akeyless 5.0.1 → 5.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +6 -2
- data/docs/BastionConfigReplyObj.md +2 -2
- data/docs/Connect.md +1 -1
- data/docs/CreateUSC.md +5 -1
- data/docs/DesktopAppConf.md +24 -0
- data/docs/DynamicSecretCreateLdap.md +4 -0
- data/docs/DynamicSecretCreateRdp.md +4 -0
- data/docs/DynamicSecretUpdateLdap.md +4 -0
- data/docs/DynamicSecretUpdateRdp.md +4 -0
- data/docs/GatewayCreateProducerLdap.md +4 -0
- data/docs/GatewayCreateProducerRdp.md +4 -0
- data/docs/GatewayDetailsForItemReplyObj.md +24 -0
- data/docs/GatewayUpdateProducerLdap.md +4 -0
- data/docs/GatewayUpdateProducerRdp.md +4 -0
- data/docs/GatewayUpdateRemoteAccessDesktopApp.md +28 -0
- data/docs/Item.md +1 -1
- data/docs/RotatedSecretCreateLdap.md +4 -0
- data/docs/RotatedSecretCreateSsh.md +2 -0
- data/docs/RotatedSecretCreateWindows.md +4 -0
- data/docs/RotatedSecretUpdateLdap.md +4 -0
- data/docs/RotatedSecretUpdateSsh.md +2 -0
- data/docs/RotatedSecretUpdateWindows.md +4 -0
- data/docs/SecretInfo.md +2 -0
- data/docs/SecureRemoteAccess.md +2 -0
- data/docs/SraDesktopAppConf.md +22 -0
- data/docs/UscCreate.md +2 -0
- data/docs/UscList.md +2 -0
- data/docs/V2Api.md +63 -0
- data/lib/akeyless/api/v2_api.rb +64 -0
- data/lib/akeyless/models/bastion_config_reply_obj.rb +10 -10
- data/lib/akeyless/models/connect.rb +1 -1
- data/lib/akeyless/models/create_usc.rb +26 -4
- data/lib/akeyless/models/desktop_app_conf.rb +241 -0
- data/lib/akeyless/models/dynamic_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_create_rdp.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_details_for_item_reply_obj.rb +241 -0
- data/lib/akeyless/models/gateway_update_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_update_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_update_remote_access_desktop_app.rb +265 -0
- data/lib/akeyless/models/item.rb +1 -1
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_windows.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_windows.rb +21 -1
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/secure_remote_access.rb +10 -1
- data/lib/akeyless/models/sra_desktop_app_conf.rb +232 -0
- data/lib/akeyless/models/usc_create.rb +10 -1
- data/lib/akeyless/models/usc_list.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +4 -1
- data/spec/models/desktop_app_conf_spec.rb +54 -0
- data/spec/models/gateway_details_for_item_reply_obj_spec.rb +54 -0
- data/spec/models/gateway_update_remote_access_desktop_app_spec.rb +66 -0
- data/spec/models/sra_desktop_app_conf_spec.rb +48 -0
- metadata +1070 -1054
data/lib/akeyless/api/v2_api.rb
CHANGED
@@ -19519,6 +19519,70 @@ module Akeyless
|
|
19519
19519
|
return data, status_code, headers
|
19520
19520
|
end
|
19521
19521
|
|
19522
|
+
# @param gateway_update_remote_access_desktop_app [GatewayUpdateRemoteAccessDesktopApp]
|
19523
|
+
# @param [Hash] opts the optional parameters
|
19524
|
+
# @return [Object]
|
19525
|
+
def gateway_update_remote_access_desktop_app(gateway_update_remote_access_desktop_app, opts = {})
|
19526
|
+
data, _status_code, _headers = gateway_update_remote_access_desktop_app_with_http_info(gateway_update_remote_access_desktop_app, opts)
|
19527
|
+
data
|
19528
|
+
end
|
19529
|
+
|
19530
|
+
# @param gateway_update_remote_access_desktop_app [GatewayUpdateRemoteAccessDesktopApp]
|
19531
|
+
# @param [Hash] opts the optional parameters
|
19532
|
+
# @return [Array<(Object, Integer, Hash)>] Object data, response status code and response headers
|
19533
|
+
def gateway_update_remote_access_desktop_app_with_http_info(gateway_update_remote_access_desktop_app, opts = {})
|
19534
|
+
if @api_client.config.debugging
|
19535
|
+
@api_client.config.logger.debug 'Calling API: V2Api.gateway_update_remote_access_desktop_app ...'
|
19536
|
+
end
|
19537
|
+
# verify the required parameter 'gateway_update_remote_access_desktop_app' is set
|
19538
|
+
if @api_client.config.client_side_validation && gateway_update_remote_access_desktop_app.nil?
|
19539
|
+
fail ArgumentError, "Missing the required parameter 'gateway_update_remote_access_desktop_app' when calling V2Api.gateway_update_remote_access_desktop_app"
|
19540
|
+
end
|
19541
|
+
# resource path
|
19542
|
+
local_var_path = '/gateway-update-remote-access-desktop-app'
|
19543
|
+
|
19544
|
+
# query parameters
|
19545
|
+
query_params = opts[:query_params] || {}
|
19546
|
+
|
19547
|
+
# header parameters
|
19548
|
+
header_params = opts[:header_params] || {}
|
19549
|
+
# HTTP header 'Accept' (if needed)
|
19550
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json']) unless header_params['Accept']
|
19551
|
+
# HTTP header 'Content-Type'
|
19552
|
+
content_type = @api_client.select_header_content_type(['application/json'])
|
19553
|
+
if !content_type.nil?
|
19554
|
+
header_params['Content-Type'] = content_type
|
19555
|
+
end
|
19556
|
+
|
19557
|
+
# form parameters
|
19558
|
+
form_params = opts[:form_params] || {}
|
19559
|
+
|
19560
|
+
# http body (model)
|
19561
|
+
post_body = opts[:debug_body] || @api_client.object_to_http_body(gateway_update_remote_access_desktop_app)
|
19562
|
+
|
19563
|
+
# return_type
|
19564
|
+
return_type = opts[:debug_return_type] || 'Object'
|
19565
|
+
|
19566
|
+
# auth_names
|
19567
|
+
auth_names = opts[:debug_auth_names] || []
|
19568
|
+
|
19569
|
+
new_options = opts.merge(
|
19570
|
+
:operation => :"V2Api.gateway_update_remote_access_desktop_app",
|
19571
|
+
:header_params => header_params,
|
19572
|
+
:query_params => query_params,
|
19573
|
+
:form_params => form_params,
|
19574
|
+
:body => post_body,
|
19575
|
+
:auth_names => auth_names,
|
19576
|
+
:return_type => return_type
|
19577
|
+
)
|
19578
|
+
|
19579
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path, new_options)
|
19580
|
+
if @api_client.config.debugging
|
19581
|
+
@api_client.config.logger.debug "API called: V2Api#gateway_update_remote_access_desktop_app\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
19582
|
+
end
|
19583
|
+
return data, status_code, headers
|
19584
|
+
end
|
19585
|
+
|
19522
19586
|
# @param gateway_update_remote_access_rdp_recordings [GatewayUpdateRemoteAccessRdpRecordings]
|
19523
19587
|
# @param [Hash] opts the optional parameters
|
19524
19588
|
# @return [Object]
|
@@ -15,10 +15,10 @@ require 'time'
|
|
15
15
|
|
16
16
|
module Akeyless
|
17
17
|
class BastionConfigReplyObj
|
18
|
-
attr_accessor :api_gateway_url
|
19
|
-
|
20
18
|
attr_accessor :cluster_id
|
21
19
|
|
20
|
+
attr_accessor :desktop_app
|
21
|
+
|
22
22
|
attr_accessor :gator_cluster_id
|
23
23
|
|
24
24
|
attr_accessor :global
|
@@ -30,8 +30,8 @@ module Akeyless
|
|
30
30
|
# Attribute mapping from ruby-style variable name to JSON key.
|
31
31
|
def self.attribute_map
|
32
32
|
{
|
33
|
-
:'api_gateway_url' => :'api_gateway_url',
|
34
33
|
:'cluster_id' => :'cluster_id',
|
34
|
+
:'desktop_app' => :'desktop_app',
|
35
35
|
:'gator_cluster_id' => :'gator_cluster_id',
|
36
36
|
:'global' => :'global',
|
37
37
|
:'ssh_bastion' => :'ssh_bastion',
|
@@ -47,8 +47,8 @@ module Akeyless
|
|
47
47
|
# Attribute type mapping.
|
48
48
|
def self.openapi_types
|
49
49
|
{
|
50
|
-
:'api_gateway_url' => :'String',
|
51
50
|
:'cluster_id' => :'String',
|
51
|
+
:'desktop_app' => :'SraDesktopAppConf',
|
52
52
|
:'gator_cluster_id' => :'Integer',
|
53
53
|
:'global' => :'BastionGlobalConf',
|
54
54
|
:'ssh_bastion' => :'SshBastionConf',
|
@@ -77,14 +77,14 @@ module Akeyless
|
|
77
77
|
h[k.to_sym] = v
|
78
78
|
}
|
79
79
|
|
80
|
-
if attributes.key?(:'api_gateway_url')
|
81
|
-
self.api_gateway_url = attributes[:'api_gateway_url']
|
82
|
-
end
|
83
|
-
|
84
80
|
if attributes.key?(:'cluster_id')
|
85
81
|
self.cluster_id = attributes[:'cluster_id']
|
86
82
|
end
|
87
83
|
|
84
|
+
if attributes.key?(:'desktop_app')
|
85
|
+
self.desktop_app = attributes[:'desktop_app']
|
86
|
+
end
|
87
|
+
|
88
88
|
if attributes.key?(:'gator_cluster_id')
|
89
89
|
self.gator_cluster_id = attributes[:'gator_cluster_id']
|
90
90
|
end
|
@@ -122,8 +122,8 @@ module Akeyless
|
|
122
122
|
def ==(o)
|
123
123
|
return true if self.equal?(o)
|
124
124
|
self.class == o.class &&
|
125
|
-
api_gateway_url == o.api_gateway_url &&
|
126
125
|
cluster_id == o.cluster_id &&
|
126
|
+
desktop_app == o.desktop_app &&
|
127
127
|
gator_cluster_id == o.gator_cluster_id &&
|
128
128
|
global == o.global &&
|
129
129
|
ssh_bastion == o.ssh_bastion &&
|
@@ -139,7 +139,7 @@ module Akeyless
|
|
139
139
|
# Calculates hash code according to all attributes.
|
140
140
|
# @return [Integer] Hash code
|
141
141
|
def hash
|
142
|
-
[
|
142
|
+
[cluster_id, desktop_app, gator_cluster_id, global, ssh_bastion, web_bastion].hash
|
143
143
|
end
|
144
144
|
|
145
145
|
# Builds the object from hash
|
@@ -46,6 +46,12 @@ module Akeyless
|
|
46
46
|
# The universal identity token, Required only for universal_identity authentication
|
47
47
|
attr_accessor :uid_token
|
48
48
|
|
49
|
+
# Prefix for all secrets created in AWS Secrets Manager
|
50
|
+
attr_accessor :usc_prefix
|
51
|
+
|
52
|
+
# Whether to filter the USC secret list using the specified usc-prefix [true/false]
|
53
|
+
attr_accessor :use_prefix_as_filter
|
54
|
+
|
49
55
|
# Attribute mapping from ruby-style variable name to JSON key.
|
50
56
|
def self.attribute_map
|
51
57
|
{
|
@@ -58,7 +64,9 @@ module Akeyless
|
|
58
64
|
:'tags' => :'tags',
|
59
65
|
:'target_to_associate' => :'target-to-associate',
|
60
66
|
:'token' => :'token',
|
61
|
-
:'uid_token' => :'uid-token'
|
67
|
+
:'uid_token' => :'uid-token',
|
68
|
+
:'usc_prefix' => :'usc-prefix',
|
69
|
+
:'use_prefix_as_filter' => :'use-prefix-as-filter'
|
62
70
|
}
|
63
71
|
end
|
64
72
|
|
@@ -79,7 +87,9 @@ module Akeyless
|
|
79
87
|
:'tags' => :'Array<String>',
|
80
88
|
:'target_to_associate' => :'String',
|
81
89
|
:'token' => :'String',
|
82
|
-
:'uid_token' => :'String'
|
90
|
+
:'uid_token' => :'String',
|
91
|
+
:'usc_prefix' => :'String',
|
92
|
+
:'use_prefix_as_filter' => :'String'
|
83
93
|
}
|
84
94
|
end
|
85
95
|
|
@@ -151,6 +161,16 @@ module Akeyless
|
|
151
161
|
if attributes.key?(:'uid_token')
|
152
162
|
self.uid_token = attributes[:'uid_token']
|
153
163
|
end
|
164
|
+
|
165
|
+
if attributes.key?(:'usc_prefix')
|
166
|
+
self.usc_prefix = attributes[:'usc_prefix']
|
167
|
+
end
|
168
|
+
|
169
|
+
if attributes.key?(:'use_prefix_as_filter')
|
170
|
+
self.use_prefix_as_filter = attributes[:'use_prefix_as_filter']
|
171
|
+
else
|
172
|
+
self.use_prefix_as_filter = 'false'
|
173
|
+
end
|
154
174
|
end
|
155
175
|
|
156
176
|
# Show invalid properties with the reasons. Usually used together with valid?
|
@@ -192,7 +212,9 @@ module Akeyless
|
|
192
212
|
tags == o.tags &&
|
193
213
|
target_to_associate == o.target_to_associate &&
|
194
214
|
token == o.token &&
|
195
|
-
uid_token == o.uid_token
|
215
|
+
uid_token == o.uid_token &&
|
216
|
+
usc_prefix == o.usc_prefix &&
|
217
|
+
use_prefix_as_filter == o.use_prefix_as_filter
|
196
218
|
end
|
197
219
|
|
198
220
|
# @see the `==` method
|
@@ -204,7 +226,7 @@ module Akeyless
|
|
204
226
|
# Calculates hash code according to all attributes.
|
205
227
|
# @return [Integer] Hash code
|
206
228
|
def hash
|
207
|
-
[azure_kv_name, delete_protection, description, json, k8s_namespace, name, tags, target_to_associate, token, uid_token].hash
|
229
|
+
[azure_kv_name, delete_protection, description, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
|
208
230
|
end
|
209
231
|
|
210
232
|
# Builds the object from hash
|
@@ -0,0 +1,241 @@
|
|
1
|
+
=begin
|
2
|
+
#Akeyless API
|
3
|
+
|
4
|
+
#The purpose of this application is to provide access to Akeyless API.
|
5
|
+
|
6
|
+
The version of the OpenAPI document: 2.0
|
7
|
+
Contact: support@akeyless.io
|
8
|
+
Generated by: https://openapi-generator.tech
|
9
|
+
Generator version: 7.10.0
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
require 'time'
|
15
|
+
|
16
|
+
module Akeyless
|
17
|
+
class DesktopAppConf
|
18
|
+
attr_accessor :default_cert_issuer_id
|
19
|
+
|
20
|
+
attr_accessor :default_cert_issuer_name
|
21
|
+
|
22
|
+
attr_accessor :secure_web_access_url
|
23
|
+
|
24
|
+
attr_accessor :secure_web_proxy_url
|
25
|
+
|
26
|
+
# Attribute mapping from ruby-style variable name to JSON key.
|
27
|
+
def self.attribute_map
|
28
|
+
{
|
29
|
+
:'default_cert_issuer_id' => :'default_cert_issuer_id',
|
30
|
+
:'default_cert_issuer_name' => :'default_cert_issuer_name',
|
31
|
+
:'secure_web_access_url' => :'secure_web_access_url',
|
32
|
+
:'secure_web_proxy_url' => :'secure_web_proxy_url'
|
33
|
+
}
|
34
|
+
end
|
35
|
+
|
36
|
+
# Returns all the JSON keys this model knows about
|
37
|
+
def self.acceptable_attributes
|
38
|
+
attribute_map.values
|
39
|
+
end
|
40
|
+
|
41
|
+
# Attribute type mapping.
|
42
|
+
def self.openapi_types
|
43
|
+
{
|
44
|
+
:'default_cert_issuer_id' => :'Integer',
|
45
|
+
:'default_cert_issuer_name' => :'String',
|
46
|
+
:'secure_web_access_url' => :'String',
|
47
|
+
:'secure_web_proxy_url' => :'String'
|
48
|
+
}
|
49
|
+
end
|
50
|
+
|
51
|
+
# List of attributes with nullable: true
|
52
|
+
def self.openapi_nullable
|
53
|
+
Set.new([
|
54
|
+
])
|
55
|
+
end
|
56
|
+
|
57
|
+
# Initializes the object
|
58
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
59
|
+
def initialize(attributes = {})
|
60
|
+
if (!attributes.is_a?(Hash))
|
61
|
+
fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::DesktopAppConf` initialize method"
|
62
|
+
end
|
63
|
+
|
64
|
+
# check to see if the attribute exists and convert string to symbol for hash key
|
65
|
+
attributes = attributes.each_with_object({}) { |(k, v), h|
|
66
|
+
if (!self.class.attribute_map.key?(k.to_sym))
|
67
|
+
fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::DesktopAppConf`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
|
68
|
+
end
|
69
|
+
h[k.to_sym] = v
|
70
|
+
}
|
71
|
+
|
72
|
+
if attributes.key?(:'default_cert_issuer_id')
|
73
|
+
self.default_cert_issuer_id = attributes[:'default_cert_issuer_id']
|
74
|
+
end
|
75
|
+
|
76
|
+
if attributes.key?(:'default_cert_issuer_name')
|
77
|
+
self.default_cert_issuer_name = attributes[:'default_cert_issuer_name']
|
78
|
+
end
|
79
|
+
|
80
|
+
if attributes.key?(:'secure_web_access_url')
|
81
|
+
self.secure_web_access_url = attributes[:'secure_web_access_url']
|
82
|
+
end
|
83
|
+
|
84
|
+
if attributes.key?(:'secure_web_proxy_url')
|
85
|
+
self.secure_web_proxy_url = attributes[:'secure_web_proxy_url']
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
89
|
+
# Show invalid properties with the reasons. Usually used together with valid?
|
90
|
+
# @return Array for valid properties with the reasons
|
91
|
+
def list_invalid_properties
|
92
|
+
warn '[DEPRECATED] the `list_invalid_properties` method is obsolete'
|
93
|
+
invalid_properties = Array.new
|
94
|
+
invalid_properties
|
95
|
+
end
|
96
|
+
|
97
|
+
# Check to see if the all the properties in the model are valid
|
98
|
+
# @return true if the model is valid
|
99
|
+
def valid?
|
100
|
+
warn '[DEPRECATED] the `valid?` method is obsolete'
|
101
|
+
true
|
102
|
+
end
|
103
|
+
|
104
|
+
# Checks equality by comparing each attribute.
|
105
|
+
# @param [Object] Object to be compared
|
106
|
+
def ==(o)
|
107
|
+
return true if self.equal?(o)
|
108
|
+
self.class == o.class &&
|
109
|
+
default_cert_issuer_id == o.default_cert_issuer_id &&
|
110
|
+
default_cert_issuer_name == o.default_cert_issuer_name &&
|
111
|
+
secure_web_access_url == o.secure_web_access_url &&
|
112
|
+
secure_web_proxy_url == o.secure_web_proxy_url
|
113
|
+
end
|
114
|
+
|
115
|
+
# @see the `==` method
|
116
|
+
# @param [Object] Object to be compared
|
117
|
+
def eql?(o)
|
118
|
+
self == o
|
119
|
+
end
|
120
|
+
|
121
|
+
# Calculates hash code according to all attributes.
|
122
|
+
# @return [Integer] Hash code
|
123
|
+
def hash
|
124
|
+
[default_cert_issuer_id, default_cert_issuer_name, secure_web_access_url, secure_web_proxy_url].hash
|
125
|
+
end
|
126
|
+
|
127
|
+
# Builds the object from hash
|
128
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
129
|
+
# @return [Object] Returns the model itself
|
130
|
+
def self.build_from_hash(attributes)
|
131
|
+
return nil unless attributes.is_a?(Hash)
|
132
|
+
attributes = attributes.transform_keys(&:to_sym)
|
133
|
+
transformed_hash = {}
|
134
|
+
openapi_types.each_pair do |key, type|
|
135
|
+
if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil?
|
136
|
+
transformed_hash["#{key}"] = nil
|
137
|
+
elsif type =~ /\AArray<(.*)>/i
|
138
|
+
# check to ensure the input is an array given that the attribute
|
139
|
+
# is documented as an array but the input is not
|
140
|
+
if attributes[attribute_map[key]].is_a?(Array)
|
141
|
+
transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) }
|
142
|
+
end
|
143
|
+
elsif !attributes[attribute_map[key]].nil?
|
144
|
+
transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]])
|
145
|
+
end
|
146
|
+
end
|
147
|
+
new(transformed_hash)
|
148
|
+
end
|
149
|
+
|
150
|
+
# Deserializes the data based on type
|
151
|
+
# @param string type Data type
|
152
|
+
# @param string value Value to be deserialized
|
153
|
+
# @return [Object] Deserialized data
|
154
|
+
def self._deserialize(type, value)
|
155
|
+
case type.to_sym
|
156
|
+
when :Time
|
157
|
+
Time.parse(value)
|
158
|
+
when :Date
|
159
|
+
Date.parse(value)
|
160
|
+
when :String
|
161
|
+
value.to_s
|
162
|
+
when :Integer
|
163
|
+
value.to_i
|
164
|
+
when :Float
|
165
|
+
value.to_f
|
166
|
+
when :Boolean
|
167
|
+
if value.to_s =~ /\A(true|t|yes|y|1)\z/i
|
168
|
+
true
|
169
|
+
else
|
170
|
+
false
|
171
|
+
end
|
172
|
+
when :Object
|
173
|
+
# generic object (usually a Hash), return directly
|
174
|
+
value
|
175
|
+
when /\AArray<(?<inner_type>.+)>\z/
|
176
|
+
inner_type = Regexp.last_match[:inner_type]
|
177
|
+
value.map { |v| _deserialize(inner_type, v) }
|
178
|
+
when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
|
179
|
+
k_type = Regexp.last_match[:k_type]
|
180
|
+
v_type = Regexp.last_match[:v_type]
|
181
|
+
{}.tap do |hash|
|
182
|
+
value.each do |k, v|
|
183
|
+
hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
|
184
|
+
end
|
185
|
+
end
|
186
|
+
else # model
|
187
|
+
# models (e.g. Pet) or oneOf
|
188
|
+
klass = Akeyless.const_get(type)
|
189
|
+
klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value)
|
190
|
+
end
|
191
|
+
end
|
192
|
+
|
193
|
+
# Returns the string representation of the object
|
194
|
+
# @return [String] String presentation of the object
|
195
|
+
def to_s
|
196
|
+
to_hash.to_s
|
197
|
+
end
|
198
|
+
|
199
|
+
# to_body is an alias to to_hash (backward compatibility)
|
200
|
+
# @return [Hash] Returns the object in the form of hash
|
201
|
+
def to_body
|
202
|
+
to_hash
|
203
|
+
end
|
204
|
+
|
205
|
+
# Returns the object in the form of hash
|
206
|
+
# @return [Hash] Returns the object in the form of hash
|
207
|
+
def to_hash
|
208
|
+
hash = {}
|
209
|
+
self.class.attribute_map.each_pair do |attr, param|
|
210
|
+
value = self.send(attr)
|
211
|
+
if value.nil?
|
212
|
+
is_nullable = self.class.openapi_nullable.include?(attr)
|
213
|
+
next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
|
214
|
+
end
|
215
|
+
|
216
|
+
hash[param] = _to_hash(value)
|
217
|
+
end
|
218
|
+
hash
|
219
|
+
end
|
220
|
+
|
221
|
+
# Outputs non-array value in the form of hash
|
222
|
+
# For object, use to_hash. Otherwise, just return the value
|
223
|
+
# @param [Object] value Any valid value
|
224
|
+
# @return [Hash] Returns the value in the form of hash
|
225
|
+
def _to_hash(value)
|
226
|
+
if value.is_a?(Array)
|
227
|
+
value.compact.map { |v| _to_hash(v) }
|
228
|
+
elsif value.is_a?(Hash)
|
229
|
+
{}.tap do |hash|
|
230
|
+
value.each { |k, v| hash[k] = _to_hash(v) }
|
231
|
+
end
|
232
|
+
elsif value.respond_to? :to_hash
|
233
|
+
value.to_hash
|
234
|
+
else
|
235
|
+
value
|
236
|
+
end
|
237
|
+
end
|
238
|
+
|
239
|
+
end
|
240
|
+
|
241
|
+
end
|
@@ -60,6 +60,12 @@ module Akeyless
|
|
60
60
|
# Dynamic producer encryption key
|
61
61
|
attr_accessor :producer_encryption_key_name
|
62
62
|
|
63
|
+
# Deprecated. use secure-access-certificate-issuer
|
64
|
+
attr_accessor :secure_access_bastion_issuer
|
65
|
+
|
66
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
67
|
+
attr_accessor :secure_access_certificate_issuer
|
68
|
+
|
63
69
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
64
70
|
attr_accessor :secure_access_delay
|
65
71
|
|
@@ -120,6 +126,8 @@ module Akeyless
|
|
120
126
|
:'name' => :'name',
|
121
127
|
:'password_length' => :'password-length',
|
122
128
|
:'producer_encryption_key_name' => :'producer-encryption-key-name',
|
129
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
130
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
123
131
|
:'secure_access_delay' => :'secure-access-delay',
|
124
132
|
:'secure_access_enable' => :'secure-access-enable',
|
125
133
|
:'secure_access_host' => :'secure-access-host',
|
@@ -160,6 +168,8 @@ module Akeyless
|
|
160
168
|
:'name' => :'String',
|
161
169
|
:'password_length' => :'String',
|
162
170
|
:'producer_encryption_key_name' => :'String',
|
171
|
+
:'secure_access_bastion_issuer' => :'String',
|
172
|
+
:'secure_access_certificate_issuer' => :'String',
|
163
173
|
:'secure_access_delay' => :'Integer',
|
164
174
|
:'secure_access_enable' => :'String',
|
165
175
|
:'secure_access_host' => :'Array<String>',
|
@@ -266,6 +276,14 @@ module Akeyless
|
|
266
276
|
self.producer_encryption_key_name = attributes[:'producer_encryption_key_name']
|
267
277
|
end
|
268
278
|
|
279
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
280
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
281
|
+
end
|
282
|
+
|
283
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
284
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
285
|
+
end
|
286
|
+
|
269
287
|
if attributes.key?(:'secure_access_delay')
|
270
288
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
271
289
|
end
|
@@ -371,6 +389,8 @@ module Akeyless
|
|
371
389
|
name == o.name &&
|
372
390
|
password_length == o.password_length &&
|
373
391
|
producer_encryption_key_name == o.producer_encryption_key_name &&
|
392
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
393
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
374
394
|
secure_access_delay == o.secure_access_delay &&
|
375
395
|
secure_access_enable == o.secure_access_enable &&
|
376
396
|
secure_access_host == o.secure_access_host &&
|
@@ -396,7 +416,7 @@ module Akeyless
|
|
396
416
|
# Calculates hash code according to all attributes.
|
397
417
|
# @return [Integer] Hash code
|
398
418
|
def hash
|
399
|
-
[provider_type, bind_dn, bind_dn_password, delete_protection, description, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, password_length, producer_encryption_key_name, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
419
|
+
[provider_type, bind_dn, bind_dn_password, delete_protection, description, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
400
420
|
end
|
401
421
|
|
402
422
|
# Builds the object from hash
|
@@ -61,6 +61,12 @@ module Akeyless
|
|
61
61
|
# Allow providing external user for a domain users
|
62
62
|
attr_accessor :secure_access_allow_external_user
|
63
63
|
|
64
|
+
# Deprecated. use secure-access-certificate-issuer
|
65
|
+
attr_accessor :secure_access_bastion_issuer
|
66
|
+
|
67
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
68
|
+
attr_accessor :secure_access_certificate_issuer
|
69
|
+
|
64
70
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
65
71
|
attr_accessor :secure_access_delay
|
66
72
|
|
@@ -115,6 +121,8 @@ module Akeyless
|
|
115
121
|
:'rdp_host_port' => :'rdp-host-port',
|
116
122
|
:'rdp_user_groups' => :'rdp-user-groups',
|
117
123
|
:'secure_access_allow_external_user' => :'secure-access-allow-external-user',
|
124
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
125
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
118
126
|
:'secure_access_delay' => :'secure-access-delay',
|
119
127
|
:'secure_access_enable' => :'secure-access-enable',
|
120
128
|
:'secure_access_host' => :'secure-access-host',
|
@@ -153,6 +161,8 @@ module Akeyless
|
|
153
161
|
:'rdp_host_port' => :'String',
|
154
162
|
:'rdp_user_groups' => :'String',
|
155
163
|
:'secure_access_allow_external_user' => :'Boolean',
|
164
|
+
:'secure_access_bastion_issuer' => :'String',
|
165
|
+
:'secure_access_certificate_issuer' => :'String',
|
156
166
|
:'secure_access_delay' => :'Integer',
|
157
167
|
:'secure_access_enable' => :'String',
|
158
168
|
:'secure_access_host' => :'Array<String>',
|
@@ -261,6 +271,14 @@ module Akeyless
|
|
261
271
|
self.secure_access_allow_external_user = false
|
262
272
|
end
|
263
273
|
|
274
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
275
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
276
|
+
end
|
277
|
+
|
278
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
279
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
280
|
+
end
|
281
|
+
|
264
282
|
if attributes.key?(:'secure_access_delay')
|
265
283
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
266
284
|
end
|
@@ -356,6 +374,8 @@ module Akeyless
|
|
356
374
|
rdp_host_port == o.rdp_host_port &&
|
357
375
|
rdp_user_groups == o.rdp_user_groups &&
|
358
376
|
secure_access_allow_external_user == o.secure_access_allow_external_user &&
|
377
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
378
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
359
379
|
secure_access_delay == o.secure_access_delay &&
|
360
380
|
secure_access_enable == o.secure_access_enable &&
|
361
381
|
secure_access_host == o.secure_access_host &&
|
@@ -379,7 +399,7 @@ module Akeyless
|
|
379
399
|
# Calculates hash code according to all attributes.
|
380
400
|
# @return [Integer] Hash code
|
381
401
|
def hash
|
382
|
-
[allow_user_extend_session, delete_protection, description, fixed_user_claim_keyname, fixed_user_only, json, name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
402
|
+
[allow_user_extend_session, delete_protection, description, fixed_user_claim_keyname, fixed_user_only, json, name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
383
403
|
end
|
384
404
|
|
385
405
|
# Builds the object from hash
|
@@ -63,6 +63,12 @@ module Akeyless
|
|
63
63
|
# Dynamic producer encryption key
|
64
64
|
attr_accessor :producer_encryption_key_name
|
65
65
|
|
66
|
+
# Deprecated. use secure-access-certificate-issuer
|
67
|
+
attr_accessor :secure_access_bastion_issuer
|
68
|
+
|
69
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
70
|
+
attr_accessor :secure_access_certificate_issuer
|
71
|
+
|
66
72
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
67
73
|
attr_accessor :secure_access_delay
|
68
74
|
|
@@ -124,6 +130,8 @@ module Akeyless
|
|
124
130
|
:'new_name' => :'new-name',
|
125
131
|
:'password_length' => :'password-length',
|
126
132
|
:'producer_encryption_key_name' => :'producer-encryption-key-name',
|
133
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
134
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
127
135
|
:'secure_access_delay' => :'secure-access-delay',
|
128
136
|
:'secure_access_enable' => :'secure-access-enable',
|
129
137
|
:'secure_access_host' => :'secure-access-host',
|
@@ -165,6 +173,8 @@ module Akeyless
|
|
165
173
|
:'new_name' => :'String',
|
166
174
|
:'password_length' => :'String',
|
167
175
|
:'producer_encryption_key_name' => :'String',
|
176
|
+
:'secure_access_bastion_issuer' => :'String',
|
177
|
+
:'secure_access_certificate_issuer' => :'String',
|
168
178
|
:'secure_access_delay' => :'Integer',
|
169
179
|
:'secure_access_enable' => :'String',
|
170
180
|
:'secure_access_host' => :'Array<String>',
|
@@ -275,6 +285,14 @@ module Akeyless
|
|
275
285
|
self.producer_encryption_key_name = attributes[:'producer_encryption_key_name']
|
276
286
|
end
|
277
287
|
|
288
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
289
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
290
|
+
end
|
291
|
+
|
292
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
293
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
294
|
+
end
|
295
|
+
|
278
296
|
if attributes.key?(:'secure_access_delay')
|
279
297
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
280
298
|
end
|
@@ -381,6 +399,8 @@ module Akeyless
|
|
381
399
|
new_name == o.new_name &&
|
382
400
|
password_length == o.password_length &&
|
383
401
|
producer_encryption_key_name == o.producer_encryption_key_name &&
|
402
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
403
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
384
404
|
secure_access_delay == o.secure_access_delay &&
|
385
405
|
secure_access_enable == o.secure_access_enable &&
|
386
406
|
secure_access_host == o.secure_access_host &&
|
@@ -406,7 +426,7 @@ module Akeyless
|
|
406
426
|
# Calculates hash code according to all attributes.
|
407
427
|
# @return [Integer] Hash code
|
408
428
|
def hash
|
409
|
-
[provider_type, bind_dn, bind_dn_password, delete_protection, description, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, new_name, password_length, producer_encryption_key_name, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
429
|
+
[provider_type, bind_dn, bind_dn_password, delete_protection, description, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, new_name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
410
430
|
end
|
411
431
|
|
412
432
|
# Builds the object from hash
|