akeyless 4.2.4 → 4.2.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (52) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +12 -1
  3. data/docs/AcmeAccount.md +22 -0
  4. data/docs/AuthMethodRoleAssociation.md +2 -0
  5. data/docs/ChangeAdminAccountPassword.md +26 -0
  6. data/docs/CreatePKICertIssuer.md +5 -1
  7. data/docs/DeactivateAcmeAccount.md +28 -0
  8. data/docs/GenerateAcmeEab.md +24 -0
  9. data/docs/GenerateAcmeEabOutput.md +22 -0
  10. data/docs/GetGroupOutput.md +2 -0
  11. data/docs/GetKubeExecCreds.md +1 -1
  12. data/docs/GetPKICertificate.md +1 -1
  13. data/docs/Group.md +2 -0
  14. data/docs/ListAcmeAccounts.md +24 -0
  15. data/docs/ListAcmeAccountsOutput.md +18 -0
  16. data/docs/PKICertificateIssueDetails.md +4 -0
  17. data/docs/RoleAssociationDetails.md +2 -0
  18. data/docs/RoleAuthMethodAssociation.md +2 -0
  19. data/docs/UpdateClassicKeyCertificate.md +2 -0
  20. data/docs/UpdateItem.md +2 -0
  21. data/docs/UpdatePKICertIssuer.md +5 -1
  22. data/docs/V2Api.md +252 -0
  23. data/lib/akeyless/api/v2_api.rb +256 -0
  24. data/lib/akeyless/models/acme_account.rb +234 -0
  25. data/lib/akeyless/models/auth_method_role_association.rb +10 -1
  26. data/lib/akeyless/models/change_admin_account_password.rb +271 -0
  27. data/lib/akeyless/models/create_pki_cert_issuer.rb +24 -2
  28. data/lib/akeyless/models/deactivate_acme_account.rb +282 -0
  29. data/lib/akeyless/models/generate_acme_eab.rb +254 -0
  30. data/lib/akeyless/models/generate_acme_eab_output.rb +232 -0
  31. data/lib/akeyless/models/get_group_output.rb +10 -1
  32. data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
  33. data/lib/akeyless/models/get_pki_certificate.rb +1 -1
  34. data/lib/akeyless/models/group.rb +10 -1
  35. data/lib/akeyless/models/list_acme_accounts.rb +255 -0
  36. data/lib/akeyless/models/list_acme_accounts_output.rb +216 -0
  37. data/lib/akeyless/models/pki_certificate_issue_details.rb +19 -1
  38. data/lib/akeyless/models/role_association_details.rb +10 -1
  39. data/lib/akeyless/models/role_auth_method_association.rb +10 -1
  40. data/lib/akeyless/models/update_classic_key_certificate.rb +10 -1
  41. data/lib/akeyless/models/update_item.rb +10 -1
  42. data/lib/akeyless/models/update_pki_cert_issuer.rb +24 -2
  43. data/lib/akeyless/version.rb +1 -1
  44. data/lib/akeyless.rb +7 -0
  45. data/spec/models/acme_account_spec.rb +48 -0
  46. data/spec/models/change_admin_account_password_spec.rb +60 -0
  47. data/spec/models/deactivate_acme_account_spec.rb +66 -0
  48. data/spec/models/generate_acme_eab_output_spec.rb +48 -0
  49. data/spec/models/generate_acme_eab_spec.rb +54 -0
  50. data/spec/models/list_acme_accounts_output_spec.rb +36 -0
  51. data/spec/models/list_acme_accounts_spec.rb +54 -0
  52. metadata +30 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: c9c495b60410ad078961c237c69082bc64161a6e8b0603fa6469d8085b85c414
4
- data.tar.gz: 50ad6bd1f59a7f4082fad3e019266496df432c5ad54028411ed26c8eb310a2b9
3
+ metadata.gz: bf1cfaa42428544175960b2d462d40c39d28b5a6248e9edafc1e1276c59dc558
4
+ data.tar.gz: 2cc9e5697dd73dbba507128103e3f13d8b11445ca69996078755c4eadb3db8ac
5
5
  SHA512:
6
- metadata.gz: 104552e9bc428c6519f46823327ce5cce328e65d5dcefc89c11d0632d38b6e2d7ee6dadd400225ac6e8995ed24b49166a0e7a397b82506a962cbc5550c2cea3a
7
- data.tar.gz: 942b3995c08ba296b48188a6213aad437ef16eaef2b9628a84fb4d8ba354826b482e6637c8cd8f91eb70c3f79f8c7be828210a36278eae3ecc9c79ed0c836d82
6
+ metadata.gz: 545b2becb6c588eaf01c8df79d327520c5215ae4f2bb3988dd0bc7360939df0580db114acd9136c3c23d49c6afa66e4e8bef93dbdcf11eca40611f16ba807eff
7
+ data.tar.gz: 1e1d3969da232bdd9496cb64103943053cead45403f2c9c58e8727cdac680ecd56ca30289af89831b55b234bd8aa69402ca7a30df74f3ca5f0868fb6e271e2be
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 4.2.4
10
+ - Package version: 4.2.5
11
11
  - Generator version: 7.9.0-SNAPSHOT
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -93,6 +93,7 @@ Class | Method | HTTP request | Description
93
93
  *Akeyless::V2Api* | [**auth_method_update_oidc**](docs/V2Api.md#auth_method_update_oidc) | **POST** /auth-method-update-oidc |
94
94
  *Akeyless::V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml |
95
95
  *Akeyless::V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity |
96
+ *Akeyless::V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password |
96
97
  *Akeyless::V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure |
97
98
  *Akeyless::V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect |
98
99
  *Akeyless::V2Api* | [**create_artifactory_target**](docs/V2Api.md#create_artifactory_target) | **POST** /create-artifactory-target |
@@ -150,6 +151,7 @@ Class | Method | HTTP request | Description
150
151
  *Akeyless::V2Api* | [**create_windows_target**](docs/V2Api.md#create_windows_target) | **POST** /create-windows-target |
151
152
  *Akeyless::V2Api* | [**create_zero_ssl_target**](docs/V2Api.md#create_zero_ssl_target) | **POST** /create-zerossl-target |
152
153
  *Akeyless::V2Api* | [**createldap_target**](docs/V2Api.md#createldap_target) | **POST** /create-ldap-target |
154
+ *Akeyless::V2Api* | [**deactivate_acme_account**](docs/V2Api.md#deactivate_acme_account) | **POST** /deactivate-acme-account |
153
155
  *Akeyless::V2Api* | [**decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt |
154
156
  *Akeyless::V2Api* | [**decrypt_batch**](docs/V2Api.md#decrypt_batch) | **POST** /decrypt-batch |
155
157
  *Akeyless::V2Api* | [**decrypt_gpg**](docs/V2Api.md#decrypt_gpg) | **POST** /decrypt-gpg |
@@ -362,6 +364,7 @@ Class | Method | HTTP request | Description
362
364
  *Akeyless::V2Api* | [**gateway_update_remote_access_rdp_recordings**](docs/V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording |
363
365
  *Akeyless::V2Api* | [**gateway_update_tls_cert**](docs/V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert |
364
366
  *Akeyless::V2Api* | [**gateway_update_tmp_users**](docs/V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds |
367
+ *Akeyless::V2Api* | [**generate_acme_eab**](docs/V2Api.md#generate_acme_eab) | **POST** /generate-acme-eab |
365
368
  *Akeyless::V2Api* | [**generate_csr**](docs/V2Api.md#generate_csr) | **POST** /generate-csr |
366
369
  *Akeyless::V2Api* | [**get_account_logo**](docs/V2Api.md#get_account_logo) | **POST** /get-account-logo |
367
370
  *Akeyless::V2Api* | [**get_account_settings**](docs/V2Api.md#get_account_settings) | **POST** /get-account-settings |
@@ -408,6 +411,7 @@ Class | Method | HTTP request | Description
408
411
  *Akeyless::V2Api* | [**kmip_renew_server_certificate**](docs/V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment |
409
412
  *Akeyless::V2Api* | [**kmip_server_setup**](docs/V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment |
410
413
  *Akeyless::V2Api* | [**kmip_set_server_state**](docs/V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state |
414
+ *Akeyless::V2Api* | [**list_acme_accounts**](docs/V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts |
411
415
  *Akeyless::V2Api* | [**list_auth_methods**](docs/V2Api.md#list_auth_methods) | **POST** /list-auth-methods |
412
416
  *Akeyless::V2Api* | [**list_gateways**](docs/V2Api.md#list_gateways) | **POST** /list-gateways |
413
417
  *Akeyless::V2Api* | [**list_groups**](docs/V2Api.md#list_groups) | **POST** /list-group |
@@ -625,6 +629,7 @@ Class | Method | HTTP request | Description
625
629
  - [Akeyless::AccessPermissionAssignment](docs/AccessPermissionAssignment.md)
626
630
  - [Akeyless::AccountGeneralSettings](docs/AccountGeneralSettings.md)
627
631
  - [Akeyless::AccountObjectVersionSettingsOutput](docs/AccountObjectVersionSettingsOutput.md)
632
+ - [Akeyless::AcmeAccount](docs/AcmeAccount.md)
628
633
  - [Akeyless::ActiveDirectoryMigration](docs/ActiveDirectoryMigration.md)
629
634
  - [Akeyless::ActiveDirectoryPayload](docs/ActiveDirectoryPayload.md)
630
635
  - [Akeyless::AddGatewayAllowedAccessId](docs/AddGatewayAllowedAccessId.md)
@@ -704,6 +709,7 @@ Class | Method | HTTP request | Description
704
709
  - [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
705
710
  - [Akeyless::CertificateVersionInfo](docs/CertificateVersionInfo.md)
706
711
  - [Akeyless::CfInfo](docs/CfInfo.md)
712
+ - [Akeyless::ChangeAdminAccountPassword](docs/ChangeAdminAccountPassword.md)
707
713
  - [Akeyless::ChefTargetDetails](docs/ChefTargetDetails.md)
708
714
  - [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
709
715
  - [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
@@ -834,6 +840,7 @@ Class | Method | HTTP request | Description
834
840
  - [Akeyless::DataProtectionSection](docs/DataProtectionSection.md)
835
841
  - [Akeyless::DatadogForwardingConfig](docs/DatadogForwardingConfig.md)
836
842
  - [Akeyless::DbTargetDetails](docs/DbTargetDetails.md)
843
+ - [Akeyless::DeactivateAcmeAccount](docs/DeactivateAcmeAccount.md)
837
844
  - [Akeyless::Decrypt](docs/Decrypt.md)
838
845
  - [Akeyless::DecryptFile](docs/DecryptFile.md)
839
846
  - [Akeyless::DecryptFileOutput](docs/DecryptFileOutput.md)
@@ -1177,6 +1184,8 @@ Class | Method | HTTP request | Description
1177
1184
  - [Akeyless::GcpTargetDetails](docs/GcpTargetDetails.md)
1178
1185
  - [Akeyless::GenCustomerFragment](docs/GenCustomerFragment.md)
1179
1186
  - [Akeyless::GeneralConfigPart](docs/GeneralConfigPart.md)
1187
+ - [Akeyless::GenerateAcmeEab](docs/GenerateAcmeEab.md)
1188
+ - [Akeyless::GenerateAcmeEabOutput](docs/GenerateAcmeEabOutput.md)
1180
1189
  - [Akeyless::GenerateCsr](docs/GenerateCsr.md)
1181
1190
  - [Akeyless::GenerateCsrOutput](docs/GenerateCsrOutput.md)
1182
1191
  - [Akeyless::GetAccountSettings](docs/GetAccountSettings.md)
@@ -1282,6 +1291,8 @@ Class | Method | HTTP request | Description
1282
1291
  - [Akeyless::LeadershipConfigPart](docs/LeadershipConfigPart.md)
1283
1292
  - [Akeyless::LinkedDetails](docs/LinkedDetails.md)
1284
1293
  - [Akeyless::LinkedTargetDetails](docs/LinkedTargetDetails.md)
1294
+ - [Akeyless::ListAcmeAccounts](docs/ListAcmeAccounts.md)
1295
+ - [Akeyless::ListAcmeAccountsOutput](docs/ListAcmeAccountsOutput.md)
1285
1296
  - [Akeyless::ListAuthMethods](docs/ListAuthMethods.md)
1286
1297
  - [Akeyless::ListAuthMethodsOutput](docs/ListAuthMethodsOutput.md)
1287
1298
  - [Akeyless::ListGateways](docs/ListGateways.md)
@@ -0,0 +1,22 @@
1
+ # Akeyless::AcmeAccount
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **account_id** | **String** | AccountId is the ACME account id, not Akeyless account id | [optional] |
8
+ | **key_digest** | **String** | | [optional] |
9
+ | **status** | **String** | | [optional] |
10
+
11
+ ## Example
12
+
13
+ ```ruby
14
+ require 'akeyless'
15
+
16
+ instance = Akeyless::AcmeAccount.new(
17
+ account_id: null,
18
+ key_digest: null,
19
+ status: null
20
+ )
21
+ ```
22
+
@@ -8,6 +8,7 @@
8
8
  | **assoc_id** | **String** | | [optional] |
9
9
  | **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
10
10
  | **is_sub_claims_case_sensitive** | **Boolean** | | [optional] |
11
+ | **is_subclaims_with_operator** | **Boolean** | | [optional] |
11
12
  | **role_name** | **String** | | [optional] |
12
13
  | **rules** | [**Rules**](Rules.md) | | [optional] |
13
14
 
@@ -21,6 +22,7 @@ instance = Akeyless::AuthMethodRoleAssociation.new(
21
22
  assoc_id: null,
22
23
  auth_method_sub_claims: null,
23
24
  is_sub_claims_case_sensitive: null,
25
+ is_subclaims_with_operator: null,
24
26
  role_name: null,
25
27
  rules: null
26
28
  )
@@ -0,0 +1,26 @@
1
+ # Akeyless::ChangeAdminAccountPassword
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **current_password** | **String** | Current password | |
8
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
+ | **new_password** | **String** | New password | |
10
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
11
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::ChangeAdminAccountPassword.new(
19
+ current_password: null,
20
+ json: null,
21
+ new_password: null,
22
+ token: null,
23
+ uid_token: null
24
+ )
25
+ ```
26
+
@@ -16,11 +16,13 @@
16
16
  | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
17
17
  | **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
18
18
  | **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
19
+ | **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
19
20
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
20
21
  | **description** | **String** | Description of the object | [optional] |
21
22
  | **destination_path** | **String** | A path in which to save generated certificates | [optional] |
23
+ | **enable_acme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] |
22
24
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
23
- | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] |
25
+ | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] |
24
26
  | **is_ca** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] |
25
27
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
26
28
  | **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
@@ -60,9 +62,11 @@ instance = Akeyless::CreatePKICertIssuer.new(
60
62
  country: null,
61
63
  create_private_crl: null,
62
64
  create_public_crl: null,
65
+ critical_key_usage: null,
63
66
  delete_protection: null,
64
67
  description: null,
65
68
  destination_path: null,
69
+ enable_acme: null,
66
70
  expiration_event_in: null,
67
71
  gw_cluster_url: null,
68
72
  is_ca: null,
@@ -0,0 +1,28 @@
1
+ # Akeyless::DeactivateAcmeAccount
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **acme_account_id** | **String** | The acme account id to deactivate | |
8
+ | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
9
+ | **delete_account** | **Boolean** | Delete the account | [optional] |
10
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
12
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
13
+
14
+ ## Example
15
+
16
+ ```ruby
17
+ require 'akeyless'
18
+
19
+ instance = Akeyless::DeactivateAcmeAccount.new(
20
+ acme_account_id: null,
21
+ cert_issuer_name: null,
22
+ delete_account: null,
23
+ json: null,
24
+ token: null,
25
+ uid_token: null
26
+ )
27
+ ```
28
+
@@ -0,0 +1,24 @@
1
+ # Akeyless::GenerateAcmeEab
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
8
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
10
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::GenerateAcmeEab.new(
18
+ cert_issuer_name: null,
19
+ json: null,
20
+ token: null,
21
+ uid_token: null
22
+ )
23
+ ```
24
+
@@ -0,0 +1,22 @@
1
+ # Akeyless::GenerateAcmeEabOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **expires_at** | **Time** | | [optional] |
8
+ | **kid** | **String** | | [optional] |
9
+ | **mac_key** | **String** | | [optional] |
10
+
11
+ ## Example
12
+
13
+ ```ruby
14
+ require 'akeyless'
15
+
16
+ instance = Akeyless::GenerateAcmeEabOutput.new(
17
+ expires_at: null,
18
+ kid: null,
19
+ mac_key: null
20
+ )
21
+ ```
22
+
@@ -10,6 +10,7 @@
10
10
  | **group_alias** | **String** | | [optional] |
11
11
  | **group_id** | **String** | | [optional] |
12
12
  | **group_name** | **String** | | [optional] |
13
+ | **is_subclaims_with_operator** | **Boolean** | | [optional] |
13
14
  | **modification_date** | **Time** | | [optional] |
14
15
  | **user_assignments** | [**Array<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] |
15
16
 
@@ -25,6 +26,7 @@ instance = Akeyless::GetGroupOutput.new(
25
26
  group_alias: null,
26
27
  group_id: null,
27
28
  group_name: null,
29
+ is_subclaims_with_operator: null,
28
30
  modification_date: null,
29
31
  user_assignments: null
30
32
  )
@@ -9,7 +9,7 @@
9
9
  | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
10
10
  | **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
11
11
  | **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
12
- | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
12
+ | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
13
13
  | **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
14
14
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
15
15
  | **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
@@ -8,7 +8,7 @@
8
8
  | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
9
9
  | **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
10
10
  | **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
11
- | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
11
+ | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
12
12
  | **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
13
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
14
  | **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
data/docs/Group.md CHANGED
@@ -10,6 +10,7 @@
10
10
  | **group_alias** | **String** | | [optional] |
11
11
  | **group_id** | **String** | | [optional] |
12
12
  | **group_name** | **String** | | [optional] |
13
+ | **is_subclaims_with_operator** | **Boolean** | | [optional] |
13
14
  | **modification_date** | **Time** | | [optional] |
14
15
  | **user_assignments** | [**Array<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] |
15
16
 
@@ -25,6 +26,7 @@ instance = Akeyless::Group.new(
25
26
  group_alias: null,
26
27
  group_id: null,
27
28
  group_name: null,
29
+ is_subclaims_with_operator: null,
28
30
  modification_date: null,
29
31
  user_assignments: null
30
32
  )
@@ -0,0 +1,24 @@
1
+ # Akeyless::ListAcmeAccounts
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
8
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
10
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::ListAcmeAccounts.new(
18
+ cert_issuer_name: null,
19
+ json: null,
20
+ token: null,
21
+ uid_token: null
22
+ )
23
+ ```
24
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::ListAcmeAccountsOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **accounts** | [**Array<AcmeAccount>**](AcmeAccount.md) | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::ListAcmeAccountsOutput.new(
15
+ accounts: null
16
+ )
17
+ ```
18
+
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **acme_enabled** | **Boolean** | | [optional] |
7
8
  | **allow_any_name** | **Boolean** | | [optional] |
8
9
  | **allow_copy_ext_from_csr** | **Boolean** | | [optional] |
9
10
  | **allow_subdomains** | **Boolean** | | [optional] |
@@ -27,6 +28,7 @@
27
28
  | **key_type** | **String** | | [optional] |
28
29
  | **key_usage_list** | **Array<String>** | | [optional] |
29
30
  | **locality** | **Array<String>** | | [optional] |
31
+ | **non_critical_key_usage** | **Boolean** | | [optional] |
30
32
  | **not_before_duration** | **Integer** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] |
31
33
  | **organization_list** | **Array<String>** | | [optional] |
32
34
  | **organization_unit_list** | **Array<String>** | | [optional] |
@@ -43,6 +45,7 @@
43
45
  require 'akeyless'
44
46
 
45
47
  instance = Akeyless::PKICertificateIssueDetails.new(
48
+ acme_enabled: null,
46
49
  allow_any_name: null,
47
50
  allow_copy_ext_from_csr: null,
48
51
  allow_subdomains: null,
@@ -66,6 +69,7 @@ instance = Akeyless::PKICertificateIssueDetails.new(
66
69
  key_type: null,
67
70
  key_usage_list: null,
68
71
  locality: null,
72
+ non_critical_key_usage: null,
69
73
  not_before_duration: null,
70
74
  organization_list: null,
71
75
  organization_unit_list: null,
@@ -7,6 +7,7 @@
7
7
  | **assoc_id** | **String** | | [optional] |
8
8
  | **auth_method_name** | **String** | | [optional] |
9
9
  | **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
10
+ | **is_subclaims_with_operator** | **Boolean** | | [optional] |
10
11
  | **role_name** | **String** | | [optional] |
11
12
  | **sub_claims_case_sensitive** | **Boolean** | | [optional] |
12
13
 
@@ -19,6 +20,7 @@ instance = Akeyless::RoleAssociationDetails.new(
19
20
  assoc_id: null,
20
21
  auth_method_name: null,
21
22
  auth_method_sub_claims: null,
23
+ is_subclaims_with_operator: null,
22
24
  role_name: null,
23
25
  sub_claims_case_sensitive: null
24
26
  )
@@ -8,6 +8,7 @@
8
8
  | **auth_method_access_id** | **String** | | [optional] |
9
9
  | **auth_method_name** | **String** | | [optional] |
10
10
  | **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
11
+ | **is_subclaims_with_operator** | **Boolean** | | [optional] |
11
12
  | **sub_claims_case_sensitive** | **Boolean** | | [optional] |
12
13
 
13
14
  ## Example
@@ -20,6 +21,7 @@ instance = Akeyless::RoleAuthMethodAssociation.new(
20
21
  auth_method_access_id: null,
21
22
  auth_method_name: null,
22
23
  auth_method_sub_claims: null,
24
+ is_subclaims_with_operator: null,
23
25
  sub_claims_case_sensitive: null
24
26
  )
25
27
  ```
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
8
+ | **certificate_format** | **String** | | [optional] |
8
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
10
  | **name** | **String** | ClassicKey name | |
10
11
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -17,6 +18,7 @@ require 'akeyless'
17
18
 
18
19
  instance = Akeyless::UpdateClassicKeyCertificate.new(
19
20
  cert_file_data: null,
21
+ certificate_format: null,
20
22
  json: null,
21
23
  name: null,
22
24
  token: null,
data/docs/UpdateItem.md CHANGED
@@ -8,6 +8,7 @@
8
8
  | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
9
9
  | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
10
10
  | **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
11
+ | **certificate_format** | **String** | | [optional] |
11
12
  | **change_event** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] |
12
13
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
13
14
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
@@ -58,6 +59,7 @@ instance = Akeyless::UpdateItem.new(
58
59
  accessibility: null,
59
60
  add_tag: null,
60
61
  cert_file_data: null,
62
+ certificate_format: null,
61
63
  change_event: null,
62
64
  delete_protection: null,
63
65
  description: null,
@@ -16,11 +16,13 @@
16
16
  | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
17
17
  | **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
18
18
  | **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
19
+ | **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
19
20
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
20
21
  | **description** | **String** | Description of the object | [optional] |
21
22
  | **destination_path** | **String** | A path in which to save generated certificates | [optional] |
23
+ | **enable_acme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] |
22
24
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
23
- | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from, required in Public CA mode or to allow CRLs on private CA | [optional] |
25
+ | **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] |
24
26
  | **is_ca** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] |
25
27
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
26
28
  | **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
@@ -61,9 +63,11 @@ instance = Akeyless::UpdatePKICertIssuer.new(
61
63
  country: null,
62
64
  create_private_crl: null,
63
65
  create_public_crl: null,
66
+ critical_key_usage: null,
64
67
  delete_protection: null,
65
68
  description: null,
66
69
  destination_path: null,
70
+ enable_acme: null,
67
71
  expiration_event_in: null,
68
72
  gw_cluster_url: null,
69
73
  is_ca: null,