akeyless 5.0.17 → 5.0.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +13 -1
  3. data/docs/AccountGeneralSettings.md +2 -0
  4. data/docs/CertificateDiscovery.md +34 -0
  5. data/docs/CertificateDiscoveryOutput.md +18 -0
  6. data/docs/CertificateMigration.md +20 -0
  7. data/docs/CertificatePayload.md +30 -0
  8. data/docs/CertificateScanTarget.md +20 -0
  9. data/docs/CreateRole.md +5 -5
  10. data/docs/GatewayCreateMigration.md +7 -1
  11. data/docs/GatewayUpdateMigration.md +6 -0
  12. data/docs/ItemUSCSyncAssociation.md +2 -0
  13. data/docs/ListItems.md +2 -0
  14. data/docs/MigrationsConfigPart.md +2 -0
  15. data/docs/RotatedSecretCreateOpenAI.md +56 -0
  16. data/docs/RotatedSecretCreateSsh.md +1 -1
  17. data/docs/RotatedSecretDeleteSync.md +2 -0
  18. data/docs/RotatedSecretSync.md +2 -0
  19. data/docs/RotatedSecretUpdateOpenAI.md +58 -0
  20. data/docs/RotatedSecretUpdateSsh.md +1 -1
  21. data/docs/ScanResults.md +32 -0
  22. data/docs/StaticSecretDeleteSync.md +2 -0
  23. data/docs/StaticSecretSync.md +2 -0
  24. data/docs/TargetError.md +22 -0
  25. data/docs/UpdateRole.md +5 -5
  26. data/docs/UscDelete.md +2 -0
  27. data/docs/UscSyncInfo.md +2 -0
  28. data/docs/V2Api.md +191 -2
  29. data/lib/akeyless/api/v2_api.rb +192 -0
  30. data/lib/akeyless/models/account_general_settings.rb +10 -1
  31. data/lib/akeyless/models/certificate_discovery.rb +318 -0
  32. data/lib/akeyless/models/certificate_discovery_output.rb +214 -0
  33. data/lib/akeyless/models/certificate_migration.rb +223 -0
  34. data/lib/akeyless/models/certificate_payload.rb +272 -0
  35. data/lib/akeyless/models/certificate_scan_target.rb +223 -0
  36. data/lib/akeyless/models/create_role.rb +5 -5
  37. data/lib/akeyless/models/gateway_create_migration.rb +43 -2
  38. data/lib/akeyless/models/gateway_update_migration.rb +42 -1
  39. data/lib/akeyless/models/item_usc_sync_association.rb +10 -1
  40. data/lib/akeyless/models/list_items.rb +13 -1
  41. data/lib/akeyless/models/migrations_config_part.rb +12 -1
  42. data/lib/akeyless/models/rotated_secret_create_open_ai.rb +437 -0
  43. data/lib/akeyless/models/rotated_secret_create_ssh.rb +1 -1
  44. data/lib/akeyless/models/rotated_secret_delete_sync.rb +13 -1
  45. data/lib/akeyless/models/rotated_secret_sync.rb +11 -1
  46. data/lib/akeyless/models/rotated_secret_update_open_ai.rb +437 -0
  47. data/lib/akeyless/models/rotated_secret_update_ssh.rb +1 -1
  48. data/lib/akeyless/models/scan_results.rb +282 -0
  49. data/lib/akeyless/models/static_secret_delete_sync.rb +13 -1
  50. data/lib/akeyless/models/static_secret_sync.rb +11 -1
  51. data/lib/akeyless/models/target_error.rb +233 -0
  52. data/lib/akeyless/models/update_role.rb +5 -5
  53. data/lib/akeyless/models/usc_delete.rb +11 -1
  54. data/lib/akeyless/models/usc_sync_info.rb +10 -1
  55. data/lib/akeyless/version.rb +1 -1
  56. data/lib/akeyless.rb +9 -0
  57. data/spec/models/certificate_discovery_output_spec.rb +36 -0
  58. data/spec/models/certificate_discovery_spec.rb +84 -0
  59. data/spec/models/certificate_migration_spec.rb +42 -0
  60. data/spec/models/certificate_payload_spec.rb +72 -0
  61. data/spec/models/certificate_scan_target_spec.rb +42 -0
  62. data/spec/models/rotated_secret_create_open_ai_spec.rb +150 -0
  63. data/spec/models/rotated_secret_update_open_ai_spec.rb +156 -0
  64. data/spec/models/scan_results_spec.rb +78 -0
  65. data/spec/models/target_error_spec.rb +48 -0
  66. metadata +38 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a35eaf606dcebda93ac0888692445e1867f106ff16c8e0ff7b24cb203b060127
4
- data.tar.gz: 6b4a05bbe02ca243274b9a9f980ecc43e7d2b616ae7c297f1028d58edf3078c2
3
+ metadata.gz: '06069ce01fc049c064314aa478e51a6452b825df093942c9c22058a21becbb49'
4
+ data.tar.gz: 70d4fd955788d83e20eaeaa51f18287c7d017d389a15fd9ec63b9edc5897ece8
5
5
  SHA512:
6
- metadata.gz: 224bca11ddce18bb87d1520cab2c9badc8abc9c7e6d78674683f6862bace72c1f4e42aa1efba094647a2d768d9bcf1571354f65ba432b679d31613aecbfe4920
7
- data.tar.gz: f0d49431a7ed3696f0b6c8ae3ce07d65924ac2f291f53af1e366235402f09d73133092753a689f5ec6903236f5cd8999c677b99cd824287662b3e6945151a6ed
6
+ metadata.gz: 45960f7a5a0df7034fb1fc999641f3d1356a8cc9a95d61bd7a6f34df6243537894b4c3389e0b274da32631f6d4d3f01dcf6e28483bed26f63a7d0d5249ecfb71
7
+ data.tar.gz: a2bb67cad1e05686881720f441248c69e6176ae3576231aa902372ef2c76de6dc1cb7aeddcaf36f8086b6eee0eb52d692a9fb419739445a6a60aa348b1461966
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.17
10
+ - Package version: 5.0.19
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -101,6 +101,7 @@ Class | Method | HTTP request | Description
101
101
  *Akeyless::V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml |
102
102
  *Akeyless::V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity |
103
103
  *Akeyless::V2Api* | [**calc_password_security_info**](docs/V2Api.md#calc_password_security_info) | **POST** /calc-password-security-info |
104
+ *Akeyless::V2Api* | [**certificate_discovery**](docs/V2Api.md#certificate_discovery) | **POST** /certificate-discovery |
104
105
  *Akeyless::V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password |
105
106
  *Akeyless::V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure |
106
107
  *Akeyless::V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect |
@@ -467,6 +468,7 @@ Class | Method | HTTP request | Description
467
468
  *Akeyless::V2Api* | [**rotated_secret_create_mongodb**](docs/V2Api.md#rotated_secret_create_mongodb) | **POST** /rotated-secret-create-mongodb |
468
469
  *Akeyless::V2Api* | [**rotated_secret_create_mssql**](docs/V2Api.md#rotated_secret_create_mssql) | **POST** /rotated-secret-create-mssql |
469
470
  *Akeyless::V2Api* | [**rotated_secret_create_mysql**](docs/V2Api.md#rotated_secret_create_mysql) | **POST** /rotated-secret-create-mysql |
471
+ *Akeyless::V2Api* | [**rotated_secret_create_open_ai**](docs/V2Api.md#rotated_secret_create_open_ai) | **POST** /rotated-secret-create-openai |
470
472
  *Akeyless::V2Api* | [**rotated_secret_create_oracledb**](docs/V2Api.md#rotated_secret_create_oracledb) | **POST** /rotated-secret-create-oracledb |
471
473
  *Akeyless::V2Api* | [**rotated_secret_create_postgresql**](docs/V2Api.md#rotated_secret_create_postgresql) | **POST** /rotated-secret-create-postgresql |
472
474
  *Akeyless::V2Api* | [**rotated_secret_create_redis**](docs/V2Api.md#rotated_secret_create_redis) | **POST** /rotated-secret-create-redis |
@@ -490,6 +492,7 @@ Class | Method | HTTP request | Description
490
492
  *Akeyless::V2Api* | [**rotated_secret_update_mongodb**](docs/V2Api.md#rotated_secret_update_mongodb) | **POST** /rotated-secret-update-mongodb |
491
493
  *Akeyless::V2Api* | [**rotated_secret_update_mssql**](docs/V2Api.md#rotated_secret_update_mssql) | **POST** /rotated-secret-update-mssql |
492
494
  *Akeyless::V2Api* | [**rotated_secret_update_mysql**](docs/V2Api.md#rotated_secret_update_mysql) | **POST** /rotated-secret-update-mysql |
495
+ *Akeyless::V2Api* | [**rotated_secret_update_open_ai**](docs/V2Api.md#rotated_secret_update_open_ai) | **POST** /rotated-secret-update-openai |
493
496
  *Akeyless::V2Api* | [**rotated_secret_update_oracledb**](docs/V2Api.md#rotated_secret_update_oracledb) | **POST** /rotated-secret-update-oracledb |
494
497
  *Akeyless::V2Api* | [**rotated_secret_update_postgresql**](docs/V2Api.md#rotated_secret_update_postgresql) | **POST** /rotated-secret-update-postgresql |
495
498
  *Akeyless::V2Api* | [**rotated_secret_update_redis**](docs/V2Api.md#rotated_secret_update_redis) | **POST** /rotated-secret-update-redis |
@@ -753,10 +756,15 @@ Class | Method | HTTP request | Description
753
756
  - [Akeyless::CertAccessRules](docs/CertAccessRules.md)
754
757
  - [Akeyless::CertificateAnalyticAggregation](docs/CertificateAnalyticAggregation.md)
755
758
  - [Akeyless::CertificateChainInfo](docs/CertificateChainInfo.md)
759
+ - [Akeyless::CertificateDiscovery](docs/CertificateDiscovery.md)
760
+ - [Akeyless::CertificateDiscoveryOutput](docs/CertificateDiscoveryOutput.md)
756
761
  - [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
757
762
  - [Akeyless::CertificateExpirationEventsSettings](docs/CertificateExpirationEventsSettings.md)
758
763
  - [Akeyless::CertificateInfo](docs/CertificateInfo.md)
759
764
  - [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
765
+ - [Akeyless::CertificateMigration](docs/CertificateMigration.md)
766
+ - [Akeyless::CertificatePayload](docs/CertificatePayload.md)
767
+ - [Akeyless::CertificateScanTarget](docs/CertificateScanTarget.md)
760
768
  - [Akeyless::CertificateStore](docs/CertificateStore.md)
761
769
  - [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
762
770
  - [Akeyless::CertificateVersionInfo](docs/CertificateVersionInfo.md)
@@ -1480,6 +1488,7 @@ Class | Method | HTTP request | Description
1480
1488
  - [Akeyless::RotatedSecretCreateMongodb](docs/RotatedSecretCreateMongodb.md)
1481
1489
  - [Akeyless::RotatedSecretCreateMssql](docs/RotatedSecretCreateMssql.md)
1482
1490
  - [Akeyless::RotatedSecretCreateMysql](docs/RotatedSecretCreateMysql.md)
1491
+ - [Akeyless::RotatedSecretCreateOpenAI](docs/RotatedSecretCreateOpenAI.md)
1483
1492
  - [Akeyless::RotatedSecretCreateOracledb](docs/RotatedSecretCreateOracledb.md)
1484
1493
  - [Akeyless::RotatedSecretCreateOutput](docs/RotatedSecretCreateOutput.md)
1485
1494
  - [Akeyless::RotatedSecretCreatePostgresql](docs/RotatedSecretCreatePostgresql.md)
@@ -1507,6 +1516,7 @@ Class | Method | HTTP request | Description
1507
1516
  - [Akeyless::RotatedSecretUpdateMongodb](docs/RotatedSecretUpdateMongodb.md)
1508
1517
  - [Akeyless::RotatedSecretUpdateMssql](docs/RotatedSecretUpdateMssql.md)
1509
1518
  - [Akeyless::RotatedSecretUpdateMysql](docs/RotatedSecretUpdateMysql.md)
1519
+ - [Akeyless::RotatedSecretUpdateOpenAI](docs/RotatedSecretUpdateOpenAI.md)
1510
1520
  - [Akeyless::RotatedSecretUpdateOracledb](docs/RotatedSecretUpdateOracledb.md)
1511
1521
  - [Akeyless::RotatedSecretUpdateOutput](docs/RotatedSecretUpdateOutput.md)
1512
1522
  - [Akeyless::RotatedSecretUpdatePostgresql](docs/RotatedSecretUpdatePostgresql.md)
@@ -1525,6 +1535,7 @@ Class | Method | HTTP request | Description
1525
1535
  - [Akeyless::SSHCertificateIssueDetails](docs/SSHCertificateIssueDetails.md)
1526
1536
  - [Akeyless::SSHTargetDetails](docs/SSHTargetDetails.md)
1527
1537
  - [Akeyless::SalesforceTargetDetails](docs/SalesforceTargetDetails.md)
1538
+ - [Akeyless::ScanResults](docs/ScanResults.md)
1528
1539
  - [Akeyless::SecretInfo](docs/SecretInfo.md)
1529
1540
  - [Akeyless::SecretSyncOutput](docs/SecretSyncOutput.md)
1530
1541
  - [Akeyless::SectigoTargetDetails](docs/SectigoTargetDetails.md)
@@ -1599,6 +1610,7 @@ Class | Method | HTTP request | Description
1599
1610
  - [Akeyless::TargetCreateWindows](docs/TargetCreateWindows.md)
1600
1611
  - [Akeyless::TargetCreateZeroSSL](docs/TargetCreateZeroSSL.md)
1601
1612
  - [Akeyless::TargetDelete](docs/TargetDelete.md)
1613
+ - [Akeyless::TargetError](docs/TargetError.md)
1602
1614
  - [Akeyless::TargetGet](docs/TargetGet.md)
1603
1615
  - [Akeyless::TargetGetDetails](docs/TargetGetDetails.md)
1604
1616
  - [Akeyless::TargetItemAssociation](docs/TargetItemAssociation.md)
@@ -7,6 +7,7 @@
7
7
  | **account_default_key_item_id** | **Integer** | AccountDefaultKeyItemID is the item ID of the DFC key item configured as the default protection key | [optional] |
8
8
  | **account_default_key_name** | **String** | AccountDefaultKeyName is the name of the DFC key item configured as the default key This is here simply for the response to include the item name in addition to the display ID so the client can properly show this to the user. It will not be saved to the DB, only the AccountDefaultKeyItemID will. | [optional] |
9
9
  | **ai_insights** | [**AiInsightsSetting**](AiInsightsSetting.md) | | [optional] |
10
+ | **allow_auto_fill** | **Boolean** | | [optional] |
10
11
  | **allowed_client_types** | [**AllowedClientType**](AllowedClientType.md) | | [optional] |
11
12
  | **allowed_clients_ips** | [**AllowedIpSettings**](AllowedIpSettings.md) | | [optional] |
12
13
  | **allowed_gateways_ips** | [**AllowedIpSettings**](AllowedIpSettings.md) | | [optional] |
@@ -37,6 +38,7 @@ instance = Akeyless::AccountGeneralSettings.new(
37
38
  account_default_key_item_id: null,
38
39
  account_default_key_name: null,
39
40
  ai_insights: null,
41
+ allow_auto_fill: null,
40
42
  allowed_client_types: null,
41
43
  allowed_clients_ips: null,
42
44
  allowed_gateways_ips: null,
@@ -0,0 +1,34 @@
1
+ # Akeyless::CertificateDiscovery
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **debug** | **Boolean** | Debug mode | [optional][default to false] |
8
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
9
+ | **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to discovery | |
10
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
+ | **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
12
+ | **protection_key** | **String** | The name of the key that protects the certificate value | [optional] |
13
+ | **target_location** | **String** | The folder where the results will be saved | |
14
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
+
17
+ ## Example
18
+
19
+ ```ruby
20
+ require 'akeyless'
21
+
22
+ instance = Akeyless::CertificateDiscovery.new(
23
+ debug: null,
24
+ expiration_event_in: null,
25
+ hosts: null,
26
+ json: null,
27
+ port_ranges: null,
28
+ protection_key: null,
29
+ target_location: null,
30
+ token: null,
31
+ uid_token: null
32
+ )
33
+ ```
34
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::CertificateDiscoveryOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **results** | [**ScanResults**](ScanResults.md) | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::CertificateDiscoveryOutput.new(
15
+ results: null
16
+ )
17
+ ```
18
+
@@ -0,0 +1,20 @@
1
+ # Akeyless::CertificateMigration
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **general** | [**MigrationGeneral**](MigrationGeneral.md) | | [optional] |
8
+ | **payload** | [**CertificatePayload**](CertificatePayload.md) | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::CertificateMigration.new(
16
+ general: null,
17
+ payload: null
18
+ )
19
+ ```
20
+
@@ -0,0 +1,30 @@
1
+ # Akeyless::CertificatePayload
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
8
+ | **folder** | **String** | | [optional] |
9
+ | **max_dial_timeout** | **Integer** | | [optional] |
10
+ | **max_scan_duration** | **Integer** | | [optional] |
11
+ | **max_workers** | **Integer** | | [optional] |
12
+ | **port_ranges** | **String** | | [optional] |
13
+ | **targets** | [**Array<CertificateScanTarget>**](CertificateScanTarget.md) | | [optional] |
14
+
15
+ ## Example
16
+
17
+ ```ruby
18
+ require 'akeyless'
19
+
20
+ instance = Akeyless::CertificatePayload.new(
21
+ expiration_events: null,
22
+ folder: null,
23
+ max_dial_timeout: null,
24
+ max_scan_duration: null,
25
+ max_workers: null,
26
+ port_ranges: null,
27
+ targets: null
28
+ )
29
+ ```
30
+
@@ -0,0 +1,20 @@
1
+ # Akeyless::CertificateScanTarget
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **host** | **String** | | [optional] |
8
+ | **port_ranges** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::CertificateScanTarget.new(
16
+ host: null,
17
+ port_ranges: null
18
+ )
19
+ ```
20
+
data/docs/CreateRole.md CHANGED
@@ -5,18 +5,18 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **analytics_access** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
8
- | **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
8
+ | **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own', 'scoped' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
9
9
  | **comment** | **String** | Deprecated - use description | [optional] |
10
10
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
11
11
  | **description** | **String** | Description of the object | [optional] |
12
- | **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported | [optional] |
12
+ | **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'scoped' and 'all' values are supported | [optional] |
13
13
  | **event_forwarders_access** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] |
14
14
  | **event_forwarders_name** | **Array<String>** | Allow this role to manage the following Event Forwarders. | [optional] |
15
- | **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
15
+ | **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'scoped', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
16
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
17
17
  | **name** | **String** | Role name | |
18
- | **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'own', 'all'. | [optional] |
19
- | **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'own', 'all' values are supported. | [optional] |
18
+ | **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'scoped', 'all'. | [optional] |
19
+ | **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'scoped', 'all' values are supported. | [optional] |
20
20
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
21
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
22
22
  | **usage_reports_access** | **String** | Allow this role to view Usage Report. Currently only 'none' and 'all' values are supported. | [optional] |
@@ -35,11 +35,13 @@
35
35
  | **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
36
36
  | **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
37
37
  | **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
38
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
38
39
  | **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
39
40
  | **hashi_json** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true'] |
40
41
  | **hashi_ns** | **Array<String>** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional] |
41
42
  | **hashi_token** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional] |
42
43
  | **hashi_url** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional] |
44
+ | **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan | |
43
45
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
44
46
  | **k8s_ca_certificate** | **Array<Integer>** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional] |
45
47
  | **k8s_client_certificate** | **Array<Integer>** | K8s Client certificate with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Certificate Authentication method) | [optional] |
@@ -51,6 +53,7 @@
51
53
  | **k8s_url** | **String** | K8s API Server URL, e.g. https://k8s-api.mycompany.com:6443 (relevant only for K8s migration) | [optional] |
52
54
  | **k8s_username** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional] |
53
55
  | **name** | **String** | Migration name | |
56
+ | **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
54
57
  | **protection_key** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional] |
55
58
  | **si_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional] |
56
59
  | **si_rotation_hour** | **Integer** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional] |
@@ -62,7 +65,7 @@
62
65
  | **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
63
66
  | **target_location** | **String** | Target location in Akeyless for imported secrets | |
64
67
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
65
- | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional] |
68
+ | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory/server_inventory/certificate) | [optional] |
66
69
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
67
70
 
68
71
  ## Example
@@ -102,11 +105,13 @@ instance = Akeyless::GatewayCreateMigration.new(
102
105
  azure_kv_name: null,
103
106
  azure_secret: null,
104
107
  azure_tenant_id: null,
108
+ expiration_event_in: null,
105
109
  gcp_key: null,
106
110
  hashi_json: null,
107
111
  hashi_ns: null,
108
112
  hashi_token: null,
109
113
  hashi_url: null,
114
+ hosts: null,
110
115
  json: null,
111
116
  k8s_ca_certificate: null,
112
117
  k8s_client_certificate: null,
@@ -118,6 +123,7 @@ instance = Akeyless::GatewayCreateMigration.new(
118
123
  k8s_url: null,
119
124
  k8s_username: null,
120
125
  name: null,
126
+ port_ranges: null,
121
127
  protection_key: null,
122
128
  si_auto_rotate: null,
123
129
  si_rotation_hour: null,
@@ -35,11 +35,13 @@
35
35
  | **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
36
36
  | **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
37
37
  | **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
38
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
38
39
  | **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
39
40
  | **hashi_json** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true'] |
40
41
  | **hashi_ns** | **Array<String>** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional] |
41
42
  | **hashi_token** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional] |
42
43
  | **hashi_url** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional] |
44
+ | **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan | |
43
45
  | **id** | **String** | Migration ID (Can be retrieved with gateway-list-migration command) | [optional] |
44
46
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
45
47
  | **k8s_ca_certificate** | **Array<Integer>** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional] |
@@ -53,6 +55,7 @@
53
55
  | **k8s_username** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional] |
54
56
  | **name** | **String** | Migration name | [optional] |
55
57
  | **new_name** | **String** | New migration name | [optional] |
58
+ | **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
56
59
  | **protection_key** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional] |
57
60
  | **si_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional] |
58
61
  | **si_rotation_hour** | **Integer** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional] |
@@ -103,11 +106,13 @@ instance = Akeyless::GatewayUpdateMigration.new(
103
106
  azure_kv_name: null,
104
107
  azure_secret: null,
105
108
  azure_tenant_id: null,
109
+ expiration_event_in: null,
106
110
  gcp_key: null,
107
111
  hashi_json: null,
108
112
  hashi_ns: null,
109
113
  hashi_token: null,
110
114
  hashi_url: null,
115
+ hosts: null,
111
116
  id: null,
112
117
  json: null,
113
118
  k8s_ca_certificate: null,
@@ -121,6 +126,7 @@ instance = Akeyless::GatewayUpdateMigration.new(
121
126
  k8s_username: null,
122
127
  name: null,
123
128
  new_name: null,
129
+ port_ranges: null,
124
130
  protection_key: null,
125
131
  si_auto_rotate: null,
126
132
  si_rotation_hour: null,
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **assoc_id** | **String** | | [optional] |
8
8
  | **attributes** | [**UscSyncInfo**](UscSyncInfo.md) | | [optional] |
9
+ | **delete_remote** | **Boolean** | | [optional] |
9
10
  | **item_id** | **Integer** | | [optional] |
10
11
  | **item_name** | **String** | | [optional] |
11
12
  | **item_type** | **String** | | [optional] |
@@ -18,6 +19,7 @@ require 'akeyless'
18
19
  instance = Akeyless::ItemUSCSyncAssociation.new(
19
20
  assoc_id: null,
20
21
  attributes: null,
22
+ delete_remote: null,
21
23
  item_id: null,
22
24
  item_name: null,
23
25
  item_type: null
data/docs/ListItems.md CHANGED
@@ -7,6 +7,7 @@
7
7
  | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
8
8
  | **advanced_filter** | **String** | Filter by item name/username/website or part of it | [optional] |
9
9
  | **auto_pagination** | **String** | Retrieve all items using pagination, when disabled retrieving only first 1000 items | [optional][default to 'enabled'] |
10
+ | **current_folder** | **Boolean** | List only items in the current folder (excludes subfolders) | [optional][default to false] |
10
11
  | **filter** | **String** | Filter by item name or part of it | [optional] |
11
12
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
13
  | **minimal_view** | **Boolean** | Show only basic information of the items | [optional] |
@@ -29,6 +30,7 @@ instance = Akeyless::ListItems.new(
29
30
  accessibility: null,
30
31
  advanced_filter: null,
31
32
  auto_pagination: null,
33
+ current_folder: null,
32
34
  filter: null,
33
35
  json: null,
34
36
  minimal_view: null,
@@ -7,6 +7,7 @@
7
7
  | **active_directory_migrations** | [**Array<ActiveDirectoryMigration>**](ActiveDirectoryMigration.md) | | [optional] |
8
8
  | **aws_secrets_migrations** | [**Array<AWSSecretsMigration>**](AWSSecretsMigration.md) | | [optional] |
9
9
  | **azure_kv_migrations** | [**Array<AzureKeyVaultMigration>**](AzureKeyVaultMigration.md) | | [optional] |
10
+ | **certificate_migrations** | [**Array<CertificateMigration>**](CertificateMigration.md) | | [optional] |
10
11
  | **gcp_secrets_migrations** | [**Array<GCPSecretsMigration>**](GCPSecretsMigration.md) | | [optional] |
11
12
  | **hashi_migrations** | [**Array<HashiMigration>**](HashiMigration.md) | | [optional] |
12
13
  | **k8s_migrations** | [**Array<K8SMigration>**](K8SMigration.md) | | [optional] |
@@ -23,6 +24,7 @@ instance = Akeyless::MigrationsConfigPart.new(
23
24
  active_directory_migrations: null,
24
25
  aws_secrets_migrations: null,
25
26
  azure_kv_migrations: null,
27
+ certificate_migrations: null,
26
28
  gcp_secrets_migrations: null,
27
29
  hashi_migrations: null,
28
30
  k8s_migrations: null,
@@ -0,0 +1,56 @@
1
+ # Akeyless::RotatedSecretCreateOpenAI
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **api_key** | **String** | Admin API key value to rotate (relevant only for rotator-type=api-key) | [optional] |
8
+ | **api_key_id** | **String** | Admin API key ID to rotate (relevant only for rotator-type=api-key) | [optional] |
9
+ | **authentication_credentials** | **String** | The credentials to connect with use-user-creds/use-target-creds | [optional][default to 'use-user-creds'] |
10
+ | **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] |
11
+ | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
12
+ | **description** | **String** | Description of the object | [optional] |
13
+ | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
14
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
15
+ | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
16
+ | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
17
+ | **name** | **String** | Rotated secret name | |
18
+ | **password_length** | **String** | The length of the password to be generated | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
20
+ | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
21
+ | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
22
+ | **rotator_type** | **String** | The rotator type. options: [target/api-key] | |
23
+ | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
24
+ | **target_name** | **String** | Target name | |
25
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
26
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
27
+
28
+ ## Example
29
+
30
+ ```ruby
31
+ require 'akeyless'
32
+
33
+ instance = Akeyless::RotatedSecretCreateOpenAI.new(
34
+ api_key: null,
35
+ api_key_id: null,
36
+ authentication_credentials: null,
37
+ auto_rotate: null,
38
+ delete_protection: null,
39
+ description: null,
40
+ item_custom_fields: null,
41
+ json: null,
42
+ key: null,
43
+ max_versions: null,
44
+ name: null,
45
+ password_length: null,
46
+ rotation_event_in: null,
47
+ rotation_hour: null,
48
+ rotation_interval: null,
49
+ rotator_type: null,
50
+ tags: null,
51
+ target_name: null,
52
+ token: null,
53
+ uid_token: null
54
+ )
55
+ ```
56
+
@@ -23,7 +23,7 @@
23
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
25
  | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
26
- | **rotator_type** | **String** | The rotator type. options: [target/password] | |
26
+ | **rotator_type** | **String** | The rotator type. options: [target/password/key] | |
27
27
  | **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
28
28
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
29
29
  | **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **delete_from_usc** | **Boolean** | Delete the secret from the remote target USC as well | [optional][default to false] |
7
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
8
9
  | **name** | **String** | Rotated secret name | |
9
10
  | **remote_secret_name** | **String** | Remote Secret Name to disambiguate when multiple syncs exist under the same USC | [optional] |
@@ -17,6 +18,7 @@
17
18
  require 'akeyless'
18
19
 
19
20
  instance = Akeyless::RotatedSecretDeleteSync.new(
21
+ delete_from_usc: null,
20
22
  json: null,
21
23
  name: null,
22
24
  remote_secret_name: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **delete_remote** | **Boolean** | Delete the secret from remote secret manager (for association create/update) | [optional] |
7
8
  | **filter_secret_value** | **String** | JQ expression to filter or transform the secret value | [optional] |
8
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
10
  | **name** | **String** | Rotated secret name | |
@@ -19,6 +20,7 @@
19
20
  require 'akeyless'
20
21
 
21
22
  instance = Akeyless::RotatedSecretSync.new(
23
+ delete_remote: null,
22
24
  filter_secret_value: null,
23
25
  json: null,
24
26
  name: null,
@@ -0,0 +1,58 @@
1
+ # Akeyless::RotatedSecretUpdateOpenAI
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **add_tag** | **Array<String>** | List of the new tags that will be attached to this item | [optional] |
8
+ | **api_key** | **String** | Admin API key value to update (relevant only for rotator-type=api-key) | [optional] |
9
+ | **api_key_id** | **String** | Admin API key ID to update (relevant only for rotator-type=api-key) | [optional] |
10
+ | **authentication_credentials** | **String** | The credentials to connect with use-user-creds/use-target-creds | [optional][default to 'use-user-creds'] |
11
+ | **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] |
12
+ | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
13
+ | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
14
+ | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
15
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
16
+ | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
17
+ | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
18
+ | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
19
+ | **name** | **String** | Rotated secret name | |
20
+ | **new_name** | **String** | New item name | [optional] |
21
+ | **password_length** | **String** | The length of the password to be generated | [optional] |
22
+ | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
24
+ | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
25
+ | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
26
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
27
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
28
+
29
+ ## Example
30
+
31
+ ```ruby
32
+ require 'akeyless'
33
+
34
+ instance = Akeyless::RotatedSecretUpdateOpenAI.new(
35
+ add_tag: null,
36
+ api_key: null,
37
+ api_key_id: null,
38
+ authentication_credentials: null,
39
+ auto_rotate: null,
40
+ delete_protection: null,
41
+ description: null,
42
+ item_custom_fields: null,
43
+ json: null,
44
+ keep_prev_version: null,
45
+ key: null,
46
+ max_versions: null,
47
+ name: null,
48
+ new_name: null,
49
+ password_length: null,
50
+ rm_tag: null,
51
+ rotation_event_in: null,
52
+ rotation_hour: null,
53
+ rotation_interval: null,
54
+ token: null,
55
+ uid_token: null
56
+ )
57
+ ```
58
+
@@ -27,7 +27,7 @@
27
27
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
28
28
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
29
29
  | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
30
- | **rotator_type** | **String** | The rotator type. options: [target/password] | |
30
+ | **rotator_type** | **String** | The rotator type. options: [target/password/key] | |
31
31
  | **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
32
32
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
33
33
  | **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
@@ -0,0 +1,32 @@
1
+ # Akeyless::ScanResults
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **count_existing** | **Integer** | | [optional] |
8
+ | **count_failed** | **Integer** | | [optional] |
9
+ | **count_hosts** | **Integer** | | [optional] |
10
+ | **count_new** | **Integer** | | [optional] |
11
+ | **count_subdomains** | **Integer** | | [optional] |
12
+ | **error** | **String** | | [optional] |
13
+ | **failed_targets** | [**Array<TargetError>**](TargetError.md) | | [optional] |
14
+ | **item_names** | **Array<String>** | | [optional] |
15
+
16
+ ## Example
17
+
18
+ ```ruby
19
+ require 'akeyless'
20
+
21
+ instance = Akeyless::ScanResults.new(
22
+ count_existing: null,
23
+ count_failed: null,
24
+ count_hosts: null,
25
+ count_new: null,
26
+ count_subdomains: null,
27
+ error: null,
28
+ failed_targets: null,
29
+ item_names: null
30
+ )
31
+ ```
32
+
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **delete_from_usc** | **Boolean** | Delete the secret from the remote target USC as well | [optional][default to false] |
7
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
8
9
  | **name** | **String** | Static secret name | |
9
10
  | **remote_secret_name** | **String** | Remote Secret Name to disambiguate when multiple syncs exist under the same USC | [optional] |
@@ -17,6 +18,7 @@
17
18
  require 'akeyless'
18
19
 
19
20
  instance = Akeyless::StaticSecretDeleteSync.new(
21
+ delete_from_usc: null,
20
22
  json: null,
21
23
  name: null,
22
24
  remote_secret_name: null,