akeyless 5.0.1 → 5.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +6 -2
  3. data/docs/BastionConfigReplyObj.md +2 -2
  4. data/docs/Connect.md +1 -1
  5. data/docs/CreateUSC.md +5 -1
  6. data/docs/DesktopAppConf.md +24 -0
  7. data/docs/DynamicSecretCreateLdap.md +4 -0
  8. data/docs/DynamicSecretCreateRdp.md +4 -0
  9. data/docs/DynamicSecretUpdateLdap.md +4 -0
  10. data/docs/DynamicSecretUpdateRdp.md +4 -0
  11. data/docs/GatewayCreateProducerLdap.md +4 -0
  12. data/docs/GatewayCreateProducerRdp.md +4 -0
  13. data/docs/GatewayDetailsForItemReplyObj.md +24 -0
  14. data/docs/GatewayUpdateProducerLdap.md +4 -0
  15. data/docs/GatewayUpdateProducerRdp.md +4 -0
  16. data/docs/GatewayUpdateRemoteAccessDesktopApp.md +28 -0
  17. data/docs/Item.md +1 -1
  18. data/docs/RotatedSecretCreateLdap.md +4 -0
  19. data/docs/RotatedSecretCreateSsh.md +2 -0
  20. data/docs/RotatedSecretCreateWindows.md +4 -0
  21. data/docs/RotatedSecretUpdateLdap.md +4 -0
  22. data/docs/RotatedSecretUpdateSsh.md +2 -0
  23. data/docs/RotatedSecretUpdateWindows.md +4 -0
  24. data/docs/SecretInfo.md +2 -0
  25. data/docs/SecureRemoteAccess.md +2 -0
  26. data/docs/SraDesktopAppConf.md +22 -0
  27. data/docs/UscCreate.md +2 -0
  28. data/docs/UscList.md +2 -0
  29. data/docs/V2Api.md +63 -0
  30. data/lib/akeyless/api/v2_api.rb +64 -0
  31. data/lib/akeyless/models/bastion_config_reply_obj.rb +10 -10
  32. data/lib/akeyless/models/connect.rb +1 -1
  33. data/lib/akeyless/models/create_usc.rb +26 -4
  34. data/lib/akeyless/models/desktop_app_conf.rb +241 -0
  35. data/lib/akeyless/models/dynamic_secret_create_ldap.rb +21 -1
  36. data/lib/akeyless/models/dynamic_secret_create_rdp.rb +21 -1
  37. data/lib/akeyless/models/dynamic_secret_update_ldap.rb +21 -1
  38. data/lib/akeyless/models/dynamic_secret_update_rdp.rb +21 -1
  39. data/lib/akeyless/models/gateway_create_producer_ldap.rb +21 -1
  40. data/lib/akeyless/models/gateway_create_producer_rdp.rb +21 -1
  41. data/lib/akeyless/models/gateway_details_for_item_reply_obj.rb +241 -0
  42. data/lib/akeyless/models/gateway_update_producer_ldap.rb +21 -1
  43. data/lib/akeyless/models/gateway_update_producer_rdp.rb +21 -1
  44. data/lib/akeyless/models/gateway_update_remote_access_desktop_app.rb +265 -0
  45. data/lib/akeyless/models/item.rb +1 -1
  46. data/lib/akeyless/models/rotated_secret_create_ldap.rb +21 -1
  47. data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
  48. data/lib/akeyless/models/rotated_secret_create_windows.rb +21 -1
  49. data/lib/akeyless/models/rotated_secret_update_ldap.rb +21 -1
  50. data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
  51. data/lib/akeyless/models/rotated_secret_update_windows.rb +21 -1
  52. data/lib/akeyless/models/secret_info.rb +10 -1
  53. data/lib/akeyless/models/secure_remote_access.rb +10 -1
  54. data/lib/akeyless/models/sra_desktop_app_conf.rb +232 -0
  55. data/lib/akeyless/models/usc_create.rb +10 -1
  56. data/lib/akeyless/models/usc_list.rb +10 -1
  57. data/lib/akeyless/version.rb +1 -1
  58. data/lib/akeyless.rb +4 -1
  59. data/spec/models/desktop_app_conf_spec.rb +54 -0
  60. data/spec/models/gateway_details_for_item_reply_obj_spec.rb +54 -0
  61. data/spec/models/gateway_update_remote_access_desktop_app_spec.rb +66 -0
  62. data/spec/models/sra_desktop_app_conf_spec.rb +48 -0
  63. metadata +1070 -1054
@@ -0,0 +1,265 @@
1
+ =begin
2
+ #Akeyless API
3
+
4
+ #The purpose of this application is to provide access to Akeyless API.
5
+
6
+ The version of the OpenAPI document: 2.0
7
+ Contact: support@akeyless.io
8
+ Generated by: https://openapi-generator.tech
9
+ Generator version: 7.10.0
10
+
11
+ =end
12
+
13
+ require 'date'
14
+ require 'time'
15
+
16
+ module Akeyless
17
+ # gatewayUpdateRemoteAccessDesktopApp is a command that update remote access desktop app config
18
+ class GatewayUpdateRemoteAccessDesktopApp
19
+ attr_accessor :desktop_app_secure_web_access_url
20
+
21
+ attr_accessor :desktop_app_secure_web_proxy
22
+
23
+ attr_accessor :desktop_app_ssh_cert_issuer
24
+
25
+ # Set output format to JSON
26
+ attr_accessor :json
27
+
28
+ # Authentication token (see `/auth` and `/configure`)
29
+ attr_accessor :token
30
+
31
+ # The universal identity token, Required only for universal_identity authentication
32
+ attr_accessor :uid_token
33
+
34
+ # Attribute mapping from ruby-style variable name to JSON key.
35
+ def self.attribute_map
36
+ {
37
+ :'desktop_app_secure_web_access_url' => :'desktop-app-secure-web-access-url',
38
+ :'desktop_app_secure_web_proxy' => :'desktop-app-secure-web-proxy',
39
+ :'desktop_app_ssh_cert_issuer' => :'desktop-app-ssh-cert-issuer',
40
+ :'json' => :'json',
41
+ :'token' => :'token',
42
+ :'uid_token' => :'uid-token'
43
+ }
44
+ end
45
+
46
+ # Returns all the JSON keys this model knows about
47
+ def self.acceptable_attributes
48
+ attribute_map.values
49
+ end
50
+
51
+ # Attribute type mapping.
52
+ def self.openapi_types
53
+ {
54
+ :'desktop_app_secure_web_access_url' => :'String',
55
+ :'desktop_app_secure_web_proxy' => :'String',
56
+ :'desktop_app_ssh_cert_issuer' => :'String',
57
+ :'json' => :'Boolean',
58
+ :'token' => :'String',
59
+ :'uid_token' => :'String'
60
+ }
61
+ end
62
+
63
+ # List of attributes with nullable: true
64
+ def self.openapi_nullable
65
+ Set.new([
66
+ ])
67
+ end
68
+
69
+ # Initializes the object
70
+ # @param [Hash] attributes Model attributes in the form of hash
71
+ def initialize(attributes = {})
72
+ if (!attributes.is_a?(Hash))
73
+ fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayUpdateRemoteAccessDesktopApp` initialize method"
74
+ end
75
+
76
+ # check to see if the attribute exists and convert string to symbol for hash key
77
+ attributes = attributes.each_with_object({}) { |(k, v), h|
78
+ if (!self.class.attribute_map.key?(k.to_sym))
79
+ fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayUpdateRemoteAccessDesktopApp`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
80
+ end
81
+ h[k.to_sym] = v
82
+ }
83
+
84
+ if attributes.key?(:'desktop_app_secure_web_access_url')
85
+ self.desktop_app_secure_web_access_url = attributes[:'desktop_app_secure_web_access_url']
86
+ end
87
+
88
+ if attributes.key?(:'desktop_app_secure_web_proxy')
89
+ self.desktop_app_secure_web_proxy = attributes[:'desktop_app_secure_web_proxy']
90
+ end
91
+
92
+ if attributes.key?(:'desktop_app_ssh_cert_issuer')
93
+ self.desktop_app_ssh_cert_issuer = attributes[:'desktop_app_ssh_cert_issuer']
94
+ end
95
+
96
+ if attributes.key?(:'json')
97
+ self.json = attributes[:'json']
98
+ else
99
+ self.json = false
100
+ end
101
+
102
+ if attributes.key?(:'token')
103
+ self.token = attributes[:'token']
104
+ end
105
+
106
+ if attributes.key?(:'uid_token')
107
+ self.uid_token = attributes[:'uid_token']
108
+ end
109
+ end
110
+
111
+ # Show invalid properties with the reasons. Usually used together with valid?
112
+ # @return Array for valid properties with the reasons
113
+ def list_invalid_properties
114
+ warn '[DEPRECATED] the `list_invalid_properties` method is obsolete'
115
+ invalid_properties = Array.new
116
+ invalid_properties
117
+ end
118
+
119
+ # Check to see if the all the properties in the model are valid
120
+ # @return true if the model is valid
121
+ def valid?
122
+ warn '[DEPRECATED] the `valid?` method is obsolete'
123
+ true
124
+ end
125
+
126
+ # Checks equality by comparing each attribute.
127
+ # @param [Object] Object to be compared
128
+ def ==(o)
129
+ return true if self.equal?(o)
130
+ self.class == o.class &&
131
+ desktop_app_secure_web_access_url == o.desktop_app_secure_web_access_url &&
132
+ desktop_app_secure_web_proxy == o.desktop_app_secure_web_proxy &&
133
+ desktop_app_ssh_cert_issuer == o.desktop_app_ssh_cert_issuer &&
134
+ json == o.json &&
135
+ token == o.token &&
136
+ uid_token == o.uid_token
137
+ end
138
+
139
+ # @see the `==` method
140
+ # @param [Object] Object to be compared
141
+ def eql?(o)
142
+ self == o
143
+ end
144
+
145
+ # Calculates hash code according to all attributes.
146
+ # @return [Integer] Hash code
147
+ def hash
148
+ [desktop_app_secure_web_access_url, desktop_app_secure_web_proxy, desktop_app_ssh_cert_issuer, json, token, uid_token].hash
149
+ end
150
+
151
+ # Builds the object from hash
152
+ # @param [Hash] attributes Model attributes in the form of hash
153
+ # @return [Object] Returns the model itself
154
+ def self.build_from_hash(attributes)
155
+ return nil unless attributes.is_a?(Hash)
156
+ attributes = attributes.transform_keys(&:to_sym)
157
+ transformed_hash = {}
158
+ openapi_types.each_pair do |key, type|
159
+ if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil?
160
+ transformed_hash["#{key}"] = nil
161
+ elsif type =~ /\AArray<(.*)>/i
162
+ # check to ensure the input is an array given that the attribute
163
+ # is documented as an array but the input is not
164
+ if attributes[attribute_map[key]].is_a?(Array)
165
+ transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) }
166
+ end
167
+ elsif !attributes[attribute_map[key]].nil?
168
+ transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]])
169
+ end
170
+ end
171
+ new(transformed_hash)
172
+ end
173
+
174
+ # Deserializes the data based on type
175
+ # @param string type Data type
176
+ # @param string value Value to be deserialized
177
+ # @return [Object] Deserialized data
178
+ def self._deserialize(type, value)
179
+ case type.to_sym
180
+ when :Time
181
+ Time.parse(value)
182
+ when :Date
183
+ Date.parse(value)
184
+ when :String
185
+ value.to_s
186
+ when :Integer
187
+ value.to_i
188
+ when :Float
189
+ value.to_f
190
+ when :Boolean
191
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
192
+ true
193
+ else
194
+ false
195
+ end
196
+ when :Object
197
+ # generic object (usually a Hash), return directly
198
+ value
199
+ when /\AArray<(?<inner_type>.+)>\z/
200
+ inner_type = Regexp.last_match[:inner_type]
201
+ value.map { |v| _deserialize(inner_type, v) }
202
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
203
+ k_type = Regexp.last_match[:k_type]
204
+ v_type = Regexp.last_match[:v_type]
205
+ {}.tap do |hash|
206
+ value.each do |k, v|
207
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
208
+ end
209
+ end
210
+ else # model
211
+ # models (e.g. Pet) or oneOf
212
+ klass = Akeyless.const_get(type)
213
+ klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value)
214
+ end
215
+ end
216
+
217
+ # Returns the string representation of the object
218
+ # @return [String] String presentation of the object
219
+ def to_s
220
+ to_hash.to_s
221
+ end
222
+
223
+ # to_body is an alias to to_hash (backward compatibility)
224
+ # @return [Hash] Returns the object in the form of hash
225
+ def to_body
226
+ to_hash
227
+ end
228
+
229
+ # Returns the object in the form of hash
230
+ # @return [Hash] Returns the object in the form of hash
231
+ def to_hash
232
+ hash = {}
233
+ self.class.attribute_map.each_pair do |attr, param|
234
+ value = self.send(attr)
235
+ if value.nil?
236
+ is_nullable = self.class.openapi_nullable.include?(attr)
237
+ next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
238
+ end
239
+
240
+ hash[param] = _to_hash(value)
241
+ end
242
+ hash
243
+ end
244
+
245
+ # Outputs non-array value in the form of hash
246
+ # For object, use to_hash. Otherwise, just return the value
247
+ # @param [Object] value Any valid value
248
+ # @return [Hash] Returns the value in the form of hash
249
+ def _to_hash(value)
250
+ if value.is_a?(Array)
251
+ value.compact.map { |v| _to_hash(v) }
252
+ elsif value.is_a?(Hash)
253
+ {}.tap do |hash|
254
+ value.each { |k, v| hash[k] = _to_hash(v) }
255
+ end
256
+ elsif value.respond_to? :to_hash
257
+ value.to_hash
258
+ else
259
+ value
260
+ end
261
+ end
262
+
263
+ end
264
+
265
+ end
@@ -171,7 +171,7 @@ module Akeyless
171
171
  :'delete_protection' => :'Boolean',
172
172
  :'deletion_date' => :'Time',
173
173
  :'display_id' => :'String',
174
- :'gateway_details' => :'Array<GatewayBasicInfo>',
174
+ :'gateway_details' => :'Array<GatewayDetailsForItemReplyObj>',
175
175
  :'is_access_request_enabled' => :'Boolean',
176
176
  :'is_enabled' => :'Boolean',
177
177
  :'item_accessibility' => :'Integer',
@@ -68,6 +68,12 @@ module Akeyless
68
68
  # The rotator type. options: [target/ldap]
69
69
  attr_accessor :rotator_type
70
70
 
71
+ # Deprecated. use secure-access-certificate-issuer
72
+ attr_accessor :secure_access_bastion_issuer
73
+
74
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
75
+ attr_accessor :secure_access_certificate_issuer
76
+
71
77
  # Enable/Disable secure remote access [true/false]
72
78
  attr_accessor :secure_access_enable
73
79
 
@@ -131,6 +137,8 @@ module Akeyless
131
137
  :'rotation_hour' => :'rotation-hour',
132
138
  :'rotation_interval' => :'rotation-interval',
133
139
  :'rotator_type' => :'rotator-type',
140
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
141
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
134
142
  :'secure_access_enable' => :'secure-access-enable',
135
143
  :'secure_access_host' => :'secure-access-host',
136
144
  :'secure_access_rdp_domain' => :'secure-access-rdp-domain',
@@ -174,6 +182,8 @@ module Akeyless
174
182
  :'rotation_hour' => :'Integer',
175
183
  :'rotation_interval' => :'String',
176
184
  :'rotator_type' => :'String',
185
+ :'secure_access_bastion_issuer' => :'String',
186
+ :'secure_access_certificate_issuer' => :'String',
177
187
  :'secure_access_enable' => :'String',
178
188
  :'secure_access_host' => :'Array<String>',
179
189
  :'secure_access_rdp_domain' => :'String',
@@ -296,6 +306,14 @@ module Akeyless
296
306
  self.rotator_type = nil
297
307
  end
298
308
 
309
+ if attributes.key?(:'secure_access_bastion_issuer')
310
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
311
+ end
312
+
313
+ if attributes.key?(:'secure_access_certificate_issuer')
314
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
315
+ end
316
+
299
317
  if attributes.key?(:'secure_access_enable')
300
318
  self.secure_access_enable = attributes[:'secure_access_enable']
301
319
  end
@@ -422,6 +440,8 @@ module Akeyless
422
440
  rotation_hour == o.rotation_hour &&
423
441
  rotation_interval == o.rotation_interval &&
424
442
  rotator_type == o.rotator_type &&
443
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
444
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
425
445
  secure_access_enable == o.secure_access_enable &&
426
446
  secure_access_host == o.secure_access_host &&
427
447
  secure_access_rdp_domain == o.secure_access_rdp_domain &&
@@ -447,7 +467,7 @@ module Akeyless
447
467
  # Calculates hash code according to all attributes.
448
468
  # @return [Integer] Hash code
449
469
  def hash
450
- [provider_type, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target, target_name, token, uid_token, user_attribute, user_dn].hash
470
+ [provider_type, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target, target_name, token, uid_token, user_attribute, user_dn].hash
451
471
  end
452
472
 
453
473
  # Builds the object from hash
@@ -93,6 +93,9 @@ module Akeyless
93
93
  # Override the SSH username as indicated in SSH Certificate Issuer
94
94
  attr_accessor :secure_access_ssh_user
95
95
 
96
+ # Specify target type. Options are ssh or rdp
97
+ attr_accessor :secure_access_target_type
98
+
96
99
  # Add tags attached to this object
97
100
  attr_accessor :tags
98
101
 
@@ -134,6 +137,7 @@ module Akeyless
134
137
  :'secure_access_rdp_domain' => :'secure-access-rdp-domain',
135
138
  :'secure_access_rdp_user' => :'secure-access-rdp-user',
136
139
  :'secure_access_ssh_user' => :'secure-access-ssh-user',
140
+ :'secure_access_target_type' => :'secure-access-target-type',
137
141
  :'tags' => :'tags',
138
142
  :'target_name' => :'target-name',
139
143
  :'token' => :'token',
@@ -175,6 +179,7 @@ module Akeyless
175
179
  :'secure_access_rdp_domain' => :'String',
176
180
  :'secure_access_rdp_user' => :'String',
177
181
  :'secure_access_ssh_user' => :'String',
182
+ :'secure_access_target_type' => :'String',
178
183
  :'tags' => :'Array<String>',
179
184
  :'target_name' => :'String',
180
185
  :'token' => :'String',
@@ -323,6 +328,12 @@ module Akeyless
323
328
  self.secure_access_ssh_user = attributes[:'secure_access_ssh_user']
324
329
  end
325
330
 
331
+ if attributes.key?(:'secure_access_target_type')
332
+ self.secure_access_target_type = attributes[:'secure_access_target_type']
333
+ else
334
+ self.secure_access_target_type = 'false'
335
+ end
336
+
326
337
  if attributes.key?(:'tags')
327
338
  if (value = attributes[:'tags']).is_a?(Array)
328
339
  self.tags = value
@@ -405,6 +416,7 @@ module Akeyless
405
416
  secure_access_rdp_domain == o.secure_access_rdp_domain &&
406
417
  secure_access_rdp_user == o.secure_access_rdp_user &&
407
418
  secure_access_ssh_user == o.secure_access_ssh_user &&
419
+ secure_access_target_type == o.secure_access_target_type &&
408
420
  tags == o.tags &&
409
421
  target_name == o.target_name &&
410
422
  token == o.token &&
@@ -420,7 +432,7 @@ module Akeyless
420
432
  # Calculates hash code according to all attributes.
421
433
  # @return [Integer] Hash code
422
434
  def hash
423
- [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, tags, target_name, token, uid_token].hash
435
+ [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_target_type, tags, target_name, token, uid_token].hash
424
436
  end
425
437
 
426
438
  # Builds the object from hash
@@ -69,6 +69,12 @@ module Akeyless
69
69
  # Allow providing external user for a domain users
70
70
  attr_accessor :secure_access_allow_external_user
71
71
 
72
+ # Deprecated. use secure-access-certificate-issuer
73
+ attr_accessor :secure_access_bastion_issuer
74
+
75
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
76
+ attr_accessor :secure_access_certificate_issuer
77
+
72
78
  # Enable/Disable secure remote access [true/false]
73
79
  attr_accessor :secure_access_enable
74
80
 
@@ -114,6 +120,8 @@ module Akeyless
114
120
  :'rotator_type' => :'rotator-type',
115
121
  :'same_password' => :'same-password',
116
122
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
123
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
124
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
117
125
  :'secure_access_enable' => :'secure-access-enable',
118
126
  :'secure_access_host' => :'secure-access-host',
119
127
  :'secure_access_rdp_domain' => :'secure-access-rdp-domain',
@@ -151,6 +159,8 @@ module Akeyless
151
159
  :'rotator_type' => :'String',
152
160
  :'same_password' => :'String',
153
161
  :'secure_access_allow_external_user' => :'Boolean',
162
+ :'secure_access_bastion_issuer' => :'String',
163
+ :'secure_access_certificate_issuer' => :'String',
154
164
  :'secure_access_enable' => :'String',
155
165
  :'secure_access_host' => :'Array<String>',
156
166
  :'secure_access_rdp_domain' => :'String',
@@ -269,6 +279,14 @@ module Akeyless
269
279
  self.secure_access_allow_external_user = false
270
280
  end
271
281
 
282
+ if attributes.key?(:'secure_access_bastion_issuer')
283
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
284
+ end
285
+
286
+ if attributes.key?(:'secure_access_certificate_issuer')
287
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
288
+ end
289
+
272
290
  if attributes.key?(:'secure_access_enable')
273
291
  self.secure_access_enable = attributes[:'secure_access_enable']
274
292
  end
@@ -361,6 +379,8 @@ module Akeyless
361
379
  rotator_type == o.rotator_type &&
362
380
  same_password == o.same_password &&
363
381
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
382
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
383
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
364
384
  secure_access_enable == o.secure_access_enable &&
365
385
  secure_access_host == o.secure_access_host &&
366
386
  secure_access_rdp_domain == o.secure_access_rdp_domain &&
@@ -380,7 +400,7 @@ module Akeyless
380
400
  # Calculates hash code according to all attributes.
381
401
  # @return [Integer] Hash code
382
402
  def hash
383
- [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token].hash
403
+ [authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token].hash
384
404
  end
385
405
 
386
406
  # Builds the object from hash
@@ -77,6 +77,12 @@ module Akeyless
77
77
  # The number of days to wait between every automatic key rotation (1-365)
78
78
  attr_accessor :rotation_interval
79
79
 
80
+ # Deprecated. use secure-access-certificate-issuer
81
+ attr_accessor :secure_access_bastion_issuer
82
+
83
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
84
+ attr_accessor :secure_access_certificate_issuer
85
+
80
86
  # Enable/Disable secure remote access [true/false]
81
87
  attr_accessor :secure_access_enable
82
88
 
@@ -137,6 +143,8 @@ module Akeyless
137
143
  :'rotation_event_in' => :'rotation-event-in',
138
144
  :'rotation_hour' => :'rotation-hour',
139
145
  :'rotation_interval' => :'rotation-interval',
146
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
147
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
140
148
  :'secure_access_enable' => :'secure-access-enable',
141
149
  :'secure_access_host' => :'secure-access-host',
142
150
  :'secure_access_rdp_domain' => :'secure-access-rdp-domain',
@@ -181,6 +189,8 @@ module Akeyless
181
189
  :'rotation_event_in' => :'Array<String>',
182
190
  :'rotation_hour' => :'Integer',
183
191
  :'rotation_interval' => :'String',
192
+ :'secure_access_bastion_issuer' => :'String',
193
+ :'secure_access_certificate_issuer' => :'String',
184
194
  :'secure_access_enable' => :'String',
185
195
  :'secure_access_host' => :'Array<String>',
186
196
  :'secure_access_rdp_domain' => :'String',
@@ -317,6 +327,14 @@ module Akeyless
317
327
  self.rotation_interval = attributes[:'rotation_interval']
318
328
  end
319
329
 
330
+ if attributes.key?(:'secure_access_bastion_issuer')
331
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
332
+ end
333
+
334
+ if attributes.key?(:'secure_access_certificate_issuer')
335
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
336
+ end
337
+
320
338
  if attributes.key?(:'secure_access_enable')
321
339
  self.secure_access_enable = attributes[:'secure_access_enable']
322
340
  end
@@ -424,6 +442,8 @@ module Akeyless
424
442
  rotation_event_in == o.rotation_event_in &&
425
443
  rotation_hour == o.rotation_hour &&
426
444
  rotation_interval == o.rotation_interval &&
445
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
446
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
427
447
  secure_access_enable == o.secure_access_enable &&
428
448
  secure_access_host == o.secure_access_host &&
429
449
  secure_access_rdp_domain == o.secure_access_rdp_domain &&
@@ -447,7 +467,7 @@ module Akeyless
447
467
  # Calculates hash code according to all attributes.
448
468
  # @return [Integer] Hash code
449
469
  def hash
450
- [provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash
470
+ [provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash
451
471
  end
452
472
 
453
473
  # Builds the object from hash
@@ -105,6 +105,9 @@ module Akeyless
105
105
  # Override the SSH username as indicated in SSH Certificate Issuer
106
106
  attr_accessor :secure_access_ssh_user
107
107
 
108
+ # Specify target type. Options are ssh or rdp
109
+ attr_accessor :secure_access_target_type
110
+
108
111
  # Authentication token (see `/auth` and `/configure`)
109
112
  attr_accessor :token
110
113
 
@@ -144,6 +147,7 @@ module Akeyless
144
147
  :'secure_access_rdp_domain' => :'secure-access-rdp-domain',
145
148
  :'secure_access_rdp_user' => :'secure-access-rdp-user',
146
149
  :'secure_access_ssh_user' => :'secure-access-ssh-user',
150
+ :'secure_access_target_type' => :'secure-access-target-type',
147
151
  :'token' => :'token',
148
152
  :'uid_token' => :'uid-token'
149
153
  }
@@ -187,6 +191,7 @@ module Akeyless
187
191
  :'secure_access_rdp_domain' => :'String',
188
192
  :'secure_access_rdp_user' => :'String',
189
193
  :'secure_access_ssh_user' => :'String',
194
+ :'secure_access_target_type' => :'String',
190
195
  :'token' => :'String',
191
196
  :'uid_token' => :'String'
192
197
  }
@@ -355,6 +360,12 @@ module Akeyless
355
360
  self.secure_access_ssh_user = attributes[:'secure_access_ssh_user']
356
361
  end
357
362
 
363
+ if attributes.key?(:'secure_access_target_type')
364
+ self.secure_access_target_type = attributes[:'secure_access_target_type']
365
+ else
366
+ self.secure_access_target_type = 'false'
367
+ end
368
+
358
369
  if attributes.key?(:'token')
359
370
  self.token = attributes[:'token']
360
371
  end
@@ -424,6 +435,7 @@ module Akeyless
424
435
  secure_access_rdp_domain == o.secure_access_rdp_domain &&
425
436
  secure_access_rdp_user == o.secure_access_rdp_user &&
426
437
  secure_access_ssh_user == o.secure_access_ssh_user &&
438
+ secure_access_target_type == o.secure_access_target_type &&
427
439
  token == o.token &&
428
440
  uid_token == o.uid_token
429
441
  end
@@ -437,7 +449,7 @@ module Akeyless
437
449
  # Calculates hash code according to all attributes.
438
450
  # @return [Integer] Hash code
439
451
  def hash
440
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, token, uid_token].hash
452
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_target_type, token, uid_token].hash
441
453
  end
442
454
 
443
455
  # Builds the object from hash
@@ -81,6 +81,12 @@ module Akeyless
81
81
  # Allow providing external user for a domain users
82
82
  attr_accessor :secure_access_allow_external_user
83
83
 
84
+ # Deprecated. use secure-access-certificate-issuer
85
+ attr_accessor :secure_access_bastion_issuer
86
+
87
+ # Path to the SSH Certificate Issuer for your Akeyless Secure Access
88
+ attr_accessor :secure_access_certificate_issuer
89
+
84
90
  # Enable/Disable secure remote access [true/false]
85
91
  attr_accessor :secure_access_enable
86
92
 
@@ -124,6 +130,8 @@ module Akeyless
124
130
  :'rotator_type' => :'rotator-type',
125
131
  :'same_password' => :'same-password',
126
132
  :'secure_access_allow_external_user' => :'secure-access-allow-external-user',
133
+ :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
134
+ :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
127
135
  :'secure_access_enable' => :'secure-access-enable',
128
136
  :'secure_access_host' => :'secure-access-host',
129
137
  :'secure_access_rdp_domain' => :'secure-access-rdp-domain',
@@ -163,6 +171,8 @@ module Akeyless
163
171
  :'rotator_type' => :'String',
164
172
  :'same_password' => :'String',
165
173
  :'secure_access_allow_external_user' => :'Boolean',
174
+ :'secure_access_bastion_issuer' => :'String',
175
+ :'secure_access_certificate_issuer' => :'String',
166
176
  :'secure_access_enable' => :'String',
167
177
  :'secure_access_host' => :'Array<String>',
168
178
  :'secure_access_rdp_domain' => :'String',
@@ -301,6 +311,14 @@ module Akeyless
301
311
  self.secure_access_allow_external_user = false
302
312
  end
303
313
 
314
+ if attributes.key?(:'secure_access_bastion_issuer')
315
+ self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
316
+ end
317
+
318
+ if attributes.key?(:'secure_access_certificate_issuer')
319
+ self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
320
+ end
321
+
304
322
  if attributes.key?(:'secure_access_enable')
305
323
  self.secure_access_enable = attributes[:'secure_access_enable']
306
324
  end
@@ -380,6 +398,8 @@ module Akeyless
380
398
  rotator_type == o.rotator_type &&
381
399
  same_password == o.same_password &&
382
400
  secure_access_allow_external_user == o.secure_access_allow_external_user &&
401
+ secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
402
+ secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
383
403
  secure_access_enable == o.secure_access_enable &&
384
404
  secure_access_host == o.secure_access_host &&
385
405
  secure_access_rdp_domain == o.secure_access_rdp_domain &&
@@ -397,7 +417,7 @@ module Akeyless
397
417
  # Calculates hash code according to all attributes.
398
418
  # @return [Integer] Hash code
399
419
  def hash
400
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, token, uid_token].hash
420
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, token, uid_token].hash
401
421
  end
402
422
 
403
423
  # Builds the object from hash