akeyless 3.3.5 → 3.3.7

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f69d4a94f4bdba4ea27a4ec7fd6fffcf4621e9ec78edfb8484108326936de13d
4
- data.tar.gz: 8a24bfe1e4bb4c147ba411ffea0ed89eea57492eeabbfe12d60cd018eeeae3af
3
+ metadata.gz: a58478490360a3f9f0a7b9d706e40bfa139a39b0d09ed98da0b08f4764c553f4
4
+ data.tar.gz: bc3568f0358816e2eb54b127cba525c74ab744612db310fd3c75c5e3d5addbdd
5
5
  SHA512:
6
- metadata.gz: bedfd5f837c0335f293135a96106a7bc421a54ccf3fbc5fef2c6976cb13c35e315134eea0e3daf1ba0cd39ce841eabf821e8e20cca41e3852c2ca56c64b7150d
7
- data.tar.gz: f6840a3d73af5356417b9334cdf47588913678a1d201a9cc3f22519e851bae8e9ad1bcf8f47b89fa31c0dd734bc0de8e2144751967e3b83410561b9e8fcb4529
6
+ metadata.gz: 37b4fe0e495ab7092c994f16b232f28bb49dc73f1d57a3b9a0d5775375d89033e5df4cc07b811cf5ff76acb2c4179d64909a7405844156e80f052e99f11cb949
7
+ data.tar.gz: 426d38b9eeec69d495294c1fef8439eed5b9b42ac077be15a8123992fe99353f7f57bfed0f3cb00cde326ccedfb88c73e3b00e0ca11561ccc7264c1a721f265d
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.5
10
+ - Package version: 3.3.7
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -270,6 +270,7 @@ Class | Method | HTTP request | Description
270
270
  *Akeyless::V2Api* | [**set_item_state**](docs/V2Api.md#set_item_state) | **POST** /set-item-state |
271
271
  *Akeyless::V2Api* | [**set_role_rule**](docs/V2Api.md#set_role_rule) | **POST** /set-role-rule |
272
272
  *Akeyless::V2Api* | [**share_item**](docs/V2Api.md#share_item) | **POST** /share-item |
273
+ *Akeyless::V2Api* | [**sign_data_with_classic_key**](docs/V2Api.md#sign_data_with_classic_key) | **POST** /sign-data-with-classic-key |
273
274
  *Akeyless::V2Api* | [**sign_gpg**](docs/V2Api.md#sign_gpg) | **POST** /sign-gpg |
274
275
  *Akeyless::V2Api* | [**sign_jwt_with_classic_key**](docs/V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key |
275
276
  *Akeyless::V2Api* | [**sign_pkcs1**](docs/V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 |
@@ -334,6 +335,7 @@ Class | Method | HTTP request | Description
334
335
  *Akeyless::V2Api* | [**update_zero_ssl_target**](docs/V2Api.md#update_zero_ssl_target) | **POST** /update-zerossl-target |
335
336
  *Akeyless::V2Api* | [**upload_rsa**](docs/V2Api.md#upload_rsa) | **POST** /upload-rsa |
336
337
  *Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
338
+ *Akeyless::V2Api* | [**verify_data_with_classic_key**](docs/V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key |
337
339
  *Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
338
340
  *Akeyless::V2Api* | [**verify_jwt_with_classic_key**](docs/V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key |
339
341
  *Akeyless::V2Api* | [**verify_pkcs1**](docs/V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 |
@@ -862,10 +864,12 @@ Class | Method | HTTP request | Description
862
864
  - [Akeyless::SetRoleRule](docs/SetRoleRule.md)
863
865
  - [Akeyless::ShareItem](docs/ShareItem.md)
864
866
  - [Akeyless::SharingPolicyInfo](docs/SharingPolicyInfo.md)
867
+ - [Akeyless::SignDataWithClassicKey](docs/SignDataWithClassicKey.md)
865
868
  - [Akeyless::SignGPG](docs/SignGPG.md)
866
869
  - [Akeyless::SignGPGOutput](docs/SignGPGOutput.md)
867
870
  - [Akeyless::SignJWTOutput](docs/SignJWTOutput.md)
868
871
  - [Akeyless::SignJWTWithClassicKey](docs/SignJWTWithClassicKey.md)
872
+ - [Akeyless::SignOutput](docs/SignOutput.md)
869
873
  - [Akeyless::SignPKCS1](docs/SignPKCS1.md)
870
874
  - [Akeyless::SignPKCS1Output](docs/SignPKCS1Output.md)
871
875
  - [Akeyless::SignPKICertOutput](docs/SignPKICertOutput.md)
@@ -987,6 +991,7 @@ Class | Method | HTTP request | Description
987
991
  - [Akeyless::ValidateToken](docs/ValidateToken.md)
988
992
  - [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
989
993
  - [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
994
+ - [Akeyless::VerifyDataWithClassicKey](docs/VerifyDataWithClassicKey.md)
990
995
  - [Akeyless::VerifyGPG](docs/VerifyGPG.md)
991
996
  - [Akeyless::VerifyJWTOutput](docs/VerifyJWTOutput.md)
992
997
  - [Akeyless::VerifyJWTWithClassicKey](docs/VerifyJWTWithClassicKey.md)
data/docs/ListItems.md CHANGED
@@ -8,6 +8,7 @@
8
8
  | **filter** | **String** | Filter by item name or part of it | [optional] |
9
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
10
  | **minimal_view** | **Boolean** | | [optional] |
11
+ | **pagination** | **String** | Retrieve items with pagination | [optional][default to 'enabled'] |
11
12
  | **pagination_token** | **String** | Next page reference | [optional] |
12
13
  | **path** | **String** | Path to folder | [optional] |
13
14
  | **sra_only** | **Boolean** | Filter by items with SRA functionality enabled | [optional][default to false] |
@@ -27,6 +28,7 @@ instance = Akeyless::ListItems.new(
27
28
  filter: null,
28
29
  json: null,
29
30
  minimal_view: null,
31
+ pagination: null,
30
32
  pagination_token: null,
31
33
  path: null,
32
34
  sra_only: null,
@@ -0,0 +1,34 @@
1
+ # Akeyless::SignDataWithClassicKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **data** | **String** | Data | |
8
+ | **display_id** | **String** | The name of the key to use in the sign data process | |
9
+ | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
10
+ | **hashing_method** | **String** | HashingMethod | [optional][default to 'SHA256'] |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **name** | **String** | ClassicKey name | |
13
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
14
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
15
+ | **version** | **Integer** | classic key version | |
16
+
17
+ ## Example
18
+
19
+ ```ruby
20
+ require 'akeyless'
21
+
22
+ instance = Akeyless::SignDataWithClassicKey.new(
23
+ data: null,
24
+ display_id: null,
25
+ hashed: null,
26
+ hashing_method: null,
27
+ json: null,
28
+ name: null,
29
+ token: null,
30
+ uid_token: null,
31
+ version: null
32
+ )
33
+ ```
34
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::SignOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **result** | **String** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::SignOutput.new(
15
+ result: null
16
+ )
17
+ ```
18
+
data/docs/Target.md CHANGED
@@ -19,6 +19,7 @@
19
19
  | **target_id** | **Integer** | | [optional] |
20
20
  | **target_items_assoc** | [**Array<TargetItemAssociation>**](TargetItemAssociation.md) | | [optional] |
21
21
  | **target_name** | **String** | | [optional] |
22
+ | **target_sub_type** | **String** | | [optional] |
22
23
  | **target_type** | **String** | | [optional] |
23
24
  | **target_versions** | [**Array<ItemVersion>**](ItemVersion.md) | | [optional] |
24
25
  | **with_customer_fragment** | **Boolean** | | [optional] |
@@ -44,6 +45,7 @@ instance = Akeyless::Target.new(
44
45
  target_id: null,
45
46
  target_items_assoc: null,
46
47
  target_name: null,
48
+ target_sub_type: null,
47
49
  target_type: null,
48
50
  target_versions: null,
49
51
  with_customer_fragment: null
@@ -11,14 +11,15 @@
11
11
  | **allowed_uri_sans** | **String** | A list of the allowed URIs that clients can request to be included in the certificate as part of the URI Subject Alternative Names (in a comma-delimited list) | [optional] |
12
12
  | **client_flag** | **Boolean** | If set, certificates will be flagged for client auth use | [optional] |
13
13
  | **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
14
- | **country** | **String** | A comma-separated list of the country that will be set in the issued certificate | [optional] |
14
+ | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
15
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
15
16
  | **description** | **String** | Description of the object | [optional] |
16
17
  | **destination_path** | **String** | A path in which to save generated certificates | [optional] |
17
18
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
18
19
  | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode | [optional] |
19
20
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
20
21
  | **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
21
- | **locality** | **String** | A comma-separated list of the locality that will be set in the issued certificate | [optional] |
22
+ | **locality** | **String** | A comma-separated list of localities that will be set in the issued certificate | [optional] |
22
23
  | **metadata** | **String** | Deprecated - use description | [optional] |
23
24
  | **name** | **String** | PKI certificate issuer name | |
24
25
  | **new_name** | **String** | New item name | [optional] |
@@ -26,15 +27,15 @@
26
27
  | **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
27
28
  | **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
28
29
  | **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
29
- | **postal_code** | **String** | A comma-separated list of the postal code that will be set in the issued certificate | [optional] |
30
+ | **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
30
31
  | **protect_certificates** | **Boolean** | Whether to protect generated certificates from deletion | [optional] |
31
- | **province** | **String** | A comma-separated list of the province that will be set in the issued certificate | [optional] |
32
+ | **province** | **String** | A comma-separated list of provinces that will be set in the issued certificate | [optional] |
32
33
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
33
34
  | **server_flag** | **Boolean** | If set, certificates will be flagged for server auth use | [optional] |
34
35
  | **signer_key_name** | **String** | A key to sign the certificate with, required in Private CA mode | [default to 'dummy_signer_key'] |
35
- | **street_address** | **String** | A comma-separated list of the street address that will be set in the issued certificate | [optional] |
36
+ | **street_address** | **String** | A comma-separated list of street addresses that will be set in the issued certificate | [optional] |
36
37
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
37
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
38
+ | **ttl** | **Integer** | The maximum requested Time To Live for issued certificates, in seconds. In case of Public CA, this is based on the CA target's supported maximum TTLs | |
38
39
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
39
40
 
40
41
  ## Example
@@ -51,6 +52,7 @@ instance = Akeyless::UpdatePKICertIssuer.new(
51
52
  client_flag: null,
52
53
  code_signing_flag: null,
53
54
  country: null,
55
+ delete_protection: null,
54
56
  description: null,
55
57
  destination_path: null,
56
58
  expiration_event_in: null,
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
8
8
  | **allowed_users** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | |
9
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
10
11
  | **extensions** | **Hash<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -22,7 +23,7 @@
22
23
  | **secure_access_use_internal_bastion** | **Boolean** | Use internal SSH Bastion | [optional] |
23
24
  | **signer_key_name** | **String** | A key to sign the certificate with | |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
25
- | **ttl** | **Integer** | he requested Time To Live for the certificate, in seconds | |
26
+ | **ttl** | **Integer** | The requested Time To Live for the certificate, in seconds | |
26
27
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
27
28
 
28
29
  ## Example
@@ -33,6 +34,7 @@ require 'akeyless'
33
34
  instance = Akeyless::UpdateSSHCertIssuer.new(
34
35
  add_tag: null,
35
36
  allowed_users: null,
37
+ delete_protection: null,
36
38
  description: null,
37
39
  extensions: null,
38
40
  json: null,
data/docs/V2Api.md CHANGED
@@ -215,6 +215,7 @@ All URIs are relative to *https://api.akeyless.io*
215
215
  | [**set_item_state**](V2Api.md#set_item_state) | **POST** /set-item-state | |
216
216
  | [**set_role_rule**](V2Api.md#set_role_rule) | **POST** /set-role-rule | |
217
217
  | [**share_item**](V2Api.md#share_item) | **POST** /share-item | |
218
+ | [**sign_data_with_classic_key**](V2Api.md#sign_data_with_classic_key) | **POST** /sign-data-with-classic-key | |
218
219
  | [**sign_gpg**](V2Api.md#sign_gpg) | **POST** /sign-gpg | |
219
220
  | [**sign_jwt_with_classic_key**](V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key | |
220
221
  | [**sign_pkcs1**](V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 | |
@@ -279,6 +280,7 @@ All URIs are relative to *https://api.akeyless.io*
279
280
  | [**update_zero_ssl_target**](V2Api.md#update_zero_ssl_target) | **POST** /update-zerossl-target | |
280
281
  | [**upload_rsa**](V2Api.md#upload_rsa) | **POST** /upload-rsa | |
281
282
  | [**validate_token**](V2Api.md#validate_token) | **POST** /validate-token | |
283
+ | [**verify_data_with_classic_key**](V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key | |
282
284
  | [**verify_gpg**](V2Api.md#verify_gpg) | **POST** /verify-gpg | |
283
285
  | [**verify_jwt_with_classic_key**](V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key | |
284
286
  | [**verify_pkcs1**](V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 | |
@@ -13388,6 +13390,68 @@ No authorization required
13388
13390
  - **Accept**: application/json
13389
13391
 
13390
13392
 
13393
+ ## sign_data_with_classic_key
13394
+
13395
+ > <SignOutput> sign_data_with_classic_key(body)
13396
+
13397
+
13398
+
13399
+ ### Examples
13400
+
13401
+ ```ruby
13402
+ require 'time'
13403
+ require 'akeyless'
13404
+
13405
+ api_instance = Akeyless::V2Api.new
13406
+ body = Akeyless::SignDataWithClassicKey.new({data: 'data_example', display_id: 'display_id_example', name: 'name_example', version: 37}) # SignDataWithClassicKey |
13407
+
13408
+ begin
13409
+
13410
+ result = api_instance.sign_data_with_classic_key(body)
13411
+ p result
13412
+ rescue Akeyless::ApiError => e
13413
+ puts "Error when calling V2Api->sign_data_with_classic_key: #{e}"
13414
+ end
13415
+ ```
13416
+
13417
+ #### Using the sign_data_with_classic_key_with_http_info variant
13418
+
13419
+ This returns an Array which contains the response data, status code and headers.
13420
+
13421
+ > <Array(<SignOutput>, Integer, Hash)> sign_data_with_classic_key_with_http_info(body)
13422
+
13423
+ ```ruby
13424
+ begin
13425
+
13426
+ data, status_code, headers = api_instance.sign_data_with_classic_key_with_http_info(body)
13427
+ p status_code # => 2xx
13428
+ p headers # => { ... }
13429
+ p data # => <SignOutput>
13430
+ rescue Akeyless::ApiError => e
13431
+ puts "Error when calling V2Api->sign_data_with_classic_key_with_http_info: #{e}"
13432
+ end
13433
+ ```
13434
+
13435
+ ### Parameters
13436
+
13437
+ | Name | Type | Description | Notes |
13438
+ | ---- | ---- | ----------- | ----- |
13439
+ | **body** | [**SignDataWithClassicKey**](SignDataWithClassicKey.md) | | |
13440
+
13441
+ ### Return type
13442
+
13443
+ [**SignOutput**](SignOutput.md)
13444
+
13445
+ ### Authorization
13446
+
13447
+ No authorization required
13448
+
13449
+ ### HTTP request headers
13450
+
13451
+ - **Content-Type**: application/json
13452
+ - **Accept**: application/json
13453
+
13454
+
13391
13455
  ## sign_gpg
13392
13456
 
13393
13457
  > <SignGPGOutput> sign_gpg(body)
@@ -17353,6 +17417,68 @@ No authorization required
17353
17417
  - **Accept**: application/json
17354
17418
 
17355
17419
 
17420
+ ## verify_data_with_classic_key
17421
+
17422
+ > <VerifyPKICertOutput> verify_data_with_classic_key(body)
17423
+
17424
+
17425
+
17426
+ ### Examples
17427
+
17428
+ ```ruby
17429
+ require 'time'
17430
+ require 'akeyless'
17431
+
17432
+ api_instance = Akeyless::V2Api.new
17433
+ body = Akeyless::VerifyDataWithClassicKey.new({data: 'data_example', name: 'name_example', signature: 'signature_example', version: 37}) # VerifyDataWithClassicKey |
17434
+
17435
+ begin
17436
+
17437
+ result = api_instance.verify_data_with_classic_key(body)
17438
+ p result
17439
+ rescue Akeyless::ApiError => e
17440
+ puts "Error when calling V2Api->verify_data_with_classic_key: #{e}"
17441
+ end
17442
+ ```
17443
+
17444
+ #### Using the verify_data_with_classic_key_with_http_info variant
17445
+
17446
+ This returns an Array which contains the response data, status code and headers.
17447
+
17448
+ > <Array(<VerifyPKICertOutput>, Integer, Hash)> verify_data_with_classic_key_with_http_info(body)
17449
+
17450
+ ```ruby
17451
+ begin
17452
+
17453
+ data, status_code, headers = api_instance.verify_data_with_classic_key_with_http_info(body)
17454
+ p status_code # => 2xx
17455
+ p headers # => { ... }
17456
+ p data # => <VerifyPKICertOutput>
17457
+ rescue Akeyless::ApiError => e
17458
+ puts "Error when calling V2Api->verify_data_with_classic_key_with_http_info: #{e}"
17459
+ end
17460
+ ```
17461
+
17462
+ ### Parameters
17463
+
17464
+ | Name | Type | Description | Notes |
17465
+ | ---- | ---- | ----------- | ----- |
17466
+ | **body** | [**VerifyDataWithClassicKey**](VerifyDataWithClassicKey.md) | | |
17467
+
17468
+ ### Return type
17469
+
17470
+ [**VerifyPKICertOutput**](VerifyPKICertOutput.md)
17471
+
17472
+ ### Authorization
17473
+
17474
+ No authorization required
17475
+
17476
+ ### HTTP request headers
17477
+
17478
+ - **Content-Type**: application/json
17479
+ - **Accept**: application/json
17480
+
17481
+
17356
17482
  ## verify_gpg
17357
17483
 
17358
17484
  > Object verify_gpg(body)
@@ -0,0 +1,36 @@
1
+ # Akeyless::VerifyDataWithClassicKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **data** | **String** | Data | |
8
+ | **display_id** | **String** | The display id of the key to use in the verification process | [optional] |
9
+ | **hashed** | **Boolean** | Defines whether the data should be hashed as part of the signing. If true, the data will not be hashed | [optional][default to false] |
10
+ | **hashing_method** | **String** | HashingMethod | [optional][default to &#39;SHA256&#39;] |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **name** | **String** | The name of the key to use in the verification process | |
13
+ | **signature** | **String** | The data&#39;s signature in a Base64 format. | |
14
+ | **token** | **String** | Authentication token (see &#x60;/auth&#x60; and &#x60;/configure&#x60;) | [optional] |
15
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
+ | **version** | **Integer** | classic key version | |
17
+
18
+ ## Example
19
+
20
+ ```ruby
21
+ require 'akeyless'
22
+
23
+ instance = Akeyless::VerifyDataWithClassicKey.new(
24
+ data: null,
25
+ display_id: null,
26
+ hashed: null,
27
+ hashing_method: null,
28
+ json: null,
29
+ name: null,
30
+ signature: null,
31
+ token: null,
32
+ uid_token: null,
33
+ version: null
34
+ )
35
+ ```
36
+
@@ -13422,6 +13422,70 @@ module Akeyless
13422
13422
  return data, status_code, headers
13423
13423
  end
13424
13424
 
13425
+ # @param body [SignDataWithClassicKey]
13426
+ # @param [Hash] opts the optional parameters
13427
+ # @return [SignOutput]
13428
+ def sign_data_with_classic_key(body, opts = {})
13429
+ data, _status_code, _headers = sign_data_with_classic_key_with_http_info(body, opts)
13430
+ data
13431
+ end
13432
+
13433
+ # @param body [SignDataWithClassicKey]
13434
+ # @param [Hash] opts the optional parameters
13435
+ # @return [Array<(SignOutput, Integer, Hash)>] SignOutput data, response status code and response headers
13436
+ def sign_data_with_classic_key_with_http_info(body, opts = {})
13437
+ if @api_client.config.debugging
13438
+ @api_client.config.logger.debug 'Calling API: V2Api.sign_data_with_classic_key ...'
13439
+ end
13440
+ # verify the required parameter 'body' is set
13441
+ if @api_client.config.client_side_validation && body.nil?
13442
+ fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.sign_data_with_classic_key"
13443
+ end
13444
+ # resource path
13445
+ local_var_path = '/sign-data-with-classic-key'
13446
+
13447
+ # query parameters
13448
+ query_params = opts[:query_params] || {}
13449
+
13450
+ # header parameters
13451
+ header_params = opts[:header_params] || {}
13452
+ # HTTP header 'Accept' (if needed)
13453
+ header_params['Accept'] = @api_client.select_header_accept(['application/json'])
13454
+ # HTTP header 'Content-Type'
13455
+ content_type = @api_client.select_header_content_type(['application/json'])
13456
+ if !content_type.nil?
13457
+ header_params['Content-Type'] = content_type
13458
+ end
13459
+
13460
+ # form parameters
13461
+ form_params = opts[:form_params] || {}
13462
+
13463
+ # http body (model)
13464
+ post_body = opts[:debug_body] || @api_client.object_to_http_body(body)
13465
+
13466
+ # return_type
13467
+ return_type = opts[:debug_return_type] || 'SignOutput'
13468
+
13469
+ # auth_names
13470
+ auth_names = opts[:debug_auth_names] || []
13471
+
13472
+ new_options = opts.merge(
13473
+ :operation => :"V2Api.sign_data_with_classic_key",
13474
+ :header_params => header_params,
13475
+ :query_params => query_params,
13476
+ :form_params => form_params,
13477
+ :body => post_body,
13478
+ :auth_names => auth_names,
13479
+ :return_type => return_type
13480
+ )
13481
+
13482
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options)
13483
+ if @api_client.config.debugging
13484
+ @api_client.config.logger.debug "API called: V2Api#sign_data_with_classic_key\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
13485
+ end
13486
+ return data, status_code, headers
13487
+ end
13488
+
13425
13489
  # @param body [SignGPG]
13426
13490
  # @param [Hash] opts the optional parameters
13427
13491
  # @return [SignGPGOutput]
@@ -17507,6 +17571,70 @@ module Akeyless
17507
17571
  return data, status_code, headers
17508
17572
  end
17509
17573
 
17574
+ # @param body [VerifyDataWithClassicKey]
17575
+ # @param [Hash] opts the optional parameters
17576
+ # @return [VerifyPKICertOutput]
17577
+ def verify_data_with_classic_key(body, opts = {})
17578
+ data, _status_code, _headers = verify_data_with_classic_key_with_http_info(body, opts)
17579
+ data
17580
+ end
17581
+
17582
+ # @param body [VerifyDataWithClassicKey]
17583
+ # @param [Hash] opts the optional parameters
17584
+ # @return [Array<(VerifyPKICertOutput, Integer, Hash)>] VerifyPKICertOutput data, response status code and response headers
17585
+ def verify_data_with_classic_key_with_http_info(body, opts = {})
17586
+ if @api_client.config.debugging
17587
+ @api_client.config.logger.debug 'Calling API: V2Api.verify_data_with_classic_key ...'
17588
+ end
17589
+ # verify the required parameter 'body' is set
17590
+ if @api_client.config.client_side_validation && body.nil?
17591
+ fail ArgumentError, "Missing the required parameter 'body' when calling V2Api.verify_data_with_classic_key"
17592
+ end
17593
+ # resource path
17594
+ local_var_path = '/verify-data-with-classic-key'
17595
+
17596
+ # query parameters
17597
+ query_params = opts[:query_params] || {}
17598
+
17599
+ # header parameters
17600
+ header_params = opts[:header_params] || {}
17601
+ # HTTP header 'Accept' (if needed)
17602
+ header_params['Accept'] = @api_client.select_header_accept(['application/json'])
17603
+ # HTTP header 'Content-Type'
17604
+ content_type = @api_client.select_header_content_type(['application/json'])
17605
+ if !content_type.nil?
17606
+ header_params['Content-Type'] = content_type
17607
+ end
17608
+
17609
+ # form parameters
17610
+ form_params = opts[:form_params] || {}
17611
+
17612
+ # http body (model)
17613
+ post_body = opts[:debug_body] || @api_client.object_to_http_body(body)
17614
+
17615
+ # return_type
17616
+ return_type = opts[:debug_return_type] || 'VerifyPKICertOutput'
17617
+
17618
+ # auth_names
17619
+ auth_names = opts[:debug_auth_names] || []
17620
+
17621
+ new_options = opts.merge(
17622
+ :operation => :"V2Api.verify_data_with_classic_key",
17623
+ :header_params => header_params,
17624
+ :query_params => query_params,
17625
+ :form_params => form_params,
17626
+ :body => post_body,
17627
+ :auth_names => auth_names,
17628
+ :return_type => return_type
17629
+ )
17630
+
17631
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options)
17632
+ if @api_client.config.debugging
17633
+ @api_client.config.logger.debug "API called: V2Api#verify_data_with_classic_key\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
17634
+ end
17635
+ return data, status_code, headers
17636
+ end
17637
+
17510
17638
  # @param body [VerifyGPG]
17511
17639
  # @param [Hash] opts the optional parameters
17512
17640
  # @return [Object]
@@ -26,6 +26,9 @@ module Akeyless
26
26
 
27
27
  attr_accessor :minimal_view
28
28
 
29
+ # Retrieve items with pagination
30
+ attr_accessor :pagination
31
+
29
32
  # Next page reference
30
33
  attr_accessor :pagination_token
31
34
 
@@ -56,6 +59,7 @@ module Akeyless
56
59
  :'filter' => :'filter',
57
60
  :'json' => :'json',
58
61
  :'minimal_view' => :'minimal-view',
62
+ :'pagination' => :'pagination',
59
63
  :'pagination_token' => :'pagination-token',
60
64
  :'path' => :'path',
61
65
  :'sra_only' => :'sra-only',
@@ -79,6 +83,7 @@ module Akeyless
79
83
  :'filter' => :'String',
80
84
  :'json' => :'Boolean',
81
85
  :'minimal_view' => :'Boolean',
86
+ :'pagination' => :'String',
82
87
  :'pagination_token' => :'String',
83
88
  :'path' => :'String',
84
89
  :'sra_only' => :'Boolean',
@@ -131,6 +136,12 @@ module Akeyless
131
136
  self.minimal_view = attributes[:'minimal_view']
132
137
  end
133
138
 
139
+ if attributes.key?(:'pagination')
140
+ self.pagination = attributes[:'pagination']
141
+ else
142
+ self.pagination = 'enabled'
143
+ end
144
+
134
145
  if attributes.key?(:'pagination_token')
135
146
  self.pagination_token = attributes[:'pagination_token']
136
147
  end
@@ -192,6 +203,7 @@ module Akeyless
192
203
  filter == o.filter &&
193
204
  json == o.json &&
194
205
  minimal_view == o.minimal_view &&
206
+ pagination == o.pagination &&
195
207
  pagination_token == o.pagination_token &&
196
208
  path == o.path &&
197
209
  sra_only == o.sra_only &&
@@ -211,7 +223,7 @@ module Akeyless
211
223
  # Calculates hash code according to all attributes.
212
224
  # @return [Integer] Hash code
213
225
  def hash
214
- [accessibility, filter, json, minimal_view, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
226
+ [accessibility, filter, json, minimal_view, pagination, pagination_token, path, sra_only, sub_types, tag, token, type, uid_token].hash
215
227
  end
216
228
 
217
229
  # Builds the object from hash