akeyless 3.3.8 → 3.3.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +2 -1
  3. data/docs/AccountGeneralSettings.md +6 -0
  4. data/docs/CertificateChainInfo.md +2 -0
  5. data/docs/CreateRotatedSecret.md +2 -0
  6. data/docs/CreateSecret.md +8 -8
  7. data/docs/DSProducerDetails.md +2 -0
  8. data/docs/ElasticsearchLogForwardingConfig.md +4 -0
  9. data/docs/GatewayCreateProducerLdap.md +2 -0
  10. data/docs/GatewayUpdateProducerLdap.md +2 -0
  11. data/docs/GetRotatedSecretValue.md +2 -0
  12. data/docs/LogForwardingConfigPart.md +2 -0
  13. data/docs/LogstashLogForwardingConfig.md +5 -1
  14. data/docs/RotatedSecretDetailsInfo.md +3 -1
  15. data/docs/SplunkLogForwardingConfig.md +4 -0
  16. data/docs/SumologicLogForwardingConfig.md +22 -0
  17. data/docs/SyslogLogForwardingConfig.md +5 -1
  18. data/docs/TargetTypeDetailsInput.md +1 -1
  19. data/docs/UpdateAccountSettings.md +4 -0
  20. data/docs/UpdateCertificateValue.md +10 -0
  21. data/docs/UpdateRotatedSecret.md +2 -0
  22. data/docs/UpdateSecretVal.md +8 -8
  23. data/lib/akeyless/models/account_general_settings.rb +30 -1
  24. data/lib/akeyless/models/certificate_chain_info.rb +10 -1
  25. data/lib/akeyless/models/create_rotated_secret.rb +11 -1
  26. data/lib/akeyless/models/create_secret.rb +41 -41
  27. data/lib/akeyless/models/ds_producer_details.rb +10 -1
  28. data/lib/akeyless/models/elasticsearch_log_forwarding_config.rb +19 -1
  29. data/lib/akeyless/models/gateway_create_producer_ldap.rb +11 -1
  30. data/lib/akeyless/models/gateway_update_producer_ldap.rb +11 -1
  31. data/lib/akeyless/models/get_rotated_secret_value.rb +11 -1
  32. data/lib/akeyless/models/log_forwarding_config_part.rb +10 -1
  33. data/lib/akeyless/models/logstash_log_forwarding_config.rb +22 -4
  34. data/lib/akeyless/models/rotated_secret_details_info.rb +13 -4
  35. data/lib/akeyless/models/splunk_log_forwarding_config.rb +19 -1
  36. data/lib/akeyless/models/sumologic_log_forwarding_config.rb +237 -0
  37. data/lib/akeyless/models/syslog_log_forwarding_config.rb +22 -4
  38. data/lib/akeyless/models/target_type_details_input.rb +1 -0
  39. data/lib/akeyless/models/update_account_settings.rb +21 -1
  40. data/lib/akeyless/models/update_certificate_value.rb +55 -1
  41. data/lib/akeyless/models/update_rotated_secret.rb +11 -1
  42. data/lib/akeyless/models/update_secret_val.rb +41 -41
  43. data/lib/akeyless/version.rb +1 -1
  44. data/lib/akeyless.rb +1 -0
  45. data/spec/models/sumologic_log_forwarding_config_spec.rb +46 -0
  46. metadata +624 -620
@@ -80,6 +80,9 @@ module Akeyless
80
80
  # Rotator Type
81
81
  attr_accessor :rotator_type
82
82
 
83
+ # Rotate same password for each host from the Linked Target (relevant only for Linked Target)
84
+ attr_accessor :same_password
85
+
83
86
  # Allow providing external user for a domain users (relevant only for rdp)
84
87
  attr_accessor :secure_access_allow_external_user
85
88
 
@@ -171,6 +174,7 @@ module Akeyless
171
174
  :'rotator_creds_type' => :'rotator-creds-type',
172
175
  :'rotator_custom_cmd' => :'rotator-custom-cmd',
173
176
  :'rotator_type' => :'rotator-type',
177
+ :'same_password' => :'same-password',
174
178
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
175
179
  :'secure_access_aws_account_id' => :'secure-access-aws-account-id',
176
180
  :'secure_access_aws_native_cli' => :'secure-access-aws-native-cli',
@@ -226,6 +230,7 @@ module Akeyless
226
230
  :'rotator_creds_type' => :'String',
227
231
  :'rotator_custom_cmd' => :'String',
228
232
  :'rotator_type' => :'String',
233
+ :'same_password' => :'String',
229
234
  :'secure_access_allow_external_user' => :'Boolean',
230
235
  :'secure_access_aws_account_id' => :'String',
231
236
  :'secure_access_aws_native_cli' => :'Boolean',
@@ -368,6 +373,10 @@ module Akeyless
368
373
  self.rotator_type = attributes[:'rotator_type']
369
374
  end
370
375
 
376
+ if attributes.key?(:'same_password')
377
+ self.same_password = attributes[:'same_password']
378
+ end
379
+
371
380
  if attributes.key?(:'secure_access_allow_external_user')
372
381
  self.secure_access_allow_external_user = attributes[:'secure_access_allow_external_user']
373
382
  else
@@ -524,6 +533,7 @@ module Akeyless
524
533
  rotator_creds_type == o.rotator_creds_type &&
525
534
  rotator_custom_cmd == o.rotator_custom_cmd &&
526
535
  rotator_type == o.rotator_type &&
536
+ same_password == o.same_password &&
527
537
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
528
538
  secure_access_aws_account_id == o.secure_access_aws_account_id &&
529
539
  secure_access_aws_native_cli == o.secure_access_aws_native_cli &&
@@ -557,7 +567,7 @@ module Akeyless
557
567
  # Calculates hash code according to all attributes.
558
568
  # @return [Integer] Hash code
559
569
  def hash
560
- [api_id, api_key, application_id, authentication_credentials, auto_rotate, aws_region, custom_payload, delete_protection, description, gcp_key, json, key, metadata, name, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, rotator_type, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, tags, target_name, token, uid_token, user_attribute, user_dn].hash
570
+ [api_id, api_key, application_id, authentication_credentials, auto_rotate, aws_region, custom_payload, delete_protection, description, gcp_key, json, key, metadata, name, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, tags, target_name, token, uid_token, user_attribute, user_dn].hash
561
571
  end
562
572
 
563
573
  # Builds the object from hash
@@ -18,12 +18,18 @@ module Akeyless
18
18
  # for personal password manager
19
19
  attr_accessor :accessibility
20
20
 
21
+ # For Password Management use, additional fields
22
+ attr_accessor :custom_field
23
+
21
24
  # Protection from accidental deletion of this item [true/false]
22
25
  attr_accessor :delete_protection
23
26
 
24
27
  # Description of the object
25
28
  attr_accessor :description
26
29
 
30
+ # For Password Management use, reflect the website context
31
+ attr_accessor :inject_url
32
+
27
33
  # Set output format to JSON
28
34
  attr_accessor :json
29
35
 
@@ -37,16 +43,7 @@ module Akeyless
37
43
  attr_accessor :name
38
44
 
39
45
  # For Password Management use, additional fields
40
- attr_accessor :password_manager_custom_field
41
-
42
- # For Password Management use, reflect the website context
43
- attr_accessor :password_manager_inject_url
44
-
45
- # For Password Management use, additional fields
46
- attr_accessor :password_manager_password
47
-
48
- # For Password Management use
49
- attr_accessor :password_manager_username
46
+ attr_accessor :password
50
47
 
51
48
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
52
49
  attr_accessor :protection_key
@@ -90,6 +87,9 @@ module Akeyless
90
87
  # The universal identity token, Required only for universal_identity authentication
91
88
  attr_accessor :uid_token
92
89
 
90
+ # For Password Management use
91
+ attr_accessor :username
92
+
93
93
  # The secret value
94
94
  attr_accessor :value
95
95
 
@@ -97,16 +97,15 @@ module Akeyless
97
97
  def self.attribute_map
98
98
  {
99
99
  :'accessibility' => :'accessibility',
100
+ :'custom_field' => :'custom-field',
100
101
  :'delete_protection' => :'delete_protection',
101
102
  :'description' => :'description',
103
+ :'inject_url' => :'inject-url',
102
104
  :'json' => :'json',
103
105
  :'metadata' => :'metadata',
104
106
  :'multiline_value' => :'multiline_value',
105
107
  :'name' => :'name',
106
- :'password_manager_custom_field' => :'password-manager-custom-field',
107
- :'password_manager_inject_url' => :'password-manager-inject-url',
108
- :'password_manager_password' => :'password-manager-password',
109
- :'password_manager_username' => :'password-manager-username',
108
+ :'password' => :'password',
110
109
  :'protection_key' => :'protection_key',
111
110
  :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
112
111
  :'secure_access_enable' => :'secure-access-enable',
@@ -121,6 +120,7 @@ module Akeyless
121
120
  :'token' => :'token',
122
121
  :'type' => :'type',
123
122
  :'uid_token' => :'uid-token',
123
+ :'username' => :'username',
124
124
  :'value' => :'value'
125
125
  }
126
126
  end
@@ -134,16 +134,15 @@ module Akeyless
134
134
  def self.openapi_types
135
135
  {
136
136
  :'accessibility' => :'String',
137
+ :'custom_field' => :'Hash<String, String>',
137
138
  :'delete_protection' => :'String',
138
139
  :'description' => :'String',
140
+ :'inject_url' => :'Array<String>',
139
141
  :'json' => :'Boolean',
140
142
  :'metadata' => :'String',
141
143
  :'multiline_value' => :'Boolean',
142
144
  :'name' => :'String',
143
- :'password_manager_custom_field' => :'Hash<String, String>',
144
- :'password_manager_inject_url' => :'Array<String>',
145
- :'password_manager_password' => :'String',
146
- :'password_manager_username' => :'String',
145
+ :'password' => :'String',
147
146
  :'protection_key' => :'String',
148
147
  :'secure_access_bastion_issuer' => :'String',
149
148
  :'secure_access_enable' => :'String',
@@ -158,6 +157,7 @@ module Akeyless
158
157
  :'token' => :'String',
159
158
  :'type' => :'String',
160
159
  :'uid_token' => :'String',
160
+ :'username' => :'String',
161
161
  :'value' => :'String'
162
162
  }
163
163
  end
@@ -189,6 +189,12 @@ module Akeyless
189
189
  self.accessibility = 'regular'
190
190
  end
191
191
 
192
+ if attributes.key?(:'custom_field')
193
+ if (value = attributes[:'custom_field']).is_a?(Hash)
194
+ self.custom_field = value
195
+ end
196
+ end
197
+
192
198
  if attributes.key?(:'delete_protection')
193
199
  self.delete_protection = attributes[:'delete_protection']
194
200
  end
@@ -197,6 +203,12 @@ module Akeyless
197
203
  self.description = attributes[:'description']
198
204
  end
199
205
 
206
+ if attributes.key?(:'inject_url')
207
+ if (value = attributes[:'inject_url']).is_a?(Array)
208
+ self.inject_url = value
209
+ end
210
+ end
211
+
200
212
  if attributes.key?(:'json')
201
213
  self.json = attributes[:'json']
202
214
  else
@@ -215,24 +227,8 @@ module Akeyless
215
227
  self.name = attributes[:'name']
216
228
  end
217
229
 
218
- if attributes.key?(:'password_manager_custom_field')
219
- if (value = attributes[:'password_manager_custom_field']).is_a?(Hash)
220
- self.password_manager_custom_field = value
221
- end
222
- end
223
-
224
- if attributes.key?(:'password_manager_inject_url')
225
- if (value = attributes[:'password_manager_inject_url']).is_a?(Array)
226
- self.password_manager_inject_url = value
227
- end
228
- end
229
-
230
- if attributes.key?(:'password_manager_password')
231
- self.password_manager_password = attributes[:'password_manager_password']
232
- end
233
-
234
- if attributes.key?(:'password_manager_username')
235
- self.password_manager_username = attributes[:'password_manager_username']
230
+ if attributes.key?(:'password')
231
+ self.password = attributes[:'password']
236
232
  end
237
233
 
238
234
  if attributes.key?(:'protection_key')
@@ -301,6 +297,10 @@ module Akeyless
301
297
  self.uid_token = attributes[:'uid_token']
302
298
  end
303
299
 
300
+ if attributes.key?(:'username')
301
+ self.username = attributes[:'username']
302
+ end
303
+
304
304
  if attributes.key?(:'value')
305
305
  self.value = attributes[:'value']
306
306
  end
@@ -335,16 +335,15 @@ module Akeyless
335
335
  return true if self.equal?(o)
336
336
  self.class == o.class &&
337
337
  accessibility == o.accessibility &&
338
+ custom_field == o.custom_field &&
338
339
  delete_protection == o.delete_protection &&
339
340
  description == o.description &&
341
+ inject_url == o.inject_url &&
340
342
  json == o.json &&
341
343
  metadata == o.metadata &&
342
344
  multiline_value == o.multiline_value &&
343
345
  name == o.name &&
344
- password_manager_custom_field == o.password_manager_custom_field &&
345
- password_manager_inject_url == o.password_manager_inject_url &&
346
- password_manager_password == o.password_manager_password &&
347
- password_manager_username == o.password_manager_username &&
346
+ password == o.password &&
348
347
  protection_key == o.protection_key &&
349
348
  secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
350
349
  secure_access_enable == o.secure_access_enable &&
@@ -359,6 +358,7 @@ module Akeyless
359
358
  token == o.token &&
360
359
  type == o.type &&
361
360
  uid_token == o.uid_token &&
361
+ username == o.username &&
362
362
  value == o.value
363
363
  end
364
364
 
@@ -371,7 +371,7 @@ module Akeyless
371
371
  # Calculates hash code according to all attributes.
372
372
  # @return [Integer] Hash code
373
373
  def hash
374
- [accessibility, delete_protection, description, json, metadata, multiline_value, name, password_manager_custom_field, password_manager_inject_url, password_manager_password, password_manager_username, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, value].hash
374
+ [accessibility, custom_field, delete_protection, description, inject_url, json, metadata, multiline_value, name, password, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, username, value].hash
375
375
  end
376
376
 
377
377
  # Builds the object from hash
@@ -277,6 +277,8 @@ module Akeyless
277
277
 
278
278
  attr_accessor :ldap_certificate
279
279
 
280
+ attr_accessor :ldap_group_dn
281
+
280
282
  attr_accessor :ldap_token_expiration
281
283
 
282
284
  attr_accessor :ldap_url
@@ -580,6 +582,7 @@ module Akeyless
580
582
  :'ldap_bind_dn' => :'ldap_bind_dn',
581
583
  :'ldap_bind_password' => :'ldap_bind_password',
582
584
  :'ldap_certificate' => :'ldap_certificate',
585
+ :'ldap_group_dn' => :'ldap_group_dn',
583
586
  :'ldap_token_expiration' => :'ldap_token_expiration',
584
587
  :'ldap_url' => :'ldap_url',
585
588
  :'ldap_user_attr' => :'ldap_user_attr',
@@ -799,6 +802,7 @@ module Akeyless
799
802
  :'ldap_bind_dn' => :'String',
800
803
  :'ldap_bind_password' => :'String',
801
804
  :'ldap_certificate' => :'String',
805
+ :'ldap_group_dn' => :'String',
802
806
  :'ldap_token_expiration' => :'String',
803
807
  :'ldap_url' => :'String',
804
808
  :'ldap_user_attr' => :'String',
@@ -1425,6 +1429,10 @@ module Akeyless
1425
1429
  self.ldap_certificate = attributes[:'ldap_certificate']
1426
1430
  end
1427
1431
 
1432
+ if attributes.key?(:'ldap_group_dn')
1433
+ self.ldap_group_dn = attributes[:'ldap_group_dn']
1434
+ end
1435
+
1428
1436
  if attributes.key?(:'ldap_token_expiration')
1429
1437
  self.ldap_token_expiration = attributes[:'ldap_token_expiration']
1430
1438
  end
@@ -1908,6 +1916,7 @@ module Akeyless
1908
1916
  ldap_bind_dn == o.ldap_bind_dn &&
1909
1917
  ldap_bind_password == o.ldap_bind_password &&
1910
1918
  ldap_certificate == o.ldap_certificate &&
1919
+ ldap_group_dn == o.ldap_group_dn &&
1911
1920
  ldap_token_expiration == o.ldap_token_expiration &&
1912
1921
  ldap_url == o.ldap_url &&
1913
1922
  ldap_user_attr == o.ldap_user_attr &&
@@ -2001,7 +2010,7 @@ module Akeyless
2001
2010
  # Calculates hash code according to all attributes.
2002
2011
  # @return [Integer] Hash code
2003
2012
  def hash
2004
- [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_region, aws_role_arns, aws_secret_access_key, aws_session_token, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, create_sync_url, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_repository_path, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, grant_types, groups, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_bearer_token, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, oracle_creation_statements, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2013
+ [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_region, aws_role_arns, aws_secret_access_key, aws_session_token, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, create_sync_url, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_repository_path, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, grant_types, groups, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_bearer_token, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, oracle_creation_statements, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2005
2014
  end
2006
2015
 
2007
2016
  # Builds the object from hash
@@ -21,6 +21,8 @@ module Akeyless
21
21
 
22
22
  attr_accessor :elasticsearch_cloud_id
23
23
 
24
+ attr_accessor :elasticsearch_enable_tls
25
+
24
26
  attr_accessor :elasticsearch_index
25
27
 
26
28
  attr_accessor :elasticsearch_nodes
@@ -29,6 +31,8 @@ module Akeyless
29
31
 
30
32
  attr_accessor :elasticsearch_server_type
31
33
 
34
+ attr_accessor :elasticsearch_tls_certificate
35
+
32
36
  attr_accessor :elasticsearch_user_name
33
37
 
34
38
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -37,10 +41,12 @@ module Akeyless
37
41
  :'elasticsearch_api_key' => :'elasticsearch_api_key',
38
42
  :'elasticsearch_auth_type' => :'elasticsearch_auth_type',
39
43
  :'elasticsearch_cloud_id' => :'elasticsearch_cloud_id',
44
+ :'elasticsearch_enable_tls' => :'elasticsearch_enable_tls',
40
45
  :'elasticsearch_index' => :'elasticsearch_index',
41
46
  :'elasticsearch_nodes' => :'elasticsearch_nodes',
42
47
  :'elasticsearch_password' => :'elasticsearch_password',
43
48
  :'elasticsearch_server_type' => :'elasticsearch_server_type',
49
+ :'elasticsearch_tls_certificate' => :'elasticsearch_tls_certificate',
44
50
  :'elasticsearch_user_name' => :'elasticsearch_user_name'
45
51
  }
46
52
  end
@@ -56,10 +62,12 @@ module Akeyless
56
62
  :'elasticsearch_api_key' => :'String',
57
63
  :'elasticsearch_auth_type' => :'String',
58
64
  :'elasticsearch_cloud_id' => :'String',
65
+ :'elasticsearch_enable_tls' => :'Boolean',
59
66
  :'elasticsearch_index' => :'String',
60
67
  :'elasticsearch_nodes' => :'String',
61
68
  :'elasticsearch_password' => :'String',
62
69
  :'elasticsearch_server_type' => :'String',
70
+ :'elasticsearch_tls_certificate' => :'String',
63
71
  :'elasticsearch_user_name' => :'String'
64
72
  }
65
73
  end
@@ -97,6 +105,10 @@ module Akeyless
97
105
  self.elasticsearch_cloud_id = attributes[:'elasticsearch_cloud_id']
98
106
  end
99
107
 
108
+ if attributes.key?(:'elasticsearch_enable_tls')
109
+ self.elasticsearch_enable_tls = attributes[:'elasticsearch_enable_tls']
110
+ end
111
+
100
112
  if attributes.key?(:'elasticsearch_index')
101
113
  self.elasticsearch_index = attributes[:'elasticsearch_index']
102
114
  end
@@ -113,6 +125,10 @@ module Akeyless
113
125
  self.elasticsearch_server_type = attributes[:'elasticsearch_server_type']
114
126
  end
115
127
 
128
+ if attributes.key?(:'elasticsearch_tls_certificate')
129
+ self.elasticsearch_tls_certificate = attributes[:'elasticsearch_tls_certificate']
130
+ end
131
+
116
132
  if attributes.key?(:'elasticsearch_user_name')
117
133
  self.elasticsearch_user_name = attributes[:'elasticsearch_user_name']
118
134
  end
@@ -139,10 +155,12 @@ module Akeyless
139
155
  elasticsearch_api_key == o.elasticsearch_api_key &&
140
156
  elasticsearch_auth_type == o.elasticsearch_auth_type &&
141
157
  elasticsearch_cloud_id == o.elasticsearch_cloud_id &&
158
+ elasticsearch_enable_tls == o.elasticsearch_enable_tls &&
142
159
  elasticsearch_index == o.elasticsearch_index &&
143
160
  elasticsearch_nodes == o.elasticsearch_nodes &&
144
161
  elasticsearch_password == o.elasticsearch_password &&
145
162
  elasticsearch_server_type == o.elasticsearch_server_type &&
163
+ elasticsearch_tls_certificate == o.elasticsearch_tls_certificate &&
146
164
  elasticsearch_user_name == o.elasticsearch_user_name
147
165
  end
148
166
 
@@ -155,7 +173,7 @@ module Akeyless
155
173
  # Calculates hash code according to all attributes.
156
174
  # @return [Integer] Hash code
157
175
  def hash
158
- [elasticsearch_api_key, elasticsearch_auth_type, elasticsearch_cloud_id, elasticsearch_index, elasticsearch_nodes, elasticsearch_password, elasticsearch_server_type, elasticsearch_user_name].hash
176
+ [elasticsearch_api_key, elasticsearch_auth_type, elasticsearch_cloud_id, elasticsearch_enable_tls, elasticsearch_index, elasticsearch_nodes, elasticsearch_password, elasticsearch_server_type, elasticsearch_tls_certificate, elasticsearch_user_name].hash
159
177
  end
160
178
 
161
179
  # Builds the object from hash
@@ -28,6 +28,9 @@ module Akeyless
28
28
  # Externally provided username [true/false]
29
29
  attr_accessor :external_username
30
30
 
31
+ # Group DN which the temporary user should be added
32
+ attr_accessor :group_dn
33
+
31
34
  # Set output format to JSON
32
35
  attr_accessor :json
33
36
 
@@ -74,6 +77,7 @@ module Akeyless
74
77
  :'bind_dn_password' => :'bind-dn-password',
75
78
  :'delete_protection' => :'delete_protection',
76
79
  :'external_username' => :'external-username',
80
+ :'group_dn' => :'group-dn',
77
81
  :'json' => :'json',
78
82
  :'ldap_ca_cert' => :'ldap-ca-cert',
79
83
  :'ldap_url' => :'ldap-url',
@@ -102,6 +106,7 @@ module Akeyless
102
106
  :'bind_dn_password' => :'String',
103
107
  :'delete_protection' => :'String',
104
108
  :'external_username' => :'String',
109
+ :'group_dn' => :'String',
105
110
  :'json' => :'Boolean',
106
111
  :'ldap_ca_cert' => :'String',
107
112
  :'ldap_url' => :'String',
@@ -157,6 +162,10 @@ module Akeyless
157
162
  self.external_username = 'false'
158
163
  end
159
164
 
165
+ if attributes.key?(:'group_dn')
166
+ self.group_dn = attributes[:'group_dn']
167
+ end
168
+
160
169
  if attributes.key?(:'json')
161
170
  self.json = attributes[:'json']
162
171
  else
@@ -243,6 +252,7 @@ module Akeyless
243
252
  bind_dn_password == o.bind_dn_password &&
244
253
  delete_protection == o.delete_protection &&
245
254
  external_username == o.external_username &&
255
+ group_dn == o.group_dn &&
246
256
  json == o.json &&
247
257
  ldap_ca_cert == o.ldap_ca_cert &&
248
258
  ldap_url == o.ldap_url &&
@@ -267,7 +277,7 @@ module Akeyless
267
277
  # Calculates hash code according to all attributes.
268
278
  # @return [Integer] Hash code
269
279
  def hash
270
- [bind_dn, bind_dn_password, delete_protection, external_username, json, ldap_ca_cert, ldap_url, name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
280
+ [bind_dn, bind_dn_password, delete_protection, external_username, group_dn, json, ldap_ca_cert, ldap_url, name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
271
281
  end
272
282
 
273
283
  # Builds the object from hash
@@ -28,6 +28,9 @@ module Akeyless
28
28
  # Externally provided username [true/false]
29
29
  attr_accessor :external_username
30
30
 
31
+ # Group DN which the temporary user should be added
32
+ attr_accessor :group_dn
33
+
31
34
  # Set output format to JSON
32
35
  attr_accessor :json
33
36
 
@@ -77,6 +80,7 @@ module Akeyless
77
80
  :'bind_dn_password' => :'bind-dn-password',
78
81
  :'delete_protection' => :'delete_protection',
79
82
  :'external_username' => :'external-username',
83
+ :'group_dn' => :'group-dn',
80
84
  :'json' => :'json',
81
85
  :'ldap_ca_cert' => :'ldap-ca-cert',
82
86
  :'ldap_url' => :'ldap-url',
@@ -106,6 +110,7 @@ module Akeyless
106
110
  :'bind_dn_password' => :'String',
107
111
  :'delete_protection' => :'String',
108
112
  :'external_username' => :'String',
113
+ :'group_dn' => :'String',
109
114
  :'json' => :'Boolean',
110
115
  :'ldap_ca_cert' => :'String',
111
116
  :'ldap_url' => :'String',
@@ -162,6 +167,10 @@ module Akeyless
162
167
  self.external_username = 'false'
163
168
  end
164
169
 
170
+ if attributes.key?(:'group_dn')
171
+ self.group_dn = attributes[:'group_dn']
172
+ end
173
+
165
174
  if attributes.key?(:'json')
166
175
  self.json = attributes[:'json']
167
176
  else
@@ -252,6 +261,7 @@ module Akeyless
252
261
  bind_dn_password == o.bind_dn_password &&
253
262
  delete_protection == o.delete_protection &&
254
263
  external_username == o.external_username &&
264
+ group_dn == o.group_dn &&
255
265
  json == o.json &&
256
266
  ldap_ca_cert == o.ldap_ca_cert &&
257
267
  ldap_url == o.ldap_url &&
@@ -277,7 +287,7 @@ module Akeyless
277
287
  # Calculates hash code according to all attributes.
278
288
  # @return [Integer] Hash code
279
289
  def hash
280
- [bind_dn, bind_dn_password, delete_protection, external_username, json, ldap_ca_cert, ldap_url, name, new_name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
290
+ [bind_dn, bind_dn_password, delete_protection, external_username, group_dn, json, ldap_ca_cert, ldap_url, name, new_name, producer_encryption_key_name, tags, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
281
291
  end
282
292
 
283
293
  # Builds the object from hash
@@ -15,6 +15,9 @@ require 'time'
15
15
 
16
16
  module Akeyless
17
17
  class GetRotatedSecretValue
18
+ # Get rotated secret value of specific Host (relevant only for Linked Target)
19
+ attr_accessor :host
20
+
18
21
  # Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI
19
22
  attr_accessor :ignore_cache
20
23
 
@@ -36,6 +39,7 @@ module Akeyless
36
39
  # Attribute mapping from ruby-style variable name to JSON key.
37
40
  def self.attribute_map
38
41
  {
42
+ :'host' => :'host',
39
43
  :'ignore_cache' => :'ignore-cache',
40
44
  :'json' => :'json',
41
45
  :'names' => :'names',
@@ -53,6 +57,7 @@ module Akeyless
53
57
  # Attribute type mapping.
54
58
  def self.openapi_types
55
59
  {
60
+ :'host' => :'String',
56
61
  :'ignore_cache' => :'String',
57
62
  :'json' => :'Boolean',
58
63
  :'names' => :'String',
@@ -83,6 +88,10 @@ module Akeyless
83
88
  h[k.to_sym] = v
84
89
  }
85
90
 
91
+ if attributes.key?(:'host')
92
+ self.host = attributes[:'host']
93
+ end
94
+
86
95
  if attributes.key?(:'ignore_cache')
87
96
  self.ignore_cache = attributes[:'ignore_cache']
88
97
  else
@@ -135,6 +144,7 @@ module Akeyless
135
144
  def ==(o)
136
145
  return true if self.equal?(o)
137
146
  self.class == o.class &&
147
+ host == o.host &&
138
148
  ignore_cache == o.ignore_cache &&
139
149
  json == o.json &&
140
150
  names == o.names &&
@@ -152,7 +162,7 @@ module Akeyless
152
162
  # Calculates hash code according to all attributes.
153
163
  # @return [Integer] Hash code
154
164
  def hash
155
- [ignore_cache, json, names, token, uid_token, version].hash
165
+ [host, ignore_cache, json, names, token, uid_token, version].hash
156
166
  end
157
167
 
158
168
  # Builds the object from hash
@@ -37,6 +37,8 @@ module Akeyless
37
37
 
38
38
  attr_accessor :splunk_config
39
39
 
40
+ attr_accessor :sumo_logic_config
41
+
40
42
  attr_accessor :syslog_config
41
43
 
42
44
  attr_accessor :target_log_type
@@ -55,6 +57,7 @@ module Akeyless
55
57
  :'logz_io_config' => :'logz_io_config',
56
58
  :'pull_interval_sec' => :'pull_interval_sec',
57
59
  :'splunk_config' => :'splunk_config',
60
+ :'sumo_logic_config' => :'sumo_logic_config',
58
61
  :'syslog_config' => :'syslog_config',
59
62
  :'target_log_type' => :'target_log_type'
60
63
  }
@@ -79,6 +82,7 @@ module Akeyless
79
82
  :'logz_io_config' => :'LogzIoLogForwardingConfig',
80
83
  :'pull_interval_sec' => :'String',
81
84
  :'splunk_config' => :'SplunkLogForwardingConfig',
85
+ :'sumo_logic_config' => :'SumologicLogForwardingConfig',
82
86
  :'syslog_config' => :'SyslogLogForwardingConfig',
83
87
  :'target_log_type' => :'String'
84
88
  }
@@ -149,6 +153,10 @@ module Akeyless
149
153
  self.splunk_config = attributes[:'splunk_config']
150
154
  end
151
155
 
156
+ if attributes.key?(:'sumo_logic_config')
157
+ self.sumo_logic_config = attributes[:'sumo_logic_config']
158
+ end
159
+
152
160
  if attributes.key?(:'syslog_config')
153
161
  self.syslog_config = attributes[:'syslog_config']
154
162
  end
@@ -187,6 +195,7 @@ module Akeyless
187
195
  logz_io_config == o.logz_io_config &&
188
196
  pull_interval_sec == o.pull_interval_sec &&
189
197
  splunk_config == o.splunk_config &&
198
+ sumo_logic_config == o.sumo_logic_config &&
190
199
  syslog_config == o.syslog_config &&
191
200
  target_log_type == o.target_log_type
192
201
  end
@@ -200,7 +209,7 @@ module Akeyless
200
209
  # Calculates hash code according to all attributes.
201
210
  # @return [Integer] Hash code
202
211
  def hash
203
- [aws_s3_config, azure_analytics_config, datadog_config, elasticsearch_config, json_output, logan_enable, logan_url, logstash_config, logz_io_config, pull_interval_sec, splunk_config, syslog_config, target_log_type].hash
212
+ [aws_s3_config, azure_analytics_config, datadog_config, elasticsearch_config, json_output, logan_enable, logan_url, logstash_config, logz_io_config, pull_interval_sec, splunk_config, sumo_logic_config, syslog_config, target_log_type].hash
204
213
  end
205
214
 
206
215
  # Builds the object from hash