akeyless 5.0.18 → 5.0.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +9 -1
- data/docs/CertificateDiscovery.md +34 -0
- data/docs/CertificateDiscoveryOutput.md +18 -0
- data/docs/CertificateMigration.md +20 -0
- data/docs/CertificatePayload.md +30 -0
- data/docs/CertificateScanTarget.md +20 -0
- data/docs/CertificateStore.md +2 -0
- data/docs/CreateRole.md +5 -5
- data/docs/CreateUSC.md +2 -0
- data/docs/GatewayCreateMigration.md +7 -1
- data/docs/GatewayUpdateMigration.md +6 -0
- data/docs/GatewayUpdateTlsCert.md +2 -0
- data/docs/GeneralConfigPart.md +6 -0
- data/docs/GetKubeExecCreds.md +1 -1
- data/docs/GetPKICertificate.md +1 -1
- data/docs/MigrationsConfigPart.md +2 -0
- data/docs/ScanResults.md +32 -0
- data/docs/SecretInfo.md +2 -0
- data/docs/TargetError.md +22 -0
- data/docs/UpdateItem.md +2 -0
- data/docs/UpdateRole.md +5 -5
- data/docs/UscCreate.md +2 -0
- data/docs/UscDelete.md +2 -0
- data/docs/V2Api.md +65 -2
- data/lib/akeyless/api/v2_api.rb +64 -0
- data/lib/akeyless/models/certificate_discovery.rb +318 -0
- data/lib/akeyless/models/certificate_discovery_output.rb +214 -0
- data/lib/akeyless/models/certificate_migration.rb +223 -0
- data/lib/akeyless/models/certificate_payload.rb +272 -0
- data/lib/akeyless/models/certificate_scan_target.rb +223 -0
- data/lib/akeyless/models/certificate_store.rb +12 -1
- data/lib/akeyless/models/create_role.rb +5 -5
- data/lib/akeyless/models/create_usc.rb +11 -1
- data/lib/akeyless/models/gateway_create_migration.rb +43 -2
- data/lib/akeyless/models/gateway_update_migration.rb +42 -1
- data/lib/akeyless/models/gateway_update_tls_cert.rb +13 -1
- data/lib/akeyless/models/general_config_part.rb +30 -1
- data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
- data/lib/akeyless/models/get_pki_certificate.rb +1 -1
- data/lib/akeyless/models/migrations_config_part.rb +12 -1
- data/lib/akeyless/models/scan_results.rb +282 -0
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/target_error.rb +233 -0
- data/lib/akeyless/models/update_item.rb +11 -1
- data/lib/akeyless/models/update_role.rb +5 -5
- data/lib/akeyless/models/usc_create.rb +11 -1
- data/lib/akeyless/models/usc_delete.rb +11 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +7 -0
- data/spec/models/certificate_discovery_output_spec.rb +36 -0
- data/spec/models/certificate_discovery_spec.rb +84 -0
- data/spec/models/certificate_migration_spec.rb +42 -0
- data/spec/models/certificate_payload_spec.rb +72 -0
- data/spec/models/certificate_scan_target_spec.rb +42 -0
- data/spec/models/scan_results_spec.rb +78 -0
- data/spec/models/target_error_spec.rb +48 -0
- metadata +30 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: ea9a1fec685c0eff277f661e0758adcb9cc8f46c6b9534a6889e9d7fc1b1e5d8
|
|
4
|
+
data.tar.gz: b0c76f83dc344e72c0c1f99ab073eb09ec3eff5a6f4a364e83d86e988b608f7e
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 18d2379a718c54600b89bd919b0a1e98176f9cc4c7616a8901768aecacb4525a497460ae74dc0fb60568673dddd4eea91a04c991ddff0920820a869be6ec19f5
|
|
7
|
+
data.tar.gz: c3643f8dd4a5712184a8015757535998fd80e6067a21fb3ecca815d27096381f8dd4b338eed83ebe0c92d9afc3550ee322a05865f86312a4c14fcb494d8bd7b2
|
data/README.md
CHANGED
|
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
|
8
8
|
|
|
9
9
|
- API version: 3.0
|
|
10
|
-
- Package version: 5.0.
|
|
10
|
+
- Package version: 5.0.20
|
|
11
11
|
- Generator version: 7.10.0
|
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
|
@@ -101,6 +101,7 @@ Class | Method | HTTP request | Description
|
|
|
101
101
|
*Akeyless::V2Api* | [**auth_method_update_saml**](docs/V2Api.md#auth_method_update_saml) | **POST** /auth-method-update-saml |
|
|
102
102
|
*Akeyless::V2Api* | [**auth_method_update_universal_identity**](docs/V2Api.md#auth_method_update_universal_identity) | **POST** /auth-method-update-universal-identity |
|
|
103
103
|
*Akeyless::V2Api* | [**calc_password_security_info**](docs/V2Api.md#calc_password_security_info) | **POST** /calc-password-security-info |
|
|
104
|
+
*Akeyless::V2Api* | [**certificate_discovery**](docs/V2Api.md#certificate_discovery) | **POST** /certificate-discovery |
|
|
104
105
|
*Akeyless::V2Api* | [**change_admin_account_password**](docs/V2Api.md#change_admin_account_password) | **POST** /change-admin-account-password |
|
|
105
106
|
*Akeyless::V2Api* | [**configure**](docs/V2Api.md#configure) | **POST** /configure |
|
|
106
107
|
*Akeyless::V2Api* | [**connect**](docs/V2Api.md#connect) | **POST** /connect |
|
|
@@ -755,10 +756,15 @@ Class | Method | HTTP request | Description
|
|
|
755
756
|
- [Akeyless::CertAccessRules](docs/CertAccessRules.md)
|
|
756
757
|
- [Akeyless::CertificateAnalyticAggregation](docs/CertificateAnalyticAggregation.md)
|
|
757
758
|
- [Akeyless::CertificateChainInfo](docs/CertificateChainInfo.md)
|
|
759
|
+
- [Akeyless::CertificateDiscovery](docs/CertificateDiscovery.md)
|
|
760
|
+
- [Akeyless::CertificateDiscoveryOutput](docs/CertificateDiscoveryOutput.md)
|
|
758
761
|
- [Akeyless::CertificateExpirationEvent](docs/CertificateExpirationEvent.md)
|
|
759
762
|
- [Akeyless::CertificateExpirationEventsSettings](docs/CertificateExpirationEventsSettings.md)
|
|
760
763
|
- [Akeyless::CertificateInfo](docs/CertificateInfo.md)
|
|
761
764
|
- [Akeyless::CertificateIssueInfo](docs/CertificateIssueInfo.md)
|
|
765
|
+
- [Akeyless::CertificateMigration](docs/CertificateMigration.md)
|
|
766
|
+
- [Akeyless::CertificatePayload](docs/CertificatePayload.md)
|
|
767
|
+
- [Akeyless::CertificateScanTarget](docs/CertificateScanTarget.md)
|
|
762
768
|
- [Akeyless::CertificateStore](docs/CertificateStore.md)
|
|
763
769
|
- [Akeyless::CertificateTemplateInfo](docs/CertificateTemplateInfo.md)
|
|
764
770
|
- [Akeyless::CertificateVersionInfo](docs/CertificateVersionInfo.md)
|
|
@@ -1529,6 +1535,7 @@ Class | Method | HTTP request | Description
|
|
|
1529
1535
|
- [Akeyless::SSHCertificateIssueDetails](docs/SSHCertificateIssueDetails.md)
|
|
1530
1536
|
- [Akeyless::SSHTargetDetails](docs/SSHTargetDetails.md)
|
|
1531
1537
|
- [Akeyless::SalesforceTargetDetails](docs/SalesforceTargetDetails.md)
|
|
1538
|
+
- [Akeyless::ScanResults](docs/ScanResults.md)
|
|
1532
1539
|
- [Akeyless::SecretInfo](docs/SecretInfo.md)
|
|
1533
1540
|
- [Akeyless::SecretSyncOutput](docs/SecretSyncOutput.md)
|
|
1534
1541
|
- [Akeyless::SectigoTargetDetails](docs/SectigoTargetDetails.md)
|
|
@@ -1603,6 +1610,7 @@ Class | Method | HTTP request | Description
|
|
|
1603
1610
|
- [Akeyless::TargetCreateWindows](docs/TargetCreateWindows.md)
|
|
1604
1611
|
- [Akeyless::TargetCreateZeroSSL](docs/TargetCreateZeroSSL.md)
|
|
1605
1612
|
- [Akeyless::TargetDelete](docs/TargetDelete.md)
|
|
1613
|
+
- [Akeyless::TargetError](docs/TargetError.md)
|
|
1606
1614
|
- [Akeyless::TargetGet](docs/TargetGet.md)
|
|
1607
1615
|
- [Akeyless::TargetGetDetails](docs/TargetGetDetails.md)
|
|
1608
1616
|
- [Akeyless::TargetItemAssociation](docs/TargetItemAssociation.md)
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
# Akeyless::CertificateDiscovery
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **debug** | **Boolean** | Debug mode | [optional][default to false] |
|
|
8
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
9
|
+
| **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to discovery | |
|
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
11
|
+
| **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
|
|
12
|
+
| **protection_key** | **String** | The name of the key that protects the certificate value | [optional] |
|
|
13
|
+
| **target_location** | **String** | The folder where the results will be saved | |
|
|
14
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
15
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
16
|
+
|
|
17
|
+
## Example
|
|
18
|
+
|
|
19
|
+
```ruby
|
|
20
|
+
require 'akeyless'
|
|
21
|
+
|
|
22
|
+
instance = Akeyless::CertificateDiscovery.new(
|
|
23
|
+
debug: null,
|
|
24
|
+
expiration_event_in: null,
|
|
25
|
+
hosts: null,
|
|
26
|
+
json: null,
|
|
27
|
+
port_ranges: null,
|
|
28
|
+
protection_key: null,
|
|
29
|
+
target_location: null,
|
|
30
|
+
token: null,
|
|
31
|
+
uid_token: null
|
|
32
|
+
)
|
|
33
|
+
```
|
|
34
|
+
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# Akeyless::CertificateDiscoveryOutput
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **results** | [**ScanResults**](ScanResults.md) | | [optional] |
|
|
8
|
+
|
|
9
|
+
## Example
|
|
10
|
+
|
|
11
|
+
```ruby
|
|
12
|
+
require 'akeyless'
|
|
13
|
+
|
|
14
|
+
instance = Akeyless::CertificateDiscoveryOutput.new(
|
|
15
|
+
results: null
|
|
16
|
+
)
|
|
17
|
+
```
|
|
18
|
+
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
# Akeyless::CertificateMigration
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **general** | [**MigrationGeneral**](MigrationGeneral.md) | | [optional] |
|
|
8
|
+
| **payload** | [**CertificatePayload**](CertificatePayload.md) | | [optional] |
|
|
9
|
+
|
|
10
|
+
## Example
|
|
11
|
+
|
|
12
|
+
```ruby
|
|
13
|
+
require 'akeyless'
|
|
14
|
+
|
|
15
|
+
instance = Akeyless::CertificateMigration.new(
|
|
16
|
+
general: null,
|
|
17
|
+
payload: null
|
|
18
|
+
)
|
|
19
|
+
```
|
|
20
|
+
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
# Akeyless::CertificatePayload
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
|
|
8
|
+
| **folder** | **String** | | [optional] |
|
|
9
|
+
| **max_dial_timeout** | **Integer** | | [optional] |
|
|
10
|
+
| **max_scan_duration** | **Integer** | | [optional] |
|
|
11
|
+
| **max_workers** | **Integer** | | [optional] |
|
|
12
|
+
| **port_ranges** | **String** | | [optional] |
|
|
13
|
+
| **targets** | [**Array<CertificateScanTarget>**](CertificateScanTarget.md) | | [optional] |
|
|
14
|
+
|
|
15
|
+
## Example
|
|
16
|
+
|
|
17
|
+
```ruby
|
|
18
|
+
require 'akeyless'
|
|
19
|
+
|
|
20
|
+
instance = Akeyless::CertificatePayload.new(
|
|
21
|
+
expiration_events: null,
|
|
22
|
+
folder: null,
|
|
23
|
+
max_dial_timeout: null,
|
|
24
|
+
max_scan_duration: null,
|
|
25
|
+
max_workers: null,
|
|
26
|
+
port_ranges: null,
|
|
27
|
+
targets: null
|
|
28
|
+
)
|
|
29
|
+
```
|
|
30
|
+
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
# Akeyless::CertificateScanTarget
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **host** | **String** | | [optional] |
|
|
8
|
+
| **port_ranges** | **String** | | [optional] |
|
|
9
|
+
|
|
10
|
+
## Example
|
|
11
|
+
|
|
12
|
+
```ruby
|
|
13
|
+
require 'akeyless'
|
|
14
|
+
|
|
15
|
+
instance = Akeyless::CertificateScanTarget.new(
|
|
16
|
+
host: null,
|
|
17
|
+
port_ranges: null
|
|
18
|
+
)
|
|
19
|
+
```
|
|
20
|
+
|
data/docs/CertificateStore.md
CHANGED
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **certificate_pem** | **String** | | [optional] |
|
|
8
8
|
| **common_name** | **String** | | [optional] |
|
|
9
9
|
| **expiration_date** | **Time** | | [optional] |
|
|
10
|
+
| **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
|
|
10
11
|
| **name** | **String** | | [optional] |
|
|
11
12
|
|
|
12
13
|
## Example
|
|
@@ -18,6 +19,7 @@ instance = Akeyless::CertificateStore.new(
|
|
|
18
19
|
certificate_pem: null,
|
|
19
20
|
common_name: null,
|
|
20
21
|
expiration_date: null,
|
|
22
|
+
expiration_events: null,
|
|
21
23
|
name: null
|
|
22
24
|
)
|
|
23
25
|
```
|
data/docs/CreateRole.md
CHANGED
|
@@ -5,18 +5,18 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **analytics_access** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
|
|
8
|
-
| **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
|
|
8
|
+
| **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own', 'scoped' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
|
|
9
9
|
| **comment** | **String** | Deprecated - use description | [optional] |
|
|
10
10
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
11
11
|
| **description** | **String** | Description of the object | [optional] |
|
|
12
|
-
| **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', '
|
|
12
|
+
| **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'scoped' and 'all' values are supported | [optional] |
|
|
13
13
|
| **event_forwarders_access** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] |
|
|
14
14
|
| **event_forwarders_name** | **Array<String>** | Allow this role to manage the following Event Forwarders. | [optional] |
|
|
15
|
-
| **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', '
|
|
15
|
+
| **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'scoped', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
|
|
16
16
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
17
17
|
| **name** | **String** | Role name | |
|
|
18
|
-
| **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: '
|
|
19
|
-
| **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', '
|
|
18
|
+
| **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'scoped', 'all'. | [optional] |
|
|
19
|
+
| **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'scoped', 'all' values are supported. | [optional] |
|
|
20
20
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
21
21
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
22
22
|
| **usage_reports_access** | **String** | Allow this role to view Usage Report. Currently only 'none' and 'all' values are supported. | [optional] |
|
data/docs/CreateUSC.md
CHANGED
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
9
|
| **description** | **String** | Description of the Universal Secrets Connector | [optional] |
|
|
10
10
|
| **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
|
|
11
|
+
| **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. | [optional] |
|
|
11
12
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
14
|
| **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
|
|
@@ -29,6 +30,7 @@ instance = Akeyless::CreateUSC.new(
|
|
|
29
30
|
delete_protection: null,
|
|
30
31
|
description: null,
|
|
31
32
|
gcp_project_id: null,
|
|
33
|
+
gcp_sm_regions: null,
|
|
32
34
|
item_custom_fields: null,
|
|
33
35
|
json: null,
|
|
34
36
|
k8s_namespace: null,
|
|
@@ -35,11 +35,13 @@
|
|
|
35
35
|
| **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
|
|
36
36
|
| **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
|
|
37
37
|
| **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
|
|
38
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
38
39
|
| **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
|
|
39
40
|
| **hashi_json** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true'] |
|
|
40
41
|
| **hashi_ns** | **Array<String>** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional] |
|
|
41
42
|
| **hashi_token** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional] |
|
|
42
43
|
| **hashi_url** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional] |
|
|
44
|
+
| **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan | |
|
|
43
45
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
44
46
|
| **k8s_ca_certificate** | **Array<Integer>** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional] |
|
|
45
47
|
| **k8s_client_certificate** | **Array<Integer>** | K8s Client certificate with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Certificate Authentication method) | [optional] |
|
|
@@ -51,6 +53,7 @@
|
|
|
51
53
|
| **k8s_url** | **String** | K8s API Server URL, e.g. https://k8s-api.mycompany.com:6443 (relevant only for K8s migration) | [optional] |
|
|
52
54
|
| **k8s_username** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional] |
|
|
53
55
|
| **name** | **String** | Migration name | |
|
|
56
|
+
| **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
|
|
54
57
|
| **protection_key** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional] |
|
|
55
58
|
| **si_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional] |
|
|
56
59
|
| **si_rotation_hour** | **Integer** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional] |
|
|
@@ -62,7 +65,7 @@
|
|
|
62
65
|
| **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
|
|
63
66
|
| **target_location** | **String** | Target location in Akeyless for imported secrets | |
|
|
64
67
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
65
|
-
| **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional] |
|
|
68
|
+
| **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory/server_inventory/certificate) | [optional] |
|
|
66
69
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
67
70
|
|
|
68
71
|
## Example
|
|
@@ -102,11 +105,13 @@ instance = Akeyless::GatewayCreateMigration.new(
|
|
|
102
105
|
azure_kv_name: null,
|
|
103
106
|
azure_secret: null,
|
|
104
107
|
azure_tenant_id: null,
|
|
108
|
+
expiration_event_in: null,
|
|
105
109
|
gcp_key: null,
|
|
106
110
|
hashi_json: null,
|
|
107
111
|
hashi_ns: null,
|
|
108
112
|
hashi_token: null,
|
|
109
113
|
hashi_url: null,
|
|
114
|
+
hosts: null,
|
|
110
115
|
json: null,
|
|
111
116
|
k8s_ca_certificate: null,
|
|
112
117
|
k8s_client_certificate: null,
|
|
@@ -118,6 +123,7 @@ instance = Akeyless::GatewayCreateMigration.new(
|
|
|
118
123
|
k8s_url: null,
|
|
119
124
|
k8s_username: null,
|
|
120
125
|
name: null,
|
|
126
|
+
port_ranges: null,
|
|
121
127
|
protection_key: null,
|
|
122
128
|
si_auto_rotate: null,
|
|
123
129
|
si_rotation_hour: null,
|
|
@@ -35,11 +35,13 @@
|
|
|
35
35
|
| **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
|
|
36
36
|
| **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
|
|
37
37
|
| **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
|
|
38
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
38
39
|
| **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
|
|
39
40
|
| **hashi_json** | **String** | Import secret key as json value or independent secrets (relevant only for HasiCorp Vault migration) [true/false] | [optional][default to 'true'] |
|
|
40
41
|
| **hashi_ns** | **Array<String>** | HashiCorp Vault Namespaces is a comma-separated list of namespaces which need to be imported into Akeyless Vault. For every provided namespace, all its child namespaces are imported as well, e.g. nmsp/subnmsp1/subnmsp2,nmsp/anothernmsp. By default, import all namespaces (relevant only for HasiCorp Vault migration) | [optional] |
|
|
41
42
|
| **hashi_token** | **String** | HashiCorp Vault access token with sufficient permissions to preform list & read operations on secrets objects (relevant only for HasiCorp Vault migration) | [optional] |
|
|
42
43
|
| **hashi_url** | **String** | HashiCorp Vault API URL, e.g. https://vault-mgr01:8200 (relevant only for HasiCorp Vault migration) | [optional] |
|
|
44
|
+
| **hosts** | **String** | A comma separated list of IPs, CIDR ranges, or DNS names to scan | |
|
|
43
45
|
| **id** | **String** | Migration ID (Can be retrieved with gateway-list-migration command) | [optional] |
|
|
44
46
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
45
47
|
| **k8s_ca_certificate** | **Array<Integer>** | For Certificate Authentication method K8s Cluster CA certificate (relevant only for K8s migration with Certificate Authentication method) | [optional] |
|
|
@@ -53,6 +55,7 @@
|
|
|
53
55
|
| **k8s_username** | **String** | For Password Authentication method K8s Client username with sufficient permission to list and get secrets in the namespace(s) you selected (relevant only for K8s migration with Password Authentication method) | [optional] |
|
|
54
56
|
| **name** | **String** | Migration name | [optional] |
|
|
55
57
|
| **new_name** | **String** | New migration name | [optional] |
|
|
58
|
+
| **port_ranges** | **String** | A comma separated list of port ranges Examples: \"80,443\" or \"80,443,8080-8090\" or \"443\" | [optional][default to '443'] |
|
|
56
59
|
| **protection_key** | **String** | The name of the key that protects the classic key value (if empty, the account default key will be used) | [optional] |
|
|
57
60
|
| **si_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --si-rotation-interval and --si-rotation-hour parameters (Relevant only for Server Inventory migration) | [optional] |
|
|
58
61
|
| **si_rotation_hour** | **Integer** | The hour of the scheduled rotation in UTC (Relevant only for Server Inventory migration) | [optional] |
|
|
@@ -103,11 +106,13 @@ instance = Akeyless::GatewayUpdateMigration.new(
|
|
|
103
106
|
azure_kv_name: null,
|
|
104
107
|
azure_secret: null,
|
|
105
108
|
azure_tenant_id: null,
|
|
109
|
+
expiration_event_in: null,
|
|
106
110
|
gcp_key: null,
|
|
107
111
|
hashi_json: null,
|
|
108
112
|
hashi_ns: null,
|
|
109
113
|
hashi_token: null,
|
|
110
114
|
hashi_url: null,
|
|
115
|
+
hosts: null,
|
|
111
116
|
id: null,
|
|
112
117
|
json: null,
|
|
113
118
|
k8s_ca_certificate: null,
|
|
@@ -121,6 +126,7 @@ instance = Akeyless::GatewayUpdateMigration.new(
|
|
|
121
126
|
k8s_username: null,
|
|
122
127
|
name: null,
|
|
123
128
|
new_name: null,
|
|
129
|
+
port_ranges: null,
|
|
124
130
|
protection_key: null,
|
|
125
131
|
si_auto_rotate: null,
|
|
126
132
|
si_rotation_hour: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **cert_data** | **String** | TLS Certificate (base64 encoded) | [optional] |
|
|
8
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
9
10
|
| **key_data** | **String** | TLS Private Key (base64 encoded) | [optional] |
|
|
10
11
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -17,6 +18,7 @@ require 'akeyless'
|
|
|
17
18
|
|
|
18
19
|
instance = Akeyless::GatewayUpdateTlsCert.new(
|
|
19
20
|
cert_data: null,
|
|
21
|
+
expiration_event_in: null,
|
|
20
22
|
json: null,
|
|
21
23
|
key_data: null,
|
|
22
24
|
token: null,
|
data/docs/GeneralConfigPart.md
CHANGED
|
@@ -17,6 +17,9 @@
|
|
|
17
17
|
| **notify_on_status_change** | **Boolean** | | [optional] |
|
|
18
18
|
| **tcp_port** | **String** | | [optional] |
|
|
19
19
|
| **tls_cert** | **String** | | [optional] |
|
|
20
|
+
| **tls_cert_common_name** | **String** | | [optional] |
|
|
21
|
+
| **tls_cert_expiration_date** | **Time** | | [optional] |
|
|
22
|
+
| **tls_cert_expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
|
|
20
23
|
| **tls_key** | **String** | | [optional] |
|
|
21
24
|
|
|
22
25
|
## Example
|
|
@@ -38,6 +41,9 @@ instance = Akeyless::GeneralConfigPart.new(
|
|
|
38
41
|
notify_on_status_change: null,
|
|
39
42
|
tcp_port: null,
|
|
40
43
|
tls_cert: null,
|
|
44
|
+
tls_cert_common_name: null,
|
|
45
|
+
tls_cert_expiration_date: null,
|
|
46
|
+
tls_cert_expiration_events: null,
|
|
41
47
|
tls_key: null
|
|
42
48
|
)
|
|
43
49
|
```
|
data/docs/GetKubeExecCreds.md
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
|
10
10
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
|
11
11
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
|
12
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
|
12
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
|
|
13
13
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
15
15
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/GetPKICertificate.md
CHANGED
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
|
9
9
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
|
10
10
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
|
11
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
|
11
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
|
|
12
12
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **active_directory_migrations** | [**Array<ActiveDirectoryMigration>**](ActiveDirectoryMigration.md) | | [optional] |
|
|
8
8
|
| **aws_secrets_migrations** | [**Array<AWSSecretsMigration>**](AWSSecretsMigration.md) | | [optional] |
|
|
9
9
|
| **azure_kv_migrations** | [**Array<AzureKeyVaultMigration>**](AzureKeyVaultMigration.md) | | [optional] |
|
|
10
|
+
| **certificate_migrations** | [**Array<CertificateMigration>**](CertificateMigration.md) | | [optional] |
|
|
10
11
|
| **gcp_secrets_migrations** | [**Array<GCPSecretsMigration>**](GCPSecretsMigration.md) | | [optional] |
|
|
11
12
|
| **hashi_migrations** | [**Array<HashiMigration>**](HashiMigration.md) | | [optional] |
|
|
12
13
|
| **k8s_migrations** | [**Array<K8SMigration>**](K8SMigration.md) | | [optional] |
|
|
@@ -23,6 +24,7 @@ instance = Akeyless::MigrationsConfigPart.new(
|
|
|
23
24
|
active_directory_migrations: null,
|
|
24
25
|
aws_secrets_migrations: null,
|
|
25
26
|
azure_kv_migrations: null,
|
|
27
|
+
certificate_migrations: null,
|
|
26
28
|
gcp_secrets_migrations: null,
|
|
27
29
|
hashi_migrations: null,
|
|
28
30
|
k8s_migrations: null,
|
data/docs/ScanResults.md
ADDED
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
# Akeyless::ScanResults
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **count_existing** | **Integer** | | [optional] |
|
|
8
|
+
| **count_failed** | **Integer** | | [optional] |
|
|
9
|
+
| **count_hosts** | **Integer** | | [optional] |
|
|
10
|
+
| **count_new** | **Integer** | | [optional] |
|
|
11
|
+
| **count_subdomains** | **Integer** | | [optional] |
|
|
12
|
+
| **error** | **String** | | [optional] |
|
|
13
|
+
| **failed_targets** | [**Array<TargetError>**](TargetError.md) | | [optional] |
|
|
14
|
+
| **item_names** | **Array<String>** | | [optional] |
|
|
15
|
+
|
|
16
|
+
## Example
|
|
17
|
+
|
|
18
|
+
```ruby
|
|
19
|
+
require 'akeyless'
|
|
20
|
+
|
|
21
|
+
instance = Akeyless::ScanResults.new(
|
|
22
|
+
count_existing: null,
|
|
23
|
+
count_failed: null,
|
|
24
|
+
count_hosts: null,
|
|
25
|
+
count_new: null,
|
|
26
|
+
count_subdomains: null,
|
|
27
|
+
error: null,
|
|
28
|
+
failed_targets: null,
|
|
29
|
+
item_names: null
|
|
30
|
+
)
|
|
31
|
+
```
|
|
32
|
+
|
data/docs/SecretInfo.md
CHANGED
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
| **last_retrieved** | **Time** | | [optional] |
|
|
12
12
|
| **location** | **Object** | | [optional] |
|
|
13
13
|
| **name** | **String** | | [optional] |
|
|
14
|
+
| **region** | **String** | | [optional] |
|
|
14
15
|
| **secret_id** | **String** | | [optional] |
|
|
15
16
|
| **status** | **Boolean** | | [optional] |
|
|
16
17
|
| **tags** | **Hash<String, String>** | | [optional] |
|
|
@@ -31,6 +32,7 @@ instance = Akeyless::SecretInfo.new(
|
|
|
31
32
|
last_retrieved: null,
|
|
32
33
|
location: null,
|
|
33
34
|
name: null,
|
|
35
|
+
region: null,
|
|
34
36
|
secret_id: null,
|
|
35
37
|
status: null,
|
|
36
38
|
tags: null,
|
data/docs/TargetError.md
ADDED
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
# Akeyless::TargetError
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **error** | **String** | | [optional] |
|
|
8
|
+
| **host** | **String** | | [optional] |
|
|
9
|
+
| **port** | **Integer** | | [optional] |
|
|
10
|
+
|
|
11
|
+
## Example
|
|
12
|
+
|
|
13
|
+
```ruby
|
|
14
|
+
require 'akeyless'
|
|
15
|
+
|
|
16
|
+
instance = Akeyless::TargetError.new(
|
|
17
|
+
error: null,
|
|
18
|
+
host: null,
|
|
19
|
+
port: null
|
|
20
|
+
)
|
|
21
|
+
```
|
|
22
|
+
|
data/docs/UpdateItem.md
CHANGED
|
@@ -13,6 +13,7 @@
|
|
|
13
13
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
14
14
|
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
|
15
15
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
16
|
+
| **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. USC with GCP targets only. | [optional] |
|
|
16
17
|
| **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] |
|
|
17
18
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
18
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -70,6 +71,7 @@ instance = Akeyless::UpdateItem.new(
|
|
|
70
71
|
delete_protection: null,
|
|
71
72
|
description: null,
|
|
72
73
|
expiration_event_in: null,
|
|
74
|
+
gcp_sm_regions: null,
|
|
73
75
|
host_provider: null,
|
|
74
76
|
item_custom_fields: null,
|
|
75
77
|
json: null,
|
data/docs/UpdateRole.md
CHANGED
|
@@ -5,18 +5,18 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **analytics_access** | **String** | Allow this role to view analytics. Currently only 'none', 'own', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
|
|
8
|
-
| **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
|
|
8
|
+
| **audit_access** | **String** | Allow this role to view audit logs. Currently only 'none', 'own', 'scoped' and 'all' values are supported, allowing associated auth methods to view audit logs produced by the same auth methods. | [optional] |
|
|
9
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
10
10
|
| **description** | **String** | Description of the object | [optional][default to 'default_comment'] |
|
|
11
|
-
| **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', '
|
|
11
|
+
| **event_center_access** | **String** | Allow this role to view Event Center. Currently only 'none', 'scoped' and 'all' values are supported | [optional] |
|
|
12
12
|
| **event_forwarder_access** | **String** | Allow this role to manage Event Forwarders. Currently only 'none' and 'all' values are supported. | [optional] |
|
|
13
|
-
| **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', '
|
|
13
|
+
| **gw_analytics_access** | **String** | Allow this role to view gw analytics. Currently only 'none', 'scoped', 'all' values are supported, allowing associated auth methods to view reports produced by the same auth methods. | [optional] |
|
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
15
15
|
| **name** | **String** | Role name | |
|
|
16
16
|
| **new_comment** | **String** | Deprecated - use description | [optional][default to 'default_comment'] |
|
|
17
17
|
| **new_name** | **String** | New Role name | [optional] |
|
|
18
|
-
| **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: '
|
|
19
|
-
| **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', '
|
|
18
|
+
| **reverse_rbac_access** | **String** | Allow this role to view Reverse RBAC. Supported values: 'scoped', 'all'. | [optional] |
|
|
19
|
+
| **sra_reports_access** | **String** | Allow this role to view SRA Clusters. Currently only 'none', 'scoped', 'all' values are supported. | [optional] |
|
|
20
20
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
21
21
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
22
22
|
| **usage_reports_access** | **String** | Allow this role to view Usage Report. Currently only 'none' and 'all' values are supported. | [optional] |
|
data/docs/UscCreate.md
CHANGED
|
@@ -10,6 +10,7 @@
|
|
|
10
10
|
| **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
|
|
11
11
|
| **object_type** | **String** | | [optional] |
|
|
12
12
|
| **pfx_password** | **String** | Optional, the passphrase that protects the private key within the pfx certificate (Relevant only for Azure KV certificates) | [optional] |
|
|
13
|
+
| **region** | **String** | Optional, create secret in a specific region (GCP only). If empty, a global secret will be created (provider default). | [optional] |
|
|
13
14
|
| **secret_name** | **String** | Name for the new universal secrets | |
|
|
14
15
|
| **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
|
|
15
16
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -30,6 +31,7 @@ instance = Akeyless::UscCreate.new(
|
|
|
30
31
|
namespace: null,
|
|
31
32
|
object_type: null,
|
|
32
33
|
pfx_password: null,
|
|
34
|
+
region: null,
|
|
33
35
|
secret_name: null,
|
|
34
36
|
tags: null,
|
|
35
37
|
token: null,
|
data/docs/UscDelete.md
CHANGED
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **force_delete** | **Boolean** | Force delete objects that are soft deleted by default (relavent only for Azure target) | [optional] |
|
|
7
8
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
9
|
| **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
|
|
9
10
|
| **secret_id** | **String** | The universal secrets id (or name, for AWS, Azure, K8s or Hashi vault targets) to delete | |
|
|
@@ -17,6 +18,7 @@
|
|
|
17
18
|
require 'akeyless'
|
|
18
19
|
|
|
19
20
|
instance = Akeyless::UscDelete.new(
|
|
21
|
+
force_delete: null,
|
|
20
22
|
json: null,
|
|
21
23
|
namespace: null,
|
|
22
24
|
secret_id: null,
|