akeyless 5.0.19 → 5.0.20

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: '06069ce01fc049c064314aa478e51a6452b825df093942c9c22058a21becbb49'
4
- data.tar.gz: 70d4fd955788d83e20eaeaa51f18287c7d017d389a15fd9ec63b9edc5897ece8
3
+ metadata.gz: ea9a1fec685c0eff277f661e0758adcb9cc8f46c6b9534a6889e9d7fc1b1e5d8
4
+ data.tar.gz: b0c76f83dc344e72c0c1f99ab073eb09ec3eff5a6f4a364e83d86e988b608f7e
5
5
  SHA512:
6
- metadata.gz: 45960f7a5a0df7034fb1fc999641f3d1356a8cc9a95d61bd7a6f34df6243537894b4c3389e0b274da32631f6d4d3f01dcf6e28483bed26f63a7d0d5249ecfb71
7
- data.tar.gz: a2bb67cad1e05686881720f441248c69e6176ae3576231aa902372ef2c76de6dc1cb7aeddcaf36f8086b6eee0eb52d692a9fb419739445a6a60aa348b1461966
6
+ metadata.gz: 18d2379a718c54600b89bd919b0a1e98176f9cc4c7616a8901768aecacb4525a497460ae74dc0fb60568673dddd4eea91a04c991ddff0920820a869be6ec19f5
7
+ data.tar.gz: c3643f8dd4a5712184a8015757535998fd80e6067a21fb3ecca815d27096381f8dd4b338eed83ebe0c92d9afc3550ee322a05865f86312a4c14fcb494d8bd7b2
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.19
10
+ - Package version: 5.0.20
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -7,6 +7,7 @@
7
7
  | **certificate_pem** | **String** | | [optional] |
8
8
  | **common_name** | **String** | | [optional] |
9
9
  | **expiration_date** | **Time** | | [optional] |
10
+ | **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
10
11
  | **name** | **String** | | [optional] |
11
12
 
12
13
  ## Example
@@ -18,6 +19,7 @@ instance = Akeyless::CertificateStore.new(
18
19
  certificate_pem: null,
19
20
  common_name: null,
20
21
  expiration_date: null,
22
+ expiration_events: null,
21
23
  name: null
22
24
  )
23
25
  ```
data/docs/CreateUSC.md CHANGED
@@ -8,6 +8,7 @@
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the Universal Secrets Connector | [optional] |
10
10
  | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
11
+ | **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. | [optional] |
11
12
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
12
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
13
14
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
@@ -29,6 +30,7 @@ instance = Akeyless::CreateUSC.new(
29
30
  delete_protection: null,
30
31
  description: null,
31
32
  gcp_project_id: null,
33
+ gcp_sm_regions: null,
32
34
  item_custom_fields: null,
33
35
  json: null,
34
36
  k8s_namespace: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **cert_data** | **String** | TLS Certificate (base64 encoded) | [optional] |
8
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
8
9
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
10
  | **key_data** | **String** | TLS Private Key (base64 encoded) | [optional] |
10
11
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -17,6 +18,7 @@ require 'akeyless'
17
18
 
18
19
  instance = Akeyless::GatewayUpdateTlsCert.new(
19
20
  cert_data: null,
21
+ expiration_event_in: null,
20
22
  json: null,
21
23
  key_data: null,
22
24
  token: null,
@@ -17,6 +17,9 @@
17
17
  | **notify_on_status_change** | **Boolean** | | [optional] |
18
18
  | **tcp_port** | **String** | | [optional] |
19
19
  | **tls_cert** | **String** | | [optional] |
20
+ | **tls_cert_common_name** | **String** | | [optional] |
21
+ | **tls_cert_expiration_date** | **Time** | | [optional] |
22
+ | **tls_cert_expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
20
23
  | **tls_key** | **String** | | [optional] |
21
24
 
22
25
  ## Example
@@ -38,6 +41,9 @@ instance = Akeyless::GeneralConfigPart.new(
38
41
  notify_on_status_change: null,
39
42
  tcp_port: null,
40
43
  tls_cert: null,
44
+ tls_cert_common_name: null,
45
+ tls_cert_expiration_date: null,
46
+ tls_cert_expiration_events: null,
41
47
  tls_key: null
42
48
  )
43
49
  ```
@@ -9,7 +9,7 @@
9
9
  | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
10
10
  | **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
11
11
  | **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
12
- | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
12
+ | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
13
13
  | **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
14
14
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
15
15
  | **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
@@ -8,7 +8,7 @@
8
8
  | **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
9
9
  | **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
10
10
  | **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
11
- | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
11
+ | **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
12
12
  | **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
13
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
14
  | **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
data/docs/SecretInfo.md CHANGED
@@ -11,6 +11,7 @@
11
11
  | **last_retrieved** | **Time** | | [optional] |
12
12
  | **location** | **Object** | | [optional] |
13
13
  | **name** | **String** | | [optional] |
14
+ | **region** | **String** | | [optional] |
14
15
  | **secret_id** | **String** | | [optional] |
15
16
  | **status** | **Boolean** | | [optional] |
16
17
  | **tags** | **Hash<String, String>** | | [optional] |
@@ -31,6 +32,7 @@ instance = Akeyless::SecretInfo.new(
31
32
  last_retrieved: null,
32
33
  location: null,
33
34
  name: null,
35
+ region: null,
34
36
  secret_id: null,
35
37
  status: null,
36
38
  tags: null,
data/docs/UpdateItem.md CHANGED
@@ -13,6 +13,7 @@
13
13
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
14
14
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
15
15
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
16
+ | **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. USC with GCP targets only. | [optional] |
16
17
  | **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] |
17
18
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
18
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -70,6 +71,7 @@ instance = Akeyless::UpdateItem.new(
70
71
  delete_protection: null,
71
72
  description: null,
72
73
  expiration_event_in: null,
74
+ gcp_sm_regions: null,
73
75
  host_provider: null,
74
76
  item_custom_fields: null,
75
77
  json: null,
data/docs/UscCreate.md CHANGED
@@ -10,6 +10,7 @@
10
10
  | **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
11
11
  | **object_type** | **String** | | [optional] |
12
12
  | **pfx_password** | **String** | Optional, the passphrase that protects the private key within the pfx certificate (Relevant only for Azure KV certificates) | [optional] |
13
+ | **region** | **String** | Optional, create secret in a specific region (GCP only). If empty, a global secret will be created (provider default). | [optional] |
13
14
  | **secret_name** | **String** | Name for the new universal secrets | |
14
15
  | **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
15
16
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -30,6 +31,7 @@ instance = Akeyless::UscCreate.new(
30
31
  namespace: null,
31
32
  object_type: null,
32
33
  pfx_password: null,
34
+ region: null,
33
35
  secret_name: null,
34
36
  tags: null,
35
37
  token: null,
@@ -21,6 +21,8 @@ module Akeyless
21
21
 
22
22
  attr_accessor :expiration_date
23
23
 
24
+ attr_accessor :expiration_events
25
+
24
26
  attr_accessor :name
25
27
 
26
28
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -29,6 +31,7 @@ module Akeyless
29
31
  :'certificate_pem' => :'certificate_pem',
30
32
  :'common_name' => :'common_name',
31
33
  :'expiration_date' => :'expiration_date',
34
+ :'expiration_events' => :'expiration_events',
32
35
  :'name' => :'name'
33
36
  }
34
37
  end
@@ -44,6 +47,7 @@ module Akeyless
44
47
  :'certificate_pem' => :'String',
45
48
  :'common_name' => :'String',
46
49
  :'expiration_date' => :'Time',
50
+ :'expiration_events' => :'Array<CertificateExpirationEvent>',
47
51
  :'name' => :'String'
48
52
  }
49
53
  end
@@ -81,6 +85,12 @@ module Akeyless
81
85
  self.expiration_date = attributes[:'expiration_date']
82
86
  end
83
87
 
88
+ if attributes.key?(:'expiration_events')
89
+ if (value = attributes[:'expiration_events']).is_a?(Array)
90
+ self.expiration_events = value
91
+ end
92
+ end
93
+
84
94
  if attributes.key?(:'name')
85
95
  self.name = attributes[:'name']
86
96
  end
@@ -109,6 +119,7 @@ module Akeyless
109
119
  certificate_pem == o.certificate_pem &&
110
120
  common_name == o.common_name &&
111
121
  expiration_date == o.expiration_date &&
122
+ expiration_events == o.expiration_events &&
112
123
  name == o.name
113
124
  end
114
125
 
@@ -121,7 +132,7 @@ module Akeyless
121
132
  # Calculates hash code according to all attributes.
122
133
  # @return [Integer] Hash code
123
134
  def hash
124
- [certificate_pem, common_name, expiration_date, name].hash
135
+ [certificate_pem, common_name, expiration_date, expiration_events, name].hash
125
136
  end
126
137
 
127
138
  # Builds the object from hash
@@ -28,6 +28,9 @@ module Akeyless
28
28
  # GCP Project ID (Relevant only for GCP targets)
29
29
  attr_accessor :gcp_project_id
30
30
 
31
+ # GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets.
32
+ attr_accessor :gcp_sm_regions
33
+
31
34
  # Additional custom fields to associate with the item
32
35
  attr_accessor :item_custom_fields
33
36
 
@@ -65,6 +68,7 @@ module Akeyless
65
68
  :'delete_protection' => :'delete_protection',
66
69
  :'description' => :'description',
67
70
  :'gcp_project_id' => :'gcp-project-id',
71
+ :'gcp_sm_regions' => :'gcp-sm-regions',
68
72
  :'item_custom_fields' => :'item-custom-fields',
69
73
  :'json' => :'json',
70
74
  :'k8s_namespace' => :'k8s-namespace',
@@ -90,6 +94,7 @@ module Akeyless
90
94
  :'delete_protection' => :'String',
91
95
  :'description' => :'String',
92
96
  :'gcp_project_id' => :'String',
97
+ :'gcp_sm_regions' => :'String',
93
98
  :'item_custom_fields' => :'Hash<String, String>',
94
99
  :'json' => :'Boolean',
95
100
  :'k8s_namespace' => :'String',
@@ -140,6 +145,10 @@ module Akeyless
140
145
  self.gcp_project_id = attributes[:'gcp_project_id']
141
146
  end
142
147
 
148
+ if attributes.key?(:'gcp_sm_regions')
149
+ self.gcp_sm_regions = attributes[:'gcp_sm_regions']
150
+ end
151
+
143
152
  if attributes.key?(:'item_custom_fields')
144
153
  if (value = attributes[:'item_custom_fields']).is_a?(Hash)
145
154
  self.item_custom_fields = value
@@ -227,6 +236,7 @@ module Akeyless
227
236
  delete_protection == o.delete_protection &&
228
237
  description == o.description &&
229
238
  gcp_project_id == o.gcp_project_id &&
239
+ gcp_sm_regions == o.gcp_sm_regions &&
230
240
  item_custom_fields == o.item_custom_fields &&
231
241
  json == o.json &&
232
242
  k8s_namespace == o.k8s_namespace &&
@@ -248,7 +258,7 @@ module Akeyless
248
258
  # Calculates hash code according to all attributes.
249
259
  # @return [Integer] Hash code
250
260
  def hash
251
- [azure_kv_name, delete_protection, description, gcp_project_id, item_custom_fields, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
261
+ [azure_kv_name, delete_protection, description, gcp_project_id, gcp_sm_regions, item_custom_fields, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
252
262
  end
253
263
 
254
264
  # Builds the object from hash
@@ -19,6 +19,9 @@ module Akeyless
19
19
  # TLS Certificate (base64 encoded)
20
20
  attr_accessor :cert_data
21
21
 
22
+ # How many days before the expiration of the certificate would you like to be notified.
23
+ attr_accessor :expiration_event_in
24
+
22
25
  # Set output format to JSON
23
26
  attr_accessor :json
24
27
 
@@ -35,6 +38,7 @@ module Akeyless
35
38
  def self.attribute_map
36
39
  {
37
40
  :'cert_data' => :'cert-data',
41
+ :'expiration_event_in' => :'expiration-event-in',
38
42
  :'json' => :'json',
39
43
  :'key_data' => :'key-data',
40
44
  :'token' => :'token',
@@ -51,6 +55,7 @@ module Akeyless
51
55
  def self.openapi_types
52
56
  {
53
57
  :'cert_data' => :'String',
58
+ :'expiration_event_in' => :'Array<String>',
54
59
  :'json' => :'Boolean',
55
60
  :'key_data' => :'String',
56
61
  :'token' => :'String',
@@ -83,6 +88,12 @@ module Akeyless
83
88
  self.cert_data = attributes[:'cert_data']
84
89
  end
85
90
 
91
+ if attributes.key?(:'expiration_event_in')
92
+ if (value = attributes[:'expiration_event_in']).is_a?(Array)
93
+ self.expiration_event_in = value
94
+ end
95
+ end
96
+
86
97
  if attributes.key?(:'json')
87
98
  self.json = attributes[:'json']
88
99
  else
@@ -123,6 +134,7 @@ module Akeyless
123
134
  return true if self.equal?(o)
124
135
  self.class == o.class &&
125
136
  cert_data == o.cert_data &&
137
+ expiration_event_in == o.expiration_event_in &&
126
138
  json == o.json &&
127
139
  key_data == o.key_data &&
128
140
  token == o.token &&
@@ -138,7 +150,7 @@ module Akeyless
138
150
  # Calculates hash code according to all attributes.
139
151
  # @return [Integer] Hash code
140
152
  def hash
141
- [cert_data, json, key_data, token, uid_token].hash
153
+ [cert_data, expiration_event_in, json, key_data, token, uid_token].hash
142
154
  end
143
155
 
144
156
  # Builds the object from hash
@@ -42,6 +42,12 @@ module Akeyless
42
42
 
43
43
  attr_accessor :tls_cert
44
44
 
45
+ attr_accessor :tls_cert_common_name
46
+
47
+ attr_accessor :tls_cert_expiration_date
48
+
49
+ attr_accessor :tls_cert_expiration_events
50
+
45
51
  attr_accessor :tls_key
46
52
 
47
53
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -60,6 +66,9 @@ module Akeyless
60
66
  :'notify_on_status_change' => :'notify_on_status_change',
61
67
  :'tcp_port' => :'tcp_port',
62
68
  :'tls_cert' => :'tls_cert',
69
+ :'tls_cert_common_name' => :'tls_cert_common_name',
70
+ :'tls_cert_expiration_date' => :'tls_cert_expiration_date',
71
+ :'tls_cert_expiration_events' => :'tls_cert_expiration_events',
63
72
  :'tls_key' => :'tls_key'
64
73
  }
65
74
  end
@@ -85,6 +94,9 @@ module Akeyless
85
94
  :'notify_on_status_change' => :'Boolean',
86
95
  :'tcp_port' => :'String',
87
96
  :'tls_cert' => :'String',
97
+ :'tls_cert_common_name' => :'String',
98
+ :'tls_cert_expiration_date' => :'Time',
99
+ :'tls_cert_expiration_events' => :'Array<CertificateExpirationEvent>',
88
100
  :'tls_key' => :'String'
89
101
  }
90
102
  end
@@ -162,6 +174,20 @@ module Akeyless
162
174
  self.tls_cert = attributes[:'tls_cert']
163
175
  end
164
176
 
177
+ if attributes.key?(:'tls_cert_common_name')
178
+ self.tls_cert_common_name = attributes[:'tls_cert_common_name']
179
+ end
180
+
181
+ if attributes.key?(:'tls_cert_expiration_date')
182
+ self.tls_cert_expiration_date = attributes[:'tls_cert_expiration_date']
183
+ end
184
+
185
+ if attributes.key?(:'tls_cert_expiration_events')
186
+ if (value = attributes[:'tls_cert_expiration_events']).is_a?(Array)
187
+ self.tls_cert_expiration_events = value
188
+ end
189
+ end
190
+
165
191
  if attributes.key?(:'tls_key')
166
192
  self.tls_key = attributes[:'tls_key']
167
193
  end
@@ -200,6 +226,9 @@ module Akeyless
200
226
  notify_on_status_change == o.notify_on_status_change &&
201
227
  tcp_port == o.tcp_port &&
202
228
  tls_cert == o.tls_cert &&
229
+ tls_cert_common_name == o.tls_cert_common_name &&
230
+ tls_cert_expiration_date == o.tls_cert_expiration_date &&
231
+ tls_cert_expiration_events == o.tls_cert_expiration_events &&
203
232
  tls_key == o.tls_key
204
233
  end
205
234
 
@@ -212,7 +241,7 @@ module Akeyless
212
241
  # Calculates hash code according to all attributes.
213
242
  # @return [Integer] Hash code
214
243
  def hash
215
- [akeyless_url, api_token_ttl, display_name, enable_sni_proxy, enable_tls, enable_tls_configure, enable_tls_curl, enable_tls_hvp, gw_cluster_url, hvp_route_version, notify_on_status_change, tcp_port, tls_cert, tls_key].hash
244
+ [akeyless_url, api_token_ttl, display_name, enable_sni_proxy, enable_tls, enable_tls_configure, enable_tls_curl, enable_tls_hvp, gw_cluster_url, hvp_route_version, notify_on_status_change, tcp_port, tls_cert, tls_cert_common_name, tls_cert_expiration_date, tls_cert_expiration_events, tls_key].hash
216
245
  end
217
246
 
218
247
  # Builds the object from hash
@@ -31,7 +31,7 @@ module Akeyless
31
31
  # Certificate Signing Request contents encoded in base64 to generate the certificate with
32
32
  attr_accessor :csr_data_base64
33
33
 
34
- # A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical
34
+ # A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical
35
35
  attr_accessor :extended_key_usage
36
36
 
37
37
  # A json string that defines the requested extra extensions for the certificate
@@ -27,7 +27,7 @@ module Akeyless
27
27
  # Certificate Signing Request contents encoded in base64 to generate the certificate with
28
28
  attr_accessor :csr_data_base64
29
29
 
30
- # A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical
30
+ # A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical
31
31
  attr_accessor :extended_key_usage
32
32
 
33
33
  # A json string that defines the requested extra extensions for the certificate
@@ -29,6 +29,8 @@ module Akeyless
29
29
 
30
30
  attr_accessor :name
31
31
 
32
+ attr_accessor :region
33
+
32
34
  attr_accessor :secret_id
33
35
 
34
36
  attr_accessor :status
@@ -51,6 +53,7 @@ module Akeyless
51
53
  :'last_retrieved' => :'last_retrieved',
52
54
  :'location' => :'location',
53
55
  :'name' => :'name',
56
+ :'region' => :'region',
54
57
  :'secret_id' => :'secret_id',
55
58
  :'status' => :'status',
56
59
  :'tags' => :'tags',
@@ -75,6 +78,7 @@ module Akeyless
75
78
  :'last_retrieved' => :'Time',
76
79
  :'location' => :'Object',
77
80
  :'name' => :'String',
81
+ :'region' => :'String',
78
82
  :'secret_id' => :'String',
79
83
  :'status' => :'Boolean',
80
84
  :'tags' => :'Hash<String, String>',
@@ -134,6 +138,10 @@ module Akeyless
134
138
  self.name = attributes[:'name']
135
139
  end
136
140
 
141
+ if attributes.key?(:'region')
142
+ self.region = attributes[:'region']
143
+ end
144
+
137
145
  if attributes.key?(:'secret_id')
138
146
  self.secret_id = attributes[:'secret_id']
139
147
  end
@@ -188,6 +196,7 @@ module Akeyless
188
196
  last_retrieved == o.last_retrieved &&
189
197
  location == o.location &&
190
198
  name == o.name &&
199
+ region == o.region &&
191
200
  secret_id == o.secret_id &&
192
201
  status == o.status &&
193
202
  tags == o.tags &&
@@ -205,7 +214,7 @@ module Akeyless
205
214
  # Calculates hash code according to all attributes.
206
215
  # @return [Integer] Hash code
207
216
  def hash
208
- [created, description, expiration, key_id, last_retrieved, location, name, secret_id, status, tags, thumbprint, type, version].hash
217
+ [created, description, expiration, key_id, last_retrieved, location, name, region, secret_id, status, tags, thumbprint, type, version].hash
209
218
  end
210
219
 
211
220
  # Builds the object from hash
@@ -40,6 +40,9 @@ module Akeyless
40
40
  # How many days before the expiration of the certificate would you like to be notified.
41
41
  attr_accessor :expiration_event_in
42
42
 
43
+ # GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. USC with GCP targets only.
44
+ attr_accessor :gcp_sm_regions
45
+
43
46
  # Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
44
47
  attr_accessor :host_provider
45
48
 
@@ -174,6 +177,7 @@ module Akeyless
174
177
  :'delete_protection' => :'delete_protection',
175
178
  :'description' => :'description',
176
179
  :'expiration_event_in' => :'expiration-event-in',
180
+ :'gcp_sm_regions' => :'gcp-sm-regions',
177
181
  :'host_provider' => :'host-provider',
178
182
  :'item_custom_fields' => :'item-custom-fields',
179
183
  :'json' => :'json',
@@ -235,6 +239,7 @@ module Akeyless
235
239
  :'delete_protection' => :'String',
236
240
  :'description' => :'String',
237
241
  :'expiration_event_in' => :'Array<String>',
242
+ :'gcp_sm_regions' => :'String',
238
243
  :'host_provider' => :'String',
239
244
  :'item_custom_fields' => :'Hash<String, String>',
240
245
  :'json' => :'Boolean',
@@ -344,6 +349,10 @@ module Akeyless
344
349
  end
345
350
  end
346
351
 
352
+ if attributes.key?(:'gcp_sm_regions')
353
+ self.gcp_sm_regions = attributes[:'gcp_sm_regions']
354
+ end
355
+
347
356
  if attributes.key?(:'host_provider')
348
357
  self.host_provider = attributes[:'host_provider']
349
358
  end
@@ -565,6 +574,7 @@ module Akeyless
565
574
  delete_protection == o.delete_protection &&
566
575
  description == o.description &&
567
576
  expiration_event_in == o.expiration_event_in &&
577
+ gcp_sm_regions == o.gcp_sm_regions &&
568
578
  host_provider == o.host_provider &&
569
579
  item_custom_fields == o.item_custom_fields &&
570
580
  json == o.json &&
@@ -617,7 +627,7 @@ module Akeyless
617
627
  # Calculates hash code according to all attributes.
618
628
  # @return [Integer] Hash code
619
629
  def hash
620
- [provider_type, accessibility, add_tag, cert_file_data, certificate_format, change_event, delete_protection, description, expiration_event_in, host_provider, item_custom_fields, json, max_versions, name, new_metadata, new_name, rm_tag, rotate_after_disconnect, secure_access_add_host, secure_access_allow_external_user, secure_access_allow_port_forwading, secure_access_api, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_aws_region, secure_access_bastion_api, secure_access_bastion_issuer, secure_access_bastion_ssh, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_gateway, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, secure_access_rm_host, secure_access_ssh, secure_access_ssh_creds, secure_access_ssh_creds_user, secure_access_url, secure_access_use_internal_bastion, secure_access_use_internal_ssh_access, secure_access_web_browsing, secure_access_web_proxy, token, uid_token].hash
630
+ [provider_type, accessibility, add_tag, cert_file_data, certificate_format, change_event, delete_protection, description, expiration_event_in, gcp_sm_regions, host_provider, item_custom_fields, json, max_versions, name, new_metadata, new_name, rm_tag, rotate_after_disconnect, secure_access_add_host, secure_access_allow_external_user, secure_access_allow_port_forwading, secure_access_api, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_aws_region, secure_access_bastion_api, secure_access_bastion_issuer, secure_access_bastion_ssh, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_gateway, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, secure_access_rm_host, secure_access_ssh, secure_access_ssh_creds, secure_access_ssh_creds_user, secure_access_url, secure_access_use_internal_bastion, secure_access_use_internal_ssh_access, secure_access_web_browsing, secure_access_web_proxy, token, uid_token].hash
621
631
  end
622
632
 
623
633
  # Builds the object from hash
@@ -33,6 +33,9 @@ module Akeyless
33
33
  # Optional, the passphrase that protects the private key within the pfx certificate (Relevant only for Azure KV certificates)
34
34
  attr_accessor :pfx_password
35
35
 
36
+ # Optional, create secret in a specific region (GCP only). If empty, a global secret will be created (provider default).
37
+ attr_accessor :region
38
+
36
39
  # Name for the new universal secrets
37
40
  attr_accessor :secret_name
38
41
 
@@ -63,6 +66,7 @@ module Akeyless
63
66
  :'namespace' => :'namespace',
64
67
  :'object_type' => :'object-type',
65
68
  :'pfx_password' => :'pfx-password',
69
+ :'region' => :'region',
66
70
  :'secret_name' => :'secret-name',
67
71
  :'tags' => :'tags',
68
72
  :'token' => :'token',
@@ -87,6 +91,7 @@ module Akeyless
87
91
  :'namespace' => :'String',
88
92
  :'object_type' => :'String',
89
93
  :'pfx_password' => :'String',
94
+ :'region' => :'String',
90
95
  :'secret_name' => :'String',
91
96
  :'tags' => :'Hash<String, String>',
92
97
  :'token' => :'String',
@@ -144,6 +149,10 @@ module Akeyless
144
149
  self.pfx_password = attributes[:'pfx_password']
145
150
  end
146
151
 
152
+ if attributes.key?(:'region')
153
+ self.region = attributes[:'region']
154
+ end
155
+
147
156
  if attributes.key?(:'secret_name')
148
157
  self.secret_name = attributes[:'secret_name']
149
158
  else
@@ -222,6 +231,7 @@ module Akeyless
222
231
  namespace == o.namespace &&
223
232
  object_type == o.object_type &&
224
233
  pfx_password == o.pfx_password &&
234
+ region == o.region &&
225
235
  secret_name == o.secret_name &&
226
236
  tags == o.tags &&
227
237
  token == o.token &&
@@ -240,7 +250,7 @@ module Akeyless
240
250
  # Calculates hash code according to all attributes.
241
251
  # @return [Integer] Hash code
242
252
  def hash
243
- [binary_value, description, json, namespace, object_type, pfx_password, secret_name, tags, token, uid_token, usc_encryption_key, usc_name, value].hash
253
+ [binary_value, description, json, namespace, object_type, pfx_password, region, secret_name, tags, token, uid_token, usc_encryption_key, usc_name, value].hash
244
254
  end
245
255
 
246
256
  # Builds the object from hash
@@ -11,5 +11,5 @@ Generator version: 7.10.0
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '5.0.19'
14
+ VERSION = '5.0.20'
15
15
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: akeyless
3
3
  version: !ruby/object:Gem::Version
4
- version: 5.0.19
4
+ version: 5.0.20
5
5
  platform: ruby
6
6
  authors:
7
7
  - OpenAPI-Generator