akeyless 5.0.5 → 5.0.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/docs/CreateGodaddyTarget.md +2 -0
- data/docs/DynamicSecretCreateK8s.md +2 -0
- data/docs/DynamicSecretUpdateK8s.md +2 -0
- data/docs/GatewayCreateProducerNativeK8S.md +2 -0
- data/docs/GatewayUpdateProducerNativeK8S.md +2 -0
- data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +6 -0
- data/docs/GodaddyTargetDetails.md +2 -0
- data/docs/TargetCreateGodaddy.md +2 -0
- data/docs/TargetUpdateGodaddy.md +2 -0
- data/docs/UpdateGodaddyTarget.md +2 -0
- data/docs/WebBastionRdpRecord.md +6 -0
- data/lib/akeyless/models/create_godaddy_target.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_create_k8s.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_k8s.rb +11 -1
- data/lib/akeyless/models/gateway_create_producer_native_k8_s.rb +11 -1
- data/lib/akeyless/models/gateway_update_producer_native_k8_s.rb +11 -1
- data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +31 -1
- data/lib/akeyless/models/godaddy_target_details.rb +11 -1
- data/lib/akeyless/models/target_create_godaddy.rb +11 -1
- data/lib/akeyless/models/target_update_godaddy.rb +11 -1
- data/lib/akeyless/models/update_godaddy_target.rb +11 -1
- data/lib/akeyless/models/web_bastion_rdp_record.rb +28 -1
- data/lib/akeyless/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4076482acf1b2b3717e8156b38631c78ede6ac30f55c4275fb0d6a3cebc746fb
|
4
|
+
data.tar.gz: c70ea0d3c67a7cf424a7cff732acbe254b175f2611c3d84f9a82b088600bd263
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 669816ecaa412e90437485506105557c708e83d4d00061f440323c1d391d82915ad136b3dd8665c67fdae2338d9c6f2e4cdcceb7718ffe6f79bbb748da6375a1
|
7
|
+
data.tar.gz: d577983bab96bcad1b0e258e963c7126fc02fc42a54665f60b75e18998db23c047b8b918421ce53c031fc915d704d76c471ef528ed855ceee39ca4439755cfb4
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 3.0
|
10
|
-
- Package version: 5.0.
|
10
|
+
- Package version: 5.0.6
|
11
11
|
- Generator version: 7.10.0
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
data/docs/CreateGodaddyTarget.md
CHANGED
@@ -5,6 +5,7 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **api_key** | **String** | Key of the api credentials to the Godaddy account | |
|
8
|
+
| **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
|
8
9
|
| **description** | **String** | Description of the object | [optional] |
|
9
10
|
| **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
|
10
11
|
| **imap_password** | **String** | ImapPassword to access the IMAP service | |
|
@@ -26,6 +27,7 @@ require 'akeyless'
|
|
26
27
|
|
27
28
|
instance = Akeyless::CreateGodaddyTarget.new(
|
28
29
|
api_key: null,
|
30
|
+
customer_id: null,
|
29
31
|
description: null,
|
30
32
|
imap_fqdn: null,
|
31
33
|
imap_password: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
|
17
17
|
| **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
18
18
|
| **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
19
|
+
| **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
|
19
20
|
| **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
20
21
|
| **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
|
21
22
|
| **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
|
@@ -56,6 +57,7 @@ instance = Akeyless::DynamicSecretCreateK8s.new(
|
|
56
57
|
k8s_namespace: null,
|
57
58
|
k8s_predefined_role_name: null,
|
58
59
|
k8s_predefined_role_type: null,
|
60
|
+
k8s_rolebinding_yaml_data: null,
|
59
61
|
k8s_rolebinding_yaml_def: null,
|
60
62
|
k8s_service_account: null,
|
61
63
|
k8s_service_account_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
|
17
17
|
| **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
18
18
|
| **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
19
|
+
| **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
|
19
20
|
| **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
20
21
|
| **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
|
21
22
|
| **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
|
@@ -57,6 +58,7 @@ instance = Akeyless::DynamicSecretUpdateK8s.new(
|
|
57
58
|
k8s_namespace: null,
|
58
59
|
k8s_predefined_role_name: null,
|
59
60
|
k8s_predefined_role_type: null,
|
61
|
+
k8s_rolebinding_yaml_data: null,
|
60
62
|
k8s_rolebinding_yaml_def: null,
|
61
63
|
k8s_service_account: null,
|
62
64
|
k8s_service_account_type: null,
|
@@ -15,6 +15,7 @@
|
|
15
15
|
| **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
|
16
16
|
| **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
17
17
|
| **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
18
|
+
| **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
|
18
19
|
| **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
19
20
|
| **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
|
20
21
|
| **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
|
@@ -54,6 +55,7 @@ instance = Akeyless::GatewayCreateProducerNativeK8S.new(
|
|
54
55
|
k8s_namespace: null,
|
55
56
|
k8s_predefined_role_name: null,
|
56
57
|
k8s_predefined_role_type: null,
|
58
|
+
k8s_rolebinding_yaml_data: null,
|
57
59
|
k8s_rolebinding_yaml_def: null,
|
58
60
|
k8s_service_account: null,
|
59
61
|
k8s_service_account_type: null,
|
@@ -15,6 +15,7 @@
|
|
15
15
|
| **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
|
16
16
|
| **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
17
17
|
| **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
18
|
+
| **k8s_rolebinding_yaml_data** | **String** | Content of the yaml in a Base64 format. | [optional] |
|
18
19
|
| **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
|
19
20
|
| **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
|
20
21
|
| **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
|
@@ -55,6 +56,7 @@ instance = Akeyless::GatewayUpdateProducerNativeK8S.new(
|
|
55
56
|
k8s_namespace: null,
|
56
57
|
k8s_predefined_role_name: null,
|
57
58
|
k8s_predefined_role_type: null,
|
59
|
+
k8s_rolebinding_yaml_data: null,
|
58
60
|
k8s_rolebinding_yaml_def: null,
|
59
61
|
k8s_service_account: null,
|
60
62
|
k8s_service_account_type: null,
|
@@ -16,6 +16,9 @@
|
|
16
16
|
| **azure_storage_tenant_id** | **String** | Azure tenant id. For more information refer to https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant | [optional] |
|
17
17
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
18
18
|
| **rdp_session_recording** | **String** | Enable recording of rdp session [true/false] | [optional] |
|
19
|
+
| **rdp_session_recording_compress** | **Boolean** | Whether to compress recording files before upload | [optional] |
|
20
|
+
| **rdp_session_recording_encryption_key** | **String** | If provided, this key will be used to encrypt uploaded recordings. | [optional] |
|
21
|
+
| **rdp_session_recording_quality** | **String** | RDP session recording quality [low/medium/high] | [optional] |
|
19
22
|
| **rdp_session_storage** | **String** | Rdp session recording storage destination [local/aws/azure] | [optional] |
|
20
23
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
21
24
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
@@ -38,6 +41,9 @@ instance = Akeyless::GatewayUpdateRemoteAccessRdpRecordings.new(
|
|
38
41
|
azure_storage_tenant_id: null,
|
39
42
|
json: null,
|
40
43
|
rdp_session_recording: null,
|
44
|
+
rdp_session_recording_compress: null,
|
45
|
+
rdp_session_recording_encryption_key: null,
|
46
|
+
rdp_session_recording_quality: null,
|
41
47
|
rdp_session_storage: null,
|
42
48
|
token: null,
|
43
49
|
uid_token: null
|
@@ -10,6 +10,7 @@
|
|
10
10
|
| **imap_user** | **String** | | [optional] |
|
11
11
|
| **key** | **String** | | [optional] |
|
12
12
|
| **secret** | **String** | | [optional] |
|
13
|
+
| **shopper_id** | **String** | Optional, used to find the certificate ID in GoDaddy's API | [optional] |
|
13
14
|
| **timeout** | **Integer** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] |
|
14
15
|
| **validation_email** | **String** | | [optional] |
|
15
16
|
|
@@ -25,6 +26,7 @@ instance = Akeyless::GodaddyTargetDetails.new(
|
|
25
26
|
imap_user: null,
|
26
27
|
key: null,
|
27
28
|
secret: null,
|
29
|
+
shopper_id: null,
|
28
30
|
timeout: null,
|
29
31
|
validation_email: null
|
30
32
|
)
|
data/docs/TargetCreateGodaddy.md
CHANGED
@@ -5,6 +5,7 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **api_key** | **String** | Key of the api credentials to the Godaddy account | |
|
8
|
+
| **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
|
8
9
|
| **description** | **String** | Description of the object | [optional] |
|
9
10
|
| **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
|
10
11
|
| **imap_password** | **String** | ImapPassword to access the IMAP service | |
|
@@ -26,6 +27,7 @@ require 'akeyless'
|
|
26
27
|
|
27
28
|
instance = Akeyless::TargetCreateGodaddy.new(
|
28
29
|
api_key: null,
|
30
|
+
customer_id: null,
|
29
31
|
description: null,
|
30
32
|
imap_fqdn: null,
|
31
33
|
imap_password: null,
|
data/docs/TargetUpdateGodaddy.md
CHANGED
@@ -5,6 +5,7 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **api_key** | **String** | Key of the api credentials to the Godaddy account | |
|
8
|
+
| **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
|
8
9
|
| **description** | **String** | Description of the object | [optional] |
|
9
10
|
| **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
|
10
11
|
| **imap_password** | **String** | ImapPassword to access the IMAP service | |
|
@@ -28,6 +29,7 @@ require 'akeyless'
|
|
28
29
|
|
29
30
|
instance = Akeyless::TargetUpdateGodaddy.new(
|
30
31
|
api_key: null,
|
32
|
+
customer_id: null,
|
31
33
|
description: null,
|
32
34
|
imap_fqdn: null,
|
33
35
|
imap_password: null,
|
data/docs/UpdateGodaddyTarget.md
CHANGED
@@ -6,6 +6,7 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **api_key** | **String** | Key of the api credentials to the Godaddy account | |
|
8
8
|
| **comment** | **String** | Deprecated - use description | [optional] |
|
9
|
+
| **customer_id** | **String** | Customer ID (ShopperId) required for renewal of imported certificates | [optional] |
|
9
10
|
| **description** | **String** | Description of the object | [optional] |
|
10
11
|
| **imap_fqdn** | **String** | ImapFQDN of the IMAP service, FQDN or IPv4 address. Must be FQDN if the IMAP is using TLS | |
|
11
12
|
| **imap_password** | **String** | ImapPassword to access the IMAP service | |
|
@@ -31,6 +32,7 @@ require 'akeyless'
|
|
31
32
|
instance = Akeyless::UpdateGodaddyTarget.new(
|
32
33
|
api_key: null,
|
33
34
|
comment: null,
|
35
|
+
customer_id: null,
|
34
36
|
description: null,
|
35
37
|
imap_fqdn: null,
|
36
38
|
imap_password: null,
|
data/docs/WebBastionRdpRecord.md
CHANGED
@@ -6,6 +6,9 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **aws** | [**AwsStorage**](AwsStorage.md) | | [optional] |
|
8
8
|
| **azure** | [**AzureStorage**](AzureStorage.md) | | [optional] |
|
9
|
+
| **compress** | **Boolean** | | [optional] |
|
10
|
+
| **encryption_key** | **String** | | [optional] |
|
11
|
+
| **recording_quality** | **String** | | [optional] |
|
9
12
|
| **storage_type** | **String** | | [optional] |
|
10
13
|
|
11
14
|
## Example
|
@@ -16,6 +19,9 @@ require 'akeyless'
|
|
16
19
|
instance = Akeyless::WebBastionRdpRecord.new(
|
17
20
|
aws: null,
|
18
21
|
azure: null,
|
22
|
+
compress: null,
|
23
|
+
encryption_key: null,
|
24
|
+
recording_quality: null,
|
19
25
|
storage_type: null
|
20
26
|
)
|
21
27
|
```
|
@@ -19,6 +19,9 @@ module Akeyless
|
|
19
19
|
# Key of the api credentials to the Godaddy account
|
20
20
|
attr_accessor :api_key
|
21
21
|
|
22
|
+
# Customer ID (ShopperId) required for renewal of imported certificates
|
23
|
+
attr_accessor :customer_id
|
24
|
+
|
22
25
|
# Description of the object
|
23
26
|
attr_accessor :description
|
24
27
|
|
@@ -62,6 +65,7 @@ module Akeyless
|
|
62
65
|
def self.attribute_map
|
63
66
|
{
|
64
67
|
:'api_key' => :'api-key',
|
68
|
+
:'customer_id' => :'customer_id',
|
65
69
|
:'description' => :'description',
|
66
70
|
:'imap_fqdn' => :'imap-fqdn',
|
67
71
|
:'imap_password' => :'imap-password',
|
@@ -87,6 +91,7 @@ module Akeyless
|
|
87
91
|
def self.openapi_types
|
88
92
|
{
|
89
93
|
:'api_key' => :'String',
|
94
|
+
:'customer_id' => :'String',
|
90
95
|
:'description' => :'String',
|
91
96
|
:'imap_fqdn' => :'String',
|
92
97
|
:'imap_password' => :'String',
|
@@ -130,6 +135,10 @@ module Akeyless
|
|
130
135
|
self.api_key = nil
|
131
136
|
end
|
132
137
|
|
138
|
+
if attributes.key?(:'customer_id')
|
139
|
+
self.customer_id = attributes[:'customer_id']
|
140
|
+
end
|
141
|
+
|
133
142
|
if attributes.key?(:'description')
|
134
143
|
self.description = attributes[:'description']
|
135
144
|
end
|
@@ -250,6 +259,7 @@ module Akeyless
|
|
250
259
|
return true if self.equal?(o)
|
251
260
|
self.class == o.class &&
|
252
261
|
api_key == o.api_key &&
|
262
|
+
customer_id == o.customer_id &&
|
253
263
|
description == o.description &&
|
254
264
|
imap_fqdn == o.imap_fqdn &&
|
255
265
|
imap_password == o.imap_password &&
|
@@ -274,7 +284,7 @@ module Akeyless
|
|
274
284
|
# Calculates hash code according to all attributes.
|
275
285
|
# @return [Integer] Hash code
|
276
286
|
def hash
|
277
|
-
[api_key, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
|
287
|
+
[api_key, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
|
278
288
|
end
|
279
289
|
|
280
290
|
# Builds the object from hash
|
@@ -52,6 +52,9 @@ module Akeyless
|
|
52
52
|
# Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
|
53
53
|
attr_accessor :k8s_predefined_role_type
|
54
54
|
|
55
|
+
# Content of the yaml in a Base64 format.
|
56
|
+
attr_accessor :k8s_rolebinding_yaml_data
|
57
|
+
|
55
58
|
# Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
|
56
59
|
attr_accessor :k8s_rolebinding_yaml_def
|
57
60
|
|
@@ -130,6 +133,7 @@ module Akeyless
|
|
130
133
|
:'k8s_namespace' => :'k8s-namespace',
|
131
134
|
:'k8s_predefined_role_name' => :'k8s-predefined-role-name',
|
132
135
|
:'k8s_predefined_role_type' => :'k8s-predefined-role-type',
|
136
|
+
:'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
|
133
137
|
:'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
|
134
138
|
:'k8s_service_account' => :'k8s-service-account',
|
135
139
|
:'k8s_service_account_type' => :'k8s-service-account-type',
|
@@ -174,6 +178,7 @@ module Akeyless
|
|
174
178
|
:'k8s_namespace' => :'String',
|
175
179
|
:'k8s_predefined_role_name' => :'String',
|
176
180
|
:'k8s_predefined_role_type' => :'String',
|
181
|
+
:'k8s_rolebinding_yaml_data' => :'String',
|
177
182
|
:'k8s_rolebinding_yaml_def' => :'String',
|
178
183
|
:'k8s_service_account' => :'String',
|
179
184
|
:'k8s_service_account_type' => :'String',
|
@@ -269,6 +274,10 @@ module Akeyless
|
|
269
274
|
self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
|
270
275
|
end
|
271
276
|
|
277
|
+
if attributes.key?(:'k8s_rolebinding_yaml_data')
|
278
|
+
self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
|
279
|
+
end
|
280
|
+
|
272
281
|
if attributes.key?(:'k8s_rolebinding_yaml_def')
|
273
282
|
self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
|
274
283
|
end
|
@@ -403,6 +412,7 @@ module Akeyless
|
|
403
412
|
k8s_namespace == o.k8s_namespace &&
|
404
413
|
k8s_predefined_role_name == o.k8s_predefined_role_name &&
|
405
414
|
k8s_predefined_role_type == o.k8s_predefined_role_type &&
|
415
|
+
k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
|
406
416
|
k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
|
407
417
|
k8s_service_account == o.k8s_service_account &&
|
408
418
|
k8s_service_account_type == o.k8s_service_account_type &&
|
@@ -435,7 +445,7 @@ module Akeyless
|
|
435
445
|
# Calculates hash code according to all attributes.
|
436
446
|
# @return [Integer] Hash code
|
437
447
|
def hash
|
438
|
-
[custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
448
|
+
[custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
439
449
|
end
|
440
450
|
|
441
451
|
# Builds the object from hash
|
@@ -52,6 +52,9 @@ module Akeyless
|
|
52
52
|
# Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
|
53
53
|
attr_accessor :k8s_predefined_role_type
|
54
54
|
|
55
|
+
# Content of the yaml in a Base64 format.
|
56
|
+
attr_accessor :k8s_rolebinding_yaml_data
|
57
|
+
|
55
58
|
# Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
|
56
59
|
attr_accessor :k8s_rolebinding_yaml_def
|
57
60
|
|
@@ -133,6 +136,7 @@ module Akeyless
|
|
133
136
|
:'k8s_namespace' => :'k8s-namespace',
|
134
137
|
:'k8s_predefined_role_name' => :'k8s-predefined-role-name',
|
135
138
|
:'k8s_predefined_role_type' => :'k8s-predefined-role-type',
|
139
|
+
:'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
|
136
140
|
:'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
|
137
141
|
:'k8s_service_account' => :'k8s-service-account',
|
138
142
|
:'k8s_service_account_type' => :'k8s-service-account-type',
|
@@ -178,6 +182,7 @@ module Akeyless
|
|
178
182
|
:'k8s_namespace' => :'String',
|
179
183
|
:'k8s_predefined_role_name' => :'String',
|
180
184
|
:'k8s_predefined_role_type' => :'String',
|
185
|
+
:'k8s_rolebinding_yaml_data' => :'String',
|
181
186
|
:'k8s_rolebinding_yaml_def' => :'String',
|
182
187
|
:'k8s_service_account' => :'String',
|
183
188
|
:'k8s_service_account_type' => :'String',
|
@@ -274,6 +279,10 @@ module Akeyless
|
|
274
279
|
self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
|
275
280
|
end
|
276
281
|
|
282
|
+
if attributes.key?(:'k8s_rolebinding_yaml_data')
|
283
|
+
self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
|
284
|
+
end
|
285
|
+
|
277
286
|
if attributes.key?(:'k8s_rolebinding_yaml_def')
|
278
287
|
self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
|
279
288
|
end
|
@@ -412,6 +421,7 @@ module Akeyless
|
|
412
421
|
k8s_namespace == o.k8s_namespace &&
|
413
422
|
k8s_predefined_role_name == o.k8s_predefined_role_name &&
|
414
423
|
k8s_predefined_role_type == o.k8s_predefined_role_type &&
|
424
|
+
k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
|
415
425
|
k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
|
416
426
|
k8s_service_account == o.k8s_service_account &&
|
417
427
|
k8s_service_account_type == o.k8s_service_account_type &&
|
@@ -445,7 +455,7 @@ module Akeyless
|
|
445
455
|
# Calculates hash code according to all attributes.
|
446
456
|
# @return [Integer] Hash code
|
447
457
|
def hash
|
448
|
-
[custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
458
|
+
[custom_username_template, delete_protection, description, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
449
459
|
end
|
450
460
|
|
451
461
|
# Builds the object from hash
|
@@ -49,6 +49,9 @@ module Akeyless
|
|
49
49
|
# Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
|
50
50
|
attr_accessor :k8s_predefined_role_type
|
51
51
|
|
52
|
+
# Content of the yaml in a Base64 format.
|
53
|
+
attr_accessor :k8s_rolebinding_yaml_data
|
54
|
+
|
52
55
|
# Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
|
53
56
|
attr_accessor :k8s_rolebinding_yaml_def
|
54
57
|
|
@@ -126,6 +129,7 @@ module Akeyless
|
|
126
129
|
:'k8s_namespace' => :'k8s-namespace',
|
127
130
|
:'k8s_predefined_role_name' => :'k8s-predefined-role-name',
|
128
131
|
:'k8s_predefined_role_type' => :'k8s-predefined-role-type',
|
132
|
+
:'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
|
129
133
|
:'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
|
130
134
|
:'k8s_service_account' => :'k8s-service-account',
|
131
135
|
:'k8s_service_account_type' => :'k8s-service-account-type',
|
@@ -169,6 +173,7 @@ module Akeyless
|
|
169
173
|
:'k8s_namespace' => :'String',
|
170
174
|
:'k8s_predefined_role_name' => :'String',
|
171
175
|
:'k8s_predefined_role_type' => :'String',
|
176
|
+
:'k8s_rolebinding_yaml_data' => :'String',
|
172
177
|
:'k8s_rolebinding_yaml_def' => :'String',
|
173
178
|
:'k8s_service_account' => :'String',
|
174
179
|
:'k8s_service_account_type' => :'String',
|
@@ -260,6 +265,10 @@ module Akeyless
|
|
260
265
|
self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
|
261
266
|
end
|
262
267
|
|
268
|
+
if attributes.key?(:'k8s_rolebinding_yaml_data')
|
269
|
+
self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
|
270
|
+
end
|
271
|
+
|
263
272
|
if attributes.key?(:'k8s_rolebinding_yaml_def')
|
264
273
|
self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
|
265
274
|
end
|
@@ -393,6 +402,7 @@ module Akeyless
|
|
393
402
|
k8s_namespace == o.k8s_namespace &&
|
394
403
|
k8s_predefined_role_name == o.k8s_predefined_role_name &&
|
395
404
|
k8s_predefined_role_type == o.k8s_predefined_role_type &&
|
405
|
+
k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
|
396
406
|
k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
|
397
407
|
k8s_service_account == o.k8s_service_account &&
|
398
408
|
k8s_service_account_type == o.k8s_service_account_type &&
|
@@ -425,7 +435,7 @@ module Akeyless
|
|
425
435
|
# Calculates hash code according to all attributes.
|
426
436
|
# @return [Integer] Hash code
|
427
437
|
def hash
|
428
|
-
[custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
438
|
+
[custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
429
439
|
end
|
430
440
|
|
431
441
|
# Builds the object from hash
|
@@ -49,6 +49,9 @@ module Akeyless
|
|
49
49
|
# Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
|
50
50
|
attr_accessor :k8s_predefined_role_type
|
51
51
|
|
52
|
+
# Content of the yaml in a Base64 format.
|
53
|
+
attr_accessor :k8s_rolebinding_yaml_data
|
54
|
+
|
52
55
|
# Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
|
53
56
|
attr_accessor :k8s_rolebinding_yaml_def
|
54
57
|
|
@@ -129,6 +132,7 @@ module Akeyless
|
|
129
132
|
:'k8s_namespace' => :'k8s-namespace',
|
130
133
|
:'k8s_predefined_role_name' => :'k8s-predefined-role-name',
|
131
134
|
:'k8s_predefined_role_type' => :'k8s-predefined-role-type',
|
135
|
+
:'k8s_rolebinding_yaml_data' => :'k8s-rolebinding-yaml-data',
|
132
136
|
:'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
|
133
137
|
:'k8s_service_account' => :'k8s-service-account',
|
134
138
|
:'k8s_service_account_type' => :'k8s-service-account-type',
|
@@ -173,6 +177,7 @@ module Akeyless
|
|
173
177
|
:'k8s_namespace' => :'String',
|
174
178
|
:'k8s_predefined_role_name' => :'String',
|
175
179
|
:'k8s_predefined_role_type' => :'String',
|
180
|
+
:'k8s_rolebinding_yaml_data' => :'String',
|
176
181
|
:'k8s_rolebinding_yaml_def' => :'String',
|
177
182
|
:'k8s_service_account' => :'String',
|
178
183
|
:'k8s_service_account_type' => :'String',
|
@@ -265,6 +270,10 @@ module Akeyless
|
|
265
270
|
self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
|
266
271
|
end
|
267
272
|
|
273
|
+
if attributes.key?(:'k8s_rolebinding_yaml_data')
|
274
|
+
self.k8s_rolebinding_yaml_data = attributes[:'k8s_rolebinding_yaml_data']
|
275
|
+
end
|
276
|
+
|
268
277
|
if attributes.key?(:'k8s_rolebinding_yaml_def')
|
269
278
|
self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
|
270
279
|
end
|
@@ -402,6 +411,7 @@ module Akeyless
|
|
402
411
|
k8s_namespace == o.k8s_namespace &&
|
403
412
|
k8s_predefined_role_name == o.k8s_predefined_role_name &&
|
404
413
|
k8s_predefined_role_type == o.k8s_predefined_role_type &&
|
414
|
+
k8s_rolebinding_yaml_data == o.k8s_rolebinding_yaml_data &&
|
405
415
|
k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
|
406
416
|
k8s_service_account == o.k8s_service_account &&
|
407
417
|
k8s_service_account_type == o.k8s_service_account_type &&
|
@@ -435,7 +445,7 @@ module Akeyless
|
|
435
445
|
# Calculates hash code according to all attributes.
|
436
446
|
# @return [Integer] Hash code
|
437
447
|
def hash
|
438
|
-
[custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
448
|
+
[custom_username_template, delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_name, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_data, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_delay, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, use_gw_service_account, user_ttl].hash
|
439
449
|
end
|
440
450
|
|
441
451
|
# Builds the object from hash
|
@@ -52,6 +52,15 @@ module Akeyless
|
|
52
52
|
# Enable recording of rdp session [true/false]
|
53
53
|
attr_accessor :rdp_session_recording
|
54
54
|
|
55
|
+
# Whether to compress recording files before upload
|
56
|
+
attr_accessor :rdp_session_recording_compress
|
57
|
+
|
58
|
+
# If provided, this key will be used to encrypt uploaded recordings.
|
59
|
+
attr_accessor :rdp_session_recording_encryption_key
|
60
|
+
|
61
|
+
# RDP session recording quality [low/medium/high]
|
62
|
+
attr_accessor :rdp_session_recording_quality
|
63
|
+
|
55
64
|
# Rdp session recording storage destination [local/aws/azure]
|
56
65
|
attr_accessor :rdp_session_storage
|
57
66
|
|
@@ -76,6 +85,9 @@ module Akeyless
|
|
76
85
|
:'azure_storage_tenant_id' => :'azure-storage-tenant-id',
|
77
86
|
:'json' => :'json',
|
78
87
|
:'rdp_session_recording' => :'rdp-session-recording',
|
88
|
+
:'rdp_session_recording_compress' => :'rdp-session-recording-compress',
|
89
|
+
:'rdp_session_recording_encryption_key' => :'rdp-session-recording-encryption-key',
|
90
|
+
:'rdp_session_recording_quality' => :'rdp-session-recording-quality',
|
79
91
|
:'rdp_session_storage' => :'rdp-session-storage',
|
80
92
|
:'token' => :'token',
|
81
93
|
:'uid_token' => :'uid-token'
|
@@ -102,6 +114,9 @@ module Akeyless
|
|
102
114
|
:'azure_storage_tenant_id' => :'String',
|
103
115
|
:'json' => :'Boolean',
|
104
116
|
:'rdp_session_recording' => :'String',
|
117
|
+
:'rdp_session_recording_compress' => :'Boolean',
|
118
|
+
:'rdp_session_recording_encryption_key' => :'String',
|
119
|
+
:'rdp_session_recording_quality' => :'String',
|
105
120
|
:'rdp_session_storage' => :'String',
|
106
121
|
:'token' => :'String',
|
107
122
|
:'uid_token' => :'String'
|
@@ -179,6 +194,18 @@ module Akeyless
|
|
179
194
|
self.rdp_session_recording = attributes[:'rdp_session_recording']
|
180
195
|
end
|
181
196
|
|
197
|
+
if attributes.key?(:'rdp_session_recording_compress')
|
198
|
+
self.rdp_session_recording_compress = attributes[:'rdp_session_recording_compress']
|
199
|
+
end
|
200
|
+
|
201
|
+
if attributes.key?(:'rdp_session_recording_encryption_key')
|
202
|
+
self.rdp_session_recording_encryption_key = attributes[:'rdp_session_recording_encryption_key']
|
203
|
+
end
|
204
|
+
|
205
|
+
if attributes.key?(:'rdp_session_recording_quality')
|
206
|
+
self.rdp_session_recording_quality = attributes[:'rdp_session_recording_quality']
|
207
|
+
end
|
208
|
+
|
182
209
|
if attributes.key?(:'rdp_session_storage')
|
183
210
|
self.rdp_session_storage = attributes[:'rdp_session_storage']
|
184
211
|
end
|
@@ -224,6 +251,9 @@ module Akeyless
|
|
224
251
|
azure_storage_tenant_id == o.azure_storage_tenant_id &&
|
225
252
|
json == o.json &&
|
226
253
|
rdp_session_recording == o.rdp_session_recording &&
|
254
|
+
rdp_session_recording_compress == o.rdp_session_recording_compress &&
|
255
|
+
rdp_session_recording_encryption_key == o.rdp_session_recording_encryption_key &&
|
256
|
+
rdp_session_recording_quality == o.rdp_session_recording_quality &&
|
227
257
|
rdp_session_storage == o.rdp_session_storage &&
|
228
258
|
token == o.token &&
|
229
259
|
uid_token == o.uid_token
|
@@ -238,7 +268,7 @@ module Akeyless
|
|
238
268
|
# Calculates hash code according to all attributes.
|
239
269
|
# @return [Integer] Hash code
|
240
270
|
def hash
|
241
|
-
[aws_storage_access_key_id, aws_storage_bucket_name, aws_storage_bucket_prefix, aws_storage_region, aws_storage_secret_access_key, azure_storage_account_name, azure_storage_client_id, azure_storage_client_secret, azure_storage_container_name, azure_storage_tenant_id, json, rdp_session_recording, rdp_session_storage, token, uid_token].hash
|
271
|
+
[aws_storage_access_key_id, aws_storage_bucket_name, aws_storage_bucket_prefix, aws_storage_region, aws_storage_secret_access_key, azure_storage_account_name, azure_storage_client_id, azure_storage_client_secret, azure_storage_container_name, azure_storage_tenant_id, json, rdp_session_recording, rdp_session_recording_compress, rdp_session_recording_encryption_key, rdp_session_recording_quality, rdp_session_storage, token, uid_token].hash
|
242
272
|
end
|
243
273
|
|
244
274
|
# Builds the object from hash
|
@@ -28,6 +28,9 @@ module Akeyless
|
|
28
28
|
|
29
29
|
attr_accessor :secret
|
30
30
|
|
31
|
+
# Optional, used to find the certificate ID in GoDaddy's API
|
32
|
+
attr_accessor :shopper_id
|
33
|
+
|
31
34
|
# A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years.
|
32
35
|
attr_accessor :timeout
|
33
36
|
|
@@ -42,6 +45,7 @@ module Akeyless
|
|
42
45
|
:'imap_user' => :'imap_user',
|
43
46
|
:'key' => :'key',
|
44
47
|
:'secret' => :'secret',
|
48
|
+
:'shopper_id' => :'shopper_id',
|
45
49
|
:'timeout' => :'timeout',
|
46
50
|
:'validation_email' => :'validation_email'
|
47
51
|
}
|
@@ -61,6 +65,7 @@ module Akeyless
|
|
61
65
|
:'imap_user' => :'String',
|
62
66
|
:'key' => :'String',
|
63
67
|
:'secret' => :'String',
|
68
|
+
:'shopper_id' => :'String',
|
64
69
|
:'timeout' => :'Integer',
|
65
70
|
:'validation_email' => :'String'
|
66
71
|
}
|
@@ -111,6 +116,10 @@ module Akeyless
|
|
111
116
|
self.secret = attributes[:'secret']
|
112
117
|
end
|
113
118
|
|
119
|
+
if attributes.key?(:'shopper_id')
|
120
|
+
self.shopper_id = attributes[:'shopper_id']
|
121
|
+
end
|
122
|
+
|
114
123
|
if attributes.key?(:'timeout')
|
115
124
|
self.timeout = attributes[:'timeout']
|
116
125
|
end
|
@@ -146,6 +155,7 @@ module Akeyless
|
|
146
155
|
imap_user == o.imap_user &&
|
147
156
|
key == o.key &&
|
148
157
|
secret == o.secret &&
|
158
|
+
shopper_id == o.shopper_id &&
|
149
159
|
timeout == o.timeout &&
|
150
160
|
validation_email == o.validation_email
|
151
161
|
end
|
@@ -159,7 +169,7 @@ module Akeyless
|
|
159
169
|
# Calculates hash code according to all attributes.
|
160
170
|
# @return [Integer] Hash code
|
161
171
|
def hash
|
162
|
-
[imap_fqdn, imap_password, imap_port, imap_user, key, secret, timeout, validation_email].hash
|
172
|
+
[imap_fqdn, imap_password, imap_port, imap_user, key, secret, shopper_id, timeout, validation_email].hash
|
163
173
|
end
|
164
174
|
|
165
175
|
# Builds the object from hash
|
@@ -18,6 +18,9 @@ module Akeyless
|
|
18
18
|
# Key of the api credentials to the Godaddy account
|
19
19
|
attr_accessor :api_key
|
20
20
|
|
21
|
+
# Customer ID (ShopperId) required for renewal of imported certificates
|
22
|
+
attr_accessor :customer_id
|
23
|
+
|
21
24
|
# Description of the object
|
22
25
|
attr_accessor :description
|
23
26
|
|
@@ -61,6 +64,7 @@ module Akeyless
|
|
61
64
|
def self.attribute_map
|
62
65
|
{
|
63
66
|
:'api_key' => :'api-key',
|
67
|
+
:'customer_id' => :'customer_id',
|
64
68
|
:'description' => :'description',
|
65
69
|
:'imap_fqdn' => :'imap-fqdn',
|
66
70
|
:'imap_password' => :'imap-password',
|
@@ -86,6 +90,7 @@ module Akeyless
|
|
86
90
|
def self.openapi_types
|
87
91
|
{
|
88
92
|
:'api_key' => :'String',
|
93
|
+
:'customer_id' => :'String',
|
89
94
|
:'description' => :'String',
|
90
95
|
:'imap_fqdn' => :'String',
|
91
96
|
:'imap_password' => :'String',
|
@@ -129,6 +134,10 @@ module Akeyless
|
|
129
134
|
self.api_key = nil
|
130
135
|
end
|
131
136
|
|
137
|
+
if attributes.key?(:'customer_id')
|
138
|
+
self.customer_id = attributes[:'customer_id']
|
139
|
+
end
|
140
|
+
|
132
141
|
if attributes.key?(:'description')
|
133
142
|
self.description = attributes[:'description']
|
134
143
|
end
|
@@ -249,6 +258,7 @@ module Akeyless
|
|
249
258
|
return true if self.equal?(o)
|
250
259
|
self.class == o.class &&
|
251
260
|
api_key == o.api_key &&
|
261
|
+
customer_id == o.customer_id &&
|
252
262
|
description == o.description &&
|
253
263
|
imap_fqdn == o.imap_fqdn &&
|
254
264
|
imap_password == o.imap_password &&
|
@@ -273,7 +283,7 @@ module Akeyless
|
|
273
283
|
# Calculates hash code according to all attributes.
|
274
284
|
# @return [Integer] Hash code
|
275
285
|
def hash
|
276
|
-
[api_key, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
|
286
|
+
[api_key, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, key, max_versions, name, secret, timeout, token, uid_token].hash
|
277
287
|
end
|
278
288
|
|
279
289
|
# Builds the object from hash
|
@@ -18,6 +18,9 @@ module Akeyless
|
|
18
18
|
# Key of the api credentials to the Godaddy account
|
19
19
|
attr_accessor :api_key
|
20
20
|
|
21
|
+
# Customer ID (ShopperId) required for renewal of imported certificates
|
22
|
+
attr_accessor :customer_id
|
23
|
+
|
21
24
|
# Description of the object
|
22
25
|
attr_accessor :description
|
23
26
|
|
@@ -67,6 +70,7 @@ module Akeyless
|
|
67
70
|
def self.attribute_map
|
68
71
|
{
|
69
72
|
:'api_key' => :'api-key',
|
73
|
+
:'customer_id' => :'customer_id',
|
70
74
|
:'description' => :'description',
|
71
75
|
:'imap_fqdn' => :'imap-fqdn',
|
72
76
|
:'imap_password' => :'imap-password',
|
@@ -94,6 +98,7 @@ module Akeyless
|
|
94
98
|
def self.openapi_types
|
95
99
|
{
|
96
100
|
:'api_key' => :'String',
|
101
|
+
:'customer_id' => :'String',
|
97
102
|
:'description' => :'String',
|
98
103
|
:'imap_fqdn' => :'String',
|
99
104
|
:'imap_password' => :'String',
|
@@ -139,6 +144,10 @@ module Akeyless
|
|
139
144
|
self.api_key = nil
|
140
145
|
end
|
141
146
|
|
147
|
+
if attributes.key?(:'customer_id')
|
148
|
+
self.customer_id = attributes[:'customer_id']
|
149
|
+
end
|
150
|
+
|
142
151
|
if attributes.key?(:'description')
|
143
152
|
self.description = attributes[:'description']
|
144
153
|
end
|
@@ -267,6 +276,7 @@ module Akeyless
|
|
267
276
|
return true if self.equal?(o)
|
268
277
|
self.class == o.class &&
|
269
278
|
api_key == o.api_key &&
|
279
|
+
customer_id == o.customer_id &&
|
270
280
|
description == o.description &&
|
271
281
|
imap_fqdn == o.imap_fqdn &&
|
272
282
|
imap_password == o.imap_password &&
|
@@ -293,7 +303,7 @@ module Akeyless
|
|
293
303
|
# Calculates hash code according to all attributes.
|
294
304
|
# @return [Integer] Hash code
|
295
305
|
def hash
|
296
|
-
[api_key, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token].hash
|
306
|
+
[api_key, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token].hash
|
297
307
|
end
|
298
308
|
|
299
309
|
# Builds the object from hash
|
@@ -22,6 +22,9 @@ module Akeyless
|
|
22
22
|
# Deprecated - use description
|
23
23
|
attr_accessor :comment
|
24
24
|
|
25
|
+
# Customer ID (ShopperId) required for renewal of imported certificates
|
26
|
+
attr_accessor :customer_id
|
27
|
+
|
25
28
|
# Description of the object
|
26
29
|
attr_accessor :description
|
27
30
|
|
@@ -75,6 +78,7 @@ module Akeyless
|
|
75
78
|
{
|
76
79
|
:'api_key' => :'api-key',
|
77
80
|
:'comment' => :'comment',
|
81
|
+
:'customer_id' => :'customer_id',
|
78
82
|
:'description' => :'description',
|
79
83
|
:'imap_fqdn' => :'imap-fqdn',
|
80
84
|
:'imap_password' => :'imap-password',
|
@@ -104,6 +108,7 @@ module Akeyless
|
|
104
108
|
{
|
105
109
|
:'api_key' => :'String',
|
106
110
|
:'comment' => :'String',
|
111
|
+
:'customer_id' => :'String',
|
107
112
|
:'description' => :'String',
|
108
113
|
:'imap_fqdn' => :'String',
|
109
114
|
:'imap_password' => :'String',
|
@@ -154,6 +159,10 @@ module Akeyless
|
|
154
159
|
self.comment = attributes[:'comment']
|
155
160
|
end
|
156
161
|
|
162
|
+
if attributes.key?(:'customer_id')
|
163
|
+
self.customer_id = attributes[:'customer_id']
|
164
|
+
end
|
165
|
+
|
157
166
|
if attributes.key?(:'description')
|
158
167
|
self.description = attributes[:'description']
|
159
168
|
end
|
@@ -287,6 +296,7 @@ module Akeyless
|
|
287
296
|
self.class == o.class &&
|
288
297
|
api_key == o.api_key &&
|
289
298
|
comment == o.comment &&
|
299
|
+
customer_id == o.customer_id &&
|
290
300
|
description == o.description &&
|
291
301
|
imap_fqdn == o.imap_fqdn &&
|
292
302
|
imap_password == o.imap_password &&
|
@@ -314,7 +324,7 @@ module Akeyless
|
|
314
324
|
# Calculates hash code according to all attributes.
|
315
325
|
# @return [Integer] Hash code
|
316
326
|
def hash
|
317
|
-
[api_key, comment, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token, update_version].hash
|
327
|
+
[api_key, comment, customer_id, description, imap_fqdn, imap_password, imap_port, imap_username, json, keep_prev_version, key, max_versions, name, new_name, secret, timeout, token, uid_token, update_version].hash
|
318
328
|
end
|
319
329
|
|
320
330
|
# Builds the object from hash
|
@@ -19,6 +19,12 @@ module Akeyless
|
|
19
19
|
|
20
20
|
attr_accessor :azure
|
21
21
|
|
22
|
+
attr_accessor :compress
|
23
|
+
|
24
|
+
attr_accessor :encryption_key
|
25
|
+
|
26
|
+
attr_accessor :recording_quality
|
27
|
+
|
22
28
|
attr_accessor :storage_type
|
23
29
|
|
24
30
|
# Attribute mapping from ruby-style variable name to JSON key.
|
@@ -26,6 +32,9 @@ module Akeyless
|
|
26
32
|
{
|
27
33
|
:'aws' => :'aws',
|
28
34
|
:'azure' => :'azure',
|
35
|
+
:'compress' => :'compress',
|
36
|
+
:'encryption_key' => :'encryption_key',
|
37
|
+
:'recording_quality' => :'recording_quality',
|
29
38
|
:'storage_type' => :'storage_type'
|
30
39
|
}
|
31
40
|
end
|
@@ -40,6 +49,9 @@ module Akeyless
|
|
40
49
|
{
|
41
50
|
:'aws' => :'AwsStorage',
|
42
51
|
:'azure' => :'AzureStorage',
|
52
|
+
:'compress' => :'Boolean',
|
53
|
+
:'encryption_key' => :'String',
|
54
|
+
:'recording_quality' => :'String',
|
43
55
|
:'storage_type' => :'String'
|
44
56
|
}
|
45
57
|
end
|
@@ -73,6 +85,18 @@ module Akeyless
|
|
73
85
|
self.azure = attributes[:'azure']
|
74
86
|
end
|
75
87
|
|
88
|
+
if attributes.key?(:'compress')
|
89
|
+
self.compress = attributes[:'compress']
|
90
|
+
end
|
91
|
+
|
92
|
+
if attributes.key?(:'encryption_key')
|
93
|
+
self.encryption_key = attributes[:'encryption_key']
|
94
|
+
end
|
95
|
+
|
96
|
+
if attributes.key?(:'recording_quality')
|
97
|
+
self.recording_quality = attributes[:'recording_quality']
|
98
|
+
end
|
99
|
+
|
76
100
|
if attributes.key?(:'storage_type')
|
77
101
|
self.storage_type = attributes[:'storage_type']
|
78
102
|
end
|
@@ -100,6 +124,9 @@ module Akeyless
|
|
100
124
|
self.class == o.class &&
|
101
125
|
aws == o.aws &&
|
102
126
|
azure == o.azure &&
|
127
|
+
compress == o.compress &&
|
128
|
+
encryption_key == o.encryption_key &&
|
129
|
+
recording_quality == o.recording_quality &&
|
103
130
|
storage_type == o.storage_type
|
104
131
|
end
|
105
132
|
|
@@ -112,7 +139,7 @@ module Akeyless
|
|
112
139
|
# Calculates hash code according to all attributes.
|
113
140
|
# @return [Integer] Hash code
|
114
141
|
def hash
|
115
|
-
[aws, azure, storage_type].hash
|
142
|
+
[aws, azure, compress, encryption_key, recording_quality, storage_type].hash
|
116
143
|
end
|
117
144
|
|
118
145
|
# Builds the object from hash
|
data/lib/akeyless/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: akeyless
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 5.0.
|
4
|
+
version: 5.0.6
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- OpenAPI-Generator
|
@@ -3950,7 +3950,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
3950
3950
|
- !ruby/object:Gem::Version
|
3951
3951
|
version: '0'
|
3952
3952
|
requirements: []
|
3953
|
-
rubygems_version: 3.6.
|
3953
|
+
rubygems_version: 3.6.9
|
3954
3954
|
specification_version: 4
|
3955
3955
|
summary: Akeyless API Ruby Gem
|
3956
3956
|
test_files:
|