akeyless 3.3.8 → 3.3.9

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 16ddb8bd0d5a0d50bd02ec2446eadc961a6a4dee406837abdfdf20b951003f39
4
- data.tar.gz: 16a79cfb33edea59790e6db30808fdeb17f0c2f87fe117e48a035eacb3668dce
3
+ metadata.gz: b8d60d58aebe4015630b616eeb1e0cb7e16d923a0b29bef1dee379bba1a0f068
4
+ data.tar.gz: 64be785feeb2d865c9bc32a22914a0198da3533b4ee87fb6d4880abdd92bbf6f
5
5
  SHA512:
6
- metadata.gz: 1e4f0e83662518bb51ca5ccbbdc80a4c535d50425d57298630c81a760cfc3fab82f12f3d3e9db06e3d9068448943d464494a99806d7cb686c7a91b9aee13827f
7
- data.tar.gz: 27a9cb3149315134facf063164c30f1f5ab7040f6264030dffea93fd6894c60e4229cd631c62088a7961779871872b5cb9e0d7f94d43330f289de45654f10fcd
6
+ metadata.gz: f81e8389da803543223af884b94fe373d55963a2e4e857264d5adefcac31e5d448dc820841f14abb7d03c7d8decc215410d5b59469e73f5df3468aa23f5fd1e6
7
+ data.tar.gz: 310c6979fd6713752444152ea8bf4fa081dd98bbb41f20f8dfec09cc0fa5bcd0715e07a84dfc9ed40440b8a5766c68303d8d427f5b5284e76e07bc5e5336411e
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.8
10
+ - Package version: 3.3.9
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -7,6 +7,7 @@
7
7
  | **data_protection_section** | [**DataProtectionSection**](DataProtectionSection.md) | | [optional] |
8
8
  | **enable_request_for_access** | **Boolean** | | [optional] |
9
9
  | **password_policy** | [**PasswordPolicyInfo**](PasswordPolicyInfo.md) | | [optional] |
10
+ | **protect_items_by_default** | **Boolean** | | [optional] |
10
11
  | **sharing_policy** | [**SharingPolicyInfo**](SharingPolicyInfo.md) | | [optional] |
11
12
 
12
13
  ## Example
@@ -18,6 +19,7 @@ instance = Akeyless::AccountGeneralSettings.new(
18
19
  data_protection_section: null,
19
20
  enable_request_for_access: null,
20
21
  password_policy: null,
22
+ protect_items_by_default: null,
21
23
  sharing_policy: null
22
24
  )
23
25
  ```
@@ -26,6 +26,7 @@
26
26
  | **rotator_creds_type** | **String** | | [optional] |
27
27
  | **rotator_custom_cmd** | **String** | Custom rotation command (relevant only for ssh target) | [optional] |
28
28
  | **rotator_type** | **String** | Rotator Type | |
29
+ | **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
29
30
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users (relevant only for rdp) | [optional][default to false] |
30
31
  | **secure_access_aws_account_id** | **String** | The AWS account id (relevant only for aws) | [optional] |
31
32
  | **secure_access_aws_native_cli** | **Boolean** | The AWS native cli | [optional] |
@@ -77,6 +78,7 @@ instance = Akeyless::CreateRotatedSecret.new(
77
78
  rotator_creds_type: null,
78
79
  rotator_custom_cmd: null,
79
80
  rotator_type: null,
81
+ same_password: null,
80
82
  secure_access_allow_external_user: null,
81
83
  secure_access_aws_account_id: null,
82
84
  secure_access_aws_native_cli: null,
data/docs/CreateSecret.md CHANGED
@@ -5,16 +5,15 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
+ | **custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
8
9
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
11
+ | **inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
10
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
13
  | **metadata** | **String** | Deprecated - use description | [optional] |
12
14
  | **multiline_value** | **Boolean** | The provided value is a multiline value (separated by '\\n') | [optional] |
13
15
  | **name** | **String** | Secret name | |
14
- | **password_manager_custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
15
- | **password_manager_inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
16
- | **password_manager_password** | **String** | For Password Management use, additional fields | [optional] |
17
- | **password_manager_username** | **String** | For Password Management use | [optional] |
16
+ | **password** | **String** | For Password Management use, additional fields | [optional] |
18
17
  | **protection_key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
19
18
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
20
19
  | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
@@ -29,6 +28,7 @@
29
28
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
30
29
  | **type** | **String** | The secret sub type [generic/password] | [optional][default to 'generic'] |
31
30
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
31
+ | **username** | **String** | For Password Management use | [optional] |
32
32
  | **value** | **String** | The secret value | |
33
33
 
34
34
  ## Example
@@ -38,16 +38,15 @@ require 'akeyless'
38
38
 
39
39
  instance = Akeyless::CreateSecret.new(
40
40
  accessibility: null,
41
+ custom_field: null,
41
42
  delete_protection: null,
42
43
  description: null,
44
+ inject_url: null,
43
45
  json: null,
44
46
  metadata: null,
45
47
  multiline_value: null,
46
48
  name: null,
47
- password_manager_custom_field: null,
48
- password_manager_inject_url: null,
49
- password_manager_password: null,
50
- password_manager_username: null,
49
+ password: null,
51
50
  protection_key: null,
52
51
  secure_access_bastion_issuer: null,
53
52
  secure_access_enable: null,
@@ -62,6 +61,7 @@ instance = Akeyless::CreateSecret.new(
62
61
  token: null,
63
62
  type: null,
64
63
  uid_token: null,
64
+ username: null,
65
65
  value: null
66
66
  )
67
67
  ```
@@ -130,6 +130,7 @@
130
130
  | **ldap_bind_dn** | **String** | | [optional] |
131
131
  | **ldap_bind_password** | **String** | | [optional] |
132
132
  | **ldap_certificate** | **String** | | [optional] |
133
+ | **ldap_group_dn** | **String** | | [optional] |
133
134
  | **ldap_token_expiration** | **String** | | [optional] |
134
135
  | **ldap_url** | **String** | | [optional] |
135
136
  | **ldap_user_attr** | **String** | | [optional] |
@@ -345,6 +346,7 @@ instance = Akeyless::DSProducerDetails.new(
345
346
  ldap_bind_dn: null,
346
347
  ldap_bind_password: null,
347
348
  ldap_certificate: null,
349
+ ldap_group_dn: null,
348
350
  ldap_token_expiration: null,
349
351
  ldap_url: null,
350
352
  ldap_user_attr: null,
@@ -8,6 +8,7 @@
8
8
  | **bind_dn_password** | **String** | Bind DN Password | [optional] |
9
9
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
10
  | **external_username** | **String** | Externally provided username [true/false] | [optional][default to 'false'] |
11
+ | **group_dn** | **String** | Group DN which the temporary user should be added | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
13
  | **ldap_ca_cert** | **String** | CA Certificate File Content | [optional] |
13
14
  | **ldap_url** | **String** | LDAP Server URL | [optional] |
@@ -32,6 +33,7 @@ instance = Akeyless::GatewayCreateProducerLdap.new(
32
33
  bind_dn_password: null,
33
34
  delete_protection: null,
34
35
  external_username: null,
36
+ group_dn: null,
35
37
  json: null,
36
38
  ldap_ca_cert: null,
37
39
  ldap_url: null,
@@ -8,6 +8,7 @@
8
8
  | **bind_dn_password** | **String** | Bind DN Password | [optional] |
9
9
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
10
  | **external_username** | **String** | Externally provided username [true/false] | [optional][default to 'false'] |
11
+ | **group_dn** | **String** | Group DN which the temporary user should be added | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
13
  | **ldap_ca_cert** | **String** | CA Certificate File Content | [optional] |
13
14
  | **ldap_url** | **String** | LDAP Server URL | [optional] |
@@ -33,6 +34,7 @@ instance = Akeyless::GatewayUpdateProducerLdap.new(
33
34
  bind_dn_password: null,
34
35
  delete_protection: null,
35
36
  external_username: null,
37
+ group_dn: null,
36
38
  json: null,
37
39
  ldap_ca_cert: null,
38
40
  ldap_url: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **host** | **String** | Get rotated secret value of specific Host (relevant only for Linked Target) | [optional] |
7
8
  | **ignore_cache** | **String** | Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI | [optional][default to 'false'] |
8
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
10
  | **names** | **String** | Secret name | |
@@ -17,6 +18,7 @@
17
18
  require 'akeyless'
18
19
 
19
20
  instance = Akeyless::GetRotatedSecretValue.new(
21
+ host: null,
20
22
  ignore_cache: null,
21
23
  json: null,
22
24
  names: null,
@@ -14,6 +14,7 @@
14
14
  | **rotator_creds_type** | **String** | | [optional] |
15
15
  | **rotator_status** | **String** | RotationStatus defines types of rotation Status | [optional] |
16
16
  | **rotator_type** | **String** | | [optional] |
17
+ | **same_password** | **Boolean** | | [optional] |
17
18
 
18
19
  ## Example
19
20
 
@@ -30,7 +31,8 @@ instance = Akeyless::RotatedSecretDetailsInfo.new(
30
31
  rotation_statement: null,
31
32
  rotator_creds_type: null,
32
33
  rotator_status: null,
33
- rotator_type: null
34
+ rotator_type: null,
35
+ same_password: null
34
36
  )
35
37
  ```
36
38
 
@@ -64,7 +64,7 @@
64
64
  | **gke_service_account_name** | **String** | | [optional] |
65
65
  | **host** | **String** | | [optional] |
66
66
  | **hostname** | **String** | | [optional] |
67
- | **hosts** | **Hash<String, String>** | | [optional] |
67
+ | **hosts** | **Hash<String, String>** | key hostname, value description | [optional] |
68
68
  | **imap_fqdn** | **String** | | [optional] |
69
69
  | **imap_password** | **String** | | [optional] |
70
70
  | **imap_port** | **String** | | [optional] |
@@ -12,6 +12,7 @@
12
12
  | **default_versioning** | **String** | If set to true, new item version will be created on each update [true/false] | [optional] |
13
13
  | **dp_enable_classic_key_protection** | **String** | Set to update protection with classic keys state [true/false] | [optional] |
14
14
  | **item_type** | **String** | VersionSettingsObjectType defines object types for account version settings | [optional] |
15
+ | **items_deletion_protection** | **String** | Set or unset the default behaviour of items deletion protection [true/false] | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
16
17
  | **jwt_ttl_default** | **Integer** | Default ttl | [optional] |
17
18
  | **jwt_ttl_max** | **Integer** | Maximum ttl | [optional] |
@@ -41,6 +42,7 @@ instance = Akeyless::UpdateAccountSettings.new(
41
42
  default_versioning: null,
42
43
  dp_enable_classic_key_protection: null,
43
44
  item_type: null,
45
+ items_deletion_protection: null,
44
46
  json: null,
45
47
  jwt_ttl_default: null,
46
48
  jwt_ttl_max: null,
@@ -4,13 +4,18 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
7
8
  | **certificate_data** | **String** | Content of the certificate in a Base64 format. | [optional] |
9
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
+ | **description** | **String** | Description of the object | [optional] |
8
11
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
9
12
  | **format** | **String** | CertificateFormat of the certificate and private key, possible values: cer,crt,pem,pfx,p12. Required when passing inline certificate content with --certificate-data or --key-data, otherwise format is derived from the file extension. | [optional] |
10
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
14
  | **key** | **String** | The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used) | [optional] |
12
15
  | **key_data** | **String** | Content of the certificate's private key in a Base64 format. | [optional] |
16
+ | **metadata** | **String** | Deprecated - use description | [optional] |
13
17
  | **name** | **String** | Certificate name | |
18
+ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
14
19
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
20
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
21
 
@@ -20,13 +25,18 @@
20
25
  require 'akeyless'
21
26
 
22
27
  instance = Akeyless::UpdateCertificateValue.new(
28
+ add_tag: null,
23
29
  certificate_data: null,
30
+ delete_protection: null,
31
+ description: null,
24
32
  expiration_event_in: null,
25
33
  format: null,
26
34
  json: null,
27
35
  key: null,
28
36
  key_data: null,
37
+ metadata: null,
29
38
  name: null,
39
+ rm_tag: null,
30
40
  token: null,
31
41
  uid_token: null
32
42
  )
@@ -27,6 +27,7 @@
27
27
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (7-365) | [optional] |
28
28
  | **rotator_creds_type** | **String** | The credentials to connect with use-self-creds/use-target-creds | [optional][default to 'use-self-creds'] |
29
29
  | **rotator_custom_cmd** | **String** | \"Custom rotation command (relevant only for ssh target) | [optional] |
30
+ | **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
30
31
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users (relevant only for rdp) | [optional][default to false] |
31
32
  | **secure_access_aws_account_id** | **String** | The AWS account id (relevant only for aws) | [optional] |
32
33
  | **secure_access_aws_native_cli** | **Boolean** | The AWS native cli | [optional] |
@@ -75,6 +76,7 @@ instance = Akeyless::UpdateRotatedSecret.new(
75
76
  rotation_interval: null,
76
77
  rotator_creds_type: null,
77
78
  rotator_custom_cmd: null,
79
+ same_password: null,
78
80
  secure_access_allow_external_user: null,
79
81
  secure_access_aws_account_id: null,
80
82
  secure_access_aws_native_cli: null,
@@ -5,18 +5,18 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
+ | **custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
9
+ | **inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
8
10
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
11
  | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
10
12
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
11
13
  | **multiline** | **Boolean** | The provided value is a multiline value (separated by '\\n') | [optional] |
12
14
  | **name** | **String** | Secret name | |
13
15
  | **new_version** | **Boolean** | Deprecated | [optional] |
14
- | **password_manager_custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
15
- | **password_manager_inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
16
- | **password_manager_password** | **String** | For Password Management use, additional fields | [optional] |
17
- | **password_manager_username** | **String** | For Password Management use | [optional] |
16
+ | **password** | **String** | For Password Management use, additional fields | [optional] |
18
17
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
19
18
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
+ | **username** | **String** | For Password Management use | [optional] |
20
20
  | **value** | **String** | The new secret value | |
21
21
 
22
22
  ## Example
@@ -26,18 +26,18 @@ require 'akeyless'
26
26
 
27
27
  instance = Akeyless::UpdateSecretVal.new(
28
28
  accessibility: null,
29
+ custom_field: null,
30
+ inject_url: null,
29
31
  json: null,
30
32
  keep_prev_version: null,
31
33
  key: null,
32
34
  multiline: null,
33
35
  name: null,
34
36
  new_version: null,
35
- password_manager_custom_field: null,
36
- password_manager_inject_url: null,
37
- password_manager_password: null,
38
- password_manager_username: null,
37
+ password: null,
39
38
  token: null,
40
39
  uid_token: null,
40
+ username: null,
41
41
  value: null
42
42
  )
43
43
  ```
@@ -22,6 +22,8 @@ module Akeyless
22
22
 
23
23
  attr_accessor :password_policy
24
24
 
25
+ attr_accessor :protect_items_by_default
26
+
25
27
  attr_accessor :sharing_policy
26
28
 
27
29
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -30,6 +32,7 @@ module Akeyless
30
32
  :'data_protection_section' => :'data_protection_section',
31
33
  :'enable_request_for_access' => :'enable_request_for_access',
32
34
  :'password_policy' => :'password_policy',
35
+ :'protect_items_by_default' => :'protect_items_by_default',
33
36
  :'sharing_policy' => :'sharing_policy'
34
37
  }
35
38
  end
@@ -45,6 +48,7 @@ module Akeyless
45
48
  :'data_protection_section' => :'DataProtectionSection',
46
49
  :'enable_request_for_access' => :'Boolean',
47
50
  :'password_policy' => :'PasswordPolicyInfo',
51
+ :'protect_items_by_default' => :'Boolean',
48
52
  :'sharing_policy' => :'SharingPolicyInfo'
49
53
  }
50
54
  end
@@ -82,6 +86,10 @@ module Akeyless
82
86
  self.password_policy = attributes[:'password_policy']
83
87
  end
84
88
 
89
+ if attributes.key?(:'protect_items_by_default')
90
+ self.protect_items_by_default = attributes[:'protect_items_by_default']
91
+ end
92
+
85
93
  if attributes.key?(:'sharing_policy')
86
94
  self.sharing_policy = attributes[:'sharing_policy']
87
95
  end
@@ -108,6 +116,7 @@ module Akeyless
108
116
  data_protection_section == o.data_protection_section &&
109
117
  enable_request_for_access == o.enable_request_for_access &&
110
118
  password_policy == o.password_policy &&
119
+ protect_items_by_default == o.protect_items_by_default &&
111
120
  sharing_policy == o.sharing_policy
112
121
  end
113
122
 
@@ -120,7 +129,7 @@ module Akeyless
120
129
  # Calculates hash code according to all attributes.
121
130
  # @return [Integer] Hash code
122
131
  def hash
123
- [data_protection_section, enable_request_for_access, password_policy, sharing_policy].hash
132
+ [data_protection_section, enable_request_for_access, password_policy, protect_items_by_default, sharing_policy].hash
124
133
  end
125
134
 
126
135
  # Builds the object from hash
@@ -80,6 +80,9 @@ module Akeyless
80
80
  # Rotator Type
81
81
  attr_accessor :rotator_type
82
82
 
83
+ # Rotate same password for each host from the Linked Target (relevant only for Linked Target)
84
+ attr_accessor :same_password
85
+
83
86
  # Allow providing external user for a domain users (relevant only for rdp)
84
87
  attr_accessor :secure_access_allow_external_user
85
88
 
@@ -171,6 +174,7 @@ module Akeyless
171
174
  :'rotator_creds_type' => :'rotator-creds-type',
172
175
  :'rotator_custom_cmd' => :'rotator-custom-cmd',
173
176
  :'rotator_type' => :'rotator-type',
177
+ :'same_password' => :'same-password',
174
178
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
175
179
  :'secure_access_aws_account_id' => :'secure-access-aws-account-id',
176
180
  :'secure_access_aws_native_cli' => :'secure-access-aws-native-cli',
@@ -226,6 +230,7 @@ module Akeyless
226
230
  :'rotator_creds_type' => :'String',
227
231
  :'rotator_custom_cmd' => :'String',
228
232
  :'rotator_type' => :'String',
233
+ :'same_password' => :'String',
229
234
  :'secure_access_allow_external_user' => :'Boolean',
230
235
  :'secure_access_aws_account_id' => :'String',
231
236
  :'secure_access_aws_native_cli' => :'Boolean',
@@ -368,6 +373,10 @@ module Akeyless
368
373
  self.rotator_type = attributes[:'rotator_type']
369
374
  end
370
375
 
376
+ if attributes.key?(:'same_password')
377
+ self.same_password = attributes[:'same_password']
378
+ end
379
+
371
380
  if attributes.key?(:'secure_access_allow_external_user')
372
381
  self.secure_access_allow_external_user = attributes[:'secure_access_allow_external_user']
373
382
  else
@@ -524,6 +533,7 @@ module Akeyless
524
533
  rotator_creds_type == o.rotator_creds_type &&
525
534
  rotator_custom_cmd == o.rotator_custom_cmd &&
526
535
  rotator_type == o.rotator_type &&
536
+ same_password == o.same_password &&
527
537
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
528
538
  secure_access_aws_account_id == o.secure_access_aws_account_id &&
529
539
  secure_access_aws_native_cli == o.secure_access_aws_native_cli &&
@@ -557,7 +567,7 @@ module Akeyless
557
567
  # Calculates hash code according to all attributes.
558
568
  # @return [Integer] Hash code
559
569
  def hash
560
- [api_id, api_key, application_id, authentication_credentials, auto_rotate, aws_region, custom_payload, delete_protection, description, gcp_key, json, key, metadata, name, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, rotator_type, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, tags, target_name, token, uid_token, user_attribute, user_dn].hash
570
+ [api_id, api_key, application_id, authentication_credentials, auto_rotate, aws_region, custom_payload, delete_protection, description, gcp_key, json, key, metadata, name, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, tags, target_name, token, uid_token, user_attribute, user_dn].hash
561
571
  end
562
572
 
563
573
  # Builds the object from hash
@@ -18,12 +18,18 @@ module Akeyless
18
18
  # for personal password manager
19
19
  attr_accessor :accessibility
20
20
 
21
+ # For Password Management use, additional fields
22
+ attr_accessor :custom_field
23
+
21
24
  # Protection from accidental deletion of this item [true/false]
22
25
  attr_accessor :delete_protection
23
26
 
24
27
  # Description of the object
25
28
  attr_accessor :description
26
29
 
30
+ # For Password Management use, reflect the website context
31
+ attr_accessor :inject_url
32
+
27
33
  # Set output format to JSON
28
34
  attr_accessor :json
29
35
 
@@ -37,16 +43,7 @@ module Akeyless
37
43
  attr_accessor :name
38
44
 
39
45
  # For Password Management use, additional fields
40
- attr_accessor :password_manager_custom_field
41
-
42
- # For Password Management use, reflect the website context
43
- attr_accessor :password_manager_inject_url
44
-
45
- # For Password Management use, additional fields
46
- attr_accessor :password_manager_password
47
-
48
- # For Password Management use
49
- attr_accessor :password_manager_username
46
+ attr_accessor :password
50
47
 
51
48
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
52
49
  attr_accessor :protection_key
@@ -90,6 +87,9 @@ module Akeyless
90
87
  # The universal identity token, Required only for universal_identity authentication
91
88
  attr_accessor :uid_token
92
89
 
90
+ # For Password Management use
91
+ attr_accessor :username
92
+
93
93
  # The secret value
94
94
  attr_accessor :value
95
95
 
@@ -97,16 +97,15 @@ module Akeyless
97
97
  def self.attribute_map
98
98
  {
99
99
  :'accessibility' => :'accessibility',
100
+ :'custom_field' => :'custom-field',
100
101
  :'delete_protection' => :'delete_protection',
101
102
  :'description' => :'description',
103
+ :'inject_url' => :'inject-url',
102
104
  :'json' => :'json',
103
105
  :'metadata' => :'metadata',
104
106
  :'multiline_value' => :'multiline_value',
105
107
  :'name' => :'name',
106
- :'password_manager_custom_field' => :'password-manager-custom-field',
107
- :'password_manager_inject_url' => :'password-manager-inject-url',
108
- :'password_manager_password' => :'password-manager-password',
109
- :'password_manager_username' => :'password-manager-username',
108
+ :'password' => :'password',
110
109
  :'protection_key' => :'protection_key',
111
110
  :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
112
111
  :'secure_access_enable' => :'secure-access-enable',
@@ -121,6 +120,7 @@ module Akeyless
121
120
  :'token' => :'token',
122
121
  :'type' => :'type',
123
122
  :'uid_token' => :'uid-token',
123
+ :'username' => :'username',
124
124
  :'value' => :'value'
125
125
  }
126
126
  end
@@ -134,16 +134,15 @@ module Akeyless
134
134
  def self.openapi_types
135
135
  {
136
136
  :'accessibility' => :'String',
137
+ :'custom_field' => :'Hash<String, String>',
137
138
  :'delete_protection' => :'String',
138
139
  :'description' => :'String',
140
+ :'inject_url' => :'Array<String>',
139
141
  :'json' => :'Boolean',
140
142
  :'metadata' => :'String',
141
143
  :'multiline_value' => :'Boolean',
142
144
  :'name' => :'String',
143
- :'password_manager_custom_field' => :'Hash<String, String>',
144
- :'password_manager_inject_url' => :'Array<String>',
145
- :'password_manager_password' => :'String',
146
- :'password_manager_username' => :'String',
145
+ :'password' => :'String',
147
146
  :'protection_key' => :'String',
148
147
  :'secure_access_bastion_issuer' => :'String',
149
148
  :'secure_access_enable' => :'String',
@@ -158,6 +157,7 @@ module Akeyless
158
157
  :'token' => :'String',
159
158
  :'type' => :'String',
160
159
  :'uid_token' => :'String',
160
+ :'username' => :'String',
161
161
  :'value' => :'String'
162
162
  }
163
163
  end
@@ -189,6 +189,12 @@ module Akeyless
189
189
  self.accessibility = 'regular'
190
190
  end
191
191
 
192
+ if attributes.key?(:'custom_field')
193
+ if (value = attributes[:'custom_field']).is_a?(Hash)
194
+ self.custom_field = value
195
+ end
196
+ end
197
+
192
198
  if attributes.key?(:'delete_protection')
193
199
  self.delete_protection = attributes[:'delete_protection']
194
200
  end
@@ -197,6 +203,12 @@ module Akeyless
197
203
  self.description = attributes[:'description']
198
204
  end
199
205
 
206
+ if attributes.key?(:'inject_url')
207
+ if (value = attributes[:'inject_url']).is_a?(Array)
208
+ self.inject_url = value
209
+ end
210
+ end
211
+
200
212
  if attributes.key?(:'json')
201
213
  self.json = attributes[:'json']
202
214
  else
@@ -215,24 +227,8 @@ module Akeyless
215
227
  self.name = attributes[:'name']
216
228
  end
217
229
 
218
- if attributes.key?(:'password_manager_custom_field')
219
- if (value = attributes[:'password_manager_custom_field']).is_a?(Hash)
220
- self.password_manager_custom_field = value
221
- end
222
- end
223
-
224
- if attributes.key?(:'password_manager_inject_url')
225
- if (value = attributes[:'password_manager_inject_url']).is_a?(Array)
226
- self.password_manager_inject_url = value
227
- end
228
- end
229
-
230
- if attributes.key?(:'password_manager_password')
231
- self.password_manager_password = attributes[:'password_manager_password']
232
- end
233
-
234
- if attributes.key?(:'password_manager_username')
235
- self.password_manager_username = attributes[:'password_manager_username']
230
+ if attributes.key?(:'password')
231
+ self.password = attributes[:'password']
236
232
  end
237
233
 
238
234
  if attributes.key?(:'protection_key')
@@ -301,6 +297,10 @@ module Akeyless
301
297
  self.uid_token = attributes[:'uid_token']
302
298
  end
303
299
 
300
+ if attributes.key?(:'username')
301
+ self.username = attributes[:'username']
302
+ end
303
+
304
304
  if attributes.key?(:'value')
305
305
  self.value = attributes[:'value']
306
306
  end
@@ -335,16 +335,15 @@ module Akeyless
335
335
  return true if self.equal?(o)
336
336
  self.class == o.class &&
337
337
  accessibility == o.accessibility &&
338
+ custom_field == o.custom_field &&
338
339
  delete_protection == o.delete_protection &&
339
340
  description == o.description &&
341
+ inject_url == o.inject_url &&
340
342
  json == o.json &&
341
343
  metadata == o.metadata &&
342
344
  multiline_value == o.multiline_value &&
343
345
  name == o.name &&
344
- password_manager_custom_field == o.password_manager_custom_field &&
345
- password_manager_inject_url == o.password_manager_inject_url &&
346
- password_manager_password == o.password_manager_password &&
347
- password_manager_username == o.password_manager_username &&
346
+ password == o.password &&
348
347
  protection_key == o.protection_key &&
349
348
  secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
350
349
  secure_access_enable == o.secure_access_enable &&
@@ -359,6 +358,7 @@ module Akeyless
359
358
  token == o.token &&
360
359
  type == o.type &&
361
360
  uid_token == o.uid_token &&
361
+ username == o.username &&
362
362
  value == o.value
363
363
  end
364
364
 
@@ -371,7 +371,7 @@ module Akeyless
371
371
  # Calculates hash code according to all attributes.
372
372
  # @return [Integer] Hash code
373
373
  def hash
374
- [accessibility, delete_protection, description, json, metadata, multiline_value, name, password_manager_custom_field, password_manager_inject_url, password_manager_password, password_manager_username, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, value].hash
374
+ [accessibility, custom_field, delete_protection, description, inject_url, json, metadata, multiline_value, name, password, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, username, value].hash
375
375
  end
376
376
 
377
377
  # Builds the object from hash