akeyless 3.2.5 → 3.2.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 59f752f1591f7b747301281eba083436551a31954894842ba575b984450e86cd
4
- data.tar.gz: c8fe8b3b75defbfb93f5eafa2e28b2d00e1e77f13dbf1a96eaca7c45fb7c2d77
3
+ metadata.gz: 7b5adeb6eea4c4703cbf08e95fe0c8ecf7311d78986e58b327f1fe5bd1c2b268
4
+ data.tar.gz: e2d2a2b7a18c29ca1a66bf47efe63ef2cfef4de13bb9b2c4a63f862cc0a9fc36
5
5
  SHA512:
6
- metadata.gz: b306506795ceb92cccb951e34a5082974b791566858b97f03eedc22b70a4b3537105b3e787827ed4502919b7b748a5f5890c4db3cafb9a34c767a406f8595581
7
- data.tar.gz: 02ffa2c2bed03f40d8621344bdcd5d3e78e643cad7b6e270051b3cf02671d71b3cddf9007c15be61f2ad70693bb0142f03001b9bf2728fdb124b831d3d8b7664
6
+ metadata.gz: 9a59b25969f842c849269352b611356add51bc0bb0384bb00828b290e329e2d322e1e8c25305d590e0beca944069f103a62e4d573a9589109a5e0385d1327cc4
7
+ data.tar.gz: 6d1c775154ae115482c0270718396ee70e499e7f4daa27da0a811a50dd0599cd72bba315a31f62f04c944f431603b03fef60a190d88fac048acd6c0c2211d222
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 2.0
10
- - Package version: 3.2.5
10
+ - Package version: 3.2.6
11
11
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
12
12
  For more information, please visit [http://akeyless.io](http://akeyless.io)
13
13
 
@@ -512,6 +512,7 @@ Class | Method | HTTP request | Description
512
512
  - [Akeyless::GCPAccessRules](docs/GCPAccessRules.md)
513
513
  - [Akeyless::GCPPayload](docs/GCPPayload.md)
514
514
  - [Akeyless::GCPSecretsMigration](docs/GCPSecretsMigration.md)
515
+ - [Akeyless::GatewayBasicInfo](docs/GatewayBasicInfo.md)
515
516
  - [Akeyless::GatewayCreateK8SAuthConfig](docs/GatewayCreateK8SAuthConfig.md)
516
517
  - [Akeyless::GatewayCreateK8SAuthConfigOutput](docs/GatewayCreateK8SAuthConfigOutput.md)
517
518
  - [Akeyless::GatewayCreateMigration](docs/GatewayCreateMigration.md)
data/docs/DescribeItem.md CHANGED
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **display_id** | **String** | The display id of the item | [optional] |
8
+ | **gateway_details** | **Boolean** | Indicate if the item should return with clusters details (url, etc) | [optional][default to false] |
8
9
  | **item_id** | **Integer** | Item id of the item | [optional] |
9
10
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
11
  | **name** | **String** | Item name | |
@@ -19,6 +20,7 @@ require 'akeyless'
19
20
 
20
21
  instance = Akeyless::DescribeItem.new(
21
22
  display_id: null,
23
+ gateway_details: null,
22
24
  item_id: null,
23
25
  json: null,
24
26
  name: null,
@@ -6,6 +6,8 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **failure_message** | **String** | | [optional] |
8
8
  | **gw_cluster_id** | **Integer** | | [optional] |
9
+ | **k8s_allowed_namespaces** | **String** | Relevant only for generic k8s producer | [optional] |
10
+ | **k8s_dynamic_mode** | **Boolean** | Relevant only for generic k8s producer | [optional] |
9
11
  | **producer_last_keep_alive** | **String** | | [optional] |
10
12
  | **producer_metadata** | **String** | | [optional] |
11
13
  | **producer_status** | **String** | RotationStatus defines types of rotation Status | [optional] |
@@ -19,6 +21,8 @@ require 'akeyless'
19
21
  instance = Akeyless::DynamicSecretProducerInfo.new(
20
22
  failure_message: null,
21
23
  gw_cluster_id: null,
24
+ k8s_allowed_namespaces: null,
25
+ k8s_dynamic_mode: null,
22
26
  producer_last_keep_alive: null,
23
27
  producer_metadata: null,
24
28
  producer_status: null,
@@ -0,0 +1,24 @@
1
+ # Akeyless::GatewayBasicInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **cluster_display_name** | **String** | | [optional] |
8
+ | **cluster_id** | **Integer** | | [optional] |
9
+ | **cluster_name** | **String** | | [optional] |
10
+ | **cluster_url** | **String** | | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::GatewayBasicInfo.new(
18
+ cluster_display_name: null,
19
+ cluster_id: null,
20
+ cluster_name: null,
21
+ cluster_url: null
22
+ )
23
+ ```
24
+
@@ -6,11 +6,16 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
8
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
+ | **k8s_allowed_namespaces** | **String** | Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic) | [optional] |
9
10
  | **k8s_cluster_ca_cert** | **String** | K8S cluster CA certificate | [optional] |
10
11
  | **k8s_cluster_endpoint** | **String** | K8S cluster URL endpoint | [optional] |
11
12
  | **k8s_cluster_token** | **String** | K8S cluster Bearer token | [optional] |
12
13
  | **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
14
+ | **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
15
+ | **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
16
+ | **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
13
17
  | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
18
+ | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
14
19
  | **name** | **String** | Producer name | |
15
20
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
16
21
  | **secure_access_allow_port_forwading** | **Boolean** | Enable Port forwarding while using CLI access | [optional] |
@@ -35,11 +40,16 @@ require 'akeyless'
35
40
  instance = Akeyless::GatewayCreateProducerNativeK8S.new(
36
41
  delete_protection: null,
37
42
  json: null,
43
+ k8s_allowed_namespaces: null,
38
44
  k8s_cluster_ca_cert: null,
39
45
  k8s_cluster_endpoint: null,
40
46
  k8s_cluster_token: null,
41
47
  k8s_namespace: null,
48
+ k8s_predefined_role_name: null,
49
+ k8s_predefined_role_type: null,
50
+ k8s_rolebinding_yaml_def: null,
42
51
  k8s_service_account: null,
52
+ k8s_service_account_type: null,
43
53
  name: null,
44
54
  producer_encryption_key_name: null,
45
55
  secure_access_allow_port_forwading: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **broadcast_queue_name** | **String** | | [optional] |
7
8
  | **mq_type** | **String** | | [optional] |
8
9
  | **queue_name** | **String** | | [optional] |
9
10
  | **queue_url** | **String** | | [optional] |
@@ -14,6 +15,7 @@
14
15
  require 'akeyless'
15
16
 
16
17
  instance = Akeyless::GatewayMessageQueueInfo.new(
18
+ broadcast_queue_name: null,
17
19
  mq_type: null,
18
20
  queue_name: null,
19
21
  queue_url: null
@@ -6,11 +6,16 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **delete_protection** | **String** | Protection from accidental deletion of this item [true/false] | [optional] |
8
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
+ | **k8s_allowed_namespaces** | **String** | Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic) | [optional] |
9
10
  | **k8s_cluster_ca_cert** | **String** | K8S cluster CA certificate | [optional] |
10
11
  | **k8s_cluster_endpoint** | **String** | K8S cluster URL endpoint | [optional] |
11
12
  | **k8s_cluster_token** | **String** | K8S cluster Bearer token | [optional] |
12
13
  | **k8s_namespace** | **String** | K8S Namespace where the ServiceAccount exists. | [optional] |
14
+ | **k8s_predefined_role_name** | **String** | The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic) | [optional] |
15
+ | **k8s_predefined_role_type** | **String** | Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic) | [optional] |
16
+ | **k8s_rolebinding_yaml_def** | **String** | Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic) | [optional] |
13
17
  | **k8s_service_account** | **String** | K8S ServiceAccount to extract token from. | [optional] |
18
+ | **k8s_service_account_type** | **String** | K8S ServiceAccount type [fixed, dynamic]. | [optional] |
14
19
  | **name** | **String** | Producer name | |
15
20
  | **new_name** | **String** | Producer name | [optional] |
16
21
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
@@ -36,11 +41,16 @@ require 'akeyless'
36
41
  instance = Akeyless::GatewayUpdateProducerNativeK8S.new(
37
42
  delete_protection: null,
38
43
  json: null,
44
+ k8s_allowed_namespaces: null,
39
45
  k8s_cluster_ca_cert: null,
40
46
  k8s_cluster_endpoint: null,
41
47
  k8s_cluster_token: null,
42
48
  k8s_namespace: null,
49
+ k8s_predefined_role_name: null,
50
+ k8s_predefined_role_type: null,
51
+ k8s_rolebinding_yaml_def: null,
43
52
  k8s_service_account: null,
53
+ k8s_service_account_type: null,
44
54
  name: null,
45
55
  new_name: null,
46
56
  producer_encryption_key_name: null,
data/docs/Item.md CHANGED
@@ -16,6 +16,7 @@
16
16
  | **delete_protection** | **Boolean** | | [optional] |
17
17
  | **deletion_date** | **Time** | | [optional] |
18
18
  | **display_id** | **String** | | [optional] |
19
+ | **gateway_details** | [**Array<GatewayBasicInfo>**](GatewayBasicInfo.md) | | [optional] |
19
20
  | **is_access_request_enabled** | **Boolean** | | [optional] |
20
21
  | **is_enabled** | **Boolean** | | [optional] |
21
22
  | **item_accessibility** | **Integer** | | [optional] |
@@ -59,6 +60,7 @@ instance = Akeyless::Item.new(
59
60
  delete_protection: null,
60
61
  deletion_date: null,
61
62
  display_id: null,
63
+ gateway_details: null,
62
64
  is_access_request_enabled: null,
63
65
  is_enabled: null,
64
66
  item_accessibility: null,
@@ -67,6 +67,11 @@ module Akeyless
67
67
  # @return [Proc]
68
68
  attr_accessor :access_token_getter
69
69
 
70
+ # Set this to return data as binary instead of downloading a temp file. When enabled (set to true)
71
+ # HTTP responses with return type `File` will be returned as a stream of binary data.
72
+ # Default to false.
73
+ attr_accessor :return_binary_data
74
+
70
75
  # Set this to enable/disable debugging. When enabled (set to true), HTTP request/response
71
76
  # details will be logged with `logger.debug` (see the `logger` attribute).
72
77
  # Default to false.
@@ -18,6 +18,9 @@ module Akeyless
18
18
  # The display id of the item
19
19
  attr_accessor :display_id
20
20
 
21
+ # Indicate if the item should return with clusters details (url, etc)
22
+ attr_accessor :gateway_details
23
+
21
24
  # Item id of the item
22
25
  attr_accessor :item_id
23
26
 
@@ -40,6 +43,7 @@ module Akeyless
40
43
  def self.attribute_map
41
44
  {
42
45
  :'display_id' => :'display-id',
46
+ :'gateway_details' => :'gateway-details',
43
47
  :'item_id' => :'item-id',
44
48
  :'json' => :'json',
45
49
  :'name' => :'name',
@@ -58,6 +62,7 @@ module Akeyless
58
62
  def self.openapi_types
59
63
  {
60
64
  :'display_id' => :'String',
65
+ :'gateway_details' => :'Boolean',
61
66
  :'item_id' => :'Integer',
62
67
  :'json' => :'Boolean',
63
68
  :'name' => :'String',
@@ -92,6 +97,12 @@ module Akeyless
92
97
  self.display_id = attributes[:'display_id']
93
98
  end
94
99
 
100
+ if attributes.key?(:'gateway_details')
101
+ self.gateway_details = attributes[:'gateway_details']
102
+ else
103
+ self.gateway_details = false
104
+ end
105
+
95
106
  if attributes.key?(:'item_id')
96
107
  self.item_id = attributes[:'item_id']
97
108
  end
@@ -145,6 +156,7 @@ module Akeyless
145
156
  return true if self.equal?(o)
146
157
  self.class == o.class &&
147
158
  display_id == o.display_id &&
159
+ gateway_details == o.gateway_details &&
148
160
  item_id == o.item_id &&
149
161
  json == o.json &&
150
162
  name == o.name &&
@@ -162,7 +174,7 @@ module Akeyless
162
174
  # Calculates hash code according to all attributes.
163
175
  # @return [Integer] Hash code
164
176
  def hash
165
- [display_id, item_id, json, name, show_versions, token, uid_token].hash
177
+ [display_id, gateway_details, item_id, json, name, show_versions, token, uid_token].hash
166
178
  end
167
179
 
168
180
  # Builds the object from hash
@@ -20,6 +20,12 @@ module Akeyless
20
20
 
21
21
  attr_accessor :gw_cluster_id
22
22
 
23
+ # Relevant only for generic k8s producer
24
+ attr_accessor :k8s_allowed_namespaces
25
+
26
+ # Relevant only for generic k8s producer
27
+ attr_accessor :k8s_dynamic_mode
28
+
23
29
  attr_accessor :producer_last_keep_alive
24
30
 
25
31
  attr_accessor :producer_metadata
@@ -34,6 +40,8 @@ module Akeyless
34
40
  {
35
41
  :'failure_message' => :'failure_message',
36
42
  :'gw_cluster_id' => :'gw_cluster_id',
43
+ :'k8s_allowed_namespaces' => :'k8s_allowed_namespaces',
44
+ :'k8s_dynamic_mode' => :'k8s_dynamic_mode',
37
45
  :'producer_last_keep_alive' => :'producer_last_keep_alive',
38
46
  :'producer_metadata' => :'producer_metadata',
39
47
  :'producer_status' => :'producer_status',
@@ -51,6 +59,8 @@ module Akeyless
51
59
  {
52
60
  :'failure_message' => :'String',
53
61
  :'gw_cluster_id' => :'Integer',
62
+ :'k8s_allowed_namespaces' => :'String',
63
+ :'k8s_dynamic_mode' => :'Boolean',
54
64
  :'producer_last_keep_alive' => :'String',
55
65
  :'producer_metadata' => :'String',
56
66
  :'producer_status' => :'String',
@@ -87,6 +97,14 @@ module Akeyless
87
97
  self.gw_cluster_id = attributes[:'gw_cluster_id']
88
98
  end
89
99
 
100
+ if attributes.key?(:'k8s_allowed_namespaces')
101
+ self.k8s_allowed_namespaces = attributes[:'k8s_allowed_namespaces']
102
+ end
103
+
104
+ if attributes.key?(:'k8s_dynamic_mode')
105
+ self.k8s_dynamic_mode = attributes[:'k8s_dynamic_mode']
106
+ end
107
+
90
108
  if attributes.key?(:'producer_last_keep_alive')
91
109
  self.producer_last_keep_alive = attributes[:'producer_last_keep_alive']
92
110
  end
@@ -124,6 +142,8 @@ module Akeyless
124
142
  self.class == o.class &&
125
143
  failure_message == o.failure_message &&
126
144
  gw_cluster_id == o.gw_cluster_id &&
145
+ k8s_allowed_namespaces == o.k8s_allowed_namespaces &&
146
+ k8s_dynamic_mode == o.k8s_dynamic_mode &&
127
147
  producer_last_keep_alive == o.producer_last_keep_alive &&
128
148
  producer_metadata == o.producer_metadata &&
129
149
  producer_status == o.producer_status &&
@@ -139,7 +159,7 @@ module Akeyless
139
159
  # Calculates hash code according to all attributes.
140
160
  # @return [Integer] Hash code
141
161
  def hash
142
- [failure_message, gw_cluster_id, producer_last_keep_alive, producer_metadata, producer_status, producer_type].hash
162
+ [failure_message, gw_cluster_id, k8s_allowed_namespaces, k8s_dynamic_mode, producer_last_keep_alive, producer_metadata, producer_status, producer_type].hash
143
163
  end
144
164
 
145
165
  # Builds the object from hash
@@ -0,0 +1,246 @@
1
+ =begin
2
+ #Akeyless API
3
+
4
+ #The purpose of this application is to provide access to Akeyless API.
5
+
6
+ The version of the OpenAPI document: 2.0
7
+ Contact: support@akeyless.io
8
+ Generated by: https://openapi-generator.tech
9
+ OpenAPI Generator version: 6.5.0-SNAPSHOT
10
+
11
+ =end
12
+
13
+ require 'date'
14
+ require 'time'
15
+
16
+ module Akeyless
17
+ class GatewayBasicInfo
18
+ attr_accessor :cluster_display_name
19
+
20
+ attr_accessor :cluster_id
21
+
22
+ attr_accessor :cluster_name
23
+
24
+ attr_accessor :cluster_url
25
+
26
+ # Attribute mapping from ruby-style variable name to JSON key.
27
+ def self.attribute_map
28
+ {
29
+ :'cluster_display_name' => :'cluster_display_name',
30
+ :'cluster_id' => :'cluster_id',
31
+ :'cluster_name' => :'cluster_name',
32
+ :'cluster_url' => :'cluster_url'
33
+ }
34
+ end
35
+
36
+ # Returns all the JSON keys this model knows about
37
+ def self.acceptable_attributes
38
+ attribute_map.values
39
+ end
40
+
41
+ # Attribute type mapping.
42
+ def self.openapi_types
43
+ {
44
+ :'cluster_display_name' => :'String',
45
+ :'cluster_id' => :'Integer',
46
+ :'cluster_name' => :'String',
47
+ :'cluster_url' => :'String'
48
+ }
49
+ end
50
+
51
+ # List of attributes with nullable: true
52
+ def self.openapi_nullable
53
+ Set.new([
54
+ ])
55
+ end
56
+
57
+ # Initializes the object
58
+ # @param [Hash] attributes Model attributes in the form of hash
59
+ def initialize(attributes = {})
60
+ if (!attributes.is_a?(Hash))
61
+ fail ArgumentError, "The input argument (attributes) must be a hash in `Akeyless::GatewayBasicInfo` initialize method"
62
+ end
63
+
64
+ # check to see if the attribute exists and convert string to symbol for hash key
65
+ attributes = attributes.each_with_object({}) { |(k, v), h|
66
+ if (!self.class.attribute_map.key?(k.to_sym))
67
+ fail ArgumentError, "`#{k}` is not a valid attribute in `Akeyless::GatewayBasicInfo`. Please check the name to make sure it's valid. List of attributes: " + self.class.attribute_map.keys.inspect
68
+ end
69
+ h[k.to_sym] = v
70
+ }
71
+
72
+ if attributes.key?(:'cluster_display_name')
73
+ self.cluster_display_name = attributes[:'cluster_display_name']
74
+ end
75
+
76
+ if attributes.key?(:'cluster_id')
77
+ self.cluster_id = attributes[:'cluster_id']
78
+ end
79
+
80
+ if attributes.key?(:'cluster_name')
81
+ self.cluster_name = attributes[:'cluster_name']
82
+ end
83
+
84
+ if attributes.key?(:'cluster_url')
85
+ self.cluster_url = attributes[:'cluster_url']
86
+ end
87
+ end
88
+
89
+ # Show invalid properties with the reasons. Usually used together with valid?
90
+ # @return Array for valid properties with the reasons
91
+ def list_invalid_properties
92
+ invalid_properties = Array.new
93
+ invalid_properties
94
+ end
95
+
96
+ # Check to see if the all the properties in the model are valid
97
+ # @return true if the model is valid
98
+ def valid?
99
+ true
100
+ end
101
+
102
+ # Checks equality by comparing each attribute.
103
+ # @param [Object] Object to be compared
104
+ def ==(o)
105
+ return true if self.equal?(o)
106
+ self.class == o.class &&
107
+ cluster_display_name == o.cluster_display_name &&
108
+ cluster_id == o.cluster_id &&
109
+ cluster_name == o.cluster_name &&
110
+ cluster_url == o.cluster_url
111
+ end
112
+
113
+ # @see the `==` method
114
+ # @param [Object] Object to be compared
115
+ def eql?(o)
116
+ self == o
117
+ end
118
+
119
+ # Calculates hash code according to all attributes.
120
+ # @return [Integer] Hash code
121
+ def hash
122
+ [cluster_display_name, cluster_id, cluster_name, cluster_url].hash
123
+ end
124
+
125
+ # Builds the object from hash
126
+ # @param [Hash] attributes Model attributes in the form of hash
127
+ # @return [Object] Returns the model itself
128
+ def self.build_from_hash(attributes)
129
+ new.build_from_hash(attributes)
130
+ end
131
+
132
+ # Builds the object from hash
133
+ # @param [Hash] attributes Model attributes in the form of hash
134
+ # @return [Object] Returns the model itself
135
+ def build_from_hash(attributes)
136
+ return nil unless attributes.is_a?(Hash)
137
+ attributes = attributes.transform_keys(&:to_sym)
138
+ self.class.openapi_types.each_pair do |key, type|
139
+ if attributes[self.class.attribute_map[key]].nil? && self.class.openapi_nullable.include?(key)
140
+ self.send("#{key}=", nil)
141
+ elsif type =~ /\AArray<(.*)>/i
142
+ # check to ensure the input is an array given that the attribute
143
+ # is documented as an array but the input is not
144
+ if attributes[self.class.attribute_map[key]].is_a?(Array)
145
+ self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
146
+ end
147
+ elsif !attributes[self.class.attribute_map[key]].nil?
148
+ self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
149
+ end
150
+ end
151
+
152
+ self
153
+ end
154
+
155
+ # Deserializes the data based on type
156
+ # @param string type Data type
157
+ # @param string value Value to be deserialized
158
+ # @return [Object] Deserialized data
159
+ def _deserialize(type, value)
160
+ case type.to_sym
161
+ when :Time
162
+ Time.parse(value)
163
+ when :Date
164
+ Date.parse(value)
165
+ when :String
166
+ value.to_s
167
+ when :Integer
168
+ value.to_i
169
+ when :Float
170
+ value.to_f
171
+ when :Boolean
172
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
173
+ true
174
+ else
175
+ false
176
+ end
177
+ when :Object
178
+ # generic object (usually a Hash), return directly
179
+ value
180
+ when /\AArray<(?<inner_type>.+)>\z/
181
+ inner_type = Regexp.last_match[:inner_type]
182
+ value.map { |v| _deserialize(inner_type, v) }
183
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
184
+ k_type = Regexp.last_match[:k_type]
185
+ v_type = Regexp.last_match[:v_type]
186
+ {}.tap do |hash|
187
+ value.each do |k, v|
188
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
189
+ end
190
+ end
191
+ else # model
192
+ # models (e.g. Pet) or oneOf
193
+ klass = Akeyless.const_get(type)
194
+ klass.respond_to?(:openapi_one_of) ? klass.build(value) : klass.build_from_hash(value)
195
+ end
196
+ end
197
+
198
+ # Returns the string representation of the object
199
+ # @return [String] String presentation of the object
200
+ def to_s
201
+ to_hash.to_s
202
+ end
203
+
204
+ # to_body is an alias to to_hash (backward compatibility)
205
+ # @return [Hash] Returns the object in the form of hash
206
+ def to_body
207
+ to_hash
208
+ end
209
+
210
+ # Returns the object in the form of hash
211
+ # @return [Hash] Returns the object in the form of hash
212
+ def to_hash
213
+ hash = {}
214
+ self.class.attribute_map.each_pair do |attr, param|
215
+ value = self.send(attr)
216
+ if value.nil?
217
+ is_nullable = self.class.openapi_nullable.include?(attr)
218
+ next if !is_nullable || (is_nullable && !instance_variable_defined?(:"@#{attr}"))
219
+ end
220
+
221
+ hash[param] = _to_hash(value)
222
+ end
223
+ hash
224
+ end
225
+
226
+ # Outputs non-array value in the form of hash
227
+ # For object, use to_hash. Otherwise, just return the value
228
+ # @param [Object] value Any valid value
229
+ # @return [Hash] Returns the value in the form of hash
230
+ def _to_hash(value)
231
+ if value.is_a?(Array)
232
+ value.compact.map { |v| _to_hash(v) }
233
+ elsif value.is_a?(Hash)
234
+ {}.tap do |hash|
235
+ value.each { |k, v| hash[k] = _to_hash(v) }
236
+ end
237
+ elsif value.respond_to? :to_hash
238
+ value.to_hash
239
+ else
240
+ value
241
+ end
242
+ end
243
+
244
+ end
245
+
246
+ end
@@ -22,6 +22,9 @@ module Akeyless
22
22
  # Set output format to JSON
23
23
  attr_accessor :json
24
24
 
25
+ # Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic)
26
+ attr_accessor :k8s_allowed_namespaces
27
+
25
28
  # K8S cluster CA certificate
26
29
  attr_accessor :k8s_cluster_ca_cert
27
30
 
@@ -34,9 +37,21 @@ module Akeyless
34
37
  # K8S Namespace where the ServiceAccount exists.
35
38
  attr_accessor :k8s_namespace
36
39
 
40
+ # The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic)
41
+ attr_accessor :k8s_predefined_role_name
42
+
43
+ # Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
44
+ attr_accessor :k8s_predefined_role_type
45
+
46
+ # Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
47
+ attr_accessor :k8s_rolebinding_yaml_def
48
+
37
49
  # K8S ServiceAccount to extract token from.
38
50
  attr_accessor :k8s_service_account
39
51
 
52
+ # K8S ServiceAccount type [fixed, dynamic].
53
+ attr_accessor :k8s_service_account_type
54
+
40
55
  # Producer name
41
56
  attr_accessor :name
42
57
 
@@ -87,11 +102,16 @@ module Akeyless
87
102
  {
88
103
  :'delete_protection' => :'delete_protection',
89
104
  :'json' => :'json',
105
+ :'k8s_allowed_namespaces' => :'k8s-allowed-namespaces',
90
106
  :'k8s_cluster_ca_cert' => :'k8s-cluster-ca-cert',
91
107
  :'k8s_cluster_endpoint' => :'k8s-cluster-endpoint',
92
108
  :'k8s_cluster_token' => :'k8s-cluster-token',
93
109
  :'k8s_namespace' => :'k8s-namespace',
110
+ :'k8s_predefined_role_name' => :'k8s-predefined-role-name',
111
+ :'k8s_predefined_role_type' => :'k8s-predefined-role-type',
112
+ :'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
94
113
  :'k8s_service_account' => :'k8s-service-account',
114
+ :'k8s_service_account_type' => :'k8s-service-account-type',
95
115
  :'name' => :'name',
96
116
  :'producer_encryption_key_name' => :'producer-encryption-key-name',
97
117
  :'secure_access_allow_port_forwading' => :'secure-access-allow-port-forwading',
@@ -120,11 +140,16 @@ module Akeyless
120
140
  {
121
141
  :'delete_protection' => :'String',
122
142
  :'json' => :'Boolean',
143
+ :'k8s_allowed_namespaces' => :'String',
123
144
  :'k8s_cluster_ca_cert' => :'String',
124
145
  :'k8s_cluster_endpoint' => :'String',
125
146
  :'k8s_cluster_token' => :'String',
126
147
  :'k8s_namespace' => :'String',
148
+ :'k8s_predefined_role_name' => :'String',
149
+ :'k8s_predefined_role_type' => :'String',
150
+ :'k8s_rolebinding_yaml_def' => :'String',
127
151
  :'k8s_service_account' => :'String',
152
+ :'k8s_service_account_type' => :'String',
128
153
  :'name' => :'String',
129
154
  :'producer_encryption_key_name' => :'String',
130
155
  :'secure_access_allow_port_forwading' => :'Boolean',
@@ -174,6 +199,10 @@ module Akeyless
174
199
  self.json = false
175
200
  end
176
201
 
202
+ if attributes.key?(:'k8s_allowed_namespaces')
203
+ self.k8s_allowed_namespaces = attributes[:'k8s_allowed_namespaces']
204
+ end
205
+
177
206
  if attributes.key?(:'k8s_cluster_ca_cert')
178
207
  self.k8s_cluster_ca_cert = attributes[:'k8s_cluster_ca_cert']
179
208
  end
@@ -190,10 +219,26 @@ module Akeyless
190
219
  self.k8s_namespace = attributes[:'k8s_namespace']
191
220
  end
192
221
 
222
+ if attributes.key?(:'k8s_predefined_role_name')
223
+ self.k8s_predefined_role_name = attributes[:'k8s_predefined_role_name']
224
+ end
225
+
226
+ if attributes.key?(:'k8s_predefined_role_type')
227
+ self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
228
+ end
229
+
230
+ if attributes.key?(:'k8s_rolebinding_yaml_def')
231
+ self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
232
+ end
233
+
193
234
  if attributes.key?(:'k8s_service_account')
194
235
  self.k8s_service_account = attributes[:'k8s_service_account']
195
236
  end
196
237
 
238
+ if attributes.key?(:'k8s_service_account_type')
239
+ self.k8s_service_account_type = attributes[:'k8s_service_account_type']
240
+ end
241
+
197
242
  if attributes.key?(:'name')
198
243
  self.name = attributes[:'name']
199
244
  end
@@ -290,11 +335,16 @@ module Akeyless
290
335
  self.class == o.class &&
291
336
  delete_protection == o.delete_protection &&
292
337
  json == o.json &&
338
+ k8s_allowed_namespaces == o.k8s_allowed_namespaces &&
293
339
  k8s_cluster_ca_cert == o.k8s_cluster_ca_cert &&
294
340
  k8s_cluster_endpoint == o.k8s_cluster_endpoint &&
295
341
  k8s_cluster_token == o.k8s_cluster_token &&
296
342
  k8s_namespace == o.k8s_namespace &&
343
+ k8s_predefined_role_name == o.k8s_predefined_role_name &&
344
+ k8s_predefined_role_type == o.k8s_predefined_role_type &&
345
+ k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
297
346
  k8s_service_account == o.k8s_service_account &&
347
+ k8s_service_account_type == o.k8s_service_account_type &&
298
348
  name == o.name &&
299
349
  producer_encryption_key_name == o.producer_encryption_key_name &&
300
350
  secure_access_allow_port_forwading == o.secure_access_allow_port_forwading &&
@@ -321,7 +371,7 @@ module Akeyless
321
371
  # Calculates hash code according to all attributes.
322
372
  # @return [Integer] Hash code
323
373
  def hash
324
- [delete_protection, json, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_token, k8s_namespace, k8s_service_account, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, user_ttl].hash
374
+ [delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, user_ttl].hash
325
375
  end
326
376
 
327
377
  # Builds the object from hash
@@ -15,6 +15,8 @@ require 'time'
15
15
 
16
16
  module Akeyless
17
17
  class GatewayMessageQueueInfo
18
+ attr_accessor :broadcast_queue_name
19
+
18
20
  attr_accessor :mq_type
19
21
 
20
22
  attr_accessor :queue_name
@@ -24,6 +26,7 @@ module Akeyless
24
26
  # Attribute mapping from ruby-style variable name to JSON key.
25
27
  def self.attribute_map
26
28
  {
29
+ :'broadcast_queue_name' => :'broadcast_queue_name',
27
30
  :'mq_type' => :'mq_type',
28
31
  :'queue_name' => :'queue_name',
29
32
  :'queue_url' => :'queue_url'
@@ -38,6 +41,7 @@ module Akeyless
38
41
  # Attribute type mapping.
39
42
  def self.openapi_types
40
43
  {
44
+ :'broadcast_queue_name' => :'String',
41
45
  :'mq_type' => :'String',
42
46
  :'queue_name' => :'String',
43
47
  :'queue_url' => :'String'
@@ -65,6 +69,10 @@ module Akeyless
65
69
  h[k.to_sym] = v
66
70
  }
67
71
 
72
+ if attributes.key?(:'broadcast_queue_name')
73
+ self.broadcast_queue_name = attributes[:'broadcast_queue_name']
74
+ end
75
+
68
76
  if attributes.key?(:'mq_type')
69
77
  self.mq_type = attributes[:'mq_type']
70
78
  end
@@ -96,6 +104,7 @@ module Akeyless
96
104
  def ==(o)
97
105
  return true if self.equal?(o)
98
106
  self.class == o.class &&
107
+ broadcast_queue_name == o.broadcast_queue_name &&
99
108
  mq_type == o.mq_type &&
100
109
  queue_name == o.queue_name &&
101
110
  queue_url == o.queue_url
@@ -110,7 +119,7 @@ module Akeyless
110
119
  # Calculates hash code according to all attributes.
111
120
  # @return [Integer] Hash code
112
121
  def hash
113
- [mq_type, queue_name, queue_url].hash
122
+ [broadcast_queue_name, mq_type, queue_name, queue_url].hash
114
123
  end
115
124
 
116
125
  # Builds the object from hash
@@ -22,6 +22,9 @@ module Akeyless
22
22
  # Set output format to JSON
23
23
  attr_accessor :json
24
24
 
25
+ # Comma-separated list of allowed K8S namespaces for the generated ServiceAccount (relevant only for k8s-service-account-type=dynamic)
26
+ attr_accessor :k8s_allowed_namespaces
27
+
25
28
  # K8S cluster CA certificate
26
29
  attr_accessor :k8s_cluster_ca_cert
27
30
 
@@ -34,9 +37,21 @@ module Akeyless
34
37
  # K8S Namespace where the ServiceAccount exists.
35
38
  attr_accessor :k8s_namespace
36
39
 
40
+ # The pre-existing Role or ClusterRole name to bind the generated ServiceAccount to (relevant only for k8s-service-account-type=dynamic)
41
+ attr_accessor :k8s_predefined_role_name
42
+
43
+ # Specifies the type of the pre-existing K8S role [Role, ClusterRole] (relevant only for k8s-service-account-type=dynamic)
44
+ attr_accessor :k8s_predefined_role_type
45
+
46
+ # Path to yaml file that contains definitions of K8S role and role binding (relevant only for k8s-service-account-type=dynamic)
47
+ attr_accessor :k8s_rolebinding_yaml_def
48
+
37
49
  # K8S ServiceAccount to extract token from.
38
50
  attr_accessor :k8s_service_account
39
51
 
52
+ # K8S ServiceAccount type [fixed, dynamic].
53
+ attr_accessor :k8s_service_account_type
54
+
40
55
  # Producer name
41
56
  attr_accessor :name
42
57
 
@@ -90,11 +105,16 @@ module Akeyless
90
105
  {
91
106
  :'delete_protection' => :'delete_protection',
92
107
  :'json' => :'json',
108
+ :'k8s_allowed_namespaces' => :'k8s-allowed-namespaces',
93
109
  :'k8s_cluster_ca_cert' => :'k8s-cluster-ca-cert',
94
110
  :'k8s_cluster_endpoint' => :'k8s-cluster-endpoint',
95
111
  :'k8s_cluster_token' => :'k8s-cluster-token',
96
112
  :'k8s_namespace' => :'k8s-namespace',
113
+ :'k8s_predefined_role_name' => :'k8s-predefined-role-name',
114
+ :'k8s_predefined_role_type' => :'k8s-predefined-role-type',
115
+ :'k8s_rolebinding_yaml_def' => :'k8s-rolebinding-yaml-def',
97
116
  :'k8s_service_account' => :'k8s-service-account',
117
+ :'k8s_service_account_type' => :'k8s-service-account-type',
98
118
  :'name' => :'name',
99
119
  :'new_name' => :'new-name',
100
120
  :'producer_encryption_key_name' => :'producer-encryption-key-name',
@@ -124,11 +144,16 @@ module Akeyless
124
144
  {
125
145
  :'delete_protection' => :'String',
126
146
  :'json' => :'Boolean',
147
+ :'k8s_allowed_namespaces' => :'String',
127
148
  :'k8s_cluster_ca_cert' => :'String',
128
149
  :'k8s_cluster_endpoint' => :'String',
129
150
  :'k8s_cluster_token' => :'String',
130
151
  :'k8s_namespace' => :'String',
152
+ :'k8s_predefined_role_name' => :'String',
153
+ :'k8s_predefined_role_type' => :'String',
154
+ :'k8s_rolebinding_yaml_def' => :'String',
131
155
  :'k8s_service_account' => :'String',
156
+ :'k8s_service_account_type' => :'String',
132
157
  :'name' => :'String',
133
158
  :'new_name' => :'String',
134
159
  :'producer_encryption_key_name' => :'String',
@@ -179,6 +204,10 @@ module Akeyless
179
204
  self.json = false
180
205
  end
181
206
 
207
+ if attributes.key?(:'k8s_allowed_namespaces')
208
+ self.k8s_allowed_namespaces = attributes[:'k8s_allowed_namespaces']
209
+ end
210
+
182
211
  if attributes.key?(:'k8s_cluster_ca_cert')
183
212
  self.k8s_cluster_ca_cert = attributes[:'k8s_cluster_ca_cert']
184
213
  end
@@ -195,10 +224,26 @@ module Akeyless
195
224
  self.k8s_namespace = attributes[:'k8s_namespace']
196
225
  end
197
226
 
227
+ if attributes.key?(:'k8s_predefined_role_name')
228
+ self.k8s_predefined_role_name = attributes[:'k8s_predefined_role_name']
229
+ end
230
+
231
+ if attributes.key?(:'k8s_predefined_role_type')
232
+ self.k8s_predefined_role_type = attributes[:'k8s_predefined_role_type']
233
+ end
234
+
235
+ if attributes.key?(:'k8s_rolebinding_yaml_def')
236
+ self.k8s_rolebinding_yaml_def = attributes[:'k8s_rolebinding_yaml_def']
237
+ end
238
+
198
239
  if attributes.key?(:'k8s_service_account')
199
240
  self.k8s_service_account = attributes[:'k8s_service_account']
200
241
  end
201
242
 
243
+ if attributes.key?(:'k8s_service_account_type')
244
+ self.k8s_service_account_type = attributes[:'k8s_service_account_type']
245
+ end
246
+
202
247
  if attributes.key?(:'name')
203
248
  self.name = attributes[:'name']
204
249
  end
@@ -299,11 +344,16 @@ module Akeyless
299
344
  self.class == o.class &&
300
345
  delete_protection == o.delete_protection &&
301
346
  json == o.json &&
347
+ k8s_allowed_namespaces == o.k8s_allowed_namespaces &&
302
348
  k8s_cluster_ca_cert == o.k8s_cluster_ca_cert &&
303
349
  k8s_cluster_endpoint == o.k8s_cluster_endpoint &&
304
350
  k8s_cluster_token == o.k8s_cluster_token &&
305
351
  k8s_namespace == o.k8s_namespace &&
352
+ k8s_predefined_role_name == o.k8s_predefined_role_name &&
353
+ k8s_predefined_role_type == o.k8s_predefined_role_type &&
354
+ k8s_rolebinding_yaml_def == o.k8s_rolebinding_yaml_def &&
306
355
  k8s_service_account == o.k8s_service_account &&
356
+ k8s_service_account_type == o.k8s_service_account_type &&
307
357
  name == o.name &&
308
358
  new_name == o.new_name &&
309
359
  producer_encryption_key_name == o.producer_encryption_key_name &&
@@ -331,7 +381,7 @@ module Akeyless
331
381
  # Calculates hash code according to all attributes.
332
382
  # @return [Integer] Hash code
333
383
  def hash
334
- [delete_protection, json, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_token, k8s_namespace, k8s_service_account, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, user_ttl].hash
384
+ [delete_protection, json, k8s_allowed_namespaces, k8s_cluster_ca_cert, k8s_cluster_endpoint, k8s_cluster_token, k8s_namespace, k8s_predefined_role_name, k8s_predefined_role_type, k8s_rolebinding_yaml_def, k8s_service_account, k8s_service_account_type, name, new_name, producer_encryption_key_name, secure_access_allow_port_forwading, secure_access_bastion_issuer, secure_access_cluster_endpoint, secure_access_dashboard_url, secure_access_enable, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, tags, target_name, token, uid_token, user_ttl].hash
335
385
  end
336
386
 
337
387
  # Builds the object from hash
@@ -39,6 +39,8 @@ module Akeyless
39
39
 
40
40
  attr_accessor :display_id
41
41
 
42
+ attr_accessor :gateway_details
43
+
42
44
  attr_accessor :is_access_request_enabled
43
45
 
44
46
  attr_accessor :is_enabled
@@ -103,6 +105,7 @@ module Akeyless
103
105
  :'delete_protection' => :'delete_protection',
104
106
  :'deletion_date' => :'deletion_date',
105
107
  :'display_id' => :'display_id',
108
+ :'gateway_details' => :'gateway_details',
106
109
  :'is_access_request_enabled' => :'is_access_request_enabled',
107
110
  :'is_enabled' => :'is_enabled',
108
111
  :'item_accessibility' => :'item_accessibility',
@@ -150,6 +153,7 @@ module Akeyless
150
153
  :'delete_protection' => :'Boolean',
151
154
  :'deletion_date' => :'Time',
152
155
  :'display_id' => :'String',
156
+ :'gateway_details' => :'Array<GatewayBasicInfo>',
153
157
  :'is_access_request_enabled' => :'Boolean',
154
158
  :'is_enabled' => :'Boolean',
155
159
  :'item_accessibility' => :'Integer',
@@ -248,6 +252,12 @@ module Akeyless
248
252
  self.display_id = attributes[:'display_id']
249
253
  end
250
254
 
255
+ if attributes.key?(:'gateway_details')
256
+ if (value = attributes[:'gateway_details']).is_a?(Array)
257
+ self.gateway_details = value
258
+ end
259
+ end
260
+
251
261
  if attributes.key?(:'is_access_request_enabled')
252
262
  self.is_access_request_enabled = attributes[:'is_access_request_enabled']
253
263
  end
@@ -383,6 +393,7 @@ module Akeyless
383
393
  delete_protection == o.delete_protection &&
384
394
  deletion_date == o.deletion_date &&
385
395
  display_id == o.display_id &&
396
+ gateway_details == o.gateway_details &&
386
397
  is_access_request_enabled == o.is_access_request_enabled &&
387
398
  is_enabled == o.is_enabled &&
388
399
  item_accessibility == o.item_accessibility &&
@@ -418,7 +429,7 @@ module Akeyless
418
429
  # Calculates hash code according to all attributes.
419
430
  # @return [Integer] Hash code
420
431
  def hash
421
- [access_date, access_request_status, auto_rotate, cert_issuer_signer_key_name, certificate_issue_details, certificates, client_permissions, creation_date, customer_fragment_id, delete_protection, deletion_date, display_id, is_access_request_enabled, is_enabled, item_accessibility, item_general_info, item_id, item_metadata, item_name, item_size, item_state, item_sub_type, item_tags, item_targets_assoc, item_type, item_versions, last_version, modification_date, next_rotation_date, protection_key_name, protection_key_type, public_value, rotation_interval, shared_by, target_versions, with_customer_fragment].hash
432
+ [access_date, access_request_status, auto_rotate, cert_issuer_signer_key_name, certificate_issue_details, certificates, client_permissions, creation_date, customer_fragment_id, delete_protection, deletion_date, display_id, gateway_details, is_access_request_enabled, is_enabled, item_accessibility, item_general_info, item_id, item_metadata, item_name, item_size, item_state, item_sub_type, item_tags, item_targets_assoc, item_type, item_versions, last_version, modification_date, next_rotation_date, protection_key_name, protection_key_type, public_value, rotation_interval, shared_by, target_versions, with_customer_fragment].hash
422
433
  end
423
434
 
424
435
  # Builds the object from hash
@@ -11,5 +11,5 @@ OpenAPI Generator version: 6.5.0-SNAPSHOT
11
11
  =end
12
12
 
13
13
  module Akeyless
14
- VERSION = '3.2.5'
14
+ VERSION = '3.2.6'
15
15
  end
data/lib/akeyless.rb CHANGED
@@ -206,6 +206,7 @@ require 'akeyless/models/external_kms_key_id'
206
206
  require 'akeyless/models/gcp_access_rules'
207
207
  require 'akeyless/models/gcp_payload'
208
208
  require 'akeyless/models/gcp_secrets_migration'
209
+ require 'akeyless/models/gateway_basic_info'
209
210
  require 'akeyless/models/gateway_create_k8_s_auth_config'
210
211
  require 'akeyless/models/gateway_create_k8_s_auth_config_output'
211
212
  require 'akeyless/models/gateway_create_migration'
@@ -0,0 +1,52 @@
1
+ =begin
2
+ #Akeyless API
3
+
4
+ #The purpose of this application is to provide access to Akeyless API.
5
+
6
+ The version of the OpenAPI document: 2.0
7
+ Contact: support@akeyless.io
8
+ Generated by: https://openapi-generator.tech
9
+ OpenAPI Generator version: 6.5.0-SNAPSHOT
10
+
11
+ =end
12
+
13
+ require 'spec_helper'
14
+ require 'json'
15
+ require 'date'
16
+
17
+ # Unit tests for Akeyless::GatewayBasicInfo
18
+ # Automatically generated by openapi-generator (https://openapi-generator.tech)
19
+ # Please update as you see appropriate
20
+ describe Akeyless::GatewayBasicInfo do
21
+ let(:instance) { Akeyless::GatewayBasicInfo.new }
22
+
23
+ describe 'test an instance of GatewayBasicInfo' do
24
+ it 'should create an instance of GatewayBasicInfo' do
25
+ expect(instance).to be_instance_of(Akeyless::GatewayBasicInfo)
26
+ end
27
+ end
28
+ describe 'test attribute "cluster_display_name"' do
29
+ it 'should work' do
30
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
31
+ end
32
+ end
33
+
34
+ describe 'test attribute "cluster_id"' do
35
+ it 'should work' do
36
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
37
+ end
38
+ end
39
+
40
+ describe 'test attribute "cluster_name"' do
41
+ it 'should work' do
42
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
43
+ end
44
+ end
45
+
46
+ describe 'test attribute "cluster_url"' do
47
+ it 'should work' do
48
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
49
+ end
50
+ end
51
+
52
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: akeyless
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.2.5
4
+ version: 3.2.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - OpenAPI-Generator
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-02-20 00:00:00.000000000 Z
11
+ date: 2023-02-26 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: typhoeus
@@ -255,6 +255,7 @@ files:
255
255
  - docs/GCPPayload.md
256
256
  - docs/GCPSecretsMigration.md
257
257
  - docs/GatewayAddAllowedManagementAccess.md
258
+ - docs/GatewayBasicInfo.md
258
259
  - docs/GatewayCreateK8SAuthConfig.md
259
260
  - docs/GatewayCreateK8SAuthConfigOutput.md
260
261
  - docs/GatewayCreateMigration.md
@@ -873,6 +874,7 @@ files:
873
874
  - lib/akeyless/models/extension.rb
874
875
  - lib/akeyless/models/external_kms_key_id.rb
875
876
  - lib/akeyless/models/gateway_add_allowed_management_access.rb
877
+ - lib/akeyless/models/gateway_basic_info.rb
876
878
  - lib/akeyless/models/gateway_create_k8_s_auth_config.rb
877
879
  - lib/akeyless/models/gateway_create_k8_s_auth_config_output.rb
878
880
  - lib/akeyless/models/gateway_create_migration.rb
@@ -1980,6 +1982,7 @@ files:
1980
1982
  - spec/models/extension_spec.rb
1981
1983
  - spec/models/external_kms_key_id_spec.rb
1982
1984
  - spec/models/gateway_add_allowed_management_access_spec.rb
1985
+ - spec/models/gateway_basic_info_spec.rb
1983
1986
  - spec/models/gateway_create_k8_s_auth_config_output_spec.rb
1984
1987
  - spec/models/gateway_create_k8_s_auth_config_spec.rb
1985
1988
  - spec/models/gateway_create_migration_spec.rb
@@ -2816,6 +2819,7 @@ test_files:
2816
2819
  - spec/models/create_rabbit_mq_target_spec.rb
2817
2820
  - spec/models/describe_permissions_spec.rb
2818
2821
  - spec/models/create_aws_target_spec.rb
2822
+ - spec/models/gateway_basic_info_spec.rb
2819
2823
  - spec/models/encrypt_gpg_spec.rb
2820
2824
  - spec/models/update_auth_method_k8_s_spec.rb
2821
2825
  - spec/models/kmip_renew_server_certificate_output_spec.rb