akeyless 5.0.5 → 5.0.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2ea13448a9232bf70748115e832c13f9b477225fe72c1a937e55a31b88e6d8dc
4
- data.tar.gz: 12d0760b615390175002c0d055b3a69d96c3526198365d403adc503dfc975800
3
+ metadata.gz: 4076482acf1b2b3717e8156b38631c78ede6ac30f55c4275fb0d6a3cebc746fb
4
+ data.tar.gz: c70ea0d3c67a7cf424a7cff732acbe254b175f2611c3d84f9a82b088600bd263
5
5
  SHA512:
6
- metadata.gz: 0a16e6db7b51144d124fcf558588acfc5069b0c0f35d20f57736eae7ef764cfe8ada1f1b34d4fc515577edb52355df2b2397db9c9a382dd6fac5e9a7dafa83af
7
- data.tar.gz: a82c610675598ad0242b78ae356ccf7c79a282ecf0a610d0d6323a0b8e0bad265404f4368fd6459de088c9961ce5a1ee3c213156cffca694e13debe4ff560b48
6
+ metadata.gz: 669816ecaa412e90437485506105557c708e83d4d00061f440323c1d391d82915ad136b3dd8665c67fdae2338d9c6f2e4cdcceb7718ffe6f79bbb748da6375a1
7
+ data.tar.gz: d577983bab96bcad1b0e258e963c7126fc02fc42a54665f60b75e18998db23c047b8b918421ce53c031fc915d704d76c471ef528ed855ceee39ca4439755cfb4
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.5
10
+ - Package version: 5.0.6
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **api_key** | **String** | Key of the api credentials to the Godaddy account | |
8
+ | **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
8
9
  | **description** | **String** | Description of the object | [optional] |
9
10
  | **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
10
11
  | **imap_password** | **String** | ImapPassword to access the IMAP service | |
@@ -26,6 +27,7 @@ require 'akeyless'
26
27
 
27
28
  instance = Akeyless::CreateGodaddyTarget.new(
28
29
  api_key: null,
30
+ customer_id: null,
29
31
  description: null,
30
32
  imap_fqdn: null,
31
33
  imap_password: null,
@@ -16,6 +16,7 @@
16
16
  | **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
17
17
  | **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
18
18
  | **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
19
+ | **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
19
20
  | **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
20
21
  | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
21
22
  | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
@@ -56,6 +57,7 @@ instance = Akeyless::DynamicSecretCreateK8s.new(
56
57
  k8s_namespace: null,
57
58
  k8s_predefined_role_name: null,
58
59
  k8s_predefined_role_type: null,
60
+ k8s_rolebinding_yaml_data: null,
59
61
  k8s_rolebinding_yaml_def: null,
60
62
  k8s_service_account: null,
61
63
  k8s_service_account_type: null,
@@ -16,6 +16,7 @@
16
16
  | **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
17
17
  | **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
18
18
  | **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
19
+ | **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
19
20
  | **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
20
21
  | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
21
22
  | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::DynamicSecretUpdateK8s.new(
57
58
  k8s_namespace: null,
58
59
  k8s_predefined_role_name: null,
59
60
  k8s_predefined_role_type: null,
61
+ k8s_rolebinding_yaml_data: null,
60
62
  k8s_rolebinding_yaml_def: null,
61
63
  k8s_service_account: null,
62
64
  k8s_service_account_type: null,
@@ -15,6 +15,7 @@
15
15
  | **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
16
16
  | **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
17
17
  | **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
18
+ | **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
18
19
  | **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
19
20
  | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
20
21
  | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
@@ -54,6 +55,7 @@ instance = Akeyless::GatewayCreateProducerNativeK8S.new(
54
55
  k8s_namespace: null,
55
56
  k8s_predefined_role_name: null,
56
57
  k8s_predefined_role_type: null,
58
+ k8s_rolebinding_yaml_data: null,
57
59
  k8s_rolebinding_yaml_def: null,
58
60
  k8s_service_account: null,
59
61
  k8s_service_account_type: null,
@@ -15,6 +15,7 @@
15
15
  | **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
16
16
  | **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
17
17
  | **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
18
+ | **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
18
19
  | **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
19
20
  | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
20
21
  | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
@@ -55,6 +56,7 @@ instance = Akeyless::GatewayUpdateProducerNativeK8S.new(
55
56
  k8s_namespace: null,
56
57
  k8s_predefined_role_name: null,
57
58
  k8s_predefined_role_type: null,
59
+ k8s_rolebinding_yaml_data: null,
58
60
  k8s_rolebinding_yaml_def: null,
59
61
  k8s_service_account: null,
60
62
  k8s_service_account_type: null,
@@ -16,6 +16,9 @@
16
16
  | **azure_storage_tenant_id** | **String** | Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant | [optional] |
17
17
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
18
18
  | **rdp_session_recording** | **String** | Enable recording of rdp session [true/false] | [optional] |
19
+ | **rdp_session_recording_compress** | **Boolean** | Whether to compress recording files before upload | [optional] |
20
+ | **rdp_session_recording_encryption_key** | **String** | If provided, this key will be used to encrypt uploaded recordings. | [optional] |
21
+ | **rdp_session_recording_quality** | **String** | RDP session recording quality [low/medium/high] | [optional] |
19
22
  | **rdp_session_storage** | **String** | Rdp session recording storage destination [local/aws/azure] | [optional] |
20
23
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
21
24
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -38,6 +41,9 @@ instance = Akeyless::GatewayUpdateRemoteAccessRdpRecordings.new(
38
41
  azure_storage_tenant_id: null,
39
42
  json: null,
40
43
  rdp_session_recording: null,
44
+ rdp_session_recording_compress: null,
45
+ rdp_session_recording_encryption_key: null,
46
+ rdp_session_recording_quality: null,
41
47
  rdp_session_storage: null,
42
48
  token: null,
43
49
  uid_token: null
@@ -10,6 +10,7 @@
10
10
  | **imap_user** | **String** | | [optional] |
11
11
  | **key** | **String** | | [optional] |
12
12
  | **secret** | **String** | | [optional] |
13
+ | **shopper_id** | **String** | Optional, used to find the certificate ID in GoDaddy's API | [optional] |
13
14
  | **timeout** | **Integer** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] |
14
15
  | **validation_email** | **String** | | [optional] |
15
16
 
@@ -25,6 +26,7 @@ instance = Akeyless::GodaddyTargetDetails.new(
25
26
  imap_user: null,
26
27
  key: null,
27
28
  secret: null,
29
+ shopper_id: null,
28
30
  timeout: null,
29
31
  validation_email: null
30
32
  )
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **api_key** | **String** | Key of the api credentials to the Godaddy account | |
8
+ | **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
8
9
  | **description** | **String** | Description of the object | [optional] |
9
10
  | **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
10
11
  | **imap_password** | **String** | ImapPassword to access the IMAP service | |
@@ -26,6 +27,7 @@ require 'akeyless'
26
27
 
27
28
  instance = Akeyless::TargetCreateGodaddy.new(
28
29
  api_key: null,
30
+ customer_id: null,
29
31
  description: null,
30
32
  imap_fqdn: null,
31
33
  imap_password: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **api_key** | **String** | Key of the api credentials to the Godaddy account | |
8
+ | **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
8
9
  | **description** | **String** | Description of the object | [optional] |
9
10
  | **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
10
11
  | **imap_password** | **String** | ImapPassword to access the IMAP service | |
@@ -28,6 +29,7 @@ require 'akeyless'
28
29
 
29
30
  instance = Akeyless::TargetUpdateGodaddy.new(
30
31
  api_key: null,
32
+ customer_id: null,
31
33
  description: null,
32
34
  imap_fqdn: null,
33
35
  imap_password: null,
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **api_key** | **String** | Key of the api credentials to the Godaddy account | |
8
8
  | **comment** | **String** | Deprecated - use description | [optional] |
9
+ | **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
10
11
  | **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
11
12
  | **imap_password** | **String** | ImapPassword to access the IMAP service | |
@@ -31,6 +32,7 @@ require 'akeyless'
31
32
  instance = Akeyless::UpdateGodaddyTarget.new(
32
33
  api_key: null,
33
34
  comment: null,
35
+ customer_id: null,
34
36
  description: null,
35
37
  imap_fqdn: null,
36
38
  imap_password: null,
@@ -6,6 +6,9 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **aws** | [**AwsStorage**](AwsStorage.md) | | [optional] |
8
8
  | **azure** | [**AzureStorage**](AzureStorage.md) | | [optional] |
9
+ | **compress** | **Boolean** | | [optional] |
10
+ | **encryption_key** | **String** | | [optional] |
11
+ | **recording_quality** | **String** | | [optional] |
9
12
  | **storage_type** | **String** | | [optional] |
10
13
 
11
14
  ## Example
@@ -16,6 +19,9 @@ require 'akeyless'
16
19
  instance = Akeyless::WebBastionRdpRecord.new(
17
20
  aws: null,
18
21
  azure: null,
22
+ compress: null,
23
+ encryption_key: null,
24
+ recording_quality: null,
19
25
  storage_type: null
20
26
  )
21
27
  ```
@@ -19,6 +19,9 @@ module Akeyless
19
19
  # Key of the api credentials to the Godaddy account
20
20
  attr_accessor :api_key
21
21
 
22
+ # Customer ID (ShopperId) required for renewal of imported certificates
23
+ attr_accessor :customer_id
24
+
22
25
  # Description of the object
23
26
  attr_accessor :description
24
27
 
@@ -62,6 +65,7 @@ module Akeyless
62
65
  def self.attribute_map
63
66
  {
64
67
  :'api_key' => :'api-key',
68
+ :'customer_id' => :'customer_id',
65
69
  :'description' => :'description',
66
70
  :'imap_fqdn' => :'imap-fqdn',
67
71
  :'imap_password' => :'imap-password',
@@ -87,6 +91,7 @@ module Akeyless
87
91
  def self.openapi_types
88
92
  {
89
93
  :'api_key' => :'String',
94
+ :'customer_id' => :'String',
90
95
  :'description' => :'String',
91
96
  :'imap_fqdn' => :'String',
92
97
  :'imap_password' => :'String',
@@ -130,6 +135,10 @@ module Akeyless
130
135
  self.api_key = nil
131
136
  end
132
137
 
138
+ if attributes.key?(:'customer_id')
139
+ self.customer_id = attributes[:'customer_id']
140
+ end
141
+
133
142
  if attributes.key?(:'description')
134
143
  self.description = attributes[:'description']
135
144
  end
@@ -250,6 +259,7 @@ module Akeyless
250
259
  return true if self.equal?(o)
251
260
  self.class == o.class &&
252
261
  api_key == o.api_key &&
262
+ customer_id == o.customer_id &&
253
263
  description == o.description &&
254
264
  imap_fqdn == o.imap_fqdn &&
255
265
  imap_password == o.imap_password &&
@@ -274,7 +284,7 @@ module Akeyless
274
284
  # Calculates hash code according to all attributes.
275
285
  # @return [Integer] Hash code
276
286
  def hash
277
- [api_key, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
287
+ [api_key, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
278
288
  end
279
289
 
280
290
  # Builds the object from hash
@@ -52,6 +52,9 @@ module Akeyless
52
52
  # Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
53
53
  attr_accessor :k8s_predefined_role_type
54
54
 
55
+ # Content of the yaml in a Base64 format.
56
+ attr_accessor :k8s_rolebinding_yaml_data
57
+
55
58
  # Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
56
59
  attr_accessor :k8s_rolebinding_yaml_def
57
60
 
@@ -130,6 +133,7 @@ module Akeyless
130
133
  :'k8s_namespace' => :'k8s-namespace',
131
134
  :'k8s_predefined_role_name' => :'k8s-predefined-role-name',
132
135
  :'k8s_predefined_role_type' => :'k8s-predefined-role-type',
136
+ :'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
133
137
  :'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
134
138
  :'k8s_service_account' => :'k8s-service-account',
135
139
  :'k8s_service_account_type' => :'k8s-service-account-type',
@@ -174,6 +178,7 @@ module Akeyless
174
178
  :'k8s_namespace' => :'String',
175
179
  :'k8s_predefined_role_name' => :'String',
176
180
  :'k8s_predefined_role_type' => :'String',
181
+ :'k8s_rolebinding_yaml_data' => :'String',
177
182
  :'k8s_rolebinding_yaml_def' => :'String',
178
183
  :'k8s_service_account' => :'String',
179
184
  :'k8s_service_account_type' => :'String',
@@ -269,6 +274,10 @@ module Akeyless
269
274
  self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
270
275
  end
271
276
 
277
+ if attributes.key?(:'k8s_rolebinding_yaml_data')
278
+ self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
279
+ end
280
+
272
281
  if attributes.key?(:'k8s_rolebinding_yaml_def')
273
282
  self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
274
283
  end
@@ -403,6 +412,7 @@ module Akeyless
403
412
  k8s_namespace == o.k8s_namespace &&
404
413
  k8s_predefined_role_name == o.k8s_predefined_role_name &&
405
414
  k8s_predefined_role_type == o.k8s_predefined_role_type &&
415
+ k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
406
416
  k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
407
417
  k8s_service_account == o.k8s_service_account &&
408
418
  k8s_service_account_type == o.k8s_service_account_type &&
@@ -435,7 +445,7 @@ module Akeyless
435
445
  # Calculates hash code according to all attributes.
436
446
  # @return [Integer] Hash code
437
447
  def hash
438
- [custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
448
+ [custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
439
449
  end
440
450
 
441
451
  # Builds the object from hash
@@ -52,6 +52,9 @@ module Akeyless
52
52
  # Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
53
53
  attr_accessor :k8s_predefined_role_type
54
54
 
55
+ # Content of the yaml in a Base64 format.
56
+ attr_accessor :k8s_rolebinding_yaml_data
57
+
55
58
  # Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
56
59
  attr_accessor :k8s_rolebinding_yaml_def
57
60
 
@@ -133,6 +136,7 @@ module Akeyless
133
136
  :'k8s_namespace' => :'k8s-namespace',
134
137
  :'k8s_predefined_role_name' => :'k8s-predefined-role-name',
135
138
  :'k8s_predefined_role_type' => :'k8s-predefined-role-type',
139
+ :'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
136
140
  :'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
137
141
  :'k8s_service_account' => :'k8s-service-account',
138
142
  :'k8s_service_account_type' => :'k8s-service-account-type',
@@ -178,6 +182,7 @@ module Akeyless
178
182
  :'k8s_namespace' => :'String',
179
183
  :'k8s_predefined_role_name' => :'String',
180
184
  :'k8s_predefined_role_type' => :'String',
185
+ :'k8s_rolebinding_yaml_data' => :'String',
181
186
  :'k8s_rolebinding_yaml_def' => :'String',
182
187
  :'k8s_service_account' => :'String',
183
188
  :'k8s_service_account_type' => :'String',
@@ -274,6 +279,10 @@ module Akeyless
274
279
  self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
275
280
  end
276
281
 
282
+ if attributes.key?(:'k8s_rolebinding_yaml_data')
283
+ self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
284
+ end
285
+
277
286
  if attributes.key?(:'k8s_rolebinding_yaml_def')
278
287
  self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
279
288
  end
@@ -412,6 +421,7 @@ module Akeyless
412
421
  k8s_namespace == o.k8s_namespace &&
413
422
  k8s_predefined_role_name == o.k8s_predefined_role_name &&
414
423
  k8s_predefined_role_type == o.k8s_predefined_role_type &&
424
+ k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
415
425
  k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
416
426
  k8s_service_account == o.k8s_service_account &&
417
427
  k8s_service_account_type == o.k8s_service_account_type &&
@@ -445,7 +455,7 @@ module Akeyless
445
455
  # Calculates hash code according to all attributes.
446
456
  # @return [Integer] Hash code
447
457
  def hash
448
- [custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
458
+ [custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
449
459
  end
450
460
 
451
461
  # Builds the object from hash
@@ -49,6 +49,9 @@ module Akeyless
49
49
  # Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
50
50
  attr_accessor :k8s_predefined_role_type
51
51
 
52
+ # Content of the yaml in a Base64 format.
53
+ attr_accessor :k8s_rolebinding_yaml_data
54
+
52
55
  # Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
53
56
  attr_accessor :k8s_rolebinding_yaml_def
54
57
 
@@ -126,6 +129,7 @@ module Akeyless
126
129
  :'k8s_namespace' => :'k8s-namespace',
127
130
  :'k8s_predefined_role_name' => :'k8s-predefined-role-name',
128
131
  :'k8s_predefined_role_type' => :'k8s-predefined-role-type',
132
+ :'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
129
133
  :'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
130
134
  :'k8s_service_account' => :'k8s-service-account',
131
135
  :'k8s_service_account_type' => :'k8s-service-account-type',
@@ -169,6 +173,7 @@ module Akeyless
169
173
  :'k8s_namespace' => :'String',
170
174
  :'k8s_predefined_role_name' => :'String',
171
175
  :'k8s_predefined_role_type' => :'String',
176
+ :'k8s_rolebinding_yaml_data' => :'String',
172
177
  :'k8s_rolebinding_yaml_def' => :'String',
173
178
  :'k8s_service_account' => :'String',
174
179
  :'k8s_service_account_type' => :'String',
@@ -260,6 +265,10 @@ module Akeyless
260
265
  self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
261
266
  end
262
267
 
268
+ if attributes.key?(:'k8s_rolebinding_yaml_data')
269
+ self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
270
+ end
271
+
263
272
  if attributes.key?(:'k8s_rolebinding_yaml_def')
264
273
  self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
265
274
  end
@@ -393,6 +402,7 @@ module Akeyless
393
402
  k8s_namespace == o.k8s_namespace &&
394
403
  k8s_predefined_role_name == o.k8s_predefined_role_name &&
395
404
  k8s_predefined_role_type == o.k8s_predefined_role_type &&
405
+ k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
396
406
  k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
397
407
  k8s_service_account == o.k8s_service_account &&
398
408
  k8s_service_account_type == o.k8s_service_account_type &&
@@ -425,7 +435,7 @@ module Akeyless
425
435
  # Calculates hash code according to all attributes.
426
436
  # @return [Integer] Hash code
427
437
  def hash
428
- [custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
438
+ [custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
429
439
  end
430
440
 
431
441
  # Builds the object from hash
@@ -49,6 +49,9 @@ module Akeyless
49
49
  # Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
50
50
  attr_accessor :k8s_predefined_role_type
51
51
 
52
+ # Content of the yaml in a Base64 format.
53
+ attr_accessor :k8s_rolebinding_yaml_data
54
+
52
55
  # Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
53
56
  attr_accessor :k8s_rolebinding_yaml_def
54
57
 
@@ -129,6 +132,7 @@ module Akeyless
129
132
  :'k8s_namespace' => :'k8s-namespace',
130
133
  :'k8s_predefined_role_name' => :'k8s-predefined-role-name',
131
134
  :'k8s_predefined_role_type' => :'k8s-predefined-role-type',
135
+ :'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
132
136
  :'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
133
137
  :'k8s_service_account' => :'k8s-service-account',
134
138
  :'k8s_service_account_type' => :'k8s-service-account-type',
@@ -173,6 +177,7 @@ module Akeyless
173
177
  :'k8s_namespace' => :'String',
174
178
  :'k8s_predefined_role_name' => :'String',
175
179
  :'k8s_predefined_role_type' => :'String',
180
+ :'k8s_rolebinding_yaml_data' => :'String',
176
181
  :'k8s_rolebinding_yaml_def' => :'String',
177
182
  :'k8s_service_account' => :'String',
178
183
  :'k8s_service_account_type' => :'String',
@@ -265,6 +270,10 @@ module Akeyless
265
270
  self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
266
271
  end
267
272
 
273
+ if attributes.key?(:'k8s_rolebinding_yaml_data')
274
+ self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
275
+ end
276
+
268
277
  if attributes.key?(:'k8s_rolebinding_yaml_def')
269
278
  self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
270
279
  end
@@ -402,6 +411,7 @@ module Akeyless
402
411
  k8s_namespace == o.k8s_namespace &&
403
412
  k8s_predefined_role_name == o.k8s_predefined_role_name &&
404
413
  k8s_predefined_role_type == o.k8s_predefined_role_type &&
414
+ k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
405
415
  k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
406
416
  k8s_service_account == o.k8s_service_account &&
407
417
  k8s_service_account_type == o.k8s_service_account_type &&
@@ -435,7 +445,7 @@ module Akeyless
435
445
  # Calculates hash code according to all attributes.
436
446
  # @return [Integer] Hash code
437
447
  def hash
438
- [custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
448
+ [custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
439
449
  end
440
450
 
441
451
  # Builds the object from hash
@@ -52,6 +52,15 @@ module Akeyless
52
52
  # Enable recording of rdp session [true/false]
53
53
  attr_accessor :rdp_session_recording
54
54
 
55
+ # Whether to compress recording files before upload
56
+ attr_accessor :rdp_session_recording_compress
57
+
58
+ # If provided, this key will be used to encrypt uploaded recordings.
59
+ attr_accessor :rdp_session_recording_encryption_key
60
+
61
+ # RDP session recording quality [low/medium/high]
62
+ attr_accessor :rdp_session_recording_quality
63
+
55
64
  # Rdp session recording storage destination [local/aws/azure]
56
65
  attr_accessor :rdp_session_storage
57
66
 
@@ -76,6 +85,9 @@ module Akeyless
76
85
  :'azure_storage_tenant_id' => :'azure-storage-tenant-id',
77
86
  :'json' => :'json',
78
87
  :'rdp_session_recording' => :'rdp-session-recording',
88
+ :'rdp_session_recording_compress' => :'rdp-session-recording-compress',
89
+ :'rdp_session_recording_encryption_key' => :'rdp-session-recording-encryption-key',
90
+ :'rdp_session_recording_quality' => :'rdp-session-recording-quality',
79
91
  :'rdp_session_storage' => :'rdp-session-storage',
80
92
  :'token' => :'token',
81
93
  :'uid_token' => :'uid-token'
@@ -102,6 +114,9 @@ module Akeyless
102
114
  :'azure_storage_tenant_id' => :'String',
103
115
  :'json' => :'Boolean',
104
116
  :'rdp_session_recording' => :'String',
117
+ :'rdp_session_recording_compress' => :'Boolean',
118
+ :'rdp_session_recording_encryption_key' => :'String',
119
+ :'rdp_session_recording_quality' => :'String',
105
120
  :'rdp_session_storage' => :'String',
106
121
  :'token' => :'String',
107
122
  :'uid_token' => :'String'
@@ -179,6 +194,18 @@ module Akeyless
179
194
  self.rdp_session_recording = attributes[:'rdp_session_recording']
180
195
  end
181
196
 
197
+ if attributes.key?(:'rdp_session_recording_compress')
198
+ self.rdp_session_recording_compress = attributes[:'rdp_session_recording_compress']
199
+ end
200
+
201
+ if attributes.key?(:'rdp_session_recording_encryption_key')
202
+ self.rdp_session_recording_encryption_key = attributes[:'rdp_session_recording_encryption_key']
203
+ end
204
+
205
+ if attributes.key?(:'rdp_session_recording_quality')
206
+ self.rdp_session_recording_quality = attributes[:'rdp_session_recording_quality']
207
+ end
208
+
182
209
  if attributes.key?(:'rdp_session_storage')
183
210
  self.rdp_session_storage = attributes[:'rdp_session_storage']
184
211
  end
@@ -224,6 +251,9 @@ module Akeyless
224
251
  azure_storage_tenant_id == o.azure_storage_tenant_id &&
225
252
  json == o.json &&
226
253
  rdp_session_recording == o.rdp_session_recording &&
254
+ rdp_session_recording_compress == o.rdp_session_recording_compress &&
255
+ rdp_session_recording_encryption_key == o.rdp_session_recording_encryption_key &&
256
+ rdp_session_recording_quality == o.rdp_session_recording_quality &&
227
257
  rdp_session_storage == o.rdp_session_storage &&
228
258
  token == o.token &&
229
259
  uid_token == o.uid_token
@@ -238,7 +268,7 @@ module Akeyless
238
268
  # Calculates hash code according to all attributes.
239
269
  # @return [Integer] Hash code
240
270
  def hash
241
- [aws_storage_access_key_id, aws_storage_bucket_name, aws_storage_bucket_prefix, aws_storage_region, aws_storage_secret_access_key, azure_storage_account_name, azure_storage_client_id, azure_storage_client_secret, azure_storage_container_name, azure_storage_tenant_id, json, rdp_session_recording, rdp_session_storage, token, uid_token].hash
271
+ [aws_storage_access_key_id, aws_storage_bucket_name, aws_storage_bucket_prefix, aws_storage_region, aws_storage_secret_access_key, azure_storage_account_name, azure_storage_client_id, azure_storage_client_secret, azure_storage_container_name, azure_storage_tenant_id, json, rdp_session_recording, rdp_session_recording_compress, rdp_session_recording_encryption_key, rdp_session_recording_quality, rdp_session_storage, token, uid_token].hash
242
272
  end
243
273
 
244
274
  # Builds the object from hash
@@ -28,6 +28,9 @@ module Akeyless
28
28
 
29
29
  attr_accessor :secret
30
30
 
31
+ # Optional, used to find the certificate ID in GoDaddy's API
32
+ attr_accessor :shopper_id
33
+
31
34
  # A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years.
32
35
  attr_accessor :timeout
33
36
 
@@ -42,6 +45,7 @@ module Akeyless
42
45
  :'imap_user' => :'imap_user',
43
46
  :'key' => :'key',
44
47
  :'secret' => :'secret',
48
+ :'shopper_id' => :'shopper_id',
45
49
  :'timeout' => :'timeout',
46
50
  :'validation_email' => :'validation_email'
47
51
  }
@@ -61,6 +65,7 @@ module Akeyless
61
65
  :'imap_user' => :'String',
62
66
  :'key' => :'String',
63
67
  :'secret' => :'String',
68
+ :'shopper_id' => :'String',
64
69
  :'timeout' => :'Integer',
65
70
  :'validation_email' => :'String'
66
71
  }
@@ -111,6 +116,10 @@ module Akeyless
111
116
  self.secret = attributes[:'secret']
112
117
  end
113
118
 
119
+ if attributes.key?(:'shopper_id')
120
+ self.shopper_id = attributes[:'shopper_id']
121
+ end
122
+
114
123
  if attributes.key?(:'timeout')
115
124
  self.timeout = attributes[:'timeout']
116
125
  end
@@ -146,6 +155,7 @@ module Akeyless
146
155
  imap_user == o.imap_user &&
147
156
  key == o.key &&
148
157
  secret == o.secret &&
158
+ shopper_id == o.shopper_id &&
149
159
  timeout == o.timeout &&
150
160
  validation_email == o.validation_email
151
161
  end
@@ -159,7 +169,7 @@ module Akeyless
159
169
  # Calculates hash code according to all attributes.
160
170
  # @return [Integer] Hash code
161
171
  def hash
162
- [imap_fqdn, imap_password, imap_port, imap_user, key, secret, timeout, validation_email].hash
172
+ [imap_fqdn, imap_password, imap_port, imap_user, key, secret, shopper_id, timeout, validation_email].hash
163
173
  end
164
174
 
165
175
  # Builds the object from hash
@@ -18,6 +18,9 @@ module Akeyless
18
18
  # Key of the api credentials to the Godaddy account
19
19
  attr_accessor :api_key
20
20
 
21
+ # Customer ID (ShopperId) required for renewal of imported certificates
22
+ attr_accessor :customer_id
23
+
21
24
  # Description of the object
22
25
  attr_accessor :description
23
26
 
@@ -61,6 +64,7 @@ module Akeyless
61
64
  def self.attribute_map
62
65
  {
63
66
  :'api_key' => :'api-key',
67
+ :'customer_id' => :'customer_id',
64
68
  :'description' => :'description',
65
69
  :'imap_fqdn' => :'imap-fqdn',
66
70
  :'imap_password' => :'imap-password',
@@ -86,6 +90,7 @@ module Akeyless
86
90
  def self.openapi_types
87
91
  {
88
92
  :'api_key' => :'String',
93
+ :'customer_id' => :'String',
89
94
  :'description' => :'String',
90
95
  :'imap_fqdn' => :'String',
91
96
  :'imap_password' => :'String',
@@ -129,6 +134,10 @@ module Akeyless
129
134
  self.api_key = nil
130
135
  end
131
136
 
137
+ if attributes.key?(:'customer_id')
138
+ self.customer_id = attributes[:'customer_id']
139
+ end
140
+
132
141
  if attributes.key?(:'description')
133
142
  self.description = attributes[:'description']
134
143
  end
@@ -249,6 +258,7 @@ module Akeyless
249
258
  return true if self.equal?(o)
250
259
  self.class == o.class &&
251
260
  api_key == o.api_key &&
261
+ customer_id == o.customer_id &&
252
262
  description == o.description &&
253
263
  imap_fqdn == o.imap_fqdn &&
254
264
  imap_password == o.imap_password &&
@@ -273,7 +283,7 @@ module Akeyless
273
283
  # Calculates hash code according to all attributes.
274
284
  # @return [Integer] Hash code
275
285
  def hash
276
- [api_key, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
286
+ [api_key, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
277
287
  end
278
288
 
279
289
  # Builds the object from hash
@@ -18,6 +18,9 @@ module Akeyless
18
18
  # Key of the api credentials to the Godaddy account
19
19
  attr_accessor :api_key
20
20
 
21
+ # Customer ID (ShopperId) required for renewal of imported certificates
22
+ attr_accessor :customer_id
23
+
21
24
  # Description of the object
22
25
  attr_accessor :description
23
26
 
@@ -67,6 +70,7 @@ module Akeyless
67
70
  def self.attribute_map
68
71
  {
69
72
  :'api_key' => :'api-key',
73
+ :'customer_id' => :'customer_id',
70
74
  :'description' => :'description',
71
75
  :'imap_fqdn' => :'imap-fqdn',
72
76
  :'imap_password' => :'imap-password',
@@ -94,6 +98,7 @@ module Akeyless
94
98
  def self.openapi_types
95
99
  {
96
100
  :'api_key' => :'String',
101
+ :'customer_id' => :'String',
97
102
  :'description' => :'String',
98
103
  :'imap_fqdn' => :'String',
99
104
  :'imap_password' => :'String',
@@ -139,6 +144,10 @@ module Akeyless
139
144
  self.api_key = nil
140
145
  end
141
146
 
147
+ if attributes.key?(:'customer_id')
148
+ self.customer_id = attributes[:'customer_id']
149
+ end
150
+
142
151
  if attributes.key?(:'description')
143
152
  self.description = attributes[:'description']
144
153
  end
@@ -267,6 +276,7 @@ module Akeyless
267
276
  return true if self.equal?(o)
268
277
  self.class == o.class &&
269
278
  api_key == o.api_key &&
279
+ customer_id == o.customer_id &&
270
280
  description == o.description &&
271
281
  imap_fqdn == o.imap_fqdn &&
272
282
  imap_password == o.imap_password &&
@@ -293,7 +303,7 @@ module Akeyless
293
303
  # Calculates hash code according to all attributes.
294
304
  # @return [Integer] Hash code
295
305
  def hash
296
- [api_key, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token].hash
306
+ [api_key, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token].hash
297
307
  end
298
308
 
299
309
  # Builds the object from hash
@@ -22,6 +22,9 @@ module Akeyless
22
22
  # Deprecated - use description
23
23
  attr_accessor :comment
24
24
 
25
+ # Customer ID (ShopperId) required for renewal of imported certificates
26
+ attr_accessor :customer_id
27
+
25
28
  # Description of the object
26
29
  attr_accessor :description
27
30
 
@@ -75,6 +78,7 @@ module Akeyless
75
78
  {
76
79
  :'api_key' => :'api-key',
77
80
  :'comment' => :'comment',
81
+ :'customer_id' => :'customer_id',
78
82
  :'description' => :'description',
79
83
  :'imap_fqdn' => :'imap-fqdn',
80
84
  :'imap_password' => :'imap-password',
@@ -104,6 +108,7 @@ module Akeyless
104
108
  {
105
109
  :'api_key' => :'String',
106
110
  :'comment' => :'String',
111
+ :'customer_id' => :'String',
107
112
  :'description' => :'String',
108
113
  :'imap_fqdn' => :'String',
109
114
  :'imap_password' => :'String',
@@ -154,6 +159,10 @@ module Akeyless
154
159
  self.comment = attributes[:'comment']
155
160
  end
156
161
 
162
+ if attributes.key?(:'customer_id')
163
+ self.customer_id = attributes[:'customer_id']
164
+ end
165
+
157
166
  if attributes.key?(:'description')
158
167
  self.description = attributes[:'description']
159
168
  end
@@ -287,6 +296,7 @@ module Akeyless
287
296
  self.class == o.class &&
288
297
  api_key == o.api_key &&
289
298
  comment == o.comment &&
299
+ customer_id == o.customer_id &&
290
300
  description == o.description &&
291
301
  imap_fqdn == o.imap_fqdn &&
292
302
  imap_password == o.imap_password &&
@@ -314,7 +324,7 @@ module Akeyless
314
324
  # Calculates hash code according to all attributes.
315
325
  # @return [Integer] Hash code
316
326
  def hash
317
- [api_key, comment, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token, update_version].hash
327
+ [api_key, comment, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token, update_version].hash
318
328
  end
319
329
 
320
330
  # Builds the object from hash
@@ -19,6 +19,12 @@ module Akeyless
19
19
 
20
20
  attr_accessor :azure
21
21
 
22
+ attr_accessor :compress
23
+
24
+ attr_accessor :encryption_key
25
+
26
+ attr_accessor :recording_quality
27
+
22
28
  attr_accessor :storage_type
23
29
 
24
30
  # Attribute mapping from ruby-style variable name to JSON key.
@@ -26,6 +32,9 @@ module Akeyless
26
32
  {
27
33
  :'aws' => :'aws',
28
34
  :'azure' => :'azure',
35
+ :'compress' => :'compress',
36
+ :'encryption_key' => :'encryption_key',
37
+ :'recording_quality' => :'recording_quality',
29
38
  :'storage_type' => :'storage_type'
30
39
  }
31
40
  end
@@ -40,6 +49,9 @@ module Akeyless
40
49
  {
41
50
  :'aws' => :'AwsStorage',
42
51
  :'azure' => :'AzureStorage',
52
+ :'compress' => :'Boolean',
53
+ :'encryption_key' => :'String',
54
+ :'recording_quality' => :'String',
43
55
  :'storage_type' => :'String'
44
56
  }
45
57
  end
@@ -73,6 +85,18 @@ module Akeyless
73
85
  self.azure = attributes[:'azure']
74
86
  end
75
87
 
88
+ if attributes.key?(:'compress')
89
+ self.compress = attributes[:'compress']
90
+ end
91
+
92
+ if attributes.key?(:'encryption_key')
93
+ self.encryption_key = attributes[:'encryption_key']
94
+ end
95
+
96
+ if attributes.key?(:'recording_quality')
97
+ self.recording_quality = attributes[:'recording_quality']
98
+ end
99
+
76
100
  if attributes.key?(:'storage_type')
77
101
  self.storage_type = attributes[:'storage_type']
78
102
  end
@@ -100,6 +124,9 @@ module Akeyless
100
124
  self.class == o.class &&
101
125
  aws == o.aws &&
102
126
  azure == o.azure &&
127
+ compress == o.compress &&
128
+ encryption_key == o.encryption_key &&
129
+ recording_quality == o.recording_quality &&
103
130
  storage_type == o.storage_type
104
131
  end
105
132
 
@@ -112,7 +139,7 @@ module Akeyless
112
139
  # Calculates hash code according to all attributes.
113
140
  # @return [Integer] Hash code
114
141
  def hash
115
- [aws, azure, storage_type].hash
142
+ [aws, azure, compress, encryption_key, recording_quality, storage_type].hash
116
143
  end
117
144
 
118
145
  # Builds the object from hash
@@ -11,5 +11,5 @@ Generator version: 7.10.0
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '5.0.5'
14
+ VERSION = '5.0.6'
15
15
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: akeyless
3
3
  version: !ruby/object:Gem::Version
4
- version: 5.0.5
4
+ version: 5.0.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - OpenAPI-Generator
@@ -3950,7 +3950,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
3950
3950
  - !ruby/object:Gem::Version
3951
3951
  version: '0'
3952
3952
  requirements: []
3953
- rubygems_version: 3.6.7
3953
+ rubygems_version: 3.6.9
3954
3954
  specification_version: 4
3955
3955
  summary: Akeyless API Ruby Gem
3956
3956
  test_files: