akeyless 5.0.16 → 5.0.18
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +5 -1
- data/docs/AccountGeneralSettings.md +2 -0
- data/docs/AuthMethodCreateApiKey.md +1 -1
- data/docs/AuthMethodCreateAwsIam.md +1 -1
- data/docs/AuthMethodCreateAzureAD.md +1 -1
- data/docs/AuthMethodCreateCert.md +1 -1
- data/docs/AuthMethodCreateEmail.md +1 -1
- data/docs/AuthMethodCreateGcp.md +1 -1
- data/docs/AuthMethodCreateK8s.md +1 -1
- data/docs/AuthMethodCreateKerberos.md +1 -1
- data/docs/AuthMethodCreateLdap.md +1 -1
- data/docs/AuthMethodCreateOCI.md +1 -1
- data/docs/AuthMethodCreateOIDC.md +1 -1
- data/docs/AuthMethodCreateOauth2.md +1 -1
- data/docs/AuthMethodCreateSAML.md +1 -1
- data/docs/AuthMethodCreateUniversalIdentity.md +1 -1
- data/docs/AuthMethodUpdateApiKey.md +1 -1
- data/docs/AuthMethodUpdateAwsIam.md +1 -1
- data/docs/AuthMethodUpdateAzureAD.md +1 -1
- data/docs/AuthMethodUpdateCert.md +1 -1
- data/docs/AuthMethodUpdateEmail.md +1 -1
- data/docs/AuthMethodUpdateGcp.md +1 -1
- data/docs/AuthMethodUpdateK8s.md +1 -1
- data/docs/AuthMethodUpdateKerberos.md +1 -1
- data/docs/AuthMethodUpdateLdap.md +1 -1
- data/docs/AuthMethodUpdateOCI.md +1 -1
- data/docs/AuthMethodUpdateOIDC.md +1 -1
- data/docs/AuthMethodUpdateOauth2.md +1 -1
- data/docs/AuthMethodUpdateSAML.md +1 -1
- data/docs/AuthMethodUpdateUniversalIdentity.md +1 -1
- data/docs/CreateAuthMethod.md +1 -1
- data/docs/CreateAuthMethodAWSIAM.md +1 -1
- data/docs/CreateAuthMethodAzureAD.md +1 -1
- data/docs/CreateAuthMethodCert.md +1 -1
- data/docs/CreateAuthMethodEmail.md +1 -1
- data/docs/CreateAuthMethodGCP.md +1 -1
- data/docs/CreateAuthMethodHuawei.md +1 -1
- data/docs/CreateAuthMethodK8S.md +1 -1
- data/docs/CreateAuthMethodLDAP.md +1 -1
- data/docs/CreateAuthMethodOAuth2.md +1 -1
- data/docs/CreateAuthMethodOCI.md +1 -1
- data/docs/CreateAuthMethodOIDC.md +1 -1
- data/docs/CreateAuthMethodSAML.md +1 -1
- data/docs/CreateAuthMethodUniversalIdentity.md +1 -1
- data/docs/CreatePKICertIssuer.md +3 -3
- data/docs/ItemUSCSyncAssociation.md +2 -0
- data/docs/ListItems.md +2 -0
- data/docs/RotatedSecretCreateOpenAI.md +56 -0
- data/docs/RotatedSecretCreateSsh.md +1 -1
- data/docs/RotatedSecretDeleteSync.md +2 -0
- data/docs/RotatedSecretSync.md +2 -0
- data/docs/RotatedSecretUpdateOpenAI.md +58 -0
- data/docs/RotatedSecretUpdateSsh.md +1 -1
- data/docs/StaticSecretDeleteSync.md +2 -0
- data/docs/StaticSecretSync.md +2 -0
- data/docs/UpdateAccountSettings.md +2 -2
- data/docs/UpdateAuthMethod.md +1 -1
- data/docs/UpdateAuthMethodAWSIAM.md +1 -1
- data/docs/UpdateAuthMethodAzureAD.md +1 -1
- data/docs/UpdateAuthMethodCert.md +1 -1
- data/docs/UpdateAuthMethodGCP.md +1 -1
- data/docs/UpdateAuthMethodK8S.md +1 -1
- data/docs/UpdateAuthMethodLDAP.md +1 -1
- data/docs/UpdateAuthMethodOAuth2.md +1 -1
- data/docs/UpdateAuthMethodOCI.md +1 -1
- data/docs/UpdateAuthMethodOIDC.md +1 -1
- data/docs/UpdateAuthMethodSAML.md +1 -1
- data/docs/UpdateAuthMethodUniversalIdentity.md +1 -1
- data/docs/UpdatePKICertIssuer.md +3 -3
- data/docs/UscSyncInfo.md +2 -0
- data/docs/V2Api.md +126 -0
- data/lib/akeyless/api/v2_api.rb +128 -0
- data/lib/akeyless/models/account_general_settings.rb +10 -1
- data/lib/akeyless/models/auth_method_create_api_key.rb +1 -0
- data/lib/akeyless/models/auth_method_create_aws_iam.rb +1 -0
- data/lib/akeyless/models/auth_method_create_azure_ad.rb +1 -0
- data/lib/akeyless/models/auth_method_create_cert.rb +1 -0
- data/lib/akeyless/models/auth_method_create_email.rb +1 -0
- data/lib/akeyless/models/auth_method_create_gcp.rb +1 -0
- data/lib/akeyless/models/auth_method_create_k8s.rb +1 -0
- data/lib/akeyless/models/auth_method_create_kerberos.rb +1 -0
- data/lib/akeyless/models/auth_method_create_ldap.rb +1 -0
- data/lib/akeyless/models/auth_method_create_oauth2.rb +1 -0
- data/lib/akeyless/models/auth_method_create_oci.rb +1 -0
- data/lib/akeyless/models/auth_method_create_oidc.rb +1 -0
- data/lib/akeyless/models/auth_method_create_saml.rb +1 -0
- data/lib/akeyless/models/auth_method_create_universal_identity.rb +1 -0
- data/lib/akeyless/models/auth_method_update_api_key.rb +1 -0
- data/lib/akeyless/models/auth_method_update_aws_iam.rb +1 -0
- data/lib/akeyless/models/auth_method_update_azure_ad.rb +1 -0
- data/lib/akeyless/models/auth_method_update_cert.rb +1 -0
- data/lib/akeyless/models/auth_method_update_email.rb +1 -0
- data/lib/akeyless/models/auth_method_update_gcp.rb +1 -0
- data/lib/akeyless/models/auth_method_update_k8s.rb +1 -0
- data/lib/akeyless/models/auth_method_update_kerberos.rb +1 -0
- data/lib/akeyless/models/auth_method_update_ldap.rb +1 -0
- data/lib/akeyless/models/auth_method_update_oauth2.rb +1 -0
- data/lib/akeyless/models/auth_method_update_oci.rb +1 -0
- data/lib/akeyless/models/auth_method_update_oidc.rb +1 -0
- data/lib/akeyless/models/auth_method_update_saml.rb +1 -0
- data/lib/akeyless/models/auth_method_update_universal_identity.rb +1 -0
- data/lib/akeyless/models/create_auth_method.rb +1 -0
- data/lib/akeyless/models/create_auth_method_awsiam.rb +1 -0
- data/lib/akeyless/models/create_auth_method_azure_ad.rb +1 -0
- data/lib/akeyless/models/create_auth_method_cert.rb +1 -0
- data/lib/akeyless/models/create_auth_method_email.rb +1 -0
- data/lib/akeyless/models/create_auth_method_gcp.rb +1 -0
- data/lib/akeyless/models/create_auth_method_huawei.rb +1 -0
- data/lib/akeyless/models/create_auth_method_k8_s.rb +1 -0
- data/lib/akeyless/models/create_auth_method_ldap.rb +1 -0
- data/lib/akeyless/models/create_auth_method_o_auth2.rb +1 -0
- data/lib/akeyless/models/create_auth_method_oci.rb +1 -0
- data/lib/akeyless/models/create_auth_method_oidc.rb +1 -0
- data/lib/akeyless/models/create_auth_method_saml.rb +1 -0
- data/lib/akeyless/models/create_auth_method_universal_identity.rb +1 -0
- data/lib/akeyless/models/create_pki_cert_issuer.rb +3 -0
- data/lib/akeyless/models/item_usc_sync_association.rb +10 -1
- data/lib/akeyless/models/list_items.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_open_ai.rb +437 -0
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +1 -1
- data/lib/akeyless/models/rotated_secret_delete_sync.rb +13 -1
- data/lib/akeyless/models/rotated_secret_sync.rb +11 -1
- data/lib/akeyless/models/rotated_secret_update_open_ai.rb +437 -0
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +1 -1
- data/lib/akeyless/models/static_secret_delete_sync.rb +13 -1
- data/lib/akeyless/models/static_secret_sync.rb +11 -1
- data/lib/akeyless/models/update_account_settings.rb +2 -0
- data/lib/akeyless/models/update_auth_method.rb +1 -0
- data/lib/akeyless/models/update_auth_method_awsiam.rb +1 -0
- data/lib/akeyless/models/update_auth_method_azure_ad.rb +1 -0
- data/lib/akeyless/models/update_auth_method_cert.rb +1 -0
- data/lib/akeyless/models/update_auth_method_gcp.rb +1 -0
- data/lib/akeyless/models/update_auth_method_k8_s.rb +1 -0
- data/lib/akeyless/models/update_auth_method_ldap.rb +1 -0
- data/lib/akeyless/models/update_auth_method_o_auth2.rb +1 -0
- data/lib/akeyless/models/update_auth_method_oci.rb +1 -0
- data/lib/akeyless/models/update_auth_method_oidc.rb +1 -0
- data/lib/akeyless/models/update_auth_method_saml.rb +1 -0
- data/lib/akeyless/models/update_auth_method_universal_identity.rb +1 -0
- data/lib/akeyless/models/update_pki_cert_issuer.rb +3 -0
- data/lib/akeyless/models/usc_sync_info.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +2 -0
- data/spec/models/rotated_secret_create_open_ai_spec.rb +150 -0
- data/spec/models/rotated_secret_update_open_ai_spec.rb +156 -0
- metadata +9 -1
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
# Akeyless::RotatedSecretCreateOpenAI
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **api_key** | **String** | Admin API key value to rotate (relevant only for rotator-type=api-key) | [optional] |
|
|
8
|
+
| **api_key_id** | **String** | Admin API key ID to rotate (relevant only for rotator-type=api-key) | [optional] |
|
|
9
|
+
| **authentication_credentials** | **String** | The credentials to connect with use-user-creds/use-target-creds | [optional][default to 'use-user-creds'] |
|
|
10
|
+
| **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] |
|
|
11
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
12
|
+
| **description** | **String** | Description of the object | [optional] |
|
|
13
|
+
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
14
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
15
|
+
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
|
+
| **name** | **String** | Rotated secret name | |
|
|
18
|
+
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
20
|
+
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
21
|
+
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
22
|
+
| **rotator_type** | **String** | The rotator type. options: [target/api-key] | |
|
|
23
|
+
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
|
24
|
+
| **target_name** | **String** | Target name | |
|
|
25
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
26
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
27
|
+
|
|
28
|
+
## Example
|
|
29
|
+
|
|
30
|
+
```ruby
|
|
31
|
+
require 'akeyless'
|
|
32
|
+
|
|
33
|
+
instance = Akeyless::RotatedSecretCreateOpenAI.new(
|
|
34
|
+
api_key: null,
|
|
35
|
+
api_key_id: null,
|
|
36
|
+
authentication_credentials: null,
|
|
37
|
+
auto_rotate: null,
|
|
38
|
+
delete_protection: null,
|
|
39
|
+
description: null,
|
|
40
|
+
item_custom_fields: null,
|
|
41
|
+
json: null,
|
|
42
|
+
key: null,
|
|
43
|
+
max_versions: null,
|
|
44
|
+
name: null,
|
|
45
|
+
password_length: null,
|
|
46
|
+
rotation_event_in: null,
|
|
47
|
+
rotation_hour: null,
|
|
48
|
+
rotation_interval: null,
|
|
49
|
+
rotator_type: null,
|
|
50
|
+
tags: null,
|
|
51
|
+
target_name: null,
|
|
52
|
+
token: null,
|
|
53
|
+
uid_token: null
|
|
54
|
+
)
|
|
55
|
+
```
|
|
56
|
+
|
|
@@ -23,7 +23,7 @@
|
|
|
23
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
24
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
25
25
|
| **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
|
|
26
|
-
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
|
26
|
+
| **rotator_type** | **String** | The rotator type. options: [target/password/key] | |
|
|
27
27
|
| **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
|
|
28
28
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
|
29
29
|
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **delete_from_usc** | **Boolean** | Delete the secret from the remote target USC as well | [optional][default to false] |
|
|
7
8
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
9
|
| **name** | **String** | Rotated secret name | |
|
|
9
10
|
| **remote_secret_name** | **String** | Remote Secret Name to disambiguate when multiple syncs exist under the same USC | [optional] |
|
|
@@ -17,6 +18,7 @@
|
|
|
17
18
|
require 'akeyless'
|
|
18
19
|
|
|
19
20
|
instance = Akeyless::RotatedSecretDeleteSync.new(
|
|
21
|
+
delete_from_usc: null,
|
|
20
22
|
json: null,
|
|
21
23
|
name: null,
|
|
22
24
|
remote_secret_name: null,
|
data/docs/RotatedSecretSync.md
CHANGED
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **delete_remote** | **Boolean** | Delete the secret from remote secret manager (for association create/update) | [optional] |
|
|
7
8
|
| **filter_secret_value** | **String** | JQ expression to filter or transform the secret value | [optional] |
|
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
9
10
|
| **name** | **String** | Rotated secret name | |
|
|
@@ -19,6 +20,7 @@
|
|
|
19
20
|
require 'akeyless'
|
|
20
21
|
|
|
21
22
|
instance = Akeyless::RotatedSecretSync.new(
|
|
23
|
+
delete_remote: null,
|
|
22
24
|
filter_secret_value: null,
|
|
23
25
|
json: null,
|
|
24
26
|
name: null,
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
# Akeyless::RotatedSecretUpdateOpenAI
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
|
|
8
|
+
| **api_key** | **String** | Admin API key value to update (relevant only for rotator-type=api-key) | [optional] |
|
|
9
|
+
| **api_key_id** | **String** | Admin API key ID to update (relevant only for rotator-type=api-key) | [optional] |
|
|
10
|
+
| **authentication_credentials** | **String** | The credentials to connect with use-user-creds/use-target-creds | [optional][default to 'use-user-creds'] |
|
|
11
|
+
| **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] |
|
|
12
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
13
|
+
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
|
14
|
+
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
15
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
16
|
+
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
17
|
+
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
18
|
+
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
19
|
+
| **name** | **String** | Rotated secret name | |
|
|
20
|
+
| **new_name** | **String** | New item name | [optional] |
|
|
21
|
+
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
22
|
+
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
24
|
+
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
25
|
+
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
26
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
27
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
28
|
+
|
|
29
|
+
## Example
|
|
30
|
+
|
|
31
|
+
```ruby
|
|
32
|
+
require 'akeyless'
|
|
33
|
+
|
|
34
|
+
instance = Akeyless::RotatedSecretUpdateOpenAI.new(
|
|
35
|
+
add_tag: null,
|
|
36
|
+
api_key: null,
|
|
37
|
+
api_key_id: null,
|
|
38
|
+
authentication_credentials: null,
|
|
39
|
+
auto_rotate: null,
|
|
40
|
+
delete_protection: null,
|
|
41
|
+
description: null,
|
|
42
|
+
item_custom_fields: null,
|
|
43
|
+
json: null,
|
|
44
|
+
keep_prev_version: null,
|
|
45
|
+
key: null,
|
|
46
|
+
max_versions: null,
|
|
47
|
+
name: null,
|
|
48
|
+
new_name: null,
|
|
49
|
+
password_length: null,
|
|
50
|
+
rm_tag: null,
|
|
51
|
+
rotation_event_in: null,
|
|
52
|
+
rotation_hour: null,
|
|
53
|
+
rotation_interval: null,
|
|
54
|
+
token: null,
|
|
55
|
+
uid_token: null
|
|
56
|
+
)
|
|
57
|
+
```
|
|
58
|
+
|
|
@@ -27,7 +27,7 @@
|
|
|
27
27
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
28
28
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
29
29
|
| **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
|
|
30
|
-
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
|
30
|
+
| **rotator_type** | **String** | The rotator type. options: [target/password/key] | |
|
|
31
31
|
| **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
|
|
32
32
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
|
33
33
|
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **delete_from_usc** | **Boolean** | Delete the secret from the remote target USC as well | [optional][default to false] |
|
|
7
8
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
9
|
| **name** | **String** | Static secret name | |
|
|
9
10
|
| **remote_secret_name** | **String** | Remote Secret Name to disambiguate when multiple syncs exist under the same USC | [optional] |
|
|
@@ -17,6 +18,7 @@
|
|
|
17
18
|
require 'akeyless'
|
|
18
19
|
|
|
19
20
|
instance = Akeyless::StaticSecretDeleteSync.new(
|
|
21
|
+
delete_from_usc: null,
|
|
20
22
|
json: null,
|
|
21
23
|
name: null,
|
|
22
24
|
remote_secret_name: null,
|
data/docs/StaticSecretSync.md
CHANGED
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **delete_remote** | **Boolean** | Delete the secret from remote secret manager (for association create/update) | [optional] |
|
|
7
8
|
| **filter_secret_value** | **String** | JQ expression to filter or transform the secret value | [optional] |
|
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
9
10
|
| **name** | **String** | Static secret name | |
|
|
@@ -19,6 +20,7 @@
|
|
|
19
20
|
require 'akeyless'
|
|
20
21
|
|
|
21
22
|
instance = Akeyless::StaticSecretSync.new(
|
|
23
|
+
delete_remote: null,
|
|
22
24
|
filter_secret_value: null,
|
|
23
25
|
json: null,
|
|
24
26
|
name: null,
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **address** | **String** | Address | [optional] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | A default list of client types that are allowed to authenticate [cli,ui,gateway-admin,sdk,mobile,extension]. | [optional] |
|
|
9
9
|
| **allowed_email_domains** | **Array<String>** | Limits email sharing to the specified domains. Relevant only when item sharing is enabled. By default, all domains are allowed. | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A default list of comma-separated CIDR block that are allowed to authenticate. | [optional] |
|
|
11
11
|
| **city** | **String** | City | [optional] |
|
|
@@ -33,7 +33,7 @@
|
|
|
33
33
|
| **jwt_ttl_default** | **Integer** | Default ttl | [optional] |
|
|
34
34
|
| **jwt_ttl_max** | **Integer** | Maximum ttl | [optional] |
|
|
35
35
|
| **jwt_ttl_min** | **Integer** | Minimum ttl | [optional] |
|
|
36
|
-
| **lock_allowed_client_type** | **String** |
|
|
36
|
+
| **lock_allowed_client_type** | **String** | Lock allowed-client-type setting in the account [true/false]. | [optional] |
|
|
37
37
|
| **lock_bound_ips** | **String** | Lock bound-ips setting globally in the account. | [optional] |
|
|
38
38
|
| **lock_default_key** | **String** | Lock the account's default protection key, if set - users will not be able to use a different protection key, relevant only if default-key-name is configured [true/false] | [optional] |
|
|
39
39
|
| **lock_gw_bound_ips** | **String** | Lock gw-bound-ips setting in the account. | [optional] |
|
data/docs/UpdateAuthMethod.md
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_arn** | **Array<String>** | A list of full arns that the access is restricted to | [optional] |
|
|
11
11
|
| **bound_aws_account_id** | **Array<String>** | A list of AWS account-IDs that the access is restricted to | |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audience** | **String** | Deprecated (Deprecated) The audience in the JWT | [optional][default to 'https://management.azure.com/'] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_group_id** | **Array<String>** | A list of group ids that the access is restricted to | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **allowed_cors** | **String** | Comma separated list of allowed CORS domains to be validated as part of the authentication flow. | [optional] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_common_names** | **Array<String>** | A list of names. At least one must exist in the Common Name. Supports globbing. | [optional] |
|
data/docs/UpdateAuthMethodGCP.md
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audience** | **String** | The audience to verify in the JWT received by the client | [default to 'akeyless.io'] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
data/docs/UpdateAuthMethodK8S.md
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audience** | **String** | The audience in the Kubernetes JWT that the access is restricted to | [optional] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audience** | **String** | The audience in the JWT | [optional] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_client_ids** | **Array<String>** | The clients ids that the access is restricted to | [optional] |
|
data/docs/UpdateAuthMethodOCI.md
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
|
|
10
10
|
| **audience** | **String** | Audience claim to be used as part of the authentication flow. In case set, it must match the one configured on the Identity Provider's Application | [optional] |
|
|
11
11
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
data/docs/UpdatePKICertIssuer.md
CHANGED
|
@@ -17,9 +17,9 @@
|
|
|
17
17
|
| **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
|
|
18
18
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
|
19
19
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
|
20
|
-
| **create_private_ocsp** | **Boolean** |
|
|
20
|
+
| **create_private_ocsp** | **Boolean** | Set this to enable an OCSP endpoint in the Gateway and include its URL in AIA | [optional] |
|
|
21
21
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
|
22
|
-
| **create_public_ocsp** | **Boolean** |
|
|
22
|
+
| **create_public_ocsp** | **Boolean** | Set this to enable a public OCSP endpoint and include its URL in AIA (served by UAM and includes account id) | [optional] |
|
|
23
23
|
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
|
24
24
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
25
25
|
| **description** | **String** | Description of the object | [optional] |
|
|
@@ -39,7 +39,7 @@
|
|
|
39
39
|
| **new_name** | **String** | New item name | [optional] |
|
|
40
40
|
| **not_enforce_hostnames** | **Boolean** | If set, any names are allowed for CN and SANs in the certificate and not only a valid host name | [optional] |
|
|
41
41
|
| **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
|
|
42
|
-
| **ocsp_ttl** | **String** |
|
|
42
|
+
| **ocsp_ttl** | **String** | OCSP NextUpdate window for OCSP responses (min 10m). Supports s,m,h,d suffix. | [optional] |
|
|
43
43
|
| **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
|
|
44
44
|
| **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
|
|
45
45
|
| **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
|
data/docs/UscSyncInfo.md
CHANGED
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **delete_remote** | **Boolean** | | [optional] |
|
|
7
8
|
| **jq_secret_filter** | **String** | | [optional] |
|
|
8
9
|
| **last_error** | **String** | | [optional] |
|
|
9
10
|
| **namespace** | **String** | | [optional] |
|
|
@@ -16,6 +17,7 @@
|
|
|
16
17
|
require 'akeyless'
|
|
17
18
|
|
|
18
19
|
instance = Akeyless::UscSyncInfo.new(
|
|
20
|
+
delete_remote: null,
|
|
19
21
|
jq_secret_filter: null,
|
|
20
22
|
last_error: null,
|
|
21
23
|
namespace: null,
|
data/docs/V2Api.md
CHANGED
|
@@ -411,6 +411,7 @@ All URIs are relative to *https://api.akeyless.io*
|
|
|
411
411
|
| [**rotated_secret_create_mongodb**](V2Api.md#rotated_secret_create_mongodb) | **POST** /rotated-secret-create-mongodb | |
|
|
412
412
|
| [**rotated_secret_create_mssql**](V2Api.md#rotated_secret_create_mssql) | **POST** /rotated-secret-create-mssql | |
|
|
413
413
|
| [**rotated_secret_create_mysql**](V2Api.md#rotated_secret_create_mysql) | **POST** /rotated-secret-create-mysql | |
|
|
414
|
+
| [**rotated_secret_create_open_ai**](V2Api.md#rotated_secret_create_open_ai) | **POST** /rotated-secret-create-openai | |
|
|
414
415
|
| [**rotated_secret_create_oracledb**](V2Api.md#rotated_secret_create_oracledb) | **POST** /rotated-secret-create-oracledb | |
|
|
415
416
|
| [**rotated_secret_create_postgresql**](V2Api.md#rotated_secret_create_postgresql) | **POST** /rotated-secret-create-postgresql | |
|
|
416
417
|
| [**rotated_secret_create_redis**](V2Api.md#rotated_secret_create_redis) | **POST** /rotated-secret-create-redis | |
|
|
@@ -434,6 +435,7 @@ All URIs are relative to *https://api.akeyless.io*
|
|
|
434
435
|
| [**rotated_secret_update_mongodb**](V2Api.md#rotated_secret_update_mongodb) | **POST** /rotated-secret-update-mongodb | |
|
|
435
436
|
| [**rotated_secret_update_mssql**](V2Api.md#rotated_secret_update_mssql) | **POST** /rotated-secret-update-mssql | |
|
|
436
437
|
| [**rotated_secret_update_mysql**](V2Api.md#rotated_secret_update_mysql) | **POST** /rotated-secret-update-mysql | |
|
|
438
|
+
| [**rotated_secret_update_open_ai**](V2Api.md#rotated_secret_update_open_ai) | **POST** /rotated-secret-update-openai | |
|
|
437
439
|
| [**rotated_secret_update_oracledb**](V2Api.md#rotated_secret_update_oracledb) | **POST** /rotated-secret-update-oracledb | |
|
|
438
440
|
| [**rotated_secret_update_postgresql**](V2Api.md#rotated_secret_update_postgresql) | **POST** /rotated-secret-update-postgresql | |
|
|
439
441
|
| [**rotated_secret_update_redis**](V2Api.md#rotated_secret_update_redis) | **POST** /rotated-secret-update-redis | |
|
|
@@ -25855,6 +25857,68 @@ No authorization required
|
|
|
25855
25857
|
- **Accept**: application/json
|
|
25856
25858
|
|
|
25857
25859
|
|
|
25860
|
+
## rotated_secret_create_open_ai
|
|
25861
|
+
|
|
25862
|
+
> <RotatedSecretCreateOutput> rotated_secret_create_open_ai(rotated_secret_create_open_ai)
|
|
25863
|
+
|
|
25864
|
+
|
|
25865
|
+
|
|
25866
|
+
### Examples
|
|
25867
|
+
|
|
25868
|
+
```ruby
|
|
25869
|
+
require 'time'
|
|
25870
|
+
require 'akeyless'
|
|
25871
|
+
|
|
25872
|
+
api_instance = Akeyless::V2Api.new
|
|
25873
|
+
rotated_secret_create_open_ai = Akeyless::RotatedSecretCreateOpenAI.new({name: 'name_example', rotator_type: 'rotator_type_example', target_name: 'target_name_example'}) # RotatedSecretCreateOpenAI |
|
|
25874
|
+
|
|
25875
|
+
begin
|
|
25876
|
+
|
|
25877
|
+
result = api_instance.rotated_secret_create_open_ai(rotated_secret_create_open_ai)
|
|
25878
|
+
p result
|
|
25879
|
+
rescue Akeyless::ApiError => e
|
|
25880
|
+
puts "Error when calling V2Api->rotated_secret_create_open_ai: #{e}"
|
|
25881
|
+
end
|
|
25882
|
+
```
|
|
25883
|
+
|
|
25884
|
+
#### Using the rotated_secret_create_open_ai_with_http_info variant
|
|
25885
|
+
|
|
25886
|
+
This returns an Array which contains the response data, status code and headers.
|
|
25887
|
+
|
|
25888
|
+
> <Array(<RotatedSecretCreateOutput>, Integer, Hash)> rotated_secret_create_open_ai_with_http_info(rotated_secret_create_open_ai)
|
|
25889
|
+
|
|
25890
|
+
```ruby
|
|
25891
|
+
begin
|
|
25892
|
+
|
|
25893
|
+
data, status_code, headers = api_instance.rotated_secret_create_open_ai_with_http_info(rotated_secret_create_open_ai)
|
|
25894
|
+
p status_code # => 2xx
|
|
25895
|
+
p headers # => { ... }
|
|
25896
|
+
p data # => <RotatedSecretCreateOutput>
|
|
25897
|
+
rescue Akeyless::ApiError => e
|
|
25898
|
+
puts "Error when calling V2Api->rotated_secret_create_open_ai_with_http_info: #{e}"
|
|
25899
|
+
end
|
|
25900
|
+
```
|
|
25901
|
+
|
|
25902
|
+
### Parameters
|
|
25903
|
+
|
|
25904
|
+
| Name | Type | Description | Notes |
|
|
25905
|
+
| ---- | ---- | ----------- | ----- |
|
|
25906
|
+
| **rotated_secret_create_open_ai** | [**RotatedSecretCreateOpenAI**](RotatedSecretCreateOpenAI.md) | | |
|
|
25907
|
+
|
|
25908
|
+
### Return type
|
|
25909
|
+
|
|
25910
|
+
[**RotatedSecretCreateOutput**](RotatedSecretCreateOutput.md)
|
|
25911
|
+
|
|
25912
|
+
### Authorization
|
|
25913
|
+
|
|
25914
|
+
No authorization required
|
|
25915
|
+
|
|
25916
|
+
### HTTP request headers
|
|
25917
|
+
|
|
25918
|
+
- **Content-Type**: application/json
|
|
25919
|
+
- **Accept**: application/json
|
|
25920
|
+
|
|
25921
|
+
|
|
25858
25922
|
## rotated_secret_create_oracledb
|
|
25859
25923
|
|
|
25860
25924
|
> <RotatedSecretCreateOutput> rotated_secret_create_oracledb(rotated_secret_create_oracledb)
|
|
@@ -27281,6 +27345,68 @@ No authorization required
|
|
|
27281
27345
|
- **Accept**: application/json
|
|
27282
27346
|
|
|
27283
27347
|
|
|
27348
|
+
## rotated_secret_update_open_ai
|
|
27349
|
+
|
|
27350
|
+
> <RotatedSecretUpdateOutput> rotated_secret_update_open_ai(rotated_secret_update_open_ai)
|
|
27351
|
+
|
|
27352
|
+
|
|
27353
|
+
|
|
27354
|
+
### Examples
|
|
27355
|
+
|
|
27356
|
+
```ruby
|
|
27357
|
+
require 'time'
|
|
27358
|
+
require 'akeyless'
|
|
27359
|
+
|
|
27360
|
+
api_instance = Akeyless::V2Api.new
|
|
27361
|
+
rotated_secret_update_open_ai = Akeyless::RotatedSecretUpdateOpenAI.new({name: 'name_example'}) # RotatedSecretUpdateOpenAI |
|
|
27362
|
+
|
|
27363
|
+
begin
|
|
27364
|
+
|
|
27365
|
+
result = api_instance.rotated_secret_update_open_ai(rotated_secret_update_open_ai)
|
|
27366
|
+
p result
|
|
27367
|
+
rescue Akeyless::ApiError => e
|
|
27368
|
+
puts "Error when calling V2Api->rotated_secret_update_open_ai: #{e}"
|
|
27369
|
+
end
|
|
27370
|
+
```
|
|
27371
|
+
|
|
27372
|
+
#### Using the rotated_secret_update_open_ai_with_http_info variant
|
|
27373
|
+
|
|
27374
|
+
This returns an Array which contains the response data, status code and headers.
|
|
27375
|
+
|
|
27376
|
+
> <Array(<RotatedSecretUpdateOutput>, Integer, Hash)> rotated_secret_update_open_ai_with_http_info(rotated_secret_update_open_ai)
|
|
27377
|
+
|
|
27378
|
+
```ruby
|
|
27379
|
+
begin
|
|
27380
|
+
|
|
27381
|
+
data, status_code, headers = api_instance.rotated_secret_update_open_ai_with_http_info(rotated_secret_update_open_ai)
|
|
27382
|
+
p status_code # => 2xx
|
|
27383
|
+
p headers # => { ... }
|
|
27384
|
+
p data # => <RotatedSecretUpdateOutput>
|
|
27385
|
+
rescue Akeyless::ApiError => e
|
|
27386
|
+
puts "Error when calling V2Api->rotated_secret_update_open_ai_with_http_info: #{e}"
|
|
27387
|
+
end
|
|
27388
|
+
```
|
|
27389
|
+
|
|
27390
|
+
### Parameters
|
|
27391
|
+
|
|
27392
|
+
| Name | Type | Description | Notes |
|
|
27393
|
+
| ---- | ---- | ----------- | ----- |
|
|
27394
|
+
| **rotated_secret_update_open_ai** | [**RotatedSecretUpdateOpenAI**](RotatedSecretUpdateOpenAI.md) | | |
|
|
27395
|
+
|
|
27396
|
+
### Return type
|
|
27397
|
+
|
|
27398
|
+
[**RotatedSecretUpdateOutput**](RotatedSecretUpdateOutput.md)
|
|
27399
|
+
|
|
27400
|
+
### Authorization
|
|
27401
|
+
|
|
27402
|
+
No authorization required
|
|
27403
|
+
|
|
27404
|
+
### HTTP request headers
|
|
27405
|
+
|
|
27406
|
+
- **Content-Type**: application/json
|
|
27407
|
+
- **Accept**: application/json
|
|
27408
|
+
|
|
27409
|
+
|
|
27284
27410
|
## rotated_secret_update_oracledb
|
|
27285
27411
|
|
|
27286
27412
|
> <RotatedSecretUpdateOutput> rotated_secret_update_oracledb(rotated_secret_update_oracledb)
|