akeyless 5.0.1 → 5.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +6 -2
- data/docs/BastionConfigReplyObj.md +2 -2
- data/docs/Connect.md +1 -1
- data/docs/CreateUSC.md +5 -1
- data/docs/DesktopAppConf.md +24 -0
- data/docs/DynamicSecretCreateLdap.md +4 -0
- data/docs/DynamicSecretCreateRdp.md +4 -0
- data/docs/DynamicSecretUpdateLdap.md +4 -0
- data/docs/DynamicSecretUpdateRdp.md +4 -0
- data/docs/GatewayCreateProducerLdap.md +4 -0
- data/docs/GatewayCreateProducerRdp.md +4 -0
- data/docs/GatewayDetailsForItemReplyObj.md +24 -0
- data/docs/GatewayUpdateProducerLdap.md +4 -0
- data/docs/GatewayUpdateProducerRdp.md +4 -0
- data/docs/GatewayUpdateRemoteAccessDesktopApp.md +28 -0
- data/docs/Item.md +1 -1
- data/docs/RotatedSecretCreateLdap.md +4 -0
- data/docs/RotatedSecretCreateSsh.md +2 -0
- data/docs/RotatedSecretCreateWindows.md +4 -0
- data/docs/RotatedSecretUpdateLdap.md +4 -0
- data/docs/RotatedSecretUpdateSsh.md +2 -0
- data/docs/RotatedSecretUpdateWindows.md +4 -0
- data/docs/SecretInfo.md +2 -0
- data/docs/SecureRemoteAccess.md +2 -0
- data/docs/SraDesktopAppConf.md +22 -0
- data/docs/UscCreate.md +2 -0
- data/docs/UscList.md +2 -0
- data/docs/V2Api.md +63 -0
- data/lib/akeyless/api/v2_api.rb +64 -0
- data/lib/akeyless/models/bastion_config_reply_obj.rb +10 -10
- data/lib/akeyless/models/connect.rb +1 -1
- data/lib/akeyless/models/create_usc.rb +26 -4
- data/lib/akeyless/models/desktop_app_conf.rb +241 -0
- data/lib/akeyless/models/dynamic_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_create_rdp.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_details_for_item_reply_obj.rb +241 -0
- data/lib/akeyless/models/gateway_update_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_update_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_update_remote_access_desktop_app.rb +265 -0
- data/lib/akeyless/models/item.rb +1 -1
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_windows.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_windows.rb +21 -1
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/secure_remote_access.rb +10 -1
- data/lib/akeyless/models/sra_desktop_app_conf.rb +232 -0
- data/lib/akeyless/models/usc_create.rb +10 -1
- data/lib/akeyless/models/usc_list.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +4 -1
- data/spec/models/desktop_app_conf_spec.rb +54 -0
- data/spec/models/gateway_details_for_item_reply_obj_spec.rb +54 -0
- data/spec/models/gateway_update_remote_access_desktop_app_spec.rb +66 -0
- data/spec/models/sra_desktop_app_conf_spec.rb +48 -0
- metadata +1070 -1054
@@ -0,0 +1,265 @@
|
|
1
|
+
=begin
|
2
|
+
#Akeyless API
|
3
|
+
|
4
|
+
#The purpose of this application is to provide access to Akeyless API.
|
5
|
+
|
6
|
+
The version of the OpenAPI document: 2.0
|
7
|
+
Contact: support@akeyless.io
|
8
|
+
Generated by: https://openapi-generator.tech
|
9
|
+
Generator version: 7.10.0
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
require 'time'
|
15
|
+
|
16
|
+
module Akeyless
|
17
|
+
# gatewayUpdateRemoteAccessDesktopApp is a command that update remote access desktop app config
|
18
|
+
class GatewayUpdateRemoteAccessDesktopApp
|
19
|
+
attr_accessor :desktop_app_secure_web_access_url
|
20
|
+
|
21
|
+
attr_accessor :desktop_app_secure_web_proxy
|
22
|
+
|
23
|
+
attr_accessor :desktop_app_ssh_cert_issuer
|
24
|
+
|
25
|
+
# Set output format to JSON
|
26
|
+
attr_accessor :json
|
27
|
+
|
28
|
+
# Authentication token (see `/auth` and `/configure`)
|
29
|
+
attr_accessor :token
|
30
|
+
|
31
|
+
# The universal identity token, Required only for universal_identity authentication
|
32
|
+
attr_accessor :uid_token
|
33
|
+
|
34
|
+
# Attribute mapping from ruby-style variable name to JSON key.
|
35
|
+
def self.attribute_map
|
36
|
+
{
|
37
|
+
:'desktop_app_secure_web_access_url' => :'desktop-app-secure-web-access-url',
|
38
|
+
:'desktop_app_secure_web_proxy' => :'desktop-app-secure-web-proxy',
|
39
|
+
:'desktop_app_ssh_cert_issuer' => :'desktop-app-ssh-cert-issuer',
|
40
|
+
:'json' => :'json',
|
41
|
+
:'token' => :'token',
|
42
|
+
:'uid_token' => :'uid-token'
|
43
|
+
}
|
44
|
+
end
|
45
|
+
|
46
|
+
# Returns all the JSON keys this model knows about
|
47
|
+
def self.acceptable_attributes
|
48
|
+
attribute_map.values
|
49
|
+
end
|
50
|
+
|
51
|
+
# Attribute type mapping.
|
52
|
+
def self.openapi_types
|
53
|
+
{
|
54
|
+
:'desktop_app_secure_web_access_url' => :'String',
|
55
|
+
:'desktop_app_secure_web_proxy' => :'String',
|
56
|
+
:'desktop_app_ssh_cert_issuer' => :'String',
|
57
|
+
:'json' => :'Boolean',
|
58
|
+
:'token' => :'String',
|
59
|
+
:'uid_token' => :'String'
|
60
|
+
}
|
61
|
+
end
|
62
|
+
|
63
|
+
# List of attributes with nullable: true
|
64
|
+
def self.openapi_nullable
|
65
|
+
Set.new([
|
66
|
+
])
|
67
|
+
end
|
68
|
+
|
69
|
+
# Initializes the object
|
70
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
71
|
+
def initialize(attributes = {})
|
72
|
+
if (!attributes.is_a?(Hash))
|
73
|
+
fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayUpdateRemoteAccessDesktopApp` initialize method"
|
74
|
+
end
|
75
|
+
|
76
|
+
# check to see if the attribute exists and convert string to symbol for hash key
|
77
|
+
attributes = attributes.each_with_object({}) { |(k, v), h|
|
78
|
+
if (!self.class.attribute_map.key?(k.to_sym))
|
79
|
+
fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayUpdateRemoteAccessDesktopApp`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
|
80
|
+
end
|
81
|
+
h[k.to_sym] = v
|
82
|
+
}
|
83
|
+
|
84
|
+
if attributes.key?(:'desktop_app_secure_web_access_url')
|
85
|
+
self.desktop_app_secure_web_access_url = attributes[:'desktop_app_secure_web_access_url']
|
86
|
+
end
|
87
|
+
|
88
|
+
if attributes.key?(:'desktop_app_secure_web_proxy')
|
89
|
+
self.desktop_app_secure_web_proxy = attributes[:'desktop_app_secure_web_proxy']
|
90
|
+
end
|
91
|
+
|
92
|
+
if attributes.key?(:'desktop_app_ssh_cert_issuer')
|
93
|
+
self.desktop_app_ssh_cert_issuer = attributes[:'desktop_app_ssh_cert_issuer']
|
94
|
+
end
|
95
|
+
|
96
|
+
if attributes.key?(:'json')
|
97
|
+
self.json = attributes[:'json']
|
98
|
+
else
|
99
|
+
self.json = false
|
100
|
+
end
|
101
|
+
|
102
|
+
if attributes.key?(:'token')
|
103
|
+
self.token = attributes[:'token']
|
104
|
+
end
|
105
|
+
|
106
|
+
if attributes.key?(:'uid_token')
|
107
|
+
self.uid_token = attributes[:'uid_token']
|
108
|
+
end
|
109
|
+
end
|
110
|
+
|
111
|
+
# Show invalid properties with the reasons. Usually used together with valid?
|
112
|
+
# @return Array for valid properties with the reasons
|
113
|
+
def list_invalid_properties
|
114
|
+
warn '[DEPRECATED] the `list_invalid_properties` method is obsolete'
|
115
|
+
invalid_properties = Array.new
|
116
|
+
invalid_properties
|
117
|
+
end
|
118
|
+
|
119
|
+
# Check to see if the all the properties in the model are valid
|
120
|
+
# @return true if the model is valid
|
121
|
+
def valid?
|
122
|
+
warn '[DEPRECATED] the `valid?` method is obsolete'
|
123
|
+
true
|
124
|
+
end
|
125
|
+
|
126
|
+
# Checks equality by comparing each attribute.
|
127
|
+
# @param [Object] Object to be compared
|
128
|
+
def ==(o)
|
129
|
+
return true if self.equal?(o)
|
130
|
+
self.class == o.class &&
|
131
|
+
desktop_app_secure_web_access_url == o.desktop_app_secure_web_access_url &&
|
132
|
+
desktop_app_secure_web_proxy == o.desktop_app_secure_web_proxy &&
|
133
|
+
desktop_app_ssh_cert_issuer == o.desktop_app_ssh_cert_issuer &&
|
134
|
+
json == o.json &&
|
135
|
+
token == o.token &&
|
136
|
+
uid_token == o.uid_token
|
137
|
+
end
|
138
|
+
|
139
|
+
# @see the `==` method
|
140
|
+
# @param [Object] Object to be compared
|
141
|
+
def eql?(o)
|
142
|
+
self == o
|
143
|
+
end
|
144
|
+
|
145
|
+
# Calculates hash code according to all attributes.
|
146
|
+
# @return [Integer] Hash code
|
147
|
+
def hash
|
148
|
+
[desktop_app_secure_web_access_url, desktop_app_secure_web_proxy, desktop_app_ssh_cert_issuer, json, token, uid_token].hash
|
149
|
+
end
|
150
|
+
|
151
|
+
# Builds the object from hash
|
152
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
153
|
+
# @return [Object] Returns the model itself
|
154
|
+
def self.build_from_hash(attributes)
|
155
|
+
return nil unless attributes.is_a?(Hash)
|
156
|
+
attributes = attributes.transform_keys(&:to_sym)
|
157
|
+
transformed_hash = {}
|
158
|
+
openapi_types.each_pair do |key, type|
|
159
|
+
if attributes.key?(attribute_map[key]) && attributes[attribute_map[key]].nil?
|
160
|
+
transformed_hash["#{key}"] = nil
|
161
|
+
elsif type =~ /\AArray<(.*)>/i
|
162
|
+
# check to ensure the input is an array given that the attribute
|
163
|
+
# is documented as an array but the input is not
|
164
|
+
if attributes[attribute_map[key]].is_a?(Array)
|
165
|
+
transformed_hash["#{key}"] = attributes[attribute_map[key]].map { |v| _deserialize($1, v) }
|
166
|
+
end
|
167
|
+
elsif !attributes[attribute_map[key]].nil?
|
168
|
+
transformed_hash["#{key}"] = _deserialize(type, attributes[attribute_map[key]])
|
169
|
+
end
|
170
|
+
end
|
171
|
+
new(transformed_hash)
|
172
|
+
end
|
173
|
+
|
174
|
+
# Deserializes the data based on type
|
175
|
+
# @param string type Data type
|
176
|
+
# @param string value Value to be deserialized
|
177
|
+
# @return [Object] Deserialized data
|
178
|
+
def self._deserialize(type, value)
|
179
|
+
case type.to_sym
|
180
|
+
when :Time
|
181
|
+
Time.parse(value)
|
182
|
+
when :Date
|
183
|
+
Date.parse(value)
|
184
|
+
when :String
|
185
|
+
value.to_s
|
186
|
+
when :Integer
|
187
|
+
value.to_i
|
188
|
+
when :Float
|
189
|
+
value.to_f
|
190
|
+
when :Boolean
|
191
|
+
if value.to_s =~ /\A(true|t|yes|y|1)\z/i
|
192
|
+
true
|
193
|
+
else
|
194
|
+
false
|
195
|
+
end
|
196
|
+
when :Object
|
197
|
+
# generic object (usually a Hash), return directly
|
198
|
+
value
|
199
|
+
when /\AArray<(?<inner_type>.+)>\z/
|
200
|
+
inner_type = Regexp.last_match[:inner_type]
|
201
|
+
value.map { |v| _deserialize(inner_type, v) }
|
202
|
+
when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
|
203
|
+
k_type = Regexp.last_match[:k_type]
|
204
|
+
v_type = Regexp.last_match[:v_type]
|
205
|
+
{}.tap do |hash|
|
206
|
+
value.each do |k, v|
|
207
|
+
hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
|
208
|
+
end
|
209
|
+
end
|
210
|
+
else # model
|
211
|
+
# models (e.g. Pet) or oneOf
|
212
|
+
klass = Akeyless.const_get(type)
|
213
|
+
klass.respond_to?(:openapi_any_of) || klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value)
|
214
|
+
end
|
215
|
+
end
|
216
|
+
|
217
|
+
# Returns the string representation of the object
|
218
|
+
# @return [String] String presentation of the object
|
219
|
+
def to_s
|
220
|
+
to_hash.to_s
|
221
|
+
end
|
222
|
+
|
223
|
+
# to_body is an alias to to_hash (backward compatibility)
|
224
|
+
# @return [Hash] Returns the object in the form of hash
|
225
|
+
def to_body
|
226
|
+
to_hash
|
227
|
+
end
|
228
|
+
|
229
|
+
# Returns the object in the form of hash
|
230
|
+
# @return [Hash] Returns the object in the form of hash
|
231
|
+
def to_hash
|
232
|
+
hash = {}
|
233
|
+
self.class.attribute_map.each_pair do |attr, param|
|
234
|
+
value = self.send(attr)
|
235
|
+
if value.nil?
|
236
|
+
is_nullable = self.class.openapi_nullable.include?(attr)
|
237
|
+
next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
|
238
|
+
end
|
239
|
+
|
240
|
+
hash[param] = _to_hash(value)
|
241
|
+
end
|
242
|
+
hash
|
243
|
+
end
|
244
|
+
|
245
|
+
# Outputs non-array value in the form of hash
|
246
|
+
# For object, use to_hash. Otherwise, just return the value
|
247
|
+
# @param [Object] value Any valid value
|
248
|
+
# @return [Hash] Returns the value in the form of hash
|
249
|
+
def _to_hash(value)
|
250
|
+
if value.is_a?(Array)
|
251
|
+
value.compact.map { |v| _to_hash(v) }
|
252
|
+
elsif value.is_a?(Hash)
|
253
|
+
{}.tap do |hash|
|
254
|
+
value.each { |k, v| hash[k] = _to_hash(v) }
|
255
|
+
end
|
256
|
+
elsif value.respond_to? :to_hash
|
257
|
+
value.to_hash
|
258
|
+
else
|
259
|
+
value
|
260
|
+
end
|
261
|
+
end
|
262
|
+
|
263
|
+
end
|
264
|
+
|
265
|
+
end
|
data/lib/akeyless/models/item.rb
CHANGED
@@ -171,7 +171,7 @@ module Akeyless
|
|
171
171
|
:'delete_protection' => :'Boolean',
|
172
172
|
:'deletion_date' => :'Time',
|
173
173
|
:'display_id' => :'String',
|
174
|
-
:'gateway_details' => :'Array<
|
174
|
+
:'gateway_details' => :'Array<GatewayDetailsForItemReplyObj>',
|
175
175
|
:'is_access_request_enabled' => :'Boolean',
|
176
176
|
:'is_enabled' => :'Boolean',
|
177
177
|
:'item_accessibility' => :'Integer',
|
@@ -68,6 +68,12 @@ module Akeyless
|
|
68
68
|
# The rotator type. options: [target/ldap]
|
69
69
|
attr_accessor :rotator_type
|
70
70
|
|
71
|
+
# Deprecated. use secure-access-certificate-issuer
|
72
|
+
attr_accessor :secure_access_bastion_issuer
|
73
|
+
|
74
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
75
|
+
attr_accessor :secure_access_certificate_issuer
|
76
|
+
|
71
77
|
# Enable/Disable secure remote access [true/false]
|
72
78
|
attr_accessor :secure_access_enable
|
73
79
|
|
@@ -131,6 +137,8 @@ module Akeyless
|
|
131
137
|
:'rotation_hour' => :'rotation-hour',
|
132
138
|
:'rotation_interval' => :'rotation-interval',
|
133
139
|
:'rotator_type' => :'rotator-type',
|
140
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
141
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
134
142
|
:'secure_access_enable' => :'secure-access-enable',
|
135
143
|
:'secure_access_host' => :'secure-access-host',
|
136
144
|
:'secure_access_rdp_domain' => :'secure-access-rdp-domain',
|
@@ -174,6 +182,8 @@ module Akeyless
|
|
174
182
|
:'rotation_hour' => :'Integer',
|
175
183
|
:'rotation_interval' => :'String',
|
176
184
|
:'rotator_type' => :'String',
|
185
|
+
:'secure_access_bastion_issuer' => :'String',
|
186
|
+
:'secure_access_certificate_issuer' => :'String',
|
177
187
|
:'secure_access_enable' => :'String',
|
178
188
|
:'secure_access_host' => :'Array<String>',
|
179
189
|
:'secure_access_rdp_domain' => :'String',
|
@@ -296,6 +306,14 @@ module Akeyless
|
|
296
306
|
self.rotator_type = nil
|
297
307
|
end
|
298
308
|
|
309
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
310
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
311
|
+
end
|
312
|
+
|
313
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
314
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
315
|
+
end
|
316
|
+
|
299
317
|
if attributes.key?(:'secure_access_enable')
|
300
318
|
self.secure_access_enable = attributes[:'secure_access_enable']
|
301
319
|
end
|
@@ -422,6 +440,8 @@ module Akeyless
|
|
422
440
|
rotation_hour == o.rotation_hour &&
|
423
441
|
rotation_interval == o.rotation_interval &&
|
424
442
|
rotator_type == o.rotator_type &&
|
443
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
444
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
425
445
|
secure_access_enable == o.secure_access_enable &&
|
426
446
|
secure_access_host == o.secure_access_host &&
|
427
447
|
secure_access_rdp_domain == o.secure_access_rdp_domain &&
|
@@ -447,7 +467,7 @@ module Akeyless
|
|
447
467
|
# Calculates hash code according to all attributes.
|
448
468
|
# @return [Integer] Hash code
|
449
469
|
def hash
|
450
|
-
[provider_type, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target, target_name, token, uid_token, user_attribute, user_dn].hash
|
470
|
+
[provider_type, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target, target_name, token, uid_token, user_attribute, user_dn].hash
|
451
471
|
end
|
452
472
|
|
453
473
|
# Builds the object from hash
|
@@ -93,6 +93,9 @@ module Akeyless
|
|
93
93
|
# Override the SSH username as indicated in SSH Certificate Issuer
|
94
94
|
attr_accessor :secure_access_ssh_user
|
95
95
|
|
96
|
+
# Specify target type. Options are ssh or rdp
|
97
|
+
attr_accessor :secure_access_target_type
|
98
|
+
|
96
99
|
# Add tags attached to this object
|
97
100
|
attr_accessor :tags
|
98
101
|
|
@@ -134,6 +137,7 @@ module Akeyless
|
|
134
137
|
:'secure_access_rdp_domain' => :'secure-access-rdp-domain',
|
135
138
|
:'secure_access_rdp_user' => :'secure-access-rdp-user',
|
136
139
|
:'secure_access_ssh_user' => :'secure-access-ssh-user',
|
140
|
+
:'secure_access_target_type' => :'secure-access-target-type',
|
137
141
|
:'tags' => :'tags',
|
138
142
|
:'target_name' => :'target-name',
|
139
143
|
:'token' => :'token',
|
@@ -175,6 +179,7 @@ module Akeyless
|
|
175
179
|
:'secure_access_rdp_domain' => :'String',
|
176
180
|
:'secure_access_rdp_user' => :'String',
|
177
181
|
:'secure_access_ssh_user' => :'String',
|
182
|
+
:'secure_access_target_type' => :'String',
|
178
183
|
:'tags' => :'Array<String>',
|
179
184
|
:'target_name' => :'String',
|
180
185
|
:'token' => :'String',
|
@@ -323,6 +328,12 @@ module Akeyless
|
|
323
328
|
self.secure_access_ssh_user = attributes[:'secure_access_ssh_user']
|
324
329
|
end
|
325
330
|
|
331
|
+
if attributes.key?(:'secure_access_target_type')
|
332
|
+
self.secure_access_target_type = attributes[:'secure_access_target_type']
|
333
|
+
else
|
334
|
+
self.secure_access_target_type = 'false'
|
335
|
+
end
|
336
|
+
|
326
337
|
if attributes.key?(:'tags')
|
327
338
|
if (value = attributes[:'tags']).is_a?(Array)
|
328
339
|
self.tags = value
|
@@ -405,6 +416,7 @@ module Akeyless
|
|
405
416
|
secure_access_rdp_domain == o.secure_access_rdp_domain &&
|
406
417
|
secure_access_rdp_user == o.secure_access_rdp_user &&
|
407
418
|
secure_access_ssh_user == o.secure_access_ssh_user &&
|
419
|
+
secure_access_target_type == o.secure_access_target_type &&
|
408
420
|
tags == o.tags &&
|
409
421
|
target_name == o.target_name &&
|
410
422
|
token == o.token &&
|
@@ -420,7 +432,7 @@ module Akeyless
|
|
420
432
|
# Calculates hash code according to all attributes.
|
421
433
|
# @return [Integer] Hash code
|
422
434
|
def hash
|
423
|
-
[authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, tags, target_name, token, uid_token].hash
|
435
|
+
[authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_target_type, tags, target_name, token, uid_token].hash
|
424
436
|
end
|
425
437
|
|
426
438
|
# Builds the object from hash
|
@@ -69,6 +69,12 @@ module Akeyless
|
|
69
69
|
# Allow providing external user for a domain users
|
70
70
|
attr_accessor :secure_access_allow_external_user
|
71
71
|
|
72
|
+
# Deprecated. use secure-access-certificate-issuer
|
73
|
+
attr_accessor :secure_access_bastion_issuer
|
74
|
+
|
75
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
76
|
+
attr_accessor :secure_access_certificate_issuer
|
77
|
+
|
72
78
|
# Enable/Disable secure remote access [true/false]
|
73
79
|
attr_accessor :secure_access_enable
|
74
80
|
|
@@ -114,6 +120,8 @@ module Akeyless
|
|
114
120
|
:'rotator_type' => :'rotator-type',
|
115
121
|
:'same_password' => :'same-password',
|
116
122
|
:'secure_access_allow_external_user' => :'secure-access-allow-external-user',
|
123
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
124
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
117
125
|
:'secure_access_enable' => :'secure-access-enable',
|
118
126
|
:'secure_access_host' => :'secure-access-host',
|
119
127
|
:'secure_access_rdp_domain' => :'secure-access-rdp-domain',
|
@@ -151,6 +159,8 @@ module Akeyless
|
|
151
159
|
:'rotator_type' => :'String',
|
152
160
|
:'same_password' => :'String',
|
153
161
|
:'secure_access_allow_external_user' => :'Boolean',
|
162
|
+
:'secure_access_bastion_issuer' => :'String',
|
163
|
+
:'secure_access_certificate_issuer' => :'String',
|
154
164
|
:'secure_access_enable' => :'String',
|
155
165
|
:'secure_access_host' => :'Array<String>',
|
156
166
|
:'secure_access_rdp_domain' => :'String',
|
@@ -269,6 +279,14 @@ module Akeyless
|
|
269
279
|
self.secure_access_allow_external_user = false
|
270
280
|
end
|
271
281
|
|
282
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
283
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
284
|
+
end
|
285
|
+
|
286
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
287
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
288
|
+
end
|
289
|
+
|
272
290
|
if attributes.key?(:'secure_access_enable')
|
273
291
|
self.secure_access_enable = attributes[:'secure_access_enable']
|
274
292
|
end
|
@@ -361,6 +379,8 @@ module Akeyless
|
|
361
379
|
rotator_type == o.rotator_type &&
|
362
380
|
same_password == o.same_password &&
|
363
381
|
secure_access_allow_external_user == o.secure_access_allow_external_user &&
|
382
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
383
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
364
384
|
secure_access_enable == o.secure_access_enable &&
|
365
385
|
secure_access_host == o.secure_access_host &&
|
366
386
|
secure_access_rdp_domain == o.secure_access_rdp_domain &&
|
@@ -380,7 +400,7 @@ module Akeyless
|
|
380
400
|
# Calculates hash code according to all attributes.
|
381
401
|
# @return [Integer] Hash code
|
382
402
|
def hash
|
383
|
-
[authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token].hash
|
403
|
+
[authentication_credentials, auto_rotate, delete_protection, description, json, key, max_versions, name, password_length, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, tags, target_name, token, uid_token].hash
|
384
404
|
end
|
385
405
|
|
386
406
|
# Builds the object from hash
|
@@ -77,6 +77,12 @@ module Akeyless
|
|
77
77
|
# The number of days to wait between every automatic key rotation (1-365)
|
78
78
|
attr_accessor :rotation_interval
|
79
79
|
|
80
|
+
# Deprecated. use secure-access-certificate-issuer
|
81
|
+
attr_accessor :secure_access_bastion_issuer
|
82
|
+
|
83
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
84
|
+
attr_accessor :secure_access_certificate_issuer
|
85
|
+
|
80
86
|
# Enable/Disable secure remote access [true/false]
|
81
87
|
attr_accessor :secure_access_enable
|
82
88
|
|
@@ -137,6 +143,8 @@ module Akeyless
|
|
137
143
|
:'rotation_event_in' => :'rotation-event-in',
|
138
144
|
:'rotation_hour' => :'rotation-hour',
|
139
145
|
:'rotation_interval' => :'rotation-interval',
|
146
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
147
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
140
148
|
:'secure_access_enable' => :'secure-access-enable',
|
141
149
|
:'secure_access_host' => :'secure-access-host',
|
142
150
|
:'secure_access_rdp_domain' => :'secure-access-rdp-domain',
|
@@ -181,6 +189,8 @@ module Akeyless
|
|
181
189
|
:'rotation_event_in' => :'Array<String>',
|
182
190
|
:'rotation_hour' => :'Integer',
|
183
191
|
:'rotation_interval' => :'String',
|
192
|
+
:'secure_access_bastion_issuer' => :'String',
|
193
|
+
:'secure_access_certificate_issuer' => :'String',
|
184
194
|
:'secure_access_enable' => :'String',
|
185
195
|
:'secure_access_host' => :'Array<String>',
|
186
196
|
:'secure_access_rdp_domain' => :'String',
|
@@ -317,6 +327,14 @@ module Akeyless
|
|
317
327
|
self.rotation_interval = attributes[:'rotation_interval']
|
318
328
|
end
|
319
329
|
|
330
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
331
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
332
|
+
end
|
333
|
+
|
334
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
335
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
336
|
+
end
|
337
|
+
|
320
338
|
if attributes.key?(:'secure_access_enable')
|
321
339
|
self.secure_access_enable = attributes[:'secure_access_enable']
|
322
340
|
end
|
@@ -424,6 +442,8 @@ module Akeyless
|
|
424
442
|
rotation_event_in == o.rotation_event_in &&
|
425
443
|
rotation_hour == o.rotation_hour &&
|
426
444
|
rotation_interval == o.rotation_interval &&
|
445
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
446
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
427
447
|
secure_access_enable == o.secure_access_enable &&
|
428
448
|
secure_access_host == o.secure_access_host &&
|
429
449
|
secure_access_rdp_domain == o.secure_access_rdp_domain &&
|
@@ -447,7 +467,7 @@ module Akeyless
|
|
447
467
|
# Calculates hash code according to all attributes.
|
448
468
|
# @return [Integer] Hash code
|
449
469
|
def hash
|
450
|
-
[provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash
|
470
|
+
[provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash
|
451
471
|
end
|
452
472
|
|
453
473
|
# Builds the object from hash
|
@@ -105,6 +105,9 @@ module Akeyless
|
|
105
105
|
# Override the SSH username as indicated in SSH Certificate Issuer
|
106
106
|
attr_accessor :secure_access_ssh_user
|
107
107
|
|
108
|
+
# Specify target type. Options are ssh or rdp
|
109
|
+
attr_accessor :secure_access_target_type
|
110
|
+
|
108
111
|
# Authentication token (see `/auth` and `/configure`)
|
109
112
|
attr_accessor :token
|
110
113
|
|
@@ -144,6 +147,7 @@ module Akeyless
|
|
144
147
|
:'secure_access_rdp_domain' => :'secure-access-rdp-domain',
|
145
148
|
:'secure_access_rdp_user' => :'secure-access-rdp-user',
|
146
149
|
:'secure_access_ssh_user' => :'secure-access-ssh-user',
|
150
|
+
:'secure_access_target_type' => :'secure-access-target-type',
|
147
151
|
:'token' => :'token',
|
148
152
|
:'uid_token' => :'uid-token'
|
149
153
|
}
|
@@ -187,6 +191,7 @@ module Akeyless
|
|
187
191
|
:'secure_access_rdp_domain' => :'String',
|
188
192
|
:'secure_access_rdp_user' => :'String',
|
189
193
|
:'secure_access_ssh_user' => :'String',
|
194
|
+
:'secure_access_target_type' => :'String',
|
190
195
|
:'token' => :'String',
|
191
196
|
:'uid_token' => :'String'
|
192
197
|
}
|
@@ -355,6 +360,12 @@ module Akeyless
|
|
355
360
|
self.secure_access_ssh_user = attributes[:'secure_access_ssh_user']
|
356
361
|
end
|
357
362
|
|
363
|
+
if attributes.key?(:'secure_access_target_type')
|
364
|
+
self.secure_access_target_type = attributes[:'secure_access_target_type']
|
365
|
+
else
|
366
|
+
self.secure_access_target_type = 'false'
|
367
|
+
end
|
368
|
+
|
358
369
|
if attributes.key?(:'token')
|
359
370
|
self.token = attributes[:'token']
|
360
371
|
end
|
@@ -424,6 +435,7 @@ module Akeyless
|
|
424
435
|
secure_access_rdp_domain == o.secure_access_rdp_domain &&
|
425
436
|
secure_access_rdp_user == o.secure_access_rdp_user &&
|
426
437
|
secure_access_ssh_user == o.secure_access_ssh_user &&
|
438
|
+
secure_access_target_type == o.secure_access_target_type &&
|
427
439
|
token == o.token &&
|
428
440
|
uid_token == o.uid_token
|
429
441
|
end
|
@@ -437,7 +449,7 @@ module Akeyless
|
|
437
449
|
# Calculates hash code according to all attributes.
|
438
450
|
# @return [Integer] Hash code
|
439
451
|
def hash
|
440
|
-
[add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, token, uid_token].hash
|
452
|
+
[add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_target_type, token, uid_token].hash
|
441
453
|
end
|
442
454
|
|
443
455
|
# Builds the object from hash
|
@@ -81,6 +81,12 @@ module Akeyless
|
|
81
81
|
# Allow providing external user for a domain users
|
82
82
|
attr_accessor :secure_access_allow_external_user
|
83
83
|
|
84
|
+
# Deprecated. use secure-access-certificate-issuer
|
85
|
+
attr_accessor :secure_access_bastion_issuer
|
86
|
+
|
87
|
+
# Path to the SSH Certificate Issuer for your Akeyless Secure Access
|
88
|
+
attr_accessor :secure_access_certificate_issuer
|
89
|
+
|
84
90
|
# Enable/Disable secure remote access [true/false]
|
85
91
|
attr_accessor :secure_access_enable
|
86
92
|
|
@@ -124,6 +130,8 @@ module Akeyless
|
|
124
130
|
:'rotator_type' => :'rotator-type',
|
125
131
|
:'same_password' => :'same-password',
|
126
132
|
:'secure_access_allow_external_user' => :'secure-access-allow-external-user',
|
133
|
+
:'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
|
134
|
+
:'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
|
127
135
|
:'secure_access_enable' => :'secure-access-enable',
|
128
136
|
:'secure_access_host' => :'secure-access-host',
|
129
137
|
:'secure_access_rdp_domain' => :'secure-access-rdp-domain',
|
@@ -163,6 +171,8 @@ module Akeyless
|
|
163
171
|
:'rotator_type' => :'String',
|
164
172
|
:'same_password' => :'String',
|
165
173
|
:'secure_access_allow_external_user' => :'Boolean',
|
174
|
+
:'secure_access_bastion_issuer' => :'String',
|
175
|
+
:'secure_access_certificate_issuer' => :'String',
|
166
176
|
:'secure_access_enable' => :'String',
|
167
177
|
:'secure_access_host' => :'Array<String>',
|
168
178
|
:'secure_access_rdp_domain' => :'String',
|
@@ -301,6 +311,14 @@ module Akeyless
|
|
301
311
|
self.secure_access_allow_external_user = false
|
302
312
|
end
|
303
313
|
|
314
|
+
if attributes.key?(:'secure_access_bastion_issuer')
|
315
|
+
self.secure_access_bastion_issuer = attributes[:'secure_access_bastion_issuer']
|
316
|
+
end
|
317
|
+
|
318
|
+
if attributes.key?(:'secure_access_certificate_issuer')
|
319
|
+
self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
|
320
|
+
end
|
321
|
+
|
304
322
|
if attributes.key?(:'secure_access_enable')
|
305
323
|
self.secure_access_enable = attributes[:'secure_access_enable']
|
306
324
|
end
|
@@ -380,6 +398,8 @@ module Akeyless
|
|
380
398
|
rotator_type == o.rotator_type &&
|
381
399
|
same_password == o.same_password &&
|
382
400
|
secure_access_allow_external_user == o.secure_access_allow_external_user &&
|
401
|
+
secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
|
402
|
+
secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
|
383
403
|
secure_access_enable == o.secure_access_enable &&
|
384
404
|
secure_access_host == o.secure_access_host &&
|
385
405
|
secure_access_rdp_domain == o.secure_access_rdp_domain &&
|
@@ -397,7 +417,7 @@ module Akeyless
|
|
397
417
|
# Calculates hash code according to all attributes.
|
398
418
|
# @return [Integer] Hash code
|
399
419
|
def hash
|
400
|
-
[add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, token, uid_token].hash
|
420
|
+
[add_tag, authentication_credentials, auto_rotate, delete_protection, description, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, token, uid_token].hash
|
401
421
|
end
|
402
422
|
|
403
423
|
# Builds the object from hash
|