akeyless 5.0.9 → 5.0.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 258019c17a037f4390deebe69637b27931bbc10e4da0b7c812ae2ff012fb048b
4
- data.tar.gz: 85abc07e889750d84290f7a75be4eabd5bf7954c4d544195d5f520df172ca8ea
3
+ metadata.gz: 1fa8de7b38c2831643c72faf8c1363c43d89fb6dcdc94e5e7b9986b9cad8a5ee
4
+ data.tar.gz: 56c8ed50861046df19948ee5d27c01b9f10ce9c02252640cd28356afd49a9eaf
5
5
  SHA512:
6
- metadata.gz: 1baefcb014271eec3926409d3c526cfdcc35c72e85b2c0a4da1f5f711549b814e3a3025e41f7d2e822952f14c5b3395c5d473d6f2d64413ca42028616b1ecdaa
7
- data.tar.gz: 93732203e015f2de4826cdd824f47045c370f5a727adc9e52379b94148c92a93d3f1516064e00fa36bead13750ac86c493e741b0641cdee1cc51a124bd6bee8a
6
+ metadata.gz: 8d07915ee08f63f4bac66f672e79dac47e864e3ad0828c53a697d8603a8077f9c2b62145b6aad1fa91be2baa79610184d0bedd28aa8a610cf320e620a727b85a
7
+ data.tar.gz: 6833d50d94652ced744d81b3e08a03221095e59bb88da6fc23edb170c93ae135b9ea7191f4406cbaff95f23172d9384f2db07f24dcf9a116f7c5ffc3cfa306f3
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.9
10
+ - Package version: 5.0.11
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
data/docs/CreateESM.md CHANGED
@@ -7,6 +7,7 @@
7
7
  | **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the External Secrets Manager | [optional] |
10
+ | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
10
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
12
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
12
13
  | **name** | **String** | External Secrets Manager name | |
@@ -24,6 +25,7 @@ instance = Akeyless::CreateESM.new(
24
25
  azure_kv_name: null,
25
26
  delete_protection: null,
26
27
  description: null,
28
+ gcp_project_id: null,
27
29
  json: null,
28
30
  k8s_namespace: null,
29
31
  name: null,
data/docs/CreateUSC.md CHANGED
@@ -7,6 +7,7 @@
7
7
  | **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the Universal Secrets Connector | [optional] |
10
+ | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
10
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
12
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
12
13
  | **name** | **String** | Universal Secrets Connector name | |
@@ -26,6 +27,7 @@ instance = Akeyless::CreateUSC.new(
26
27
  azure_kv_name: null,
27
28
  delete_protection: null,
28
29
  description: null,
30
+ gcp_project_id: null,
29
31
  json: null,
30
32
  k8s_namespace: null,
31
33
  name: null,
@@ -95,6 +95,7 @@
95
95
  | **failure_message** | **String** | | [optional] |
96
96
  | **fixed_user_only** | **String** | | [optional] |
97
97
  | **gcp_key_algo** | **String** | | [optional] |
98
+ | **gcp_project_id** | **String** | | [optional] |
98
99
  | **gcp_role_bindings** | **Hash<String, Array<String>>** | | [optional] |
99
100
  | **gcp_service_account_email** | **String** | GCPServiceAccountEmail overrides the deprecated field from the target | [optional] |
100
101
  | **gcp_service_account_key** | **String** | | [optional] |
@@ -359,6 +360,7 @@ instance = Akeyless::DSProducerDetails.new(
359
360
  failure_message: null,
360
361
  fixed_user_only: null,
361
362
  gcp_key_algo: null,
363
+ gcp_project_id: null,
362
364
  gcp_role_bindings: null,
363
365
  gcp_service_account_email: null,
364
366
  gcp_service_account_key: null,
@@ -10,6 +10,7 @@
10
10
  | **gcp_cred_type** | **String** | | [optional] |
11
11
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
12
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
13
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
13
14
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
14
15
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -35,6 +36,7 @@ instance = Akeyless::DynamicSecretCreateGcp.new(
35
36
  gcp_cred_type: null,
36
37
  gcp_key: null,
37
38
  gcp_key_algo: null,
39
+ gcp_project_id: null,
38
40
  gcp_sa_email: null,
39
41
  gcp_token_scopes: null,
40
42
  json: null,
@@ -10,6 +10,7 @@
10
10
  | **gcp_cred_type** | **String** | | [optional] |
11
11
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
12
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
13
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
13
14
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
14
15
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -36,6 +37,7 @@ instance = Akeyless::DynamicSecretUpdateGcp.new(
36
37
  gcp_cred_type: null,
37
38
  gcp_key: null,
38
39
  gcp_key_algo: null,
40
+ gcp_project_id: null,
39
41
  gcp_sa_email: null,
40
42
  gcp_token_scopes: null,
41
43
  json: null,
@@ -4,11 +4,6 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **_1password_email** | **String** | 1Password user email to connect to the API | [optional] |
8
- | **_1password_password** | **String** | 1Password user password to connect to the API | [optional] |
9
- | **_1password_secret_key** | **String** | 1Password user secret key to connect to the API | [optional] |
10
- | **_1password_url** | **String** | 1Password api container url | [optional] |
11
- | **_1password_vaults** | **Array<String>** | 1Password list of vault to get the items from | [optional] |
12
7
  | **service_account_key_decoded** | **String** | | [optional] |
13
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
14
9
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
@@ -66,7 +61,7 @@
66
61
  | **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
67
62
  | **target_location** | **String** | Target location in Akeyless for imported secrets | |
68
63
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
69
- | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/1password/active_directory) | [optional] |
64
+ | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory) | [optional] |
70
65
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
71
66
 
72
67
  ## Example
@@ -75,11 +70,6 @@
75
70
  require 'akeyless'
76
71
 
77
72
  instance = Akeyless::GatewayCreateMigration.new(
78
- _1password_email: null,
79
- _1password_password: null,
80
- _1password_secret_key: null,
81
- _1password_url: null,
82
- _1password_vaults: null,
83
73
  service_account_key_decoded: null,
84
74
  ad_auto_rotate: null,
85
75
  ad_computer_base_dn: null,
@@ -9,6 +9,7 @@
9
9
  | **gcp_cred_type** | **String** | | [optional] |
10
10
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
11
11
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
12
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
12
13
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
13
14
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
14
15
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -33,6 +34,7 @@ instance = Akeyless::GatewayCreateProducerGcp.new(
33
34
  gcp_cred_type: null,
34
35
  gcp_key: null,
35
36
  gcp_key_algo: null,
37
+ gcp_project_id: null,
36
38
  gcp_sa_email: null,
37
39
  gcp_token_scopes: null,
38
40
  json: null,
@@ -4,11 +4,6 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
- | **_1password_email** | **String** | 1Password user email to connect to the API | [optional] |
8
- | **_1password_password** | **String** | 1Password user password to connect to the API | [optional] |
9
- | **_1password_secret_key** | **String** | 1Password user secret key to connect to the API | [optional] |
10
- | **_1password_url** | **String** | 1Password api container url | [optional] |
11
- | **_1password_vaults** | **Array<String>** | 1Password list of vault to get the items from | [optional] |
12
7
  | **service_account_key_decoded** | **String** | | [optional] |
13
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
14
9
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
@@ -76,11 +71,6 @@
76
71
  require 'akeyless'
77
72
 
78
73
  instance = Akeyless::GatewayUpdateMigration.new(
79
- _1password_email: null,
80
- _1password_password: null,
81
- _1password_secret_key: null,
82
- _1password_url: null,
83
- _1password_vaults: null,
84
74
  service_account_key_decoded: null,
85
75
  ad_auto_rotate: null,
86
76
  ad_computer_base_dn: null,
@@ -9,6 +9,7 @@
9
9
  | **gcp_cred_type** | **String** | | [optional] |
10
10
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
11
11
  | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
12
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
12
13
  | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
13
14
  | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
14
15
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
@@ -34,6 +35,7 @@ instance = Akeyless::GatewayUpdateProducerGcp.new(
34
35
  gcp_cred_type: null,
35
36
  gcp_key: null,
36
37
  gcp_key_algo: null,
38
+ gcp_project_id: null,
37
39
  gcp_sa_email: null,
38
40
  gcp_token_scopes: null,
39
41
  json: null,
@@ -25,6 +25,9 @@ module Akeyless
25
25
  # Description of the External Secrets Manager
26
26
  attr_accessor :description
27
27
 
28
+ # GCP Project ID (Relevant only for GCP targets)
29
+ attr_accessor :gcp_project_id
30
+
28
31
  # Set output format to JSON
29
32
  attr_accessor :json
30
33
 
@@ -52,6 +55,7 @@ module Akeyless
52
55
  :'azure_kv_name' => :'azure-kv-name',
53
56
  :'delete_protection' => :'delete_protection',
54
57
  :'description' => :'description',
58
+ :'gcp_project_id' => :'gcp-project-id',
55
59
  :'json' => :'json',
56
60
  :'k8s_namespace' => :'k8s-namespace',
57
61
  :'name' => :'name',
@@ -73,6 +77,7 @@ module Akeyless
73
77
  :'azure_kv_name' => :'String',
74
78
  :'delete_protection' => :'String',
75
79
  :'description' => :'String',
80
+ :'gcp_project_id' => :'String',
76
81
  :'json' => :'Boolean',
77
82
  :'k8s_namespace' => :'String',
78
83
  :'name' => :'String',
@@ -116,6 +121,10 @@ module Akeyless
116
121
  self.description = attributes[:'description']
117
122
  end
118
123
 
124
+ if attributes.key?(:'gcp_project_id')
125
+ self.gcp_project_id = attributes[:'gcp_project_id']
126
+ end
127
+
119
128
  if attributes.key?(:'json')
120
129
  self.json = attributes[:'json']
121
130
  else
@@ -186,6 +195,7 @@ module Akeyless
186
195
  azure_kv_name == o.azure_kv_name &&
187
196
  delete_protection == o.delete_protection &&
188
197
  description == o.description &&
198
+ gcp_project_id == o.gcp_project_id &&
189
199
  json == o.json &&
190
200
  k8s_namespace == o.k8s_namespace &&
191
201
  name == o.name &&
@@ -204,7 +214,7 @@ module Akeyless
204
214
  # Calculates hash code according to all attributes.
205
215
  # @return [Integer] Hash code
206
216
  def hash
207
- [azure_kv_name, delete_protection, description, json, k8s_namespace, name, tags, target_to_associate, token, uid_token].hash
217
+ [azure_kv_name, delete_protection, description, gcp_project_id, json, k8s_namespace, name, tags, target_to_associate, token, uid_token].hash
208
218
  end
209
219
 
210
220
  # Builds the object from hash
@@ -25,6 +25,9 @@ module Akeyless
25
25
  # Description of the Universal Secrets Connector
26
26
  attr_accessor :description
27
27
 
28
+ # GCP Project ID (Relevant only for GCP targets)
29
+ attr_accessor :gcp_project_id
30
+
28
31
  # Set output format to JSON
29
32
  attr_accessor :json
30
33
 
@@ -58,6 +61,7 @@ module Akeyless
58
61
  :'azure_kv_name' => :'azure-kv-name',
59
62
  :'delete_protection' => :'delete_protection',
60
63
  :'description' => :'description',
64
+ :'gcp_project_id' => :'gcp-project-id',
61
65
  :'json' => :'json',
62
66
  :'k8s_namespace' => :'k8s-namespace',
63
67
  :'name' => :'name',
@@ -81,6 +85,7 @@ module Akeyless
81
85
  :'azure_kv_name' => :'String',
82
86
  :'delete_protection' => :'String',
83
87
  :'description' => :'String',
88
+ :'gcp_project_id' => :'String',
84
89
  :'json' => :'Boolean',
85
90
  :'k8s_namespace' => :'String',
86
91
  :'name' => :'String',
@@ -126,6 +131,10 @@ module Akeyless
126
131
  self.description = attributes[:'description']
127
132
  end
128
133
 
134
+ if attributes.key?(:'gcp_project_id')
135
+ self.gcp_project_id = attributes[:'gcp_project_id']
136
+ end
137
+
129
138
  if attributes.key?(:'json')
130
139
  self.json = attributes[:'json']
131
140
  else
@@ -206,6 +215,7 @@ module Akeyless
206
215
  azure_kv_name == o.azure_kv_name &&
207
216
  delete_protection == o.delete_protection &&
208
217
  description == o.description &&
218
+ gcp_project_id == o.gcp_project_id &&
209
219
  json == o.json &&
210
220
  k8s_namespace == o.k8s_namespace &&
211
221
  name == o.name &&
@@ -226,7 +236,7 @@ module Akeyless
226
236
  # Calculates hash code according to all attributes.
227
237
  # @return [Integer] Hash code
228
238
  def hash
229
- [azure_kv_name, delete_protection, description, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
239
+ [azure_kv_name, delete_protection, description, gcp_project_id, json, k8s_namespace, name, tags, target_to_associate, token, uid_token, usc_prefix, use_prefix_as_filter].hash
230
240
  end
231
241
 
232
242
  # Builds the object from hash
@@ -201,6 +201,8 @@ module Akeyless
201
201
 
202
202
  attr_accessor :gcp_key_algo
203
203
 
204
+ attr_accessor :gcp_project_id
205
+
204
206
  attr_accessor :gcp_role_bindings
205
207
 
206
208
  # GCPServiceAccountEmail overrides the deprecated field from the target
@@ -644,6 +646,7 @@ module Akeyless
644
646
  :'failure_message' => :'failure_message',
645
647
  :'fixed_user_only' => :'fixed_user_only',
646
648
  :'gcp_key_algo' => :'gcp_key_algo',
649
+ :'gcp_project_id' => :'gcp_project_id',
647
650
  :'gcp_role_bindings' => :'gcp_role_bindings',
648
651
  :'gcp_service_account_email' => :'gcp_service_account_email',
649
652
  :'gcp_service_account_key' => :'gcp_service_account_key',
@@ -912,6 +915,7 @@ module Akeyless
912
915
  :'failure_message' => :'String',
913
916
  :'fixed_user_only' => :'String',
914
917
  :'gcp_key_algo' => :'String',
918
+ :'gcp_project_id' => :'String',
915
919
  :'gcp_role_bindings' => :'Hash<String, Array<String>>',
916
920
  :'gcp_service_account_email' => :'String',
917
921
  :'gcp_service_account_key' => :'String',
@@ -1468,6 +1472,10 @@ module Akeyless
1468
1472
  self.gcp_key_algo = attributes[:'gcp_key_algo']
1469
1473
  end
1470
1474
 
1475
+ if attributes.key?(:'gcp_project_id')
1476
+ self.gcp_project_id = attributes[:'gcp_project_id']
1477
+ end
1478
+
1471
1479
  if attributes.key?(:'gcp_role_bindings')
1472
1480
  if (value = attributes[:'gcp_role_bindings']).is_a?(Hash)
1473
1481
  self.gcp_role_bindings = value
@@ -2270,6 +2278,7 @@ module Akeyless
2270
2278
  failure_message == o.failure_message &&
2271
2279
  fixed_user_only == o.fixed_user_only &&
2272
2280
  gcp_key_algo == o.gcp_key_algo &&
2281
+ gcp_project_id == o.gcp_project_id &&
2273
2282
  gcp_role_bindings == o.gcp_role_bindings &&
2274
2283
  gcp_service_account_email == o.gcp_service_account_email &&
2275
2284
  gcp_service_account_key == o.gcp_service_account_key &&
@@ -2447,7 +2456,7 @@ module Akeyless
2447
2456
  # Calculates hash code according to all attributes.
2448
2457
  # @return [Integer] Hash code
2449
2458
  def hash
2450
- [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, api_key, api_key_id, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_external_id, aws_region, aws_role_arns, aws_secret_access_key, aws_session_tags, aws_session_token, aws_transitive_tag_keys, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_administrative_unit, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, azure_username, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, cloud_service_provider, cluster_mode, connection_type, create_sync_url, db_client_id, db_client_secret, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_tenant_id, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, expiration_date, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_key_id, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_organization_name, github_repository_path, gitlab_access_token, gitlab_access_type, gitlab_certificate, gitlab_group_name, gitlab_project_name, gitlab_role, gitlab_token_scope, gitlab_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, google_workspace_access_mode, google_workspace_admin_name, google_workspace_fixed_user_name_sub_claim_key, google_workspace_group_name, google_workspace_group_role, google_workspace_role_name, google_workspace_role_scope, grace_rotated_secret_key, grant_types, groups, gw_cloud_identity_external_id_opt, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_auth_type, k8s_bearer_token, k8s_client_cert_data, k8s_client_key_data, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_cluster_name, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_fixed_user_name_sub_claim_key, ldap_fixed_user_type, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, openai_url, oracle_creation_statements, oracle_revocation_statements, oracle_wallet_details, organization_id, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, project_id, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, rdp_fixed_user_name_sub_claim_key, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_auth_mode, sf_key_algo, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, username_template, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2459
+ [access_token_manager_id, acl_rules, active, admin_name, admin_pwd, admin_rotation_interval_days, administrative_port, api_key, api_key_id, artifactory_admin_apikey, artifactory_admin_username, artifactory_base_url, artifactory_token_audience, artifactory_token_scope, authorization_port, aws_access_key_id, aws_access_mode, aws_external_id, aws_region, aws_role_arns, aws_secret_access_key, aws_session_tags, aws_session_token, aws_transitive_tag_keys, aws_user_console_access, aws_user_groups, aws_user_policies, aws_user_programmatic_access, azure_administrative_unit, azure_app_object_id, azure_client_id, azure_client_secret, azure_fixed_user_name_sub_claim_key, azure_fixed_user_only, azure_resource_group_name, azure_resource_name, azure_subscription_id, azure_tenant_id, azure_user_groups_obj_id, azure_user_portal_access, azure_user_programmatic_access, azure_user_roles_template_id, azure_username, cassandra_creation_statements, chef_organizations, chef_server_access_mode, chef_server_host_name, chef_server_key, chef_server_port, chef_server_url, chef_server_username, chef_skip_ssl, client_authentication_type, cloud_service_provider, cluster_mode, connection_type, create_sync_url, db_client_id, db_client_secret, db_host_name, db_isolation_level, db_max_idle_conns, db_max_open_conns, db_name, db_port, db_private_key, db_private_key_passphrase, db_pwd, db_server_certificates, db_server_name, db_tenant_id, db_user_name, delete_protection, dynamic_secret_id, dynamic_secret_key, dynamic_secret_name, dynamic_secret_type, eks_access_key_id, eks_assume_role, eks_cluster_ca_certificate, eks_cluster_endpoint, eks_cluster_name, eks_region, eks_secret_access_key, enable_admin_rotation, enforce_replay_prevention, expiration_date, externally_provided_user, failure_message, fixed_user_only, gcp_key_algo, gcp_project_id, gcp_role_bindings, gcp_service_account_email, gcp_service_account_key, gcp_service_account_key_base64, gcp_service_account_key_id, gcp_service_account_type, gcp_tmp_service_account_name, gcp_token_lifetime, gcp_token_scope, gcp_token_type, github_app_id, github_app_private_key, github_base_url, github_installation_id, github_installation_token_permissions, github_installation_token_repositories, github_installation_token_repositories_ids, github_organization_name, github_repository_path, gitlab_access_token, gitlab_access_type, gitlab_certificate, gitlab_group_name, gitlab_project_name, gitlab_role, gitlab_token_scope, gitlab_url, gke_cluster_ca_certificate, gke_cluster_endpoint, gke_cluster_name, gke_service_account_key, gke_service_account_name, google_workspace_access_mode, google_workspace_admin_name, google_workspace_fixed_user_name_sub_claim_key, google_workspace_group_name, google_workspace_group_role, google_workspace_role_name, google_workspace_role_scope, grace_rotated_secret_key, grant_types, groups, gw_cloud_identity_external_id_opt, hanadb_creation_statements, hanadb_revocation_statements, host_name, host_port, implementation_type, is_fixed_user, issuer, item_targets_assoc, jwks, jwks_url, k8s_allowed_namespaces, k8s_auth_type, k8s_bearer_token, k8s_client_cert_data, k8s_client_key_data, k8s_cluster_ca_certificate, k8s_cluster_endpoint, k8s_cluster_name, k8s_dynamic_mode, k8s_multiple_doc_yaml_temp_definition, k8s_namespace, k8s_role_name, k8s_role_type, k8s_service_account, last_admin_rotation, ldap_audience, ldap_bind_dn, ldap_bind_password, ldap_certificate, ldap_fixed_user_name_sub_claim_key, ldap_fixed_user_type, ldap_group_dn, ldap_token_expiration, ldap_url, ldap_user_attr, ldap_user_dn, metadata, mongodb_atlas_api_private_key, mongodb_atlas_api_public_key, mongodb_atlas_project_id, mongodb_custom_data, mongodb_db_name, mongodb_default_auth_db, mongodb_host_port, mongodb_is_atlas, mongodb_password, mongodb_roles, mongodb_uri_connection, mongodb_uri_options, mongodb_username, mssql_creation_statements, mssql_revocation_statements, mysql_creation_statements, mysql_revocation_statements, openai_url, oracle_creation_statements, oracle_revocation_statements, oracle_wallet_details, organization_id, password, password_length, password_policy, payload, ping_url, postgres_creation_statements, postgres_revocation_statements, privileged_user, project_id, rabbitmq_server_password, rabbitmq_server_uri, rabbitmq_server_user, rabbitmq_user_conf_permission, rabbitmq_user_read_permission, rabbitmq_user_tags, rabbitmq_user_vhost, rabbitmq_user_write_permission, rdp_fixed_user_name_sub_claim_key, redirect_uris, redshift_creation_statements, restricted_scopes, revoke_sync_url, rotate_sync_url, scopes, secure_remote_access_details, session_extension_warn_interval_min, sf_account, sf_auth_mode, sf_key_algo, sf_user_role, sf_warehouse_name, should_stop, signing_algorithm, ssl_connection_certificate, ssl_connection_mode, subject_dn, tags, timeout_seconds, use_gw_cloud_identity, use_gw_service_account, user_name, user_password, user_principal_name, user_ttl, username_length, username_policy, username_template, venafi_allow_subdomains, venafi_allowed_domains, venafi_api_key, venafi_auto_generated_folder, venafi_base_url, venafi_root_first_in_chain, venafi_sign_using_akeyless_pki, venafi_signer_key_name, venafi_store_private_key, venafi_tpp_access_token, venafi_tpp_client_id, venafi_tpp_password, venafi_tpp_refresh_token, venafi_tpp_username, venafi_use_tpp, venafi_zone, warn_before_user_expiration_min].hash
2451
2460
  end
2452
2461
 
2453
2462
  # Builds the object from hash
@@ -33,6 +33,9 @@ module Akeyless
33
33
  # Service account key algorithm, e.g. KEY_ALG_RSA_1024
34
34
  attr_accessor :gcp_key_algo
35
35
 
36
+ # GCP Project ID override for dynamic secret operations (tmp service accounts)
37
+ attr_accessor :gcp_project_id
38
+
36
39
  # The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
37
40
  attr_accessor :gcp_sa_email
38
41
 
@@ -78,6 +81,7 @@ module Akeyless
78
81
  :'gcp_cred_type' => :'gcp-cred-type',
79
82
  :'gcp_key' => :'gcp-key',
80
83
  :'gcp_key_algo' => :'gcp-key-algo',
84
+ :'gcp_project_id' => :'gcp-project-id',
81
85
  :'gcp_sa_email' => :'gcp-sa-email',
82
86
  :'gcp_token_scopes' => :'gcp-token-scopes',
83
87
  :'json' => :'json',
@@ -107,6 +111,7 @@ module Akeyless
107
111
  :'gcp_cred_type' => :'String',
108
112
  :'gcp_key' => :'String',
109
113
  :'gcp_key_algo' => :'String',
114
+ :'gcp_project_id' => :'String',
110
115
  :'gcp_sa_email' => :'String',
111
116
  :'gcp_token_scopes' => :'String',
112
117
  :'json' => :'Boolean',
@@ -167,6 +172,10 @@ module Akeyless
167
172
  self.gcp_key_algo = attributes[:'gcp_key_algo']
168
173
  end
169
174
 
175
+ if attributes.key?(:'gcp_project_id')
176
+ self.gcp_project_id = attributes[:'gcp_project_id']
177
+ end
178
+
170
179
  if attributes.key?(:'gcp_sa_email')
171
180
  self.gcp_sa_email = attributes[:'gcp_sa_email']
172
181
  end
@@ -262,6 +271,7 @@ module Akeyless
262
271
  gcp_cred_type == o.gcp_cred_type &&
263
272
  gcp_key == o.gcp_key &&
264
273
  gcp_key_algo == o.gcp_key_algo &&
274
+ gcp_project_id == o.gcp_project_id &&
265
275
  gcp_sa_email == o.gcp_sa_email &&
266
276
  gcp_token_scopes == o.gcp_token_scopes &&
267
277
  json == o.json &&
@@ -285,7 +295,7 @@ module Akeyless
285
295
  # Calculates hash code according to all attributes.
286
296
  # @return [Integer] Hash code
287
297
  def hash
288
- [custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
298
+ [custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
289
299
  end
290
300
 
291
301
  # Builds the object from hash
@@ -33,6 +33,9 @@ module Akeyless
33
33
  # Service account key algorithm, e.g. KEY_ALG_RSA_1024
34
34
  attr_accessor :gcp_key_algo
35
35
 
36
+ # GCP Project ID override for dynamic secret operations (tmp service accounts)
37
+ attr_accessor :gcp_project_id
38
+
36
39
  # The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
37
40
  attr_accessor :gcp_sa_email
38
41
 
@@ -81,6 +84,7 @@ module Akeyless
81
84
  :'gcp_cred_type' => :'gcp-cred-type',
82
85
  :'gcp_key' => :'gcp-key',
83
86
  :'gcp_key_algo' => :'gcp-key-algo',
87
+ :'gcp_project_id' => :'gcp-project-id',
84
88
  :'gcp_sa_email' => :'gcp-sa-email',
85
89
  :'gcp_token_scopes' => :'gcp-token-scopes',
86
90
  :'json' => :'json',
@@ -111,6 +115,7 @@ module Akeyless
111
115
  :'gcp_cred_type' => :'String',
112
116
  :'gcp_key' => :'String',
113
117
  :'gcp_key_algo' => :'String',
118
+ :'gcp_project_id' => :'String',
114
119
  :'gcp_sa_email' => :'String',
115
120
  :'gcp_token_scopes' => :'String',
116
121
  :'json' => :'Boolean',
@@ -172,6 +177,10 @@ module Akeyless
172
177
  self.gcp_key_algo = attributes[:'gcp_key_algo']
173
178
  end
174
179
 
180
+ if attributes.key?(:'gcp_project_id')
181
+ self.gcp_project_id = attributes[:'gcp_project_id']
182
+ end
183
+
175
184
  if attributes.key?(:'gcp_sa_email')
176
185
  self.gcp_sa_email = attributes[:'gcp_sa_email']
177
186
  end
@@ -271,6 +280,7 @@ module Akeyless
271
280
  gcp_cred_type == o.gcp_cred_type &&
272
281
  gcp_key == o.gcp_key &&
273
282
  gcp_key_algo == o.gcp_key_algo &&
283
+ gcp_project_id == o.gcp_project_id &&
274
284
  gcp_sa_email == o.gcp_sa_email &&
275
285
  gcp_token_scopes == o.gcp_token_scopes &&
276
286
  json == o.json &&
@@ -295,7 +305,7 @@ module Akeyless
295
305
  # Calculates hash code according to all attributes.
296
306
  # @return [Integer] Hash code
297
307
  def hash
298
- [custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
308
+ [custom_username_template, delete_protection, description, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
299
309
  end
300
310
 
301
311
  # Builds the object from hash
@@ -16,21 +16,6 @@ require 'time'
16
16
  module Akeyless
17
17
  # gatewayCreateMigration is a command that create migration
18
18
  class GatewayCreateMigration
19
- # 1Password user email to connect to the API
20
- attr_accessor :_1password_email
21
-
22
- # 1Password user password to connect to the API
23
- attr_accessor :_1password_password
24
-
25
- # 1Password user secret key to connect to the API
26
- attr_accessor :_1password_secret_key
27
-
28
- # 1Password api container url
29
- attr_accessor :_1password_url
30
-
31
- # 1Password list of vault to get the items from
32
- attr_accessor :_1password_vaults
33
-
34
19
  attr_accessor :service_account_key_decoded
35
20
 
36
21
  # Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration)
@@ -201,7 +186,7 @@ module Akeyless
201
186
  # Authentication token (see `/auth` and `/configure`)
202
187
  attr_accessor :token
203
188
 
204
- # Migration type (hashi/aws/gcp/k8s/azure_kv/1password/active_directory)
189
+ # Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory)
205
190
  attr_accessor :type
206
191
 
207
192
  # The universal identity token, Required only for universal_identity authentication
@@ -210,11 +195,6 @@ module Akeyless
210
195
  # Attribute mapping from ruby-style variable name to JSON key.
211
196
  def self.attribute_map
212
197
  {
213
- :'_1password_email' => :'1password-email',
214
- :'_1password_password' => :'1password-password',
215
- :'_1password_secret_key' => :'1password-secret-key',
216
- :'_1password_url' => :'1password-url',
217
- :'_1password_vaults' => :'1password-vaults',
218
198
  :'service_account_key_decoded' => :'ServiceAccountKeyDecoded',
219
199
  :'ad_auto_rotate' => :'ad-auto-rotate',
220
200
  :'ad_computer_base_dn' => :'ad-computer-base-dn',
@@ -285,11 +265,6 @@ module Akeyless
285
265
  # Attribute type mapping.
286
266
  def self.openapi_types
287
267
  {
288
- :'_1password_email' => :'String',
289
- :'_1password_password' => :'String',
290
- :'_1password_secret_key' => :'String',
291
- :'_1password_url' => :'String',
292
- :'_1password_vaults' => :'Array<String>',
293
268
  :'service_account_key_decoded' => :'String',
294
269
  :'ad_auto_rotate' => :'String',
295
270
  :'ad_computer_base_dn' => :'String',
@@ -373,28 +348,6 @@ module Akeyless
373
348
  h[k.to_sym] = v
374
349
  }
375
350
 
376
- if attributes.key?(:'_1password_email')
377
- self._1password_email = attributes[:'_1password_email']
378
- end
379
-
380
- if attributes.key?(:'_1password_password')
381
- self._1password_password = attributes[:'_1password_password']
382
- end
383
-
384
- if attributes.key?(:'_1password_secret_key')
385
- self._1password_secret_key = attributes[:'_1password_secret_key']
386
- end
387
-
388
- if attributes.key?(:'_1password_url')
389
- self._1password_url = attributes[:'_1password_url']
390
- end
391
-
392
- if attributes.key?(:'_1password_vaults')
393
- if (value = attributes[:'_1password_vaults']).is_a?(Array)
394
- self._1password_vaults = value
395
- end
396
- end
397
-
398
351
  if attributes.key?(:'service_account_key_decoded')
399
352
  self.service_account_key_decoded = attributes[:'service_account_key_decoded']
400
353
  end
@@ -710,11 +663,6 @@ module Akeyless
710
663
  def ==(o)
711
664
  return true if self.equal?(o)
712
665
  self.class == o.class &&
713
- _1password_email == o._1password_email &&
714
- _1password_password == o._1password_password &&
715
- _1password_secret_key == o._1password_secret_key &&
716
- _1password_url == o._1password_url &&
717
- _1password_vaults == o._1password_vaults &&
718
666
  service_account_key_decoded == o.service_account_key_decoded &&
719
667
  ad_auto_rotate == o.ad_auto_rotate &&
720
668
  ad_computer_base_dn == o.ad_computer_base_dn &&
@@ -785,7 +733,7 @@ module Akeyless
785
733
  # Calculates hash code according to all attributes.
786
734
  # @return [Integer] Hash code
787
735
  def hash
788
- [_1password_email, _1password_password, _1password_secret_key, _1password_url, _1password_vaults, service_account_key_decoded, ad_auto_rotate, ad_computer_base_dn, ad_discover_services, ad_discovery_types, ad_domain_name, ad_domain_users_path_template, ad_local_users_ignore, ad_local_users_path_template, ad_os_filter, ad_rotation_hour, ad_rotation_interval, ad_sra_enable_rdp, ad_ssh_port, ad_target_format, ad_target_name, ad_targets_path_template, ad_targets_type, ad_user_base_dn, ad_user_groups, ad_winrm_over_http, ad_winrm_port, ad_discover_local_users, aws_key, aws_key_id, aws_region, azure_client_id, azure_kv_name, azure_secret, azure_tenant_id, gcp_key, hashi_json, hashi_ns, hashi_token, hashi_url, json, k8s_ca_certificate, k8s_client_certificate, k8s_client_key, k8s_namespace, k8s_password, k8s_skip_system, k8s_token, k8s_url, k8s_username, name, protection_key, si_auto_rotate, si_rotation_hour, si_rotation_interval, si_sra_enable_rdp, si_target_name, si_user_groups, si_users_ignore, si_users_path_template, target_location, token, type, uid_token].hash
736
+ [service_account_key_decoded, ad_auto_rotate, ad_computer_base_dn, ad_discover_services, ad_discovery_types, ad_domain_name, ad_domain_users_path_template, ad_local_users_ignore, ad_local_users_path_template, ad_os_filter, ad_rotation_hour, ad_rotation_interval, ad_sra_enable_rdp, ad_ssh_port, ad_target_format, ad_target_name, ad_targets_path_template, ad_targets_type, ad_user_base_dn, ad_user_groups, ad_winrm_over_http, ad_winrm_port, ad_discover_local_users, aws_key, aws_key_id, aws_region, azure_client_id, azure_kv_name, azure_secret, azure_tenant_id, gcp_key, hashi_json, hashi_ns, hashi_token, hashi_url, json, k8s_ca_certificate, k8s_client_certificate, k8s_client_key, k8s_namespace, k8s_password, k8s_skip_system, k8s_token, k8s_url, k8s_username, name, protection_key, si_auto_rotate, si_rotation_hour, si_rotation_interval, si_sra_enable_rdp, si_target_name, si_user_groups, si_users_ignore, si_users_path_template, target_location, token, type, uid_token].hash
789
737
  end
790
738
 
791
739
  # Builds the object from hash
@@ -30,6 +30,9 @@ module Akeyless
30
30
  # Service account key algorithm, e.g. KEY_ALG_RSA_1024
31
31
  attr_accessor :gcp_key_algo
32
32
 
33
+ # GCP Project ID override for dynamic secret operations (tmp service accounts)
34
+ attr_accessor :gcp_project_id
35
+
33
36
  # The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
34
37
  attr_accessor :gcp_sa_email
35
38
 
@@ -74,6 +77,7 @@ module Akeyless
74
77
  :'gcp_cred_type' => :'gcp-cred-type',
75
78
  :'gcp_key' => :'gcp-key',
76
79
  :'gcp_key_algo' => :'gcp-key-algo',
80
+ :'gcp_project_id' => :'gcp-project-id',
77
81
  :'gcp_sa_email' => :'gcp-sa-email',
78
82
  :'gcp_token_scopes' => :'gcp-token-scopes',
79
83
  :'json' => :'json',
@@ -102,6 +106,7 @@ module Akeyless
102
106
  :'gcp_cred_type' => :'String',
103
107
  :'gcp_key' => :'String',
104
108
  :'gcp_key_algo' => :'String',
109
+ :'gcp_project_id' => :'String',
105
110
  :'gcp_sa_email' => :'String',
106
111
  :'gcp_token_scopes' => :'String',
107
112
  :'json' => :'Boolean',
@@ -158,6 +163,10 @@ module Akeyless
158
163
  self.gcp_key_algo = attributes[:'gcp_key_algo']
159
164
  end
160
165
 
166
+ if attributes.key?(:'gcp_project_id')
167
+ self.gcp_project_id = attributes[:'gcp_project_id']
168
+ end
169
+
161
170
  if attributes.key?(:'gcp_sa_email')
162
171
  self.gcp_sa_email = attributes[:'gcp_sa_email']
163
172
  end
@@ -252,6 +261,7 @@ module Akeyless
252
261
  gcp_cred_type == o.gcp_cred_type &&
253
262
  gcp_key == o.gcp_key &&
254
263
  gcp_key_algo == o.gcp_key_algo &&
264
+ gcp_project_id == o.gcp_project_id &&
255
265
  gcp_sa_email == o.gcp_sa_email &&
256
266
  gcp_token_scopes == o.gcp_token_scopes &&
257
267
  json == o.json &&
@@ -275,7 +285,7 @@ module Akeyless
275
285
  # Calculates hash code according to all attributes.
276
286
  # @return [Integer] Hash code
277
287
  def hash
278
- [custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
288
+ [custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
279
289
  end
280
290
 
281
291
  # Builds the object from hash
@@ -16,21 +16,6 @@ require 'time'
16
16
  module Akeyless
17
17
  # gatewayUpdateMigration is a command that update migration
18
18
  class GatewayUpdateMigration
19
- # 1Password user email to connect to the API
20
- attr_accessor :_1password_email
21
-
22
- # 1Password user password to connect to the API
23
- attr_accessor :_1password_password
24
-
25
- # 1Password user secret key to connect to the API
26
- attr_accessor :_1password_secret_key
27
-
28
- # 1Password api container url
29
- attr_accessor :_1password_url
30
-
31
- # 1Password list of vault to get the items from
32
- attr_accessor :_1password_vaults
33
-
34
19
  attr_accessor :service_account_key_decoded
35
20
 
36
21
  # Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration)
@@ -213,11 +198,6 @@ module Akeyless
213
198
  # Attribute mapping from ruby-style variable name to JSON key.
214
199
  def self.attribute_map
215
200
  {
216
- :'_1password_email' => :'1password-email',
217
- :'_1password_password' => :'1password-password',
218
- :'_1password_secret_key' => :'1password-secret-key',
219
- :'_1password_url' => :'1password-url',
220
- :'_1password_vaults' => :'1password-vaults',
221
201
  :'service_account_key_decoded' => :'ServiceAccountKeyDecoded',
222
202
  :'ad_auto_rotate' => :'ad-auto-rotate',
223
203
  :'ad_computer_base_dn' => :'ad-computer-base-dn',
@@ -289,11 +269,6 @@ module Akeyless
289
269
  # Attribute type mapping.
290
270
  def self.openapi_types
291
271
  {
292
- :'_1password_email' => :'String',
293
- :'_1password_password' => :'String',
294
- :'_1password_secret_key' => :'String',
295
- :'_1password_url' => :'String',
296
- :'_1password_vaults' => :'Array<String>',
297
272
  :'service_account_key_decoded' => :'String',
298
273
  :'ad_auto_rotate' => :'String',
299
274
  :'ad_computer_base_dn' => :'String',
@@ -378,28 +353,6 @@ module Akeyless
378
353
  h[k.to_sym] = v
379
354
  }
380
355
 
381
- if attributes.key?(:'_1password_email')
382
- self._1password_email = attributes[:'_1password_email']
383
- end
384
-
385
- if attributes.key?(:'_1password_password')
386
- self._1password_password = attributes[:'_1password_password']
387
- end
388
-
389
- if attributes.key?(:'_1password_secret_key')
390
- self._1password_secret_key = attributes[:'_1password_secret_key']
391
- end
392
-
393
- if attributes.key?(:'_1password_url')
394
- self._1password_url = attributes[:'_1password_url']
395
- end
396
-
397
- if attributes.key?(:'_1password_vaults')
398
- if (value = attributes[:'_1password_vaults']).is_a?(Array)
399
- self._1password_vaults = value
400
- end
401
- end
402
-
403
356
  if attributes.key?(:'service_account_key_decoded')
404
357
  self.service_account_key_decoded = attributes[:'service_account_key_decoded']
405
358
  end
@@ -712,11 +665,6 @@ module Akeyless
712
665
  def ==(o)
713
666
  return true if self.equal?(o)
714
667
  self.class == o.class &&
715
- _1password_email == o._1password_email &&
716
- _1password_password == o._1password_password &&
717
- _1password_secret_key == o._1password_secret_key &&
718
- _1password_url == o._1password_url &&
719
- _1password_vaults == o._1password_vaults &&
720
668
  service_account_key_decoded == o.service_account_key_decoded &&
721
669
  ad_auto_rotate == o.ad_auto_rotate &&
722
670
  ad_computer_base_dn == o.ad_computer_base_dn &&
@@ -788,7 +736,7 @@ module Akeyless
788
736
  # Calculates hash code according to all attributes.
789
737
  # @return [Integer] Hash code
790
738
  def hash
791
- [_1password_email, _1password_password, _1password_secret_key, _1password_url, _1password_vaults, service_account_key_decoded, ad_auto_rotate, ad_computer_base_dn, ad_discover_services, ad_discovery_types, ad_domain_name, ad_domain_users_path_template, ad_local_users_ignore, ad_local_users_path_template, ad_os_filter, ad_rotation_hour, ad_rotation_interval, ad_sra_enable_rdp, ad_ssh_port, ad_target_format, ad_target_name, ad_targets_path_template, ad_targets_type, ad_user_base_dn, ad_user_groups, ad_winrm_over_http, ad_winrm_port, ad_discover_local_users, aws_key, aws_key_id, aws_region, azure_client_id, azure_kv_name, azure_secret, azure_tenant_id, gcp_key, hashi_json, hashi_ns, hashi_token, hashi_url, id, json, k8s_ca_certificate, k8s_client_certificate, k8s_client_key, k8s_namespace, k8s_password, k8s_skip_system, k8s_token, k8s_url, k8s_username, name, new_name, protection_key, si_auto_rotate, si_rotation_hour, si_rotation_interval, si_sra_enable_rdp, si_target_name, si_user_groups, si_users_ignore, si_users_path_template, target_location, token, uid_token].hash
739
+ [service_account_key_decoded, ad_auto_rotate, ad_computer_base_dn, ad_discover_services, ad_discovery_types, ad_domain_name, ad_domain_users_path_template, ad_local_users_ignore, ad_local_users_path_template, ad_os_filter, ad_rotation_hour, ad_rotation_interval, ad_sra_enable_rdp, ad_ssh_port, ad_target_format, ad_target_name, ad_targets_path_template, ad_targets_type, ad_user_base_dn, ad_user_groups, ad_winrm_over_http, ad_winrm_port, ad_discover_local_users, aws_key, aws_key_id, aws_region, azure_client_id, azure_kv_name, azure_secret, azure_tenant_id, gcp_key, hashi_json, hashi_ns, hashi_token, hashi_url, id, json, k8s_ca_certificate, k8s_client_certificate, k8s_client_key, k8s_namespace, k8s_password, k8s_skip_system, k8s_token, k8s_url, k8s_username, name, new_name, protection_key, si_auto_rotate, si_rotation_hour, si_rotation_interval, si_sra_enable_rdp, si_target_name, si_user_groups, si_users_ignore, si_users_path_template, target_location, token, uid_token].hash
792
740
  end
793
741
 
794
742
  # Builds the object from hash
@@ -30,6 +30,9 @@ module Akeyless
30
30
  # Service account key algorithm, e.g. KEY_ALG_RSA_1024
31
31
  attr_accessor :gcp_key_algo
32
32
 
33
+ # GCP Project ID override for dynamic secret operations (tmp service accounts)
34
+ attr_accessor :gcp_project_id
35
+
33
36
  # The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed)
34
37
  attr_accessor :gcp_sa_email
35
38
 
@@ -77,6 +80,7 @@ module Akeyless
77
80
  :'gcp_cred_type' => :'gcp-cred-type',
78
81
  :'gcp_key' => :'gcp-key',
79
82
  :'gcp_key_algo' => :'gcp-key-algo',
83
+ :'gcp_project_id' => :'gcp-project-id',
80
84
  :'gcp_sa_email' => :'gcp-sa-email',
81
85
  :'gcp_token_scopes' => :'gcp-token-scopes',
82
86
  :'json' => :'json',
@@ -106,6 +110,7 @@ module Akeyless
106
110
  :'gcp_cred_type' => :'String',
107
111
  :'gcp_key' => :'String',
108
112
  :'gcp_key_algo' => :'String',
113
+ :'gcp_project_id' => :'String',
109
114
  :'gcp_sa_email' => :'String',
110
115
  :'gcp_token_scopes' => :'String',
111
116
  :'json' => :'Boolean',
@@ -163,6 +168,10 @@ module Akeyless
163
168
  self.gcp_key_algo = attributes[:'gcp_key_algo']
164
169
  end
165
170
 
171
+ if attributes.key?(:'gcp_project_id')
172
+ self.gcp_project_id = attributes[:'gcp_project_id']
173
+ end
174
+
166
175
  if attributes.key?(:'gcp_sa_email')
167
176
  self.gcp_sa_email = attributes[:'gcp_sa_email']
168
177
  end
@@ -261,6 +270,7 @@ module Akeyless
261
270
  gcp_cred_type == o.gcp_cred_type &&
262
271
  gcp_key == o.gcp_key &&
263
272
  gcp_key_algo == o.gcp_key_algo &&
273
+ gcp_project_id == o.gcp_project_id &&
264
274
  gcp_sa_email == o.gcp_sa_email &&
265
275
  gcp_token_scopes == o.gcp_token_scopes &&
266
276
  json == o.json &&
@@ -285,7 +295,7 @@ module Akeyless
285
295
  # Calculates hash code according to all attributes.
286
296
  # @return [Integer] Hash code
287
297
  def hash
288
- [custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
298
+ [custom_username_template, delete_protection, gcp_cred_type, gcp_key, gcp_key_algo, gcp_project_id, gcp_sa_email, gcp_token_scopes, json, name, new_name, producer_encryption_key_name, role_binding, service_account_type, tags, target_name, token, uid_token, user_ttl].hash
289
299
  end
290
300
 
291
301
  # Builds the object from hash
@@ -11,5 +11,5 @@ Generator version: 7.10.0
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '5.0.9'
14
+ VERSION = '5.0.11'
15
15
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: akeyless
3
3
  version: !ruby/object:Gem::Version
4
- version: 5.0.9
4
+ version: 5.0.11
5
5
  platform: ruby
6
6
  authors:
7
7
  - OpenAPI-Generator