akeyless 4.2.4 → 4.2.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +12 -1
- data/docs/AcmeAccount.md +22 -0
- data/docs/AuthMethodRoleAssociation.md +2 -0
- data/docs/ChangeAdminAccountPassword.md +26 -0
- data/docs/CreatePKICertIssuer.md +5 -1
- data/docs/DeactivateAcmeAccount.md +28 -0
- data/docs/GenerateAcmeEab.md +24 -0
- data/docs/GenerateAcmeEabOutput.md +22 -0
- data/docs/GetGroupOutput.md +2 -0
- data/docs/GetKubeExecCreds.md +1 -1
- data/docs/GetPKICertificate.md +1 -1
- data/docs/Group.md +2 -0
- data/docs/ListAcmeAccounts.md +24 -0
- data/docs/ListAcmeAccountsOutput.md +18 -0
- data/docs/PKICertificateIssueDetails.md +4 -0
- data/docs/RoleAssociationDetails.md +2 -0
- data/docs/RoleAuthMethodAssociation.md +2 -0
- data/docs/UpdateClassicKeyCertificate.md +2 -0
- data/docs/UpdateItem.md +2 -0
- data/docs/UpdatePKICertIssuer.md +5 -1
- data/docs/V2Api.md +252 -0
- data/lib/akeyless/api/v2_api.rb +256 -0
- data/lib/akeyless/models/acme_account.rb +234 -0
- data/lib/akeyless/models/auth_method_role_association.rb +10 -1
- data/lib/akeyless/models/change_admin_account_password.rb +271 -0
- data/lib/akeyless/models/create_pki_cert_issuer.rb +24 -2
- data/lib/akeyless/models/deactivate_acme_account.rb +282 -0
- data/lib/akeyless/models/generate_acme_eab.rb +254 -0
- data/lib/akeyless/models/generate_acme_eab_output.rb +232 -0
- data/lib/akeyless/models/get_group_output.rb +10 -1
- data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
- data/lib/akeyless/models/get_pki_certificate.rb +1 -1
- data/lib/akeyless/models/group.rb +10 -1
- data/lib/akeyless/models/list_acme_accounts.rb +255 -0
- data/lib/akeyless/models/list_acme_accounts_output.rb +216 -0
- data/lib/akeyless/models/pki_certificate_issue_details.rb +19 -1
- data/lib/akeyless/models/role_association_details.rb +10 -1
- data/lib/akeyless/models/role_auth_method_association.rb +10 -1
- data/lib/akeyless/models/update_classic_key_certificate.rb +10 -1
- data/lib/akeyless/models/update_item.rb +10 -1
- data/lib/akeyless/models/update_pki_cert_issuer.rb +24 -2
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +7 -0
- data/spec/models/acme_account_spec.rb +48 -0
- data/spec/models/change_admin_account_password_spec.rb +60 -0
- data/spec/models/deactivate_acme_account_spec.rb +66 -0
- data/spec/models/generate_acme_eab_output_spec.rb +48 -0
- data/spec/models/generate_acme_eab_spec.rb +54 -0
- data/spec/models/list_acme_accounts_output_spec.rb +36 -0
- data/spec/models/list_acme_accounts_spec.rb +54 -0
- metadata +30 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bf1cfaa42428544175960b2d462d40c39d28b5a6248e9edafc1e1276c59dc558
|
4
|
+
data.tar.gz: 2cc9e5697dd73dbba507128103e3f13d8b11445ca69996078755c4eadb3db8ac
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 545b2becb6c588eaf01c8df79d327520c5215ae4f2bb3988dd0bc7360939df0580db114acd9136c3c23d49c6afa66e4e8bef93dbdcf11eca40611f16ba807eff
|
7
|
+
data.tar.gz: 1e1d3969da232bdd9496cb64103943053cead45403f2c9c58e8727cdac680ecd56ca30289af89831b55b234bd8aa69402ca7a30df74f3ca5f0868fb6e271e2be
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 2.0
|
10
|
-
- Package version: 4.2.
|
10
|
+
- Package version: 4.2.5
|
11
11
|
- Generator version: 7.9.0-SNAPSHOT
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
@@ -93,6 +93,7 @@ Class | Method | HTTP request | Description
|
|
93
93
|
*Akeyless::V2Api* | [**auth_method_update_oidc**](docs/V2Api.md#auth_method_update_oidc) | **POST** /auth-method-update-oidc |
|
94
94
|
*Akeyless::V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml |
|
95
95
|
*Akeyless::V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity |
|
96
|
+
*Akeyless::V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password |
|
96
97
|
*Akeyless::V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure |
|
97
98
|
*Akeyless::V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect |
|
98
99
|
*Akeyless::V2Api* | [**create_artifactory_target**](docs/V2Api.md#create_artifactory_target) | **POST** /create-artifactory-target |
|
@@ -150,6 +151,7 @@ Class | Method | HTTP request | Description
|
|
150
151
|
*Akeyless::V2Api* | [**create_windows_target**](docs/V2Api.md#create_windows_target) | **POST** /create-windows-target |
|
151
152
|
*Akeyless::V2Api* | [**create_zero_ssl_target**](docs/V2Api.md#create_zero_ssl_target) | **POST** /create-zerossl-target |
|
152
153
|
*Akeyless::V2Api* | [**createldap_target**](docs/V2Api.md#createldap_target) | **POST** /create-ldap-target |
|
154
|
+
*Akeyless::V2Api* | [**deactivate_acme_account**](docs/V2Api.md#deactivate_acme_account) | **POST** /deactivate-acme-account |
|
153
155
|
*Akeyless::V2Api* | [**decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt |
|
154
156
|
*Akeyless::V2Api* | [**decrypt_batch**](docs/V2Api.md#decrypt_batch) | **POST** /decrypt-batch |
|
155
157
|
*Akeyless::V2Api* | [**decrypt_gpg**](docs/V2Api.md#decrypt_gpg) | **POST** /decrypt-gpg |
|
@@ -362,6 +364,7 @@ Class | Method | HTTP request | Description
|
|
362
364
|
*Akeyless::V2Api* | [**gateway_update_remote_access_rdp_recordings**](docs/V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording |
|
363
365
|
*Akeyless::V2Api* | [**gateway_update_tls_cert**](docs/V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert |
|
364
366
|
*Akeyless::V2Api* | [**gateway_update_tmp_users**](docs/V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds |
|
367
|
+
*Akeyless::V2Api* | [**generate_acme_eab**](docs/V2Api.md#generate_acme_eab) | **POST** /generate-acme-eab |
|
365
368
|
*Akeyless::V2Api* | [**generate_csr**](docs/V2Api.md#generate_csr) | **POST** /generate-csr |
|
366
369
|
*Akeyless::V2Api* | [**get_account_logo**](docs/V2Api.md#get_account_logo) | **POST** /get-account-logo |
|
367
370
|
*Akeyless::V2Api* | [**get_account_settings**](docs/V2Api.md#get_account_settings) | **POST** /get-account-settings |
|
@@ -408,6 +411,7 @@ Class | Method | HTTP request | Description
|
|
408
411
|
*Akeyless::V2Api* | [**kmip_renew_server_certificate**](docs/V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment |
|
409
412
|
*Akeyless::V2Api* | [**kmip_server_setup**](docs/V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment |
|
410
413
|
*Akeyless::V2Api* | [**kmip_set_server_state**](docs/V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state |
|
414
|
+
*Akeyless::V2Api* | [**list_acme_accounts**](docs/V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts |
|
411
415
|
*Akeyless::V2Api* | [**list_auth_methods**](docs/V2Api.md#list_auth_methods) | **POST** /list-auth-methods |
|
412
416
|
*Akeyless::V2Api* | [**list_gateways**](docs/V2Api.md#list_gateways) | **POST** /list-gateways |
|
413
417
|
*Akeyless::V2Api* | [**list_groups**](docs/V2Api.md#list_groups) | **POST** /list-group |
|
@@ -625,6 +629,7 @@ Class | Method | HTTP request | Description
|
|
625
629
|
- [Akeyless::AccessPermissionAssignment](docs/AccessPermissionAssignment.md)
|
626
630
|
- [Akeyless::AccountGeneralSettings](docs/AccountGeneralSettings.md)
|
627
631
|
- [Akeyless::AccountObjectVersionSettingsOutput](docs/AccountObjectVersionSettingsOutput.md)
|
632
|
+
- [Akeyless::AcmeAccount](docs/AcmeAccount.md)
|
628
633
|
- [Akeyless::ActiveDirectoryMigration](docs/ActiveDirectoryMigration.md)
|
629
634
|
- [Akeyless::ActiveDirectoryPayload](docs/ActiveDirectoryPayload.md)
|
630
635
|
- [Akeyless::AddGatewayAllowedAccessId](docs/AddGatewayAllowedAccessId.md)
|
@@ -704,6 +709,7 @@ Class | Method | HTTP request | Description
|
|
704
709
|
- [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
|
705
710
|
- [Akeyless::CertificateVersionInfo](docs/CertificateVersionInfo.md)
|
706
711
|
- [Akeyless::CfInfo](docs/CfInfo.md)
|
712
|
+
- [Akeyless::ChangeAdminAccountPassword](docs/ChangeAdminAccountPassword.md)
|
707
713
|
- [Akeyless::ChefTargetDetails](docs/ChefTargetDetails.md)
|
708
714
|
- [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
|
709
715
|
- [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
|
@@ -834,6 +840,7 @@ Class | Method | HTTP request | Description
|
|
834
840
|
- [Akeyless::DataProtectionSection](docs/DataProtectionSection.md)
|
835
841
|
- [Akeyless::DatadogForwardingConfig](docs/DatadogForwardingConfig.md)
|
836
842
|
- [Akeyless::DbTargetDetails](docs/DbTargetDetails.md)
|
843
|
+
- [Akeyless::DeactivateAcmeAccount](docs/DeactivateAcmeAccount.md)
|
837
844
|
- [Akeyless::Decrypt](docs/Decrypt.md)
|
838
845
|
- [Akeyless::DecryptFile](docs/DecryptFile.md)
|
839
846
|
- [Akeyless::DecryptFileOutput](docs/DecryptFileOutput.md)
|
@@ -1177,6 +1184,8 @@ Class | Method | HTTP request | Description
|
|
1177
1184
|
- [Akeyless::GcpTargetDetails](docs/GcpTargetDetails.md)
|
1178
1185
|
- [Akeyless::GenCustomerFragment](docs/GenCustomerFragment.md)
|
1179
1186
|
- [Akeyless::GeneralConfigPart](docs/GeneralConfigPart.md)
|
1187
|
+
- [Akeyless::GenerateAcmeEab](docs/GenerateAcmeEab.md)
|
1188
|
+
- [Akeyless::GenerateAcmeEabOutput](docs/GenerateAcmeEabOutput.md)
|
1180
1189
|
- [Akeyless::GenerateCsr](docs/GenerateCsr.md)
|
1181
1190
|
- [Akeyless::GenerateCsrOutput](docs/GenerateCsrOutput.md)
|
1182
1191
|
- [Akeyless::GetAccountSettings](docs/GetAccountSettings.md)
|
@@ -1282,6 +1291,8 @@ Class | Method | HTTP request | Description
|
|
1282
1291
|
- [Akeyless::LeadershipConfigPart](docs/LeadershipConfigPart.md)
|
1283
1292
|
- [Akeyless::LinkedDetails](docs/LinkedDetails.md)
|
1284
1293
|
- [Akeyless::LinkedTargetDetails](docs/LinkedTargetDetails.md)
|
1294
|
+
- [Akeyless::ListAcmeAccounts](docs/ListAcmeAccounts.md)
|
1295
|
+
- [Akeyless::ListAcmeAccountsOutput](docs/ListAcmeAccountsOutput.md)
|
1285
1296
|
- [Akeyless::ListAuthMethods](docs/ListAuthMethods.md)
|
1286
1297
|
- [Akeyless::ListAuthMethodsOutput](docs/ListAuthMethodsOutput.md)
|
1287
1298
|
- [Akeyless::ListGateways](docs/ListGateways.md)
|
data/docs/AcmeAccount.md
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
# Akeyless::AcmeAccount
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **account_id** | **String** | AccountId is the ACME account id, not Akeyless account id | [optional] |
|
8
|
+
| **key_digest** | **String** | | [optional] |
|
9
|
+
| **status** | **String** | | [optional] |
|
10
|
+
|
11
|
+
## Example
|
12
|
+
|
13
|
+
```ruby
|
14
|
+
require 'akeyless'
|
15
|
+
|
16
|
+
instance = Akeyless::AcmeAccount.new(
|
17
|
+
account_id: null,
|
18
|
+
key_digest: null,
|
19
|
+
status: null
|
20
|
+
)
|
21
|
+
```
|
22
|
+
|
@@ -8,6 +8,7 @@
|
|
8
8
|
| **assoc_id** | **String** | | [optional] |
|
9
9
|
| **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
|
10
10
|
| **is_sub_claims_case_sensitive** | **Boolean** | | [optional] |
|
11
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
11
12
|
| **role_name** | **String** | | [optional] |
|
12
13
|
| **rules** | [**Rules**](Rules.md) | | [optional] |
|
13
14
|
|
@@ -21,6 +22,7 @@ instance = Akeyless::AuthMethodRoleAssociation.new(
|
|
21
22
|
assoc_id: null,
|
22
23
|
auth_method_sub_claims: null,
|
23
24
|
is_sub_claims_case_sensitive: null,
|
25
|
+
is_subclaims_with_operator: null,
|
24
26
|
role_name: null,
|
25
27
|
rules: null
|
26
28
|
)
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# Akeyless::ChangeAdminAccountPassword
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **current_password** | **String** | Current password | |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
|
+
| **new_password** | **String** | New password | |
|
10
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
11
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
12
|
+
|
13
|
+
## Example
|
14
|
+
|
15
|
+
```ruby
|
16
|
+
require 'akeyless'
|
17
|
+
|
18
|
+
instance = Akeyless::ChangeAdminAccountPassword.new(
|
19
|
+
current_password: null,
|
20
|
+
json: null,
|
21
|
+
new_password: null,
|
22
|
+
token: null,
|
23
|
+
uid_token: null
|
24
|
+
)
|
25
|
+
```
|
26
|
+
|
data/docs/CreatePKICertIssuer.md
CHANGED
@@ -16,11 +16,13 @@
|
|
16
16
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
17
17
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
18
18
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
19
|
+
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
19
20
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
20
21
|
| **description** | **String** | Description of the object | [optional] |
|
21
22
|
| **destination_path** | **String** | A path in which to save generated certificates | [optional] |
|
23
|
+
| **enable_acme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] |
|
22
24
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
23
|
-
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from
|
25
|
+
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] |
|
24
26
|
| **is_ca** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] |
|
25
27
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
26
28
|
| **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
|
@@ -60,9 +62,11 @@ instance = Akeyless::CreatePKICertIssuer.new(
|
|
60
62
|
country: null,
|
61
63
|
create_private_crl: null,
|
62
64
|
create_public_crl: null,
|
65
|
+
critical_key_usage: null,
|
63
66
|
delete_protection: null,
|
64
67
|
description: null,
|
65
68
|
destination_path: null,
|
69
|
+
enable_acme: null,
|
66
70
|
expiration_event_in: null,
|
67
71
|
gw_cluster_url: null,
|
68
72
|
is_ca: null,
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# Akeyless::DeactivateAcmeAccount
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **acme_account_id** | **String** | The acme account id to deactivate | |
|
8
|
+
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
9
|
+
| **delete_account** | **Boolean** | Delete the account | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
11
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
12
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
13
|
+
|
14
|
+
## Example
|
15
|
+
|
16
|
+
```ruby
|
17
|
+
require 'akeyless'
|
18
|
+
|
19
|
+
instance = Akeyless::DeactivateAcmeAccount.new(
|
20
|
+
acme_account_id: null,
|
21
|
+
cert_issuer_name: null,
|
22
|
+
delete_account: null,
|
23
|
+
json: null,
|
24
|
+
token: null,
|
25
|
+
uid_token: null
|
26
|
+
)
|
27
|
+
```
|
28
|
+
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::GenerateAcmeEab
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
10
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::GenerateAcmeEab.new(
|
18
|
+
cert_issuer_name: null,
|
19
|
+
json: null,
|
20
|
+
token: null,
|
21
|
+
uid_token: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -0,0 +1,22 @@
|
|
1
|
+
# Akeyless::GenerateAcmeEabOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **expires_at** | **Time** | | [optional] |
|
8
|
+
| **kid** | **String** | | [optional] |
|
9
|
+
| **mac_key** | **String** | | [optional] |
|
10
|
+
|
11
|
+
## Example
|
12
|
+
|
13
|
+
```ruby
|
14
|
+
require 'akeyless'
|
15
|
+
|
16
|
+
instance = Akeyless::GenerateAcmeEabOutput.new(
|
17
|
+
expires_at: null,
|
18
|
+
kid: null,
|
19
|
+
mac_key: null
|
20
|
+
)
|
21
|
+
```
|
22
|
+
|
data/docs/GetGroupOutput.md
CHANGED
@@ -10,6 +10,7 @@
|
|
10
10
|
| **group_alias** | **String** | | [optional] |
|
11
11
|
| **group_id** | **String** | | [optional] |
|
12
12
|
| **group_name** | **String** | | [optional] |
|
13
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
13
14
|
| **modification_date** | **Time** | | [optional] |
|
14
15
|
| **user_assignments** | [**Array<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] |
|
15
16
|
|
@@ -25,6 +26,7 @@ instance = Akeyless::GetGroupOutput.new(
|
|
25
26
|
group_alias: null,
|
26
27
|
group_id: null,
|
27
28
|
group_name: null,
|
29
|
+
is_subclaims_with_operator: null,
|
28
30
|
modification_date: null,
|
29
31
|
user_assignments: null
|
30
32
|
)
|
data/docs/GetKubeExecCreds.md
CHANGED
@@ -9,7 +9,7 @@
|
|
9
9
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
10
10
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
11
11
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
12
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
|
12
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
13
13
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
15
15
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/GetPKICertificate.md
CHANGED
@@ -8,7 +8,7 @@
|
|
8
8
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
9
9
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
10
10
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
11
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
|
11
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
12
12
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
14
14
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/Group.md
CHANGED
@@ -10,6 +10,7 @@
|
|
10
10
|
| **group_alias** | **String** | | [optional] |
|
11
11
|
| **group_id** | **String** | | [optional] |
|
12
12
|
| **group_name** | **String** | | [optional] |
|
13
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
13
14
|
| **modification_date** | **Time** | | [optional] |
|
14
15
|
| **user_assignments** | [**Array<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] |
|
15
16
|
|
@@ -25,6 +26,7 @@ instance = Akeyless::Group.new(
|
|
25
26
|
group_alias: null,
|
26
27
|
group_id: null,
|
27
28
|
group_name: null,
|
29
|
+
is_subclaims_with_operator: null,
|
28
30
|
modification_date: null,
|
29
31
|
user_assignments: null
|
30
32
|
)
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::ListAcmeAccounts
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
10
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::ListAcmeAccounts.new(
|
18
|
+
cert_issuer_name: null,
|
19
|
+
json: null,
|
20
|
+
token: null,
|
21
|
+
uid_token: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::ListAcmeAccountsOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **accounts** | [**Array<AcmeAccount>**](AcmeAccount.md) | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::ListAcmeAccountsOutput.new(
|
15
|
+
accounts: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -4,6 +4,7 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **acme_enabled** | **Boolean** | | [optional] |
|
7
8
|
| **allow_any_name** | **Boolean** | | [optional] |
|
8
9
|
| **allow_copy_ext_from_csr** | **Boolean** | | [optional] |
|
9
10
|
| **allow_subdomains** | **Boolean** | | [optional] |
|
@@ -27,6 +28,7 @@
|
|
27
28
|
| **key_type** | **String** | | [optional] |
|
28
29
|
| **key_usage_list** | **Array<String>** | | [optional] |
|
29
30
|
| **locality** | **Array<String>** | | [optional] |
|
31
|
+
| **non_critical_key_usage** | **Boolean** | | [optional] |
|
30
32
|
| **not_before_duration** | **Integer** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] |
|
31
33
|
| **organization_list** | **Array<String>** | | [optional] |
|
32
34
|
| **organization_unit_list** | **Array<String>** | | [optional] |
|
@@ -43,6 +45,7 @@
|
|
43
45
|
require 'akeyless'
|
44
46
|
|
45
47
|
instance = Akeyless::PKICertificateIssueDetails.new(
|
48
|
+
acme_enabled: null,
|
46
49
|
allow_any_name: null,
|
47
50
|
allow_copy_ext_from_csr: null,
|
48
51
|
allow_subdomains: null,
|
@@ -66,6 +69,7 @@ instance = Akeyless::PKICertificateIssueDetails.new(
|
|
66
69
|
key_type: null,
|
67
70
|
key_usage_list: null,
|
68
71
|
locality: null,
|
72
|
+
non_critical_key_usage: null,
|
69
73
|
not_before_duration: null,
|
70
74
|
organization_list: null,
|
71
75
|
organization_unit_list: null,
|
@@ -7,6 +7,7 @@
|
|
7
7
|
| **assoc_id** | **String** | | [optional] |
|
8
8
|
| **auth_method_name** | **String** | | [optional] |
|
9
9
|
| **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
|
10
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
10
11
|
| **role_name** | **String** | | [optional] |
|
11
12
|
| **sub_claims_case_sensitive** | **Boolean** | | [optional] |
|
12
13
|
|
@@ -19,6 +20,7 @@ instance = Akeyless::RoleAssociationDetails.new(
|
|
19
20
|
assoc_id: null,
|
20
21
|
auth_method_name: null,
|
21
22
|
auth_method_sub_claims: null,
|
23
|
+
is_subclaims_with_operator: null,
|
22
24
|
role_name: null,
|
23
25
|
sub_claims_case_sensitive: null
|
24
26
|
)
|
@@ -8,6 +8,7 @@
|
|
8
8
|
| **auth_method_access_id** | **String** | | [optional] |
|
9
9
|
| **auth_method_name** | **String** | | [optional] |
|
10
10
|
| **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
|
11
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
11
12
|
| **sub_claims_case_sensitive** | **Boolean** | | [optional] |
|
12
13
|
|
13
14
|
## Example
|
@@ -20,6 +21,7 @@ instance = Akeyless::RoleAuthMethodAssociation.new(
|
|
20
21
|
auth_method_access_id: null,
|
21
22
|
auth_method_name: null,
|
22
23
|
auth_method_sub_claims: null,
|
24
|
+
is_subclaims_with_operator: null,
|
23
25
|
sub_claims_case_sensitive: null
|
24
26
|
)
|
25
27
|
```
|
@@ -5,6 +5,7 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
|
8
|
+
| **certificate_format** | **String** | | [optional] |
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
10
|
| **name** | **String** | ClassicKey name | |
|
10
11
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -17,6 +18,7 @@ require 'akeyless'
|
|
17
18
|
|
18
19
|
instance = Akeyless::UpdateClassicKeyCertificate.new(
|
19
20
|
cert_file_data: null,
|
21
|
+
certificate_format: null,
|
20
22
|
json: null,
|
21
23
|
name: null,
|
22
24
|
token: null,
|
data/docs/UpdateItem.md
CHANGED
@@ -8,6 +8,7 @@
|
|
8
8
|
| **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
|
9
9
|
| **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
|
10
10
|
| **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
|
11
|
+
| **certificate_format** | **String** | | [optional] |
|
11
12
|
| **change_event** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] |
|
12
13
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
13
14
|
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
@@ -58,6 +59,7 @@ instance = Akeyless::UpdateItem.new(
|
|
58
59
|
accessibility: null,
|
59
60
|
add_tag: null,
|
60
61
|
cert_file_data: null,
|
62
|
+
certificate_format: null,
|
61
63
|
change_event: null,
|
62
64
|
delete_protection: null,
|
63
65
|
description: null,
|
data/docs/UpdatePKICertIssuer.md
CHANGED
@@ -16,11 +16,13 @@
|
|
16
16
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
17
17
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
18
18
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
19
|
+
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
19
20
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
20
21
|
| **description** | **String** | Description of the object | [optional] |
|
21
22
|
| **destination_path** | **String** | A path in which to save generated certificates | [optional] |
|
23
|
+
| **enable_acme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] |
|
22
24
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
23
|
-
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from
|
25
|
+
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] |
|
24
26
|
| **is_ca** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] |
|
25
27
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
26
28
|
| **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
|
@@ -61,9 +63,11 @@ instance = Akeyless::UpdatePKICertIssuer.new(
|
|
61
63
|
country: null,
|
62
64
|
create_private_crl: null,
|
63
65
|
create_public_crl: null,
|
66
|
+
critical_key_usage: null,
|
64
67
|
delete_protection: null,
|
65
68
|
description: null,
|
66
69
|
destination_path: null,
|
70
|
+
enable_acme: null,
|
67
71
|
expiration_event_in: null,
|
68
72
|
gw_cluster_url: null,
|
69
73
|
is_ca: null,
|