.md)
380
384
  - [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
385
+ - [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
381
386
  - [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
382
387
  - [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
383
388
  - [Akeyless::ClassicKeyTargetInfo](docs/ClassicKeyTargetInfo.md)
@@ -513,6 +518,8 @@ Class | Method | HTTP request | Description
513
518
  - [Akeyless::DeleteTarget](docs/DeleteTarget.md)
514
519
  - [Akeyless::DeleteTargetAssociation](docs/DeleteTargetAssociation.md)
515
520
  - [Akeyless::DeleteTargets](docs/DeleteTargets.md)
521
+ - [Akeyless::DeriveKey](docs/DeriveKey.md)
522
+ - [Akeyless::DeriveKeyOutput](docs/DeriveKeyOutput.md)
516
523
  - [Akeyless::DescribeAssoc](docs/DescribeAssoc.md)
517
524
  - [Akeyless::DescribeItem](docs/DescribeItem.md)
518
525
  - [Akeyless::DescribePermissions](docs/DescribePermissions.md)
@@ -543,6 +550,7 @@ Class | Method | HTTP request | Description
543
550
  - [Akeyless::EsmListSecretsOutput](docs/EsmListSecretsOutput.md)
544
551
  - [Akeyless::EsmUpdate](docs/EsmUpdate.md)
545
552
  - [Akeyless::EsmUpdateSecretOutput](docs/EsmUpdateSecretOutput.md)
553
+ - [Akeyless::EventAction](docs/EventAction.md)
546
554
  - [Akeyless::ExportClassicKey](docs/ExportClassicKey.md)
547
555
  - [Akeyless::ExportClassicKeyOutput](docs/ExportClassicKeyOutput.md)
548
556
  - [Akeyless::Extension](docs/Extension.md)
@@ -856,10 +864,12 @@ Class | Method | HTTP request | Description
856
864
  - [Akeyless::SetRoleRule](docs/SetRoleRule.md)
857
865
  - [Akeyless::ShareItem](docs/ShareItem.md)
858
866
  - [Akeyless::SharingPolicyInfo](docs/SharingPolicyInfo.md)
867
+ - [Akeyless::SignDataWithClassicKey](docs/SignDataWithClassicKey.md)
859
868
  - [Akeyless::SignGPG](docs/SignGPG.md)
860
869
  - [Akeyless::SignGPGOutput](docs/SignGPGOutput.md)
861
870
  - [Akeyless::SignJWTOutput](docs/SignJWTOutput.md)
862
871
  - [Akeyless::SignJWTWithClassicKey](docs/SignJWTWithClassicKey.md)
872
+ - [Akeyless::SignOutput](docs/SignOutput.md)
863
873
  - [Akeyless::SignPKCS1](docs/SignPKCS1.md)
864
874
  - [Akeyless::SignPKCS1Output](docs/SignPKCS1Output.md)
865
875
  - [Akeyless::SignPKICertOutput](docs/SignPKICertOutput.md)
@@ -981,6 +991,7 @@ Class | Method | HTTP request | Description
981
991
  - [Akeyless::ValidateToken](docs/ValidateToken.md)
982
992
  - [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
983
993
  - [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
994
+ - [Akeyless::VerifyDataWithClassicKey](docs/VerifyDataWithClassicKey.md)
984
995
  - [Akeyless::VerifyGPG](docs/VerifyGPG.md)
985
996
  - [Akeyless::VerifyJWTOutput](docs/VerifyJWTOutput.md)
986
997
  - [Akeyless::VerifyJWTWithClassicKey](docs/VerifyJWTWithClassicKey.md)
@@ -0,0 +1,32 @@
1
+ # Akeyless::CertificateTemplateInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **common_name** | **String** | | [optional] |
8
+ | **country** | **String** | | [optional] |
9
+ | **digest_algo** | **String** | | [optional] |
10
+ | **locality** | **String** | | [optional] |
11
+ | **organization** | **String** | | [optional] |
12
+ | **province** | **String** | | [optional] |
13
+ | **self_signed_enabled** | **Boolean** | | [optional] |
14
+ | **ttl** | **Integer** | | [optional] |
15
+
16
+ ## Example
17
+
18
+ ```ruby
19
+ require 'akeyless'
20
+
21
+ instance = Akeyless::CertificateTemplateInfo.new(
22
+ common_name: null,
23
+ country: null,
24
+ digest_algo: null,
25
+ locality: null,
26
+ organization: null,
27
+ province: null,
28
+ self_signed_enabled: null,
29
+ ttl: null
30
+ )
31
+ ```
32
+
@@ -6,8 +6,16 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] | |
8
8
  | **cert_file_data** | **String** | Certificate in a PEM format. | [optional] |
9
+ | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
10
+ | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
11
+ | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
12
+ | **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
13
+ | **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
14
+ | **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
15
+ | **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
9
16
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
17
  | **description** | **String** | Description of the object | [optional] |
18
+ | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
11
19
  | **gpg_alg** | **String** | gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519] | [optional] |
12
20
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
13
21
  | **key_data** | **String** | Base64-encoded classic key value | [optional] |
@@ -26,8 +34,16 @@ require 'akeyless'
26
34
  instance = Akeyless::CreateClassicKey.new(
27
35
  alg: null,
28
36
  cert_file_data: null,
37
+ certificate_common_name: null,
38
+ certificate_country: null,
39
+ certificate_digest_algo: null,
40
+ certificate_locality: null,
41
+ certificate_organization: null,
42
+ certificate_province: null,
43
+ certificate_ttl: null,
29
44
  delete_protection: null,
30
45
  description: null,
46
+ generate_self_signed_certificate: null,
31
47
  gpg_alg: null,
32
48
  json: null,
33
49
  key_data: null,
data/docs/CreateDFCKey.md CHANGED
@@ -5,9 +5,17 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
8
+ | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
9
+ | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
10
+ | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
11
+ | **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
12
+ | **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
13
+ | **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
14
+ | **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
8
15
  | **customer_frg_id** | **String** | The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment) | [optional] |
9
16
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
17
  | **description** | **String** | Description of the object | [optional] |
18
+ | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
11
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
20
  | **metadata** | **String** | Deprecated - use description | [optional] |
13
21
  | **name** | **String** | DFCKey name | |
@@ -23,9 +31,17 @@ require 'akeyless'
23
31
 
24
32
  instance = Akeyless::CreateDFCKey.new(
25
33
  alg: null,
34
+ certificate_common_name: null,
35
+ certificate_country: null,
36
+ certificate_digest_algo: null,
37
+ certificate_locality: null,
38
+ certificate_organization: null,
39
+ certificate_province: null,
40
+ certificate_ttl: null,
26
41
  customer_frg_id: null,
27
42
  delete_protection: null,
28
43
  description: null,
44
+ generate_self_signed_certificate: null,
29
45
  json: null,
30
46
  metadata: null,
31
47
  name: null,
data/docs/CreateKey.md CHANGED
@@ -5,9 +5,17 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **alg** | **String** | Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
8
+ | **certificate_common_name** | **String** | Common name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
9
+ | **certificate_country** | **String** | Country name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
10
+ | **certificate_digest_algo** | **String** | Digest algorithm to be used for the certificate key signing. Currently, we support only \"sha256\" so we hide this option for CLI. | [optional] |
11
+ | **certificate_locality** | **String** | Locality for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
12
+ | **certificate_organization** | **String** | Organization name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
13
+ | **certificate_province** | **String** | Province name for the generated certificate. Relevant only for generate-self-signed-certificate. | [optional] |
14
+ | **certificate_ttl** | **Integer** | TTL in days for the generated certificate. Required only for generate-self-signed-certificate. | [optional] |
8
15
  | **customer_frg_id** | **String** | The customer fragment ID that will be used to create the key (if empty, the key will be created independently of a customer fragment) | [optional] |
9
16
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
17
  | **description** | **String** | Description of the object | [optional] |
18
+ | **generate_self_signed_certificate** | **Boolean** | Whether to generate a self signed certificate with the key. If set, --certificate-ttl must be provided. | [optional] |
11
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
20
  | **metadata** | **String** | Deprecated - use description | [optional] |
13
21
  | **name** | **String** | Key name | |
@@ -23,9 +31,17 @@ require 'akeyless'
23
31
 
24
32
  instance = Akeyless::CreateKey.new(
25
33
  alg: null,
34
+ certificate_common_name: null,
35
+ certificate_country: null,
36
+ certificate_digest_algo: null,
37
+ certificate_locality: null,
38
+ certificate_organization: null,
39
+ certificate_province: null,
40
+ certificate_ttl: null,
26
41
  customer_frg_id: null,
27
42
  delete_protection: null,
28
43
  description: null,
44
+ generate_self_signed_certificate: null,
29
45
  json: null,
30
46
  metadata: null,
31
47
  name: null,
@@ -204,8 +204,11 @@
204
204
  | **venafi_sign_using_akeyless_pki** | **Boolean** | | [optional] |
205
205
  | **venafi_signer_key_name** | **String** | | [optional] |
206
206
  | **venafi_store_private_key** | **Boolean** | | [optional] |
207
- | **venafi_tpp_password** | **String** | | [optional] |
208
- | **venafi_tpp_username** | **String** | | [optional] |
207
+ | **venafi_tpp_access_token** | **String** | | [optional] |
208
+ | **venafi_tpp_client_id** | **String** | | [optional] |
209
+ | **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
210
+ | **venafi_tpp_refresh_token** | **String** | | [optional] |
211
+ | **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
209
212
  | **venafi_use_tpp** | **Boolean** | | [optional] |
210
213
  | **venafi_zone** | **String** | | [optional] |
211
214
  | **warn_before_user_expiration_min** | **Integer** | | [optional] |
@@ -416,7 +419,10 @@ instance = Akeyless::DSProducerDetails.new(
416
419
  venafi_sign_using_akeyless_pki: null,
417
420
  venafi_signer_key_name: null,
418
421
  venafi_store_private_key: null,
422
+ venafi_tpp_access_token: null,
423
+ venafi_tpp_client_id: null,
419
424
  venafi_tpp_password: null,
425
+ venafi_tpp_refresh_token: null,
420
426
  venafi_tpp_username: null,
421
427
  venafi_use_tpp: null,
422
428
  venafi_zone: null,
data/docs/DeriveKey.md ADDED
@@ -0,0 +1,40 @@
1
+ # Akeyless::DeriveKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
+ | **alg** | **String** | Kdf algorithm | [default to 'pbkdf2'] |
9
+ | **hash_function** | **String** | HashFunction the hash function to use (relevant for pbkdf2) | [optional][default to 'sha256'] |
10
+ | **iter** | **Integer** | IterationCount the number of iterations | |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **key_len** | **Integer** | KeyLength the byte length of the generated key | |
13
+ | **mem** | **Integer** | MemorySizeInKb the memory paramter in kb (relevant for argon2id) | [optional][default to 16384] |
14
+ | **name** | **String** | Static Secret full name | |
15
+ | **parallelism** | **Integer** | Parallelism the number of threads to use (relevant for argon2id) | [optional][default to 1] |
16
+ | **salt** | **String** | Salt Base64 encoded salt value. If not provided, the salt will be generated as part of the operation. The salt should be securely-generated random bytes, minimum 64 bits, 128 bits is recommended | [optional] |
17
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
18
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
+
20
+ ## Example
21
+
22
+ ```ruby
23
+ require 'akeyless'
24
+
25
+ instance = Akeyless::DeriveKey.new(
26
+ accessibility: null,
27
+ alg: null,
28
+ hash_function: null,
29
+ iter: null,
30
+ json: null,
31
+ key_len: null,
32
+ mem: null,
33
+ name: null,
34
+ parallelism: null,
35
+ salt: null,
36
+ token: null,
37
+ uid_token: null
38
+ )
39
+ ```
40
+
@@ -0,0 +1,20 @@
1
+ # Akeyless::DeriveKeyOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **key** | **String** | | [optional] |
8
+ | **salt** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::DeriveKeyOutput.new(
16
+ key: null,
17
+ salt: null
18
+ )
19
+ ```
20
+
@@ -0,0 +1,26 @@
1
+ # Akeyless::EventAction
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **action** | **String** | The Event Action [approve/deny] | |
8
+ | **event_id** | **Integer** | The Event ID | |
9
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
11
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::EventAction.new(
19
+ action: null,
20
+ event_id: null,
21
+ json: null,
22
+ token: null,
23
+ uid_token: null
24
+ )
25
+ ```
26
+
@@ -22,11 +22,12 @@
22
22
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
23
23
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
24
24
  | **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
25
+ | **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
25
26
  | **venafi_api_key** | **String** | Venafi API key | [optional] |
26
27
  | **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
27
- | **venafi_password** | **String** | Venafi Password | [optional] |
28
+ | **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
29
+ | **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
28
30
  | **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
29
- | **venafi_username** | **String** | Venafi Username | [optional] |
30
31
  | **venafi_zone** | **String** | Venafi Zone | [optional] |
31
32
 
32
33
  ## Example
@@ -53,11 +54,12 @@ instance = Akeyless::GatewayCreateProducerCertificateAutomation.new(
53
54
  token: null,
54
55
  uid_token: null,
55
56
  user_ttl: null,
57
+ venafi_access_token: null,
56
58
  venafi_api_key: null,
57
59
  venafi_baseurl: null,
58
- venafi_password: null,
60
+ venafi_client_id: null,
61
+ venafi_refresh_token: null,
59
62
  venafi_use_tpp: null,
60
- venafi_username: null,
61
63
  venafi_zone: null
62
64
  )
63
65
  ```
@@ -23,11 +23,12 @@
23
23
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
24
24
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
25
25
  | **user_ttl** | **String** | User TTL in time.Duration format (2160h / 129600m / etc...). When using sign-using-akeyless-pki certificates created will have this validity period, otherwise the user-ttl is taken from the Validity Period field of the Zone's' Issuing Template. When using cert-manager it is advised to have a TTL of above 60 days (1440h). For more information - https://cert-manager.io/docs/usage/certificate/ | [optional][default to '2160h'] |
26
+ | **venafi_access_token** | **String** | Venafi Access Token to use to access the TPP environment (Relevant when using TPP) | [optional] |
26
27
  | **venafi_api_key** | **String** | Venafi API key | [optional] |
27
28
  | **venafi_baseurl** | **String** | Venafi Baseurl | [optional] |
28
- | **venafi_password** | **String** | Venafi Password | [optional] |
29
+ | **venafi_client_id** | **String** | Venafi Client ID that was used when the access token was generated | [optional][default to 'akeyless'] |
30
+ | **venafi_refresh_token** | **String** | Venafi Refresh Token to use when the Access Token is expired (Relevant when using TPP) | [optional] |
29
31
  | **venafi_use_tpp** | **Boolean** | Venafi using TPP | [optional] |
30
- | **venafi_username** | **String** | Venafi Username | [optional] |
31
32
  | **venafi_zone** | **String** | Venafi Zone | [optional] |
32
33
 
33
34
  ## Example
@@ -55,11 +56,12 @@ instance = Akeyless::GatewayUpdateProducerCertificateAutomation.new(
55
56
  token: null,
56
57
  uid_token: null,
57
58
  user_ttl: null,
59
+ venafi_access_token: null,
58
60
  venafi_api_key: null,
59
61
  venafi_baseurl: null,
60
- venafi_password: null,
62
+ venafi_client_id: null,
63
+ venafi_refresh_token: null,
61
64
  venafi_use_tpp: null,
62
- venafi_username: null,
63
65
  venafi_zone: null
64
66
  )
65
67
  ```
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **cert_issue_details** | [**CertificateIssueInfo**](CertificateIssueInfo.md) | | [optional] |
8
8
  | **certificate_chain_info** | [**CertificateChainInfo**](CertificateChainInfo.md) | | [optional] |
9
+ | **certificates_template_info** | [**CertificateTemplateInfo**](CertificateTemplateInfo.md) | | [optional] |
9
10
  | **classic_key_details** | [**ClassicKeyDetailsInfo**](ClassicKeyDetailsInfo.md) | | [optional] |
10
11
  | **cluster_gw_url** | **String** | | [optional] |
11
12
  | **display_metadata** | **String** | | [optional] |
@@ -25,6 +26,7 @@ require 'akeyless'
25
26
  instance = Akeyless::ItemGeneralInfo.new(
26
27
  cert_issue_details: null,
27
28
  certificate_chain_info: null,
29
+ certificates_template_info: null,
28
30
  classic_key_details: null,
29
31
  cluster_gw_url: null,
30
32
  display_metadata: null,
@@ -0,0 +1,34 @@
1
+ # Akeyless::SignDataWithClassicKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **data** | **String** | Data | |
8
+ | **display_id** | **String** | The name of the key to use in the sign data process | |
9
+ | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
10
+ | **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **name** | **String** | ClassicKey name | |
13
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
14
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
15
+ | **version** | **Integer** | classic key version | |
16
+
17
+ ## Example
18
+
19
+ ```ruby
20
+ require 'akeyless'
21
+
22
+ instance = Akeyless::SignDataWithClassicKey.new(
23
+ data: null,
24
+ display_id: null,
25
+ hashed: null,
26
+ hashing_method: null,
27
+ json: null,
28
+ name: null,
29
+ token: null,
30
+ uid_token: null,
31
+ version: null
32
+ )
33
+ ```
34
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::SignOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **result** | **String** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::SignOutput.new(
15
+ result: null
16
+ )
17
+ ```
18
+
@@ -119,8 +119,11 @@
119
119
  | **validation_email** | **String** | | [optional] |
120
120
  | **venafi_api_key** | **String** | | [optional] |
121
121
  | **venafi_base_url** | **String** | | [optional] |
122
- | **venafi_tpp_password** | **String** | | [optional] |
123
- | **venafi_tpp_username** | **String** | | [optional] |
122
+ | **venafi_tpp_access_token** | **String** | | [optional] |
123
+ | **venafi_tpp_client_id** | **String** | | [optional] |
124
+ | **venafi_tpp_password** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
125
+ | **venafi_tpp_refresh_token** | **String** | | [optional] |
126
+ | **venafi_tpp_username** | **String** | Deprecated: VenafiAccessToken and VenafiRefreshToken should be used instead | [optional] |
124
127
  | **venafi_use_tpp** | **Boolean** | | [optional] |
125
128
  | **venafi_zone** | **String** | | [optional] |
126
129
 
@@ -245,7 +248,10 @@ instance = Akeyless::TargetTypeDetailsInput.new(
245
248
  validation_email: null,
246
249
  venafi_api_key: null,
247
250
  venafi_base_url: null,
251
+ venafi_tpp_access_token: null,
252
+ venafi_tpp_client_id: null,
248
253
  venafi_tpp_password: null,
254
+ venafi_tpp_refresh_token: null,
249
255
  venafi_tpp_username: null,
250
256
  venafi_use_tpp: null,
251
257
  venafi_zone: null