akeyless 3.3.7 → 3.3.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -15,9 +15,18 @@ require 'time'
15
15
 
16
16
  module Akeyless
17
17
  class UpdateCertificateValue
18
+ # List of the new tags that will be attached to this item
19
+ attr_accessor :add_tag
20
+
18
21
  # Content of the certificate in a Base64 format.
19
22
  attr_accessor :certificate_data
20
23
 
24
+ # Protection from accidental deletion of this item [true/false]
25
+ attr_accessor :delete_protection
26
+
27
+ # Description of the object
28
+ attr_accessor :description
29
+
21
30
  # How many days before the expiration of the certificate would you like to be notified.
22
31
  attr_accessor :expiration_event_in
23
32
 
@@ -33,9 +42,15 @@ module Akeyless
33
42
  # Content of the certificate's private key in a Base64 format.
34
43
  attr_accessor :key_data
35
44
 
45
+ # Deprecated - use description
46
+ attr_accessor :metadata
47
+
36
48
  # Certificate name
37
49
  attr_accessor :name
38
50
 
51
+ # List of the existent tags that will be removed from this item
52
+ attr_accessor :rm_tag
53
+
39
54
  # Authentication token (see `/auth` and `/configure`)
40
55
  attr_accessor :token
41
56
 
@@ -45,13 +60,18 @@ module Akeyless
45
60
  # Attribute mapping from ruby-style variable name to JSON key.
46
61
  def self.attribute_map
47
62
  {
63
+ :'add_tag' => :'add-tag',
48
64
  :'certificate_data' => :'certificate-data',
65
+ :'delete_protection' => :'delete_protection',
66
+ :'description' => :'description',
49
67
  :'expiration_event_in' => :'expiration-event-in',
50
68
  :'format' => :'format',
51
69
  :'json' => :'json',
52
70
  :'key' => :'key',
53
71
  :'key_data' => :'key-data',
72
+ :'metadata' => :'metadata',
54
73
  :'name' => :'name',
74
+ :'rm_tag' => :'rm-tag',
55
75
  :'token' => :'token',
56
76
  :'uid_token' => :'uid-token'
57
77
  }
@@ -65,13 +85,18 @@ module Akeyless
65
85
  # Attribute type mapping.
66
86
  def self.openapi_types
67
87
  {
88
+ :'add_tag' => :'Array<String>',
68
89
  :'certificate_data' => :'String',
90
+ :'delete_protection' => :'String',
91
+ :'description' => :'String',
69
92
  :'expiration_event_in' => :'Array<String>',
70
93
  :'format' => :'String',
71
94
  :'json' => :'Boolean',
72
95
  :'key' => :'String',
73
96
  :'key_data' => :'String',
97
+ :'metadata' => :'String',
74
98
  :'name' => :'String',
99
+ :'rm_tag' => :'Array<String>',
75
100
  :'token' => :'String',
76
101
  :'uid_token' => :'String'
77
102
  }
@@ -98,10 +123,24 @@ module Akeyless
98
123
  h[k.to_sym] = v
99
124
  }
100
125
 
126
+ if attributes.key?(:'add_tag')
127
+ if (value = attributes[:'add_tag']).is_a?(Array)
128
+ self.add_tag = value
129
+ end
130
+ end
131
+
101
132
  if attributes.key?(:'certificate_data')
102
133
  self.certificate_data = attributes[:'certificate_data']
103
134
  end
104
135
 
136
+ if attributes.key?(:'delete_protection')
137
+ self.delete_protection = attributes[:'delete_protection']
138
+ end
139
+
140
+ if attributes.key?(:'description')
141
+ self.description = attributes[:'description']
142
+ end
143
+
105
144
  if attributes.key?(:'expiration_event_in')
106
145
  if (value = attributes[:'expiration_event_in']).is_a?(Array)
107
146
  self.expiration_event_in = value
@@ -126,10 +165,20 @@ module Akeyless
126
165
  self.key_data = attributes[:'key_data']
127
166
  end
128
167
 
168
+ if attributes.key?(:'metadata')
169
+ self.metadata = attributes[:'metadata']
170
+ end
171
+
129
172
  if attributes.key?(:'name')
130
173
  self.name = attributes[:'name']
131
174
  end
132
175
 
176
+ if attributes.key?(:'rm_tag')
177
+ if (value = attributes[:'rm_tag']).is_a?(Array)
178
+ self.rm_tag = value
179
+ end
180
+ end
181
+
133
182
  if attributes.key?(:'token')
134
183
  self.token = attributes[:'token']
135
184
  end
@@ -162,13 +211,18 @@ module Akeyless
162
211
  def ==(o)
163
212
  return true if self.equal?(o)
164
213
  self.class == o.class &&
214
+ add_tag == o.add_tag &&
165
215
  certificate_data == o.certificate_data &&
216
+ delete_protection == o.delete_protection &&
217
+ description == o.description &&
166
218
  expiration_event_in == o.expiration_event_in &&
167
219
  format == o.format &&
168
220
  json == o.json &&
169
221
  key == o.key &&
170
222
  key_data == o.key_data &&
223
+ metadata == o.metadata &&
171
224
  name == o.name &&
225
+ rm_tag == o.rm_tag &&
172
226
  token == o.token &&
173
227
  uid_token == o.uid_token
174
228
  end
@@ -182,7 +236,7 @@ module Akeyless
182
236
  # Calculates hash code according to all attributes.
183
237
  # @return [Integer] Hash code
184
238
  def hash
185
- [certificate_data, expiration_event_in, format, json, key, key_data, name, token, uid_token].hash
239
+ [add_tag, certificate_data, delete_protection, description, expiration_event_in, format, json, key, key_data, metadata, name, rm_tag, token, uid_token].hash
186
240
  end
187
241
 
188
242
  # Builds the object from hash
@@ -85,6 +85,9 @@ module Akeyless
85
85
  # \"Custom rotation command (relevant only for ssh target)
86
86
  attr_accessor :rotator_custom_cmd
87
87
 
88
+ # Rotate same password for each host from the Linked Target (relevant only for Linked Target)
89
+ attr_accessor :same_password
90
+
88
91
  # Allow providing external user for a domain users (relevant only for rdp)
89
92
  attr_accessor :secure_access_allow_external_user
90
93
 
@@ -165,6 +168,7 @@ module Akeyless
165
168
  :'rotation_interval' => :'rotation-interval',
166
169
  :'rotator_creds_type' => :'rotator-creds-type',
167
170
  :'rotator_custom_cmd' => :'rotator-custom-cmd',
171
+ :'same_password' => :'same-password',
168
172
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
169
173
  :'secure_access_aws_account_id' => :'secure-access-aws-account-id',
170
174
  :'secure_access_aws_native_cli' => :'secure-access-aws-native-cli',
@@ -217,6 +221,7 @@ module Akeyless
217
221
  :'rotation_interval' => :'String',
218
222
  :'rotator_creds_type' => :'String',
219
223
  :'rotator_custom_cmd' => :'String',
224
+ :'same_password' => :'String',
220
225
  :'secure_access_allow_external_user' => :'Boolean',
221
226
  :'secure_access_aws_account_id' => :'String',
222
227
  :'secure_access_aws_native_cli' => :'Boolean',
@@ -367,6 +372,10 @@ module Akeyless
367
372
  self.rotator_custom_cmd = attributes[:'rotator_custom_cmd']
368
373
  end
369
374
 
375
+ if attributes.key?(:'same_password')
376
+ self.same_password = attributes[:'same_password']
377
+ end
378
+
370
379
  if attributes.key?(:'secure_access_allow_external_user')
371
380
  self.secure_access_allow_external_user = attributes[:'secure_access_allow_external_user']
372
381
  else
@@ -496,6 +505,7 @@ module Akeyless
496
505
  rotation_interval == o.rotation_interval &&
497
506
  rotator_creds_type == o.rotator_creds_type &&
498
507
  rotator_custom_cmd == o.rotator_custom_cmd &&
508
+ same_password == o.same_password &&
499
509
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
500
510
  secure_access_aws_account_id == o.secure_access_aws_account_id &&
501
511
  secure_access_aws_native_cli == o.secure_access_aws_native_cli &&
@@ -525,7 +535,7 @@ module Akeyless
525
535
  # Calculates hash code according to all attributes.
526
536
  # @return [Integer] Hash code
527
537
  def hash
528
- [add_tag, api_id, api_key, auto_rotate, aws_region, custom_payload, description, gcp_key, json, keep_prev_version, key, name, new_metadata, new_name, new_version, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, token, uid_token].hash
538
+ [add_tag, api_id, api_key, auto_rotate, aws_region, custom_payload, description, gcp_key, json, keep_prev_version, key, name, new_metadata, new_name, new_version, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, same_password, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, token, uid_token].hash
529
539
  end
530
540
 
531
541
  # Builds the object from hash
@@ -18,6 +18,12 @@ module Akeyless
18
18
  # for personal password manager
19
19
  attr_accessor :accessibility
20
20
 
21
+ # For Password Management use, additional fields
22
+ attr_accessor :custom_field
23
+
24
+ # For Password Management use, reflect the website context
25
+ attr_accessor :inject_url
26
+
21
27
  # Set output format to JSON
22
28
  attr_accessor :json
23
29
 
@@ -37,16 +43,7 @@ module Akeyless
37
43
  attr_accessor :new_version
38
44
 
39
45
  # For Password Management use, additional fields
40
- attr_accessor :password_manager_custom_field
41
-
42
- # For Password Management use, reflect the website context
43
- attr_accessor :password_manager_inject_url
44
-
45
- # For Password Management use, additional fields
46
- attr_accessor :password_manager_password
47
-
48
- # For Password Management use
49
- attr_accessor :password_manager_username
46
+ attr_accessor :password
50
47
 
51
48
  # Authentication token (see `/auth` and `/configure`)
52
49
  attr_accessor :token
@@ -54,6 +51,9 @@ module Akeyless
54
51
  # The universal identity token, Required only for universal_identity authentication
55
52
  attr_accessor :uid_token
56
53
 
54
+ # For Password Management use
55
+ attr_accessor :username
56
+
57
57
  # The new secret value
58
58
  attr_accessor :value
59
59
 
@@ -61,18 +61,18 @@ module Akeyless
61
61
  def self.attribute_map
62
62
  {
63
63
  :'accessibility' => :'accessibility',
64
+ :'custom_field' => :'custom-field',
65
+ :'inject_url' => :'inject-url',
64
66
  :'json' => :'json',
65
67
  :'keep_prev_version' => :'keep-prev-version',
66
68
  :'key' => :'key',
67
69
  :'multiline' => :'multiline',
68
70
  :'name' => :'name',
69
71
  :'new_version' => :'new-version',
70
- :'password_manager_custom_field' => :'password-manager-custom-field',
71
- :'password_manager_inject_url' => :'password-manager-inject-url',
72
- :'password_manager_password' => :'password-manager-password',
73
- :'password_manager_username' => :'password-manager-username',
72
+ :'password' => :'password',
74
73
  :'token' => :'token',
75
74
  :'uid_token' => :'uid-token',
75
+ :'username' => :'username',
76
76
  :'value' => :'value'
77
77
  }
78
78
  end
@@ -86,18 +86,18 @@ module Akeyless
86
86
  def self.openapi_types
87
87
  {
88
88
  :'accessibility' => :'String',
89
+ :'custom_field' => :'Hash<String, String>',
90
+ :'inject_url' => :'Array<String>',
89
91
  :'json' => :'Boolean',
90
92
  :'keep_prev_version' => :'String',
91
93
  :'key' => :'String',
92
94
  :'multiline' => :'Boolean',
93
95
  :'name' => :'String',
94
96
  :'new_version' => :'Boolean',
95
- :'password_manager_custom_field' => :'Hash<String, String>',
96
- :'password_manager_inject_url' => :'Array<String>',
97
- :'password_manager_password' => :'String',
98
- :'password_manager_username' => :'String',
97
+ :'password' => :'String',
99
98
  :'token' => :'String',
100
99
  :'uid_token' => :'String',
100
+ :'username' => :'String',
101
101
  :'value' => :'String'
102
102
  }
103
103
  end
@@ -129,6 +129,18 @@ module Akeyless
129
129
  self.accessibility = 'regular'
130
130
  end
131
131
 
132
+ if attributes.key?(:'custom_field')
133
+ if (value = attributes[:'custom_field']).is_a?(Hash)
134
+ self.custom_field = value
135
+ end
136
+ end
137
+
138
+ if attributes.key?(:'inject_url')
139
+ if (value = attributes[:'inject_url']).is_a?(Array)
140
+ self.inject_url = value
141
+ end
142
+ end
143
+
132
144
  if attributes.key?(:'json')
133
145
  self.json = attributes[:'json']
134
146
  else
@@ -155,24 +167,8 @@ module Akeyless
155
167
  self.new_version = attributes[:'new_version']
156
168
  end
157
169
 
158
- if attributes.key?(:'password_manager_custom_field')
159
- if (value = attributes[:'password_manager_custom_field']).is_a?(Hash)
160
- self.password_manager_custom_field = value
161
- end
162
- end
163
-
164
- if attributes.key?(:'password_manager_inject_url')
165
- if (value = attributes[:'password_manager_inject_url']).is_a?(Array)
166
- self.password_manager_inject_url = value
167
- end
168
- end
169
-
170
- if attributes.key?(:'password_manager_password')
171
- self.password_manager_password = attributes[:'password_manager_password']
172
- end
173
-
174
- if attributes.key?(:'password_manager_username')
175
- self.password_manager_username = attributes[:'password_manager_username']
170
+ if attributes.key?(:'password')
171
+ self.password = attributes[:'password']
176
172
  end
177
173
 
178
174
  if attributes.key?(:'token')
@@ -183,6 +179,10 @@ module Akeyless
183
179
  self.uid_token = attributes[:'uid_token']
184
180
  end
185
181
 
182
+ if attributes.key?(:'username')
183
+ self.username = attributes[:'username']
184
+ end
185
+
186
186
  if attributes.key?(:'value')
187
187
  self.value = attributes[:'value']
188
188
  end
@@ -217,18 +217,18 @@ module Akeyless
217
217
  return true if self.equal?(o)
218
218
  self.class == o.class &&
219
219
  accessibility == o.accessibility &&
220
+ custom_field == o.custom_field &&
221
+ inject_url == o.inject_url &&
220
222
  json == o.json &&
221
223
  keep_prev_version == o.keep_prev_version &&
222
224
  key == o.key &&
223
225
  multiline == o.multiline &&
224
226
  name == o.name &&
225
227
  new_version == o.new_version &&
226
- password_manager_custom_field == o.password_manager_custom_field &&
227
- password_manager_inject_url == o.password_manager_inject_url &&
228
- password_manager_password == o.password_manager_password &&
229
- password_manager_username == o.password_manager_username &&
228
+ password == o.password &&
230
229
  token == o.token &&
231
230
  uid_token == o.uid_token &&
231
+ username == o.username &&
232
232
  value == o.value
233
233
  end
234
234
 
@@ -241,7 +241,7 @@ module Akeyless
241
241
  # Calculates hash code according to all attributes.
242
242
  # @return [Integer] Hash code
243
243
  def hash
244
- [accessibility, json, keep_prev_version, key, multiline, name, new_version, password_manager_custom_field, password_manager_inject_url, password_manager_password, password_manager_username, token, uid_token, value].hash
244
+ [accessibility, custom_field, inject_url, json, keep_prev_version, key, multiline, name, new_version, password, token, uid_token, username, value].hash
245
245
  end
246
246
 
247
247
  # Builds the object from hash
@@ -11,5 +11,5 @@ OpenAPI Generator version: 7.0.0-SNAPSHOT
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '3.3.7'
14
+ VERSION = '3.3.9'
15
15
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: akeyless
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.3.7
4
+ version: 3.3.9
5
5
  platform: ruby
6
6
  authors:
7
7
  - OpenAPI-Generator
8
- autorequire:
8
+ autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-06-08 00:00:00.000000000 Z
11
+ date: 2023-06-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: typhoeus
@@ -2563,7 +2563,7 @@ homepage: https://openapi-generator.tech
2563
2563
  licenses:
2564
2564
  - Unlicense
2565
2565
  metadata: {}
2566
- post_install_message:
2566
+ post_install_message:
2567
2567
  rdoc_options: []
2568
2568
  require_paths:
2569
2569
  - lib
@@ -2579,7 +2579,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
2579
2579
  version: '0'
2580
2580
  requirements: []
2581
2581
  rubygems_version: 3.4.10
2582
- signing_key:
2582
+ signing_key:
2583
2583
  specification_version: 4
2584
2584
  summary: Akeyless API Ruby Gem
2585
2585
  test_files: