akeyless 5.0.21 → 5.0.23
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +35 -1
- data/docs/AccountGeneralSettings.md +6 -0
- data/docs/ActiveDirectoryPayload.md +6 -0
- data/docs/Auth.md +2 -0
- data/docs/AuthMethodCreateCert.md +2 -0
- data/docs/AuthMethodCreateUniversalIdentity.md +4 -0
- data/docs/AuthMethodUpdateCert.md +2 -0
- data/docs/AuthMethodUpdateUniversalIdentity.md +4 -0
- data/docs/AwsStorage.md +2 -0
- data/docs/AzureADAccessRules.md +2 -0
- data/docs/AzureTargetDetails.md +2 -0
- data/docs/CertAccessRules.md +2 -0
- data/docs/CertificateChainInfo.md +2 -0
- data/docs/Configure.md +2 -0
- data/docs/ConjurMigration.md +20 -0
- data/docs/ConjurPayload.md +24 -0
- data/docs/CreateAuthMethodCert.md +2 -0
- data/docs/CreateAuthMethodUniversalIdentity.md +4 -0
- data/docs/CreateAzureTarget.md +2 -0
- data/docs/CreateRotatedSecret.md +3 -1
- data/docs/CreateSecret.md +2 -0
- data/docs/CreateUSC.md +10 -0
- data/docs/DSProducerDetails.md +2 -0
- data/docs/DefaultAuthMethodSettings.md +20 -0
- data/docs/DeleteRoleRule.md +1 -1
- data/docs/DescribePermissions.md +1 -1
- data/docs/DigiCertTargetDetails.md +42 -0
- data/docs/EsmListSecretsOutput.md +3 -1
- data/docs/GatewayCreateMigration.md +19 -1
- data/docs/GatewayUpdateMigration.md +18 -0
- data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +2 -0
- data/docs/GeneralConfigPart.md +4 -0
- data/docs/GetPKICertificateOutput.md +2 -0
- data/docs/GithubMetadata.md +28 -0
- data/docs/GoogleTrustTargetDetails.md +42 -0
- data/docs/HTTPChallengeInfo.md +26 -0
- data/docs/HashiPayload.md +5 -1
- data/docs/IssuerOverviewInfo.md +22 -0
- data/docs/Item.md +2 -0
- data/docs/ItemGeneralInfo.md +2 -0
- data/docs/ItemLockingSetting.md +20 -0
- data/docs/LockItem.md +28 -0
- data/docs/LockTarget.md +28 -0
- data/docs/LockingInfo.md +24 -0
- data/docs/MigrationStatusReplyObj.md +4 -0
- data/docs/MigrationsConfigPart.md +2 -0
- data/docs/NetappStorage.md +30 -0
- data/docs/ReverseRBAC.md +1 -1
- data/docs/RotatedSecretCreateAws.md +3 -1
- data/docs/RotatedSecretCreateAzure.md +3 -1
- data/docs/RotatedSecretCreateCustom.md +3 -1
- data/docs/RotatedSecretCreateLdap.md +3 -1
- data/docs/RotatedSecretCreateMongodb.md +3 -1
- data/docs/RotatedSecretCreateMssql.md +3 -1
- data/docs/RotatedSecretCreateMysql.md +3 -1
- data/docs/RotatedSecretCreateOracledb.md +3 -1
- data/docs/RotatedSecretCreatePostgresql.md +3 -1
- data/docs/RotatedSecretCreateRedshift.md +3 -1
- data/docs/RotatedSecretCreateSsh.md +3 -1
- data/docs/RotatedSecretCreateWindows.md +3 -1
- data/docs/RotatedSecretUpdateAws.md +3 -1
- data/docs/RotatedSecretUpdateAzure.md +3 -1
- data/docs/RotatedSecretUpdateCustom.md +3 -1
- data/docs/RotatedSecretUpdateLdap.md +3 -1
- data/docs/RotatedSecretUpdateMongodb.md +3 -1
- data/docs/RotatedSecretUpdateMssql.md +3 -1
- data/docs/RotatedSecretUpdateMysql.md +3 -1
- data/docs/RotatedSecretUpdateOracledb.md +3 -1
- data/docs/RotatedSecretUpdatePostgresql.md +3 -1
- data/docs/RotatedSecretUpdateRedshift.md +3 -1
- data/docs/RotatedSecretUpdateSsh.md +3 -1
- data/docs/RotatedSecretUpdateWindows.md +3 -1
- data/docs/SecretInfo.md +4 -0
- data/docs/SecureRemoteAccess.md +4 -0
- data/docs/SetRoleRule.md +1 -1
- data/docs/SyncCounters.md +22 -0
- data/docs/Target.md +2 -0
- data/docs/TargetCreateAzure.md +2 -0
- data/docs/TargetCreateDigiCert.md +50 -0
- data/docs/TargetCreateGoogleTrust.md +50 -0
- data/docs/TargetCreateLetsEncrypt.md +1 -1
- data/docs/TargetCreateSplunk.md +3 -1
- data/docs/TargetTypeDetailsInput.md +4 -0
- data/docs/TargetUpdateAzure.md +2 -0
- data/docs/TargetUpdateDigiCert.md +54 -0
- data/docs/TargetUpdateGoogleTrust.md +54 -0
- data/docs/TargetUpdateLetsEncrypt.md +1 -1
- data/docs/UniversalIdentityAccessRules.md +4 -0
- data/docs/UnlockItem.md +24 -0
- data/docs/UnlockTarget.md +24 -0
- data/docs/UpdateAccountSettings.md +4 -0
- data/docs/UpdateAuthMethodCert.md +2 -0
- data/docs/UpdateAuthMethodUniversalIdentity.md +4 -0
- data/docs/UpdateAzureTarget.md +2 -0
- data/docs/UpdateItem.md +3 -1
- data/docs/UpdateRotatedSecret.md +3 -1
- data/docs/UscCreate.md +2 -0
- data/docs/UscDelete.md +4 -0
- data/docs/UscGet.md +4 -0
- data/docs/UscListSecretsOutput.md +3 -1
- data/docs/UscUpdate.md +4 -0
- data/docs/V2Api.md +632 -2
- data/docs/ValidateCertificateChallenge.md +30 -0
- data/docs/ValidateCertificateChallengeOutput.md +24 -0
- data/docs/VaultAddress.md +20 -0
- data/docs/VaultAddressOutput.md +20 -0
- data/docs/WebBastionRdpRecord.md +2 -0
- data/lib/akeyless/api/v2_api.rb +640 -0
- data/lib/akeyless/models/account_general_settings.rb +28 -1
- data/lib/akeyless/models/active_directory_payload.rb +30 -1
- data/lib/akeyless/models/auth.rb +13 -1
- data/lib/akeyless/models/auth_method_create_cert.rb +11 -1
- data/lib/akeyless/models/auth_method_create_universal_identity.rb +25 -1
- data/lib/akeyless/models/auth_method_update_cert.rb +11 -1
- data/lib/akeyless/models/auth_method_update_universal_identity.rb +25 -1
- data/lib/akeyless/models/aws_storage.rb +10 -1
- data/lib/akeyless/models/azure_ad_access_rules.rb +11 -1
- data/lib/akeyless/models/azure_target_details.rb +10 -1
- data/lib/akeyless/models/cert_access_rules.rb +11 -1
- data/lib/akeyless/models/certificate_chain_info.rb +11 -1
- data/lib/akeyless/models/configure.rb +13 -1
- data/lib/akeyless/models/conjur_migration.rb +223 -0
- data/lib/akeyless/models/conjur_payload.rb +241 -0
- data/lib/akeyless/models/create_auth_method_cert.rb +11 -1
- data/lib/akeyless/models/create_auth_method_universal_identity.rb +25 -1
- data/lib/akeyless/models/create_azure_target.rb +13 -1
- data/lib/akeyless/models/create_rotated_secret.rb +12 -4
- data/lib/akeyless/models/create_secret.rb +11 -1
- data/lib/akeyless/models/create_usc.rb +54 -1
- data/lib/akeyless/models/default_auth_method_settings.rb +223 -0
- data/lib/akeyless/models/delete_role_rule.rb +1 -1
- data/lib/akeyless/models/describe_permissions.rb +1 -1
- data/lib/akeyless/models/digi_cert_target_details.rb +333 -0
- data/lib/akeyless/models/ds_producer_details.rb +10 -1
- data/lib/akeyless/models/esm_list_secrets_output.rb +15 -4
- data/lib/akeyless/models/gateway_create_migration.rb +94 -2
- data/lib/akeyless/models/gateway_update_migration.rb +93 -1
- data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +11 -1
- data/lib/akeyless/models/general_config_part.rb +19 -1
- data/lib/akeyless/models/get_pki_certificate_output.rb +10 -1
- data/lib/akeyless/models/github_metadata.rb +259 -0
- data/lib/akeyless/models/google_trust_target_details.rb +335 -0
- data/lib/akeyless/models/hashi_payload.rb +22 -4
- data/lib/akeyless/models/http_challenge_info.rb +251 -0
- data/lib/akeyless/models/issuer_overview_info.rb +232 -0
- data/lib/akeyless/models/item.rb +10 -1
- data/lib/akeyless/models/item_general_info.rb +10 -1
- data/lib/akeyless/models/item_locking_setting.rb +223 -0
- data/lib/akeyless/models/lock_item.rb +274 -0
- data/lib/akeyless/models/lock_target.rb +274 -0
- data/lib/akeyless/models/locking_info.rb +243 -0
- data/lib/akeyless/models/migration_status_reply_obj.rb +19 -1
- data/lib/akeyless/models/migrations_config_part.rb +12 -1
- data/lib/akeyless/models/netapp_storage.rb +268 -0
- data/lib/akeyless/models/reverse_rbac.rb +1 -1
- data/lib/akeyless/models/rotated_secret_create_aws.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_azure.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_custom.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_mongodb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_mssql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_mysql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_oracledb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_postgresql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_redshift.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_windows.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_aws.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_azure.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_custom.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_mongodb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_mssql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_mysql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_oracledb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_postgresql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_redshift.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_windows.rb +12 -4
- data/lib/akeyless/models/secret_info.rb +19 -1
- data/lib/akeyless/models/secure_remote_access.rb +19 -1
- data/lib/akeyless/models/set_role_rule.rb +1 -1
- data/lib/akeyless/models/sync_counters.rb +233 -0
- data/lib/akeyless/models/target.rb +10 -1
- data/lib/akeyless/models/target_create_azure.rb +13 -1
- data/lib/akeyless/models/target_create_digi_cert.rb +398 -0
- data/lib/akeyless/models/target_create_google_trust.rb +398 -0
- data/lib/akeyless/models/target_create_lets_encrypt.rb +7 -0
- data/lib/akeyless/models/target_create_splunk.rb +11 -1
- data/lib/akeyless/models/target_type_details_input.rb +19 -1
- data/lib/akeyless/models/target_update_azure.rb +13 -1
- data/lib/akeyless/models/target_update_digi_cert.rb +418 -0
- data/lib/akeyless/models/target_update_google_trust.rb +418 -0
- data/lib/akeyless/models/target_update_lets_encrypt.rb +7 -0
- data/lib/akeyless/models/universal_identity_access_rules.rb +19 -1
- data/lib/akeyless/models/unlock_item.rb +254 -0
- data/lib/akeyless/models/unlock_target.rb +254 -0
- data/lib/akeyless/models/update_account_settings.rb +21 -1
- data/lib/akeyless/models/update_auth_method_cert.rb +11 -1
- data/lib/akeyless/models/update_auth_method_universal_identity.rb +25 -1
- data/lib/akeyless/models/update_azure_target.rb +13 -1
- data/lib/akeyless/models/update_item.rb +12 -4
- data/lib/akeyless/models/update_rotated_secret.rb +12 -4
- data/lib/akeyless/models/usc_create.rb +10 -1
- data/lib/akeyless/models/usc_delete.rb +20 -1
- data/lib/akeyless/models/usc_get.rb +20 -1
- data/lib/akeyless/models/usc_list_secrets_output.rb +15 -4
- data/lib/akeyless/models/usc_update.rb +20 -1
- data/lib/akeyless/models/validate_certificate_challenge.rb +279 -0
- data/lib/akeyless/models/validate_certificate_challenge_output.rb +242 -0
- data/lib/akeyless/models/vault_address.rb +227 -0
- data/lib/akeyless/models/vault_address_output.rb +223 -0
- data/lib/akeyless/models/web_bastion_rdp_record.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +24 -0
- data/spec/models/conjur_migration_spec.rb +42 -0
- data/spec/models/conjur_payload_spec.rb +54 -0
- data/spec/models/default_auth_method_settings_spec.rb +42 -0
- data/spec/models/digi_cert_target_details_spec.rb +108 -0
- data/spec/models/github_metadata_spec.rb +66 -0
- data/spec/models/google_trust_target_details_spec.rb +108 -0
- data/spec/models/http_challenge_info_spec.rb +60 -0
- data/spec/models/issuer_overview_info_spec.rb +48 -0
- data/spec/models/item_locking_setting_spec.rb +42 -0
- data/spec/models/lock_item_spec.rb +66 -0
- data/spec/models/lock_target_spec.rb +66 -0
- data/spec/models/locking_info_spec.rb +54 -0
- data/spec/models/netapp_storage_spec.rb +72 -0
- data/spec/models/sync_counters_spec.rb +48 -0
- data/spec/models/target_create_digi_cert_spec.rb +132 -0
- data/spec/models/target_create_google_trust_spec.rb +132 -0
- data/spec/models/target_update_digi_cert_spec.rb +144 -0
- data/spec/models/target_update_google_trust_spec.rb +144 -0
- data/spec/models/unlock_item_spec.rb +54 -0
- data/spec/models/unlock_target_spec.rb +54 -0
- data/spec/models/validate_certificate_challenge_output_spec.rb +54 -0
- data/spec/models/validate_certificate_challenge_spec.rb +72 -0
- data/spec/models/vault_address_output_spec.rb +42 -0
- data/spec/models/vault_address_spec.rb +42 -0
- metadata +1233 -1134
data/docs/LockingInfo.md
ADDED
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
# Akeyless::LockingInfo
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **actions** | **Array<String>** | | [optional] |
|
|
8
|
+
| **expire_at** | **Integer** | | [optional] |
|
|
9
|
+
| **locked_by** | **String** | | [optional] |
|
|
10
|
+
| **unique_identifier** | **String** | | [optional] |
|
|
11
|
+
|
|
12
|
+
## Example
|
|
13
|
+
|
|
14
|
+
```ruby
|
|
15
|
+
require 'akeyless'
|
|
16
|
+
|
|
17
|
+
instance = Akeyless::LockingInfo.new(
|
|
18
|
+
actions: null,
|
|
19
|
+
expire_at: null,
|
|
20
|
+
locked_by: null,
|
|
21
|
+
unique_identifier: null
|
|
22
|
+
)
|
|
23
|
+
```
|
|
24
|
+
|
|
@@ -4,6 +4,7 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **certificates** | [**MigrationItems**](MigrationItems.md) | | [optional] |
|
|
7
8
|
| **computers** | **Integer** | | [optional] |
|
|
8
9
|
| **duration_time** | **String** | | [optional] |
|
|
9
10
|
| **error** | **String** | | [optional] |
|
|
@@ -18,6 +19,7 @@
|
|
|
18
19
|
| **migration_type_name** | **String** | | [optional] |
|
|
19
20
|
| **rotated_secrets** | [**MigrationItems**](MigrationItems.md) | | [optional] |
|
|
20
21
|
| **start_time** | **String** | | [optional] |
|
|
22
|
+
| **sync** | [**SyncCounters**](SyncCounters.md) | | [optional] |
|
|
21
23
|
| **targets** | [**MigrationItems**](MigrationItems.md) | | [optional] |
|
|
22
24
|
|
|
23
25
|
## Example
|
|
@@ -26,6 +28,7 @@
|
|
|
26
28
|
require 'akeyless'
|
|
27
29
|
|
|
28
30
|
instance = Akeyless::MigrationStatusReplyObj.new(
|
|
31
|
+
certificates: null,
|
|
29
32
|
computers: null,
|
|
30
33
|
duration_time: null,
|
|
31
34
|
error: null,
|
|
@@ -40,6 +43,7 @@ instance = Akeyless::MigrationStatusReplyObj.new(
|
|
|
40
43
|
migration_type_name: null,
|
|
41
44
|
rotated_secrets: null,
|
|
42
45
|
start_time: null,
|
|
46
|
+
sync: null,
|
|
43
47
|
targets: null
|
|
44
48
|
)
|
|
45
49
|
```
|
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **aws_secrets_migrations** | [**Array<AWSSecretsMigration>**](AWSSecretsMigration.md) | | [optional] |
|
|
9
9
|
| **azure_kv_migrations** | [**Array<AzureKeyVaultMigration>**](AzureKeyVaultMigration.md) | | [optional] |
|
|
10
10
|
| **certificate_migrations** | [**Array<CertificateMigration>**](CertificateMigration.md) | | [optional] |
|
|
11
|
+
| **conjur_migrations** | [**Array<ConjurMigration>**](ConjurMigration.md) | | [optional] |
|
|
11
12
|
| **gcp_secrets_migrations** | [**Array<GCPSecretsMigration>**](GCPSecretsMigration.md) | | [optional] |
|
|
12
13
|
| **hashi_migrations** | [**Array<HashiMigration>**](HashiMigration.md) | | [optional] |
|
|
13
14
|
| **k8s_migrations** | [**Array<K8SMigration>**](K8SMigration.md) | | [optional] |
|
|
@@ -25,6 +26,7 @@ instance = Akeyless::MigrationsConfigPart.new(
|
|
|
25
26
|
aws_secrets_migrations: null,
|
|
26
27
|
azure_kv_migrations: null,
|
|
27
28
|
certificate_migrations: null,
|
|
29
|
+
conjur_migrations: null,
|
|
28
30
|
gcp_secrets_migrations: null,
|
|
29
31
|
hashi_migrations: null,
|
|
30
32
|
k8s_migrations: null,
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
# Akeyless::NetappStorage
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **access_key_id** | **String** | | [optional] |
|
|
8
|
+
| **access_key_secret** | **String** | | [optional] |
|
|
9
|
+
| **auth_type** | **String** | | [optional] |
|
|
10
|
+
| **bucket** | **String** | | [optional] |
|
|
11
|
+
| **endpoint_url** | **String** | | [optional] |
|
|
12
|
+
| **prefix** | **String** | | [optional] |
|
|
13
|
+
| **region** | **String** | | [optional] |
|
|
14
|
+
|
|
15
|
+
## Example
|
|
16
|
+
|
|
17
|
+
```ruby
|
|
18
|
+
require 'akeyless'
|
|
19
|
+
|
|
20
|
+
instance = Akeyless::NetappStorage.new(
|
|
21
|
+
access_key_id: null,
|
|
22
|
+
access_key_secret: null,
|
|
23
|
+
auth_type: null,
|
|
24
|
+
bucket: null,
|
|
25
|
+
endpoint_url: null,
|
|
26
|
+
prefix: null,
|
|
27
|
+
region: null
|
|
28
|
+
)
|
|
29
|
+
```
|
|
30
|
+
|
data/docs/ReverseRBAC.md
CHANGED
|
@@ -7,7 +7,7 @@
|
|
|
7
7
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
8
|
| **path** | **String** | Path to an object | |
|
|
9
9
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
10
|
-
| **type** | **String** | Type of object (item, am, role) | |
|
|
10
|
+
| **type** | **String** | Type of object (item, am, role, target, sra, ara) | |
|
|
11
11
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
12
12
|
|
|
13
13
|
## Example
|
|
@@ -18,10 +18,11 @@
|
|
|
18
18
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
19
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
20
20
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
21
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
21
22
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
22
23
|
| **name** | **String** | Rotated secret name | |
|
|
23
24
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
24
|
-
| **rotate_after_disconnect** | **String** |
|
|
25
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
25
26
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
26
27
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
27
28
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -56,6 +57,7 @@ instance = Akeyless::RotatedSecretCreateAws.new(
|
|
|
56
57
|
item_custom_fields: null,
|
|
57
58
|
json: null,
|
|
58
59
|
key: null,
|
|
60
|
+
lock_during_sra_session: null,
|
|
59
61
|
max_versions: null,
|
|
60
62
|
name: null,
|
|
61
63
|
password_length: null,
|
|
@@ -19,12 +19,13 @@
|
|
|
19
19
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
20
20
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
21
21
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
22
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
22
23
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
23
24
|
| **name** | **String** | Rotated secret name | |
|
|
24
25
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
25
26
|
| **resource_group_name** | **String** | The resource group name (only relevant when explicitly-set-sa=true) | [optional] |
|
|
26
27
|
| **resource_name** | **String** | The name of the storage account (only relevant when explicitly-set-sa=true) | [optional] |
|
|
27
|
-
| **rotate_after_disconnect** | **String** |
|
|
28
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
28
29
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
29
30
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
30
31
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -63,6 +64,7 @@ instance = Akeyless::RotatedSecretCreateAzure.new(
|
|
|
63
64
|
item_custom_fields: null,
|
|
64
65
|
json: null,
|
|
65
66
|
key: null,
|
|
67
|
+
lock_during_sra_session: null,
|
|
66
68
|
max_versions: null,
|
|
67
69
|
name: null,
|
|
68
70
|
password_length: null,
|
|
@@ -13,10 +13,11 @@
|
|
|
13
13
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
19
|
-
| **rotate_after_disconnect** | **String** |
|
|
20
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
21
22
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
22
23
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretCreateCustom.new(
|
|
|
57
58
|
item_custom_fields: null,
|
|
58
59
|
json: null,
|
|
59
60
|
key: null,
|
|
61
|
+
lock_during_sra_session: null,
|
|
60
62
|
max_versions: null,
|
|
61
63
|
name: null,
|
|
62
64
|
password_length: null,
|
|
@@ -13,10 +13,11 @@
|
|
|
13
13
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
14
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
19
|
-
| **rotate_after_disconnect** | **String** |
|
|
20
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
20
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
|
|
21
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
|
|
22
23
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -55,6 +56,7 @@ instance = Akeyless::RotatedSecretCreateLdap.new(
|
|
|
55
56
|
item_custom_fields: null,
|
|
56
57
|
json: null,
|
|
57
58
|
key: null,
|
|
59
|
+
lock_during_sra_session: null,
|
|
58
60
|
max_versions: null,
|
|
59
61
|
name: null,
|
|
60
62
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretCreateMongodb.new(
|
|
|
45
46
|
item_custom_fields: null,
|
|
46
47
|
json: null,
|
|
47
48
|
key: null,
|
|
49
|
+
lock_during_sra_session: null,
|
|
48
50
|
max_versions: null,
|
|
49
51
|
name: null,
|
|
50
52
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretCreateMssql.new(
|
|
|
46
47
|
item_custom_fields: null,
|
|
47
48
|
json: null,
|
|
48
49
|
key: null,
|
|
50
|
+
lock_during_sra_session: null,
|
|
49
51
|
max_versions: null,
|
|
50
52
|
name: null,
|
|
51
53
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretCreateMysql.new(
|
|
|
45
46
|
item_custom_fields: null,
|
|
46
47
|
json: null,
|
|
47
48
|
key: null,
|
|
49
|
+
lock_during_sra_session: null,
|
|
48
50
|
max_versions: null,
|
|
49
51
|
name: null,
|
|
50
52
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -43,6 +44,7 @@ instance = Akeyless::RotatedSecretCreateOracledb.new(
|
|
|
43
44
|
item_custom_fields: null,
|
|
44
45
|
json: null,
|
|
45
46
|
key: null,
|
|
47
|
+
lock_during_sra_session: null,
|
|
46
48
|
max_versions: null,
|
|
47
49
|
name: null,
|
|
48
50
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretCreatePostgresql.new(
|
|
|
46
47
|
item_custom_fields: null,
|
|
47
48
|
json: null,
|
|
48
49
|
key: null,
|
|
50
|
+
lock_during_sra_session: null,
|
|
49
51
|
max_versions: null,
|
|
50
52
|
name: null,
|
|
51
53
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -42,6 +43,7 @@ instance = Akeyless::RotatedSecretCreateRedshift.new(
|
|
|
42
43
|
item_custom_fields: null,
|
|
43
44
|
json: null,
|
|
44
45
|
key: null,
|
|
46
|
+
lock_during_sra_session: null,
|
|
45
47
|
max_versions: null,
|
|
46
48
|
name: null,
|
|
47
49
|
password_length: null,
|
|
@@ -12,11 +12,12 @@
|
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
14
|
| **key_data_base64** | **String** | Private key file contents encoded using base64 | [optional] |
|
|
15
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
15
16
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
16
17
|
| **name** | **String** | Rotated secret name | |
|
|
17
18
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
18
19
|
| **public_key_remote_path** | **String** | The path to the public key that will be rotated on the server | [optional] |
|
|
19
|
-
| **rotate_after_disconnect** | **String** |
|
|
20
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
20
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
21
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
22
23
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretCreateSsh.new(
|
|
|
53
54
|
json: null,
|
|
54
55
|
key: null,
|
|
55
56
|
key_data_base64: null,
|
|
57
|
+
lock_during_sra_session: null,
|
|
56
58
|
max_versions: null,
|
|
57
59
|
name: null,
|
|
58
60
|
password_length: null,
|
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateWindows.new(
|
|
|
47
48
|
item_custom_fields: null,
|
|
48
49
|
json: null,
|
|
49
50
|
key: null,
|
|
51
|
+
lock_during_sra_session: null,
|
|
50
52
|
max_versions: null,
|
|
51
53
|
name: null,
|
|
52
54
|
password_length: null,
|
|
@@ -20,12 +20,13 @@
|
|
|
20
20
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
21
21
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
22
22
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
23
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
23
24
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
24
25
|
| **name** | **String** | Rotated secret name | |
|
|
25
26
|
| **new_name** | **String** | New item name | [optional] |
|
|
26
27
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
27
28
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
28
|
-
| **rotate_after_disconnect** | **String** |
|
|
29
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
29
30
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
30
31
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
31
32
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -59,6 +60,7 @@ instance = Akeyless::RotatedSecretUpdateAws.new(
|
|
|
59
60
|
json: null,
|
|
60
61
|
keep_prev_version: null,
|
|
61
62
|
key: null,
|
|
63
|
+
lock_during_sra_session: null,
|
|
62
64
|
max_versions: null,
|
|
63
65
|
name: null,
|
|
64
66
|
new_name: null,
|
|
@@ -21,6 +21,7 @@
|
|
|
21
21
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
22
22
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
23
23
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
24
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
24
25
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
25
26
|
| **name** | **String** | Rotated secret name | |
|
|
26
27
|
| **new_name** | **String** | New item name | [optional] |
|
|
@@ -28,7 +29,7 @@
|
|
|
28
29
|
| **resource_group_name** | **String** | The resource group name (only relevant when explicitly-set-sa=true) | [optional] |
|
|
29
30
|
| **resource_name** | **String** | The name of the storage account (only relevant when explicitly-set-sa=true) | [optional] |
|
|
30
31
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
31
|
-
| **rotate_after_disconnect** | **String** |
|
|
32
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
32
33
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
33
34
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
34
35
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -66,6 +67,7 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
|
|
|
66
67
|
json: null,
|
|
67
68
|
keep_prev_version: null,
|
|
68
69
|
key: null,
|
|
70
|
+
lock_during_sra_session: null,
|
|
69
71
|
max_versions: null,
|
|
70
72
|
name: null,
|
|
71
73
|
new_name: null,
|
|
@@ -15,12 +15,13 @@
|
|
|
15
15
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
16
16
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
17
17
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
18
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
18
19
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
19
20
|
| **name** | **String** | Rotated secret name | |
|
|
20
21
|
| **new_name** | **String** | New item name | [optional] |
|
|
21
22
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
22
23
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
23
|
-
| **rotate_after_disconnect** | **String** |
|
|
24
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
25
26
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
26
27
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
|
|
|
61
62
|
json: null,
|
|
62
63
|
keep_prev_version: null,
|
|
63
64
|
key: null,
|
|
65
|
+
lock_during_sra_session: null,
|
|
64
66
|
max_versions: null,
|
|
65
67
|
name: null,
|
|
66
68
|
new_name: null,
|
|
@@ -15,12 +15,13 @@
|
|
|
15
15
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
16
16
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
17
17
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
18
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
18
19
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
19
20
|
| **name** | **String** | Rotated secret name | |
|
|
20
21
|
| **new_name** | **String** | New item name | [optional] |
|
|
21
22
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
22
23
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
23
|
-
| **rotate_after_disconnect** | **String** |
|
|
24
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
24
25
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
|
|
25
26
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
|
|
26
27
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -58,6 +59,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
|
|
|
58
59
|
json: null,
|
|
59
60
|
keep_prev_version: null,
|
|
60
61
|
key: null,
|
|
62
|
+
lock_during_sra_session: null,
|
|
61
63
|
max_versions: null,
|
|
62
64
|
name: null,
|
|
63
65
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new(
|
|
|
48
49
|
json: null,
|
|
49
50
|
keep_prev_version: null,
|
|
50
51
|
key: null,
|
|
52
|
+
lock_during_sra_session: null,
|
|
51
53
|
max_versions: null,
|
|
52
54
|
name: null,
|
|
53
55
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -49,6 +50,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new(
|
|
|
49
50
|
json: null,
|
|
50
51
|
keep_prev_version: null,
|
|
51
52
|
key: null,
|
|
53
|
+
lock_during_sra_session: null,
|
|
52
54
|
max_versions: null,
|
|
53
55
|
name: null,
|
|
54
56
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new(
|
|
|
48
49
|
json: null,
|
|
49
50
|
keep_prev_version: null,
|
|
50
51
|
key: null,
|
|
52
|
+
lock_during_sra_session: null,
|
|
51
53
|
max_versions: null,
|
|
52
54
|
name: null,
|
|
53
55
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new(
|
|
|
46
47
|
json: null,
|
|
47
48
|
keep_prev_version: null,
|
|
48
49
|
key: null,
|
|
50
|
+
lock_during_sra_session: null,
|
|
49
51
|
max_versions: null,
|
|
50
52
|
name: null,
|
|
51
53
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -49,6 +50,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new(
|
|
|
49
50
|
json: null,
|
|
50
51
|
keep_prev_version: null,
|
|
51
52
|
key: null,
|
|
53
|
+
lock_during_sra_session: null,
|
|
52
54
|
max_versions: null,
|
|
53
55
|
name: null,
|
|
54
56
|
new_name: null,
|