akeyless 3.3.7 → 3.3.9

Sign up to get free protection for your applications and to get access to all the features.
@@ -18,12 +18,18 @@ module Akeyless
18
18
  # for personal password manager
19
19
  attr_accessor :accessibility
20
20
 
21
+ # For Password Management use, additional fields
22
+ attr_accessor :custom_field
23
+
21
24
  # Protection from accidental deletion of this item [true/false]
22
25
  attr_accessor :delete_protection
23
26
 
24
27
  # Description of the object
25
28
  attr_accessor :description
26
29
 
30
+ # For Password Management use, reflect the website context
31
+ attr_accessor :inject_url
32
+
27
33
  # Set output format to JSON
28
34
  attr_accessor :json
29
35
 
@@ -37,16 +43,7 @@ module Akeyless
37
43
  attr_accessor :name
38
44
 
39
45
  # For Password Management use, additional fields
40
- attr_accessor :password_manager_custom_field
41
-
42
- # For Password Management use, reflect the website context
43
- attr_accessor :password_manager_inject_url
44
-
45
- # For Password Management use, additional fields
46
- attr_accessor :password_manager_password
47
-
48
- # For Password Management use
49
- attr_accessor :password_manager_username
46
+ attr_accessor :password
50
47
 
51
48
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
52
49
  attr_accessor :protection_key
@@ -90,6 +87,9 @@ module Akeyless
90
87
  # The universal identity token, Required only for universal_identity authentication
91
88
  attr_accessor :uid_token
92
89
 
90
+ # For Password Management use
91
+ attr_accessor :username
92
+
93
93
  # The secret value
94
94
  attr_accessor :value
95
95
 
@@ -97,16 +97,15 @@ module Akeyless
97
97
  def self.attribute_map
98
98
  {
99
99
  :'accessibility' => :'accessibility',
100
+ :'custom_field' => :'custom-field',
100
101
  :'delete_protection' => :'delete_protection',
101
102
  :'description' => :'description',
103
+ :'inject_url' => :'inject-url',
102
104
  :'json' => :'json',
103
105
  :'metadata' => :'metadata',
104
106
  :'multiline_value' => :'multiline_value',
105
107
  :'name' => :'name',
106
- :'password_manager_custom_field' => :'password-manager-custom-field',
107
- :'password_manager_inject_url' => :'password-manager-inject-url',
108
- :'password_manager_password' => :'password-manager-password',
109
- :'password_manager_username' => :'password-manager-username',
108
+ :'password' => :'password',
110
109
  :'protection_key' => :'protection_key',
111
110
  :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
112
111
  :'secure_access_enable' => :'secure-access-enable',
@@ -121,6 +120,7 @@ module Akeyless
121
120
  :'token' => :'token',
122
121
  :'type' => :'type',
123
122
  :'uid_token' => :'uid-token',
123
+ :'username' => :'username',
124
124
  :'value' => :'value'
125
125
  }
126
126
  end
@@ -134,16 +134,15 @@ module Akeyless
134
134
  def self.openapi_types
135
135
  {
136
136
  :'accessibility' => :'String',
137
+ :'custom_field' => :'Hash<String, String>',
137
138
  :'delete_protection' => :'String',
138
139
  :'description' => :'String',
140
+ :'inject_url' => :'Array<String>',
139
141
  :'json' => :'Boolean',
140
142
  :'metadata' => :'String',
141
143
  :'multiline_value' => :'Boolean',
142
144
  :'name' => :'String',
143
- :'password_manager_custom_field' => :'Hash<String, String>',
144
- :'password_manager_inject_url' => :'Array<String>',
145
- :'password_manager_password' => :'String',
146
- :'password_manager_username' => :'String',
145
+ :'password' => :'String',
147
146
  :'protection_key' => :'String',
148
147
  :'secure_access_bastion_issuer' => :'String',
149
148
  :'secure_access_enable' => :'String',
@@ -158,6 +157,7 @@ module Akeyless
158
157
  :'token' => :'String',
159
158
  :'type' => :'String',
160
159
  :'uid_token' => :'String',
160
+ :'username' => :'String',
161
161
  :'value' => :'String'
162
162
  }
163
163
  end
@@ -189,6 +189,12 @@ module Akeyless
189
189
  self.accessibility = 'regular'
190
190
  end
191
191
 
192
+ if attributes.key?(:'custom_field')
193
+ if (value = attributes[:'custom_field']).is_a?(Hash)
194
+ self.custom_field = value
195
+ end
196
+ end
197
+
192
198
  if attributes.key?(:'delete_protection')
193
199
  self.delete_protection = attributes[:'delete_protection']
194
200
  end
@@ -197,6 +203,12 @@ module Akeyless
197
203
  self.description = attributes[:'description']
198
204
  end
199
205
 
206
+ if attributes.key?(:'inject_url')
207
+ if (value = attributes[:'inject_url']).is_a?(Array)
208
+ self.inject_url = value
209
+ end
210
+ end
211
+
200
212
  if attributes.key?(:'json')
201
213
  self.json = attributes[:'json']
202
214
  else
@@ -215,24 +227,8 @@ module Akeyless
215
227
  self.name = attributes[:'name']
216
228
  end
217
229
 
218
- if attributes.key?(:'password_manager_custom_field')
219
- if (value = attributes[:'password_manager_custom_field']).is_a?(Hash)
220
- self.password_manager_custom_field = value
221
- end
222
- end
223
-
224
- if attributes.key?(:'password_manager_inject_url')
225
- if (value = attributes[:'password_manager_inject_url']).is_a?(Array)
226
- self.password_manager_inject_url = value
227
- end
228
- end
229
-
230
- if attributes.key?(:'password_manager_password')
231
- self.password_manager_password = attributes[:'password_manager_password']
232
- end
233
-
234
- if attributes.key?(:'password_manager_username')
235
- self.password_manager_username = attributes[:'password_manager_username']
230
+ if attributes.key?(:'password')
231
+ self.password = attributes[:'password']
236
232
  end
237
233
 
238
234
  if attributes.key?(:'protection_key')
@@ -301,6 +297,10 @@ module Akeyless
301
297
  self.uid_token = attributes[:'uid_token']
302
298
  end
303
299
 
300
+ if attributes.key?(:'username')
301
+ self.username = attributes[:'username']
302
+ end
303
+
304
304
  if attributes.key?(:'value')
305
305
  self.value = attributes[:'value']
306
306
  end
@@ -335,16 +335,15 @@ module Akeyless
335
335
  return true if self.equal?(o)
336
336
  self.class == o.class &&
337
337
  accessibility == o.accessibility &&
338
+ custom_field == o.custom_field &&
338
339
  delete_protection == o.delete_protection &&
339
340
  description == o.description &&
341
+ inject_url == o.inject_url &&
340
342
  json == o.json &&
341
343
  metadata == o.metadata &&
342
344
  multiline_value == o.multiline_value &&
343
345
  name == o.name &&
344
- password_manager_custom_field == o.password_manager_custom_field &&
345
- password_manager_inject_url == o.password_manager_inject_url &&
346
- password_manager_password == o.password_manager_password &&
347
- password_manager_username == o.password_manager_username &&
346
+ password == o.password &&
348
347
  protection_key == o.protection_key &&
349
348
  secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
350
349
  secure_access_enable == o.secure_access_enable &&
@@ -359,6 +358,7 @@ module Akeyless
359
358
  token == o.token &&
360
359
  type == o.type &&
361
360
  uid_token == o.uid_token &&
361
+ username == o.username &&
362
362
  value == o.value
363
363
  end
364
364
 
@@ -371,7 +371,7 @@ module Akeyless
371
371
  # Calculates hash code according to all attributes.
372
372
  # @return [Integer] Hash code
373
373
  def hash
374
- [accessibility, delete_protection, description, json, metadata, multiline_value, name, password_manager_custom_field, password_manager_inject_url, password_manager_password, password_manager_username, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, value].hash
374
+ [accessibility, custom_field, delete_protection, description, inject_url, json, metadata, multiline_value, name, password, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, username, value].hash
375
375
  end
376
376
 
377
377
  # Builds the object from hash
@@ -277,6 +277,8 @@ module Akeyless
277
277
 
278
278
  attr_accessor :ldap_certificate
279
279
 
280
+ attr_accessor :ldap_group_dn
281
+
280
282
  attr_accessor :ldap_token_expiration
281
283
 
282
284
  attr_accessor :ldap_url
@@ -580,6 +582,7 @@ module Akeyless
580
582
  :'ldap_bind_dn' => :'ldap_bind_dn',
581
583
  :'ldap_bind_password' => :'ldap_bind_password',
582
584
  :'ldap_certificate' => :'ldap_certificate',
585
+ :'ldap_group_dn' => :'ldap_group_dn',
583
586
  :'ldap_token_expiration' => :'ldap_token_expiration',
584
587
  :'ldap_url' => :'ldap_url',
585
588
  :'ldap_user_attr' => :'ldap_user_attr',
@@ -799,6 +802,7 @@ module Akeyless
799
802
  :'ldap_bind_dn' => :'String',
800
803
  :'ldap_bind_password' => :'String',
801
804
  :'ldap_certificate' => :'String',
805
+ :'ldap_group_dn' => :'String',
802
806
  :'ldap_token_expiration' => :'String',
803
807
  :'ldap_url' => :'String',
804
808
  :'ldap_user_attr' => :'String',
@@ -1425,6 +1429,10 @@ module Akeyless
1425
1429
  self.ldap_certificate = attributes[:'ldap_certificate']
1426
1430
  end
1427
1431
 
1432
+ if attributes.key?(:'ldap_group_dn')
1433
+ self.ldap_group_dn = attributes[:'ldap_group_dn']
1434
+ end
1435
+
1428
1436
  if attributes.key?(:'ldap_token_expiration')
1429
1437
  self.ldap_token_expiration = attributes[:'ldap_token_expiration']
1430
1438
  end
@@ -1908,6 +1916,7 @@ module Akeyless
1908
1916
  ldap_bind_dn == o.ldap_bind_dn &&
1909
1917
  ldap_bind_password == o.ldap_bind_password &&
1910
1918
  ldap_certificate == o.ldap_certificate &&
1919
+ ldap_group_dn == o.ldap_group_dn &&
1911
1920
  ldap_token_expiration == o.ldap_token_expiration &&
1912
1921
  ldap_url == o.ldap_url &&
1913
1922
  ldap_user_attr == o.ldap_user_attr &&
@@ -2001,7 +2010,7 @@ module Akeyless
2001
2010
  # Calculates hash code according to all attributes.
2002
2011
  # @return [Integer] Hash code
2003
2012
  def hash
2004
- [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_region, aws_role_arns, aws_secret_access_key, aws_session_token, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, create_sync_url, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_repository_path, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, grant_types, groups, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_bearer_token, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, oracle_creation_statements, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2013
+ [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_region, aws_role_arns, aws_secret_access_key, aws_session_token, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, create_sync_url, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_repository_path, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, grant_types, groups, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_bearer_token, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, oracle_creation_statements, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2005
2014
  end
2006
2015
 
2007
2016
  # Builds the object from hash
@@ -28,6 +28,9 @@ module Akeyless
28
28
  # Externally provided username [true/false]
29
29
  attr_accessor :external_username
30
30
 
31
+ # Group DN which the temporary user should be added
32
+ attr_accessor :group_dn
33
+
31
34
  # Set output format to JSON
32
35
  attr_accessor :json
33
36
 
@@ -74,6 +77,7 @@ module Akeyless
74
77
  :'bind_dn_password' => :'bind-dn-password',
75
78
  :'delete_protection' => :'delete_protection',
76
79
  :'external_username' => :'external-username',
80
+ :'group_dn' => :'group-dn',
77
81
  :'json' => :'json',
78
82
  :'ldap_ca_cert' => :'ldap-ca-cert',
79
83
  :'ldap_url' => :'ldap-url',
@@ -102,6 +106,7 @@ module Akeyless
102
106
  :'bind_dn_password' => :'String',
103
107
  :'delete_protection' => :'String',
104
108
  :'external_username' => :'String',
109
+ :'group_dn' => :'String',
105
110
  :'json' => :'Boolean',
106
111
  :'ldap_ca_cert' => :'String',
107
112
  :'ldap_url' => :'String',
@@ -157,6 +162,10 @@ module Akeyless
157
162
  self.external_username = 'false'
158
163
  end
159
164
 
165
+ if attributes.key?(:'group_dn')
166
+ self.group_dn = attributes[:'group_dn']
167
+ end
168
+
160
169
  if attributes.key?(:'json')
161
170
  self.json = attributes[:'json']
162
171
  else
@@ -243,6 +252,7 @@ module Akeyless
243
252
  bind_dn_password == o.bind_dn_password &&
244
253
  delete_protection == o.delete_protection &&
245
254
  external_username == o.external_username &&
255
+ group_dn == o.group_dn &&
246
256
  json == o.json &&
247
257
  ldap_ca_cert == o.ldap_ca_cert &&
248
258
  ldap_url == o.ldap_url &&
@@ -267,7 +277,7 @@ module Akeyless
267
277
  # Calculates hash code according to all attributes.
268
278
  # @return [Integer] Hash code
269
279
  def hash
270
- [bind_dn, bind_dn_password, delete_protection, external_username, json, ldap_ca_cert, ldap_url, name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
280
+ [bind_dn, bind_dn_password, delete_protection, external_username, group_dn, json, ldap_ca_cert, ldap_url, name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
271
281
  end
272
282
 
273
283
  # Builds the object from hash
@@ -28,6 +28,9 @@ module Akeyless
28
28
  # Externally provided username [true/false]
29
29
  attr_accessor :external_username
30
30
 
31
+ # Group DN which the temporary user should be added
32
+ attr_accessor :group_dn
33
+
31
34
  # Set output format to JSON
32
35
  attr_accessor :json
33
36
 
@@ -77,6 +80,7 @@ module Akeyless
77
80
  :'bind_dn_password' => :'bind-dn-password',
78
81
  :'delete_protection' => :'delete_protection',
79
82
  :'external_username' => :'external-username',
83
+ :'group_dn' => :'group-dn',
80
84
  :'json' => :'json',
81
85
  :'ldap_ca_cert' => :'ldap-ca-cert',
82
86
  :'ldap_url' => :'ldap-url',
@@ -106,6 +110,7 @@ module Akeyless
106
110
  :'bind_dn_password' => :'String',
107
111
  :'delete_protection' => :'String',
108
112
  :'external_username' => :'String',
113
+ :'group_dn' => :'String',
109
114
  :'json' => :'Boolean',
110
115
  :'ldap_ca_cert' => :'String',
111
116
  :'ldap_url' => :'String',
@@ -162,6 +167,10 @@ module Akeyless
162
167
  self.external_username = 'false'
163
168
  end
164
169
 
170
+ if attributes.key?(:'group_dn')
171
+ self.group_dn = attributes[:'group_dn']
172
+ end
173
+
165
174
  if attributes.key?(:'json')
166
175
  self.json = attributes[:'json']
167
176
  else
@@ -252,6 +261,7 @@ module Akeyless
252
261
  bind_dn_password == o.bind_dn_password &&
253
262
  delete_protection == o.delete_protection &&
254
263
  external_username == o.external_username &&
264
+ group_dn == o.group_dn &&
255
265
  json == o.json &&
256
266
  ldap_ca_cert == o.ldap_ca_cert &&
257
267
  ldap_url == o.ldap_url &&
@@ -277,7 +287,7 @@ module Akeyless
277
287
  # Calculates hash code according to all attributes.
278
288
  # @return [Integer] Hash code
279
289
  def hash
280
- [bind_dn, bind_dn_password, delete_protection, external_username, json, ldap_ca_cert, ldap_url, name, new_name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
290
+ [bind_dn, bind_dn_password, delete_protection, external_username, group_dn, json, ldap_ca_cert, ldap_url, name, new_name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
281
291
  end
282
292
 
283
293
  # Builds the object from hash
@@ -15,6 +15,9 @@ require 'time'
15
15
 
16
16
  module Akeyless
17
17
  class GetRotatedSecretValue
18
+ # Get rotated secret value of specific Host (relevant only for Linked Target)
19
+ attr_accessor :host
20
+
18
21
  # Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI
19
22
  attr_accessor :ignore_cache
20
23
 
@@ -36,6 +39,7 @@ module Akeyless
36
39
  # Attribute mapping from ruby-style variable name to JSON key.
37
40
  def self.attribute_map
38
41
  {
42
+ :'host' => :'host',
39
43
  :'ignore_cache' => :'ignore-cache',
40
44
  :'json' => :'json',
41
45
  :'names' => :'names',
@@ -53,6 +57,7 @@ module Akeyless
53
57
  # Attribute type mapping.
54
58
  def self.openapi_types
55
59
  {
60
+ :'host' => :'String',
56
61
  :'ignore_cache' => :'String',
57
62
  :'json' => :'Boolean',
58
63
  :'names' => :'String',
@@ -83,6 +88,10 @@ module Akeyless
83
88
  h[k.to_sym] = v
84
89
  }
85
90
 
91
+ if attributes.key?(:'host')
92
+ self.host = attributes[:'host']
93
+ end
94
+
86
95
  if attributes.key?(:'ignore_cache')
87
96
  self.ignore_cache = attributes[:'ignore_cache']
88
97
  else
@@ -135,6 +144,7 @@ module Akeyless
135
144
  def ==(o)
136
145
  return true if self.equal?(o)
137
146
  self.class == o.class &&
147
+ host == o.host &&
138
148
  ignore_cache == o.ignore_cache &&
139
149
  json == o.json &&
140
150
  names == o.names &&
@@ -152,7 +162,7 @@ module Akeyless
152
162
  # Calculates hash code according to all attributes.
153
163
  # @return [Integer] Hash code
154
164
  def hash
155
- [ignore_cache, json, names, token, uid_token, version].hash
165
+ [host, ignore_cache, json, names, token, uid_token, version].hash
156
166
  end
157
167
 
158
168
  # Builds the object from hash
@@ -37,6 +37,8 @@ module Akeyless
37
37
 
38
38
  attr_accessor :rotator_type
39
39
 
40
+ attr_accessor :same_password
41
+
40
42
  # Attribute mapping from ruby-style variable name to JSON key.
41
43
  def self.attribute_map
42
44
  {
@@ -49,7 +51,8 @@ module Akeyless
49
51
  :'rotation_statement' => :'rotation_statement',
50
52
  :'rotator_creds_type' => :'rotator_creds_type',
51
53
  :'rotator_status' => :'rotator_status',
52
- :'rotator_type' => :'rotator_type'
54
+ :'rotator_type' => :'rotator_type',
55
+ :'same_password' => :'same_password'
53
56
  }
54
57
  end
55
58
 
@@ -70,7 +73,8 @@ module Akeyless
70
73
  :'rotation_statement' => :'String',
71
74
  :'rotator_creds_type' => :'String',
72
75
  :'rotator_status' => :'String',
73
- :'rotator_type' => :'String'
76
+ :'rotator_type' => :'String',
77
+ :'same_password' => :'Boolean'
74
78
  }
75
79
  end
76
80
 
@@ -134,6 +138,10 @@ module Akeyless
134
138
  if attributes.key?(:'rotator_type')
135
139
  self.rotator_type = attributes[:'rotator_type']
136
140
  end
141
+
142
+ if attributes.key?(:'same_password')
143
+ self.same_password = attributes[:'same_password']
144
+ end
137
145
  end
138
146
 
139
147
  # Show invalid properties with the reasons. Usually used together with valid?
@@ -163,7 +171,8 @@ module Akeyless
163
171
  rotation_statement == o.rotation_statement &&
164
172
  rotator_creds_type == o.rotator_creds_type &&
165
173
  rotator_status == o.rotator_status &&
166
- rotator_type == o.rotator_type
174
+ rotator_type == o.rotator_type &&
175
+ same_password == o.same_password
167
176
  end
168
177
 
169
178
  # @see the `==` method
@@ -175,7 +184,7 @@ module Akeyless
175
184
  # Calculates hash code according to all attributes.
176
185
  # @return [Integer] Hash code
177
186
  def hash
178
- [delete_previous_version_in_days, gw_cluster_id, last_rotation_error, number_of_versions_to_save, rotation_hour, rotation_interval_min, rotation_statement, rotator_creds_type, rotator_status, rotator_type].hash
187
+ [delete_previous_version_in_days, gw_cluster_id, last_rotation_error, number_of_versions_to_save, rotation_hour, rotation_interval_min, rotation_statement, rotator_creds_type, rotator_status, rotator_type, same_password].hash
179
188
  end
180
189
 
181
190
  # Builds the object from hash
@@ -144,6 +144,7 @@ module Akeyless
144
144
 
145
145
  attr_accessor :hostname
146
146
 
147
+ # key hostname, value description
147
148
  attr_accessor :hosts
148
149
 
149
150
  attr_accessor :imap_fqdn
@@ -39,6 +39,9 @@ module Akeyless
39
39
  # VersionSettingsObjectType defines object types for account version settings
40
40
  attr_accessor :item_type
41
41
 
42
+ # Set or unset the default behaviour of items deletion protection [true/false]
43
+ attr_accessor :items_deletion_protection
44
+
42
45
  # Set output format to JSON
43
46
  attr_accessor :json
44
47
 
@@ -92,6 +95,7 @@ module Akeyless
92
95
  :'default_versioning' => :'default-versioning',
93
96
  :'dp_enable_classic_key_protection' => :'dp-enable-classic-key-protection',
94
97
  :'item_type' => :'item-type',
98
+ :'items_deletion_protection' => :'items-deletion-protection',
95
99
  :'json' => :'json',
96
100
  :'jwt_ttl_default' => :'jwt-ttl-default',
97
101
  :'jwt_ttl_max' => :'jwt-ttl-max',
@@ -125,6 +129,7 @@ module Akeyless
125
129
  :'default_versioning' => :'String',
126
130
  :'dp_enable_classic_key_protection' => :'String',
127
131
  :'item_type' => :'String',
132
+ :'items_deletion_protection' => :'String',
128
133
  :'json' => :'Boolean',
129
134
  :'jwt_ttl_default' => :'Integer',
130
135
  :'jwt_ttl_max' => :'Integer',
@@ -195,6 +200,10 @@ module Akeyless
195
200
  self.item_type = attributes[:'item_type']
196
201
  end
197
202
 
203
+ if attributes.key?(:'items_deletion_protection')
204
+ self.items_deletion_protection = attributes[:'items_deletion_protection']
205
+ end
206
+
198
207
  if attributes.key?(:'json')
199
208
  self.json = attributes[:'json']
200
209
  else
@@ -280,6 +289,7 @@ module Akeyless
280
289
  default_versioning == o.default_versioning &&
281
290
  dp_enable_classic_key_protection == o.dp_enable_classic_key_protection &&
282
291
  item_type == o.item_type &&
292
+ items_deletion_protection == o.items_deletion_protection &&
283
293
  json == o.json &&
284
294
  jwt_ttl_default == o.jwt_ttl_default &&
285
295
  jwt_ttl_max == o.jwt_ttl_max &&
@@ -305,7 +315,7 @@ module Akeyless
305
315
  # Calculates hash code according to all attributes.
306
316
  # @return [Integer] Hash code
307
317
  def hash
308
- [address, city, company_name, country, default_share_link_ttl_minutes, default_versioning, dp_enable_classic_key_protection, item_type, json, jwt_ttl_default, jwt_ttl_max, jwt_ttl_min, max_versions, password_length, phone, postal_code, token, uid_token, use_lower_letters, use_numbers, use_special_characters, use_capital_letters].hash
318
+ [address, city, company_name, country, default_share_link_ttl_minutes, default_versioning, dp_enable_classic_key_protection, item_type, items_deletion_protection, json, jwt_ttl_default, jwt_ttl_max, jwt_ttl_min, max_versions, password_length, phone, postal_code, token, uid_token, use_lower_letters, use_numbers, use_special_characters, use_capital_letters].hash
309
319
  end
310
320
 
311
321
  # Builds the object from hash