akeyless 3.1.1 → 3.1.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +12 -1
- data/docs/AssocTargetItem.md +2 -0
- data/docs/CreateCertificate.md +3 -1
- data/docs/CreateClassicKey.md +6 -2
- data/docs/CreateDBTarget.md +4 -0
- data/docs/CreateDFCKey.md +3 -1
- data/docs/CreateDynamicSecret.md +3 -1
- data/docs/CreateKey.md +3 -1
- data/docs/CreatePKICertIssuer.md +3 -1
- data/docs/CreateRotatedSecret.md +3 -1
- data/docs/CreateSSHCertIssuer.md +3 -1
- data/docs/CreateSecret.md +3 -1
- data/docs/CreateTokenizer.md +3 -1
- data/docs/DSProducerDetails.md +8 -0
- data/docs/DecryptGPG.md +34 -0
- data/docs/DecryptGPGOutput.md +18 -0
- data/docs/EncryptGPG.md +32 -0
- data/docs/EncryptGPGOutput.md +18 -0
- data/docs/GatewayCreateProducerSnowflake.md +4 -0
- data/docs/GatewayUpdateItem.md +3 -1
- data/docs/GatewayUpdateProducerSnowflake.md +4 -0
- data/docs/GenCustomerFragment.md +4 -2
- data/docs/SignGPG.md +32 -0
- data/docs/SignGPGOutput.md +18 -0
- data/docs/TargetTypeDetailsInput.md +4 -0
- data/docs/UpdateDBTarget.md +4 -0
- data/docs/UpdateItem.md +3 -1
- data/docs/UpdatePKICertIssuer.md +3 -1
- data/docs/UpdateRotatedSecret.md +3 -1
- data/docs/UpdateSSHCertIssuer.md +3 -1
- data/docs/UploadPKCS12.md +3 -1
- data/docs/UploadRSA.md +3 -1
- data/docs/V2Api.md +252 -0
- data/docs/VerifyGPG.md +32 -0
- data/lib/akeyless/api/v2_api.rb +256 -0
- data/lib/akeyless/models/assoc_target_item.rb +11 -1
- data/lib/akeyless/models/create_certificate.rb +12 -2
- data/lib/akeyless/models/create_classic_key.rb +23 -3
- data/lib/akeyless/models/create_db_target.rb +21 -1
- data/lib/akeyless/models/create_dfc_key.rb +12 -2
- data/lib/akeyless/models/create_dynamic_secret.rb +12 -4
- data/lib/akeyless/models/create_key.rb +12 -2
- data/lib/akeyless/models/create_pki_cert_issuer.rb +12 -2
- data/lib/akeyless/models/create_rotated_secret.rb +12 -2
- data/lib/akeyless/models/create_secret.rb +12 -2
- data/lib/akeyless/models/create_ssh_cert_issuer.rb +12 -2
- data/lib/akeyless/models/create_tokenizer.rb +12 -2
- data/lib/akeyless/models/decrypt_gpg.rb +310 -0
- data/lib/akeyless/models/decrypt_gpg_output.rb +219 -0
- data/lib/akeyless/models/ds_producer_details.rb +40 -1
- data/lib/akeyless/models/encrypt_gpg.rb +300 -0
- data/lib/akeyless/models/encrypt_gpg_output.rb +219 -0
- data/lib/akeyless/models/gateway_create_producer_snowflake.rb +22 -2
- data/lib/akeyless/models/gateway_update_item.rb +14 -2
- data/lib/akeyless/models/gateway_update_producer_snowflake.rb +22 -2
- data/lib/akeyless/models/gen_customer_fragment.rb +15 -5
- data/lib/akeyless/models/sign_gpg.rb +300 -0
- data/lib/akeyless/models/sign_gpg_output.rb +219 -0
- data/lib/akeyless/models/target_type_details_input.rb +20 -1
- data/lib/akeyless/models/update_db_target.rb +21 -1
- data/lib/akeyless/models/update_item.rb +14 -2
- data/lib/akeyless/models/update_pki_cert_issuer.rb +12 -2
- data/lib/akeyless/models/update_rotated_secret.rb +14 -2
- data/lib/akeyless/models/update_ssh_cert_issuer.rb +12 -2
- data/lib/akeyless/models/upload_pkcs12.rb +12 -2
- data/lib/akeyless/models/upload_rsa.rb +12 -2
- data/lib/akeyless/models/verify_gpg.rb +300 -0
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +7 -0
- data/spec/models/decrypt_gpg_output_spec.rb +34 -0
- data/spec/models/decrypt_gpg_spec.rb +82 -0
- data/spec/models/encrypt_gpg_output_spec.rb +34 -0
- data/spec/models/encrypt_gpg_spec.rb +76 -0
- data/spec/models/sign_gpg_output_spec.rb +34 -0
- data/spec/models/sign_gpg_spec.rb +76 -0
- data/spec/models/verify_gpg_spec.rb +76 -0
- metadata +30 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e56a2468cbada14cb2e44fbb336e859b031de7455d693660bc48b528cae0bcf7
|
4
|
+
data.tar.gz: 88ed448409ec1ac0360cac27981d8ef5b3f841aad4c5e7c90646c4e5414a4f7f
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fc015d3d3155716a0b5909b67765dc9d74a9870b665b79c6de24add1a45a31d81a5f7647b9c582949a2749fbb1203ed472857ae403b7150d2ff32e900f6a5765
|
7
|
+
data.tar.gz: 4b4ed50ffbb2338c1e0e1f824dfdaa0e2fc0a271fc63651cfb1dca58234ff2d36ddea25c62e8b018c41eb543b775f555515799b38ca2b780e39c5f1b59b0e68f
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 2.0
|
10
|
-
- Package version: 3.1.
|
10
|
+
- Package version: 3.1.2
|
11
11
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
12
12
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
13
13
|
|
@@ -104,6 +104,7 @@ Class | Method | HTTP request | Description
|
|
104
104
|
*Akeyless::V2Api* | [**create_web_target**](docs/V2Api.md#create_web_target) | **POST** /create-web-target |
|
105
105
|
*Akeyless::V2Api* | [**createldap_target**](docs/V2Api.md#createldap_target) | **POST** /create-ldap-target |
|
106
106
|
*Akeyless::V2Api* | [**decrypt**](docs/V2Api.md#decrypt) | **POST** /decrypt |
|
107
|
+
*Akeyless::V2Api* | [**decrypt_gpg**](docs/V2Api.md#decrypt_gpg) | **POST** /decrypt-gpg |
|
107
108
|
*Akeyless::V2Api* | [**decrypt_pkcs1**](docs/V2Api.md#decrypt_pkcs1) | **POST** /decrypt-pkcs1 |
|
108
109
|
*Akeyless::V2Api* | [**decrypt_with_classic_key**](docs/V2Api.md#decrypt_with_classic_key) | **POST** /decrypt-with-classic-key |
|
109
110
|
*Akeyless::V2Api* | [**delete_auth_method**](docs/V2Api.md#delete_auth_method) | **POST** /delete-auth-method |
|
@@ -123,6 +124,7 @@ Class | Method | HTTP request | Description
|
|
123
124
|
*Akeyless::V2Api* | [**describe_sub_claims**](docs/V2Api.md#describe_sub_claims) | **POST** /describe-sub-claims |
|
124
125
|
*Akeyless::V2Api* | [**detokenize**](docs/V2Api.md#detokenize) | **POST** /detokenize |
|
125
126
|
*Akeyless::V2Api* | [**encrypt**](docs/V2Api.md#encrypt) | **POST** /encrypt |
|
127
|
+
*Akeyless::V2Api* | [**encrypt_gpg**](docs/V2Api.md#encrypt_gpg) | **POST** /encrypt-gpg |
|
126
128
|
*Akeyless::V2Api* | [**encrypt_with_classic_key**](docs/V2Api.md#encrypt_with_classic_key) | **POST** /encrypt-with-classic-key |
|
127
129
|
*Akeyless::V2Api* | [**export_classic_key**](docs/V2Api.md#export_classic_key) | **POST** /export-classic-key |
|
128
130
|
*Akeyless::V2Api* | [**gateway_create_k8_s_auth_config**](docs/V2Api.md#gateway_create_k8_s_auth_config) | **POST** /gateway-create-k8s-auth-config |
|
@@ -246,6 +248,7 @@ Class | Method | HTTP request | Description
|
|
246
248
|
*Akeyless::V2Api* | [**set_item_state**](docs/V2Api.md#set_item_state) | **POST** /set-item-state |
|
247
249
|
*Akeyless::V2Api* | [**set_role_rule**](docs/V2Api.md#set_role_rule) | **POST** /set-role-rule |
|
248
250
|
*Akeyless::V2Api* | [**share_item**](docs/V2Api.md#share_item) | **POST** /share-item |
|
251
|
+
*Akeyless::V2Api* | [**sign_gpg**](docs/V2Api.md#sign_gpg) | **POST** /sign-gpg |
|
249
252
|
*Akeyless::V2Api* | [**sign_jwt_with_classic_key**](docs/V2Api.md#sign_jwt_with_classic_key) | **POST** /sign-jwt-with-classic-key |
|
250
253
|
*Akeyless::V2Api* | [**sign_pkcs1**](docs/V2Api.md#sign_pkcs1) | **POST** /sign-pkcs1 |
|
251
254
|
*Akeyless::V2Api* | [**sign_pki_cert_with_classic_key**](docs/V2Api.md#sign_pki_cert_with_classic_key) | **POST** /sign-pki-cert-with-classic-key |
|
@@ -304,6 +307,7 @@ Class | Method | HTTP request | Description
|
|
304
307
|
*Akeyless::V2Api* | [**update_web_target_details**](docs/V2Api.md#update_web_target_details) | **POST** /update-web-target-details |
|
305
308
|
*Akeyless::V2Api* | [**upload_rsa**](docs/V2Api.md#upload_rsa) | **POST** /upload-rsa |
|
306
309
|
*Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
|
310
|
+
*Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
|
307
311
|
*Akeyless::V2Api* | [**verify_jwt_with_classic_key**](docs/V2Api.md#verify_jwt_with_classic_key) | **POST** /verify-jwt-with-classic-key |
|
308
312
|
*Akeyless::V2Api* | [**verify_pkcs1**](docs/V2Api.md#verify_pkcs1) | **POST** /verify-pkcs1 |
|
309
313
|
*Akeyless::V2Api* | [**verify_pki_cert_with_classic_key**](docs/V2Api.md#verify_pki_cert_with_classic_key) | **POST** /verify-pki-cert-with-classic-key |
|
@@ -440,6 +444,8 @@ Class | Method | HTTP request | Description
|
|
440
444
|
- [Akeyless::Decrypt](docs/Decrypt.md)
|
441
445
|
- [Akeyless::DecryptFile](docs/DecryptFile.md)
|
442
446
|
- [Akeyless::DecryptFileOutput](docs/DecryptFileOutput.md)
|
447
|
+
- [Akeyless::DecryptGPG](docs/DecryptGPG.md)
|
448
|
+
- [Akeyless::DecryptGPGOutput](docs/DecryptGPGOutput.md)
|
443
449
|
- [Akeyless::DecryptOutput](docs/DecryptOutput.md)
|
444
450
|
- [Akeyless::DecryptPKCS1](docs/DecryptPKCS1.md)
|
445
451
|
- [Akeyless::DecryptPKCS1Output](docs/DecryptPKCS1Output.md)
|
@@ -478,6 +484,8 @@ Class | Method | HTTP request | Description
|
|
478
484
|
- [Akeyless::Encrypt](docs/Encrypt.md)
|
479
485
|
- [Akeyless::EncryptFile](docs/EncryptFile.md)
|
480
486
|
- [Akeyless::EncryptFileOutput](docs/EncryptFileOutput.md)
|
487
|
+
- [Akeyless::EncryptGPG](docs/EncryptGPG.md)
|
488
|
+
- [Akeyless::EncryptGPGOutput](docs/EncryptGPGOutput.md)
|
481
489
|
- [Akeyless::EncryptOutput](docs/EncryptOutput.md)
|
482
490
|
- [Akeyless::EncryptWithClassicKey](docs/EncryptWithClassicKey.md)
|
483
491
|
- [Akeyless::EncryptWithClassicKeyOutput](docs/EncryptWithClassicKeyOutput.md)
|
@@ -772,6 +780,8 @@ Class | Method | HTTP request | Description
|
|
772
780
|
- [Akeyless::SetItemState](docs/SetItemState.md)
|
773
781
|
- [Akeyless::SetRoleRule](docs/SetRoleRule.md)
|
774
782
|
- [Akeyless::ShareItem](docs/ShareItem.md)
|
783
|
+
- [Akeyless::SignGPG](docs/SignGPG.md)
|
784
|
+
- [Akeyless::SignGPGOutput](docs/SignGPGOutput.md)
|
775
785
|
- [Akeyless::SignJWTOutput](docs/SignJWTOutput.md)
|
776
786
|
- [Akeyless::SignJWTWithClassicKey](docs/SignJWTWithClassicKey.md)
|
777
787
|
- [Akeyless::SignPKCS1](docs/SignPKCS1.md)
|
@@ -888,6 +898,7 @@ Class | Method | HTTP request | Description
|
|
888
898
|
- [Akeyless::ValidateToken](docs/ValidateToken.md)
|
889
899
|
- [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
|
890
900
|
- [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
|
901
|
+
- [Akeyless::VerifyGPG](docs/VerifyGPG.md)
|
891
902
|
- [Akeyless::VerifyJWTOutput](docs/VerifyJWTOutput.md)
|
892
903
|
- [Akeyless::VerifyJWTWithClassicKey](docs/VerifyJWTWithClassicKey.md)
|
893
904
|
- [Akeyless::VerifyPKCS1](docs/VerifyPKCS1.md)
|
data/docs/AssocTargetItem.md
CHANGED
@@ -4,6 +4,7 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **disable_previous_key_version** | **Boolean** | Automatically disable previous key version (required for azure targets) | [optional] |
|
7
8
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
8
9
|
| **key_operations** | **Array<String>** | A list of allowed operations for the key (required for azure targets) | [optional] |
|
9
10
|
| **keyring_name** | **String** | Keyring name of the GCP KMS (required for gcp targets) | [optional] |
|
@@ -26,6 +27,7 @@
|
|
26
27
|
require 'akeyless'
|
27
28
|
|
28
29
|
instance = Akeyless::AssocTargetItem.new(
|
30
|
+
disable_previous_key_version: null,
|
29
31
|
json: null,
|
30
32
|
key_operations: null,
|
31
33
|
keyring_name: null,
|
data/docs/CreateCertificate.md
CHANGED
@@ -6,11 +6,12 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **certificate_data** | **String** | Content of the certificate PEM in a Base64 format. | [optional] |
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
9
|
+
| **description** | **String** | Description of the object | [optional] |
|
9
10
|
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
10
11
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
12
|
| **key** | **String** | The name of a key to use to encrypt the certificate's key (if empty, the account default protectionKey key will be used) | [optional] |
|
12
13
|
| **key_data** | **String** | Content of the certificate's private key PEM in a Base64 format. | [optional] |
|
13
|
-
| **metadata** | **String** |
|
14
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
14
15
|
| **name** | **String** | Certificate name | |
|
15
16
|
| **tags** | **Array<String>** | List of the tags attached to this certificate | [optional] |
|
16
17
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -24,6 +25,7 @@ require 'akeyless'
|
|
24
25
|
instance = Akeyless::CreateCertificate.new(
|
25
26
|
certificate_data: null,
|
26
27
|
delete_protection: null,
|
28
|
+
description: null,
|
27
29
|
expiration_event_in: null,
|
28
30
|
json: null,
|
29
31
|
key: null,
|
data/docs/CreateClassicKey.md
CHANGED
@@ -4,12 +4,14 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
-
| **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384] | |
|
7
|
+
| **alg** | **String** | Classic Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, RSA1024, RSA2048, RSA3072, RSA4096, EC256, EC384, GPG] | |
|
8
8
|
| **cert_file_data** | **String** | Certificate in a PEM format. | [optional] |
|
9
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
10
|
+
| **description** | **String** | Description of the object | [optional] |
|
11
|
+
| **gpg_alg** | **String** | gpg alg: Relevant only if GPG key type selected; options: [RSA1024, RSA2048, RSA3072, RSA4096, Ed25519] | [optional] |
|
10
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
13
|
| **key_data** | **String** | Base64-encoded classic key value | [optional] |
|
12
|
-
| **metadata** | **String** |
|
14
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
13
15
|
| **name** | **String** | ClassicKey name | |
|
14
16
|
| **protection_key_name** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
15
17
|
| **tags** | **Array<String>** | List of the tags attached to this classic key | [optional] |
|
@@ -25,6 +27,8 @@ instance = Akeyless::CreateClassicKey.new(
|
|
25
27
|
alg: null,
|
26
28
|
cert_file_data: null,
|
27
29
|
delete_protection: null,
|
30
|
+
description: null,
|
31
|
+
gpg_alg: null,
|
28
32
|
json: null,
|
29
33
|
key_data: null,
|
30
34
|
metadata: null,
|
data/docs/CreateDBTarget.md
CHANGED
@@ -23,6 +23,8 @@
|
|
23
23
|
| **port** | **String** | | [optional] |
|
24
24
|
| **pwd** | **String** | | [optional] |
|
25
25
|
| **snowflake_account** | **String** | | [optional] |
|
26
|
+
| **snowflake_api_private_key** | **String** | RSA Private key (base64 encoded) | [optional] |
|
27
|
+
| **snowflake_api_private_key_password** | **String** | The Private key passphrase | [optional] |
|
26
28
|
| **ssl** | **Boolean** | SSL connection mode | [optional] |
|
27
29
|
| **ssl_certificate** | **String** | SSL connection certificate | [optional] |
|
28
30
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -54,6 +56,8 @@ instance = Akeyless::CreateDBTarget.new(
|
|
54
56
|
port: null,
|
55
57
|
pwd: null,
|
56
58
|
snowflake_account: null,
|
59
|
+
snowflake_api_private_key: null,
|
60
|
+
snowflake_api_private_key_password: null,
|
57
61
|
ssl: null,
|
58
62
|
ssl_certificate: null,
|
59
63
|
token: null,
|
data/docs/CreateDFCKey.md
CHANGED
@@ -7,8 +7,9 @@
|
|
7
7
|
| **alg** | **String** | DFCKey type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
|
8
8
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to create the DFC key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
9
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
10
|
+
| **description** | **String** | Description of the object | [optional] |
|
10
11
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
-
| **metadata** | **String** |
|
12
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
12
13
|
| **name** | **String** | DFCKey name | |
|
13
14
|
| **split_level** | **Integer** | The number of fragments that the item will be split into (not includes customer fragment) | [optional][default to 3] |
|
14
15
|
| **tag** | **Array<String>** | List of the tags attached to this DFC key | [optional] |
|
@@ -24,6 +25,7 @@ instance = Akeyless::CreateDFCKey.new(
|
|
24
25
|
alg: null,
|
25
26
|
customer_frg_id: null,
|
26
27
|
delete_protection: null,
|
28
|
+
description: null,
|
27
29
|
json: null,
|
28
30
|
metadata: null,
|
29
31
|
name: null,
|
data/docs/CreateDynamicSecret.md
CHANGED
@@ -5,9 +5,10 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
8
|
+
| **description** | **String** | Description of the object | [optional] |
|
8
9
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
9
10
|
| **key** | **String** | The name of a key that used to encrypt the dynamic secret values (if empty, the account default protectionKey key will be used) | [optional] |
|
10
|
-
| **metadata** | **String** |
|
11
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
11
12
|
| **name** | **String** | Dynamic secret name | |
|
12
13
|
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
13
14
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -20,6 +21,7 @@ require 'akeyless'
|
|
20
21
|
|
21
22
|
instance = Akeyless::CreateDynamicSecret.new(
|
22
23
|
delete_protection: null,
|
24
|
+
description: null,
|
23
25
|
json: null,
|
24
26
|
key: null,
|
25
27
|
metadata: null,
|
data/docs/CreateKey.md
CHANGED
@@ -7,8 +7,9 @@
|
|
7
7
|
| **alg** | **String** | Key type; options: [AES128GCM, AES256GCM, AES128SIV, AES256SIV, AES128CBC, AES256CBC, RSA1024, RSA2048, RSA3072, RSA4096] | |
|
8
8
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to create the key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
9
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
10
|
+
| **description** | **String** | Description of the object | [optional] |
|
10
11
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
-
| **metadata** | **String** |
|
12
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
12
13
|
| **name** | **String** | Key name | |
|
13
14
|
| **split_level** | **Integer** | The number of fragments that the item will be split into (not includes customer fragment) | [optional][default to 2] |
|
14
15
|
| **tag** | **Array<String>** | List of the tags attached to this key | [optional] |
|
@@ -24,6 +25,7 @@ instance = Akeyless::CreateKey.new(
|
|
24
25
|
alg: null,
|
25
26
|
customer_frg_id: null,
|
26
27
|
delete_protection: null,
|
28
|
+
description: null,
|
27
29
|
json: null,
|
28
30
|
metadata: null,
|
29
31
|
name: null,
|
data/docs/CreatePKICertIssuer.md
CHANGED
@@ -12,10 +12,11 @@
|
|
12
12
|
| **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
|
13
13
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
14
14
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
15
|
+
| **description** | **String** | Description of the object | [optional] |
|
15
16
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
16
17
|
| **key_usage** | **String** | key-usage | [optional][default to 'DigitalSignature,KeyAgreement,KeyEncipherment'] |
|
17
18
|
| **locality** | **String** | A comma-separated list of localities that will be set in the issued certificate | [optional] |
|
18
|
-
| **metadata** | **String** |
|
19
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
19
20
|
| **name** | **String** | PKI certificate issuer name | |
|
20
21
|
| **not_enforce_hostnames** | **Boolean** | If set, any names are allowed for CN and SANs in the certificate and not only a valid host name | [optional] |
|
21
22
|
| **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::CreatePKICertIssuer.new(
|
|
45
46
|
code_signing_flag: null,
|
46
47
|
country: null,
|
47
48
|
delete_protection: null,
|
49
|
+
description: null,
|
48
50
|
json: null,
|
49
51
|
key_usage: null,
|
50
52
|
locality: null,
|
data/docs/CreateRotatedSecret.md
CHANGED
@@ -12,10 +12,11 @@
|
|
12
12
|
| **aws_region** | **String** | Region (used in aws) | [optional][default to 'us-east-2'] |
|
13
13
|
| **custom_payload** | **String** | | [optional] |
|
14
14
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
15
|
+
| **description** | **String** | Description of the object | [optional] |
|
15
16
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
16
17
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
17
18
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
18
|
-
| **metadata** | **String** |
|
19
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
19
20
|
| **name** | **String** | Secret name | |
|
20
21
|
| **rotated_password** | **String** | | [optional] |
|
21
22
|
| **rotated_username** | **String** | | [optional] |
|
@@ -61,6 +62,7 @@ instance = Akeyless::CreateRotatedSecret.new(
|
|
61
62
|
aws_region: null,
|
62
63
|
custom_payload: null,
|
63
64
|
delete_protection: null,
|
65
|
+
description: null,
|
64
66
|
gcp_key: null,
|
65
67
|
json: null,
|
66
68
|
key: null,
|
data/docs/CreateSSHCertIssuer.md
CHANGED
@@ -6,9 +6,10 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **allowed_users** | **String** | Users allowed to fetch the certificate, e.g root,ubuntu | |
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
9
|
+
| **description** | **String** | Description of the object | [optional] |
|
9
10
|
| **extensions** | **Hash<String, String>** | Signed certificates with extensions, e.g permit-port-forwarding=\\\"\\\" | [optional] |
|
10
11
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
-
| **metadata** | **String** |
|
12
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
12
13
|
| **name** | **String** | SSH certificate issuer name | |
|
13
14
|
| **principals** | **String** | Signed certificates with principal, e.g example_role1,example_role2 | [optional] |
|
14
15
|
| **secure_access_bastion_api** | **String** | | [optional] |
|
@@ -31,6 +32,7 @@ require 'akeyless'
|
|
31
32
|
instance = Akeyless::CreateSSHCertIssuer.new(
|
32
33
|
allowed_users: null,
|
33
34
|
delete_protection: null,
|
35
|
+
description: null,
|
34
36
|
extensions: null,
|
35
37
|
json: null,
|
36
38
|
metadata: null,
|
data/docs/CreateSecret.md
CHANGED
@@ -6,8 +6,9 @@
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
9
|
+
| **description** | **String** | Description of the object | [optional] |
|
9
10
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
10
|
-
| **metadata** | **String** |
|
11
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
11
12
|
| **multiline_value** | **Boolean** | The provided value is a multiline value (separated by '\\n') | [optional] |
|
12
13
|
| **name** | **String** | Secret name | |
|
13
14
|
| **password_manager_custom_field** | **Hash<String, String>** | For Password Management use, additional fields | [optional] |
|
@@ -37,6 +38,7 @@ require 'akeyless'
|
|
37
38
|
instance = Akeyless::CreateSecret.new(
|
38
39
|
accessibility: null,
|
39
40
|
delete_protection: null,
|
41
|
+
description: null,
|
40
42
|
json: null,
|
41
43
|
metadata: null,
|
42
44
|
multiline_value: null,
|
data/docs/CreateTokenizer.md
CHANGED
@@ -7,10 +7,11 @@
|
|
7
7
|
| **alphabet** | **String** | Alphabet to use in regexp vaultless tokenization | [optional] |
|
8
8
|
| **decoding_template** | **String** | The Decoding output template to use in regexp vaultless tokenization | [optional] |
|
9
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
10
|
+
| **description** | **String** | Description of the object | [optional] |
|
10
11
|
| **encoding_template** | **String** | The Encoding output template to use in regexp vaultless tokenization | [optional] |
|
11
12
|
| **encryption_key_name** | **String** | AES key name to use in vaultless tokenization | [optional] |
|
12
13
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
13
|
-
| **metadata** | **String** |
|
14
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
14
15
|
| **name** | **String** | Tokenizer name | |
|
15
16
|
| **pattern** | **String** | Pattern to use in regexp vaultless tokenization | [optional] |
|
16
17
|
| **tag** | **Array<String>** | List of the tags attached to this key | [optional] |
|
@@ -29,6 +30,7 @@ instance = Akeyless::CreateTokenizer.new(
|
|
29
30
|
alphabet: null,
|
30
31
|
decoding_template: null,
|
31
32
|
delete_protection: null,
|
33
|
+
description: null,
|
32
34
|
encoding_template: null,
|
33
35
|
encryption_key_name: null,
|
34
36
|
json: null,
|
data/docs/DSProducerDetails.md
CHANGED
@@ -52,6 +52,8 @@
|
|
52
52
|
| **db_max_open_conns** | **String** | | [optional] |
|
53
53
|
| **db_name** | **String** | | [optional] |
|
54
54
|
| **db_port** | **String** | | [optional] |
|
55
|
+
| **db_private_key** | **String** | (Optional) Private Key in PEM format | [optional] |
|
56
|
+
| **db_private_key_passphrase** | **String** | | [optional] |
|
55
57
|
| **db_pwd** | **String** | | [optional] |
|
56
58
|
| **db_server_certificates** | **String** | (Optional) DBServerCertificates defines the set of root certificate authorities that clients use when verifying server certificates. If DBServerCertificates is empty, TLS uses the host's root CA set. | [optional] |
|
57
59
|
| **db_server_name** | **String** | (Optional) ServerName is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address. | [optional] |
|
@@ -102,9 +104,11 @@
|
|
102
104
|
| **implementation_type** | **String** | | [optional] |
|
103
105
|
| **is_fixed_user** | **String** | | [optional] |
|
104
106
|
| **item_targets_assoc** | [**Array<ItemTargetAssociation>**](ItemTargetAssociation.md) | | [optional] |
|
107
|
+
| **k8s_allowed_namespaces** | **String** | comma-separated list of allowed namespaces. Can hold just * which signifies that any namespace is allowed | [optional] |
|
105
108
|
| **k8s_bearer_token** | **String** | | [optional] |
|
106
109
|
| **k8s_cluster_ca_certificate** | **String** | | [optional] |
|
107
110
|
| **k8s_cluster_endpoint** | **String** | | [optional] |
|
111
|
+
| **k8s_dynamic_mode** | **Boolean** | when native k8s is in dynamic mode, user can define allowed namespaces, K8sServiceAccount doesn't exist from the start and will only be created at time of getting dynamic secret value By default dynamic mode is false and producer behaves like it did before | [optional] |
|
108
112
|
| **k8s_namespace** | **String** | | [optional] |
|
109
113
|
| **k8s_service_account** | **String** | | [optional] |
|
110
114
|
| **last_admin_rotation** | **Integer** | | [optional] |
|
@@ -237,6 +241,8 @@ instance = Akeyless::DSProducerDetails.new(
|
|
237
241
|
db_max_open_conns: null,
|
238
242
|
db_name: null,
|
239
243
|
db_port: null,
|
244
|
+
db_private_key: null,
|
245
|
+
db_private_key_passphrase: null,
|
240
246
|
db_pwd: null,
|
241
247
|
db_server_certificates: null,
|
242
248
|
db_server_name: null,
|
@@ -287,9 +293,11 @@ instance = Akeyless::DSProducerDetails.new(
|
|
287
293
|
implementation_type: null,
|
288
294
|
is_fixed_user: null,
|
289
295
|
item_targets_assoc: null,
|
296
|
+
k8s_allowed_namespaces: null,
|
290
297
|
k8s_bearer_token: null,
|
291
298
|
k8s_cluster_ca_certificate: null,
|
292
299
|
k8s_cluster_endpoint: null,
|
300
|
+
k8s_dynamic_mode: null,
|
293
301
|
k8s_namespace: null,
|
294
302
|
k8s_service_account: null,
|
295
303
|
last_admin_rotation: null,
|
data/docs/DecryptGPG.md
ADDED
@@ -0,0 +1,34 @@
|
|
1
|
+
# Akeyless::DecryptGPG
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **ciphertext** | **String** | Ciphertext to be decrypted in base64 encoded format | |
|
8
|
+
| **display_id** | **String** | The display id of the key to use in the decryption process | [optional] |
|
9
|
+
| **item_id** | **Integer** | The item id of the key to use in the decryption process | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
+
| **key_name** | **String** | The name of the key to use in the decryption process | |
|
12
|
+
| **output_format** | **String** | If specified, the output will be formatted accordingly. options: [base64] | [optional] |
|
13
|
+
| **passphrase** | **String** | Passphrase that was used to generate the key | [optional] |
|
14
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
15
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
16
|
+
|
17
|
+
## Example
|
18
|
+
|
19
|
+
```ruby
|
20
|
+
require 'akeyless'
|
21
|
+
|
22
|
+
instance = Akeyless::DecryptGPG.new(
|
23
|
+
ciphertext: null,
|
24
|
+
display_id: null,
|
25
|
+
item_id: null,
|
26
|
+
json: null,
|
27
|
+
key_name: null,
|
28
|
+
output_format: null,
|
29
|
+
passphrase: null,
|
30
|
+
token: null,
|
31
|
+
uid_token: null
|
32
|
+
)
|
33
|
+
```
|
34
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::DecryptGPGOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::DecryptGPGOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
data/docs/EncryptGPG.md
ADDED
@@ -0,0 +1,32 @@
|
|
1
|
+
# Akeyless::EncryptGPG
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **display_id** | **String** | The display id of the key to use in the encryption process | [optional] |
|
8
|
+
| **input_format** | **String** | If specified, the plaintext input is assumed to be formatted accordingly. Current supported options: [base64] | [optional] |
|
9
|
+
| **item_id** | **Integer** | The item id of the key to use in the encryption process | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
+
| **key_name** | **String** | The name of the key to use in the encryption process | |
|
12
|
+
| **plaintext** | **String** | Data to be encrypted | |
|
13
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
15
|
+
|
16
|
+
## Example
|
17
|
+
|
18
|
+
```ruby
|
19
|
+
require 'akeyless'
|
20
|
+
|
21
|
+
instance = Akeyless::EncryptGPG.new(
|
22
|
+
display_id: null,
|
23
|
+
input_format: null,
|
24
|
+
item_id: null,
|
25
|
+
json: null,
|
26
|
+
key_name: null,
|
27
|
+
plaintext: null,
|
28
|
+
token: null,
|
29
|
+
uid_token: null
|
30
|
+
)
|
31
|
+
```
|
32
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::EncryptGPGOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::EncryptGPGOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -11,6 +11,8 @@
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
13
13
|
| **name** | **String** | Producer name | |
|
14
|
+
| **private_key** | **String** | RSA Private key (base64 encoded) | [optional] |
|
15
|
+
| **private_key_passphrase** | **String** | The Private key passphrase | [optional] |
|
14
16
|
| **role** | **String** | User role | [optional] |
|
15
17
|
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
16
18
|
| **target_name** | **String** | Target name | [optional] |
|
@@ -32,6 +34,8 @@ instance = Akeyless::GatewayCreateProducerSnowflake.new(
|
|
32
34
|
delete_protection: null,
|
33
35
|
json: null,
|
34
36
|
name: null,
|
37
|
+
private_key: null,
|
38
|
+
private_key_passphrase: null,
|
35
39
|
role: null,
|
36
40
|
tags: null,
|
37
41
|
target_name: null,
|
data/docs/GatewayUpdateItem.md
CHANGED
@@ -10,12 +10,13 @@
|
|
10
10
|
| **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation | [optional] |
|
11
11
|
| **custom_payload** | **String** | | [optional] |
|
12
12
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
13
|
+
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
13
14
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
14
15
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
15
16
|
| **keep_prev_version** | **String** | | [optional] |
|
16
17
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
17
18
|
| **name** | **String** | Item name | |
|
18
|
-
| **new_metadata** | **String** |
|
19
|
+
| **new_metadata** | **String** | Deprecated - use description | [optional][default to 'default_metadata'] |
|
19
20
|
| **new_name** | **String** | New item name | [optional] |
|
20
21
|
| **new_version** | **Boolean** | Deprecated | [optional] |
|
21
22
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
@@ -40,6 +41,7 @@ instance = Akeyless::GatewayUpdateItem.new(
|
|
40
41
|
auto_rotate: null,
|
41
42
|
custom_payload: null,
|
42
43
|
delete_protection: null,
|
44
|
+
description: null,
|
43
45
|
gcp_key: null,
|
44
46
|
json: null,
|
45
47
|
keep_prev_version: null,
|
@@ -12,6 +12,8 @@
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
13
13
|
| **name** | **String** | Producer name | |
|
14
14
|
| **new_name** | **String** | Producer name | [optional] |
|
15
|
+
| **private_key** | **String** | RSA Private key (base64 encoded) | [optional] |
|
16
|
+
| **private_key_passphrase** | **String** | The Private key passphrase | [optional] |
|
15
17
|
| **role** | **String** | User role | [optional] |
|
16
18
|
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
17
19
|
| **target_name** | **String** | Target name | [optional] |
|
@@ -34,6 +36,8 @@ instance = Akeyless::GatewayUpdateProducerSnowflake.new(
|
|
34
36
|
json: null,
|
35
37
|
name: null,
|
36
38
|
new_name: null,
|
39
|
+
private_key: null,
|
40
|
+
private_key_passphrase: null,
|
37
41
|
role: null,
|
38
42
|
tags: null,
|
39
43
|
target_name: null,
|
data/docs/GenCustomerFragment.md
CHANGED
@@ -4,8 +4,9 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
-
| **description** | **String** |
|
7
|
+
| **description** | **String** | Description of the object | [optional] |
|
8
8
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
9
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
9
10
|
|
10
11
|
## Example
|
11
12
|
|
@@ -14,7 +15,8 @@ require 'akeyless'
|
|
14
15
|
|
15
16
|
instance = Akeyless::GenCustomerFragment.new(
|
16
17
|
description: null,
|
17
|
-
json: null
|
18
|
+
json: null,
|
19
|
+
metadata: null
|
18
20
|
)
|
19
21
|
```
|
20
22
|
|
data/docs/SignGPG.md
ADDED
@@ -0,0 +1,32 @@
|
|
1
|
+
# Akeyless::SignGPG
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **display_id** | **String** | The display id of the key to use in the encryption process | [optional] |
|
8
|
+
| **item_id** | **Integer** | The item id of the key to use in the encryption process | [optional] |
|
9
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
10
|
+
| **key_name** | **String** | The name of the key to use in the encryption process | |
|
11
|
+
| **message** | **String** | The message to be signed in base64 format | |
|
12
|
+
| **passphrase** | **String** | Passphrase that was used to generate the key | [optional] |
|
13
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
15
|
+
|
16
|
+
## Example
|
17
|
+
|
18
|
+
```ruby
|
19
|
+
require 'akeyless'
|
20
|
+
|
21
|
+
instance = Akeyless::SignGPG.new(
|
22
|
+
display_id: null,
|
23
|
+
item_id: null,
|
24
|
+
json: null,
|
25
|
+
key_name: null,
|
26
|
+
message: null,
|
27
|
+
passphrase: null,
|
28
|
+
token: null,
|
29
|
+
uid_token: null
|
30
|
+
)
|
31
|
+
```
|
32
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::SignGPGOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::SignGPGOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -32,6 +32,8 @@
|
|
32
32
|
| **db_host_name** | **String** | | [optional] |
|
33
33
|
| **db_name** | **String** | | [optional] |
|
34
34
|
| **db_port** | **String** | | [optional] |
|
35
|
+
| **db_private_key** | **String** | (Optional) Private Key in PEM format | [optional] |
|
36
|
+
| **db_private_key_passphrase** | **String** | | [optional] |
|
35
37
|
| **db_pwd** | **String** | | [optional] |
|
36
38
|
| **db_server_certificates** | **String** | (Optional) DBServerCertificates defines the set of root certificate authorities that clients use when verifying server certificates. If DBServerCertificates is empty, TLS uses the host's root CA set. | [optional] |
|
37
39
|
| **db_server_name** | **String** | (Optional) ServerName is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address. | [optional] |
|
@@ -132,6 +134,8 @@ instance = Akeyless::TargetTypeDetailsInput.new(
|
|
132
134
|
db_host_name: null,
|
133
135
|
db_name: null,
|
134
136
|
db_port: null,
|
137
|
+
db_private_key: null,
|
138
|
+
db_private_key_passphrase: null,
|
135
139
|
db_pwd: null,
|
136
140
|
db_server_certificates: null,
|
137
141
|
db_server_name: null,
|