akeyless 5.0.1 → 5.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +6 -2
- data/docs/BastionConfigReplyObj.md +2 -2
- data/docs/Connect.md +1 -1
- data/docs/CreateUSC.md +5 -1
- data/docs/DesktopAppConf.md +24 -0
- data/docs/DynamicSecretCreateLdap.md +4 -0
- data/docs/DynamicSecretCreateRdp.md +4 -0
- data/docs/DynamicSecretUpdateLdap.md +4 -0
- data/docs/DynamicSecretUpdateRdp.md +4 -0
- data/docs/GatewayCreateProducerLdap.md +4 -0
- data/docs/GatewayCreateProducerRdp.md +4 -0
- data/docs/GatewayDetailsForItemReplyObj.md +24 -0
- data/docs/GatewayUpdateProducerLdap.md +4 -0
- data/docs/GatewayUpdateProducerRdp.md +4 -0
- data/docs/GatewayUpdateRemoteAccessDesktopApp.md +28 -0
- data/docs/Item.md +1 -1
- data/docs/RotatedSecretCreateLdap.md +4 -0
- data/docs/RotatedSecretCreateSsh.md +2 -0
- data/docs/RotatedSecretCreateWindows.md +4 -0
- data/docs/RotatedSecretUpdateLdap.md +4 -0
- data/docs/RotatedSecretUpdateSsh.md +2 -0
- data/docs/RotatedSecretUpdateWindows.md +4 -0
- data/docs/SecretInfo.md +2 -0
- data/docs/SecureRemoteAccess.md +2 -0
- data/docs/SraDesktopAppConf.md +22 -0
- data/docs/UscCreate.md +2 -0
- data/docs/UscList.md +2 -0
- data/docs/V2Api.md +63 -0
- data/lib/akeyless/api/v2_api.rb +64 -0
- data/lib/akeyless/models/bastion_config_reply_obj.rb +10 -10
- data/lib/akeyless/models/connect.rb +1 -1
- data/lib/akeyless/models/create_usc.rb +26 -4
- data/lib/akeyless/models/desktop_app_conf.rb +241 -0
- data/lib/akeyless/models/dynamic_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_create_rdp.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_details_for_item_reply_obj.rb +241 -0
- data/lib/akeyless/models/gateway_update_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_update_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_update_remote_access_desktop_app.rb +265 -0
- data/lib/akeyless/models/item.rb +1 -1
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_windows.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_windows.rb +21 -1
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/secure_remote_access.rb +10 -1
- data/lib/akeyless/models/sra_desktop_app_conf.rb +232 -0
- data/lib/akeyless/models/usc_create.rb +10 -1
- data/lib/akeyless/models/usc_list.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +4 -1
- data/spec/models/desktop_app_conf_spec.rb +54 -0
- data/spec/models/gateway_details_for_item_reply_obj_spec.rb +54 -0
- data/spec/models/gateway_update_remote_access_desktop_app_spec.rb +66 -0
- data/spec/models/sra_desktop_app_conf_spec.rb +48 -0
- metadata +1070 -1054
@@ -64,6 +64,12 @@ module Akeyless
|
|
64
64
|
# Allow providing external user for a domain users
|
65
65
|
attr_accessor :secure_access_allow_external_user
|
66
66
|
|
67
|
+
# Deprecated. use secure-access-certificate-issuer
|
68
|
+
attr_accessor :secure_access_bastion_issuer
|
69
|
+
|
70
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
71
|
+
attr_accessor :secure_access_certificate_issuer
|
72
|
+
|
67
73
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
68
74
|
attr_accessor :secure_access_delay
|
69
75
|
|
@@ -119,6 +125,8 @@ module Akeyless
|
|
119
125
|
:'rdp_host_port' => :'rdp-host-port',
|
120
126
|
:'rdp_user_groups' => :'rdp-user-groups',
|
121
127
|
:'secure_access_allow_external_user' => :'secure-access-allow-external-user',
|
128
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
129
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
122
130
|
:'secure_access_delay' => :'secure-access-delay',
|
123
131
|
:'secure_access_enable' => :'secure-access-enable',
|
124
132
|
:'secure_access_host' => :'secure-access-host',
|
@@ -158,6 +166,8 @@ module Akeyless
|
|
158
166
|
:'rdp_host_port' => :'String',
|
159
167
|
:'rdp_user_groups' => :'String',
|
160
168
|
:'secure_access_allow_external_user' => :'Boolean',
|
169
|
+
:'secure_access_bastion_issuer' => :'String',
|
170
|
+
:'secure_access_certificate_issuer' => :'String',
|
161
171
|
:'secure_access_delay' => :'Integer',
|
162
172
|
:'secure_access_enable' => :'String',
|
163
173
|
:'secure_access_host' => :'Array<String>',
|
@@ -270,6 +280,14 @@ module Akeyless
|
|
270
280
|
self.secure_access_allow_external_user = false
|
271
281
|
end
|
272
282
|
|
283
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
284
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
285
|
+
end
|
286
|
+
|
287
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
288
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
289
|
+
end
|
290
|
+
|
273
291
|
if attributes.key?(:'secure_access_delay')
|
274
292
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
275
293
|
end
|
@@ -366,6 +384,8 @@ module Akeyless
|
|
366
384
|
rdp_host_port == o.rdp_host_port &&
|
367
385
|
rdp_user_groups == o.rdp_user_groups &&
|
368
386
|
secure_access_allow_external_user == o.secure_access_allow_external_user &&
|
387
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
388
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
369
389
|
secure_access_delay == o.secure_access_delay &&
|
370
390
|
secure_access_enable == o.secure_access_enable &&
|
371
391
|
secure_access_host == o.secure_access_host &&
|
@@ -389,7 +409,7 @@ module Akeyless
|
|
389
409
|
# Calculates hash code according to all attributes.
|
390
410
|
# @return [Integer] Hash code
|
391
411
|
def hash
|
392
|
-
[allow_user_extend_session, delete_protection, description, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
412
|
+
[allow_user_extend_session, delete_protection, description, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
393
413
|
end
|
394
414
|
|
395
415
|
# Builds the object from hash
|
@@ -57,6 +57,12 @@ module Akeyless
|
|
57
57
|
# Dynamic producer encryption key
|
58
58
|
attr_accessor :producer_encryption_key_name
|
59
59
|
|
60
|
+
# Deprecated. use secure-access-certificate-issuer
|
61
|
+
attr_accessor :secure_access_bastion_issuer
|
62
|
+
|
63
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
64
|
+
attr_accessor :secure_access_certificate_issuer
|
65
|
+
|
60
66
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
61
67
|
attr_accessor :secure_access_delay
|
62
68
|
|
@@ -116,6 +122,8 @@ module Akeyless
|
|
116
122
|
:'name' => :'name',
|
117
123
|
:'password_length' => :'password-length',
|
118
124
|
:'producer_encryption_key_name' => :'producer-encryption-key-name',
|
125
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
126
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
119
127
|
:'secure_access_delay' => :'secure-access-delay',
|
120
128
|
:'secure_access_enable' => :'secure-access-enable',
|
121
129
|
:'secure_access_host' => :'secure-access-host',
|
@@ -155,6 +163,8 @@ module Akeyless
|
|
155
163
|
:'name' => :'String',
|
156
164
|
:'password_length' => :'String',
|
157
165
|
:'producer_encryption_key_name' => :'String',
|
166
|
+
:'secure_access_bastion_issuer' => :'String',
|
167
|
+
:'secure_access_certificate_issuer' => :'String',
|
158
168
|
:'secure_access_delay' => :'Integer',
|
159
169
|
:'secure_access_enable' => :'String',
|
160
170
|
:'secure_access_host' => :'Array<String>',
|
@@ -257,6 +267,14 @@ module Akeyless
|
|
257
267
|
self.producer_encryption_key_name = attributes[:'producer_encryption_key_name']
|
258
268
|
end
|
259
269
|
|
270
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
271
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
272
|
+
end
|
273
|
+
|
274
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
275
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
276
|
+
end
|
277
|
+
|
260
278
|
if attributes.key?(:'secure_access_delay')
|
261
279
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
262
280
|
end
|
@@ -361,6 +379,8 @@ module Akeyless
|
|
361
379
|
name == o.name &&
|
362
380
|
password_length == o.password_length &&
|
363
381
|
producer_encryption_key_name == o.producer_encryption_key_name &&
|
382
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
383
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
364
384
|
secure_access_delay == o.secure_access_delay &&
|
365
385
|
secure_access_enable == o.secure_access_enable &&
|
366
386
|
secure_access_host == o.secure_access_host &&
|
@@ -386,7 +406,7 @@ module Akeyless
|
|
386
406
|
# Calculates hash code according to all attributes.
|
387
407
|
# @return [Integer] Hash code
|
388
408
|
def hash
|
389
|
-
[provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, password_length, producer_encryption_key_name, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
409
|
+
[provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
390
410
|
end
|
391
411
|
|
392
412
|
# Builds the object from hash
|
@@ -58,6 +58,12 @@ module Akeyless
|
|
58
58
|
# Allow providing external user for a domain users
|
59
59
|
attr_accessor :secure_access_allow_external_user
|
60
60
|
|
61
|
+
# Deprecated. use secure-access-certificate-issuer
|
62
|
+
attr_accessor :secure_access_bastion_issuer
|
63
|
+
|
64
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
65
|
+
attr_accessor :secure_access_certificate_issuer
|
66
|
+
|
61
67
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
62
68
|
attr_accessor :secure_access_delay
|
63
69
|
|
@@ -111,6 +117,8 @@ module Akeyless
|
|
111
117
|
:'rdp_host_port' => :'rdp-host-port',
|
112
118
|
:'rdp_user_groups' => :'rdp-user-groups',
|
113
119
|
:'secure_access_allow_external_user' => :'secure-access-allow-external-user',
|
120
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
121
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
114
122
|
:'secure_access_delay' => :'secure-access-delay',
|
115
123
|
:'secure_access_enable' => :'secure-access-enable',
|
116
124
|
:'secure_access_host' => :'secure-access-host',
|
@@ -148,6 +156,8 @@ module Akeyless
|
|
148
156
|
:'rdp_host_port' => :'String',
|
149
157
|
:'rdp_user_groups' => :'String',
|
150
158
|
:'secure_access_allow_external_user' => :'Boolean',
|
159
|
+
:'secure_access_bastion_issuer' => :'String',
|
160
|
+
:'secure_access_certificate_issuer' => :'String',
|
151
161
|
:'secure_access_delay' => :'Integer',
|
152
162
|
:'secure_access_enable' => :'String',
|
153
163
|
:'secure_access_host' => :'Array<String>',
|
@@ -252,6 +262,14 @@ module Akeyless
|
|
252
262
|
self.secure_access_allow_external_user = false
|
253
263
|
end
|
254
264
|
|
265
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
266
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
267
|
+
end
|
268
|
+
|
269
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
270
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
271
|
+
end
|
272
|
+
|
255
273
|
if attributes.key?(:'secure_access_delay')
|
256
274
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
257
275
|
end
|
@@ -346,6 +364,8 @@ module Akeyless
|
|
346
364
|
rdp_host_port == o.rdp_host_port &&
|
347
365
|
rdp_user_groups == o.rdp_user_groups &&
|
348
366
|
secure_access_allow_external_user == o.secure_access_allow_external_user &&
|
367
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
368
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
349
369
|
secure_access_delay == o.secure_access_delay &&
|
350
370
|
secure_access_enable == o.secure_access_enable &&
|
351
371
|
secure_access_host == o.secure_access_host &&
|
@@ -369,7 +389,7 @@ module Akeyless
|
|
369
389
|
# Calculates hash code according to all attributes.
|
370
390
|
# @return [Integer] Hash code
|
371
391
|
def hash
|
372
|
-
[allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
392
|
+
[allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
373
393
|
end
|
374
394
|
|
375
395
|
# Builds the object from hash
|
@@ -0,0 +1,241 @@
|
|
1
|
+
=begin
|
2
|
+
#Akeyless API
|
3
|
+
|
4
|
+
#The purpose of this application is to provide access to Akeyless API.
|
5
|
+
|
6
|
+
The version of the OpenAPI document: 2.0
|
7
|
+
Contact: support@akeyless.io
|
8
|
+
Generated by: https://openapi-generator.tech
|
9
|
+
Generator version: 7.10.0
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
require 'time'
|
15
|
+
|
16
|
+
module Akeyless
|
17
|
+
class GatewayDetailsForItemReplyObj
|
18
|
+
attr_accessor :cluster_name
|
19
|
+
|
20
|
+
attr_accessor :cluster_url
|
21
|
+
|
22
|
+
attr_accessor :desktop_app
|
23
|
+
|
24
|
+
attr_accessor :is_cluster_available
|
25
|
+
|
26
|
+
# Attribute mapping from ruby-style variable name to JSON key.
|
27
|
+
def self.attribute_map
|
28
|
+
{
|
29
|
+
:'cluster_name' => :'cluster_name',
|
30
|
+
:'cluster_url' => :'cluster_url',
|
31
|
+
:'desktop_app' => :'desktop_app',
|
32
|
+
:'is_cluster_available' => :'is_cluster_available'
|
33
|
+
}
|
34
|
+
end
|
35
|
+
|
36
|
+
# Returns all the JSON keys this model knows about
|
37
|
+
def self.acceptable_attributes
|
38
|
+
attribute_map.values
|
39
|
+
end
|
40
|
+
|
41
|
+
# Attribute type mapping.
|
42
|
+
def self.openapi_types
|
43
|
+
{
|
44
|
+
:'cluster_name' => :'String',
|
45
|
+
:'cluster_url' => :'String',
|
46
|
+
:'desktop_app' => :'DesktopAppConf',
|
47
|
+
:'is_cluster_available' => :'Boolean'
|
48
|
+
}
|
49
|
+
end
|
50
|
+
|
51
|
+
# List of attributes with nullable: true
|
52
|
+
def self.openapi_nullable
|
53
|
+
Set.new([
|
54
|
+
])
|
55
|
+
end
|
56
|
+
|
57
|
+
# Initializes the object
|
58
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
59
|
+
def initialize(attributes = {})
|
60
|
+
if (!attributes.is_a?(Hash))
|
61
|
+
fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayDetailsForItemReplyObj` initialize method"
|
62
|
+
end
|
63
|
+
|
64
|
+
# check to see if the attribute exists and convert string to symbol for hash key
|
65
|
+
attributes = attributes.each_with_object({}) { |(k, v), h|
|
66
|
+
if (!self.class.attribute_map.key?(k.to_sym))
|
67
|
+
fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayDetailsForItemReplyObj`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
|
68
|
+
end
|
69
|
+
h[k.to_sym] = v
|
70
|
+
}
|
71
|
+
|
72
|
+
if attributes.key?(:'cluster_name')
|
73
|
+
self.cluster_name = attributes[:'cluster_name']
|
74
|
+
end
|
75
|
+
|
76
|
+
if attributes.key?(:'cluster_url')
|
77
|
+
self.cluster_url = attributes[:'cluster_url']
|
78
|
+
end
|
79
|
+
|
80
|
+
if attributes.key?(:'desktop_app')
|
81
|
+
self.desktop_app = attributes[:'desktop_app']
|
82
|
+
end
|
83
|
+
|
84
|
+
if attributes.key?(:'is_cluster_available')
|
85
|
+
self.is_cluster_available = attributes[:'is_cluster_available']
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
89
|
+
# Show invalid properties with the reasons. Usually used together with valid?
|
90
|
+
# @return Array for valid properties with the reasons
|
91
|
+
def list_invalid_properties
|
92
|
+
warn '[DEPRECATED] the `list_invalid_properties` method is obsolete'
|
93
|
+
invalid_properties = Array.new
|
94
|
+
invalid_properties
|
95
|
+
end
|
96
|
+
|
97
|
+
# Check to see if the all the properties in the model are valid
|
98
|
+
# @return true if the model is valid
|
99
|
+
def valid?
|
100
|
+
warn '[DEPRECATED] the `valid?` method is obsolete'
|
101
|
+
true
|
102
|
+
end
|
103
|
+
|
104
|
+
# Checks equality by comparing each attribute.
|
105
|
+
# @param [Object] Object to be compared
|
106
|
+
def ==(o)
|
107
|
+
return true if self.equal?(o)
|
108
|
+
self.class == o.class &&
|
109
|
+
cluster_name == o.cluster_name &&
|
110
|
+
cluster_url == o.cluster_url &&
|
111
|
+
desktop_app == o.desktop_app &&
|
112
|
+
is_cluster_available == o.is_cluster_available
|
113
|
+
end
|
114
|
+
|
115
|
+
# @see the `==` method
|
116
|
+
# @param [Object] Object to be compared
|
117
|
+
def eql?(o)
|
118
|
+
self == o
|
119
|
+
end
|
120
|
+
|
121
|
+
# Calculates hash code according to all attributes.
|
122
|
+
# @return [Integer] Hash code
|
123
|
+
def hash
|
124
|
+
[cluster_name, cluster_url, desktop_app, is_cluster_available].hash
|
125
|
+
end
|
126
|
+
|
127
|
+
# Builds the object from hash
|
128
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
129
|
+
# @return [Object] Returns the model itself
|
130
|
+
def self.build_from_hash(attributes)
|
131
|
+
return nil unless attributes.is_a?(Hash)
|
132
|
+
attributes = attributes.transform_keys(&:to_sym)
|
133
|
+
transformed_hash = {}
|
134
|
+
openapi_types.each_pair do |key, type|
|
135
|
+
if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil?
|
136
|
+
transformed_hash["#{key}"] = nil
|
137
|
+
elsif type =~ /\AArray<(.*)>/i
|
138
|
+
# check to ensure the input is an array given that the attribute
|
139
|
+
# is documented as an array but the input is not
|
140
|
+
if attributes[attribute_map[key]].is_a?(Array)
|
141
|
+
transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) }
|
142
|
+
end
|
143
|
+
elsif !attributes[attribute_map[key]].nil?
|
144
|
+
transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]])
|
145
|
+
end
|
146
|
+
end
|
147
|
+
new(transformed_hash)
|
148
|
+
end
|
149
|
+
|
150
|
+
# Deserializes the data based on type
|
151
|
+
# @param string type Data type
|
152
|
+
# @param string value Value to be deserialized
|
153
|
+
# @return [Object] Deserialized data
|
154
|
+
def self._deserialize(type, value)
|
155
|
+
case type.to_sym
|
156
|
+
when :Time
|
157
|
+
Time.parse(value)
|
158
|
+
when :Date
|
159
|
+
Date.parse(value)
|
160
|
+
when :String
|
161
|
+
value.to_s
|
162
|
+
when :Integer
|
163
|
+
value.to_i
|
164
|
+
when :Float
|
165
|
+
value.to_f
|
166
|
+
when :Boolean
|
167
|
+
if value.to_s =~ /\A(true|t|yes|y|1)\z/i
|
168
|
+
true
|
169
|
+
else
|
170
|
+
false
|
171
|
+
end
|
172
|
+
when :Object
|
173
|
+
# generic object (usually a Hash), return directly
|
174
|
+
value
|
175
|
+
when /\AArray<(?<inner_type>.+)>\z/
|
176
|
+
inner_type = Regexp.last_match[:inner_type]
|
177
|
+
value.map { |v| _deserialize(inner_type, v) }
|
178
|
+
when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
|
179
|
+
k_type = Regexp.last_match[:k_type]
|
180
|
+
v_type = Regexp.last_match[:v_type]
|
181
|
+
{}.tap do |hash|
|
182
|
+
value.each do |k, v|
|
183
|
+
hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
|
184
|
+
end
|
185
|
+
end
|
186
|
+
else # model
|
187
|
+
# models (e.g. Pet) or oneOf
|
188
|
+
klass = Akeyless.const_get(type)
|
189
|
+
klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value)
|
190
|
+
end
|
191
|
+
end
|
192
|
+
|
193
|
+
# Returns the string representation of the object
|
194
|
+
# @return [String] String presentation of the object
|
195
|
+
def to_s
|
196
|
+
to_hash.to_s
|
197
|
+
end
|
198
|
+
|
199
|
+
# to_body is an alias to to_hash (backward compatibility)
|
200
|
+
# @return [Hash] Returns the object in the form of hash
|
201
|
+
def to_body
|
202
|
+
to_hash
|
203
|
+
end
|
204
|
+
|
205
|
+
# Returns the object in the form of hash
|
206
|
+
# @return [Hash] Returns the object in the form of hash
|
207
|
+
def to_hash
|
208
|
+
hash = {}
|
209
|
+
self.class.attribute_map.each_pair do |attr, param|
|
210
|
+
value = self.send(attr)
|
211
|
+
if value.nil?
|
212
|
+
is_nullable = self.class.openapi_nullable.include?(attr)
|
213
|
+
next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
|
214
|
+
end
|
215
|
+
|
216
|
+
hash[param] = _to_hash(value)
|
217
|
+
end
|
218
|
+
hash
|
219
|
+
end
|
220
|
+
|
221
|
+
# Outputs non-array value in the form of hash
|
222
|
+
# For object, use to_hash. Otherwise, just return the value
|
223
|
+
# @param [Object] value Any valid value
|
224
|
+
# @return [Hash] Returns the value in the form of hash
|
225
|
+
def _to_hash(value)
|
226
|
+
if value.is_a?(Array)
|
227
|
+
value.compact.map { |v| _to_hash(v) }
|
228
|
+
elsif value.is_a?(Hash)
|
229
|
+
{}.tap do |hash|
|
230
|
+
value.each { |k, v| hash[k] = _to_hash(v) }
|
231
|
+
end
|
232
|
+
elsif value.respond_to? :to_hash
|
233
|
+
value.to_hash
|
234
|
+
else
|
235
|
+
value
|
236
|
+
end
|
237
|
+
end
|
238
|
+
|
239
|
+
end
|
240
|
+
|
241
|
+
end
|
@@ -60,6 +60,12 @@ module Akeyless
|
|
60
60
|
# Dynamic producer encryption key
|
61
61
|
attr_accessor :producer_encryption_key_name
|
62
62
|
|
63
|
+
# Deprecated. use secure-access-certificate-issuer
|
64
|
+
attr_accessor :secure_access_bastion_issuer
|
65
|
+
|
66
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
67
|
+
attr_accessor :secure_access_certificate_issuer
|
68
|
+
|
63
69
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
64
70
|
attr_accessor :secure_access_delay
|
65
71
|
|
@@ -120,6 +126,8 @@ module Akeyless
|
|
120
126
|
:'new_name' => :'new-name',
|
121
127
|
:'password_length' => :'password-length',
|
122
128
|
:'producer_encryption_key_name' => :'producer-encryption-key-name',
|
129
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
130
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
123
131
|
:'secure_access_delay' => :'secure-access-delay',
|
124
132
|
:'secure_access_enable' => :'secure-access-enable',
|
125
133
|
:'secure_access_host' => :'secure-access-host',
|
@@ -160,6 +168,8 @@ module Akeyless
|
|
160
168
|
:'new_name' => :'String',
|
161
169
|
:'password_length' => :'String',
|
162
170
|
:'producer_encryption_key_name' => :'String',
|
171
|
+
:'secure_access_bastion_issuer' => :'String',
|
172
|
+
:'secure_access_certificate_issuer' => :'String',
|
163
173
|
:'secure_access_delay' => :'Integer',
|
164
174
|
:'secure_access_enable' => :'String',
|
165
175
|
:'secure_access_host' => :'Array<String>',
|
@@ -266,6 +276,14 @@ module Akeyless
|
|
266
276
|
self.producer_encryption_key_name = attributes[:'producer_encryption_key_name']
|
267
277
|
end
|
268
278
|
|
279
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
280
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
281
|
+
end
|
282
|
+
|
283
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
284
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
285
|
+
end
|
286
|
+
|
269
287
|
if attributes.key?(:'secure_access_delay')
|
270
288
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
271
289
|
end
|
@@ -371,6 +389,8 @@ module Akeyless
|
|
371
389
|
new_name == o.new_name &&
|
372
390
|
password_length == o.password_length &&
|
373
391
|
producer_encryption_key_name == o.producer_encryption_key_name &&
|
392
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
393
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
374
394
|
secure_access_delay == o.secure_access_delay &&
|
375
395
|
secure_access_enable == o.secure_access_enable &&
|
376
396
|
secure_access_host == o.secure_access_host &&
|
@@ -396,7 +416,7 @@ module Akeyless
|
|
396
416
|
# Calculates hash code according to all attributes.
|
397
417
|
# @return [Integer] Hash code
|
398
418
|
def hash
|
399
|
-
[provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, new_name, password_length, producer_encryption_key_name, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
419
|
+
[provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, new_name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
|
400
420
|
end
|
401
421
|
|
402
422
|
# Builds the object from hash
|
@@ -61,6 +61,12 @@ module Akeyless
|
|
61
61
|
# Allow providing external user for a domain users
|
62
62
|
attr_accessor :secure_access_allow_external_user
|
63
63
|
|
64
|
+
# Deprecated. use secure-access-certificate-issuer
|
65
|
+
attr_accessor :secure_access_bastion_issuer
|
66
|
+
|
67
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
68
|
+
attr_accessor :secure_access_certificate_issuer
|
69
|
+
|
64
70
|
# The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
|
65
71
|
attr_accessor :secure_access_delay
|
66
72
|
|
@@ -115,6 +121,8 @@ module Akeyless
|
|
115
121
|
:'rdp_host_port' => :'rdp-host-port',
|
116
122
|
:'rdp_user_groups' => :'rdp-user-groups',
|
117
123
|
:'secure_access_allow_external_user' => :'secure-access-allow-external-user',
|
124
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
125
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
118
126
|
:'secure_access_delay' => :'secure-access-delay',
|
119
127
|
:'secure_access_enable' => :'secure-access-enable',
|
120
128
|
:'secure_access_host' => :'secure-access-host',
|
@@ -153,6 +161,8 @@ module Akeyless
|
|
153
161
|
:'rdp_host_port' => :'String',
|
154
162
|
:'rdp_user_groups' => :'String',
|
155
163
|
:'secure_access_allow_external_user' => :'Boolean',
|
164
|
+
:'secure_access_bastion_issuer' => :'String',
|
165
|
+
:'secure_access_certificate_issuer' => :'String',
|
156
166
|
:'secure_access_delay' => :'Integer',
|
157
167
|
:'secure_access_enable' => :'String',
|
158
168
|
:'secure_access_host' => :'Array<String>',
|
@@ -261,6 +271,14 @@ module Akeyless
|
|
261
271
|
self.secure_access_allow_external_user = false
|
262
272
|
end
|
263
273
|
|
274
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
275
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
276
|
+
end
|
277
|
+
|
278
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
279
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
280
|
+
end
|
281
|
+
|
264
282
|
if attributes.key?(:'secure_access_delay')
|
265
283
|
self.secure_access_delay = attributes[:'secure_access_delay']
|
266
284
|
end
|
@@ -356,6 +374,8 @@ module Akeyless
|
|
356
374
|
rdp_host_port == o.rdp_host_port &&
|
357
375
|
rdp_user_groups == o.rdp_user_groups &&
|
358
376
|
secure_access_allow_external_user == o.secure_access_allow_external_user &&
|
377
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
378
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
359
379
|
secure_access_delay == o.secure_access_delay &&
|
360
380
|
secure_access_enable == o.secure_access_enable &&
|
361
381
|
secure_access_host == o.secure_access_host &&
|
@@ -379,7 +399,7 @@ module Akeyless
|
|
379
399
|
# Calculates hash code according to all attributes.
|
380
400
|
# @return [Integer] Hash code
|
381
401
|
def hash
|
382
|
-
[allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
402
|
+
[allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
|
383
403
|
end
|
384
404
|
|
385
405
|
# Builds the object from hash
|