akeyless 4.2.4 → 4.2.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +12 -1
- data/docs/AcmeAccount.md +22 -0
- data/docs/AuthMethodRoleAssociation.md +2 -0
- data/docs/ChangeAdminAccountPassword.md +26 -0
- data/docs/CreatePKICertIssuer.md +5 -1
- data/docs/DeactivateAcmeAccount.md +28 -0
- data/docs/GenerateAcmeEab.md +24 -0
- data/docs/GenerateAcmeEabOutput.md +22 -0
- data/docs/GetGroupOutput.md +2 -0
- data/docs/GetKubeExecCreds.md +1 -1
- data/docs/GetPKICertificate.md +1 -1
- data/docs/Group.md +2 -0
- data/docs/ListAcmeAccounts.md +24 -0
- data/docs/ListAcmeAccountsOutput.md +18 -0
- data/docs/PKICertificateIssueDetails.md +4 -0
- data/docs/RoleAssociationDetails.md +2 -0
- data/docs/RoleAuthMethodAssociation.md +2 -0
- data/docs/UpdateClassicKeyCertificate.md +2 -0
- data/docs/UpdateItem.md +2 -0
- data/docs/UpdatePKICertIssuer.md +5 -1
- data/docs/V2Api.md +252 -0
- data/lib/akeyless/api/v2_api.rb +256 -0
- data/lib/akeyless/models/acme_account.rb +234 -0
- data/lib/akeyless/models/auth_method_role_association.rb +10 -1
- data/lib/akeyless/models/change_admin_account_password.rb +271 -0
- data/lib/akeyless/models/create_pki_cert_issuer.rb +24 -2
- data/lib/akeyless/models/deactivate_acme_account.rb +282 -0
- data/lib/akeyless/models/generate_acme_eab.rb +254 -0
- data/lib/akeyless/models/generate_acme_eab_output.rb +232 -0
- data/lib/akeyless/models/get_group_output.rb +10 -1
- data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
- data/lib/akeyless/models/get_pki_certificate.rb +1 -1
- data/lib/akeyless/models/group.rb +10 -1
- data/lib/akeyless/models/list_acme_accounts.rb +255 -0
- data/lib/akeyless/models/list_acme_accounts_output.rb +216 -0
- data/lib/akeyless/models/pki_certificate_issue_details.rb +19 -1
- data/lib/akeyless/models/role_association_details.rb +10 -1
- data/lib/akeyless/models/role_auth_method_association.rb +10 -1
- data/lib/akeyless/models/update_classic_key_certificate.rb +10 -1
- data/lib/akeyless/models/update_item.rb +10 -1
- data/lib/akeyless/models/update_pki_cert_issuer.rb +24 -2
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +7 -0
- data/spec/models/acme_account_spec.rb +48 -0
- data/spec/models/change_admin_account_password_spec.rb +60 -0
- data/spec/models/deactivate_acme_account_spec.rb +66 -0
- data/spec/models/generate_acme_eab_output_spec.rb +48 -0
- data/spec/models/generate_acme_eab_spec.rb +54 -0
- data/spec/models/list_acme_accounts_output_spec.rb +36 -0
- data/spec/models/list_acme_accounts_spec.rb +54 -0
- metadata +30 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bf1cfaa42428544175960b2d462d40c39d28b5a6248e9edafc1e1276c59dc558
|
4
|
+
data.tar.gz: 2cc9e5697dd73dbba507128103e3f13d8b11445ca69996078755c4eadb3db8ac
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 545b2becb6c588eaf01c8df79d327520c5215ae4f2bb3988dd0bc7360939df0580db114acd9136c3c23d49c6afa66e4e8bef93dbdcf11eca40611f16ba807eff
|
7
|
+
data.tar.gz: 1e1d3969da232bdd9496cb64103943053cead45403f2c9c58e8727cdac680ecd56ca30289af89831b55b234bd8aa69402ca7a30df74f3ca5f0868fb6e271e2be
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 2.0
|
10
|
-
- Package version: 4.2.
|
10
|
+
- Package version: 4.2.5
|
11
11
|
- Generator version: 7.9.0-SNAPSHOT
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
@@ -93,6 +93,7 @@ Class | Method | HTTP request | Description
|
|
93
93
|
*Akeyless::V2Api* | [**auth_method_update_oidc**](docs/V2Api.md#auth_method_update_oidc) | **POST** /auth-method-update-oidc |
|
94
94
|
*Akeyless::V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml |
|
95
95
|
*Akeyless::V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity |
|
96
|
+
*Akeyless::V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password |
|
96
97
|
*Akeyless::V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure |
|
97
98
|
*Akeyless::V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect |
|
98
99
|
*Akeyless::V2Api* | [**create_artifactory_target**](docs/V2Api.md#create_artifactory_target) | **POST** /create-artifactory-target |
|
@@ -150,6 +151,7 @@ Class | Method | HTTP request | Description
|
|
150
151
|
*Akeyless::V2Api* | [**create_windows_target**](docs/V2Api.md#create_windows_target) | **POST** /create-windows-target |
|
151
152
|
*Akeyless::V2Api* | [**create_zero_ssl_target**](docs/V2Api.md#create_zero_ssl_target) | **POST** /create-zerossl-target |
|
152
153
|
*Akeyless::V2Api* | [**createldap_target**](docs/V2Api.md#createldap_target) | **POST** /create-ldap-target |
|
154
|
+
*Akeyless::V2Api* | [**deactivate_acme_account**](docs/V2Api.md#deactivate_acme_account) | **POST** /deactivate-acme-account |
|
153
155
|
*Akeyless::V2Api* | [**decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt |
|
154
156
|
*Akeyless::V2Api* | [**decrypt_batch**](docs/V2Api.md#decrypt_batch) | **POST** /decrypt-batch |
|
155
157
|
*Akeyless::V2Api* | [**decrypt_gpg**](docs/V2Api.md#decrypt_gpg) | **POST** /decrypt-gpg |
|
@@ -362,6 +364,7 @@ Class | Method | HTTP request | Description
|
|
362
364
|
*Akeyless::V2Api* | [**gateway_update_remote_access_rdp_recordings**](docs/V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording |
|
363
365
|
*Akeyless::V2Api* | [**gateway_update_tls_cert**](docs/V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert |
|
364
366
|
*Akeyless::V2Api* | [**gateway_update_tmp_users**](docs/V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds |
|
367
|
+
*Akeyless::V2Api* | [**generate_acme_eab**](docs/V2Api.md#generate_acme_eab) | **POST** /generate-acme-eab |
|
365
368
|
*Akeyless::V2Api* | [**generate_csr**](docs/V2Api.md#generate_csr) | **POST** /generate-csr |
|
366
369
|
*Akeyless::V2Api* | [**get_account_logo**](docs/V2Api.md#get_account_logo) | **POST** /get-account-logo |
|
367
370
|
*Akeyless::V2Api* | [**get_account_settings**](docs/V2Api.md#get_account_settings) | **POST** /get-account-settings |
|
@@ -408,6 +411,7 @@ Class | Method | HTTP request | Description
|
|
408
411
|
*Akeyless::V2Api* | [**kmip_renew_server_certificate**](docs/V2Api.md#kmip_renew_server_certificate) | **POST** /kmip-renew-environment |
|
409
412
|
*Akeyless::V2Api* | [**kmip_server_setup**](docs/V2Api.md#kmip_server_setup) | **POST** /kmip-create-environment |
|
410
413
|
*Akeyless::V2Api* | [**kmip_set_server_state**](docs/V2Api.md#kmip_set_server_state) | **POST** /kmip-set-environment-state |
|
414
|
+
*Akeyless::V2Api* | [**list_acme_accounts**](docs/V2Api.md#list_acme_accounts) | **POST** /list-acme-accounts |
|
411
415
|
*Akeyless::V2Api* | [**list_auth_methods**](docs/V2Api.md#list_auth_methods) | **POST** /list-auth-methods |
|
412
416
|
*Akeyless::V2Api* | [**list_gateways**](docs/V2Api.md#list_gateways) | **POST** /list-gateways |
|
413
417
|
*Akeyless::V2Api* | [**list_groups**](docs/V2Api.md#list_groups) | **POST** /list-group |
|
@@ -625,6 +629,7 @@ Class | Method | HTTP request | Description
|
|
625
629
|
- [Akeyless::AccessPermissionAssignment](docs/AccessPermissionAssignment.md)
|
626
630
|
- [Akeyless::AccountGeneralSettings](docs/AccountGeneralSettings.md)
|
627
631
|
- [Akeyless::AccountObjectVersionSettingsOutput](docs/AccountObjectVersionSettingsOutput.md)
|
632
|
+
- [Akeyless::AcmeAccount](docs/AcmeAccount.md)
|
628
633
|
- [Akeyless::ActiveDirectoryMigration](docs/ActiveDirectoryMigration.md)
|
629
634
|
- [Akeyless::ActiveDirectoryPayload](docs/ActiveDirectoryPayload.md)
|
630
635
|
- [Akeyless::AddGatewayAllowedAccessId](docs/AddGatewayAllowedAccessId.md)
|
@@ -704,6 +709,7 @@ Class | Method | HTTP request | Description
|
|
704
709
|
- [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
|
705
710
|
- [Akeyless::CertificateVersionInfo](docs/CertificateVersionInfo.md)
|
706
711
|
- [Akeyless::CfInfo](docs/CfInfo.md)
|
712
|
+
- [Akeyless::ChangeAdminAccountPassword](docs/ChangeAdminAccountPassword.md)
|
707
713
|
- [Akeyless::ChefTargetDetails](docs/ChefTargetDetails.md)
|
708
714
|
- [Akeyless::ClassicKeyDetailsInfo](docs/ClassicKeyDetailsInfo.md)
|
709
715
|
- [Akeyless::ClassicKeyStatusInfo](docs/ClassicKeyStatusInfo.md)
|
@@ -834,6 +840,7 @@ Class | Method | HTTP request | Description
|
|
834
840
|
- [Akeyless::DataProtectionSection](docs/DataProtectionSection.md)
|
835
841
|
- [Akeyless::DatadogForwardingConfig](docs/DatadogForwardingConfig.md)
|
836
842
|
- [Akeyless::DbTargetDetails](docs/DbTargetDetails.md)
|
843
|
+
- [Akeyless::DeactivateAcmeAccount](docs/DeactivateAcmeAccount.md)
|
837
844
|
- [Akeyless::Decrypt](docs/Decrypt.md)
|
838
845
|
- [Akeyless::DecryptFile](docs/DecryptFile.md)
|
839
846
|
- [Akeyless::DecryptFileOutput](docs/DecryptFileOutput.md)
|
@@ -1177,6 +1184,8 @@ Class | Method | HTTP request | Description
|
|
1177
1184
|
- [Akeyless::GcpTargetDetails](docs/GcpTargetDetails.md)
|
1178
1185
|
- [Akeyless::GenCustomerFragment](docs/GenCustomerFragment.md)
|
1179
1186
|
- [Akeyless::GeneralConfigPart](docs/GeneralConfigPart.md)
|
1187
|
+
- [Akeyless::GenerateAcmeEab](docs/GenerateAcmeEab.md)
|
1188
|
+
- [Akeyless::GenerateAcmeEabOutput](docs/GenerateAcmeEabOutput.md)
|
1180
1189
|
- [Akeyless::GenerateCsr](docs/GenerateCsr.md)
|
1181
1190
|
- [Akeyless::GenerateCsrOutput](docs/GenerateCsrOutput.md)
|
1182
1191
|
- [Akeyless::GetAccountSettings](docs/GetAccountSettings.md)
|
@@ -1282,6 +1291,8 @@ Class | Method | HTTP request | Description
|
|
1282
1291
|
- [Akeyless::LeadershipConfigPart](docs/LeadershipConfigPart.md)
|
1283
1292
|
- [Akeyless::LinkedDetails](docs/LinkedDetails.md)
|
1284
1293
|
- [Akeyless::LinkedTargetDetails](docs/LinkedTargetDetails.md)
|
1294
|
+
- [Akeyless::ListAcmeAccounts](docs/ListAcmeAccounts.md)
|
1295
|
+
- [Akeyless::ListAcmeAccountsOutput](docs/ListAcmeAccountsOutput.md)
|
1285
1296
|
- [Akeyless::ListAuthMethods](docs/ListAuthMethods.md)
|
1286
1297
|
- [Akeyless::ListAuthMethodsOutput](docs/ListAuthMethodsOutput.md)
|
1287
1298
|
- [Akeyless::ListGateways](docs/ListGateways.md)
|
data/docs/AcmeAccount.md
ADDED
@@ -0,0 +1,22 @@
|
|
1
|
+
# Akeyless::AcmeAccount
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **account_id** | **String** | AccountId is the ACME account id, not Akeyless account id | [optional] |
|
8
|
+
| **key_digest** | **String** | | [optional] |
|
9
|
+
| **status** | **String** | | [optional] |
|
10
|
+
|
11
|
+
## Example
|
12
|
+
|
13
|
+
```ruby
|
14
|
+
require 'akeyless'
|
15
|
+
|
16
|
+
instance = Akeyless::AcmeAccount.new(
|
17
|
+
account_id: null,
|
18
|
+
key_digest: null,
|
19
|
+
status: null
|
20
|
+
)
|
21
|
+
```
|
22
|
+
|
@@ -8,6 +8,7 @@
|
|
8
8
|
| **assoc_id** | **String** | | [optional] |
|
9
9
|
| **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
|
10
10
|
| **is_sub_claims_case_sensitive** | **Boolean** | | [optional] |
|
11
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
11
12
|
| **role_name** | **String** | | [optional] |
|
12
13
|
| **rules** | [**Rules**](Rules.md) | | [optional] |
|
13
14
|
|
@@ -21,6 +22,7 @@ instance = Akeyless::AuthMethodRoleAssociation.new(
|
|
21
22
|
assoc_id: null,
|
22
23
|
auth_method_sub_claims: null,
|
23
24
|
is_sub_claims_case_sensitive: null,
|
25
|
+
is_subclaims_with_operator: null,
|
24
26
|
role_name: null,
|
25
27
|
rules: null
|
26
28
|
)
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# Akeyless::ChangeAdminAccountPassword
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **current_password** | **String** | Current password | |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
|
+
| **new_password** | **String** | New password | |
|
10
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
11
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
12
|
+
|
13
|
+
## Example
|
14
|
+
|
15
|
+
```ruby
|
16
|
+
require 'akeyless'
|
17
|
+
|
18
|
+
instance = Akeyless::ChangeAdminAccountPassword.new(
|
19
|
+
current_password: null,
|
20
|
+
json: null,
|
21
|
+
new_password: null,
|
22
|
+
token: null,
|
23
|
+
uid_token: null
|
24
|
+
)
|
25
|
+
```
|
26
|
+
|
data/docs/CreatePKICertIssuer.md
CHANGED
@@ -16,11 +16,13 @@
|
|
16
16
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
17
17
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
18
18
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
19
|
+
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
19
20
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
20
21
|
| **description** | **String** | Description of the object | [optional] |
|
21
22
|
| **destination_path** | **String** | A path in which to save generated certificates | [optional] |
|
23
|
+
| **enable_acme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] |
|
22
24
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
23
|
-
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from
|
25
|
+
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] |
|
24
26
|
| **is_ca** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] |
|
25
27
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
26
28
|
| **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
|
@@ -60,9 +62,11 @@ instance = Akeyless::CreatePKICertIssuer.new(
|
|
60
62
|
country: null,
|
61
63
|
create_private_crl: null,
|
62
64
|
create_public_crl: null,
|
65
|
+
critical_key_usage: null,
|
63
66
|
delete_protection: null,
|
64
67
|
description: null,
|
65
68
|
destination_path: null,
|
69
|
+
enable_acme: null,
|
66
70
|
expiration_event_in: null,
|
67
71
|
gw_cluster_url: null,
|
68
72
|
is_ca: null,
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# Akeyless::DeactivateAcmeAccount
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **acme_account_id** | **String** | The acme account id to deactivate | |
|
8
|
+
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
9
|
+
| **delete_account** | **Boolean** | Delete the account | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
11
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
12
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
13
|
+
|
14
|
+
## Example
|
15
|
+
|
16
|
+
```ruby
|
17
|
+
require 'akeyless'
|
18
|
+
|
19
|
+
instance = Akeyless::DeactivateAcmeAccount.new(
|
20
|
+
acme_account_id: null,
|
21
|
+
cert_issuer_name: null,
|
22
|
+
delete_account: null,
|
23
|
+
json: null,
|
24
|
+
token: null,
|
25
|
+
uid_token: null
|
26
|
+
)
|
27
|
+
```
|
28
|
+
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::GenerateAcmeEab
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
10
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::GenerateAcmeEab.new(
|
18
|
+
cert_issuer_name: null,
|
19
|
+
json: null,
|
20
|
+
token: null,
|
21
|
+
uid_token: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -0,0 +1,22 @@
|
|
1
|
+
# Akeyless::GenerateAcmeEabOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **expires_at** | **Time** | | [optional] |
|
8
|
+
| **kid** | **String** | | [optional] |
|
9
|
+
| **mac_key** | **String** | | [optional] |
|
10
|
+
|
11
|
+
## Example
|
12
|
+
|
13
|
+
```ruby
|
14
|
+
require 'akeyless'
|
15
|
+
|
16
|
+
instance = Akeyless::GenerateAcmeEabOutput.new(
|
17
|
+
expires_at: null,
|
18
|
+
kid: null,
|
19
|
+
mac_key: null
|
20
|
+
)
|
21
|
+
```
|
22
|
+
|
data/docs/GetGroupOutput.md
CHANGED
@@ -10,6 +10,7 @@
|
|
10
10
|
| **group_alias** | **String** | | [optional] |
|
11
11
|
| **group_id** | **String** | | [optional] |
|
12
12
|
| **group_name** | **String** | | [optional] |
|
13
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
13
14
|
| **modification_date** | **Time** | | [optional] |
|
14
15
|
| **user_assignments** | [**Array<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] |
|
15
16
|
|
@@ -25,6 +26,7 @@ instance = Akeyless::GetGroupOutput.new(
|
|
25
26
|
group_alias: null,
|
26
27
|
group_id: null,
|
27
28
|
group_name: null,
|
29
|
+
is_subclaims_with_operator: null,
|
28
30
|
modification_date: null,
|
29
31
|
user_assignments: null
|
30
32
|
)
|
data/docs/GetKubeExecCreds.md
CHANGED
@@ -9,7 +9,7 @@
|
|
9
9
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
10
10
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
11
11
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
12
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
|
12
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
13
13
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
15
15
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/GetPKICertificate.md
CHANGED
@@ -8,7 +8,7 @@
|
|
8
8
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
9
9
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
10
10
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
11
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
|
11
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
12
12
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
14
14
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/Group.md
CHANGED
@@ -10,6 +10,7 @@
|
|
10
10
|
| **group_alias** | **String** | | [optional] |
|
11
11
|
| **group_id** | **String** | | [optional] |
|
12
12
|
| **group_name** | **String** | | [optional] |
|
13
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
13
14
|
| **modification_date** | **Time** | | [optional] |
|
14
15
|
| **user_assignments** | [**Array<AccessPermissionAssignment>**](AccessPermissionAssignment.md) | | [optional] |
|
15
16
|
|
@@ -25,6 +26,7 @@ instance = Akeyless::Group.new(
|
|
25
26
|
group_alias: null,
|
26
27
|
group_id: null,
|
27
28
|
group_name: null,
|
29
|
+
is_subclaims_with_operator: null,
|
28
30
|
modification_date: null,
|
29
31
|
user_assignments: null
|
30
32
|
)
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::ListAcmeAccounts
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
10
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::ListAcmeAccounts.new(
|
18
|
+
cert_issuer_name: null,
|
19
|
+
json: null,
|
20
|
+
token: null,
|
21
|
+
uid_token: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::ListAcmeAccountsOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **accounts** | [**Array<AcmeAccount>**](AcmeAccount.md) | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::ListAcmeAccountsOutput.new(
|
15
|
+
accounts: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -4,6 +4,7 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **acme_enabled** | **Boolean** | | [optional] |
|
7
8
|
| **allow_any_name** | **Boolean** | | [optional] |
|
8
9
|
| **allow_copy_ext_from_csr** | **Boolean** | | [optional] |
|
9
10
|
| **allow_subdomains** | **Boolean** | | [optional] |
|
@@ -27,6 +28,7 @@
|
|
27
28
|
| **key_type** | **String** | | [optional] |
|
28
29
|
| **key_usage_list** | **Array<String>** | | [optional] |
|
29
30
|
| **locality** | **Array<String>** | | [optional] |
|
31
|
+
| **non_critical_key_usage** | **Boolean** | | [optional] |
|
30
32
|
| **not_before_duration** | **Integer** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] |
|
31
33
|
| **organization_list** | **Array<String>** | | [optional] |
|
32
34
|
| **organization_unit_list** | **Array<String>** | | [optional] |
|
@@ -43,6 +45,7 @@
|
|
43
45
|
require 'akeyless'
|
44
46
|
|
45
47
|
instance = Akeyless::PKICertificateIssueDetails.new(
|
48
|
+
acme_enabled: null,
|
46
49
|
allow_any_name: null,
|
47
50
|
allow_copy_ext_from_csr: null,
|
48
51
|
allow_subdomains: null,
|
@@ -66,6 +69,7 @@ instance = Akeyless::PKICertificateIssueDetails.new(
|
|
66
69
|
key_type: null,
|
67
70
|
key_usage_list: null,
|
68
71
|
locality: null,
|
72
|
+
non_critical_key_usage: null,
|
69
73
|
not_before_duration: null,
|
70
74
|
organization_list: null,
|
71
75
|
organization_unit_list: null,
|
@@ -7,6 +7,7 @@
|
|
7
7
|
| **assoc_id** | **String** | | [optional] |
|
8
8
|
| **auth_method_name** | **String** | | [optional] |
|
9
9
|
| **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
|
10
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
10
11
|
| **role_name** | **String** | | [optional] |
|
11
12
|
| **sub_claims_case_sensitive** | **Boolean** | | [optional] |
|
12
13
|
|
@@ -19,6 +20,7 @@ instance = Akeyless::RoleAssociationDetails.new(
|
|
19
20
|
assoc_id: null,
|
20
21
|
auth_method_name: null,
|
21
22
|
auth_method_sub_claims: null,
|
23
|
+
is_subclaims_with_operator: null,
|
22
24
|
role_name: null,
|
23
25
|
sub_claims_case_sensitive: null
|
24
26
|
)
|
@@ -8,6 +8,7 @@
|
|
8
8
|
| **auth_method_access_id** | **String** | | [optional] |
|
9
9
|
| **auth_method_name** | **String** | | [optional] |
|
10
10
|
| **auth_method_sub_claims** | **Hash<String, Array<String>>** | | [optional] |
|
11
|
+
| **is_subclaims_with_operator** | **Boolean** | | [optional] |
|
11
12
|
| **sub_claims_case_sensitive** | **Boolean** | | [optional] |
|
12
13
|
|
13
14
|
## Example
|
@@ -20,6 +21,7 @@ instance = Akeyless::RoleAuthMethodAssociation.new(
|
|
20
21
|
auth_method_access_id: null,
|
21
22
|
auth_method_name: null,
|
22
23
|
auth_method_sub_claims: null,
|
24
|
+
is_subclaims_with_operator: null,
|
23
25
|
sub_claims_case_sensitive: null
|
24
26
|
)
|
25
27
|
```
|
@@ -5,6 +5,7 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
|
8
|
+
| **certificate_format** | **String** | | [optional] |
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
10
|
| **name** | **String** | ClassicKey name | |
|
10
11
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -17,6 +18,7 @@ require 'akeyless'
|
|
17
18
|
|
18
19
|
instance = Akeyless::UpdateClassicKeyCertificate.new(
|
19
20
|
cert_file_data: null,
|
21
|
+
certificate_format: null,
|
20
22
|
json: null,
|
21
23
|
name: null,
|
22
24
|
token: null,
|
data/docs/UpdateItem.md
CHANGED
@@ -8,6 +8,7 @@
|
|
8
8
|
| **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
|
9
9
|
| **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
|
10
10
|
| **cert_file_data** | **String** | PEM Certificate in a Base64 format. Used for updating RSA keys' certificates. | [optional] |
|
11
|
+
| **certificate_format** | **String** | | [optional] |
|
11
12
|
| **change_event** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] |
|
12
13
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
13
14
|
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
@@ -58,6 +59,7 @@ instance = Akeyless::UpdateItem.new(
|
|
58
59
|
accessibility: null,
|
59
60
|
add_tag: null,
|
60
61
|
cert_file_data: null,
|
62
|
+
certificate_format: null,
|
61
63
|
change_event: null,
|
62
64
|
delete_protection: null,
|
63
65
|
description: null,
|
data/docs/UpdatePKICertIssuer.md
CHANGED
@@ -16,11 +16,13 @@
|
|
16
16
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
17
17
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
18
18
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
19
|
+
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
19
20
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
20
21
|
| **description** | **String** | Description of the object | [optional] |
|
21
22
|
| **destination_path** | **String** | A path in which to save generated certificates | [optional] |
|
23
|
+
| **enable_acme** | **Boolean** | If set, the cert issuer will support the acme protocol | [optional] |
|
22
24
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
23
|
-
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from
|
25
|
+
| **gw_cluster_url** | **String** | The GW cluster URL to issue the certificate from. Required in Public CA mode, to allow CRLs on private CA, or to enable ACME | [optional] |
|
24
26
|
| **is_ca** | **Boolean** | If set, the basic constraints extension will be added to certificate | [optional] |
|
25
27
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
26
28
|
| **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
|
@@ -61,9 +63,11 @@ instance = Akeyless::UpdatePKICertIssuer.new(
|
|
61
63
|
country: null,
|
62
64
|
create_private_crl: null,
|
63
65
|
create_public_crl: null,
|
66
|
+
critical_key_usage: null,
|
64
67
|
delete_protection: null,
|
65
68
|
description: null,
|
66
69
|
destination_path: null,
|
70
|
+
enable_acme: null,
|
67
71
|
expiration_event_in: null,
|
68
72
|
gw_cluster_url: null,
|
69
73
|
is_ca: null,
|