akeyless 5.0.8 → 5.0.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +9 -1
  3. data/docs/CreateESM.md +2 -0
  4. data/docs/CreateUSC.md +2 -0
  5. data/docs/DSProducerDetails.md +12 -0
  6. data/docs/DynamicSecretCreateGcp.md +2 -0
  7. data/docs/DynamicSecretCreateOpenAI.md +40 -0
  8. data/docs/DynamicSecretUpdateGcp.md +2 -0
  9. data/docs/DynamicSecretUpdateOpenAI.md +42 -0
  10. data/docs/EsmGetSecretOutput.md +2 -0
  11. data/docs/EventForwarderCreateTeams.md +44 -0
  12. data/docs/EventForwarderUpdateTeams.md +46 -0
  13. data/docs/GatewayCreateMigration.md +1 -11
  14. data/docs/GatewayCreateProducerGcp.md +2 -0
  15. data/docs/GatewayUpdateMigration.md +0 -10
  16. data/docs/GatewayUpdateProducerGcp.md +2 -0
  17. data/docs/NotiForwarder.md +2 -0
  18. data/docs/OpenAITargetDetails.md +3 -3
  19. data/docs/SecretInfo.md +2 -0
  20. data/docs/UscCreate.md +2 -0
  21. data/docs/UscGetSecretOutput.md +2 -0
  22. data/docs/UscUpdate.md +2 -0
  23. data/docs/V2Api.md +252 -0
  24. data/lib/akeyless/api/v2_api.rb +256 -0
  25. data/lib/akeyless/models/create_esm.rb +11 -1
  26. data/lib/akeyless/models/create_usc.rb +11 -1
  27. data/lib/akeyless/models/ds_producer_details.rb +55 -1
  28. data/lib/akeyless/models/dynamic_secret_create_gcp.rb +11 -1
  29. data/lib/akeyless/models/dynamic_secret_create_open_ai.rb +339 -0
  30. data/lib/akeyless/models/dynamic_secret_update_gcp.rb +11 -1
  31. data/lib/akeyless/models/dynamic_secret_update_open_ai.rb +349 -0
  32. data/lib/akeyless/models/esm_get_secret_output.rb +10 -1
  33. data/lib/akeyless/models/event_forwarder_create_teams.rb +385 -0
  34. data/lib/akeyless/models/event_forwarder_update_teams.rb +391 -0
  35. data/lib/akeyless/models/gateway_create_migration.rb +2 -54
  36. data/lib/akeyless/models/gateway_create_producer_gcp.rb +11 -1
  37. data/lib/akeyless/models/gateway_update_migration.rb +1 -53
  38. data/lib/akeyless/models/gateway_update_producer_gcp.rb +11 -1
  39. data/lib/akeyless/models/noti_forwarder.rb +10 -1
  40. data/lib/akeyless/models/open_ai_target_details.rb +13 -13
  41. data/lib/akeyless/models/secret_info.rb +10 -1
  42. data/lib/akeyless/models/usc_create.rb +11 -1
  43. data/lib/akeyless/models/usc_get_secret_output.rb +10 -1
  44. data/lib/akeyless/models/usc_update.rb +11 -1
  45. data/lib/akeyless/version.rb +1 -1
  46. data/lib/akeyless.rb +4 -0
  47. data/spec/models/dynamic_secret_create_open_ai_spec.rb +102 -0
  48. data/spec/models/dynamic_secret_update_open_ai_spec.rb +108 -0
  49. data/spec/models/event_forwarder_create_teams_spec.rb +114 -0
  50. data/spec/models/event_forwarder_update_teams_spec.rb +120 -0
  51. metadata +17 -1
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5aeed76a9191a3055f61ad80a54554ed61d542195055e3354745652907bad4ef
4
- data.tar.gz: 07e8a579218ef4a36bcd75725a1e8d483374c5aebb2e858b2de18adef9ed2d79
3
+ metadata.gz: 65719185b3c85144620d597d4e844f4382b4d2305eec264dbc2d0eaa2224e4aa
4
+ data.tar.gz: dfd9353152170ef02541b5184f0411505d2b44cbbfea61fc94630332426ace27
5
5
  SHA512:
6
- metadata.gz: 3ad4b1b89377e8e2cc473bc4a35de82cacf25eb97416ac115f08d5171fe2c5061e0e5f00c5e4aa7a45713efbae96b906a25847b819b0c3ee502f821d5cf8d642
7
- data.tar.gz: c44d403cccc988f262ba0dfc73509d0edd08b8b57e21f4082a8256abff107234a817d830bb54673a6ca420643acd7d68d884e2ebf26fbe18f85d35627e7dce50
6
+ metadata.gz: c5c2ca0eddee37551ccc4d8e75aa301d6c68c220994af84a4eaec52d8a003d894f2905c3ddcb139f904f7eabc2567ea964725bb37131a9cc5dcd129ae17dcbc1
7
+ data.tar.gz: ac8586b91d217adb48022cbf682be51564fb9fe36f3e5158c752e62405ab84c21c286559fda2afbeaa8eb376256da607cf5bfb2e645c12228f4e274b01449b1e
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.8
10
+ - Package version: 5.0.10
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -201,6 +201,7 @@ Class | Method | HTTP request | Description
201
201
  *Akeyless::V2Api* | [**dynamic_secret_create_mongo_db**](docs/V2Api.md#dynamic_secret_create_mongo_db) | **POST** /dynamic-secret-create-mongodb |
202
202
  *Akeyless::V2Api* | [**dynamic_secret_create_ms_sql**](docs/V2Api.md#dynamic_secret_create_ms_sql) | **POST** /dynamic-secret-create-mssql |
203
203
  *Akeyless::V2Api* | [**dynamic_secret_create_my_sql**](docs/V2Api.md#dynamic_secret_create_my_sql) | **POST** /dynamic-secret-create-mysql |
204
+ *Akeyless::V2Api* | [**dynamic_secret_create_open_ai**](docs/V2Api.md#dynamic_secret_create_open_ai) | **POST** /dynamic-secret-create-openai |
204
205
  *Akeyless::V2Api* | [**dynamic_secret_create_oracle_db**](docs/V2Api.md#dynamic_secret_create_oracle_db) | **POST** /dynamic-secret-create-oracle |
205
206
  *Akeyless::V2Api* | [**dynamic_secret_create_ping**](docs/V2Api.md#dynamic_secret_create_ping) | **POST** /dynamic-secret-create-ping |
206
207
  *Akeyless::V2Api* | [**dynamic_secret_create_postgre_sql**](docs/V2Api.md#dynamic_secret_create_postgre_sql) | **POST** /dynamic-secret-create-postgresql |
@@ -235,6 +236,7 @@ Class | Method | HTTP request | Description
235
236
  *Akeyless::V2Api* | [**dynamic_secret_update_mongo_db**](docs/V2Api.md#dynamic_secret_update_mongo_db) | **POST** /dynamic-secret-update-mongo |
236
237
  *Akeyless::V2Api* | [**dynamic_secret_update_ms_sql**](docs/V2Api.md#dynamic_secret_update_ms_sql) | **POST** /dynamic-secret-update-mssql |
237
238
  *Akeyless::V2Api* | [**dynamic_secret_update_my_sql**](docs/V2Api.md#dynamic_secret_update_my_sql) | **POST** /dynamic-secret-update-mysql |
239
+ *Akeyless::V2Api* | [**dynamic_secret_update_open_ai**](docs/V2Api.md#dynamic_secret_update_open_ai) | **POST** /dynamic-secret-update-openai |
238
240
  *Akeyless::V2Api* | [**dynamic_secret_update_oracle_db**](docs/V2Api.md#dynamic_secret_update_oracle_db) | **POST** /dynamic-secret-update-oracle |
239
241
  *Akeyless::V2Api* | [**dynamic_secret_update_ping**](docs/V2Api.md#dynamic_secret_update_ping) | **POST** /dynamic-secret-update-ping |
240
242
  *Akeyless::V2Api* | [**dynamic_secret_update_postgre_sql**](docs/V2Api.md#dynamic_secret_update_postgre_sql) | **POST** /dynamic-secret-update-postgresql |
@@ -257,12 +259,14 @@ Class | Method | HTTP request | Description
257
259
  *Akeyless::V2Api* | [**event_forwarder_create_email**](docs/V2Api.md#event_forwarder_create_email) | **POST** /event-forwarder-create-email |
258
260
  *Akeyless::V2Api* | [**event_forwarder_create_service_now**](docs/V2Api.md#event_forwarder_create_service_now) | **POST** /event-forwarder-create-servicenow |
259
261
  *Akeyless::V2Api* | [**event_forwarder_create_slack**](docs/V2Api.md#event_forwarder_create_slack) | **POST** /event-forwarder-create-slack |
262
+ *Akeyless::V2Api* | [**event_forwarder_create_teams**](docs/V2Api.md#event_forwarder_create_teams) | **POST** /event-forwarder-create-teams |
260
263
  *Akeyless::V2Api* | [**event_forwarder_create_webhook**](docs/V2Api.md#event_forwarder_create_webhook) | **POST** /event-forwarder-create-webhook |
261
264
  *Akeyless::V2Api* | [**event_forwarder_delete**](docs/V2Api.md#event_forwarder_delete) | **POST** /event-forwarder-delete |
262
265
  *Akeyless::V2Api* | [**event_forwarder_get**](docs/V2Api.md#event_forwarder_get) | **POST** /event-forwarder-get |
263
266
  *Akeyless::V2Api* | [**event_forwarder_update_email**](docs/V2Api.md#event_forwarder_update_email) | **POST** /event-forwarder-update-email |
264
267
  *Akeyless::V2Api* | [**event_forwarder_update_service_now**](docs/V2Api.md#event_forwarder_update_service_now) | **POST** /event-forwarder-update-servicenow |
265
268
  *Akeyless::V2Api* | [**event_forwarder_update_slack**](docs/V2Api.md#event_forwarder_update_slack) | **POST** /event-forwarder-update-slack |
269
+ *Akeyless::V2Api* | [**event_forwarder_update_teams**](docs/V2Api.md#event_forwarder_update_teams) | **POST** /event-forwarder-update-teams |
266
270
  *Akeyless::V2Api* | [**event_forwarder_update_webhook**](docs/V2Api.md#event_forwarder_update_webhook) | **POST** /event-forwarder-update-webhook |
267
271
  *Akeyless::V2Api* | [**export_classic_key**](docs/V2Api.md#export_classic_key) | **POST** /export-classic-key |
268
272
  *Akeyless::V2Api* | [**gateway_create_allowed_access**](docs/V2Api.md#gateway_create_allowed_access) | **POST** /gateway-create-allowed-access |
@@ -936,6 +940,7 @@ Class | Method | HTTP request | Description
936
940
  - [Akeyless::DynamicSecretCreateMongoDb](docs/DynamicSecretCreateMongoDb.md)
937
941
  - [Akeyless::DynamicSecretCreateMsSql](docs/DynamicSecretCreateMsSql.md)
938
942
  - [Akeyless::DynamicSecretCreateMySql](docs/DynamicSecretCreateMySql.md)
943
+ - [Akeyless::DynamicSecretCreateOpenAI](docs/DynamicSecretCreateOpenAI.md)
939
944
  - [Akeyless::DynamicSecretCreateOracleDb](docs/DynamicSecretCreateOracleDb.md)
940
945
  - [Akeyless::DynamicSecretCreateOutput](docs/DynamicSecretCreateOutput.md)
941
946
  - [Akeyless::DynamicSecretCreatePing](docs/DynamicSecretCreatePing.md)
@@ -975,6 +980,7 @@ Class | Method | HTTP request | Description
975
980
  - [Akeyless::DynamicSecretUpdateMongoDb](docs/DynamicSecretUpdateMongoDb.md)
976
981
  - [Akeyless::DynamicSecretUpdateMsSql](docs/DynamicSecretUpdateMsSql.md)
977
982
  - [Akeyless::DynamicSecretUpdateMySql](docs/DynamicSecretUpdateMySql.md)
983
+ - [Akeyless::DynamicSecretUpdateOpenAI](docs/DynamicSecretUpdateOpenAI.md)
978
984
  - [Akeyless::DynamicSecretUpdateOracleDb](docs/DynamicSecretUpdateOracleDb.md)
979
985
  - [Akeyless::DynamicSecretUpdateOutput](docs/DynamicSecretUpdateOutput.md)
980
986
  - [Akeyless::DynamicSecretUpdatePing](docs/DynamicSecretUpdatePing.md)
@@ -1013,6 +1019,7 @@ Class | Method | HTTP request | Description
1013
1019
  - [Akeyless::EventForwarderCreateEmail](docs/EventForwarderCreateEmail.md)
1014
1020
  - [Akeyless::EventForwarderCreateServiceNow](docs/EventForwarderCreateServiceNow.md)
1015
1021
  - [Akeyless::EventForwarderCreateSlack](docs/EventForwarderCreateSlack.md)
1022
+ - [Akeyless::EventForwarderCreateTeams](docs/EventForwarderCreateTeams.md)
1016
1023
  - [Akeyless::EventForwarderCreateUpdateOutput](docs/EventForwarderCreateUpdateOutput.md)
1017
1024
  - [Akeyless::EventForwarderCreateWebhook](docs/EventForwarderCreateWebhook.md)
1018
1025
  - [Akeyless::EventForwarderDelete](docs/EventForwarderDelete.md)
@@ -1022,6 +1029,7 @@ Class | Method | HTTP request | Description
1022
1029
  - [Akeyless::EventForwarderUpdateEmail](docs/EventForwarderUpdateEmail.md)
1023
1030
  - [Akeyless::EventForwarderUpdateServiceNow](docs/EventForwarderUpdateServiceNow.md)
1024
1031
  - [Akeyless::EventForwarderUpdateSlack](docs/EventForwarderUpdateSlack.md)
1032
+ - [Akeyless::EventForwarderUpdateTeams](docs/EventForwarderUpdateTeams.md)
1025
1033
  - [Akeyless::EventForwarderUpdateWebhook](docs/EventForwarderUpdateWebhook.md)
1026
1034
  - [Akeyless::ExportClassicKey](docs/ExportClassicKey.md)
1027
1035
  - [Akeyless::ExportClassicKeyOutput](docs/ExportClassicKeyOutput.md)
data/docs/CreateESM.md CHANGED
@@ -7,6 +7,7 @@
7
7
  | **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the External Secrets Manager | [optional] |
10
+ | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
10
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
12
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
12
13
  | **name** | **String** | External Secrets Manager name | |
@@ -24,6 +25,7 @@ instance = Akeyless::CreateESM.new(
24
25
  azure_kv_name: null,
25
26
  delete_protection: null,
26
27
  description: null,
28
+ gcp_project_id: null,
27
29
  json: null,
28
30
  k8s_namespace: null,
29
31
  name: null,
data/docs/CreateUSC.md CHANGED
@@ -7,6 +7,7 @@
7
7
  | **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the Universal Secrets Connector | [optional] |
10
+ | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
10
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
12
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
12
13
  | **name** | **String** | Universal Secrets Connector name | |
@@ -26,6 +27,7 @@ instance = Akeyless::CreateUSC.new(
26
27
  azure_kv_name: null,
27
28
  delete_protection: null,
28
29
  description: null,
30
+ gcp_project_id: null,
29
31
  json: null,
30
32
  k8s_namespace: null,
31
33
  name: null,
@@ -11,6 +11,8 @@
11
11
  | **admin_pwd** | **String** | | [optional] |
12
12
  | **admin_rotation_interval_days** | **Integer** | | [optional] |
13
13
  | **administrative_port** | **String** | | [optional] |
14
+ | **api_key** | **String** | | [optional] |
15
+ | **api_key_id** | **String** | | [optional] |
14
16
  | **artifactory_admin_apikey** | **String** | | [optional] |
15
17
  | **artifactory_admin_username** | **String** | | [optional] |
16
18
  | **artifactory_base_url** | **String** | | [optional] |
@@ -93,6 +95,7 @@
93
95
  | **failure_message** | **String** | | [optional] |
94
96
  | **fixed_user_only** | **String** | | [optional] |
95
97
  | **gcp_key_algo** | **String** | | [optional] |
98
+ | **gcp_project_id** | **String** | | [optional] |
96
99
  | **gcp_role_bindings** | **Hash<String, Array<String>>** | | [optional] |
97
100
  | **gcp_service_account_email** | **String** | GCPServiceAccountEmail overrides the deprecated field from the target | [optional] |
98
101
  | **gcp_service_account_key** | **String** | | [optional] |
@@ -190,9 +193,11 @@
190
193
  | **mssql_revocation_statements** | **String** | | [optional] |
191
194
  | **mysql_creation_statements** | **String** | | [optional] |
192
195
  | **mysql_revocation_statements** | **String** | | [optional] |
196
+ | **openai_url** | **String** | | [optional] |
193
197
  | **oracle_creation_statements** | **String** | | [optional] |
194
198
  | **oracle_revocation_statements** | **String** | | [optional] |
195
199
  | **oracle_wallet_details** | [**WalletDetails**](WalletDetails.md) | | [optional] |
200
+ | **organization_id** | **String** | | [optional] |
196
201
  | **password** | **String** | | [optional] |
197
202
  | **password_length** | **Integer** | | [optional] |
198
203
  | **password_policy** | **String** | | [optional] |
@@ -201,6 +206,7 @@
201
206
  | **postgres_creation_statements** | **String** | | [optional] |
202
207
  | **postgres_revocation_statements** | **String** | | [optional] |
203
208
  | **privileged_user** | **String** | | [optional] |
209
+ | **project_id** | **String** | | [optional] |
204
210
  | **rabbitmq_server_password** | **String** | | [optional] |
205
211
  | **rabbitmq_server_uri** | **String** | | [optional] |
206
212
  | **rabbitmq_server_user** | **String** | | [optional] |
@@ -270,6 +276,8 @@ instance = Akeyless::DSProducerDetails.new(
270
276
  admin_pwd: null,
271
277
  admin_rotation_interval_days: null,
272
278
  administrative_port: null,
279
+ api_key: null,
280
+ api_key_id: null,
273
281
  artifactory_admin_apikey: null,
274
282
  artifactory_admin_username: null,
275
283
  artifactory_base_url: null,
@@ -352,6 +360,7 @@ instance = Akeyless::DSProducerDetails.new(
352
360
  failure_message: null,
353
361
  fixed_user_only: null,
354
362
  gcp_key_algo: null,
363
+ gcp_project_id: null,
355
364
  gcp_role_bindings: null,
356
365
  gcp_service_account_email: null,
357
366
  gcp_service_account_key: null,
@@ -449,9 +458,11 @@ instance = Akeyless::DSProducerDetails.new(
449
458
  mssql_revocation_statements: null,
450
459
  mysql_creation_statements: null,
451
460
  mysql_revocation_statements: null,
461
+ openai_url: null,
452
462
  oracle_creation_statements: null,
453
463
  oracle_revocation_statements: null,
454
464
  oracle_wallet_details: null,
465
+ organization_id: null,
455
466
  password: null,
456
467
  password_length: null,
457
468
  password_policy: null,
@@ -460,6 +471,7 @@ instance = Akeyless::DSProducerDetails.new(
460
471
  postgres_creation_statements: null,
461
472
  postgres_revocation_statements: null,
462
473
  privileged_user: null,
474
+ project_id: null,
463
475
  rabbitmq_server_password: null,
464
476
  rabbitmq_server_uri: null,
465
477
  rabbitmq_server_user: null,
@@ -10,6 +10,7 @@
10
10
  | **gcp_cred_type** | **String** | | [optional] |
11
11
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
12
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
13
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
13
14
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
14
15
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -35,6 +36,7 @@ instance = Akeyless::DynamicSecretCreateGcp.new(
35
36
  gcp_cred_type: null,
36
37
  gcp_key: null,
37
38
  gcp_key_algo: null,
39
+ gcp_project_id: null,
38
40
  gcp_sa_email: null,
39
41
  gcp_token_scopes: null,
40
42
  json: null,
@@ -0,0 +1,40 @@
1
+ # Akeyless::DynamicSecretCreateOpenAI
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
8
+ | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
+ | **description** | **String** | Description of the object | [optional] |
10
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
+ | **name** | **String** | Dynamic secret name | |
12
+ | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
13
+ | **project_id** | **String** | Project ID | [optional] |
14
+ | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
15
+ | **target_name** | **String** | Name of existing target to use in producer creation | [optional] |
16
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
17
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
18
+ | **user_ttl** | **String** | User TTL | [optional][default to '60m'] |
19
+
20
+ ## Example
21
+
22
+ ```ruby
23
+ require 'akeyless'
24
+
25
+ instance = Akeyless::DynamicSecretCreateOpenAI.new(
26
+ custom_username_template: null,
27
+ delete_protection: null,
28
+ description: null,
29
+ json: null,
30
+ name: null,
31
+ producer_encryption_key_name: null,
32
+ project_id: null,
33
+ tags: null,
34
+ target_name: null,
35
+ token: null,
36
+ uid_token: null,
37
+ user_ttl: null
38
+ )
39
+ ```
40
+
@@ -10,6 +10,7 @@
10
10
  | **gcp_cred_type** | **String** | | [optional] |
11
11
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
12
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
13
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
13
14
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
14
15
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -36,6 +37,7 @@ instance = Akeyless::DynamicSecretUpdateGcp.new(
36
37
  gcp_cred_type: null,
37
38
  gcp_key: null,
38
39
  gcp_key_algo: null,
40
+ gcp_project_id: null,
39
41
  gcp_sa_email: null,
40
42
  gcp_token_scopes: null,
41
43
  json: null,
@@ -0,0 +1,42 @@
1
+ # Akeyless::DynamicSecretUpdateOpenAI
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
8
+ | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
+ | **description** | **String** | Description of the object | [optional] |
10
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
+ | **name** | **String** | Dynamic secret name | |
12
+ | **new_name** | **String** | Dynamic secret name | [optional] |
13
+ | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
14
+ | **project_id** | **String** | Project ID | [optional] |
15
+ | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
16
+ | **target_name** | **String** | Name of existing target to use in producer creation | [optional] |
17
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
18
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
+ | **user_ttl** | **String** | User TTL | [optional][default to '60m'] |
20
+
21
+ ## Example
22
+
23
+ ```ruby
24
+ require 'akeyless'
25
+
26
+ instance = Akeyless::DynamicSecretUpdateOpenAI.new(
27
+ custom_username_template: null,
28
+ delete_protection: null,
29
+ description: null,
30
+ json: null,
31
+ name: null,
32
+ new_name: null,
33
+ producer_encryption_key_name: null,
34
+ project_id: null,
35
+ tags: null,
36
+ target_name: null,
37
+ token: null,
38
+ uid_token: null,
39
+ user_ttl: null
40
+ )
41
+ ```
42
+
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **binary_value** | **Boolean** | | [optional] |
8
+ | **encryption_key** | **String** | | [optional] |
8
9
  | **id** | **String** | | [optional] |
9
10
  | **metadata** | **Object** | | [optional] |
10
11
  | **name** | **String** | | [optional] |
@@ -17,6 +18,7 @@ require 'akeyless'
17
18
 
18
19
  instance = Akeyless::EsmGetSecretOutput.new(
19
20
  binary_value: null,
21
+ encryption_key: null,
20
22
  id: null,
21
23
  metadata: null,
22
24
  name: null,
@@ -0,0 +1,44 @@
1
+ # Akeyless::EventForwarderCreateTeams
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **auth_methods_event_source_locations** | **Array<String>** | Auth Method Event sources | [optional] |
8
+ | **description** | **String** | Description of the object | [optional] |
9
+ | **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report, secret-sync] | [optional] |
10
+ | **every** | **String** | Rate of periodic runner repetition in hours | [optional] |
11
+ | **gateways_event_source_locations** | **Array<String>** | Event sources | |
12
+ | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] |
13
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
+ | **key** | **String** | The name of a key that used to encrypt the EventForwarder secret value (if empty, the account default protectionKey key will be used) | [optional] |
15
+ | **name** | **String** | EventForwarder name | |
16
+ | **runner_type** | **String** | | |
17
+ | **targets_event_source_locations** | **Array<String>** | Targets Event sources | [optional] |
18
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
19
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
20
+ | **url** | **String** | Teams Webhook URL | |
21
+
22
+ ## Example
23
+
24
+ ```ruby
25
+ require 'akeyless'
26
+
27
+ instance = Akeyless::EventForwarderCreateTeams.new(
28
+ auth_methods_event_source_locations: null,
29
+ description: null,
30
+ event_types: null,
31
+ every: null,
32
+ gateways_event_source_locations: null,
33
+ items_event_source_locations: null,
34
+ json: null,
35
+ key: null,
36
+ name: null,
37
+ runner_type: null,
38
+ targets_event_source_locations: null,
39
+ token: null,
40
+ uid_token: null,
41
+ url: null
42
+ )
43
+ ```
44
+
@@ -0,0 +1,46 @@
1
+ # Akeyless::EventForwarderUpdateTeams
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **auth_methods_event_source_locations** | **Array<String>** | Auth Method Event sources | [optional] |
8
+ | **description** | **String** | Description of the object | [optional] |
9
+ | **enable** | **String** | Enable/Disable Event Forwarder [true/false] | [optional][default to 'true'] |
10
+ | **event_types** | **Array<String>** | List of event types to notify about [request-access, certificate-pending-expiration, certificate-expired, certificate-provisioning-success, certificate-provisioning-failure, auth-method-pending-expiration, auth-method-expired, next-automatic-rotation, rotated-secret-success, rotated-secret-failure, dynamic-secret-failure, multi-auth-failure, uid-rotation-failure, apply-justification, email-auth-method-approved, usage, rotation-usage, gateway-inactive, static-secret-updated, rate-limiting, usage-report, secret-sync] | [optional] |
11
+ | **gateways_event_source_locations** | **Array<String>** | Event sources | |
12
+ | **items_event_source_locations** | **Array<String>** | Items Event sources | [optional] |
13
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
+ | **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
15
+ | **key** | **String** | The name of a key that used to encrypt the EventForwarder secret value (if empty, the account default protectionKey key will be used) | [optional] |
16
+ | **name** | **String** | EventForwarder name | |
17
+ | **new_name** | **String** | New EventForwarder name | [optional] |
18
+ | **targets_event_source_locations** | **Array<String>** | Targets Event sources | [optional] |
19
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
20
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
21
+ | **url** | **String** | Teams Webhook URL | |
22
+
23
+ ## Example
24
+
25
+ ```ruby
26
+ require 'akeyless'
27
+
28
+ instance = Akeyless::EventForwarderUpdateTeams.new(
29
+ auth_methods_event_source_locations: null,
30
+ description: null,
31
+ enable: null,
32
+ event_types: null,
33
+ gateways_event_source_locations: null,
34
+ items_event_source_locations: null,
35
+ json: null,
36
+ keep_prev_version: null,
37
+ key: null,
38
+ name: null,
39
+ new_name: null,
40
+ targets_event_source_locations: null,
41
+ token: null,
42
+ uid_token: null,
43
+ url: null
44
+ )
45
+ ```
46
+
@@ -4,11 +4,6 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **_1password_email** | **String** | 1Password user email to connect to the API | [optional] |
8
- | **_1password_password** | **String** | 1Password user password to connect to the API | [optional] |
9
- | **_1password_secret_key** | **String** | 1Password user secret key to connect to the API | [optional] |
10
- | **_1password_url** | **String** | 1Password api container url | [optional] |
11
- | **_1password_vaults** | **Array<String>** | 1Password list of vault to get the items from | [optional] |
12
7
  | **service_account_key_decoded** | **String** | | [optional] |
13
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
14
9
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
@@ -66,7 +61,7 @@
66
61
  | **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
67
62
  | **target_location** | **String** | Target location in Akeyless for imported secrets | |
68
63
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
69
- | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/1password/active_directory) | [optional] |
64
+ | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional] |
70
65
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
71
66
 
72
67
  ## Example
@@ -75,11 +70,6 @@
75
70
  require 'akeyless'
76
71
 
77
72
  instance = Akeyless::GatewayCreateMigration.new(
78
- _1password_email: null,
79
- _1password_password: null,
80
- _1password_secret_key: null,
81
- _1password_url: null,
82
- _1password_vaults: null,
83
73
  service_account_key_decoded: null,
84
74
  ad_auto_rotate: null,
85
75
  ad_computer_base_dn: null,
@@ -9,6 +9,7 @@
9
9
  | **gcp_cred_type** | **String** | | [optional] |
10
10
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
11
11
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
12
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
12
13
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
13
14
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
14
15
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -33,6 +34,7 @@ instance = Akeyless::GatewayCreateProducerGcp.new(
33
34
  gcp_cred_type: null,
34
35
  gcp_key: null,
35
36
  gcp_key_algo: null,
37
+ gcp_project_id: null,
36
38
  gcp_sa_email: null,
37
39
  gcp_token_scopes: null,
38
40
  json: null,
@@ -4,11 +4,6 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **_1password_email** | **String** | 1Password user email to connect to the API | [optional] |
8
- | **_1password_password** | **String** | 1Password user password to connect to the API | [optional] |
9
- | **_1password_secret_key** | **String** | 1Password user secret key to connect to the API | [optional] |
10
- | **_1password_url** | **String** | 1Password api container url | [optional] |
11
- | **_1password_vaults** | **Array<String>** | 1Password list of vault to get the items from | [optional] |
12
7
  | **service_account_key_decoded** | **String** | | [optional] |
13
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
14
9
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
@@ -76,11 +71,6 @@
76
71
  require 'akeyless'
77
72
 
78
73
  instance = Akeyless::GatewayUpdateMigration.new(
79
- _1password_email: null,
80
- _1password_password: null,
81
- _1password_secret_key: null,
82
- _1password_url: null,
83
- _1password_vaults: null,
84
74
  service_account_key_decoded: null,
85
75
  ad_auto_rotate: null,
86
76
  ad_computer_base_dn: null,
@@ -9,6 +9,7 @@
9
9
  | **gcp_cred_type** | **String** | | [optional] |
10
10
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
11
11
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
12
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
12
13
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
13
14
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
14
15
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -34,6 +35,7 @@ instance = Akeyless::GatewayUpdateProducerGcp.new(
34
35
  gcp_cred_type: null,
35
36
  gcp_key: null,
36
37
  gcp_key_algo: null,
38
+ gcp_project_id: null,
37
39
  gcp_sa_email: null,
38
40
  gcp_token_scopes: null,
39
41
  json: null,
@@ -25,6 +25,7 @@
25
25
  | **protection_key** | **String** | | [optional] |
26
26
  | **runner_type** | **String** | | [optional] |
27
27
  | **slack_noti_forwarder_public_details** | **Object** | | [optional] |
28
+ | **teams_noti_forwarder_public_details** | **Object** | | [optional] |
28
29
  | **timespan_in_seconds** | **Integer** | | [optional] |
29
30
  | **to_emails** | [**Array<EmailEntry>**](EmailEntry.md) | | [optional] |
30
31
  | **user_email** | **String** | | [optional] |
@@ -59,6 +60,7 @@ instance = Akeyless::NotiForwarder.new(
59
60
  protection_key: null,
60
61
  runner_type: null,
61
62
  slack_noti_forwarder_public_details: null,
63
+ teams_noti_forwarder_public_details: null,
62
64
  timespan_in_seconds: null,
63
65
  to_emails: null,
64
66
  user_email: null,
@@ -6,9 +6,9 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **api_key** | **String** | | [optional] |
8
8
  | **api_key_id** | **String** | | [optional] |
9
- | **model** | **String** | | [optional] |
10
9
  | **openai_url** | **String** | | [optional] |
11
10
  | **organization_id** | **String** | | [optional] |
11
+ | **project_id** | **String** | | [optional] |
12
12
 
13
13
  ## Example
14
14
 
@@ -18,9 +18,9 @@ require 'akeyless'
18
18
  instance = Akeyless::OpenAITargetDetails.new(
19
19
  api_key: null,
20
20
  api_key_id: null,
21
- model: null,
22
21
  openai_url: null,
23
- organization_id: null
22
+ organization_id: null,
23
+ project_id: null
24
24
  )
25
25
  ```
26
26
 
data/docs/SecretInfo.md CHANGED
@@ -7,6 +7,7 @@
7
7
  | **created** | **Time** | | [optional] |
8
8
  | **description** | **String** | | [optional] |
9
9
  | **expiration** | **Time** | | [optional] |
10
+ | **key_id** | **String** | | [optional] |
10
11
  | **last_retrieved** | **Time** | | [optional] |
11
12
  | **location** | **Object** | | [optional] |
12
13
  | **name** | **String** | | [optional] |
@@ -26,6 +27,7 @@ instance = Akeyless::SecretInfo.new(
26
27
  created: null,
27
28
  description: null,
28
29
  expiration: null,
30
+ key_id: null,
29
31
  last_retrieved: null,
30
32
  location: null,
31
33
  name: null,
data/docs/UscCreate.md CHANGED
@@ -14,6 +14,7 @@
14
14
  | **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
15
15
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
16
16
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
17
+ | **usc_encryption_key** | **String** | Optional, The name of the remote key that used to encrypt the secret value (if empty, the default key will be used) | [optional] |
17
18
  | **usc_name** | **String** | Name of the Universal Secrets Connector item | |
18
19
  | **value** | **String** | Value of the universal secrets item, either text or base64 encoded binary | |
19
20
 
@@ -33,6 +34,7 @@ instance = Akeyless::UscCreate.new(
33
34
  tags: null,
34
35
  token: null,
35
36
  uid_token: null,
37
+ usc_encryption_key: null,
36
38
  usc_name: null,
37
39
  value: null
38
40
  )
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **binary_value** | **Boolean** | | [optional] |
8
+ | **encryption_key** | **String** | | [optional] |
8
9
  | **id** | **String** | | [optional] |
9
10
  | **metadata** | **Object** | | [optional] |
10
11
  | **name** | **String** | | [optional] |
@@ -17,6 +18,7 @@ require 'akeyless'
17
18
 
18
19
  instance = Akeyless::UscGetSecretOutput.new(
19
20
  binary_value: null,
21
+ encryption_key: null,
20
22
  id: null,
21
23
  metadata: null,
22
24
  name: null,
data/docs/UscUpdate.md CHANGED
@@ -13,6 +13,7 @@
13
13
  | **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
14
14
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
15
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
+ | **usc_encryption_key** | **String** | Optional, The name of the remote key that used to encrypt the secret value (if empty, the default key will be used) | [optional] |
16
17
  | **usc_name** | **String** | Name of the Universal Secrets Connector item | |
17
18
  | **value** | **String** | Value of the universal secrets item, either text or base64 encoded binary | |
18
19
 
@@ -31,6 +32,7 @@ instance = Akeyless::UscUpdate.new(
31
32
  tags: null,
32
33
  token: null,
33
34
  uid_token: null,
35
+ usc_encryption_key: null,
34
36
  usc_name: null,
35
37
  value: null
36
38
  )