akeyless 5.0.9 → 5.0.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/docs/CreateESM.md +2 -0
- data/docs/CreateUSC.md +2 -0
- data/docs/DSProducerDetails.md +2 -0
- data/docs/DynamicSecretCreateGcp.md +2 -0
- data/docs/DynamicSecretUpdateGcp.md +2 -0
- data/docs/GatewayCreateMigration.md +1 -11
- data/docs/GatewayCreateProducerGcp.md +2 -0
- data/docs/GatewayUpdateMigration.md +0 -10
- data/docs/GatewayUpdateProducerGcp.md +2 -0
- data/lib/akeyless/models/create_esm.rb +11 -1
- data/lib/akeyless/models/create_usc.rb +11 -1
- data/lib/akeyless/models/ds_producer_details.rb +10 -1
- data/lib/akeyless/models/dynamic_secret_create_gcp.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_gcp.rb +11 -1
- data/lib/akeyless/models/gateway_create_migration.rb +2 -54
- data/lib/akeyless/models/gateway_create_producer_gcp.rb +11 -1
- data/lib/akeyless/models/gateway_update_migration.rb +1 -53
- data/lib/akeyless/models/gateway_update_producer_gcp.rb +11 -1
- data/lib/akeyless/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: 65719185b3c85144620d597d4e844f4382b4d2305eec264dbc2d0eaa2224e4aa
|
|
4
|
+
data.tar.gz: dfd9353152170ef02541b5184f0411505d2b44cbbfea61fc94630332426ace27
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: c5c2ca0eddee37551ccc4d8e75aa301d6c68c220994af84a4eaec52d8a003d894f2905c3ddcb139f904f7eabc2567ea964725bb37131a9cc5dcd129ae17dcbc1
|
|
7
|
+
data.tar.gz: ac8586b91d217adb48022cbf682be51564fb9fe36f3e5158c752e62405ab84c21c286559fda2afbeaa8eb376256da607cf5bfb2e645c12228f4e274b01449b1e
|
data/README.md
CHANGED
|
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
|
8
8
|
|
|
9
9
|
- API version: 3.0
|
|
10
|
-
- Package version: 5.0.
|
|
10
|
+
- Package version: 5.0.10
|
|
11
11
|
- Generator version: 7.10.0
|
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
data/docs/CreateESM.md
CHANGED
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
|
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
9
|
| **description** | **String** | Description of the External Secrets Manager | [optional] |
|
|
10
|
+
| **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
|
|
10
11
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
11
12
|
| **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
|
|
12
13
|
| **name** | **String** | External Secrets Manager name | |
|
|
@@ -24,6 +25,7 @@ instance = Akeyless::CreateESM.new(
|
|
|
24
25
|
azure_kv_name: null,
|
|
25
26
|
delete_protection: null,
|
|
26
27
|
description: null,
|
|
28
|
+
gcp_project_id: null,
|
|
27
29
|
json: null,
|
|
28
30
|
k8s_namespace: null,
|
|
29
31
|
name: null,
|
data/docs/CreateUSC.md
CHANGED
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
|
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
9
|
| **description** | **String** | Description of the Universal Secrets Connector | [optional] |
|
|
10
|
+
| **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
|
|
10
11
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
11
12
|
| **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
|
|
12
13
|
| **name** | **String** | Universal Secrets Connector name | |
|
|
@@ -26,6 +27,7 @@ instance = Akeyless::CreateUSC.new(
|
|
|
26
27
|
azure_kv_name: null,
|
|
27
28
|
delete_protection: null,
|
|
28
29
|
description: null,
|
|
30
|
+
gcp_project_id: null,
|
|
29
31
|
json: null,
|
|
30
32
|
k8s_namespace: null,
|
|
31
33
|
name: null,
|
data/docs/DSProducerDetails.md
CHANGED
|
@@ -95,6 +95,7 @@
|
|
|
95
95
|
| **failure_message** | **String** | | [optional] |
|
|
96
96
|
| **fixed_user_only** | **String** | | [optional] |
|
|
97
97
|
| **gcp_key_algo** | **String** | | [optional] |
|
|
98
|
+
| **gcp_project_id** | **String** | | [optional] |
|
|
98
99
|
| **gcp_role_bindings** | **Hash<String, Array<String>>** | | [optional] |
|
|
99
100
|
| **gcp_service_account_email** | **String** | GCPServiceAccountEmail overrides the deprecated field from the target | [optional] |
|
|
100
101
|
| **gcp_service_account_key** | **String** | | [optional] |
|
|
@@ -359,6 +360,7 @@ instance = Akeyless::DSProducerDetails.new(
|
|
|
359
360
|
failure_message: null,
|
|
360
361
|
fixed_user_only: null,
|
|
361
362
|
gcp_key_algo: null,
|
|
363
|
+
gcp_project_id: null,
|
|
362
364
|
gcp_role_bindings: null,
|
|
363
365
|
gcp_service_account_email: null,
|
|
364
366
|
gcp_service_account_key: null,
|
|
@@ -10,6 +10,7 @@
|
|
|
10
10
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
11
11
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
12
12
|
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
13
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
|
|
13
14
|
| **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
|
|
14
15
|
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
15
16
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -35,6 +36,7 @@ instance = Akeyless::DynamicSecretCreateGcp.new(
|
|
|
35
36
|
gcp_cred_type: null,
|
|
36
37
|
gcp_key: null,
|
|
37
38
|
gcp_key_algo: null,
|
|
39
|
+
gcp_project_id: null,
|
|
38
40
|
gcp_sa_email: null,
|
|
39
41
|
gcp_token_scopes: null,
|
|
40
42
|
json: null,
|
|
@@ -10,6 +10,7 @@
|
|
|
10
10
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
11
11
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
12
12
|
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
13
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
|
|
13
14
|
| **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
|
|
14
15
|
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
15
16
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -36,6 +37,7 @@ instance = Akeyless::DynamicSecretUpdateGcp.new(
|
|
|
36
37
|
gcp_cred_type: null,
|
|
37
38
|
gcp_key: null,
|
|
38
39
|
gcp_key_algo: null,
|
|
40
|
+
gcp_project_id: null,
|
|
39
41
|
gcp_sa_email: null,
|
|
40
42
|
gcp_token_scopes: null,
|
|
41
43
|
json: null,
|
|
@@ -4,11 +4,6 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
-
| **_1password_email** | **String** | 1Password user email to connect to the API | [optional] |
|
|
8
|
-
| **_1password_password** | **String** | 1Password user password to connect to the API | [optional] |
|
|
9
|
-
| **_1password_secret_key** | **String** | 1Password user secret key to connect to the API | [optional] |
|
|
10
|
-
| **_1password_url** | **String** | 1Password api container url | [optional] |
|
|
11
|
-
| **_1password_vaults** | **Array<String>** | 1Password list of vault to get the items from | [optional] |
|
|
12
7
|
| **service_account_key_decoded** | **String** | | [optional] |
|
|
13
8
|
| **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
|
|
14
9
|
| **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
|
|
@@ -66,7 +61,7 @@
|
|
|
66
61
|
| **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
|
|
67
62
|
| **target_location** | **String** | Target location in Akeyless for imported secrets | |
|
|
68
63
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
69
|
-
| **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/
|
|
64
|
+
| **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional] |
|
|
70
65
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
71
66
|
|
|
72
67
|
## Example
|
|
@@ -75,11 +70,6 @@
|
|
|
75
70
|
require 'akeyless'
|
|
76
71
|
|
|
77
72
|
instance = Akeyless::GatewayCreateMigration.new(
|
|
78
|
-
_1password_email: null,
|
|
79
|
-
_1password_password: null,
|
|
80
|
-
_1password_secret_key: null,
|
|
81
|
-
_1password_url: null,
|
|
82
|
-
_1password_vaults: null,
|
|
83
73
|
service_account_key_decoded: null,
|
|
84
74
|
ad_auto_rotate: null,
|
|
85
75
|
ad_computer_base_dn: null,
|
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
10
10
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
11
11
|
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
12
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
|
|
12
13
|
| **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
|
|
13
14
|
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
14
15
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -33,6 +34,7 @@ instance = Akeyless::GatewayCreateProducerGcp.new(
|
|
|
33
34
|
gcp_cred_type: null,
|
|
34
35
|
gcp_key: null,
|
|
35
36
|
gcp_key_algo: null,
|
|
37
|
+
gcp_project_id: null,
|
|
36
38
|
gcp_sa_email: null,
|
|
37
39
|
gcp_token_scopes: null,
|
|
38
40
|
json: null,
|
|
@@ -4,11 +4,6 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
-
| **_1password_email** | **String** | 1Password user email to connect to the API | [optional] |
|
|
8
|
-
| **_1password_password** | **String** | 1Password user password to connect to the API | [optional] |
|
|
9
|
-
| **_1password_secret_key** | **String** | 1Password user secret key to connect to the API | [optional] |
|
|
10
|
-
| **_1password_url** | **String** | 1Password api container url | [optional] |
|
|
11
|
-
| **_1password_vaults** | **Array<String>** | 1Password list of vault to get the items from | [optional] |
|
|
12
7
|
| **service_account_key_decoded** | **String** | | [optional] |
|
|
13
8
|
| **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
|
|
14
9
|
| **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
|
|
@@ -76,11 +71,6 @@
|
|
|
76
71
|
require 'akeyless'
|
|
77
72
|
|
|
78
73
|
instance = Akeyless::GatewayUpdateMigration.new(
|
|
79
|
-
_1password_email: null,
|
|
80
|
-
_1password_password: null,
|
|
81
|
-
_1password_secret_key: null,
|
|
82
|
-
_1password_url: null,
|
|
83
|
-
_1password_vaults: null,
|
|
84
74
|
service_account_key_decoded: null,
|
|
85
75
|
ad_auto_rotate: null,
|
|
86
76
|
ad_computer_base_dn: null,
|
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
10
10
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
11
11
|
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
12
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
|
|
12
13
|
| **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
|
|
13
14
|
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
14
15
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -34,6 +35,7 @@ instance = Akeyless::GatewayUpdateProducerGcp.new(
|
|
|
34
35
|
gcp_cred_type: null,
|
|
35
36
|
gcp_key: null,
|
|
36
37
|
gcp_key_algo: null,
|
|
38
|
+
gcp_project_id: null,
|
|
37
39
|
gcp_sa_email: null,
|
|
38
40
|
gcp_token_scopes: null,
|
|
39
41
|
json: null,
|
|
@@ -25,6 +25,9 @@ module Akeyless
|
|
|
25
25
|
# Description of the External Secrets Manager
|
|
26
26
|
attr_accessor :description
|
|
27
27
|
|
|
28
|
+
# GCP Project ID (Relevant only for GCP targets)
|
|
29
|
+
attr_accessor :gcp_project_id
|
|
30
|
+
|
|
28
31
|
# Set output format to JSON
|
|
29
32
|
attr_accessor :json
|
|
30
33
|
|
|
@@ -52,6 +55,7 @@ module Akeyless
|
|
|
52
55
|
:'azure_kv_name' => :'azure-kv-name',
|
|
53
56
|
:'delete_protection' => :'delete_protection',
|
|
54
57
|
:'description' => :'description',
|
|
58
|
+
:'gcp_project_id' => :'gcp-project-id',
|
|
55
59
|
:'json' => :'json',
|
|
56
60
|
:'k8s_namespace' => :'k8s-namespace',
|
|
57
61
|
:'name' => :'name',
|
|
@@ -73,6 +77,7 @@ module Akeyless
|
|
|
73
77
|
:'azure_kv_name' => :'String',
|
|
74
78
|
:'delete_protection' => :'String',
|
|
75
79
|
:'description' => :'String',
|
|
80
|
+
:'gcp_project_id' => :'String',
|
|
76
81
|
:'json' => :'Boolean',
|
|
77
82
|
:'k8s_namespace' => :'String',
|
|
78
83
|
:'name' => :'String',
|
|
@@ -116,6 +121,10 @@ module Akeyless
|
|
|
116
121
|
self.description = attributes[:'description']
|
|
117
122
|
end
|
|
118
123
|
|
|
124
|
+
if attributes.key?(:'gcp_project_id')
|
|
125
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
126
|
+
end
|
|
127
|
+
|
|
119
128
|
if attributes.key?(:'json')
|
|
120
129
|
self.json = attributes[:'json']
|
|
121
130
|
else
|
|
@@ -186,6 +195,7 @@ module Akeyless
|
|
|
186
195
|
azure_kv_name == o.azure_kv_name &&
|
|
187
196
|
delete_protection == o.delete_protection &&
|
|
188
197
|
description == o.description &&
|
|
198
|
+
gcp_project_id == o.gcp_project_id &&
|
|
189
199
|
json == o.json &&
|
|
190
200
|
k8s_namespace == o.k8s_namespace &&
|
|
191
201
|
name == o.name &&
|
|
@@ -204,7 +214,7 @@ module Akeyless
|
|
|
204
214
|
# Calculates hash code according to all attributes.
|
|
205
215
|
# @return [Integer] Hash code
|
|
206
216
|
def hash
|
|
207
|
-
[azure_kv_name, delete_protection, description, json, k8s_namespace, name, tags, target_to_associate, token, uid_token].hash
|
|
217
|
+
[azure_kv_name, delete_protection, description, gcp_project_id, json, k8s_namespace, name, tags, target_to_associate, token, uid_token].hash
|
|
208
218
|
end
|
|
209
219
|
|
|
210
220
|
# Builds the object from hash
|
|
@@ -25,6 +25,9 @@ module Akeyless
|
|
|
25
25
|
# Description of the Universal Secrets Connector
|
|
26
26
|
attr_accessor :description
|
|
27
27
|
|
|
28
|
+
# GCP Project ID (Relevant only for GCP targets)
|
|
29
|
+
attr_accessor :gcp_project_id
|
|
30
|
+
|
|
28
31
|
# Set output format to JSON
|
|
29
32
|
attr_accessor :json
|
|
30
33
|
|
|
@@ -58,6 +61,7 @@ module Akeyless
|
|
|
58
61
|
:'azure_kv_name' => :'azure-kv-name',
|
|
59
62
|
:'delete_protection' => :'delete_protection',
|
|
60
63
|
:'description' => :'description',
|
|
64
|
+
:'gcp_project_id' => :'gcp-project-id',
|
|
61
65
|
:'json' => :'json',
|
|
62
66
|
:'k8s_namespace' => :'k8s-namespace',
|
|
63
67
|
:'name' => :'name',
|
|
@@ -81,6 +85,7 @@ module Akeyless
|
|
|
81
85
|
:'azure_kv_name' => :'String',
|
|
82
86
|
:'delete_protection' => :'String',
|
|
83
87
|
:'description' => :'String',
|
|
88
|
+
:'gcp_project_id' => :'String',
|
|
84
89
|
:'json' => :'Boolean',
|
|
85
90
|
:'k8s_namespace' => :'String',
|
|
86
91
|
:'name' => :'String',
|
|
@@ -126,6 +131,10 @@ module Akeyless
|
|
|
126
131
|
self.description = attributes[:'description']
|
|
127
132
|
end
|
|
128
133
|
|
|
134
|
+
if attributes.key?(:'gcp_project_id')
|
|
135
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
136
|
+
end
|
|
137
|
+
|
|
129
138
|
if attributes.key?(:'json')
|
|
130
139
|
self.json = attributes[:'json']
|
|
131
140
|
else
|
|
@@ -206,6 +215,7 @@ module Akeyless
|
|
|
206
215
|
azure_kv_name == o.azure_kv_name &&
|
|
207
216
|
delete_protection == o.delete_protection &&
|
|
208
217
|
description == o.description &&
|
|
218
|
+
gcp_project_id == o.gcp_project_id &&
|
|
209
219
|
json == o.json &&
|
|
210
220
|
k8s_namespace == o.k8s_namespace &&
|
|
211
221
|
name == o.name &&
|
|
@@ -226,7 +236,7 @@ module Akeyless
|
|
|
226
236
|
# Calculates hash code according to all attributes.
|
|
227
237
|
# @return [Integer] Hash code
|
|
228
238
|
def hash
|
|
229
|
-
[azure_kv_name, delete_protection, description, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
|
|
239
|
+
[azure_kv_name, delete_protection, description, gcp_project_id, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
|
|
230
240
|
end
|
|
231
241
|
|
|
232
242
|
# Builds the object from hash
|
|
@@ -201,6 +201,8 @@ module Akeyless
|
|
|
201
201
|
|
|
202
202
|
attr_accessor :gcp_key_algo
|
|
203
203
|
|
|
204
|
+
attr_accessor :gcp_project_id
|
|
205
|
+
|
|
204
206
|
attr_accessor :gcp_role_bindings
|
|
205
207
|
|
|
206
208
|
# GCPServiceAccountEmail overrides the deprecated field from the target
|
|
@@ -644,6 +646,7 @@ module Akeyless
|
|
|
644
646
|
:'failure_message' => :'failure_message',
|
|
645
647
|
:'fixed_user_only' => :'fixed_user_only',
|
|
646
648
|
:'gcp_key_algo' => :'gcp_key_algo',
|
|
649
|
+
:'gcp_project_id' => :'gcp_project_id',
|
|
647
650
|
:'gcp_role_bindings' => :'gcp_role_bindings',
|
|
648
651
|
:'gcp_service_account_email' => :'gcp_service_account_email',
|
|
649
652
|
:'gcp_service_account_key' => :'gcp_service_account_key',
|
|
@@ -912,6 +915,7 @@ module Akeyless
|
|
|
912
915
|
:'failure_message' => :'String',
|
|
913
916
|
:'fixed_user_only' => :'String',
|
|
914
917
|
:'gcp_key_algo' => :'String',
|
|
918
|
+
:'gcp_project_id' => :'String',
|
|
915
919
|
:'gcp_role_bindings' => :'Hash<String, Array<String>>',
|
|
916
920
|
:'gcp_service_account_email' => :'String',
|
|
917
921
|
:'gcp_service_account_key' => :'String',
|
|
@@ -1468,6 +1472,10 @@ module Akeyless
|
|
|
1468
1472
|
self.gcp_key_algo = attributes[:'gcp_key_algo']
|
|
1469
1473
|
end
|
|
1470
1474
|
|
|
1475
|
+
if attributes.key?(:'gcp_project_id')
|
|
1476
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
1477
|
+
end
|
|
1478
|
+
|
|
1471
1479
|
if attributes.key?(:'gcp_role_bindings')
|
|
1472
1480
|
if (value = attributes[:'gcp_role_bindings']).is_a?(Hash)
|
|
1473
1481
|
self.gcp_role_bindings = value
|
|
@@ -2270,6 +2278,7 @@ module Akeyless
|
|
|
2270
2278
|
failure_message == o.failure_message &&
|
|
2271
2279
|
fixed_user_only == o.fixed_user_only &&
|
|
2272
2280
|
gcp_key_algo == o.gcp_key_algo &&
|
|
2281
|
+
gcp_project_id == o.gcp_project_id &&
|
|
2273
2282
|
gcp_role_bindings == o.gcp_role_bindings &&
|
|
2274
2283
|
gcp_service_account_email == o.gcp_service_account_email &&
|
|
2275
2284
|
gcp_service_account_key == o.gcp_service_account_key &&
|
|
@@ -2447,7 +2456,7 @@ module Akeyless
|
|
|
2447
2456
|
# Calculates hash code according to all attributes.
|
|
2448
2457
|
# @return [Integer] Hash code
|
|
2449
2458
|
def hash
|
|
2450
|
-
[access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, api_key, api_key_id, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_external_id, aws_region, aws_role_arns, aws_secret_access_key, aws_session_tags, aws_session_token, aws_transitive_tag_keys, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_administrative_unit, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, azure_username, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, cloud_service_provider, cluster_mode, connection_type, create_sync_url, db_client_id, db_client_secret, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_tenant_id, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, expiration_date, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_key_id, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_organization_name, github_repository_path, gitlab_access_token, gitlab_access_type, gitlab_certificate, gitlab_group_name, gitlab_project_name, gitlab_role, gitlab_token_scope, gitlab_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, google_workspace_access_mode, google_workspace_admin_name, google_workspace_fixed_user_name_sub_claim_key, google_workspace_group_name, google_workspace_group_role, google_workspace_role_name, google_workspace_role_scope, grace_rotated_secret_key, grant_types, groups, gw_cloud_identity_external_id_opt, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_auth_type, k8s_bearer_token, k8s_client_cert_data, k8s_client_key_data, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_cluster_name, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_fixed_user_name_sub_claim_key, ldap_fixed_user_type, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, openai_url, oracle_creation_statements, oracle_revocation_statements, oracle_wallet_details, organization_id, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, project_id, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, rdp_fixed_user_name_sub_claim_key, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_auth_mode, sf_key_algo, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, username_template, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
|
|
2459
|
+
[access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, api_key, api_key_id, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_external_id, aws_region, aws_role_arns, aws_secret_access_key, aws_session_tags, aws_session_token, aws_transitive_tag_keys, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_administrative_unit, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, azure_username, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, cloud_service_provider, cluster_mode, connection_type, create_sync_url, db_client_id, db_client_secret, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_tenant_id, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, expiration_date, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_project_id, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_key_id, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_organization_name, github_repository_path, gitlab_access_token, gitlab_access_type, gitlab_certificate, gitlab_group_name, gitlab_project_name, gitlab_role, gitlab_token_scope, gitlab_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, google_workspace_access_mode, google_workspace_admin_name, google_workspace_fixed_user_name_sub_claim_key, google_workspace_group_name, google_workspace_group_role, google_workspace_role_name, google_workspace_role_scope, grace_rotated_secret_key, grant_types, groups, gw_cloud_identity_external_id_opt, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_auth_type, k8s_bearer_token, k8s_client_cert_data, k8s_client_key_data, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_cluster_name, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_fixed_user_name_sub_claim_key, ldap_fixed_user_type, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, openai_url, oracle_creation_statements, oracle_revocation_statements, oracle_wallet_details, organization_id, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, project_id, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, rdp_fixed_user_name_sub_claim_key, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_auth_mode, sf_key_algo, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, username_template, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
|
|
2451
2460
|
end
|
|
2452
2461
|
|
|
2453
2462
|
# Builds the object from hash
|
|
@@ -33,6 +33,9 @@ module Akeyless
|
|
|
33
33
|
# Service account key algorithm, e.g. KEY_ALG_RSA_1024
|
|
34
34
|
attr_accessor :gcp_key_algo
|
|
35
35
|
|
|
36
|
+
# GCP Project ID override for dynamic secret operations (tmp service accounts)
|
|
37
|
+
attr_accessor :gcp_project_id
|
|
38
|
+
|
|
36
39
|
# The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
|
|
37
40
|
attr_accessor :gcp_sa_email
|
|
38
41
|
|
|
@@ -78,6 +81,7 @@ module Akeyless
|
|
|
78
81
|
:'gcp_cred_type' => :'gcp-cred-type',
|
|
79
82
|
:'gcp_key' => :'gcp-key',
|
|
80
83
|
:'gcp_key_algo' => :'gcp-key-algo',
|
|
84
|
+
:'gcp_project_id' => :'gcp-project-id',
|
|
81
85
|
:'gcp_sa_email' => :'gcp-sa-email',
|
|
82
86
|
:'gcp_token_scopes' => :'gcp-token-scopes',
|
|
83
87
|
:'json' => :'json',
|
|
@@ -107,6 +111,7 @@ module Akeyless
|
|
|
107
111
|
:'gcp_cred_type' => :'String',
|
|
108
112
|
:'gcp_key' => :'String',
|
|
109
113
|
:'gcp_key_algo' => :'String',
|
|
114
|
+
:'gcp_project_id' => :'String',
|
|
110
115
|
:'gcp_sa_email' => :'String',
|
|
111
116
|
:'gcp_token_scopes' => :'String',
|
|
112
117
|
:'json' => :'Boolean',
|
|
@@ -167,6 +172,10 @@ module Akeyless
|
|
|
167
172
|
self.gcp_key_algo = attributes[:'gcp_key_algo']
|
|
168
173
|
end
|
|
169
174
|
|
|
175
|
+
if attributes.key?(:'gcp_project_id')
|
|
176
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
177
|
+
end
|
|
178
|
+
|
|
170
179
|
if attributes.key?(:'gcp_sa_email')
|
|
171
180
|
self.gcp_sa_email = attributes[:'gcp_sa_email']
|
|
172
181
|
end
|
|
@@ -262,6 +271,7 @@ module Akeyless
|
|
|
262
271
|
gcp_cred_type == o.gcp_cred_type &&
|
|
263
272
|
gcp_key == o.gcp_key &&
|
|
264
273
|
gcp_key_algo == o.gcp_key_algo &&
|
|
274
|
+
gcp_project_id == o.gcp_project_id &&
|
|
265
275
|
gcp_sa_email == o.gcp_sa_email &&
|
|
266
276
|
gcp_token_scopes == o.gcp_token_scopes &&
|
|
267
277
|
json == o.json &&
|
|
@@ -285,7 +295,7 @@ module Akeyless
|
|
|
285
295
|
# Calculates hash code according to all attributes.
|
|
286
296
|
# @return [Integer] Hash code
|
|
287
297
|
def hash
|
|
288
|
-
[custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
298
|
+
[custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
289
299
|
end
|
|
290
300
|
|
|
291
301
|
# Builds the object from hash
|
|
@@ -33,6 +33,9 @@ module Akeyless
|
|
|
33
33
|
# Service account key algorithm, e.g. KEY_ALG_RSA_1024
|
|
34
34
|
attr_accessor :gcp_key_algo
|
|
35
35
|
|
|
36
|
+
# GCP Project ID override for dynamic secret operations (tmp service accounts)
|
|
37
|
+
attr_accessor :gcp_project_id
|
|
38
|
+
|
|
36
39
|
# The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
|
|
37
40
|
attr_accessor :gcp_sa_email
|
|
38
41
|
|
|
@@ -81,6 +84,7 @@ module Akeyless
|
|
|
81
84
|
:'gcp_cred_type' => :'gcp-cred-type',
|
|
82
85
|
:'gcp_key' => :'gcp-key',
|
|
83
86
|
:'gcp_key_algo' => :'gcp-key-algo',
|
|
87
|
+
:'gcp_project_id' => :'gcp-project-id',
|
|
84
88
|
:'gcp_sa_email' => :'gcp-sa-email',
|
|
85
89
|
:'gcp_token_scopes' => :'gcp-token-scopes',
|
|
86
90
|
:'json' => :'json',
|
|
@@ -111,6 +115,7 @@ module Akeyless
|
|
|
111
115
|
:'gcp_cred_type' => :'String',
|
|
112
116
|
:'gcp_key' => :'String',
|
|
113
117
|
:'gcp_key_algo' => :'String',
|
|
118
|
+
:'gcp_project_id' => :'String',
|
|
114
119
|
:'gcp_sa_email' => :'String',
|
|
115
120
|
:'gcp_token_scopes' => :'String',
|
|
116
121
|
:'json' => :'Boolean',
|
|
@@ -172,6 +177,10 @@ module Akeyless
|
|
|
172
177
|
self.gcp_key_algo = attributes[:'gcp_key_algo']
|
|
173
178
|
end
|
|
174
179
|
|
|
180
|
+
if attributes.key?(:'gcp_project_id')
|
|
181
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
182
|
+
end
|
|
183
|
+
|
|
175
184
|
if attributes.key?(:'gcp_sa_email')
|
|
176
185
|
self.gcp_sa_email = attributes[:'gcp_sa_email']
|
|
177
186
|
end
|
|
@@ -271,6 +280,7 @@ module Akeyless
|
|
|
271
280
|
gcp_cred_type == o.gcp_cred_type &&
|
|
272
281
|
gcp_key == o.gcp_key &&
|
|
273
282
|
gcp_key_algo == o.gcp_key_algo &&
|
|
283
|
+
gcp_project_id == o.gcp_project_id &&
|
|
274
284
|
gcp_sa_email == o.gcp_sa_email &&
|
|
275
285
|
gcp_token_scopes == o.gcp_token_scopes &&
|
|
276
286
|
json == o.json &&
|
|
@@ -295,7 +305,7 @@ module Akeyless
|
|
|
295
305
|
# Calculates hash code according to all attributes.
|
|
296
306
|
# @return [Integer] Hash code
|
|
297
307
|
def hash
|
|
298
|
-
[custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
308
|
+
[custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
299
309
|
end
|
|
300
310
|
|
|
301
311
|
# Builds the object from hash
|
|
@@ -16,21 +16,6 @@ require 'time'
|
|
|
16
16
|
module Akeyless
|
|
17
17
|
# gatewayCreateMigration is a command that create migration
|
|
18
18
|
class GatewayCreateMigration
|
|
19
|
-
# 1Password user email to connect to the API
|
|
20
|
-
attr_accessor :_1password_email
|
|
21
|
-
|
|
22
|
-
# 1Password user password to connect to the API
|
|
23
|
-
attr_accessor :_1password_password
|
|
24
|
-
|
|
25
|
-
# 1Password user secret key to connect to the API
|
|
26
|
-
attr_accessor :_1password_secret_key
|
|
27
|
-
|
|
28
|
-
# 1Password api container url
|
|
29
|
-
attr_accessor :_1password_url
|
|
30
|
-
|
|
31
|
-
# 1Password list of vault to get the items from
|
|
32
|
-
attr_accessor :_1password_vaults
|
|
33
|
-
|
|
34
19
|
attr_accessor :service_account_key_decoded
|
|
35
20
|
|
|
36
21
|
# Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration)
|
|
@@ -201,7 +186,7 @@ module Akeyless
|
|
|
201
186
|
# Authentication token (see `/auth` and `/configure`)
|
|
202
187
|
attr_accessor :token
|
|
203
188
|
|
|
204
|
-
# Migration type (hashi/aws/gcp/k8s/azure_kv/
|
|
189
|
+
# Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory)
|
|
205
190
|
attr_accessor :type
|
|
206
191
|
|
|
207
192
|
# The universal identity token, Required only for universal_identity authentication
|
|
@@ -210,11 +195,6 @@ module Akeyless
|
|
|
210
195
|
# Attribute mapping from ruby-style variable name to JSON key.
|
|
211
196
|
def self.attribute_map
|
|
212
197
|
{
|
|
213
|
-
:'_1password_email' => :'1password-email',
|
|
214
|
-
:'_1password_password' => :'1password-password',
|
|
215
|
-
:'_1password_secret_key' => :'1password-secret-key',
|
|
216
|
-
:'_1password_url' => :'1password-url',
|
|
217
|
-
:'_1password_vaults' => :'1password-vaults',
|
|
218
198
|
:'service_account_key_decoded' => :'ServiceAccountKeyDecoded',
|
|
219
199
|
:'ad_auto_rotate' => :'ad-auto-rotate',
|
|
220
200
|
:'ad_computer_base_dn' => :'ad-computer-base-dn',
|
|
@@ -285,11 +265,6 @@ module Akeyless
|
|
|
285
265
|
# Attribute type mapping.
|
|
286
266
|
def self.openapi_types
|
|
287
267
|
{
|
|
288
|
-
:'_1password_email' => :'String',
|
|
289
|
-
:'_1password_password' => :'String',
|
|
290
|
-
:'_1password_secret_key' => :'String',
|
|
291
|
-
:'_1password_url' => :'String',
|
|
292
|
-
:'_1password_vaults' => :'Array<String>',
|
|
293
268
|
:'service_account_key_decoded' => :'String',
|
|
294
269
|
:'ad_auto_rotate' => :'String',
|
|
295
270
|
:'ad_computer_base_dn' => :'String',
|
|
@@ -373,28 +348,6 @@ module Akeyless
|
|
|
373
348
|
h[k.to_sym] = v
|
|
374
349
|
}
|
|
375
350
|
|
|
376
|
-
if attributes.key?(:'_1password_email')
|
|
377
|
-
self._1password_email = attributes[:'_1password_email']
|
|
378
|
-
end
|
|
379
|
-
|
|
380
|
-
if attributes.key?(:'_1password_password')
|
|
381
|
-
self._1password_password = attributes[:'_1password_password']
|
|
382
|
-
end
|
|
383
|
-
|
|
384
|
-
if attributes.key?(:'_1password_secret_key')
|
|
385
|
-
self._1password_secret_key = attributes[:'_1password_secret_key']
|
|
386
|
-
end
|
|
387
|
-
|
|
388
|
-
if attributes.key?(:'_1password_url')
|
|
389
|
-
self._1password_url = attributes[:'_1password_url']
|
|
390
|
-
end
|
|
391
|
-
|
|
392
|
-
if attributes.key?(:'_1password_vaults')
|
|
393
|
-
if (value = attributes[:'_1password_vaults']).is_a?(Array)
|
|
394
|
-
self._1password_vaults = value
|
|
395
|
-
end
|
|
396
|
-
end
|
|
397
|
-
|
|
398
351
|
if attributes.key?(:'service_account_key_decoded')
|
|
399
352
|
self.service_account_key_decoded = attributes[:'service_account_key_decoded']
|
|
400
353
|
end
|
|
@@ -710,11 +663,6 @@ module Akeyless
|
|
|
710
663
|
def ==(o)
|
|
711
664
|
return true if self.equal?(o)
|
|
712
665
|
self.class == o.class &&
|
|
713
|
-
_1password_email == o._1password_email &&
|
|
714
|
-
_1password_password == o._1password_password &&
|
|
715
|
-
_1password_secret_key == o._1password_secret_key &&
|
|
716
|
-
_1password_url == o._1password_url &&
|
|
717
|
-
_1password_vaults == o._1password_vaults &&
|
|
718
666
|
service_account_key_decoded == o.service_account_key_decoded &&
|
|
719
667
|
ad_auto_rotate == o.ad_auto_rotate &&
|
|
720
668
|
ad_computer_base_dn == o.ad_computer_base_dn &&
|
|
@@ -785,7 +733,7 @@ module Akeyless
|
|
|
785
733
|
# Calculates hash code according to all attributes.
|
|
786
734
|
# @return [Integer] Hash code
|
|
787
735
|
def hash
|
|
788
|
-
[
|
|
736
|
+
[service_account_key_decoded, ad_auto_rotate, ad_computer_base_dn, ad_discover_services, ad_discovery_types, ad_domain_name, ad_domain_users_path_template, ad_local_users_ignore, ad_local_users_path_template, ad_os_filter, ad_rotation_hour, ad_rotation_interval, ad_sra_enable_rdp, ad_ssh_port, ad_target_format, ad_target_name, ad_targets_path_template, ad_targets_type, ad_user_base_dn, ad_user_groups, ad_winrm_over_http, ad_winrm_port, ad_discover_local_users, aws_key, aws_key_id, aws_region, azure_client_id, azure_kv_name, azure_secret, azure_tenant_id, gcp_key, hashi_json, hashi_ns, hashi_token, hashi_url, json, k8s_ca_certificate, k8s_client_certificate, k8s_client_key, k8s_namespace, k8s_password, k8s_skip_system, k8s_token, k8s_url, k8s_username, name, protection_key, si_auto_rotate, si_rotation_hour, si_rotation_interval, si_sra_enable_rdp, si_target_name, si_user_groups, si_users_ignore, si_users_path_template, target_location, token, type, uid_token].hash
|
|
789
737
|
end
|
|
790
738
|
|
|
791
739
|
# Builds the object from hash
|
|
@@ -30,6 +30,9 @@ module Akeyless
|
|
|
30
30
|
# Service account key algorithm, e.g. KEY_ALG_RSA_1024
|
|
31
31
|
attr_accessor :gcp_key_algo
|
|
32
32
|
|
|
33
|
+
# GCP Project ID override for dynamic secret operations (tmp service accounts)
|
|
34
|
+
attr_accessor :gcp_project_id
|
|
35
|
+
|
|
33
36
|
# The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
|
|
34
37
|
attr_accessor :gcp_sa_email
|
|
35
38
|
|
|
@@ -74,6 +77,7 @@ module Akeyless
|
|
|
74
77
|
:'gcp_cred_type' => :'gcp-cred-type',
|
|
75
78
|
:'gcp_key' => :'gcp-key',
|
|
76
79
|
:'gcp_key_algo' => :'gcp-key-algo',
|
|
80
|
+
:'gcp_project_id' => :'gcp-project-id',
|
|
77
81
|
:'gcp_sa_email' => :'gcp-sa-email',
|
|
78
82
|
:'gcp_token_scopes' => :'gcp-token-scopes',
|
|
79
83
|
:'json' => :'json',
|
|
@@ -102,6 +106,7 @@ module Akeyless
|
|
|
102
106
|
:'gcp_cred_type' => :'String',
|
|
103
107
|
:'gcp_key' => :'String',
|
|
104
108
|
:'gcp_key_algo' => :'String',
|
|
109
|
+
:'gcp_project_id' => :'String',
|
|
105
110
|
:'gcp_sa_email' => :'String',
|
|
106
111
|
:'gcp_token_scopes' => :'String',
|
|
107
112
|
:'json' => :'Boolean',
|
|
@@ -158,6 +163,10 @@ module Akeyless
|
|
|
158
163
|
self.gcp_key_algo = attributes[:'gcp_key_algo']
|
|
159
164
|
end
|
|
160
165
|
|
|
166
|
+
if attributes.key?(:'gcp_project_id')
|
|
167
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
168
|
+
end
|
|
169
|
+
|
|
161
170
|
if attributes.key?(:'gcp_sa_email')
|
|
162
171
|
self.gcp_sa_email = attributes[:'gcp_sa_email']
|
|
163
172
|
end
|
|
@@ -252,6 +261,7 @@ module Akeyless
|
|
|
252
261
|
gcp_cred_type == o.gcp_cred_type &&
|
|
253
262
|
gcp_key == o.gcp_key &&
|
|
254
263
|
gcp_key_algo == o.gcp_key_algo &&
|
|
264
|
+
gcp_project_id == o.gcp_project_id &&
|
|
255
265
|
gcp_sa_email == o.gcp_sa_email &&
|
|
256
266
|
gcp_token_scopes == o.gcp_token_scopes &&
|
|
257
267
|
json == o.json &&
|
|
@@ -275,7 +285,7 @@ module Akeyless
|
|
|
275
285
|
# Calculates hash code according to all attributes.
|
|
276
286
|
# @return [Integer] Hash code
|
|
277
287
|
def hash
|
|
278
|
-
[custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
288
|
+
[custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
279
289
|
end
|
|
280
290
|
|
|
281
291
|
# Builds the object from hash
|
|
@@ -16,21 +16,6 @@ require 'time'
|
|
|
16
16
|
module Akeyless
|
|
17
17
|
# gatewayUpdateMigration is a command that update migration
|
|
18
18
|
class GatewayUpdateMigration
|
|
19
|
-
# 1Password user email to connect to the API
|
|
20
|
-
attr_accessor :_1password_email
|
|
21
|
-
|
|
22
|
-
# 1Password user password to connect to the API
|
|
23
|
-
attr_accessor :_1password_password
|
|
24
|
-
|
|
25
|
-
# 1Password user secret key to connect to the API
|
|
26
|
-
attr_accessor :_1password_secret_key
|
|
27
|
-
|
|
28
|
-
# 1Password api container url
|
|
29
|
-
attr_accessor :_1password_url
|
|
30
|
-
|
|
31
|
-
# 1Password list of vault to get the items from
|
|
32
|
-
attr_accessor :_1password_vaults
|
|
33
|
-
|
|
34
19
|
attr_accessor :service_account_key_decoded
|
|
35
20
|
|
|
36
21
|
# Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration)
|
|
@@ -213,11 +198,6 @@ module Akeyless
|
|
|
213
198
|
# Attribute mapping from ruby-style variable name to JSON key.
|
|
214
199
|
def self.attribute_map
|
|
215
200
|
{
|
|
216
|
-
:'_1password_email' => :'1password-email',
|
|
217
|
-
:'_1password_password' => :'1password-password',
|
|
218
|
-
:'_1password_secret_key' => :'1password-secret-key',
|
|
219
|
-
:'_1password_url' => :'1password-url',
|
|
220
|
-
:'_1password_vaults' => :'1password-vaults',
|
|
221
201
|
:'service_account_key_decoded' => :'ServiceAccountKeyDecoded',
|
|
222
202
|
:'ad_auto_rotate' => :'ad-auto-rotate',
|
|
223
203
|
:'ad_computer_base_dn' => :'ad-computer-base-dn',
|
|
@@ -289,11 +269,6 @@ module Akeyless
|
|
|
289
269
|
# Attribute type mapping.
|
|
290
270
|
def self.openapi_types
|
|
291
271
|
{
|
|
292
|
-
:'_1password_email' => :'String',
|
|
293
|
-
:'_1password_password' => :'String',
|
|
294
|
-
:'_1password_secret_key' => :'String',
|
|
295
|
-
:'_1password_url' => :'String',
|
|
296
|
-
:'_1password_vaults' => :'Array<String>',
|
|
297
272
|
:'service_account_key_decoded' => :'String',
|
|
298
273
|
:'ad_auto_rotate' => :'String',
|
|
299
274
|
:'ad_computer_base_dn' => :'String',
|
|
@@ -378,28 +353,6 @@ module Akeyless
|
|
|
378
353
|
h[k.to_sym] = v
|
|
379
354
|
}
|
|
380
355
|
|
|
381
|
-
if attributes.key?(:'_1password_email')
|
|
382
|
-
self._1password_email = attributes[:'_1password_email']
|
|
383
|
-
end
|
|
384
|
-
|
|
385
|
-
if attributes.key?(:'_1password_password')
|
|
386
|
-
self._1password_password = attributes[:'_1password_password']
|
|
387
|
-
end
|
|
388
|
-
|
|
389
|
-
if attributes.key?(:'_1password_secret_key')
|
|
390
|
-
self._1password_secret_key = attributes[:'_1password_secret_key']
|
|
391
|
-
end
|
|
392
|
-
|
|
393
|
-
if attributes.key?(:'_1password_url')
|
|
394
|
-
self._1password_url = attributes[:'_1password_url']
|
|
395
|
-
end
|
|
396
|
-
|
|
397
|
-
if attributes.key?(:'_1password_vaults')
|
|
398
|
-
if (value = attributes[:'_1password_vaults']).is_a?(Array)
|
|
399
|
-
self._1password_vaults = value
|
|
400
|
-
end
|
|
401
|
-
end
|
|
402
|
-
|
|
403
356
|
if attributes.key?(:'service_account_key_decoded')
|
|
404
357
|
self.service_account_key_decoded = attributes[:'service_account_key_decoded']
|
|
405
358
|
end
|
|
@@ -712,11 +665,6 @@ module Akeyless
|
|
|
712
665
|
def ==(o)
|
|
713
666
|
return true if self.equal?(o)
|
|
714
667
|
self.class == o.class &&
|
|
715
|
-
_1password_email == o._1password_email &&
|
|
716
|
-
_1password_password == o._1password_password &&
|
|
717
|
-
_1password_secret_key == o._1password_secret_key &&
|
|
718
|
-
_1password_url == o._1password_url &&
|
|
719
|
-
_1password_vaults == o._1password_vaults &&
|
|
720
668
|
service_account_key_decoded == o.service_account_key_decoded &&
|
|
721
669
|
ad_auto_rotate == o.ad_auto_rotate &&
|
|
722
670
|
ad_computer_base_dn == o.ad_computer_base_dn &&
|
|
@@ -788,7 +736,7 @@ module Akeyless
|
|
|
788
736
|
# Calculates hash code according to all attributes.
|
|
789
737
|
# @return [Integer] Hash code
|
|
790
738
|
def hash
|
|
791
|
-
[
|
|
739
|
+
[service_account_key_decoded, ad_auto_rotate, ad_computer_base_dn, ad_discover_services, ad_discovery_types, ad_domain_name, ad_domain_users_path_template, ad_local_users_ignore, ad_local_users_path_template, ad_os_filter, ad_rotation_hour, ad_rotation_interval, ad_sra_enable_rdp, ad_ssh_port, ad_target_format, ad_target_name, ad_targets_path_template, ad_targets_type, ad_user_base_dn, ad_user_groups, ad_winrm_over_http, ad_winrm_port, ad_discover_local_users, aws_key, aws_key_id, aws_region, azure_client_id, azure_kv_name, azure_secret, azure_tenant_id, gcp_key, hashi_json, hashi_ns, hashi_token, hashi_url, id, json, k8s_ca_certificate, k8s_client_certificate, k8s_client_key, k8s_namespace, k8s_password, k8s_skip_system, k8s_token, k8s_url, k8s_username, name, new_name, protection_key, si_auto_rotate, si_rotation_hour, si_rotation_interval, si_sra_enable_rdp, si_target_name, si_user_groups, si_users_ignore, si_users_path_template, target_location, token, uid_token].hash
|
|
792
740
|
end
|
|
793
741
|
|
|
794
742
|
# Builds the object from hash
|
|
@@ -30,6 +30,9 @@ module Akeyless
|
|
|
30
30
|
# Service account key algorithm, e.g. KEY_ALG_RSA_1024
|
|
31
31
|
attr_accessor :gcp_key_algo
|
|
32
32
|
|
|
33
|
+
# GCP Project ID override for dynamic secret operations (tmp service accounts)
|
|
34
|
+
attr_accessor :gcp_project_id
|
|
35
|
+
|
|
33
36
|
# The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
|
|
34
37
|
attr_accessor :gcp_sa_email
|
|
35
38
|
|
|
@@ -77,6 +80,7 @@ module Akeyless
|
|
|
77
80
|
:'gcp_cred_type' => :'gcp-cred-type',
|
|
78
81
|
:'gcp_key' => :'gcp-key',
|
|
79
82
|
:'gcp_key_algo' => :'gcp-key-algo',
|
|
83
|
+
:'gcp_project_id' => :'gcp-project-id',
|
|
80
84
|
:'gcp_sa_email' => :'gcp-sa-email',
|
|
81
85
|
:'gcp_token_scopes' => :'gcp-token-scopes',
|
|
82
86
|
:'json' => :'json',
|
|
@@ -106,6 +110,7 @@ module Akeyless
|
|
|
106
110
|
:'gcp_cred_type' => :'String',
|
|
107
111
|
:'gcp_key' => :'String',
|
|
108
112
|
:'gcp_key_algo' => :'String',
|
|
113
|
+
:'gcp_project_id' => :'String',
|
|
109
114
|
:'gcp_sa_email' => :'String',
|
|
110
115
|
:'gcp_token_scopes' => :'String',
|
|
111
116
|
:'json' => :'Boolean',
|
|
@@ -163,6 +168,10 @@ module Akeyless
|
|
|
163
168
|
self.gcp_key_algo = attributes[:'gcp_key_algo']
|
|
164
169
|
end
|
|
165
170
|
|
|
171
|
+
if attributes.key?(:'gcp_project_id')
|
|
172
|
+
self.gcp_project_id = attributes[:'gcp_project_id']
|
|
173
|
+
end
|
|
174
|
+
|
|
166
175
|
if attributes.key?(:'gcp_sa_email')
|
|
167
176
|
self.gcp_sa_email = attributes[:'gcp_sa_email']
|
|
168
177
|
end
|
|
@@ -261,6 +270,7 @@ module Akeyless
|
|
|
261
270
|
gcp_cred_type == o.gcp_cred_type &&
|
|
262
271
|
gcp_key == o.gcp_key &&
|
|
263
272
|
gcp_key_algo == o.gcp_key_algo &&
|
|
273
|
+
gcp_project_id == o.gcp_project_id &&
|
|
264
274
|
gcp_sa_email == o.gcp_sa_email &&
|
|
265
275
|
gcp_token_scopes == o.gcp_token_scopes &&
|
|
266
276
|
json == o.json &&
|
|
@@ -285,7 +295,7 @@ module Akeyless
|
|
|
285
295
|
# Calculates hash code according to all attributes.
|
|
286
296
|
# @return [Integer] Hash code
|
|
287
297
|
def hash
|
|
288
|
-
[custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
298
|
+
[custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
|
|
289
299
|
end
|
|
290
300
|
|
|
291
301
|
# Builds the object from hash
|
data/lib/akeyless/version.rb
CHANGED