akeyless 3.3.8 → 3.3.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 16ddb8bd0d5a0d50bd02ec2446eadc961a6a4dee406837abdfdf20b951003f39
4
- data.tar.gz: 16a79cfb33edea59790e6db30808fdeb17f0c2f87fe117e48a035eacb3668dce
3
+ metadata.gz: b8d60d58aebe4015630b616eeb1e0cb7e16d923a0b29bef1dee379bba1a0f068
4
+ data.tar.gz: 64be785feeb2d865c9bc32a22914a0198da3533b4ee87fb6d4880abdd92bbf6f
5
5
  SHA512:
6
- metadata.gz: 1e4f0e83662518bb51ca5ccbbdc80a4c535d50425d57298630c81a760cfc3fab82f12f3d3e9db06e3d9068448943d464494a99806d7cb686c7a91b9aee13827f
7
- data.tar.gz: 27a9cb3149315134facf063164c30f1f5ab7040f6264030dffea93fd6894c60e4229cd631c62088a7961779871872b5cb9e0d7f94d43330f289de45654f10fcd
6
+ metadata.gz: f81e8389da803543223af884b94fe373d55963a2e4e857264d5adefcac31e5d448dc820841f14abb7d03c7d8decc215410d5b59469e73f5df3468aa23f5fd1e6
7
+ data.tar.gz: 310c6979fd6713752444152ea8bf4fa081dd98bbb41f20f8dfec09cc0fa5bcd0715e07a84dfc9ed40440b8a5766c68303d8d427f5b5284e76e07bc5e5336411e
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.3.8
10
+ - Package version: 3.3.9
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -7,6 +7,7 @@
7
7
  | **data_protection_section** | [**DataProtectionSection**](DataProtectionSection.md) | | [optional] |
8
8
  | **enable_request_for_access** | **Boolean** | | [optional] |
9
9
  | **password_policy** | [**PasswordPolicyInfo**](PasswordPolicyInfo.md) | | [optional] |
10
+ | **protect_items_by_default** | **Boolean** | | [optional] |
10
11
  | **sharing_policy** | [**SharingPolicyInfo**](SharingPolicyInfo.md) | | [optional] |
11
12
 
12
13
  ## Example
@@ -18,6 +19,7 @@ instance = Akeyless::AccountGeneralSettings.new(
18
19
  data_protection_section: null,
19
20
  enable_request_for_access: null,
20
21
  password_policy: null,
22
+ protect_items_by_default: null,
21
23
  sharing_policy: null
22
24
  )
23
25
  ```
@@ -26,6 +26,7 @@
26
26
  | **rotator_creds_type** | **String** | | [optional] |
27
27
  | **rotator_custom_cmd** | **String** | Custom rotation command (relevant only for ssh target) | [optional] |
28
28
  | **rotator_type** | **String** | Rotator Type | |
29
+ | **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
29
30
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users (relevant only for rdp) | [optional][default to false] |
30
31
  | **secure_access_aws_account_id** | **String** | The AWS account id (relevant only for aws) | [optional] |
31
32
  | **secure_access_aws_native_cli** | **Boolean** | The AWS native cli | [optional] |
@@ -77,6 +78,7 @@ instance = Akeyless::CreateRotatedSecret.new(
77
78
  rotator_creds_type: null,
78
79
  rotator_custom_cmd: null,
79
80
  rotator_type: null,
81
+ same_password: null,
80
82
  secure_access_allow_external_user: null,
81
83
  secure_access_aws_account_id: null,
82
84
  secure_access_aws_native_cli: null,
data/docs/CreateSecret.md CHANGED
@@ -5,16 +5,15 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
+ | **custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
8
9
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
11
+ | **inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
10
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
13
  | **metadata** | **String** | Deprecated - use description | [optional] |
12
14
  | **multiline_value** | **Boolean** | The provided value is a multiline value (separated by '\\n') | [optional] |
13
15
  | **name** | **String** | Secret name | |
14
- | **password_manager_custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
15
- | **password_manager_inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
16
- | **password_manager_password** | **String** | For Password Management use, additional fields | [optional] |
17
- | **password_manager_username** | **String** | For Password Management use | [optional] |
16
+ | **password** | **String** | For Password Management use, additional fields | [optional] |
18
17
  | **protection_key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
19
18
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
20
19
  | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
@@ -29,6 +28,7 @@
29
28
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
30
29
  | **type** | **String** | The secret sub type [generic/password] | [optional][default to 'generic'] |
31
30
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
31
+ | **username** | **String** | For Password Management use | [optional] |
32
32
  | **value** | **String** | The secret value | |
33
33
 
34
34
  ## Example
@@ -38,16 +38,15 @@ require 'akeyless'
38
38
 
39
39
  instance = Akeyless::CreateSecret.new(
40
40
  accessibility: null,
41
+ custom_field: null,
41
42
  delete_protection: null,
42
43
  description: null,
44
+ inject_url: null,
43
45
  json: null,
44
46
  metadata: null,
45
47
  multiline_value: null,
46
48
  name: null,
47
- password_manager_custom_field: null,
48
- password_manager_inject_url: null,
49
- password_manager_password: null,
50
- password_manager_username: null,
49
+ password: null,
51
50
  protection_key: null,
52
51
  secure_access_bastion_issuer: null,
53
52
  secure_access_enable: null,
@@ -62,6 +61,7 @@ instance = Akeyless::CreateSecret.new(
62
61
  token: null,
63
62
  type: null,
64
63
  uid_token: null,
64
+ username: null,
65
65
  value: null
66
66
  )
67
67
  ```
@@ -130,6 +130,7 @@
130
130
  | **ldap_bind_dn** | **String** | | [optional] |
131
131
  | **ldap_bind_password** | **String** | | [optional] |
132
132
  | **ldap_certificate** | **String** | | [optional] |
133
+ | **ldap_group_dn** | **String** | | [optional] |
133
134
  | **ldap_token_expiration** | **String** | | [optional] |
134
135
  | **ldap_url** | **String** | | [optional] |
135
136
  | **ldap_user_attr** | **String** | | [optional] |
@@ -345,6 +346,7 @@ instance = Akeyless::DSProducerDetails.new(
345
346
  ldap_bind_dn: null,
346
347
  ldap_bind_password: null,
347
348
  ldap_certificate: null,
349
+ ldap_group_dn: null,
348
350
  ldap_token_expiration: null,
349
351
  ldap_url: null,
350
352
  ldap_user_attr: null,
@@ -8,6 +8,7 @@
8
8
  | **bind_dn_password** | **String** | Bind DN Password | [optional] |
9
9
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
10
  | **external_username** | **String** | Externally provided username [true/false] | [optional][default to 'false'] |
11
+ | **group_dn** | **String** | Group DN which the temporary user should be added | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
13
  | **ldap_ca_cert** | **String** | CA Certificate File Content | [optional] |
13
14
  | **ldap_url** | **String** | LDAP Server URL | [optional] |
@@ -32,6 +33,7 @@ instance = Akeyless::GatewayCreateProducerLdap.new(
32
33
  bind_dn_password: null,
33
34
  delete_protection: null,
34
35
  external_username: null,
36
+ group_dn: null,
35
37
  json: null,
36
38
  ldap_ca_cert: null,
37
39
  ldap_url: null,
@@ -8,6 +8,7 @@
8
8
  | **bind_dn_password** | **String** | Bind DN Password | [optional] |
9
9
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
10
  | **external_username** | **String** | Externally provided username [true/false] | [optional][default to 'false'] |
11
+ | **group_dn** | **String** | Group DN which the temporary user should be added | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
13
  | **ldap_ca_cert** | **String** | CA Certificate File Content | [optional] |
13
14
  | **ldap_url** | **String** | LDAP Server URL | [optional] |
@@ -33,6 +34,7 @@ instance = Akeyless::GatewayUpdateProducerLdap.new(
33
34
  bind_dn_password: null,
34
35
  delete_protection: null,
35
36
  external_username: null,
37
+ group_dn: null,
36
38
  json: null,
37
39
  ldap_ca_cert: null,
38
40
  ldap_url: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **host** | **String** | Get rotated secret value of specific Host (relevant only for Linked Target) | [optional] |
7
8
  | **ignore_cache** | **String** | Retrieve the Secret value without checking the Gateway's cache [true/false]. This flag is only relevant when using the RestAPI | [optional][default to 'false'] |
8
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
10
  | **names** | **String** | Secret name | |
@@ -17,6 +18,7 @@
17
18
  require 'akeyless'
18
19
 
19
20
  instance = Akeyless::GetRotatedSecretValue.new(
21
+ host: null,
20
22
  ignore_cache: null,
21
23
  json: null,
22
24
  names: null,
@@ -14,6 +14,7 @@
14
14
  | **rotator_creds_type** | **String** | | [optional] |
15
15
  | **rotator_status** | **String** | RotationStatus defines types of rotation Status | [optional] |
16
16
  | **rotator_type** | **String** | | [optional] |
17
+ | **same_password** | **Boolean** | | [optional] |
17
18
 
18
19
  ## Example
19
20
 
@@ -30,7 +31,8 @@ instance = Akeyless::RotatedSecretDetailsInfo.new(
30
31
  rotation_statement: null,
31
32
  rotator_creds_type: null,
32
33
  rotator_status: null,
33
- rotator_type: null
34
+ rotator_type: null,
35
+ same_password: null
34
36
  )
35
37
  ```
36
38
 
@@ -64,7 +64,7 @@
64
64
  | **gke_service_account_name** | **String** | | [optional] |
65
65
  | **host** | **String** | | [optional] |
66
66
  | **hostname** | **String** | | [optional] |
67
- | **hosts** | **Hash<String, String>** | | [optional] |
67
+ | **hosts** | **Hash<String, String>** | key hostname, value description | [optional] |
68
68
  | **imap_fqdn** | **String** | | [optional] |
69
69
  | **imap_password** | **String** | | [optional] |
70
70
  | **imap_port** | **String** | | [optional] |
@@ -12,6 +12,7 @@
12
12
  | **default_versioning** | **String** | If set to true, new item version will be created on each update [true/false] | [optional] |
13
13
  | **dp_enable_classic_key_protection** | **String** | Set to update protection with classic keys state [true/false] | [optional] |
14
14
  | **item_type** | **String** | VersionSettingsObjectType defines object types for account version settings | [optional] |
15
+ | **items_deletion_protection** | **String** | Set or unset the default behaviour of items deletion protection [true/false] | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
16
17
  | **jwt_ttl_default** | **Integer** | Default ttl | [optional] |
17
18
  | **jwt_ttl_max** | **Integer** | Maximum ttl | [optional] |
@@ -41,6 +42,7 @@ instance = Akeyless::UpdateAccountSettings.new(
41
42
  default_versioning: null,
42
43
  dp_enable_classic_key_protection: null,
43
44
  item_type: null,
45
+ items_deletion_protection: null,
44
46
  json: null,
45
47
  jwt_ttl_default: null,
46
48
  jwt_ttl_max: null,
@@ -4,13 +4,18 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
7
8
  | **certificate_data** | **String** | Content of the certificate in a Base64 format. | [optional] |
9
+ | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
10
+ | **description** | **String** | Description of the object | [optional] |
8
11
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
9
12
  | **format** | **String** | CertificateFormat of the certificate and private key, possible values: cer,crt,pem,pfx,p12. Required when passing inline certificate content with --certificate-data or --key-data, otherwise format is derived from the file extension. | [optional] |
10
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
14
  | **key** | **String** | The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used) | [optional] |
12
15
  | **key_data** | **String** | Content of the certificate's private key in a Base64 format. | [optional] |
16
+ | **metadata** | **String** | Deprecated - use description | [optional] |
13
17
  | **name** | **String** | Certificate name | |
18
+ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
14
19
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
20
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
21
 
@@ -20,13 +25,18 @@
20
25
  require 'akeyless'
21
26
 
22
27
  instance = Akeyless::UpdateCertificateValue.new(
28
+ add_tag: null,
23
29
  certificate_data: null,
30
+ delete_protection: null,
31
+ description: null,
24
32
  expiration_event_in: null,
25
33
  format: null,
26
34
  json: null,
27
35
  key: null,
28
36
  key_data: null,
37
+ metadata: null,
29
38
  name: null,
39
+ rm_tag: null,
30
40
  token: null,
31
41
  uid_token: null
32
42
  )
@@ -27,6 +27,7 @@
27
27
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (7-365) | [optional] |
28
28
  | **rotator_creds_type** | **String** | The credentials to connect with use-self-creds/use-target-creds | [optional][default to 'use-self-creds'] |
29
29
  | **rotator_custom_cmd** | **String** | \"Custom rotation command (relevant only for ssh target) | [optional] |
30
+ | **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
30
31
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users (relevant only for rdp) | [optional][default to false] |
31
32
  | **secure_access_aws_account_id** | **String** | The AWS account id (relevant only for aws) | [optional] |
32
33
  | **secure_access_aws_native_cli** | **Boolean** | The AWS native cli | [optional] |
@@ -75,6 +76,7 @@ instance = Akeyless::UpdateRotatedSecret.new(
75
76
  rotation_interval: null,
76
77
  rotator_creds_type: null,
77
78
  rotator_custom_cmd: null,
79
+ same_password: null,
78
80
  secure_access_allow_external_user: null,
79
81
  secure_access_aws_account_id: null,
80
82
  secure_access_aws_native_cli: null,
@@ -5,18 +5,18 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
+ | **custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
9
+ | **inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
8
10
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
11
  | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
10
12
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
11
13
  | **multiline** | **Boolean** | The provided value is a multiline value (separated by '\\n') | [optional] |
12
14
  | **name** | **String** | Secret name | |
13
15
  | **new_version** | **Boolean** | Deprecated | [optional] |
14
- | **password_manager_custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
15
- | **password_manager_inject_url** | **Array<String>** | For Password Management use, reflect the website context | [optional] |
16
- | **password_manager_password** | **String** | For Password Management use, additional fields | [optional] |
17
- | **password_manager_username** | **String** | For Password Management use | [optional] |
16
+ | **password** | **String** | For Password Management use, additional fields | [optional] |
18
17
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
19
18
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
+ | **username** | **String** | For Password Management use | [optional] |
20
20
  | **value** | **String** | The new secret value | |
21
21
 
22
22
  ## Example
@@ -26,18 +26,18 @@ require 'akeyless'
26
26
 
27
27
  instance = Akeyless::UpdateSecretVal.new(
28
28
  accessibility: null,
29
+ custom_field: null,
30
+ inject_url: null,
29
31
  json: null,
30
32
  keep_prev_version: null,
31
33
  key: null,
32
34
  multiline: null,
33
35
  name: null,
34
36
  new_version: null,
35
- password_manager_custom_field: null,
36
- password_manager_inject_url: null,
37
- password_manager_password: null,
38
- password_manager_username: null,
37
+ password: null,
39
38
  token: null,
40
39
  uid_token: null,
40
+ username: null,
41
41
  value: null
42
42
  )
43
43
  ```
@@ -22,6 +22,8 @@ module Akeyless
22
22
 
23
23
  attr_accessor :password_policy
24
24
 
25
+ attr_accessor :protect_items_by_default
26
+
25
27
  attr_accessor :sharing_policy
26
28
 
27
29
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -30,6 +32,7 @@ module Akeyless
30
32
  :'data_protection_section' => :'data_protection_section',
31
33
  :'enable_request_for_access' => :'enable_request_for_access',
32
34
  :'password_policy' => :'password_policy',
35
+ :'protect_items_by_default' => :'protect_items_by_default',
33
36
  :'sharing_policy' => :'sharing_policy'
34
37
  }
35
38
  end
@@ -45,6 +48,7 @@ module Akeyless
45
48
  :'data_protection_section' => :'DataProtectionSection',
46
49
  :'enable_request_for_access' => :'Boolean',
47
50
  :'password_policy' => :'PasswordPolicyInfo',
51
+ :'protect_items_by_default' => :'Boolean',
48
52
  :'sharing_policy' => :'SharingPolicyInfo'
49
53
  }
50
54
  end
@@ -82,6 +86,10 @@ module Akeyless
82
86
  self.password_policy = attributes[:'password_policy']
83
87
  end
84
88
 
89
+ if attributes.key?(:'protect_items_by_default')
90
+ self.protect_items_by_default = attributes[:'protect_items_by_default']
91
+ end
92
+
85
93
  if attributes.key?(:'sharing_policy')
86
94
  self.sharing_policy = attributes[:'sharing_policy']
87
95
  end
@@ -108,6 +116,7 @@ module Akeyless
108
116
  data_protection_section == o.data_protection_section &&
109
117
  enable_request_for_access == o.enable_request_for_access &&
110
118
  password_policy == o.password_policy &&
119
+ protect_items_by_default == o.protect_items_by_default &&
111
120
  sharing_policy == o.sharing_policy
112
121
  end
113
122
 
@@ -120,7 +129,7 @@ module Akeyless
120
129
  # Calculates hash code according to all attributes.
121
130
  # @return [Integer] Hash code
122
131
  def hash
123
- [data_protection_section, enable_request_for_access, password_policy, sharing_policy].hash
132
+ [data_protection_section, enable_request_for_access, password_policy, protect_items_by_default, sharing_policy].hash
124
133
  end
125
134
 
126
135
  # Builds the object from hash
@@ -80,6 +80,9 @@ module Akeyless
80
80
  # Rotator Type
81
81
  attr_accessor :rotator_type
82
82
 
83
+ # Rotate same password for each host from the Linked Target (relevant only for Linked Target)
84
+ attr_accessor :same_password
85
+
83
86
  # Allow providing external user for a domain users (relevant only for rdp)
84
87
  attr_accessor :secure_access_allow_external_user
85
88
 
@@ -171,6 +174,7 @@ module Akeyless
171
174
  :'rotator_creds_type' => :'rotator-creds-type',
172
175
  :'rotator_custom_cmd' => :'rotator-custom-cmd',
173
176
  :'rotator_type' => :'rotator-type',
177
+ :'same_password' => :'same-password',
174
178
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
175
179
  :'secure_access_aws_account_id' => :'secure-access-aws-account-id',
176
180
  :'secure_access_aws_native_cli' => :'secure-access-aws-native-cli',
@@ -226,6 +230,7 @@ module Akeyless
226
230
  :'rotator_creds_type' => :'String',
227
231
  :'rotator_custom_cmd' => :'String',
228
232
  :'rotator_type' => :'String',
233
+ :'same_password' => :'String',
229
234
  :'secure_access_allow_external_user' => :'Boolean',
230
235
  :'secure_access_aws_account_id' => :'String',
231
236
  :'secure_access_aws_native_cli' => :'Boolean',
@@ -368,6 +373,10 @@ module Akeyless
368
373
  self.rotator_type = attributes[:'rotator_type']
369
374
  end
370
375
 
376
+ if attributes.key?(:'same_password')
377
+ self.same_password = attributes[:'same_password']
378
+ end
379
+
371
380
  if attributes.key?(:'secure_access_allow_external_user')
372
381
  self.secure_access_allow_external_user = attributes[:'secure_access_allow_external_user']
373
382
  else
@@ -524,6 +533,7 @@ module Akeyless
524
533
  rotator_creds_type == o.rotator_creds_type &&
525
534
  rotator_custom_cmd == o.rotator_custom_cmd &&
526
535
  rotator_type == o.rotator_type &&
536
+ same_password == o.same_password &&
527
537
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
528
538
  secure_access_aws_account_id == o.secure_access_aws_account_id &&
529
539
  secure_access_aws_native_cli == o.secure_access_aws_native_cli &&
@@ -557,7 +567,7 @@ module Akeyless
557
567
  # Calculates hash code according to all attributes.
558
568
  # @return [Integer] Hash code
559
569
  def hash
560
- [api_id, api_key, application_id, authentication_credentials, auto_rotate, aws_region, custom_payload, delete_protection, description, gcp_key, json, key, metadata, name, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, rotator_type, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, tags, target_name, token, uid_token, user_attribute, user_dn].hash
570
+ [api_id, api_key, application_id, authentication_credentials, auto_rotate, aws_region, custom_payload, delete_protection, description, gcp_key, json, key, metadata, name, rotate_after_disconnect, rotated_password, rotated_username, rotation_hour, rotation_interval, rotator_creds_type, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_bastion_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, ssh_password, ssh_username, storage_account_key_name, tags, target_name, token, uid_token, user_attribute, user_dn].hash
561
571
  end
562
572
 
563
573
  # Builds the object from hash
@@ -18,12 +18,18 @@ module Akeyless
18
18
  # for personal password manager
19
19
  attr_accessor :accessibility
20
20
 
21
+ # For Password Management use, additional fields
22
+ attr_accessor :custom_field
23
+
21
24
  # Protection from accidental deletion of this item [true/false]
22
25
  attr_accessor :delete_protection
23
26
 
24
27
  # Description of the object
25
28
  attr_accessor :description
26
29
 
30
+ # For Password Management use, reflect the website context
31
+ attr_accessor :inject_url
32
+
27
33
  # Set output format to JSON
28
34
  attr_accessor :json
29
35
 
@@ -37,16 +43,7 @@ module Akeyless
37
43
  attr_accessor :name
38
44
 
39
45
  # For Password Management use, additional fields
40
- attr_accessor :password_manager_custom_field
41
-
42
- # For Password Management use, reflect the website context
43
- attr_accessor :password_manager_inject_url
44
-
45
- # For Password Management use, additional fields
46
- attr_accessor :password_manager_password
47
-
48
- # For Password Management use
49
- attr_accessor :password_manager_username
46
+ attr_accessor :password
50
47
 
51
48
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
52
49
  attr_accessor :protection_key
@@ -90,6 +87,9 @@ module Akeyless
90
87
  # The universal identity token, Required only for universal_identity authentication
91
88
  attr_accessor :uid_token
92
89
 
90
+ # For Password Management use
91
+ attr_accessor :username
92
+
93
93
  # The secret value
94
94
  attr_accessor :value
95
95
 
@@ -97,16 +97,15 @@ module Akeyless
97
97
  def self.attribute_map
98
98
  {
99
99
  :'accessibility' => :'accessibility',
100
+ :'custom_field' => :'custom-field',
100
101
  :'delete_protection' => :'delete_protection',
101
102
  :'description' => :'description',
103
+ :'inject_url' => :'inject-url',
102
104
  :'json' => :'json',
103
105
  :'metadata' => :'metadata',
104
106
  :'multiline_value' => :'multiline_value',
105
107
  :'name' => :'name',
106
- :'password_manager_custom_field' => :'password-manager-custom-field',
107
- :'password_manager_inject_url' => :'password-manager-inject-url',
108
- :'password_manager_password' => :'password-manager-password',
109
- :'password_manager_username' => :'password-manager-username',
108
+ :'password' => :'password',
110
109
  :'protection_key' => :'protection_key',
111
110
  :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
112
111
  :'secure_access_enable' => :'secure-access-enable',
@@ -121,6 +120,7 @@ module Akeyless
121
120
  :'token' => :'token',
122
121
  :'type' => :'type',
123
122
  :'uid_token' => :'uid-token',
123
+ :'username' => :'username',
124
124
  :'value' => :'value'
125
125
  }
126
126
  end
@@ -134,16 +134,15 @@ module Akeyless
134
134
  def self.openapi_types
135
135
  {
136
136
  :'accessibility' => :'String',
137
+ :'custom_field' => :'Hash<String, String>',
137
138
  :'delete_protection' => :'String',
138
139
  :'description' => :'String',
140
+ :'inject_url' => :'Array<String>',
139
141
  :'json' => :'Boolean',
140
142
  :'metadata' => :'String',
141
143
  :'multiline_value' => :'Boolean',
142
144
  :'name' => :'String',
143
- :'password_manager_custom_field' => :'Hash<String, String>',
144
- :'password_manager_inject_url' => :'Array<String>',
145
- :'password_manager_password' => :'String',
146
- :'password_manager_username' => :'String',
145
+ :'password' => :'String',
147
146
  :'protection_key' => :'String',
148
147
  :'secure_access_bastion_issuer' => :'String',
149
148
  :'secure_access_enable' => :'String',
@@ -158,6 +157,7 @@ module Akeyless
158
157
  :'token' => :'String',
159
158
  :'type' => :'String',
160
159
  :'uid_token' => :'String',
160
+ :'username' => :'String',
161
161
  :'value' => :'String'
162
162
  }
163
163
  end
@@ -189,6 +189,12 @@ module Akeyless
189
189
  self.accessibility = 'regular'
190
190
  end
191
191
 
192
+ if attributes.key?(:'custom_field')
193
+ if (value = attributes[:'custom_field']).is_a?(Hash)
194
+ self.custom_field = value
195
+ end
196
+ end
197
+
192
198
  if attributes.key?(:'delete_protection')
193
199
  self.delete_protection = attributes[:'delete_protection']
194
200
  end
@@ -197,6 +203,12 @@ module Akeyless
197
203
  self.description = attributes[:'description']
198
204
  end
199
205
 
206
+ if attributes.key?(:'inject_url')
207
+ if (value = attributes[:'inject_url']).is_a?(Array)
208
+ self.inject_url = value
209
+ end
210
+ end
211
+
200
212
  if attributes.key?(:'json')
201
213
  self.json = attributes[:'json']
202
214
  else
@@ -215,24 +227,8 @@ module Akeyless
215
227
  self.name = attributes[:'name']
216
228
  end
217
229
 
218
- if attributes.key?(:'password_manager_custom_field')
219
- if (value = attributes[:'password_manager_custom_field']).is_a?(Hash)
220
- self.password_manager_custom_field = value
221
- end
222
- end
223
-
224
- if attributes.key?(:'password_manager_inject_url')
225
- if (value = attributes[:'password_manager_inject_url']).is_a?(Array)
226
- self.password_manager_inject_url = value
227
- end
228
- end
229
-
230
- if attributes.key?(:'password_manager_password')
231
- self.password_manager_password = attributes[:'password_manager_password']
232
- end
233
-
234
- if attributes.key?(:'password_manager_username')
235
- self.password_manager_username = attributes[:'password_manager_username']
230
+ if attributes.key?(:'password')
231
+ self.password = attributes[:'password']
236
232
  end
237
233
 
238
234
  if attributes.key?(:'protection_key')
@@ -301,6 +297,10 @@ module Akeyless
301
297
  self.uid_token = attributes[:'uid_token']
302
298
  end
303
299
 
300
+ if attributes.key?(:'username')
301
+ self.username = attributes[:'username']
302
+ end
303
+
304
304
  if attributes.key?(:'value')
305
305
  self.value = attributes[:'value']
306
306
  end
@@ -335,16 +335,15 @@ module Akeyless
335
335
  return true if self.equal?(o)
336
336
  self.class == o.class &&
337
337
  accessibility == o.accessibility &&
338
+ custom_field == o.custom_field &&
338
339
  delete_protection == o.delete_protection &&
339
340
  description == o.description &&
341
+ inject_url == o.inject_url &&
340
342
  json == o.json &&
341
343
  metadata == o.metadata &&
342
344
  multiline_value == o.multiline_value &&
343
345
  name == o.name &&
344
- password_manager_custom_field == o.password_manager_custom_field &&
345
- password_manager_inject_url == o.password_manager_inject_url &&
346
- password_manager_password == o.password_manager_password &&
347
- password_manager_username == o.password_manager_username &&
346
+ password == o.password &&
348
347
  protection_key == o.protection_key &&
349
348
  secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
350
349
  secure_access_enable == o.secure_access_enable &&
@@ -359,6 +358,7 @@ module Akeyless
359
358
  token == o.token &&
360
359
  type == o.type &&
361
360
  uid_token == o.uid_token &&
361
+ username == o.username &&
362
362
  value == o.value
363
363
  end
364
364
 
@@ -371,7 +371,7 @@ module Akeyless
371
371
  # Calculates hash code according to all attributes.
372
372
  # @return [Integer] Hash code
373
373
  def hash
374
- [accessibility, delete_protection, description, json, metadata, multiline_value, name, password_manager_custom_field, password_manager_inject_url, password_manager_password, password_manager_username, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, value].hash
374
+ [accessibility, custom_field, delete_protection, description, inject_url, json, metadata, multiline_value, name, password, protection_key, secure_access_bastion_issuer, secure_access_enable, secure_access_host, secure_access_rdp_user, secure_access_ssh_creds, secure_access_ssh_user, secure_access_url, secure_access_web_browsing, secure_access_web_proxy, tags, token, type, uid_token, username, value].hash
375
375
  end
376
376
 
377
377
  # Builds the object from hash