akeyless 5.0.1 → 5.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +6 -2
  3. data/docs/BastionConfigReplyObj.md +2 -2
  4. data/docs/Connect.md +1 -1
  5. data/docs/CreateUSC.md +5 -1
  6. data/docs/DesktopAppConf.md +24 -0
  7. data/docs/DynamicSecretCreateLdap.md +4 -0
  8. data/docs/DynamicSecretCreateRdp.md +4 -0
  9. data/docs/DynamicSecretUpdateLdap.md +4 -0
  10. data/docs/DynamicSecretUpdateRdp.md +4 -0
  11. data/docs/GatewayCreateProducerLdap.md +4 -0
  12. data/docs/GatewayCreateProducerRdp.md +4 -0
  13. data/docs/GatewayDetailsForItemReplyObj.md +24 -0
  14. data/docs/GatewayUpdateProducerLdap.md +4 -0
  15. data/docs/GatewayUpdateProducerRdp.md +4 -0
  16. data/docs/GatewayUpdateRemoteAccessDesktopApp.md +28 -0
  17. data/docs/Item.md +1 -1
  18. data/docs/RotatedSecretCreateLdap.md +4 -0
  19. data/docs/RotatedSecretCreateSsh.md +2 -0
  20. data/docs/RotatedSecretCreateWindows.md +4 -0
  21. data/docs/RotatedSecretUpdateLdap.md +4 -0
  22. data/docs/RotatedSecretUpdateSsh.md +2 -0
  23. data/docs/RotatedSecretUpdateWindows.md +4 -0
  24. data/docs/SecretInfo.md +2 -0
  25. data/docs/SecureRemoteAccess.md +2 -0
  26. data/docs/SraDesktopAppConf.md +22 -0
  27. data/docs/UscCreate.md +2 -0
  28. data/docs/UscList.md +2 -0
  29. data/docs/V2Api.md +63 -0
  30. data/lib/akeyless/api/v2_api.rb +64 -0
  31. data/lib/akeyless/models/bastion_config_reply_obj.rb +10 -10
  32. data/lib/akeyless/models/connect.rb +1 -1
  33. data/lib/akeyless/models/create_usc.rb +26 -4
  34. data/lib/akeyless/models/desktop_app_conf.rb +241 -0
  35. data/lib/akeyless/models/dynamic_secret_create_ldap.rb +21 -1
  36. data/lib/akeyless/models/dynamic_secret_create_rdp.rb +21 -1
  37. data/lib/akeyless/models/dynamic_secret_update_ldap.rb +21 -1
  38. data/lib/akeyless/models/dynamic_secret_update_rdp.rb +21 -1
  39. data/lib/akeyless/models/gateway_create_producer_ldap.rb +21 -1
  40. data/lib/akeyless/models/gateway_create_producer_rdp.rb +21 -1
  41. data/lib/akeyless/models/gateway_details_for_item_reply_obj.rb +241 -0
  42. data/lib/akeyless/models/gateway_update_producer_ldap.rb +21 -1
  43. data/lib/akeyless/models/gateway_update_producer_rdp.rb +21 -1
  44. data/lib/akeyless/models/gateway_update_remote_access_desktop_app.rb +265 -0
  45. data/lib/akeyless/models/item.rb +1 -1
  46. data/lib/akeyless/models/rotated_secret_create_ldap.rb +21 -1
  47. data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
  48. data/lib/akeyless/models/rotated_secret_create_windows.rb +21 -1
  49. data/lib/akeyless/models/rotated_secret_update_ldap.rb +21 -1
  50. data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
  51. data/lib/akeyless/models/rotated_secret_update_windows.rb +21 -1
  52. data/lib/akeyless/models/secret_info.rb +10 -1
  53. data/lib/akeyless/models/secure_remote_access.rb +10 -1
  54. data/lib/akeyless/models/sra_desktop_app_conf.rb +232 -0
  55. data/lib/akeyless/models/usc_create.rb +10 -1
  56. data/lib/akeyless/models/usc_list.rb +10 -1
  57. data/lib/akeyless/version.rb +1 -1
  58. data/lib/akeyless.rb +4 -1
  59. data/spec/models/desktop_app_conf_spec.rb +54 -0
  60. data/spec/models/gateway_details_for_item_reply_obj_spec.rb +54 -0
  61. data/spec/models/gateway_update_remote_access_desktop_app_spec.rb +66 -0
  62. data/spec/models/sra_desktop_app_conf_spec.rb +48 -0
  63. metadata +1070 -1054
@@ -64,6 +64,12 @@ module Akeyless
64
64
  # Allow providing external user for a domain users
65
65
  attr_accessor :secure_access_allow_external_user
66
66
 
67
+ # Deprecated. use secure-access-certificate-issuer
68
+ attr_accessor :secure_access_bastion_issuer
69
+
70
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
71
+ attr_accessor :secure_access_certificate_issuer
72
+
67
73
  # The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
68
74
  attr_accessor :secure_access_delay
69
75
 
@@ -119,6 +125,8 @@ module Akeyless
119
125
  :'rdp_host_port' => :'rdp-host-port',
120
126
  :'rdp_user_groups' => :'rdp-user-groups',
121
127
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
128
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
129
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
122
130
  :'secure_access_delay' => :'secure-access-delay',
123
131
  :'secure_access_enable' => :'secure-access-enable',
124
132
  :'secure_access_host' => :'secure-access-host',
@@ -158,6 +166,8 @@ module Akeyless
158
166
  :'rdp_host_port' => :'String',
159
167
  :'rdp_user_groups' => :'String',
160
168
  :'secure_access_allow_external_user' => :'Boolean',
169
+ :'secure_access_bastion_issuer' => :'String',
170
+ :'secure_access_certificate_issuer' => :'String',
161
171
  :'secure_access_delay' => :'Integer',
162
172
  :'secure_access_enable' => :'String',
163
173
  :'secure_access_host' => :'Array<String>',
@@ -270,6 +280,14 @@ module Akeyless
270
280
  self.secure_access_allow_external_user = false
271
281
  end
272
282
 
283
+ if attributes.key?(:'secure_access_bastion_issuer')
284
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
285
+ end
286
+
287
+ if attributes.key?(:'secure_access_certificate_issuer')
288
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
289
+ end
290
+
273
291
  if attributes.key?(:'secure_access_delay')
274
292
  self.secure_access_delay = attributes[:'secure_access_delay']
275
293
  end
@@ -366,6 +384,8 @@ module Akeyless
366
384
  rdp_host_port == o.rdp_host_port &&
367
385
  rdp_user_groups == o.rdp_user_groups &&
368
386
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
387
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
388
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
369
389
  secure_access_delay == o.secure_access_delay &&
370
390
  secure_access_enable == o.secure_access_enable &&
371
391
  secure_access_host == o.secure_access_host &&
@@ -389,7 +409,7 @@ module Akeyless
389
409
  # Calculates hash code according to all attributes.
390
410
  # @return [Integer] Hash code
391
411
  def hash
392
- [allow_user_extend_session, delete_protection, description, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
412
+ [allow_user_extend_session, delete_protection, description, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
393
413
  end
394
414
 
395
415
  # Builds the object from hash
@@ -57,6 +57,12 @@ module Akeyless
57
57
  # Dynamic producer encryption key
58
58
  attr_accessor :producer_encryption_key_name
59
59
 
60
+ # Deprecated. use secure-access-certificate-issuer
61
+ attr_accessor :secure_access_bastion_issuer
62
+
63
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
64
+ attr_accessor :secure_access_certificate_issuer
65
+
60
66
  # The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
61
67
  attr_accessor :secure_access_delay
62
68
 
@@ -116,6 +122,8 @@ module Akeyless
116
122
  :'name' => :'name',
117
123
  :'password_length' => :'password-length',
118
124
  :'producer_encryption_key_name' => :'producer-encryption-key-name',
125
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
126
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
119
127
  :'secure_access_delay' => :'secure-access-delay',
120
128
  :'secure_access_enable' => :'secure-access-enable',
121
129
  :'secure_access_host' => :'secure-access-host',
@@ -155,6 +163,8 @@ module Akeyless
155
163
  :'name' => :'String',
156
164
  :'password_length' => :'String',
157
165
  :'producer_encryption_key_name' => :'String',
166
+ :'secure_access_bastion_issuer' => :'String',
167
+ :'secure_access_certificate_issuer' => :'String',
158
168
  :'secure_access_delay' => :'Integer',
159
169
  :'secure_access_enable' => :'String',
160
170
  :'secure_access_host' => :'Array<String>',
@@ -257,6 +267,14 @@ module Akeyless
257
267
  self.producer_encryption_key_name = attributes[:'producer_encryption_key_name']
258
268
  end
259
269
 
270
+ if attributes.key?(:'secure_access_bastion_issuer')
271
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
272
+ end
273
+
274
+ if attributes.key?(:'secure_access_certificate_issuer')
275
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
276
+ end
277
+
260
278
  if attributes.key?(:'secure_access_delay')
261
279
  self.secure_access_delay = attributes[:'secure_access_delay']
262
280
  end
@@ -361,6 +379,8 @@ module Akeyless
361
379
  name == o.name &&
362
380
  password_length == o.password_length &&
363
381
  producer_encryption_key_name == o.producer_encryption_key_name &&
382
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
383
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
364
384
  secure_access_delay == o.secure_access_delay &&
365
385
  secure_access_enable == o.secure_access_enable &&
366
386
  secure_access_host == o.secure_access_host &&
@@ -386,7 +406,7 @@ module Akeyless
386
406
  # Calculates hash code according to all attributes.
387
407
  # @return [Integer] Hash code
388
408
  def hash
389
- [provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, password_length, producer_encryption_key_name, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
409
+ [provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
390
410
  end
391
411
 
392
412
  # Builds the object from hash
@@ -58,6 +58,12 @@ module Akeyless
58
58
  # Allow providing external user for a domain users
59
59
  attr_accessor :secure_access_allow_external_user
60
60
 
61
+ # Deprecated. use secure-access-certificate-issuer
62
+ attr_accessor :secure_access_bastion_issuer
63
+
64
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
65
+ attr_accessor :secure_access_certificate_issuer
66
+
61
67
  # The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
62
68
  attr_accessor :secure_access_delay
63
69
 
@@ -111,6 +117,8 @@ module Akeyless
111
117
  :'rdp_host_port' => :'rdp-host-port',
112
118
  :'rdp_user_groups' => :'rdp-user-groups',
113
119
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
120
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
121
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
114
122
  :'secure_access_delay' => :'secure-access-delay',
115
123
  :'secure_access_enable' => :'secure-access-enable',
116
124
  :'secure_access_host' => :'secure-access-host',
@@ -148,6 +156,8 @@ module Akeyless
148
156
  :'rdp_host_port' => :'String',
149
157
  :'rdp_user_groups' => :'String',
150
158
  :'secure_access_allow_external_user' => :'Boolean',
159
+ :'secure_access_bastion_issuer' => :'String',
160
+ :'secure_access_certificate_issuer' => :'String',
151
161
  :'secure_access_delay' => :'Integer',
152
162
  :'secure_access_enable' => :'String',
153
163
  :'secure_access_host' => :'Array<String>',
@@ -252,6 +262,14 @@ module Akeyless
252
262
  self.secure_access_allow_external_user = false
253
263
  end
254
264
 
265
+ if attributes.key?(:'secure_access_bastion_issuer')
266
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
267
+ end
268
+
269
+ if attributes.key?(:'secure_access_certificate_issuer')
270
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
271
+ end
272
+
255
273
  if attributes.key?(:'secure_access_delay')
256
274
  self.secure_access_delay = attributes[:'secure_access_delay']
257
275
  end
@@ -346,6 +364,8 @@ module Akeyless
346
364
  rdp_host_port == o.rdp_host_port &&
347
365
  rdp_user_groups == o.rdp_user_groups &&
348
366
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
367
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
368
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
349
369
  secure_access_delay == o.secure_access_delay &&
350
370
  secure_access_enable == o.secure_access_enable &&
351
371
  secure_access_host == o.secure_access_host &&
@@ -369,7 +389,7 @@ module Akeyless
369
389
  # Calculates hash code according to all attributes.
370
390
  # @return [Integer] Hash code
371
391
  def hash
372
- [allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
392
+ [allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
373
393
  end
374
394
 
375
395
  # Builds the object from hash
@@ -0,0 +1,241 @@
1
+ =begin
2
+ #Akeyless API
3
+
4
+ #The purpose of this application is to provide access to Akeyless API.
5
+
6
+ The version of the OpenAPI document: 2.0
7
+ Contact: support@akeyless.io
8
+ Generated by: https://openapi-generator.tech
9
+ Generator version: 7.10.0
10
+
11
+ =end
12
+
13
+ require 'date'
14
+ require 'time'
15
+
16
+ module Akeyless
17
+ class GatewayDetailsForItemReplyObj
18
+ attr_accessor :cluster_name
19
+
20
+ attr_accessor :cluster_url
21
+
22
+ attr_accessor :desktop_app
23
+
24
+ attr_accessor :is_cluster_available
25
+
26
+ # Attribute mapping from ruby-style variable name to JSON key.
27
+ def self.attribute_map
28
+ {
29
+ :'cluster_name' => :'cluster_name',
30
+ :'cluster_url' => :'cluster_url',
31
+ :'desktop_app' => :'desktop_app',
32
+ :'is_cluster_available' => :'is_cluster_available'
33
+ }
34
+ end
35
+
36
+ # Returns all the JSON keys this model knows about
37
+ def self.acceptable_attributes
38
+ attribute_map.values
39
+ end
40
+
41
+ # Attribute type mapping.
42
+ def self.openapi_types
43
+ {
44
+ :'cluster_name' => :'String',
45
+ :'cluster_url' => :'String',
46
+ :'desktop_app' => :'DesktopAppConf',
47
+ :'is_cluster_available' => :'Boolean'
48
+ }
49
+ end
50
+
51
+ # List of attributes with nullable: true
52
+ def self.openapi_nullable
53
+ Set.new([
54
+ ])
55
+ end
56
+
57
+ # Initializes the object
58
+ # @param [Hash] attributes Model attributes in the form of hash
59
+ def initialize(attributes = {})
60
+ if (!attributes.is_a?(Hash))
61
+ fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayDetailsForItemReplyObj` initialize method"
62
+ end
63
+
64
+ # check to see if the attribute exists and convert string to symbol for hash key
65
+ attributes = attributes.each_with_object({}) { |(k, v), h|
66
+ if (!self.class.attribute_map.key?(k.to_sym))
67
+ fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayDetailsForItemReplyObj`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
68
+ end
69
+ h[k.to_sym] = v
70
+ }
71
+
72
+ if attributes.key?(:'cluster_name')
73
+ self.cluster_name = attributes[:'cluster_name']
74
+ end
75
+
76
+ if attributes.key?(:'cluster_url')
77
+ self.cluster_url = attributes[:'cluster_url']
78
+ end
79
+
80
+ if attributes.key?(:'desktop_app')
81
+ self.desktop_app = attributes[:'desktop_app']
82
+ end
83
+
84
+ if attributes.key?(:'is_cluster_available')
85
+ self.is_cluster_available = attributes[:'is_cluster_available']
86
+ end
87
+ end
88
+
89
+ # Show invalid properties with the reasons. Usually used together with valid?
90
+ # @return Array for valid properties with the reasons
91
+ def list_invalid_properties
92
+ warn '[DEPRECATED] the `list_invalid_properties` method is obsolete'
93
+ invalid_properties = Array.new
94
+ invalid_properties
95
+ end
96
+
97
+ # Check to see if the all the properties in the model are valid
98
+ # @return true if the model is valid
99
+ def valid?
100
+ warn '[DEPRECATED] the `valid?` method is obsolete'
101
+ true
102
+ end
103
+
104
+ # Checks equality by comparing each attribute.
105
+ # @param [Object] Object to be compared
106
+ def ==(o)
107
+ return true if self.equal?(o)
108
+ self.class == o.class &&
109
+ cluster_name == o.cluster_name &&
110
+ cluster_url == o.cluster_url &&
111
+ desktop_app == o.desktop_app &&
112
+ is_cluster_available == o.is_cluster_available
113
+ end
114
+
115
+ # @see the `==` method
116
+ # @param [Object] Object to be compared
117
+ def eql?(o)
118
+ self == o
119
+ end
120
+
121
+ # Calculates hash code according to all attributes.
122
+ # @return [Integer] Hash code
123
+ def hash
124
+ [cluster_name, cluster_url, desktop_app, is_cluster_available].hash
125
+ end
126
+
127
+ # Builds the object from hash
128
+ # @param [Hash] attributes Model attributes in the form of hash
129
+ # @return [Object] Returns the model itself
130
+ def self.build_from_hash(attributes)
131
+ return nil unless attributes.is_a?(Hash)
132
+ attributes = attributes.transform_keys(&:to_sym)
133
+ transformed_hash = {}
134
+ openapi_types.each_pair do |key, type|
135
+ if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil?
136
+ transformed_hash["#{key}"] = nil
137
+ elsif type =~ /\AArray<(.*)>/i
138
+ # check to ensure the input is an array given that the attribute
139
+ # is documented as an array but the input is not
140
+ if attributes[attribute_map[key]].is_a?(Array)
141
+ transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) }
142
+ end
143
+ elsif !attributes[attribute_map[key]].nil?
144
+ transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]])
145
+ end
146
+ end
147
+ new(transformed_hash)
148
+ end
149
+
150
+ # Deserializes the data based on type
151
+ # @param string type Data type
152
+ # @param string value Value to be deserialized
153
+ # @return [Object] Deserialized data
154
+ def self._deserialize(type, value)
155
+ case type.to_sym
156
+ when :Time
157
+ Time.parse(value)
158
+ when :Date
159
+ Date.parse(value)
160
+ when :String
161
+ value.to_s
162
+ when :Integer
163
+ value.to_i
164
+ when :Float
165
+ value.to_f
166
+ when :Boolean
167
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
168
+ true
169
+ else
170
+ false
171
+ end
172
+ when :Object
173
+ # generic object (usually a Hash), return directly
174
+ value
175
+ when /\AArray<(?<inner_type>.+)>\z/
176
+ inner_type = Regexp.last_match[:inner_type]
177
+ value.map { |v| _deserialize(inner_type, v) }
178
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
179
+ k_type = Regexp.last_match[:k_type]
180
+ v_type = Regexp.last_match[:v_type]
181
+ {}.tap do |hash|
182
+ value.each do |k, v|
183
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
184
+ end
185
+ end
186
+ else # model
187
+ # models (e.g. Pet) or oneOf
188
+ klass = Akeyless.const_get(type)
189
+ klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value)
190
+ end
191
+ end
192
+
193
+ # Returns the string representation of the object
194
+ # @return [String] String presentation of the object
195
+ def to_s
196
+ to_hash.to_s
197
+ end
198
+
199
+ # to_body is an alias to to_hash (backward compatibility)
200
+ # @return [Hash] Returns the object in the form of hash
201
+ def to_body
202
+ to_hash
203
+ end
204
+
205
+ # Returns the object in the form of hash
206
+ # @return [Hash] Returns the object in the form of hash
207
+ def to_hash
208
+ hash = {}
209
+ self.class.attribute_map.each_pair do |attr, param|
210
+ value = self.send(attr)
211
+ if value.nil?
212
+ is_nullable = self.class.openapi_nullable.include?(attr)
213
+ next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
214
+ end
215
+
216
+ hash[param] = _to_hash(value)
217
+ end
218
+ hash
219
+ end
220
+
221
+ # Outputs non-array value in the form of hash
222
+ # For object, use to_hash. Otherwise, just return the value
223
+ # @param [Object] value Any valid value
224
+ # @return [Hash] Returns the value in the form of hash
225
+ def _to_hash(value)
226
+ if value.is_a?(Array)
227
+ value.compact.map { |v| _to_hash(v) }
228
+ elsif value.is_a?(Hash)
229
+ {}.tap do |hash|
230
+ value.each { |k, v| hash[k] = _to_hash(v) }
231
+ end
232
+ elsif value.respond_to? :to_hash
233
+ value.to_hash
234
+ else
235
+ value
236
+ end
237
+ end
238
+
239
+ end
240
+
241
+ end
@@ -60,6 +60,12 @@ module Akeyless
60
60
  # Dynamic producer encryption key
61
61
  attr_accessor :producer_encryption_key_name
62
62
 
63
+ # Deprecated. use secure-access-certificate-issuer
64
+ attr_accessor :secure_access_bastion_issuer
65
+
66
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
67
+ attr_accessor :secure_access_certificate_issuer
68
+
63
69
  # The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
64
70
  attr_accessor :secure_access_delay
65
71
 
@@ -120,6 +126,8 @@ module Akeyless
120
126
  :'new_name' => :'new-name',
121
127
  :'password_length' => :'password-length',
122
128
  :'producer_encryption_key_name' => :'producer-encryption-key-name',
129
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
130
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
123
131
  :'secure_access_delay' => :'secure-access-delay',
124
132
  :'secure_access_enable' => :'secure-access-enable',
125
133
  :'secure_access_host' => :'secure-access-host',
@@ -160,6 +168,8 @@ module Akeyless
160
168
  :'new_name' => :'String',
161
169
  :'password_length' => :'String',
162
170
  :'producer_encryption_key_name' => :'String',
171
+ :'secure_access_bastion_issuer' => :'String',
172
+ :'secure_access_certificate_issuer' => :'String',
163
173
  :'secure_access_delay' => :'Integer',
164
174
  :'secure_access_enable' => :'String',
165
175
  :'secure_access_host' => :'Array<String>',
@@ -266,6 +276,14 @@ module Akeyless
266
276
  self.producer_encryption_key_name = attributes[:'producer_encryption_key_name']
267
277
  end
268
278
 
279
+ if attributes.key?(:'secure_access_bastion_issuer')
280
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
281
+ end
282
+
283
+ if attributes.key?(:'secure_access_certificate_issuer')
284
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
285
+ end
286
+
269
287
  if attributes.key?(:'secure_access_delay')
270
288
  self.secure_access_delay = attributes[:'secure_access_delay']
271
289
  end
@@ -371,6 +389,8 @@ module Akeyless
371
389
  new_name == o.new_name &&
372
390
  password_length == o.password_length &&
373
391
  producer_encryption_key_name == o.producer_encryption_key_name &&
392
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
393
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
374
394
  secure_access_delay == o.secure_access_delay &&
375
395
  secure_access_enable == o.secure_access_enable &&
376
396
  secure_access_host == o.secure_access_host &&
@@ -396,7 +416,7 @@ module Akeyless
396
416
  # Calculates hash code according to all attributes.
397
417
  # @return [Integer] Hash code
398
418
  def hash
399
- [provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, new_name, password_length, producer_encryption_key_name, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
419
+ [provider_type, bind_dn, bind_dn_password, delete_protection, external_username, fixed_user_claim_keyname, group_dn, host_provider, json, ldap_ca_cert, ldap_url, name, new_name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, tags, target, target_name, token, token_expiration, uid_token, user_attribute, user_dn, user_ttl].hash
400
420
  end
401
421
 
402
422
  # Builds the object from hash
@@ -61,6 +61,12 @@ module Akeyless
61
61
  # Allow providing external user for a domain users
62
62
  attr_accessor :secure_access_allow_external_user
63
63
 
64
+ # Deprecated. use secure-access-certificate-issuer
65
+ attr_accessor :secure_access_bastion_issuer
66
+
67
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
68
+ attr_accessor :secure_access_certificate_issuer
69
+
64
70
  # The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
65
71
  attr_accessor :secure_access_delay
66
72
 
@@ -115,6 +121,8 @@ module Akeyless
115
121
  :'rdp_host_port' => :'rdp-host-port',
116
122
  :'rdp_user_groups' => :'rdp-user-groups',
117
123
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
124
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
125
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
118
126
  :'secure_access_delay' => :'secure-access-delay',
119
127
  :'secure_access_enable' => :'secure-access-enable',
120
128
  :'secure_access_host' => :'secure-access-host',
@@ -153,6 +161,8 @@ module Akeyless
153
161
  :'rdp_host_port' => :'String',
154
162
  :'rdp_user_groups' => :'String',
155
163
  :'secure_access_allow_external_user' => :'Boolean',
164
+ :'secure_access_bastion_issuer' => :'String',
165
+ :'secure_access_certificate_issuer' => :'String',
156
166
  :'secure_access_delay' => :'Integer',
157
167
  :'secure_access_enable' => :'String',
158
168
  :'secure_access_host' => :'Array<String>',
@@ -261,6 +271,14 @@ module Akeyless
261
271
  self.secure_access_allow_external_user = false
262
272
  end
263
273
 
274
+ if attributes.key?(:'secure_access_bastion_issuer')
275
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
276
+ end
277
+
278
+ if attributes.key?(:'secure_access_certificate_issuer')
279
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
280
+ end
281
+
264
282
  if attributes.key?(:'secure_access_delay')
265
283
  self.secure_access_delay = attributes[:'secure_access_delay']
266
284
  end
@@ -356,6 +374,8 @@ module Akeyless
356
374
  rdp_host_port == o.rdp_host_port &&
357
375
  rdp_user_groups == o.rdp_user_groups &&
358
376
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
377
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
378
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
359
379
  secure_access_delay == o.secure_access_delay &&
360
380
  secure_access_enable == o.secure_access_enable &&
361
381
  secure_access_host == o.secure_access_host &&
@@ -379,7 +399,7 @@ module Akeyless
379
399
  # Calculates hash code according to all attributes.
380
400
  # @return [Integer] Hash code
381
401
  def hash
382
- [allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
402
+ [allow_user_extend_session, delete_protection, fixed_user_claim_keyname, fixed_user_only, json, name, new_name, password_length, producer_encryption_key_name, rdp_admin_name, rdp_admin_pwd, rdp_host_name, rdp_host_port, rdp_user_groups, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_delay, secure_access_enable, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token, user_ttl, warn_user_before_expiration].hash
383
403
  end
384
404
 
385
405
  # Builds the object from hash