akeyless 5.0.19 → 5.0.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/docs/CertificateStore.md +2 -0
- data/docs/CreateUSC.md +2 -0
- data/docs/GatewayUpdateTlsCert.md +2 -0
- data/docs/GeneralConfigPart.md +6 -0
- data/docs/GetKubeExecCreds.md +1 -1
- data/docs/GetPKICertificate.md +1 -1
- data/docs/SecretInfo.md +2 -0
- data/docs/UpdateItem.md +2 -0
- data/docs/UscCreate.md +2 -0
- data/lib/akeyless/models/certificate_store.rb +12 -1
- data/lib/akeyless/models/create_usc.rb +11 -1
- data/lib/akeyless/models/gateway_update_tls_cert.rb +13 -1
- data/lib/akeyless/models/general_config_part.rb +30 -1
- data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
- data/lib/akeyless/models/get_pki_certificate.rb +1 -1
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/update_item.rb +11 -1
- data/lib/akeyless/models/usc_create.rb +11 -1
- data/lib/akeyless/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: ea9a1fec685c0eff277f661e0758adcb9cc8f46c6b9534a6889e9d7fc1b1e5d8
|
|
4
|
+
data.tar.gz: b0c76f83dc344e72c0c1f99ab073eb09ec3eff5a6f4a364e83d86e988b608f7e
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 18d2379a718c54600b89bd919b0a1e98176f9cc4c7616a8901768aecacb4525a497460ae74dc0fb60568673dddd4eea91a04c991ddff0920820a869be6ec19f5
|
|
7
|
+
data.tar.gz: c3643f8dd4a5712184a8015757535998fd80e6067a21fb3ecca815d27096381f8dd4b338eed83ebe0c92d9afc3550ee322a05865f86312a4c14fcb494d8bd7b2
|
data/README.md
CHANGED
|
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
|
8
8
|
|
|
9
9
|
- API version: 3.0
|
|
10
|
-
- Package version: 5.0.
|
|
10
|
+
- Package version: 5.0.20
|
|
11
11
|
- Generator version: 7.10.0
|
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
data/docs/CertificateStore.md
CHANGED
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **certificate_pem** | **String** | | [optional] |
|
|
8
8
|
| **common_name** | **String** | | [optional] |
|
|
9
9
|
| **expiration_date** | **Time** | | [optional] |
|
|
10
|
+
| **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
|
|
10
11
|
| **name** | **String** | | [optional] |
|
|
11
12
|
|
|
12
13
|
## Example
|
|
@@ -18,6 +19,7 @@ instance = Akeyless::CertificateStore.new(
|
|
|
18
19
|
certificate_pem: null,
|
|
19
20
|
common_name: null,
|
|
20
21
|
expiration_date: null,
|
|
22
|
+
expiration_events: null,
|
|
21
23
|
name: null
|
|
22
24
|
)
|
|
23
25
|
```
|
data/docs/CreateUSC.md
CHANGED
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
9
|
| **description** | **String** | Description of the Universal Secrets Connector | [optional] |
|
|
10
10
|
| **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
|
|
11
|
+
| **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. | [optional] |
|
|
11
12
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
14
|
| **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
|
|
@@ -29,6 +30,7 @@ instance = Akeyless::CreateUSC.new(
|
|
|
29
30
|
delete_protection: null,
|
|
30
31
|
description: null,
|
|
31
32
|
gcp_project_id: null,
|
|
33
|
+
gcp_sm_regions: null,
|
|
32
34
|
item_custom_fields: null,
|
|
33
35
|
json: null,
|
|
34
36
|
k8s_namespace: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **cert_data** | **String** | TLS Certificate (base64 encoded) | [optional] |
|
|
8
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
9
10
|
| **key_data** | **String** | TLS Private Key (base64 encoded) | [optional] |
|
|
10
11
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -17,6 +18,7 @@ require 'akeyless'
|
|
|
17
18
|
|
|
18
19
|
instance = Akeyless::GatewayUpdateTlsCert.new(
|
|
19
20
|
cert_data: null,
|
|
21
|
+
expiration_event_in: null,
|
|
20
22
|
json: null,
|
|
21
23
|
key_data: null,
|
|
22
24
|
token: null,
|
data/docs/GeneralConfigPart.md
CHANGED
|
@@ -17,6 +17,9 @@
|
|
|
17
17
|
| **notify_on_status_change** | **Boolean** | | [optional] |
|
|
18
18
|
| **tcp_port** | **String** | | [optional] |
|
|
19
19
|
| **tls_cert** | **String** | | [optional] |
|
|
20
|
+
| **tls_cert_common_name** | **String** | | [optional] |
|
|
21
|
+
| **tls_cert_expiration_date** | **Time** | | [optional] |
|
|
22
|
+
| **tls_cert_expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
|
|
20
23
|
| **tls_key** | **String** | | [optional] |
|
|
21
24
|
|
|
22
25
|
## Example
|
|
@@ -38,6 +41,9 @@ instance = Akeyless::GeneralConfigPart.new(
|
|
|
38
41
|
notify_on_status_change: null,
|
|
39
42
|
tcp_port: null,
|
|
40
43
|
tls_cert: null,
|
|
44
|
+
tls_cert_common_name: null,
|
|
45
|
+
tls_cert_expiration_date: null,
|
|
46
|
+
tls_cert_expiration_events: null,
|
|
41
47
|
tls_key: null
|
|
42
48
|
)
|
|
43
49
|
```
|
data/docs/GetKubeExecCreds.md
CHANGED
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
|
10
10
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
|
11
11
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
|
12
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
|
12
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
|
|
13
13
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
15
15
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/GetPKICertificate.md
CHANGED
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
|
9
9
|
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
|
10
10
|
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
|
11
|
-
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical | [optional] |
|
|
11
|
+
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical | [optional] |
|
|
12
12
|
| **extra_extensions** | **String** | A json string that defines the requested extra extensions for the certificate | [optional] |
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
data/docs/SecretInfo.md
CHANGED
|
@@ -11,6 +11,7 @@
|
|
|
11
11
|
| **last_retrieved** | **Time** | | [optional] |
|
|
12
12
|
| **location** | **Object** | | [optional] |
|
|
13
13
|
| **name** | **String** | | [optional] |
|
|
14
|
+
| **region** | **String** | | [optional] |
|
|
14
15
|
| **secret_id** | **String** | | [optional] |
|
|
15
16
|
| **status** | **Boolean** | | [optional] |
|
|
16
17
|
| **tags** | **Hash<String, String>** | | [optional] |
|
|
@@ -31,6 +32,7 @@ instance = Akeyless::SecretInfo.new(
|
|
|
31
32
|
last_retrieved: null,
|
|
32
33
|
location: null,
|
|
33
34
|
name: null,
|
|
35
|
+
region: null,
|
|
34
36
|
secret_id: null,
|
|
35
37
|
status: null,
|
|
36
38
|
tags: null,
|
data/docs/UpdateItem.md
CHANGED
|
@@ -13,6 +13,7 @@
|
|
|
13
13
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
14
14
|
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
|
15
15
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
|
16
|
+
| **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. USC with GCP targets only. | [optional] |
|
|
16
17
|
| **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] |
|
|
17
18
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
18
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -70,6 +71,7 @@ instance = Akeyless::UpdateItem.new(
|
|
|
70
71
|
delete_protection: null,
|
|
71
72
|
description: null,
|
|
72
73
|
expiration_event_in: null,
|
|
74
|
+
gcp_sm_regions: null,
|
|
73
75
|
host_provider: null,
|
|
74
76
|
item_custom_fields: null,
|
|
75
77
|
json: null,
|
data/docs/UscCreate.md
CHANGED
|
@@ -10,6 +10,7 @@
|
|
|
10
10
|
| **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
|
|
11
11
|
| **object_type** | **String** | | [optional] |
|
|
12
12
|
| **pfx_password** | **String** | Optional, the passphrase that protects the private key within the pfx certificate (Relevant only for Azure KV certificates) | [optional] |
|
|
13
|
+
| **region** | **String** | Optional, create secret in a specific region (GCP only). If empty, a global secret will be created (provider default). | [optional] |
|
|
13
14
|
| **secret_name** | **String** | Name for the new universal secrets | |
|
|
14
15
|
| **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
|
|
15
16
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -30,6 +31,7 @@ instance = Akeyless::UscCreate.new(
|
|
|
30
31
|
namespace: null,
|
|
31
32
|
object_type: null,
|
|
32
33
|
pfx_password: null,
|
|
34
|
+
region: null,
|
|
33
35
|
secret_name: null,
|
|
34
36
|
tags: null,
|
|
35
37
|
token: null,
|
|
@@ -21,6 +21,8 @@ module Akeyless
|
|
|
21
21
|
|
|
22
22
|
attr_accessor :expiration_date
|
|
23
23
|
|
|
24
|
+
attr_accessor :expiration_events
|
|
25
|
+
|
|
24
26
|
attr_accessor :name
|
|
25
27
|
|
|
26
28
|
# Attribute mapping from ruby-style variable name to JSON key.
|
|
@@ -29,6 +31,7 @@ module Akeyless
|
|
|
29
31
|
:'certificate_pem' => :'certificate_pem',
|
|
30
32
|
:'common_name' => :'common_name',
|
|
31
33
|
:'expiration_date' => :'expiration_date',
|
|
34
|
+
:'expiration_events' => :'expiration_events',
|
|
32
35
|
:'name' => :'name'
|
|
33
36
|
}
|
|
34
37
|
end
|
|
@@ -44,6 +47,7 @@ module Akeyless
|
|
|
44
47
|
:'certificate_pem' => :'String',
|
|
45
48
|
:'common_name' => :'String',
|
|
46
49
|
:'expiration_date' => :'Time',
|
|
50
|
+
:'expiration_events' => :'Array<CertificateExpirationEvent>',
|
|
47
51
|
:'name' => :'String'
|
|
48
52
|
}
|
|
49
53
|
end
|
|
@@ -81,6 +85,12 @@ module Akeyless
|
|
|
81
85
|
self.expiration_date = attributes[:'expiration_date']
|
|
82
86
|
end
|
|
83
87
|
|
|
88
|
+
if attributes.key?(:'expiration_events')
|
|
89
|
+
if (value = attributes[:'expiration_events']).is_a?(Array)
|
|
90
|
+
self.expiration_events = value
|
|
91
|
+
end
|
|
92
|
+
end
|
|
93
|
+
|
|
84
94
|
if attributes.key?(:'name')
|
|
85
95
|
self.name = attributes[:'name']
|
|
86
96
|
end
|
|
@@ -109,6 +119,7 @@ module Akeyless
|
|
|
109
119
|
certificate_pem == o.certificate_pem &&
|
|
110
120
|
common_name == o.common_name &&
|
|
111
121
|
expiration_date == o.expiration_date &&
|
|
122
|
+
expiration_events == o.expiration_events &&
|
|
112
123
|
name == o.name
|
|
113
124
|
end
|
|
114
125
|
|
|
@@ -121,7 +132,7 @@ module Akeyless
|
|
|
121
132
|
# Calculates hash code according to all attributes.
|
|
122
133
|
# @return [Integer] Hash code
|
|
123
134
|
def hash
|
|
124
|
-
[certificate_pem, common_name, expiration_date, name].hash
|
|
135
|
+
[certificate_pem, common_name, expiration_date, expiration_events, name].hash
|
|
125
136
|
end
|
|
126
137
|
|
|
127
138
|
# Builds the object from hash
|
|
@@ -28,6 +28,9 @@ module Akeyless
|
|
|
28
28
|
# GCP Project ID (Relevant only for GCP targets)
|
|
29
29
|
attr_accessor :gcp_project_id
|
|
30
30
|
|
|
31
|
+
# GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets.
|
|
32
|
+
attr_accessor :gcp_sm_regions
|
|
33
|
+
|
|
31
34
|
# Additional custom fields to associate with the item
|
|
32
35
|
attr_accessor :item_custom_fields
|
|
33
36
|
|
|
@@ -65,6 +68,7 @@ module Akeyless
|
|
|
65
68
|
:'delete_protection' => :'delete_protection',
|
|
66
69
|
:'description' => :'description',
|
|
67
70
|
:'gcp_project_id' => :'gcp-project-id',
|
|
71
|
+
:'gcp_sm_regions' => :'gcp-sm-regions',
|
|
68
72
|
:'item_custom_fields' => :'item-custom-fields',
|
|
69
73
|
:'json' => :'json',
|
|
70
74
|
:'k8s_namespace' => :'k8s-namespace',
|
|
@@ -90,6 +94,7 @@ module Akeyless
|
|
|
90
94
|
:'delete_protection' => :'String',
|
|
91
95
|
:'description' => :'String',
|
|
92
96
|
:'gcp_project_id' => :'String',
|
|
97
|
+
:'gcp_sm_regions' => :'String',
|
|
93
98
|
:'item_custom_fields' => :'Hash<String, String>',
|
|
94
99
|
:'json' => :'Boolean',
|
|
95
100
|
:'k8s_namespace' => :'String',
|
|
@@ -140,6 +145,10 @@ module Akeyless
|
|
|
140
145
|
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
141
146
|
end
|
|
142
147
|
|
|
148
|
+
if attributes.key?(:'gcp_sm_regions')
|
|
149
|
+
self.gcp_sm_regions = attributes[:'gcp_sm_regions']
|
|
150
|
+
end
|
|
151
|
+
|
|
143
152
|
if attributes.key?(:'item_custom_fields')
|
|
144
153
|
if (value = attributes[:'item_custom_fields']).is_a?(Hash)
|
|
145
154
|
self.item_custom_fields = value
|
|
@@ -227,6 +236,7 @@ module Akeyless
|
|
|
227
236
|
delete_protection == o.delete_protection &&
|
|
228
237
|
description == o.description &&
|
|
229
238
|
gcp_project_id == o.gcp_project_id &&
|
|
239
|
+
gcp_sm_regions == o.gcp_sm_regions &&
|
|
230
240
|
item_custom_fields == o.item_custom_fields &&
|
|
231
241
|
json == o.json &&
|
|
232
242
|
k8s_namespace == o.k8s_namespace &&
|
|
@@ -248,7 +258,7 @@ module Akeyless
|
|
|
248
258
|
# Calculates hash code according to all attributes.
|
|
249
259
|
# @return [Integer] Hash code
|
|
250
260
|
def hash
|
|
251
|
-
[azure_kv_name, delete_protection, description, gcp_project_id, item_custom_fields, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
|
|
261
|
+
[azure_kv_name, delete_protection, description, gcp_project_id, gcp_sm_regions, item_custom_fields, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
|
|
252
262
|
end
|
|
253
263
|
|
|
254
264
|
# Builds the object from hash
|
|
@@ -19,6 +19,9 @@ module Akeyless
|
|
|
19
19
|
# TLS Certificate (base64 encoded)
|
|
20
20
|
attr_accessor :cert_data
|
|
21
21
|
|
|
22
|
+
# How many days before the expiration of the certificate would you like to be notified.
|
|
23
|
+
attr_accessor :expiration_event_in
|
|
24
|
+
|
|
22
25
|
# Set output format to JSON
|
|
23
26
|
attr_accessor :json
|
|
24
27
|
|
|
@@ -35,6 +38,7 @@ module Akeyless
|
|
|
35
38
|
def self.attribute_map
|
|
36
39
|
{
|
|
37
40
|
:'cert_data' => :'cert-data',
|
|
41
|
+
:'expiration_event_in' => :'expiration-event-in',
|
|
38
42
|
:'json' => :'json',
|
|
39
43
|
:'key_data' => :'key-data',
|
|
40
44
|
:'token' => :'token',
|
|
@@ -51,6 +55,7 @@ module Akeyless
|
|
|
51
55
|
def self.openapi_types
|
|
52
56
|
{
|
|
53
57
|
:'cert_data' => :'String',
|
|
58
|
+
:'expiration_event_in' => :'Array<String>',
|
|
54
59
|
:'json' => :'Boolean',
|
|
55
60
|
:'key_data' => :'String',
|
|
56
61
|
:'token' => :'String',
|
|
@@ -83,6 +88,12 @@ module Akeyless
|
|
|
83
88
|
self.cert_data = attributes[:'cert_data']
|
|
84
89
|
end
|
|
85
90
|
|
|
91
|
+
if attributes.key?(:'expiration_event_in')
|
|
92
|
+
if (value = attributes[:'expiration_event_in']).is_a?(Array)
|
|
93
|
+
self.expiration_event_in = value
|
|
94
|
+
end
|
|
95
|
+
end
|
|
96
|
+
|
|
86
97
|
if attributes.key?(:'json')
|
|
87
98
|
self.json = attributes[:'json']
|
|
88
99
|
else
|
|
@@ -123,6 +134,7 @@ module Akeyless
|
|
|
123
134
|
return true if self.equal?(o)
|
|
124
135
|
self.class == o.class &&
|
|
125
136
|
cert_data == o.cert_data &&
|
|
137
|
+
expiration_event_in == o.expiration_event_in &&
|
|
126
138
|
json == o.json &&
|
|
127
139
|
key_data == o.key_data &&
|
|
128
140
|
token == o.token &&
|
|
@@ -138,7 +150,7 @@ module Akeyless
|
|
|
138
150
|
# Calculates hash code according to all attributes.
|
|
139
151
|
# @return [Integer] Hash code
|
|
140
152
|
def hash
|
|
141
|
-
[cert_data, json, key_data, token, uid_token].hash
|
|
153
|
+
[cert_data, expiration_event_in, json, key_data, token, uid_token].hash
|
|
142
154
|
end
|
|
143
155
|
|
|
144
156
|
# Builds the object from hash
|
|
@@ -42,6 +42,12 @@ module Akeyless
|
|
|
42
42
|
|
|
43
43
|
attr_accessor :tls_cert
|
|
44
44
|
|
|
45
|
+
attr_accessor :tls_cert_common_name
|
|
46
|
+
|
|
47
|
+
attr_accessor :tls_cert_expiration_date
|
|
48
|
+
|
|
49
|
+
attr_accessor :tls_cert_expiration_events
|
|
50
|
+
|
|
45
51
|
attr_accessor :tls_key
|
|
46
52
|
|
|
47
53
|
# Attribute mapping from ruby-style variable name to JSON key.
|
|
@@ -60,6 +66,9 @@ module Akeyless
|
|
|
60
66
|
:'notify_on_status_change' => :'notify_on_status_change',
|
|
61
67
|
:'tcp_port' => :'tcp_port',
|
|
62
68
|
:'tls_cert' => :'tls_cert',
|
|
69
|
+
:'tls_cert_common_name' => :'tls_cert_common_name',
|
|
70
|
+
:'tls_cert_expiration_date' => :'tls_cert_expiration_date',
|
|
71
|
+
:'tls_cert_expiration_events' => :'tls_cert_expiration_events',
|
|
63
72
|
:'tls_key' => :'tls_key'
|
|
64
73
|
}
|
|
65
74
|
end
|
|
@@ -85,6 +94,9 @@ module Akeyless
|
|
|
85
94
|
:'notify_on_status_change' => :'Boolean',
|
|
86
95
|
:'tcp_port' => :'String',
|
|
87
96
|
:'tls_cert' => :'String',
|
|
97
|
+
:'tls_cert_common_name' => :'String',
|
|
98
|
+
:'tls_cert_expiration_date' => :'Time',
|
|
99
|
+
:'tls_cert_expiration_events' => :'Array<CertificateExpirationEvent>',
|
|
88
100
|
:'tls_key' => :'String'
|
|
89
101
|
}
|
|
90
102
|
end
|
|
@@ -162,6 +174,20 @@ module Akeyless
|
|
|
162
174
|
self.tls_cert = attributes[:'tls_cert']
|
|
163
175
|
end
|
|
164
176
|
|
|
177
|
+
if attributes.key?(:'tls_cert_common_name')
|
|
178
|
+
self.tls_cert_common_name = attributes[:'tls_cert_common_name']
|
|
179
|
+
end
|
|
180
|
+
|
|
181
|
+
if attributes.key?(:'tls_cert_expiration_date')
|
|
182
|
+
self.tls_cert_expiration_date = attributes[:'tls_cert_expiration_date']
|
|
183
|
+
end
|
|
184
|
+
|
|
185
|
+
if attributes.key?(:'tls_cert_expiration_events')
|
|
186
|
+
if (value = attributes[:'tls_cert_expiration_events']).is_a?(Array)
|
|
187
|
+
self.tls_cert_expiration_events = value
|
|
188
|
+
end
|
|
189
|
+
end
|
|
190
|
+
|
|
165
191
|
if attributes.key?(:'tls_key')
|
|
166
192
|
self.tls_key = attributes[:'tls_key']
|
|
167
193
|
end
|
|
@@ -200,6 +226,9 @@ module Akeyless
|
|
|
200
226
|
notify_on_status_change == o.notify_on_status_change &&
|
|
201
227
|
tcp_port == o.tcp_port &&
|
|
202
228
|
tls_cert == o.tls_cert &&
|
|
229
|
+
tls_cert_common_name == o.tls_cert_common_name &&
|
|
230
|
+
tls_cert_expiration_date == o.tls_cert_expiration_date &&
|
|
231
|
+
tls_cert_expiration_events == o.tls_cert_expiration_events &&
|
|
203
232
|
tls_key == o.tls_key
|
|
204
233
|
end
|
|
205
234
|
|
|
@@ -212,7 +241,7 @@ module Akeyless
|
|
|
212
241
|
# Calculates hash code according to all attributes.
|
|
213
242
|
# @return [Integer] Hash code
|
|
214
243
|
def hash
|
|
215
|
-
[akeyless_url, api_token_ttl, display_name, enable_sni_proxy, enable_tls, enable_tls_configure, enable_tls_curl, enable_tls_hvp, gw_cluster_url, hvp_route_version, notify_on_status_change, tcp_port, tls_cert, tls_key].hash
|
|
244
|
+
[akeyless_url, api_token_ttl, display_name, enable_sni_proxy, enable_tls, enable_tls_configure, enable_tls_curl, enable_tls_hvp, gw_cluster_url, hvp_route_version, notify_on_status_change, tcp_port, tls_cert, tls_cert_common_name, tls_cert_expiration_date, tls_cert_expiration_events, tls_key].hash
|
|
216
245
|
end
|
|
217
246
|
|
|
218
247
|
# Builds the object from hash
|
|
@@ -31,7 +31,7 @@ module Akeyless
|
|
|
31
31
|
# Certificate Signing Request contents encoded in base64 to generate the certificate with
|
|
32
32
|
attr_accessor :csr_data_base64
|
|
33
33
|
|
|
34
|
-
# A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical
|
|
34
|
+
# A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical
|
|
35
35
|
attr_accessor :extended_key_usage
|
|
36
36
|
|
|
37
37
|
# A json string that defines the requested extra extensions for the certificate
|
|
@@ -27,7 +27,7 @@ module Akeyless
|
|
|
27
27
|
# Certificate Signing Request contents encoded in base64 to generate the certificate with
|
|
28
28
|
attr_accessor :csr_data_base64
|
|
29
29
|
|
|
30
|
-
# A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. If critical is present the extension will be marked as critical
|
|
30
|
+
# A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth', 'codesigning'. If critical is present the extension will be marked as critical
|
|
31
31
|
attr_accessor :extended_key_usage
|
|
32
32
|
|
|
33
33
|
# A json string that defines the requested extra extensions for the certificate
|
|
@@ -29,6 +29,8 @@ module Akeyless
|
|
|
29
29
|
|
|
30
30
|
attr_accessor :name
|
|
31
31
|
|
|
32
|
+
attr_accessor :region
|
|
33
|
+
|
|
32
34
|
attr_accessor :secret_id
|
|
33
35
|
|
|
34
36
|
attr_accessor :status
|
|
@@ -51,6 +53,7 @@ module Akeyless
|
|
|
51
53
|
:'last_retrieved' => :'last_retrieved',
|
|
52
54
|
:'location' => :'location',
|
|
53
55
|
:'name' => :'name',
|
|
56
|
+
:'region' => :'region',
|
|
54
57
|
:'secret_id' => :'secret_id',
|
|
55
58
|
:'status' => :'status',
|
|
56
59
|
:'tags' => :'tags',
|
|
@@ -75,6 +78,7 @@ module Akeyless
|
|
|
75
78
|
:'last_retrieved' => :'Time',
|
|
76
79
|
:'location' => :'Object',
|
|
77
80
|
:'name' => :'String',
|
|
81
|
+
:'region' => :'String',
|
|
78
82
|
:'secret_id' => :'String',
|
|
79
83
|
:'status' => :'Boolean',
|
|
80
84
|
:'tags' => :'Hash<String, String>',
|
|
@@ -134,6 +138,10 @@ module Akeyless
|
|
|
134
138
|
self.name = attributes[:'name']
|
|
135
139
|
end
|
|
136
140
|
|
|
141
|
+
if attributes.key?(:'region')
|
|
142
|
+
self.region = attributes[:'region']
|
|
143
|
+
end
|
|
144
|
+
|
|
137
145
|
if attributes.key?(:'secret_id')
|
|
138
146
|
self.secret_id = attributes[:'secret_id']
|
|
139
147
|
end
|
|
@@ -188,6 +196,7 @@ module Akeyless
|
|
|
188
196
|
last_retrieved == o.last_retrieved &&
|
|
189
197
|
location == o.location &&
|
|
190
198
|
name == o.name &&
|
|
199
|
+
region == o.region &&
|
|
191
200
|
secret_id == o.secret_id &&
|
|
192
201
|
status == o.status &&
|
|
193
202
|
tags == o.tags &&
|
|
@@ -205,7 +214,7 @@ module Akeyless
|
|
|
205
214
|
# Calculates hash code according to all attributes.
|
|
206
215
|
# @return [Integer] Hash code
|
|
207
216
|
def hash
|
|
208
|
-
[created, description, expiration, key_id, last_retrieved, location, name, secret_id, status, tags, thumbprint, type, version].hash
|
|
217
|
+
[created, description, expiration, key_id, last_retrieved, location, name, region, secret_id, status, tags, thumbprint, type, version].hash
|
|
209
218
|
end
|
|
210
219
|
|
|
211
220
|
# Builds the object from hash
|
|
@@ -40,6 +40,9 @@ module Akeyless
|
|
|
40
40
|
# How many days before the expiration of the certificate would you like to be notified.
|
|
41
41
|
attr_accessor :expiration_event_in
|
|
42
42
|
|
|
43
|
+
# GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. USC with GCP targets only.
|
|
44
|
+
attr_accessor :gcp_sm_regions
|
|
45
|
+
|
|
43
46
|
# Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
|
|
44
47
|
attr_accessor :host_provider
|
|
45
48
|
|
|
@@ -174,6 +177,7 @@ module Akeyless
|
|
|
174
177
|
:'delete_protection' => :'delete_protection',
|
|
175
178
|
:'description' => :'description',
|
|
176
179
|
:'expiration_event_in' => :'expiration-event-in',
|
|
180
|
+
:'gcp_sm_regions' => :'gcp-sm-regions',
|
|
177
181
|
:'host_provider' => :'host-provider',
|
|
178
182
|
:'item_custom_fields' => :'item-custom-fields',
|
|
179
183
|
:'json' => :'json',
|
|
@@ -235,6 +239,7 @@ module Akeyless
|
|
|
235
239
|
:'delete_protection' => :'String',
|
|
236
240
|
:'description' => :'String',
|
|
237
241
|
:'expiration_event_in' => :'Array<String>',
|
|
242
|
+
:'gcp_sm_regions' => :'String',
|
|
238
243
|
:'host_provider' => :'String',
|
|
239
244
|
:'item_custom_fields' => :'Hash<String, String>',
|
|
240
245
|
:'json' => :'Boolean',
|
|
@@ -344,6 +349,10 @@ module Akeyless
|
|
|
344
349
|
end
|
|
345
350
|
end
|
|
346
351
|
|
|
352
|
+
if attributes.key?(:'gcp_sm_regions')
|
|
353
|
+
self.gcp_sm_regions = attributes[:'gcp_sm_regions']
|
|
354
|
+
end
|
|
355
|
+
|
|
347
356
|
if attributes.key?(:'host_provider')
|
|
348
357
|
self.host_provider = attributes[:'host_provider']
|
|
349
358
|
end
|
|
@@ -565,6 +574,7 @@ module Akeyless
|
|
|
565
574
|
delete_protection == o.delete_protection &&
|
|
566
575
|
description == o.description &&
|
|
567
576
|
expiration_event_in == o.expiration_event_in &&
|
|
577
|
+
gcp_sm_regions == o.gcp_sm_regions &&
|
|
568
578
|
host_provider == o.host_provider &&
|
|
569
579
|
item_custom_fields == o.item_custom_fields &&
|
|
570
580
|
json == o.json &&
|
|
@@ -617,7 +627,7 @@ module Akeyless
|
|
|
617
627
|
# Calculates hash code according to all attributes.
|
|
618
628
|
# @return [Integer] Hash code
|
|
619
629
|
def hash
|
|
620
|
-
[provider_type, accessibility, add_tag, cert_file_data, certificate_format, change_event, delete_protection, description, expiration_event_in, host_provider, item_custom_fields, json, max_versions, name, new_metadata, new_name, rm_tag, rotate_after_disconnect, secure_access_add_host, secure_access_allow_external_user, secure_access_allow_port_forwading, secure_access_api, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_aws_region, secure_access_bastion_api, secure_access_bastion_issuer, secure_access_bastion_ssh, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_gateway, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, secure_access_rm_host, secure_access_ssh, secure_access_ssh_creds, secure_access_ssh_creds_user, secure_access_url, secure_access_use_internal_bastion, secure_access_use_internal_ssh_access, secure_access_web_browsing, secure_access_web_proxy, token, uid_token].hash
|
|
630
|
+
[provider_type, accessibility, add_tag, cert_file_data, certificate_format, change_event, delete_protection, description, expiration_event_in, gcp_sm_regions, host_provider, item_custom_fields, json, max_versions, name, new_metadata, new_name, rm_tag, rotate_after_disconnect, secure_access_add_host, secure_access_allow_external_user, secure_access_allow_port_forwading, secure_access_api, secure_access_aws_account_id, secure_access_aws_native_cli, secure_access_aws_region, secure_access_bastion_api, secure_access_bastion_issuer, secure_access_bastion_ssh, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_gateway, secure_access_host, secure_access_rd_gateway_server, secure_access_rdp_domain, secure_access_rdp_user, secure_access_rm_host, secure_access_ssh, secure_access_ssh_creds, secure_access_ssh_creds_user, secure_access_url, secure_access_use_internal_bastion, secure_access_use_internal_ssh_access, secure_access_web_browsing, secure_access_web_proxy, token, uid_token].hash
|
|
621
631
|
end
|
|
622
632
|
|
|
623
633
|
# Builds the object from hash
|
|
@@ -33,6 +33,9 @@ module Akeyless
|
|
|
33
33
|
# Optional, the passphrase that protects the private key within the pfx certificate (Relevant only for Azure KV certificates)
|
|
34
34
|
attr_accessor :pfx_password
|
|
35
35
|
|
|
36
|
+
# Optional, create secret in a specific region (GCP only). If empty, a global secret will be created (provider default).
|
|
37
|
+
attr_accessor :region
|
|
38
|
+
|
|
36
39
|
# Name for the new universal secrets
|
|
37
40
|
attr_accessor :secret_name
|
|
38
41
|
|
|
@@ -63,6 +66,7 @@ module Akeyless
|
|
|
63
66
|
:'namespace' => :'namespace',
|
|
64
67
|
:'object_type' => :'object-type',
|
|
65
68
|
:'pfx_password' => :'pfx-password',
|
|
69
|
+
:'region' => :'region',
|
|
66
70
|
:'secret_name' => :'secret-name',
|
|
67
71
|
:'tags' => :'tags',
|
|
68
72
|
:'token' => :'token',
|
|
@@ -87,6 +91,7 @@ module Akeyless
|
|
|
87
91
|
:'namespace' => :'String',
|
|
88
92
|
:'object_type' => :'String',
|
|
89
93
|
:'pfx_password' => :'String',
|
|
94
|
+
:'region' => :'String',
|
|
90
95
|
:'secret_name' => :'String',
|
|
91
96
|
:'tags' => :'Hash<String, String>',
|
|
92
97
|
:'token' => :'String',
|
|
@@ -144,6 +149,10 @@ module Akeyless
|
|
|
144
149
|
self.pfx_password = attributes[:'pfx_password']
|
|
145
150
|
end
|
|
146
151
|
|
|
152
|
+
if attributes.key?(:'region')
|
|
153
|
+
self.region = attributes[:'region']
|
|
154
|
+
end
|
|
155
|
+
|
|
147
156
|
if attributes.key?(:'secret_name')
|
|
148
157
|
self.secret_name = attributes[:'secret_name']
|
|
149
158
|
else
|
|
@@ -222,6 +231,7 @@ module Akeyless
|
|
|
222
231
|
namespace == o.namespace &&
|
|
223
232
|
object_type == o.object_type &&
|
|
224
233
|
pfx_password == o.pfx_password &&
|
|
234
|
+
region == o.region &&
|
|
225
235
|
secret_name == o.secret_name &&
|
|
226
236
|
tags == o.tags &&
|
|
227
237
|
token == o.token &&
|
|
@@ -240,7 +250,7 @@ module Akeyless
|
|
|
240
250
|
# Calculates hash code according to all attributes.
|
|
241
251
|
# @return [Integer] Hash code
|
|
242
252
|
def hash
|
|
243
|
-
[binary_value, description, json, namespace, object_type, pfx_password, secret_name, tags, token, uid_token, usc_encryption_key, usc_name, value].hash
|
|
253
|
+
[binary_value, description, json, namespace, object_type, pfx_password, region, secret_name, tags, token, uid_token, usc_encryption_key, usc_name, value].hash
|
|
244
254
|
end
|
|
245
255
|
|
|
246
256
|
# Builds the object from hash
|
data/lib/akeyless/version.rb
CHANGED