akeyless 5.0.2 → 5.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (90) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +3 -2
  3. data/docs/AccountGeneralSettings.md +4 -0
  4. data/docs/AzureTargetDetails.md +2 -0
  5. data/docs/CertificateChainInfo.md +10 -0
  6. data/docs/DSProducerDetails.md +2 -0
  7. data/docs/DynamicSecretCreateHanaDb.md +2 -0
  8. data/docs/DynamicSecretCreateMongoDb.md +2 -0
  9. data/docs/DynamicSecretCreateMsSql.md +2 -0
  10. data/docs/DynamicSecretCreateMySql.md +2 -0
  11. data/docs/DynamicSecretCreatePostgreSql.md +2 -0
  12. data/docs/DynamicSecretUpdateHanaDb.md +2 -0
  13. data/docs/DynamicSecretUpdateMongoDb.md +2 -0
  14. data/docs/DynamicSecretUpdateMsSql.md +2 -0
  15. data/docs/DynamicSecretUpdateMySql.md +2 -0
  16. data/docs/DynamicSecretUpdatePostgreSql.md +2 -0
  17. data/docs/GatewayCreateProducerHanaDb.md +2 -0
  18. data/docs/GatewayCreateProducerMSSQL.md +2 -0
  19. data/docs/GatewayCreateProducerMongo.md +2 -0
  20. data/docs/GatewayCreateProducerMySQL.md +2 -0
  21. data/docs/GatewayCreateProducerPostgreSQL.md +2 -0
  22. data/docs/GatewayUpdateProducerHanaDb.md +2 -0
  23. data/docs/GatewayUpdateProducerMSSQL.md +2 -0
  24. data/docs/GatewayUpdateProducerMongo.md +2 -0
  25. data/docs/GatewayUpdateProducerMySQL.md +2 -0
  26. data/docs/GatewayUpdateProducerPostgreSQL.md +2 -0
  27. data/docs/GcpTargetDetails.md +2 -0
  28. data/docs/ItemUSCSyncAssociation.md +1 -1
  29. data/docs/ListItemsInPathOutput.md +2 -0
  30. data/docs/ListItemsOutput.md +2 -0
  31. data/docs/NullString.md +20 -0
  32. data/docs/RotatedSecretCreateAws.md +5 -1
  33. data/docs/RotatedSecretCreateAzure.md +12 -0
  34. data/docs/RotatedSecretCreateCustom.md +11 -1
  35. data/docs/RotatedSecretCreateGcp.md +6 -0
  36. data/docs/RotatedSecretDetailsInfo.md +8 -0
  37. data/docs/RotatedSecretSync.md +2 -0
  38. data/docs/RotatedSecretUpdateAws.md +5 -1
  39. data/docs/RotatedSecretUpdateAzure.md +12 -0
  40. data/docs/RotatedSecretUpdateCustom.md +11 -1
  41. data/docs/RotatedSecretUpdateGcp.md +6 -0
  42. data/docs/UpdateAccountSettings.md +4 -0
  43. data/docs/UscSyncInfo.md +26 -0
  44. data/lib/akeyless/models/account_general_settings.rb +19 -1
  45. data/lib/akeyless/models/azure_target_details.rb +10 -1
  46. data/lib/akeyless/models/certificate_chain_info.rb +46 -1
  47. data/lib/akeyless/models/ds_producer_details.rb +10 -1
  48. data/lib/akeyless/models/dynamic_secret_create_hana_db.rb +11 -1
  49. data/lib/akeyless/models/dynamic_secret_create_mongo_db.rb +11 -1
  50. data/lib/akeyless/models/dynamic_secret_create_ms_sql.rb +11 -1
  51. data/lib/akeyless/models/dynamic_secret_create_my_sql.rb +11 -1
  52. data/lib/akeyless/models/dynamic_secret_create_postgre_sql.rb +11 -1
  53. data/lib/akeyless/models/dynamic_secret_update_hana_db.rb +11 -1
  54. data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +11 -1
  55. data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +11 -1
  56. data/lib/akeyless/models/dynamic_secret_update_my_sql.rb +11 -1
  57. data/lib/akeyless/models/dynamic_secret_update_postgre_sql.rb +11 -1
  58. data/lib/akeyless/models/gateway_create_producer_hana_db.rb +11 -1
  59. data/lib/akeyless/models/gateway_create_producer_mongo.rb +11 -1
  60. data/lib/akeyless/models/gateway_create_producer_mssql.rb +11 -1
  61. data/lib/akeyless/models/gateway_create_producer_my_sql.rb +11 -1
  62. data/lib/akeyless/models/gateway_create_producer_postgre_sql.rb +11 -1
  63. data/lib/akeyless/models/gateway_update_producer_hana_db.rb +11 -1
  64. data/lib/akeyless/models/gateway_update_producer_mongo.rb +11 -1
  65. data/lib/akeyless/models/gateway_update_producer_mssql.rb +11 -1
  66. data/lib/akeyless/models/gateway_update_producer_my_sql.rb +11 -1
  67. data/lib/akeyless/models/gateway_update_producer_postgre_sql.rb +11 -1
  68. data/lib/akeyless/models/gcp_target_details.rb +10 -1
  69. data/lib/akeyless/models/item_usc_sync_association.rb +1 -1
  70. data/lib/akeyless/models/list_items_in_path_output.rb +10 -1
  71. data/lib/akeyless/models/list_items_output.rb +10 -1
  72. data/lib/akeyless/models/null_string.rb +224 -0
  73. data/lib/akeyless/models/remote_secret_info.rb +1 -1
  74. data/lib/akeyless/models/rotated_secret_create_aws.rb +22 -2
  75. data/lib/akeyless/models/rotated_secret_create_azure.rb +63 -1
  76. data/lib/akeyless/models/rotated_secret_create_custom.rb +54 -4
  77. data/lib/akeyless/models/rotated_secret_create_gcp.rb +31 -1
  78. data/lib/akeyless/models/rotated_secret_details_info.rb +37 -1
  79. data/lib/akeyless/models/rotated_secret_sync.rb +11 -1
  80. data/lib/akeyless/models/rotated_secret_update_aws.rb +22 -2
  81. data/lib/akeyless/models/rotated_secret_update_azure.rb +63 -1
  82. data/lib/akeyless/models/rotated_secret_update_custom.rb +54 -4
  83. data/lib/akeyless/models/rotated_secret_update_gcp.rb +31 -1
  84. data/lib/akeyless/models/update_account_settings.rb +21 -1
  85. data/lib/akeyless/models/usc_sync_info.rb +250 -0
  86. data/lib/akeyless/version.rb +1 -1
  87. data/lib/akeyless.rb +2 -1
  88. data/spec/models/null_string_spec.rb +42 -0
  89. data/spec/models/usc_sync_info_spec.rb +60 -0
  90. metadata +1064 -1056
@@ -9,6 +9,7 @@
9
9
  | **custom_payload** | **String** | Secret payload to be sent with rotation request | [optional] |
10
10
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
11
11
  | **description** | **String** | Description of the object | [optional] |
12
+ | **enable_password_policy** | **String** | Enable password policy | [optional] |
12
13
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
13
14
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
14
15
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
@@ -35,6 +36,10 @@
35
36
  | **timeout_sec** | **Integer** | Maximum allowed time in seconds for the custom rotator to return the results | [optional][default to 40] |
36
37
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
37
38
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
39
+ | **use_capital_letters** | **String** | Password must contain capital letters [true/false] | [optional] |
40
+ | **use_lower_letters** | **String** | Password must contain lower case letters [true/false] | [optional] |
41
+ | **use_numbers** | **String** | Password must contain numbers [true/false] | [optional] |
42
+ | **use_special_characters** | **String** | Password must contain special characters [true/false] | [optional] |
38
43
 
39
44
  ## Example
40
45
 
@@ -47,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateCustom.new(
47
52
  custom_payload: null,
48
53
  delete_protection: null,
49
54
  description: null,
55
+ enable_password_policy: null,
50
56
  json: null,
51
57
  key: null,
52
58
  max_versions: null,
@@ -72,7 +78,11 @@ instance = Akeyless::RotatedSecretCreateCustom.new(
72
78
  target_name: null,
73
79
  timeout_sec: null,
74
80
  token: null,
75
- uid_token: null
81
+ uid_token: null,
82
+ use_capital_letters: null,
83
+ use_lower_letters: null,
84
+ use_numbers: null,
85
+ use_special_characters: null
76
86
  )
77
87
  ```
78
88
 
@@ -11,6 +11,9 @@
11
11
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
12
  | **gcp_service_account_email** | **String** | The email of the gcp service account to rotate | [optional] |
13
13
  | **gcp_service_account_key_id** | **String** | The key id of the gcp service account to rotate | [optional] |
14
+ | **grace_rotation** | **String** | Create a new access key without deleting the old key from AWS/Azure/GCP for backup (relevant only for AWS/Azure/GCP) [true/false] | [optional] |
15
+ | **grace_rotation_hour** | **Integer** | The Hour of the grace rotation in UTC | [optional] |
16
+ | **grace_rotation_interval** | **String** | The number of days to wait before deleting the old key (must be bigger than rotation-interval) | [optional] |
14
17
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
15
18
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
16
19
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
@@ -38,6 +41,9 @@ instance = Akeyless::RotatedSecretCreateGcp.new(
38
41
  gcp_key: null,
39
42
  gcp_service_account_email: null,
40
43
  gcp_service_account_key_id: null,
44
+ grace_rotation: null,
45
+ grace_rotation_hour: null,
46
+ grace_rotation_interval: null,
41
47
  json: null,
42
48
  key: null,
43
49
  max_versions: null,
@@ -5,11 +5,15 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **delete_previous_version_in_days** | **Integer** | | [optional] |
8
+ | **enable_custom_password_policy** | **Boolean** | | [optional] |
8
9
  | **grace_rotation** | **Boolean** | | [optional] |
10
+ | **grace_rotation_hour** | **Integer** | | [optional] |
11
+ | **grace_rotation_interval** | **Integer** | | [optional] |
9
12
  | **gw_cluster_id** | **Integer** | | [optional] |
10
13
  | **last_rotation_error** | **String** | | [optional] |
11
14
  | **managed_by_akeyless** | **Boolean** | | [optional] |
12
15
  | **max_versions** | **Integer** | | [optional] |
16
+ | **next_auto_rotate_type** | **String** | | [optional] |
13
17
  | **number_of_versions_to_save** | **Integer** | | [optional] |
14
18
  | **rotation_hour** | **Integer** | | [optional] |
15
19
  | **rotation_interval_min** | **Boolean** | | [optional] |
@@ -28,11 +32,15 @@ require 'akeyless'
28
32
 
29
33
  instance = Akeyless::RotatedSecretDetailsInfo.new(
30
34
  delete_previous_version_in_days: null,
35
+ enable_custom_password_policy: null,
31
36
  grace_rotation: null,
37
+ grace_rotation_hour: null,
38
+ grace_rotation_interval: null,
32
39
  gw_cluster_id: null,
33
40
  last_rotation_error: null,
34
41
  managed_by_akeyless: null,
35
42
  max_versions: null,
43
+ next_auto_rotate_type: null,
36
44
  number_of_versions_to_save: null,
37
45
  rotation_hour: null,
38
46
  rotation_interval_min: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **filter_secret_value** | **String** | JQ expression to filter or transform the secret value | [optional] |
7
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
8
9
  | **name** | **String** | Rotated secret name | |
9
10
  | **namespace** | **String** | Vault namespace, releavnt only for Hashicorp Vault Target | [optional] |
@@ -18,6 +19,7 @@
18
19
  require 'akeyless'
19
20
 
20
21
  instance = Akeyless::RotatedSecretSync.new(
22
+ filter_secret_value: null,
21
23
  json: null,
22
24
  name: null,
23
25
  namespace: null,
@@ -12,7 +12,9 @@
12
12
  | **aws_region** | **String** | Aws Region | [optional][default to 'us-east-2'] |
13
13
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
14
14
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
15
- | **grace_rotation** | **String** | Create a new access key without deleting the old key from AWS for backup (relevant only for AWS) [true/false] | [optional] |
15
+ | **grace_rotation** | **String** | Create a new access key without deleting the old key from AWS/Azure/GCP for backup (relevant only for AWS/Azure/GCP) [true/false] | [optional] |
16
+ | **grace_rotation_hour** | **Integer** | The Hour of the grace rotation in UTC | [optional] |
17
+ | **grace_rotation_interval** | **String** | The number of days to wait before deleting the old key (must be bigger than rotation-interval) | [optional] |
16
18
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
17
19
  | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
18
20
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
@@ -48,6 +50,8 @@ instance = Akeyless::RotatedSecretUpdateAws.new(
48
50
  delete_protection: null,
49
51
  description: null,
50
52
  grace_rotation: null,
53
+ grace_rotation_hour: null,
54
+ grace_rotation_interval: null,
51
55
  json: null,
52
56
  keep_prev_version: null,
53
57
  key: null,
@@ -12,6 +12,10 @@
12
12
  | **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] | [optional] |
13
13
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
14
14
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
15
+ | **explicitly_set_sa** | **String** | If set, explicitly provide the storage account details [true/false] | [optional][default to 'false'] |
16
+ | **grace_rotation** | **String** | Create a new access key without deleting the old key from AWS/Azure/GCP for backup (relevant only for AWS/Azure/GCP) [true/false] | [optional] |
17
+ | **grace_rotation_hour** | **Integer** | The Hour of the grace rotation in UTC | [optional] |
18
+ | **grace_rotation_interval** | **String** | The number of days to wait before deleting the old key (must be bigger than rotation-interval) | [optional] |
15
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
16
20
  | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
17
21
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
@@ -19,6 +23,8 @@
19
23
  | **name** | **String** | Rotated secret name | |
20
24
  | **new_name** | **String** | New item name | [optional] |
21
25
  | **password_length** | **String** | The length of the password to be generated | [optional] |
26
+ | **resource_group_name** | **String** | The resource group name (only relevant when explicitly-set-sa=true) | [optional] |
27
+ | **resource_name** | **String** | The name of the storage account (only relevant when explicitly-set-sa=true) | [optional] |
22
28
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
23
29
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
24
30
  | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
@@ -49,6 +55,10 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
49
55
  auto_rotate: null,
50
56
  delete_protection: null,
51
57
  description: null,
58
+ explicitly_set_sa: null,
59
+ grace_rotation: null,
60
+ grace_rotation_hour: null,
61
+ grace_rotation_interval: null,
52
62
  json: null,
53
63
  keep_prev_version: null,
54
64
  key: null,
@@ -56,6 +66,8 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
56
66
  name: null,
57
67
  new_name: null,
58
68
  password_length: null,
69
+ resource_group_name: null,
70
+ resource_name: null,
59
71
  rm_tag: null,
60
72
  rotate_after_disconnect: null,
61
73
  rotation_event_in: null,
@@ -10,6 +10,7 @@
10
10
  | **custom_payload** | **String** | Secret payload to be sent with rotation request | [optional] |
11
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
12
12
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
13
+ | **enable_password_policy** | **String** | Enable password policy | [optional] |
13
14
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
15
  | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
15
16
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
@@ -37,6 +38,10 @@
37
38
  | **timeout_sec** | **Integer** | Maximum allowed time in seconds for the custom rotator to return the results | [optional] |
38
39
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
39
40
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
41
+ | **use_capital_letters** | **String** | Password must contain capital letters [true/false] | [optional] |
42
+ | **use_lower_letters** | **String** | Password must contain lower case letters [true/false] | [optional] |
43
+ | **use_numbers** | **String** | Password must contain numbers [true/false] | [optional] |
44
+ | **use_special_characters** | **String** | Password must contain special characters [true/false] | [optional] |
40
45
 
41
46
  ## Example
42
47
 
@@ -50,6 +55,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
50
55
  custom_payload: null,
51
56
  delete_protection: null,
52
57
  description: null,
58
+ enable_password_policy: null,
53
59
  json: null,
54
60
  keep_prev_version: null,
55
61
  key: null,
@@ -76,7 +82,11 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
76
82
  secure_access_web_proxy: null,
77
83
  timeout_sec: null,
78
84
  token: null,
79
- uid_token: null
85
+ uid_token: null,
86
+ use_capital_letters: null,
87
+ use_lower_letters: null,
88
+ use_numbers: null,
89
+ use_special_characters: null
80
90
  )
81
91
  ```
82
92
 
@@ -12,6 +12,9 @@
12
12
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
13
13
  | **gcp_service_account_email** | **String** | The email of the gcp service account to rotate | [optional] |
14
14
  | **gcp_service_account_key_id** | **String** | The key id of the gcp service account to rotate | [optional] |
15
+ | **grace_rotation** | **String** | Create a new access key without deleting the old key from AWS/Azure/GCP for backup (relevant only for AWS/Azure/GCP) [true/false] | [optional] |
16
+ | **grace_rotation_hour** | **Integer** | The Hour of the grace rotation in UTC | [optional] |
17
+ | **grace_rotation_interval** | **String** | The number of days to wait before deleting the old key (must be bigger than rotation-interval) | [optional] |
15
18
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
16
19
  | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
17
20
  | **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
@@ -41,6 +44,9 @@ instance = Akeyless::RotatedSecretUpdateGcp.new(
41
44
  gcp_key: null,
42
45
  gcp_service_account_email: null,
43
46
  gcp_service_account_key_id: null,
47
+ grace_rotation: null,
48
+ grace_rotation_hour: null,
49
+ grace_rotation_interval: null,
44
50
  json: null,
45
51
  keep_prev_version: null,
46
52
  key: null,
@@ -19,6 +19,8 @@
19
19
  | **enable_password_expiration** | **String** | Enable password expiration policy [true/false] | [optional] |
20
20
  | **force_new_versions** | **String** | If set to true, new version will be created on update | [optional] |
21
21
  | **gw_bound_ips** | **Array<String>** | A default list of comma-separated CIDR block that acts as a trusted Gateway entity. | [optional] |
22
+ | **hide_personal_folder** | **String** | Hide personal folder, if set - users will not be able to use personal folder [true/false] | [optional] |
23
+ | **hide_static_password** | **String** | Hide static secret's password type [true/false] | [optional] |
22
24
  | **invalid_characters** | **String** | Characters that cannot be used for items/targets/roles/auths/event_forwarder names. Empty string will enforce nothing. | [optional][default to 'notReceivedInvalidCharacter'] |
23
25
  | **item_type** | **String** | VersionSettingsObjectType defines object types for account version settings | [optional] |
24
26
  | **items_deletion_protection** | **String** | Set or unset the default behaviour of items deletion protection [true/false] | [optional] |
@@ -68,6 +70,8 @@ instance = Akeyless::UpdateAccountSettings.new(
68
70
  enable_password_expiration: null,
69
71
  force_new_versions: null,
70
72
  gw_bound_ips: null,
73
+ hide_personal_folder: null,
74
+ hide_static_password: null,
71
75
  invalid_characters: null,
72
76
  item_type: null,
73
77
  items_deletion_protection: null,
@@ -0,0 +1,26 @@
1
+ # Akeyless::UscSyncInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **jq_secret_filter** | **String** | | [optional] |
8
+ | **last_error** | **String** | | [optional] |
9
+ | **namespace** | **String** | | [optional] |
10
+ | **secret_id** | **String** | | [optional] |
11
+ | **secret_name** | **String** | | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::UscSyncInfo.new(
19
+ jq_secret_filter: null,
20
+ last_error: null,
21
+ namespace: null,
22
+ secret_id: null,
23
+ secret_name: null
24
+ )
25
+ ```
26
+
@@ -36,6 +36,10 @@ module Akeyless
36
36
 
37
37
  attr_accessor :enable_request_for_access
38
38
 
39
+ attr_accessor :hide_personal_folder
40
+
41
+ attr_accessor :hide_static_password
42
+
39
43
  # InvalidCharacters is the invalid characters for items/targets/roles/auths/notifier_forwarder naming convention
40
44
  attr_accessor :invalid_characters
41
45
 
@@ -68,6 +72,8 @@ module Akeyless
68
72
  :'default_home_page' => :'default_home_page',
69
73
  :'dynamic_secret_max_ttl' => :'dynamic_secret_max_ttl',
70
74
  :'enable_request_for_access' => :'enable_request_for_access',
75
+ :'hide_personal_folder' => :'hide_personal_folder',
76
+ :'hide_static_password' => :'hide_static_password',
71
77
  :'invalid_characters' => :'invalid_characters',
72
78
  :'item_usage_event' => :'item_usage_event',
73
79
  :'lock_default_key' => :'lock_default_key',
@@ -97,6 +103,8 @@ module Akeyless
97
103
  :'default_home_page' => :'DefaultHomePage',
98
104
  :'dynamic_secret_max_ttl' => :'DynamicSecretMaxTtl',
99
105
  :'enable_request_for_access' => :'Boolean',
106
+ :'hide_personal_folder' => :'Boolean',
107
+ :'hide_static_password' => :'Boolean',
100
108
  :'invalid_characters' => :'String',
101
109
  :'item_usage_event' => :'UsageEventSetting',
102
110
  :'lock_default_key' => :'Boolean',
@@ -166,6 +174,14 @@ module Akeyless
166
174
  self.enable_request_for_access = attributes[:'enable_request_for_access']
167
175
  end
168
176
 
177
+ if attributes.key?(:'hide_personal_folder')
178
+ self.hide_personal_folder = attributes[:'hide_personal_folder']
179
+ end
180
+
181
+ if attributes.key?(:'hide_static_password')
182
+ self.hide_static_password = attributes[:'hide_static_password']
183
+ end
184
+
169
185
  if attributes.key?(:'invalid_characters')
170
186
  self.invalid_characters = attributes[:'invalid_characters']
171
187
  end
@@ -232,6 +248,8 @@ module Akeyless
232
248
  default_home_page == o.default_home_page &&
233
249
  dynamic_secret_max_ttl == o.dynamic_secret_max_ttl &&
234
250
  enable_request_for_access == o.enable_request_for_access &&
251
+ hide_personal_folder == o.hide_personal_folder &&
252
+ hide_static_password == o.hide_static_password &&
235
253
  invalid_characters == o.invalid_characters &&
236
254
  item_usage_event == o.item_usage_event &&
237
255
  lock_default_key == o.lock_default_key &&
@@ -252,7 +270,7 @@ module Akeyless
252
270
  # Calculates hash code according to all attributes.
253
271
  # @return [Integer] Hash code
254
272
  def hash
255
- [account_default_key_item_id, account_default_key_name, allowed_clients_ips, allowed_gateways_ips, auth_usage_event, data_protection_section, default_home_page, dynamic_secret_max_ttl, enable_request_for_access, invalid_characters, item_usage_event, lock_default_key, password_expiration_info, password_policy, password_score, protect_items_by_default, rotation_secret_max_interval, sharing_policy].hash
273
+ [account_default_key_item_id, account_default_key_name, allowed_clients_ips, allowed_gateways_ips, auth_usage_event, data_protection_section, default_home_page, dynamic_secret_max_ttl, enable_request_for_access, hide_personal_folder, hide_static_password, invalid_characters, item_usage_event, lock_default_key, password_expiration_info, password_policy, password_score, protect_items_by_default, rotation_secret_max_interval, sharing_policy].hash
256
274
  end
257
275
 
258
276
  # Builds the object from hash
@@ -33,6 +33,8 @@ module Akeyless
33
33
 
34
34
  attr_accessor :expiration_date
35
35
 
36
+ attr_accessor :grace_rotated_secret_key
37
+
36
38
  attr_accessor :use_gw_cloud_identity
37
39
 
38
40
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -47,6 +49,7 @@ module Akeyless
47
49
  :'azure_username' => :'azure_username',
48
50
  :'connection_type' => :'connection_type',
49
51
  :'expiration_date' => :'expiration_date',
52
+ :'grace_rotated_secret_key' => :'grace_rotated_secret_key',
50
53
  :'use_gw_cloud_identity' => :'use_gw_cloud_identity'
51
54
  }
52
55
  end
@@ -68,6 +71,7 @@ module Akeyless
68
71
  :'azure_username' => :'String',
69
72
  :'connection_type' => :'String',
70
73
  :'expiration_date' => :'Time',
74
+ :'grace_rotated_secret_key' => :'String',
71
75
  :'use_gw_cloud_identity' => :'Boolean'
72
76
  }
73
77
  end
@@ -129,6 +133,10 @@ module Akeyless
129
133
  self.expiration_date = attributes[:'expiration_date']
130
134
  end
131
135
 
136
+ if attributes.key?(:'grace_rotated_secret_key')
137
+ self.grace_rotated_secret_key = attributes[:'grace_rotated_secret_key']
138
+ end
139
+
132
140
  if attributes.key?(:'use_gw_cloud_identity')
133
141
  self.use_gw_cloud_identity = attributes[:'use_gw_cloud_identity']
134
142
  end
@@ -163,6 +171,7 @@ module Akeyless
163
171
  azure_username == o.azure_username &&
164
172
  connection_type == o.connection_type &&
165
173
  expiration_date == o.expiration_date &&
174
+ grace_rotated_secret_key == o.grace_rotated_secret_key &&
166
175
  use_gw_cloud_identity == o.use_gw_cloud_identity
167
176
  end
168
177
 
@@ -175,7 +184,7 @@ module Akeyless
175
184
  # Calculates hash code according to all attributes.
176
185
  # @return [Integer] Hash code
177
186
  def hash
178
- [azure_client_id, azure_client_secret, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_username, connection_type, expiration_date, use_gw_cloud_identity].hash
187
+ [azure_client_id, azure_client_secret, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_username, connection_type, expiration_date, grace_rotated_secret_key, use_gw_cloud_identity].hash
179
188
  end
180
189
 
181
190
  # Builds the object from hash
@@ -35,10 +35,20 @@ module Akeyless
35
35
 
36
36
  attr_accessor :certificate_status
37
37
 
38
+ attr_accessor :common_name
39
+
38
40
  attr_accessor :error_message
39
41
 
42
+ attr_accessor :expiration_date
43
+
40
44
  attr_accessor :expiration_events
41
45
 
46
+ attr_accessor :external_ca_id
47
+
48
+ attr_accessor :issuance_status
49
+
50
+ attr_accessor :not_before
51
+
42
52
  attr_accessor :renew_before_expiration_in_days
43
53
 
44
54
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -54,8 +64,13 @@ module Akeyless
54
64
  :'certificate_issuer_name' => :'certificate_issuer_name',
55
65
  :'certificate_pem' => :'certificate_pem',
56
66
  :'certificate_status' => :'certificate_status',
67
+ :'common_name' => :'common_name',
57
68
  :'error_message' => :'error_message',
69
+ :'expiration_date' => :'expiration_date',
58
70
  :'expiration_events' => :'expiration_events',
71
+ :'external_ca_id' => :'external_ca_id',
72
+ :'issuance_status' => :'issuance_status',
73
+ :'not_before' => :'not_before',
59
74
  :'renew_before_expiration_in_days' => :'renew_before_expiration_in_days'
60
75
  }
61
76
  end
@@ -78,8 +93,13 @@ module Akeyless
78
93
  :'certificate_issuer_name' => :'String',
79
94
  :'certificate_pem' => :'String',
80
95
  :'certificate_status' => :'String',
96
+ :'common_name' => :'String',
81
97
  :'error_message' => :'String',
98
+ :'expiration_date' => :'Time',
82
99
  :'expiration_events' => :'Array<CertificateExpirationEvent>',
100
+ :'external_ca_id' => :'NullString',
101
+ :'issuance_status' => :'String',
102
+ :'not_before' => :'Time',
83
103
  :'renew_before_expiration_in_days' => :'Integer'
84
104
  }
85
105
  end
@@ -147,16 +167,36 @@ module Akeyless
147
167
  self.certificate_status = attributes[:'certificate_status']
148
168
  end
149
169
 
170
+ if attributes.key?(:'common_name')
171
+ self.common_name = attributes[:'common_name']
172
+ end
173
+
150
174
  if attributes.key?(:'error_message')
151
175
  self.error_message = attributes[:'error_message']
152
176
  end
153
177
 
178
+ if attributes.key?(:'expiration_date')
179
+ self.expiration_date = attributes[:'expiration_date']
180
+ end
181
+
154
182
  if attributes.key?(:'expiration_events')
155
183
  if (value = attributes[:'expiration_events']).is_a?(Array)
156
184
  self.expiration_events = value
157
185
  end
158
186
  end
159
187
 
188
+ if attributes.key?(:'external_ca_id')
189
+ self.external_ca_id = attributes[:'external_ca_id']
190
+ end
191
+
192
+ if attributes.key?(:'issuance_status')
193
+ self.issuance_status = attributes[:'issuance_status']
194
+ end
195
+
196
+ if attributes.key?(:'not_before')
197
+ self.not_before = attributes[:'not_before']
198
+ end
199
+
160
200
  if attributes.key?(:'renew_before_expiration_in_days')
161
201
  self.renew_before_expiration_in_days = attributes[:'renew_before_expiration_in_days']
162
202
  end
@@ -192,8 +232,13 @@ module Akeyless
192
232
  certificate_issuer_name == o.certificate_issuer_name &&
193
233
  certificate_pem == o.certificate_pem &&
194
234
  certificate_status == o.certificate_status &&
235
+ common_name == o.common_name &&
195
236
  error_message == o.error_message &&
237
+ expiration_date == o.expiration_date &&
196
238
  expiration_events == o.expiration_events &&
239
+ external_ca_id == o.external_ca_id &&
240
+ issuance_status == o.issuance_status &&
241
+ not_before == o.not_before &&
197
242
  renew_before_expiration_in_days == o.renew_before_expiration_in_days
198
243
  end
199
244
 
@@ -206,7 +251,7 @@ module Akeyless
206
251
  # Calculates hash code according to all attributes.
207
252
  # @return [Integer] Hash code
208
253
  def hash
209
- [auto_renew_certificate, certificate_chain, certificate_format, certificate_has_private_key, certificate_issuer_gw_cluster_id, certificate_issuer_gw_cluster_url, certificate_issuer_item_id, certificate_issuer_name, certificate_pem, certificate_status, error_message, expiration_events, renew_before_expiration_in_days].hash
254
+ [auto_renew_certificate, certificate_chain, certificate_format, certificate_has_private_key, certificate_issuer_gw_cluster_id, certificate_issuer_gw_cluster_url, certificate_issuer_item_id, certificate_issuer_name, certificate_pem, certificate_status, common_name, error_message, expiration_date, expiration_events, external_ca_id, issuance_status, not_before, renew_before_expiration_in_days].hash
210
255
  end
211
256
 
212
257
  # Builds the object from hash
@@ -272,6 +272,8 @@ module Akeyless
272
272
 
273
273
  attr_accessor :google_workspace_role_scope
274
274
 
275
+ attr_accessor :grace_rotated_secret_key
276
+
275
277
  attr_accessor :grant_types
276
278
 
277
279
  attr_accessor :groups
@@ -655,6 +657,7 @@ module Akeyless
655
657
  :'google_workspace_group_role' => :'google_workspace_group_role',
656
658
  :'google_workspace_role_name' => :'google_workspace_role_name',
657
659
  :'google_workspace_role_scope' => :'google_workspace_role_scope',
660
+ :'grace_rotated_secret_key' => :'grace_rotated_secret_key',
658
661
  :'grant_types' => :'grant_types',
659
662
  :'groups' => :'groups',
660
663
  :'hanadb_creation_statements' => :'hanadb_creation_statements',
@@ -911,6 +914,7 @@ module Akeyless
911
914
  :'google_workspace_group_role' => :'String',
912
915
  :'google_workspace_role_name' => :'String',
913
916
  :'google_workspace_role_scope' => :'String',
917
+ :'grace_rotated_secret_key' => :'String',
914
918
  :'grant_types' => :'Array<String>',
915
919
  :'groups' => :'String',
916
920
  :'hanadb_creation_statements' => :'String',
@@ -1570,6 +1574,10 @@ module Akeyless
1570
1574
  self.google_workspace_role_scope = attributes[:'google_workspace_role_scope']
1571
1575
  end
1572
1576
 
1577
+ if attributes.key?(:'grace_rotated_secret_key')
1578
+ self.grace_rotated_secret_key = attributes[:'grace_rotated_secret_key']
1579
+ end
1580
+
1573
1581
  if attributes.key?(:'grant_types')
1574
1582
  if (value = attributes[:'grant_types']).is_a?(Array)
1575
1583
  self.grant_types = value
@@ -2209,6 +2217,7 @@ module Akeyless
2209
2217
  google_workspace_group_role == o.google_workspace_group_role &&
2210
2218
  google_workspace_role_name == o.google_workspace_role_name &&
2211
2219
  google_workspace_role_scope == o.google_workspace_role_scope &&
2220
+ grace_rotated_secret_key == o.grace_rotated_secret_key &&
2212
2221
  grant_types == o.grant_types &&
2213
2222
  groups == o.groups &&
2214
2223
  hanadb_creation_statements == o.hanadb_creation_statements &&
@@ -2339,7 +2348,7 @@ module Akeyless
2339
2348
  # Calculates hash code according to all attributes.
2340
2349
  # @return [Integer] Hash code
2341
2350
  def hash
2342
- [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_region, aws_role_arns, aws_secret_access_key, aws_session_tags, aws_session_token, aws_transitive_tag_keys, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, azure_username, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, cloud_service_provider, cluster_mode, connection_type, create_sync_url, db_client_id, db_client_secret, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_tenant_id, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, expiration_date, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_key_id, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_organization_name, github_repository_path, gitlab_access_token, gitlab_access_type, gitlab_certificate, gitlab_group_name, gitlab_project_name, gitlab_role, gitlab_token_scope, gitlab_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, google_workspace_access_mode, google_workspace_admin_name, google_workspace_fixed_user_name_sub_claim_key, google_workspace_group_name, google_workspace_group_role, google_workspace_role_name, google_workspace_role_scope, grant_types, groups, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_auth_type, k8s_bearer_token, k8s_client_cert_data, k8s_client_key_data, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_cluster_name, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_fixed_user_name_sub_claim_key, ldap_fixed_user_type, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, oracle_creation_statements, oracle_revocation_statements, oracle_wallet_details, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, rdp_fixed_user_name_sub_claim_key, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2351
+ [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_region, aws_role_arns, aws_secret_access_key, aws_session_tags, aws_session_token, aws_transitive_tag_keys, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, azure_username, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, cloud_service_provider, cluster_mode, connection_type, create_sync_url, db_client_id, db_client_secret, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_tenant_id, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, expiration_date, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_key_id, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_organization_name, github_repository_path, gitlab_access_token, gitlab_access_type, gitlab_certificate, gitlab_group_name, gitlab_project_name, gitlab_role, gitlab_token_scope, gitlab_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, google_workspace_access_mode, google_workspace_admin_name, google_workspace_fixed_user_name_sub_claim_key, google_workspace_group_name, google_workspace_group_role, google_workspace_role_name, google_workspace_role_scope, grace_rotated_secret_key, grant_types, groups, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_auth_type, k8s_bearer_token, k8s_client_cert_data, k8s_client_key_data, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_cluster_name, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_fixed_user_name_sub_claim_key, ldap_fixed_user_type, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, oracle_creation_statements, oracle_revocation_statements, oracle_wallet_details, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, rdp_fixed_user_name_sub_claim_key, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2343
2352
  end
2344
2353
 
2345
2354
  # Builds the object from hash
@@ -61,6 +61,9 @@ module Akeyless
61
61
  # Path to the SSH Certificate Issuer for your Akeyless Secure Access
62
62
  attr_accessor :secure_access_certificate_issuer
63
63
 
64
+ # The DB name (relevant only for DB Dynamic-Secret)
65
+ attr_accessor :secure_access_db_name
66
+
64
67
  # The DB schema
65
68
  attr_accessor :secure_access_db_schema
66
69
 
@@ -106,6 +109,7 @@ module Akeyless
106
109
  :'producer_encryption_key_name' => :'producer-encryption-key-name',
107
110
  :'secure_access_bastion_issuer' => :'secure-access-bastion-issuer',
108
111
  :'secure_access_certificate_issuer' => :'secure-access-certificate-issuer',
112
+ :'secure_access_db_name' => :'secure-access-db-name',
109
113
  :'secure_access_db_schema' => :'secure-access-db-schema',
110
114
  :'secure_access_enable' => :'secure-access-enable',
111
115
  :'secure_access_host' => :'secure-access-host',
@@ -141,6 +145,7 @@ module Akeyless
141
145
  :'producer_encryption_key_name' => :'String',
142
146
  :'secure_access_bastion_issuer' => :'String',
143
147
  :'secure_access_certificate_issuer' => :'String',
148
+ :'secure_access_db_name' => :'String',
144
149
  :'secure_access_db_schema' => :'String',
145
150
  :'secure_access_enable' => :'String',
146
151
  :'secure_access_host' => :'Array<String>',
@@ -242,6 +247,10 @@ module Akeyless
242
247
  self.secure_access_certificate_issuer = attributes[:'secure_access_certificate_issuer']
243
248
  end
244
249
 
250
+ if attributes.key?(:'secure_access_db_name')
251
+ self.secure_access_db_name = attributes[:'secure_access_db_name']
252
+ end
253
+
245
254
  if attributes.key?(:'secure_access_db_schema')
246
255
  self.secure_access_db_schema = attributes[:'secure_access_db_schema']
247
256
  end
@@ -327,6 +336,7 @@ module Akeyless
327
336
  producer_encryption_key_name == o.producer_encryption_key_name &&
328
337
  secure_access_bastion_issuer == o.secure_access_bastion_issuer &&
329
338
  secure_access_certificate_issuer == o.secure_access_certificate_issuer &&
339
+ secure_access_db_name == o.secure_access_db_name &&
330
340
  secure_access_db_schema == o.secure_access_db_schema &&
331
341
  secure_access_enable == o.secure_access_enable &&
332
342
  secure_access_host == o.secure_access_host &&
@@ -347,7 +357,7 @@ module Akeyless
347
357
  # Calculates hash code according to all attributes.
348
358
  # @return [Integer] Hash code
349
359
  def hash
350
- [delete_protection, description, hana_dbname, hanadb_create_statements, hanadb_host, hanadb_password, hanadb_port, hanadb_revocation_statements, hanadb_username, json, name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token, user_ttl].hash
360
+ [delete_protection, description, hana_dbname, hanadb_create_statements, hanadb_host, hanadb_password, hanadb_port, hanadb_revocation_statements, hanadb_username, json, name, password_length, producer_encryption_key_name, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, tags, target_name, token, uid_token, user_ttl].hash
351
361
  end
352
362
 
353
363
  # Builds the object from hash