akeyless 5.0.18 → 5.0.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +9 -1
  3. data/docs/CertificateDiscovery.md +34 -0
  4. data/docs/CertificateDiscoveryOutput.md +18 -0
  5. data/docs/CertificateMigration.md +20 -0
  6. data/docs/CertificatePayload.md +30 -0
  7. data/docs/CertificateScanTarget.md +20 -0
  8. data/docs/CertificateStore.md +2 -0
  9. data/docs/CreateRole.md +5 -5
  10. data/docs/CreateUSC.md +2 -0
  11. data/docs/GatewayCreateMigration.md +7 -1
  12. data/docs/GatewayUpdateMigration.md +6 -0
  13. data/docs/GatewayUpdateTlsCert.md +2 -0
  14. data/docs/GeneralConfigPart.md +6 -0
  15. data/docs/GetKubeExecCreds.md +1 -1
  16. data/docs/GetPKICertificate.md +1 -1
  17. data/docs/MigrationsConfigPart.md +2 -0
  18. data/docs/ScanResults.md +32 -0
  19. data/docs/SecretInfo.md +2 -0
  20. data/docs/TargetError.md +22 -0
  21. data/docs/UpdateItem.md +2 -0
  22. data/docs/UpdateRole.md +5 -5
  23. data/docs/UscCreate.md +2 -0
  24. data/docs/UscDelete.md +2 -0
  25. data/docs/V2Api.md +65 -2
  26. data/lib/akeyless/api/v2_api.rb +64 -0
  27. data/lib/akeyless/models/certificate_discovery.rb +318 -0
  28. data/lib/akeyless/models/certificate_discovery_output.rb +214 -0
  29. data/lib/akeyless/models/certificate_migration.rb +223 -0
  30. data/lib/akeyless/models/certificate_payload.rb +272 -0
  31. data/lib/akeyless/models/certificate_scan_target.rb +223 -0
  32. data/lib/akeyless/models/certificate_store.rb +12 -1
  33. data/lib/akeyless/models/create_role.rb +5 -5
  34. data/lib/akeyless/models/create_usc.rb +11 -1
  35. data/lib/akeyless/models/gateway_create_migration.rb +43 -2
  36. data/lib/akeyless/models/gateway_update_migration.rb +42 -1
  37. data/lib/akeyless/models/gateway_update_tls_cert.rb +13 -1
  38. data/lib/akeyless/models/general_config_part.rb +30 -1
  39. data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
  40. data/lib/akeyless/models/get_pki_certificate.rb +1 -1
  41. data/lib/akeyless/models/migrations_config_part.rb +12 -1
  42. data/lib/akeyless/models/scan_results.rb +282 -0
  43. data/lib/akeyless/models/secret_info.rb +10 -1
  44. data/lib/akeyless/models/target_error.rb +233 -0
  45. data/lib/akeyless/models/update_item.rb +11 -1
  46. data/lib/akeyless/models/update_role.rb +5 -5
  47. data/lib/akeyless/models/usc_create.rb +11 -1
  48. data/lib/akeyless/models/usc_delete.rb +11 -1
  49. data/lib/akeyless/version.rb +1 -1
  50. data/lib/akeyless.rb +7 -0
  51. data/spec/models/certificate_discovery_output_spec.rb +36 -0
  52. data/spec/models/certificate_discovery_spec.rb +84 -0
  53. data/spec/models/certificate_migration_spec.rb +42 -0
  54. data/spec/models/certificate_payload_spec.rb +72 -0
  55. data/spec/models/certificate_scan_target_spec.rb +42 -0
  56. data/spec/models/scan_results_spec.rb +78 -0
  57. data/spec/models/target_error_spec.rb +48 -0
  58. metadata +30 -2
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 32922357b8e87c9aeb8c3f953fd7d59c31c9d0ffd591d8cb862e0f2142b2f82f
4
- data.tar.gz: acd8d70774cfa95e595600361626468d759f39993b312d616c49b1ada744bfca
3
+ metadata.gz: ea9a1fec685c0eff277f661e0758adcb9cc8f46c6b9534a6889e9d7fc1b1e5d8
4
+ data.tar.gz: b0c76f83dc344e72c0c1f99ab073eb09ec3eff5a6f4a364e83d86e988b608f7e
5
5
  SHA512:
6
- metadata.gz: 43c8dced7af0c7018ded50b66b5990d3494aa38cb7a685927055b3def709042f43b72997055641882f75128759383c3df0b81d777efd5bb2884152daef785ac2
7
- data.tar.gz: 446ff80c7e8422f0f5b02c22ba2f48ef22f9ad7320f9bee932a872477ef15865af18f6335409e3220899ba149cfedd29a124071236270f41b66d8cea2fe5c88c
6
+ metadata.gz: 18d2379a718c54600b89bd919b0a1e98176f9cc4c7616a8901768aecacb4525a497460ae74dc0fb60568673dddd4eea91a04c991ddff0920820a869be6ec19f5
7
+ data.tar.gz: c3643f8dd4a5712184a8015757535998fd80e6067a21fb3ecca815d27096381f8dd4b338eed83ebe0c92d9afc3550ee322a05865f86312a4c14fcb494d8bd7b2
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.18
10
+ - Package version: 5.0.20
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -101,6 +101,7 @@ Class | Method | HTTP request | Description
101
101
  *Akeyless::V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml |
102
102
  *Akeyless::V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity |
103
103
  *Akeyless::V2Api* | [**calc_password_security_info**](docs/V2Api.md#calc_password_security_info) | **POST** /calc-password-security-info |
104
+ *Akeyless::V2Api* | [**certificate_discovery**](docs/V2Api.md#certificate_discovery) | **POST** /certificate-discovery |
104
105
  *Akeyless::V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password |
105
106
  *Akeyless::V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure |
106
107
  *Akeyless::V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect |
@@ -755,10 +756,15 @@ Class | Method | HTTP request | Description
755
756
  - [Akeyless::CertAccessRules](docs/CertAccessRules.md)
756
757
  - [Akeyless::CertificateAnalyticAggregation](docs/CertificateAnalyticAggregation.md)
757
758
  - [Akeyless::CertificateChainInfo](docs/CertificateChainInfo.md)
759
+ - [Akeyless::CertificateDiscovery](docs/CertificateDiscovery.md)
760
+ - [Akeyless::CertificateDiscoveryOutput](docs/CertificateDiscoveryOutput.md)
758
761
  - [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
759
762
  - [Akeyless::CertificateExpirationEventsSettings](docs/CertificateExpirationEventsSettings.md)
760
763
  - [Akeyless::CertificateInfo](docs/CertificateInfo.md)
761
764
  - [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
765
+ - [Akeyless::CertificateMigration](docs/CertificateMigration.md)
766
+ - [Akeyless::CertificatePayload](docs/CertificatePayload.md)
767
+ - [Akeyless::CertificateScanTarget](docs/CertificateScanTarget.md)
762
768
  - [Akeyless::CertificateStore](docs/CertificateStore.md)
763
769
  - [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
764
770
  - [Akeyless::CertificateVersionInfo](docs/CertificateVersionInfo.md)
@@ -1529,6 +1535,7 @@ Class | Method | HTTP request | Description
1529
1535
  - [Akeyless::SSHCertificateIssueDetails](docs/SSHCertificateIssueDetails.md)
1530
1536
  - [Akeyless::SSHTargetDetails](docs/SSHTargetDetails.md)
1531
1537
  - [Akeyless::SalesforceTargetDetails](docs/SalesforceTargetDetails.md)
1538
+ - [Akeyless::ScanResults](docs/ScanResults.md)
1532
1539
  - [Akeyless::SecretInfo](docs/SecretInfo.md)
1533
1540
  - [Akeyless::SecretSyncOutput](docs/SecretSyncOutput.md)
1534
1541
  - [Akeyless::SectigoTargetDetails](docs/SectigoTargetDetails.md)
@@ -1603,6 +1610,7 @@ Class | Method | HTTP request | Description
1603
1610
  - [Akeyless::TargetCreateWindows](docs/TargetCreateWindows.md)
1604
1611
  - [Akeyless::TargetCreateZeroSSL](docs/TargetCreateZeroSSL.md)
1605
1612
  - [Akeyless::TargetDelete](docs/TargetDelete.md)
1613
+ - [Akeyless::TargetError](docs/TargetError.md)
1606
1614
  - [Akeyless::TargetGet](docs/TargetGet.md)
1607
1615
  - [Akeyless::TargetGetDetails](docs/TargetGetDetails.md)
1608
1616
  - [Akeyless::TargetItemAssociation](docs/TargetItemAssociation.md)
@@ -0,0 +1,34 @@
1
+ # Akeyless::CertificateDiscovery
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **debug** | **Boolean** | Debug mode | [optional][default to false] |
8
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
9
+ | **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to discovery | |
10
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
+ | **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
12
+ | **protection_key** | **String** | The name of the key that protects the certificate value | [optional] |
13
+ | **target_location** | **String** | The folder where the results will be saved | |
14
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
+
17
+ ## Example
18
+
19
+ ```ruby
20
+ require 'akeyless'
21
+
22
+ instance = Akeyless::CertificateDiscovery.new(
23
+ debug: null,
24
+ expiration_event_in: null,
25
+ hosts: null,
26
+ json: null,
27
+ port_ranges: null,
28
+ protection_key: null,
29
+ target_location: null,
30
+ token: null,
31
+ uid_token: null
32
+ )
33
+ ```
34
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::CertificateDiscoveryOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **results** | [**ScanResults**](ScanResults.md) | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::CertificateDiscoveryOutput.new(
15
+ results: null
16
+ )
17
+ ```
18
+
@@ -0,0 +1,20 @@
1
+ # Akeyless::CertificateMigration
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **general** | [**MigrationGeneral**](MigrationGeneral.md) | | [optional] |
8
+ | **payload** | [**CertificatePayload**](CertificatePayload.md) | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::CertificateMigration.new(
16
+ general: null,
17
+ payload: null
18
+ )
19
+ ```
20
+
@@ -0,0 +1,30 @@
1
+ # Akeyless::CertificatePayload
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
8
+ | **folder** | **String** | | [optional] |
9
+ | **max_dial_timeout** | **Integer** | | [optional] |
10
+ | **max_scan_duration** | **Integer** | | [optional] |
11
+ | **max_workers** | **Integer** | | [optional] |
12
+ | **port_ranges** | **String** | | [optional] |
13
+ | **targets** | [**Array<CertificateScanTarget>**](CertificateScanTarget.md) | | [optional] |
14
+
15
+ ## Example
16
+
17
+ ```ruby
18
+ require 'akeyless'
19
+
20
+ instance = Akeyless::CertificatePayload.new(
21
+ expiration_events: null,
22
+ folder: null,
23
+ max_dial_timeout: null,
24
+ max_scan_duration: null,
25
+ max_workers: null,
26
+ port_ranges: null,
27
+ targets: null
28
+ )
29
+ ```
30
+
@@ -0,0 +1,20 @@
1
+ # Akeyless::CertificateScanTarget
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **host** | **String** | | [optional] |
8
+ | **port_ranges** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::CertificateScanTarget.new(
16
+ host: null,
17
+ port_ranges: null
18
+ )
19
+ ```
20
+
@@ -7,6 +7,7 @@
7
7
  | **certificate_pem** | **String** | | [optional] |
8
8
  | **common_name** | **String** | | [optional] |
9
9
  | **expiration_date** | **Time** | | [optional] |
10
+ | **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
10
11
  | **name** | **String** | | [optional] |
11
12
 
12
13
  ## Example
@@ -18,6 +19,7 @@ instance = Akeyless::CertificateStore.new(
18
19
  certificate_pem: null,
19
20
  common_name: null,
20
21
  expiration_date: null,
22
+ expiration_events: null,
21
23
  name: null
22
24
  )
23
25
  ```
data/docs/CreateRole.md CHANGED
@@ -5,18 +5,18 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **analytics_access** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
8
- | **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
8
+ | **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own', 'scoped' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
9
9
  | **comment** | **String** | Deprecated - use description | [optional] |
10
10
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
11
11
  | **description** | **String** | Description of the object | [optional] |
12
- | **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported | [optional] |
12
+ | **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'scoped' and 'all' values are supported | [optional] |
13
13
  | **event_forwarders_access** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] |
14
14
  | **event_forwarders_name** | **Array<String>** | Allow this role to manage the following Event Forwarders. | [optional] |
15
- | **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
15
+ | **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'scoped', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
16
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
17
17
  | **name** | **String** | Role name | |
18
- | **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'own', 'all'. | [optional] |
19
- | **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'own', 'all' values are supported. | [optional] |
18
+ | **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'scoped', 'all'. | [optional] |
19
+ | **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'scoped', 'all' values are supported. | [optional] |
20
20
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
21
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
22
22
  | **usage_reports_access** | **String** | Allow this role to view Usage Report. Currently only 'none' and 'all' values are supported. | [optional] |
data/docs/CreateUSC.md CHANGED
@@ -8,6 +8,7 @@
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the Universal Secrets Connector | [optional] |
10
10
  | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
11
+ | **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. | [optional] |
11
12
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
12
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
13
14
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
@@ -29,6 +30,7 @@ instance = Akeyless::CreateUSC.new(
29
30
  delete_protection: null,
30
31
  description: null,
31
32
  gcp_project_id: null,
33
+ gcp_sm_regions: null,
32
34
  item_custom_fields: null,
33
35
  json: null,
34
36
  k8s_namespace: null,
@@ -35,11 +35,13 @@
35
35
  | **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
36
36
  | **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
37
37
  | **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
38
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
38
39
  | **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
39
40
  | **hashi_json** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true'] |
40
41
  | **hashi_ns** | **Array<String>** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional] |
41
42
  | **hashi_token** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional] |
42
43
  | **hashi_url** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional] |
44
+ | **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan | |
43
45
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
44
46
  | **k8s_ca_certificate** | **Array<Integer>** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional] |
45
47
  | **k8s_client_certificate** | **Array<Integer>** | K8s Client certificate with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Certificate Authentication method) | [optional] |
@@ -51,6 +53,7 @@
51
53
  | **k8s_url** | **String** | K8s API Server URL, e.g. https://k8s-api.mycompany.com:6443 (relevant only for K8s migration) | [optional] |
52
54
  | **k8s_username** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional] |
53
55
  | **name** | **String** | Migration name | |
56
+ | **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
54
57
  | **protection_key** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional] |
55
58
  | **si_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional] |
56
59
  | **si_rotation_hour** | **Integer** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional] |
@@ -62,7 +65,7 @@
62
65
  | **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
63
66
  | **target_location** | **String** | Target location in Akeyless for imported secrets | |
64
67
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
65
- | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional] |
68
+ | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory/server_inventory/certificate) | [optional] |
66
69
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
67
70
 
68
71
  ## Example
@@ -102,11 +105,13 @@ instance = Akeyless::GatewayCreateMigration.new(
102
105
  azure_kv_name: null,
103
106
  azure_secret: null,
104
107
  azure_tenant_id: null,
108
+ expiration_event_in: null,
105
109
  gcp_key: null,
106
110
  hashi_json: null,
107
111
  hashi_ns: null,
108
112
  hashi_token: null,
109
113
  hashi_url: null,
114
+ hosts: null,
110
115
  json: null,
111
116
  k8s_ca_certificate: null,
112
117
  k8s_client_certificate: null,
@@ -118,6 +123,7 @@ instance = Akeyless::GatewayCreateMigration.new(
118
123
  k8s_url: null,
119
124
  k8s_username: null,
120
125
  name: null,
126
+ port_ranges: null,
121
127
  protection_key: null,
122
128
  si_auto_rotate: null,
123
129
  si_rotation_hour: null,
@@ -35,11 +35,13 @@
35
35
  | **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
36
36
  | **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
37
37
  | **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
38
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
38
39
  | **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
39
40
  | **hashi_json** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true'] |
40
41
  | **hashi_ns** | **Array<String>** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional] |
41
42
  | **hashi_token** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional] |
42
43
  | **hashi_url** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional] |
44
+ | **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan | |
43
45
  | **id** | **String** | Migration ID (Can be retrieved with gateway-list-migration command) | [optional] |
44
46
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
45
47
  | **k8s_ca_certificate** | **Array<Integer>** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional] |
@@ -53,6 +55,7 @@
53
55
  | **k8s_username** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional] |
54
56
  | **name** | **String** | Migration name | [optional] |
55
57
  | **new_name** | **String** | New migration name | [optional] |
58
+ | **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
56
59
  | **protection_key** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional] |
57
60
  | **si_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional] |
58
61
  | **si_rotation_hour** | **Integer** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional] |
@@ -103,11 +106,13 @@ instance = Akeyless::GatewayUpdateMigration.new(
103
106
  azure_kv_name: null,
104
107
  azure_secret: null,
105
108
  azure_tenant_id: null,
109
+ expiration_event_in: null,
106
110
  gcp_key: null,
107
111
  hashi_json: null,
108
112
  hashi_ns: null,
109
113
  hashi_token: null,
110
114
  hashi_url: null,
115
+ hosts: null,
111
116
  id: null,
112
117
  json: null,
113
118
  k8s_ca_certificate: null,
@@ -121,6 +126,7 @@ instance = Akeyless::GatewayUpdateMigration.new(
121
126
  k8s_username: null,
122
127
  name: null,
123
128
  new_name: null,
129
+ port_ranges: null,
124
130
  protection_key: null,
125
131
  si_auto_rotate: null,
126
132
  si_rotation_hour: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **cert_data** | **String** | TLS Certificate (base64 encoded) | [optional] |
8
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
8
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
10
  | **key_data** | **String** | TLS Private Key (base64 encoded) | [optional] |
10
11
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -17,6 +18,7 @@ require 'akeyless'
17
18
 
18
19
  instance = Akeyless::GatewayUpdateTlsCert.new(
19
20
  cert_data: null,
21
+ expiration_event_in: null,
20
22
  json: null,
21
23
  key_data: null,
22
24
  token: null,
@@ -17,6 +17,9 @@
17
17
  | **notify_on_status_change** | **Boolean** | | [optional] |
18
18
  | **tcp_port** | **String** | | [optional] |
19
19
  | **tls_cert** | **String** | | [optional] |
20
+ | **tls_cert_common_name** | **String** | | [optional] |
21
+ | **tls_cert_expiration_date** | **Time** | | [optional] |
22
+ | **tls_cert_expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
20
23
  | **tls_key** | **String** | | [optional] |
21
24
 
22
25
  ## Example
@@ -38,6 +41,9 @@ instance = Akeyless::GeneralConfigPart.new(
38
41
  notify_on_status_change: null,
39
42
  tcp_port: null,
40
43
  tls_cert: null,
44
+ tls_cert_common_name: null,
45
+ tls_cert_expiration_date: null,
46
+ tls_cert_expiration_events: null,
41
47
  tls_key: null
42
48
  )
43
49
  ```
@@ -9,7 +9,7 @@
9
9
  | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
10
10
  | **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
11
11
  | **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
12
- | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
12
+ | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
13
13
  | **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
14
14
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
15
15
  | **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
@@ -8,7 +8,7 @@
8
8
  | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
9
9
  | **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
10
10
  | **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
11
- | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
11
+ | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
12
12
  | **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
13
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
14
  | **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
@@ -7,6 +7,7 @@
7
7
  | **active_directory_migrations** | [**Array<ActiveDirectoryMigration>**](ActiveDirectoryMigration.md) | | [optional] |
8
8
  | **aws_secrets_migrations** | [**Array<AWSSecretsMigration>**](AWSSecretsMigration.md) | | [optional] |
9
9
  | **azure_kv_migrations** | [**Array<AzureKeyVaultMigration>**](AzureKeyVaultMigration.md) | | [optional] |
10
+ | **certificate_migrations** | [**Array<CertificateMigration>**](CertificateMigration.md) | | [optional] |
10
11
  | **gcp_secrets_migrations** | [**Array<GCPSecretsMigration>**](GCPSecretsMigration.md) | | [optional] |
11
12
  | **hashi_migrations** | [**Array<HashiMigration>**](HashiMigration.md) | | [optional] |
12
13
  | **k8s_migrations** | [**Array<K8SMigration>**](K8SMigration.md) | | [optional] |
@@ -23,6 +24,7 @@ instance = Akeyless::MigrationsConfigPart.new(
23
24
  active_directory_migrations: null,
24
25
  aws_secrets_migrations: null,
25
26
  azure_kv_migrations: null,
27
+ certificate_migrations: null,
26
28
  gcp_secrets_migrations: null,
27
29
  hashi_migrations: null,
28
30
  k8s_migrations: null,
@@ -0,0 +1,32 @@
1
+ # Akeyless::ScanResults
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **count_existing** | **Integer** | | [optional] |
8
+ | **count_failed** | **Integer** | | [optional] |
9
+ | **count_hosts** | **Integer** | | [optional] |
10
+ | **count_new** | **Integer** | | [optional] |
11
+ | **count_subdomains** | **Integer** | | [optional] |
12
+ | **error** | **String** | | [optional] |
13
+ | **failed_targets** | [**Array<TargetError>**](TargetError.md) | | [optional] |
14
+ | **item_names** | **Array<String>** | | [optional] |
15
+
16
+ ## Example
17
+
18
+ ```ruby
19
+ require 'akeyless'
20
+
21
+ instance = Akeyless::ScanResults.new(
22
+ count_existing: null,
23
+ count_failed: null,
24
+ count_hosts: null,
25
+ count_new: null,
26
+ count_subdomains: null,
27
+ error: null,
28
+ failed_targets: null,
29
+ item_names: null
30
+ )
31
+ ```
32
+
data/docs/SecretInfo.md CHANGED
@@ -11,6 +11,7 @@
11
11
  | **last_retrieved** | **Time** | | [optional] |
12
12
  | **location** | **Object** | | [optional] |
13
13
  | **name** | **String** | | [optional] |
14
+ | **region** | **String** | | [optional] |
14
15
  | **secret_id** | **String** | | [optional] |
15
16
  | **status** | **Boolean** | | [optional] |
16
17
  | **tags** | **Hash<String, String>** | | [optional] |
@@ -31,6 +32,7 @@ instance = Akeyless::SecretInfo.new(
31
32
  last_retrieved: null,
32
33
  location: null,
33
34
  name: null,
35
+ region: null,
34
36
  secret_id: null,
35
37
  status: null,
36
38
  tags: null,
@@ -0,0 +1,22 @@
1
+ # Akeyless::TargetError
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **error** | **String** | | [optional] |
8
+ | **host** | **String** | | [optional] |
9
+ | **port** | **Integer** | | [optional] |
10
+
11
+ ## Example
12
+
13
+ ```ruby
14
+ require 'akeyless'
15
+
16
+ instance = Akeyless::TargetError.new(
17
+ error: null,
18
+ host: null,
19
+ port: null
20
+ )
21
+ ```
22
+
data/docs/UpdateItem.md CHANGED
@@ -13,6 +13,7 @@
13
13
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
14
14
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
15
15
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
16
+ | **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. USC with GCP targets only. | [optional] |
16
17
  | **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] |
17
18
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
18
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -70,6 +71,7 @@ instance = Akeyless::UpdateItem.new(
70
71
  delete_protection: null,
71
72
  description: null,
72
73
  expiration_event_in: null,
74
+ gcp_sm_regions: null,
73
75
  host_provider: null,
74
76
  item_custom_fields: null,
75
77
  json: null,
data/docs/UpdateRole.md CHANGED
@@ -5,18 +5,18 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **analytics_access** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
8
- | **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
8
+ | **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own', 'scoped' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
9
9
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
10
10
  | **description** | **String** | Description of the object | [optional][default to 'default_comment'] |
11
- | **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'own' and 'all' values are supported | [optional] |
11
+ | **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'scoped' and 'all' values are supported | [optional] |
12
12
  | **event_forwarder_access** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] |
13
- | **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
13
+ | **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'scoped', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
14
14
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
15
15
  | **name** | **String** | Role name | |
16
16
  | **new_comment** | **String** | Deprecated - use description | [optional][default to 'default_comment'] |
17
17
  | **new_name** | **String** | New Role name | [optional] |
18
- | **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'own', 'all'. | [optional] |
19
- | **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'own', 'all' values are supported. | [optional] |
18
+ | **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'scoped', 'all'. | [optional] |
19
+ | **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'scoped', 'all' values are supported. | [optional] |
20
20
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
21
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
22
22
  | **usage_reports_access** | **String** | Allow this role to view Usage Report. Currently only 'none' and 'all' values are supported. | [optional] |
data/docs/UscCreate.md CHANGED
@@ -10,6 +10,7 @@
10
10
  | **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
11
11
  | **object_type** | **String** | | [optional] |
12
12
  | **pfx_password** | **String** | Optional, the passphrase that protects the private key within the pfx certificate (Relevant only for Azure KV certificates) | [optional] |
13
+ | **region** | **String** | Optional, create secret in a specific region (GCP only). If empty, a global secret will be created (provider default). | [optional] |
13
14
  | **secret_name** | **String** | Name for the new universal secrets | |
14
15
  | **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
15
16
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -30,6 +31,7 @@ instance = Akeyless::UscCreate.new(
30
31
  namespace: null,
31
32
  object_type: null,
32
33
  pfx_password: null,
34
+ region: null,
33
35
  secret_name: null,
34
36
  tags: null,
35
37
  token: null,
data/docs/UscDelete.md CHANGED
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **force_delete** | **Boolean** | Force delete objects that are soft deleted by default (relavent only for Azure target) | [optional] |
7
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
8
9
  | **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
9
10
  | **secret_id** | **String** | The universal secrets id (or name, for AWS, Azure, K8s or Hashi vault targets) to delete | |
@@ -17,6 +18,7 @@
17
18
  require 'akeyless'
18
19
 
19
20
  instance = Akeyless::UscDelete.new(
21
+ force_delete: null,
20
22
  json: null,
21
23
  namespace: null,
22
24
  secret_id: null,